Skip to main content

Beta Wars: Part I { The IRM Perspective}

There is a widely single sided debate going on the tech blogosphere regarding "brand dilution of Beta".
http://ross.typepad.com/blog/2004/12/fresh_outta_def.html
http://napsterization.org/stories/archives/000374.html

True techies are increasingly finding the (mis)use of the term 'Beta' objectionable. For the uninitiated - Beta is a term used for a 'pre-release' version of any software and most of the 'cool' Web 2.0 applications from GMail to Flickr started out as Betas. If software was an Indian Children's game 'Beta' would mean 'Kachhi Goti' :-P or 'Trial Over'.

But the bone of contention is that most of these startups (some of which are now owned by major companies or themselves are big companies) are perpetually in Beta. For the techies who were groomed in the era of Desktop Suites and Mainframes (where stable release and quality control were critical), this means telling customers that you're not really committed to rolling out a finished product.

Most techies have been blaming Marketing Executives for this claiming that they have misused the technical term as a branding strategy so that suddenly 'Beta' is akin to 'cool'. One camp argues this has diluted the meaning of the term Beta for users while another argues that it has made product managers and software companies transfer 'liability' of software usage to the customer.

As an Information Risk consultant this debate is intriguing and quite interesting. The questions I ponder upon are - will the corporate world accept Beta products? If not, do these Beta products it really increase risk to information? And if some corporate data gets into these 'Beta' products what would be the implications?

The first point is that the corporate sector will NOT accept Beta products even if users embrace them. The cardinal rule in the corporate world to 'induct' any new software into 'production' is to test it for data protection - namely data availability (loosely protection against crashes that would make you loose the data), data confidentiality (loosely protection against unauthorised access of data) and data integrity (loosely protection against virus / worm attacks).

Unless organizations are ensured that these 3 aspects are taken care of - they will not induct the application into its fold. Having said that some of the latest 'web-based' tools that are being developed in house by many corporates are even more buggy and 'Beta' than the popular online tools.

However, what we are missing is that all these tools belong to the presentation layer (not strictly as per OSI Model - but figuratively) and none of them actually determine the protection standards of data. Data utilized in these tools still resides in tried and tested database tools which are hosted on reliable and secure hardware platforms which are further managed by a robust practices and procedures in the organization. [This is not entirely true as access control affects data confidentiality and is usually determined by the web based interface. This, as per me, is already a major pain area for companies.]

This brings us to the answer of the other two questions - taken in isolation and used as it is many of these products are prone to data security flaws. For example if a corporate user uses GMail then the fact that GMail is in Beta makes him loose the guarantee that his emails will be protected in case of a server crash at Google.
[I do not mean that GMail servers are not backed up - but the fact that Google does not have a liability towards its users to protect its data. So while your emails are being backed up - but there's no SLA to ensure that it happens.]

But as has been mentioned above, most corporate systems do not rely on external measures for their data protection. They usually would manage their infrastructure themselves. Thus if a corporate chooses to use GMail interface, it would still prefer to store its emails on its own servers which it would back up itself. Thus in case GMail malfunctions - the data still remains protected on its servers.

However, coming to marketing aspects - it remains to be seen whether 'Beta' the cool brand among teenagers can become a selling point among corporates as well.

Comments

Popular posts from this blog

How will travel industry transform post-Covid

Unlike philosophers, journalists and teenagers, the world of entrepreneurship does not permit the luxury of gazing into a crystal ball to predict the future. An entrepreneur’s world is instead made of MVPs (Minimum Viable Product), A/B Tests, launching products, features or services and gauging / measuring their reception in the market to arrive at verifiable truths which can drive the business forward. Which is why I have never written about my musings or hypothesis about travel industry – we usually either seek customer feedback or launch an MVPised version and gather market feedback. However, with Covid-19 travel bans across the globe, the industry is currently stuck – while a lot of industry reports and journalistic conjectures are out, there’s no definitive answer to the way forward. Besides there is no way to test your hypothesis since even the traveller does not know what they will do when skies open. So, I decided to don my blogger hat and take the luxury of crystal gazing

A Guide to Privacy on Social Media [apps]

The recent announcement by WhatsApp to update its privacy terms - and 'accept or leave the app' stance - led to an exodus of users from Whastapp to competing, privacy-conscious apps such as Telegram or Signal. A week after the exodus began, Whatsapp clarified its stance - and WhatsApp's CEO went about providing a long Twitter clarification . And then, many returned, many who considered moving stayed put on Whatsapp. This post is meant for those who are still sitting on the fence - it clarifies questions like: What is this all about? What do I do? Is Whatsapp safe? I've heard Telegram is Russian - so how is it safer than Whatsapp? I can't move because my business contacts are on Whastapp - how do I secure myself? PS: I've modeled this post based on several conversations I've had with friends and family on this subject, dealing with the chain of questions they ask, then objections they raise, then clarifications they seek - and finally the change resistance

Ekla Chalo re

Watched "Bose- The forgotten Hero" on Saturday. Gem of a movie and probably the best of Shyam Benegal. Subhash Chandra Bose has always been an inspiring character in the history for the youth. This post however is not about the movie, its about the lead song 'Tanha Rahee' which is based on the poem 'Ekla Chalo Re' by Gurudev Rabindranath Tagore. I had pasted the English translation of this poem on my blog earlier. http://the-complete-man.blogspot.com/2004/12/tsunami-times_30.html However, yesterday I found the original bengali text of the poem and found that the meaning in the above translation was not exact. So I have endeavourer (with the help of Shubham ) to re-translate it into English and Hindi by myself. Here is the output of my work: Bengali Jodi Tor Dak Soone Keu Na Asse Tobe Ekla Chalo re Ekla Chalo Ekla Chalo Ekla Chalore Jodi Keu Katha Na Kai Ore Ore O Abhaga Jodi Sabai Thake Mukh Firae Sabai Kare Bhay Tabe Paran Khule O Tui Mukh Fute Tor Maner Kath