March 24, 2015

When Worlds Align in Surprising Ways...

Wildly separated by nationalities, cultures, races, generations, history, personal experiences, and more, people share certain common human emotions that unite them, such as those associated with life's diverse paths from aspiration, through struggle, to achievement and excellence.

Earlier this year, my employer Huawei Technologies launched a global corporate marketing campaign centered around a striking image from famed photographer and ballet enthusiast Henry Leutwyler.  That image, featured immediately below, is both emotion- and thought-provoking.
The Huawei ad leveraging this image was the brainchild of the company’s 70-year-old Founder and CEO, Ren Zhengfei, who saw in this image a reflection of the history of the company that he founded in 1987: Aspiration, struggle, pain, hard work, harder work, achievement, and the sublime satisfaction (joy) of delivering excellence to an audience (customers).

The result:
When the ad debuted internally in January, there were a number of Huawei employees who initially reacted with some concern.  The image, after all, is truly striking.  Graphic.

But, however you may initially perceive the image, it makes you stop.  Think.  Imagine. Perhaps contemplate the challenges and rewards of any journey, whether artistic, corporate, or personal.

External reactions ranged from thoughtful reviews by marketing professionals – for instance, AdAge’s February 4 piece titled “What a Ballerina's Beat-Up Feet Have to Do With A Chinese Tech Brand” – to not-unexpected tweets from everyday folk who were, for whatever reasons, disturbed by the image, e.g. "I don't know what @Huawei does/sells, but I do know that their ads freak me out. Plz stop showing me wrecked ballerina feet. #marketingfail."

Now, flash forward a month-and-change to late March…

What do a 70-year-old Chinese entrepreneur-CEO and a 34-year-old American hip hop/R&B star have in common?

An understanding, it would seem, of the physical, psychological and emotional path from aspiration, through struggle, to achievement and excellence.

Below is a meme posted on March 21 on the Facebook page of Grammy-nominee and platinum recording artist Keyshia Cole:
The Huawei and Keyshia messages are perhaps as distinct as they are alike, but the underlying emotions are clearly aligned.

In this context, some food for thought: 

In a world in which we too often find elements of our lives defined in the context of one or another “us” vs. some other “them,” we should perhaps reflect on unique, quirky - quite remarkable, actually – instances like this one in which the commonality of the human experience and human interpretation and emotion are so classically depicted.

What do a 70-year-old Chinese entrepreneur-CEO and a 34-year-old American hip hop/R&B star have in common?

They are both human beings, each uniquely gifted, each with emotions, aspirations, struggles, achievements, and, at the core of their life journeys, a common desire to experience and share joy.

February 16, 2015

Firmware Hijacked, No-one Safe… By and From the U.S. - Are we really surprised?

The New York Times reported February 16, in an article titled “U.S. Embedded Spyware Overseas” (link), that Russia’s renowned and respected Kaspersky Lab has unveiled that the U.S. “Equation Group” (AKA, apparently, the NSA and DoD’s U.S. Cyber Command) have – for more than 10 years – hidden malware and spyware deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers.

Doing this has given the U.S. the means to eavesdrop on the majority of the world's computers, according to Kaspersky, other cyber researchers and, reportedly, former U.S. operatives.

Surprised?  You shouldn’t be.  This pot’s been calling kettles black for so long you’d have to be idiot-thick not to figure out that they were over-compensating to veil their own transgressions.

So what now, now that we have relative certainty that the entire planet’s been compromised by U.S. intelligence agencies?  And, perhaps worse, they’ve been doing so in the context of accusing pretty much any and every other (other?) “bad guy” of doing the same thing while purporting to be holier than all those other “thou’s.”

But wait, the U.S. only conducts espionage to ensure our national security, not, for instance, to gather and store data on its own citizens or, ahem, to gain commercial benefit for American companies.


I'll leave the former be for now, but as for the latter, while there’s no evidence - yet - to believe the U.S. has stolen intellectual property from foreign firms with the express purpose of transferring such knowledge to domestic firms, that’s – perhaps - only because the need has not yet been perceived. 

But have American intelligence agencies eavesdropped on others to leverage benefits for American companies, for instance, in terms of intelligence related to the negotiation of trade agreements, etc.? 

Well, yeah.  Duh.  And, that, yes, confers commercial advantage.

Hey, I’m an American.  I get it.  I understand.  Indeed, I don’t oppose it, per se. 

What I oppose is the utter hypocrisy of painting other kettles blacker than our pots.

Look, national governments are national governments, and spies will be spies - humankind has conducted espionage on its neighbors since the first caveperson leaned out to peer into the neighboring hole to see how the “other side” were making their fires.  So let’s be intellectually honest about the whole thing.

So, before we let this latest revelation escalate us towards yet more techno-nationalist (nonsensical) market access barriers in one or another country, consider the below instead.  After all, none of this is sustainable - we are risking our future, a future largely and increasingly dependent on the global and interdependent information economy. 

Manifesto for a post-Cyber Future


- Our societies, businesses and personal lives have become ever more reliant on the Internet and connectivity, on a global and interdependent basis; 

- The development of networks has helped to advance social progress. Open networks have encouraged information flow and sharing, provided more opportunities for and lowered the cost of innovation, and have helped improve the world's health, wealth and prosperity.

- Today’s interconnected world is powered by global, intertwined infrastructures built on technologies provided by a wide range of information and communications technology (ICT) vendors sourcing inputs from a vast global supplier ecosystem, enabling networks that span multiple markets;

- This complex, intertwined ecosystem is potentially vulnerable to those that wish to use technology for purposes it was never intended, to steal, corrupt, damage or disable.

- In this context, the integrity of networks and data are essential to our societal and personal well-being, and that integrity is increasingly threatened;

- Maintaining or restoring confidence in network and data security is critically necessary to maintaining and enhancing the global digital economy and our day-to-day lives as individuals;

- Governments have a responsibility to secure the networks their citizens use, and to ensure the integrity of the data within such networks, as well as legitimate law enforcement and national security obligations;

- No longer is technology designed, developed and deployed only in one country; no longer can any country or large company claim to rely on a single sourcing model;

- Physical and digital supply chains fueling the information and communications technology industry eclipse borders;

- Geography-based or otherwise “techno-nationalist” approaches to securing networks and data are inconsistent with commercial and technological realities in what has become a global and interdependent information age;

- Network security and data integrity are not single country or company issues, they are functions of how ICT products are made, used, and maintained, not by whom or where they are made, or by the relationship any vendor may have with any particular government;

- Geographic-based restrictions in any form risk both retaliation, replication and the fragmentation of global ICT supply chains, as well as undermining the advancement of global best practices and standards on network security and data integrity;

- States should seek to agree appropriate conventions among themselves governing acceptable behavior in cyberspace, while refraining from hyperbolic rhetoric and market-distorting policies, laws, regulations and practices in the name of “cyber” or national security;

- Governments should offer additional clarity and transparency in terms of their mandates, regulations and practices related to data monitoring, collection, processing and storage;

- Industry should accelerate initiatives to defining certifiable standards, disciplines and best practices for network security and data integrity; from product conception through research and development; from coding to sourcing; from assembly to shipment; from deployment to servicing to end-of-life.

- Public-private partnerships should cement the results, codified as appropriate, whether through international covenants or global industry standards bodies.