Archive for the ‘blogging’ Tag

What’s Your Favoirte Wireless Blog or News Source?

I recently read an article entitled “Why employees don’t want to blog“.  The article stated that less than 1% of Internet users have an active blog.

Personally, I have a rather hard time finding blogs about Enterprise Wi-Fi networking & security. That being said, there’s a real need for this type of information.

As Nigel Fenwick points out in the video interview below, there is a much bigger value to this online content than one might think due to the high number of people that are engaged as critics, conversationalists, or spectators.

One such person is Andrew VonNagy, who participated in one of my contests offering a “Free Copy of Wireless Hacking Exposed” in exchange for the best wireless pen testing tip.

The funny thing is, by entering the contest, I stumbled onto Andrew’s blog — Revolution Wi-Fi — and realized that Andrew is a wonderful content creator.   For example, over the last several days, Andrew published a great series of posts about Wireless Quality of Service.

This “discovery” motivated me to start another contest. Tell me about a new wireless blog (or news source).  Some of my favorites are already listed along the bottom, left-hand side of WiFiJedi.com Whoever submits the most compelling content will win a free copy of the Certified Wireless Technology Specialist Official Study Guide.

I’ll choose the winner on the next #WirelessWednesday (Aug. 11th)

Advertisement

The Importance of Tagging

While at INTEROP last week, I met several journalists, analysts, etc. Several of them visited WiFiJedi.com and gave me feedback.  

One piece of constructive criticism was that while the content was good, there was no real good way to find past material.  This individual suggested that I have a tag cloud widget on my blog cross-referencing posts on a given topic.  

Therefore, I have taken this suggestion and placed a tag cloud on the side bar of my blog. I have always had the drop down category box and the search field that appear below the tag cloud.  At the bottom of every post, I have also tried to link to other applicable WiFiJedi.com material.  Have you used these features? Do you like the tag cloud? Please let me know what you think in the comments section.

At any rate, the tag cloud coversation reminded me of one of the sessions I attended at INTEROP titled “Next Generation Search: Social Bookmarking and Tagging” by Thomas Vander Wal.  Here is an oversimplified graphic from the presentation:

Interest –> Culture 

Vocabulary –> Terminology 

Mr. Vander Wal suggested that bookmarking and tagging turn individual interest into a shared culture and how they also turn an individual vocabulary into shared terminology.  

Coincidently enough, that same day I found a Twitter service called Twittersheep that generates a tag cloud of all the terms used in the biographies of your followers.  Here is what it generated from my followers:

What really jumped out at me was how much of a reflection of my background and interests are mirrored by my Twitter followers.  I guess we are attracted to people who persue similar activities.  Go ahead and try it and let me know if you come to a similar conclusion! 

Related Posts: 

Groundswell by Charlene Li and Josh Bernoff – Book Review

I would like to offer periodic book reviews on WiFiJedi.com   The plan is to review wireless networking and security books. However, I have been doing a lot of reading about blogging and social media these days. Therefore, this week I am reviewing the book “Groundswell” by Charlene Li and Josh Bernoff.  

Please let me know in the comments section if you like the idea of book reviews.  Also let me know if you would like them strictly on wireless, or if you don’t mind if they are off topic.  

I originally bought this book based on a You Tube video of the author, Charlene Li, making a presentation under the “Authors @Google” program. I guess the Groundswell sold one more copy of her book…

In many ways, this book reminded me of Jim Collin’s “Good to Great” book. “Groundswell” is very quantitative in nature. There are a TON of in-depth case studies – the book even contains a case index in addition to a subject index.

The book is well structured. It is broken into three main parts and has a logical idea flow of listening, talking, energizing, supporting, and embracing the groundswell. While I liked the structure, it took more time to read than most books due to its academic nature. 

Overall, the authors take a practical, high-level approach to social media. They focus on the people, objectives, and strategy BEFORE they focus on any given technology.

This should definitely be a cornerstone text in any library on Social Media!

Can IT Vendors be Objective?

Here is another guest post that I wrote for An Information Security Place.   This is something that I am worked up about, so I am re-publishing it here to maximize the audience.  🙂  
————————————————————————————

Can IT Vendors truly be objective?  Or does everything they say have to be viewed through a lens of “they are trying to sell me something”?  

 

Join me while I rant… 

Personally, I think IT vendors can be objective.  

Sure, we manufacture and sell things…

*Gasp* – We even profit from selling.  

But that doesn’t mean we can’t be objective.  

i.e. – I try to provide solid vendor-neutral information to the wireless community through my blog, http://wifijeidi.com.  

(In fact, only 2 of the nearly 40 blog posts I have completed to-date have been about my employer, Xirrus.)

However, not everyone sees it that way.  


Let me give you an example…  

I requested press access to an industry event as a blogger.  

However, I was told that I can’t get a pass of this nature because I work for a vendor.  

Furthermore, I was told that bloggers of major publications (ComputerWorld, Network World, ZDNet, etc.) would qualify.  

So I went out seeking a spot with one of these publications as one of their bloggers.  

(I even had a solid lead directly to an editor with a reference from another well know blogger at one of these publications.)

However, I was turned down again.   Because I work for a vendor.

 

My “commentary”…

Presumably, working for a vendor means that I can’t be objective.  Which I personally think is %^&$*&

Let’s take a look at some profiles of bloggers who have been picked up by these publications.  I would like to take a closer look at two common blogger profiles: Value Added Resellers (VARs) and Independent Consultants.

I have noticed that if you work for a VAR, you can blog for major publications.  Correct me if I am wrong – as a VAR, don’t you sell some vendor’s equipment, but not others?  It would seem to me, in that position, it is possible to have nuances or conflicting agendas.  At least working for a manufacturer, you know where my “official” loyalties are

Other common profile for bloggers on these publications is that of an “independent” consultant.   I would think a large portion of their livelihood depends on their ability to provide consulting services.  If that’s the case, don’t you think they would blog about things that (at least indirectly) drive their own business?  After all, their financial success is directly tied to the success of a single person – themselves.   Working for a manufacturer (or any large organization) mitigates this factor because my financial situation is determined by the success of the group, and not by what I do or say to drive my own consulting business.  

This isn’t intended as an attack on publications or their bloggers, just an honest discussion of how they can be objective, but somehow it is perceived that I can’t.  What about my credentials?!?

Besides working for a vendor (for several months), I have also worked as a consultant and auditor (for many years).  I hold over a dozen IT certifications, ALL of which are vendor-neutral.  On my LinkedIn profile, I have the coveted “500+ connections”, many of who are employed by my competition – Aruba, Meru, Motorola, etc.  I started my blog to serve as a thought leader and I am a frequent speaker at industry events, professional organization meetings, and universities. 

If you know someone at an IT publication that is willing to have me as a wireless networking and security blogger, have them contact me at douglas.haider@xirrus.com  

Wait, I had better not use my corporate email address.  That might signal I can’t be objective.  🙂  

Instead, have them contact me at douglashaider@hotmail.com

Press Registration for Gartner Wireless & Mobile Summit?!?

Gartner is having their annual Wireless & Mobile Summit this month in Chicago. This is an event that I have always wanted to attend.

I am going to ask about Press Registration for the conference. I know that RSA and other large security conferences have embraced the idea of allowing bloggers to attend and post about their events. In this case, I will have to be posting from either an EVDO card or via my iPhone – which should be a natural fit for an event centered around Wireless & Mobile technologies. 🙂

The first page of the conference brochure (beyond the cover page) starts out with the phrase “Mobile Business 2.0 is coming.  Are you ready?”   I fully believe in Mobile Business 2.0, which is a large reason that I have beefed up my LinkedIn profile, started this blog, and created a Twitter account.  I believe sharing information of this kind is extremely valuable to us as a Wireless & Mobile community.  In that spirit, I hope that Gartner sincerely considers my request for a press pass as a blogger.

Sessions that look particularly interesting to me upon first glance are the ones around RFID, iPhone Forensics, and Online Society in 2020.

If you are interested in attending the event, here are some of the details (they even offer a money back guarantee):

23 – 25  February 2009   |   Chicago, IL   |   Sheraton Chicago

Standard Conference Price

Fee includes conference attendance, documentation and planned functions.  – US $2095

Money Back Guarentee

If you are not completely satisfied with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee.

http://www.gartner.com/it/page.jsp?id=669708

Comment Moderation Policy

As I am relatively new to blogging, I have been reading a couple books on the topic to maximize my value to you, the readers.  One of the books I am reading is “What No One Ever Tells You About Blogging and Podcasting”.  It is a great book.  I actually got a signed copy in the mail from the author (Ted Demoploulos) because I provided some feedback and advice on one of his websites that deals with Information Security Certifications – www.securitycerts.org

One of the ideas it gave me was to explicitly spell out my policy regarding comments on my blog.  I do moderate comments, only to filter out spam, expletives, or otherwise unprofessional comments.  I don’t mind (even encourage) dissenting comments, as long as they are respectful and professional.

My hope is that this will be an open forum for people to exchange ideas and information.  Please feel free to leave comments, links to related material, etc.  It is this sense of community that will make wifijedi.wordpress.com a valuable resource.  I look forward to hearing from you!

Sugar, Spice, and Everything Nice

I ran across this article at ProBlogger.net (which is a great site BTW).  The article talks about different types of content for a blog to include information for regular readers, interesting material to gain new readers, and controversial material to encourage discussion.

Being new to blogging, I would love your comments on both the form and content of this blog.  What do you think about the format?  Is there anything else you would like to see?  What about the content?  Which have been your favorite posts?  What would you like to see in future posts?

New Look

I hope that you enjoy the facelift that I have given my blog.  I am new to Word Press and blogging, so bear with me as I learn.

My recent updates include a new theme, sidebar widgets (including links to some of my favorite websites), a few pictures, and hyperlinks in lieu of URLs.