click on the image and go check it out
Sunday, December 14, 2025
Boost Your Packet Analysis with the CellStream Wireshark Profiles Repository
Saturday, December 13, 2025
Strategy in the Digital Age: Mastering Digital Transformation by Michael Lenox – A Review
Technological progress is rapid and accelerating. Biologist Paul Ehrlich reassures us that as long as the human brain is setting the pace, we needn’t fear – basic human intelligence has remained the same for thousands of years. On the other hand, Singularity Theory (e.g., I. J. Good 1965) warns that Artificial Intelligence could beget machines that design progressively more intelligent machines, eventually leading to an “intelligence explosion” that leaves humans far behind. While pundits debate how to keep AI in check, Strategy in the Digital Age by Michael Lenox teaches business leaders how to navigate and manage the digital transformation. Organizations facing the shifting business strategies of this new paradigm will benefit from this well-organized deep dive into all things digital.
Kodak was the legendary leader in photographic film and, though they foresaw the rise of digital imaging and spent billions to keep up, they still landed in bankruptcy. Smartphone cameras, digital watches, and word processors are all transformational technologies that disrupted established businesses. As if things weren’t moving fast enough, the COVID pandemic pushed digital innovation ahead even more. The foundational digital technologies of processing power, storage capacity and bandwidth have grown exponentially over the past half-century - the technology of today could easily be obsolete in a year. The author closes his first chapter by laying out the structure and strategy with which the book will address the transformation.
Competition will be different in the digital age, and asset-light businesses will exploit existing technology with software to connect independent providers directly with customers. Examples include Uber, Lyft, Airbnb, and eBay. These two-sided market makers discourage competition primarily through rapid growth. The more people who adopt these platforms, the more value they have – Facebook has ~ 3 billion users, while LinkedIn has close to a billion. These platforms can also vanish quickly (e.g., Tinder, Match) if deemed “uncool” by users. Understanding just how digital transformation spreads is key to developing effective business strategies. The author helps by clarifiying the interconnectedness of various digital and non-digital technologies.
Once upon a time, a business produced a product, marketed it, and sold it to the customer in a one-way transaction. The new customer relationship is a longer lasting, two-way deal where the value proposition may continue to shift with changing customer needs. Lego has an online website where customers can build whatever they want with digital Lego blocks. Good designs that became popular have been made into real Lego kits. Another new method of capturing value is a switch from a one-time payment to a subscription, where defending customer engagement and loyalty becomes essential. Stitch Fix does this by analyzing customer data with AI to provide a regular offering of curated clothing. During Steve Job’s second stint at Apple, the company stopped trying to compete with Microsoft and moved into new innovative territory with the iPhone and iPad products. High switching costs kept customers engaged in the Apple universe.
Much like Kodak, General Electric saw digital change coming. GE invested heavily in the Internet of Things, but nonetheless failed to become a market leader. Perhaps GE’s old-school image kept customers from trusting them as the right company for this transformation. Valuable resources, like GE’s, aren’t enough if those resources are widely available. Corporate culture is one complementary intangible asset – examples include Amazon (data driven) or Apple (design expertise). The most important competitive asset may be the ability to innovate at every stage of the game.
Professor Lenox, a recognized expert in business strategies for the digital transformation, relates his own experience after being asked to lead the efforts at the University of Virginia’s Darden School of Business. This program accelerated with the onset of the COVID pandemic, which forced a change to 100% online course delivery and exams. His first-hand experience elucidates many of the book’s key points. Any organization must begin with a solid digital infrastructure, add data analytics (hence the emergence of the “data scientist” as an essential creative team member), and develop digital applications. Finally, none of this really matters unless there is a well-articulated digital strategy to tie it all together and feed back through the first three layers.
Many of the characteristics required of good leaders for the digital transformation will be familiar. One leadership strategy I especially liked was to encourage a culture where people are not paralyzed by a fear of failure. By assigning individuals to several project teams at once, one failure can be cast as an opportunity to devote more time to other tasks.
The media closely scrutinizes the products of digital transformation, and topics like data breaches and mental health concerns are popular click-bait. Social media is credited with enabling the Arab Spring and causing the resignation of Egyptian President Hosni Mubarak, but it has more recently been blamed for mentally unhealthy comparisons among young people During the 2016 US Presidential election, foreign actors were found to be provoking discord online and even inciting violent protests. As the term “surveillance capitalism” enters the lexicon, the very definition of privacy is changing. 96% of Apple iPhone users chose not to allow mobile device applications to track their data, causing Facebook to forecast a $10B decline in advertising revenue.
The author summarizes some of the concerns with Artificial Intelligence and introduces the importance of studying the ethics behind software algorithms. As he notes, some of our anti-trust laws may need to be revised to accommodate situations where monopoly may actually drive down prices and benefit consumers. The concept of “The Value of Values” is a fitting finish to the section on digital transformation – it is critical to check each new market opportunity for its alignment with your core values. Adjusting the values, on the other hand, sets a dangerous precedent.
Some of the most pressing problems of our time – optimized, sustainable farming, climate change and decarbonization, healthcare and telemedicine, the availability of education... – are promising fields for digital transformation. Author Michael Lenox lays out the challenges, providing a “Framework” at the end of each chapter to summarize the content and help readers organize their thoughts into actionable ideas. He concludes the book with a tour through all the frameworks in summary fashion to put the entire process in perspective. Individual terms are explained in such a way that the potential reader should not be put off by “business speak”, and there is a complete glossary of terms for further support. References to other useful business books in the body of the text guide the motivated reader to further detail on specific topics.
Populated with numerous relatable examples, Strategy in the Digital Age entertains, informs, and leaves with reader with a solid plan for doing business in the fast-moving digital world.
Friday, December 12, 2025
When Your Tools Don’t Agree: The Ubiquiti Wave Pro Headache
There’s nothing quite as frustrating as trusting your monitoring tools—only to find out they’re telling two completely different stories. That’s exactly what happened during a recent Ubiquiti Wave Pro deployment. I was working the install remotely, checking the unit through the web interface, when it suddenly showed the 60 GHz link as down. Naturally, that set off alarms. A down link means troubleshooting, delays, and a big headache. But then I got a message from my onsite tech saying, “Everything looks fine here—the link is up.” That contradiction alone was enough to make me question my sanity.
At first, I assumed it had to be a syncing issue or maybe a firmware glitch. But the odd part was that the Bluetooth app on-site was showing completely different information from the web interface. Two official ways to access the exact same device—and somehow they couldn’t agree on something as fundamental as link status. When you're depending on accurate remote visibility to keep things moving, this kind of mismatch isn’t just inconvenient—it’s a recipe for wasted time, unnecessary troubleshooting, and serious deployment delays.
So, I tried to open a ticket with Ubiquiti support, expecting at least a “try this” or “here’s a workaround.” Instead, their response was almost surreal: they openly admitted it’s a known issue with no ETA for a fix. Not a minor bug, not a cosmetic glitch—an outright discrepancy between their own interfaces on critical link status. Even the support chatbot echoed the problem, saying, *“Based on your description, there may be a discrepancy between what UISP and the radio’s web interface report versus the Bluetooth app.”* It then pointed me to a general WiFi optimization guide that had nothing to do with the issue at hand.
In the end, the whole experience left me shaking my head but at least i knew it was a bug. When you're deploying gear like the Wave Pro, accurate diagnostics aren’t optional—they’re essential. Having to second-guess the device’s own interfaces shouldn’t even be on the table. Until Ubiquiti sorts this out, anyone managing Wave Pro deployments will need to rely heavily on onsite checks, because the remote view just can’t be trusted. It’s disappointing, avoidable, and honestly, not what I expect from equipment at this level.
Thursday, December 11, 2025
from the web: Everything you wanted to know about Access Lists
What Access List? What is standard ACL, extended ACL, named ACL, and what is routing protocol ACL? What is a time-based ACL? How to configure ACL?
What is Access-List?
Access-List or ACL is a set of rules which will allow or deny the specific traffic moving through the router. ACL is
Click on the image for the full article
Wednesday, December 10, 2025
Blast from the past - The Unidisc
The disc is metal and the whole thing weighs 2.9 kg (6 lbs, 6 oz) and stored 2 MB in 1996.
If you were a computer enthusiast in the late 1970s or early 1980s, you may remember **The Unidisc**, a quirky but clever attempt at solving one of the era’s biggest headaches: incompatible disk formats. Back when every computer manufacturer believed their floppy disk system was the one true path to digital enlightenment, The Unidisc showed up like a universal translator for storage media. Designed to read and write multiple floppy formats, it became a surprisingly essential gadget for anyone juggling CP/M machines, early PC clones, or that one weird computer your uncle bought from a mail-order catalog.
One lesser-known bit of trivia is that The Unidisc often found itself used in small businesses that were transitioning from older dedicated word processors to microcomputers. Rather than retyping mountains of documents—a fate worse than dial-up speeds—they used The Unidisc to transfer data from one platform to another. In an era before USB flash drives, cloud sync, or even reliable networking, this thing was basically the Swiss Army knife of floppy drives. And like any Swiss Army knife, half the time you didn’t know what all the tools did, but you were glad they existed anyway.
Another fun fact: enthusiasts still mention The Unidisc in retro-computing forums today, usually followed by a story that starts with “You won’t believe what I found in a box in my parents’ basement…” Many collectors swear by its durability—remarkable considering that modern gadgets beg for a protective case just to survive a gentle breeze. The Unidisc, on the other hand, seems to have been built out of the same material used for 1980s school desks and indestructible lunchboxes. You could drop it, stack things on it, or ignore it for 25 years, and it would probably still spin up.
Of course, the true charm of The Unidisc lies in its accidental comedy. It promised “universal compatibility,” which was ambitious for a world where every company wanted proprietary everything, down to the screws. Using it sometimes felt like convincing rival kingdoms to sign a peace treaty—magnificent when it worked, mildly tragic when it didn’t. But when that clunky, glorious machine actually transferred your files without arguing, it felt like magic. Today, it’s a delightful reminder of a time when “plug and play” was more like “plug and pray,” and every working data transfer felt like a small personal victory.
Since the testing with the blog site is going so well, there is a good chance networkdatapedia.com name will be pointing here in the new year.
Popular post
-
From Betty's Linkedin post I've updated my profiles! I've now got over 300 hashtag # Wireshark display filters to share. I had...
-
I typically encounter situations where I need to come up with a solution. Sometimes it is a temporary solution while we wait for the ‘proper...
-
Everyone loves a reference sheet and this one is very helpful since GREP is so under utilized Found this on www.sysxplore.com my favori...

