Featured Post

Three Basic Ways of Dealing with Double-Booked Resources in the Sumatra cmdlet

There are three basic ways of automatically dealing with double-booked resources in the Sumatra cmdlet suDoubleBookedMeetings. You guys wo...

Wednesday, February 11, 2015

Lone hackers and the calendaring connection

My best Internet read of the last few months has been How a Lone Hacker Shredded the Myth of Crowdsourcing.  

What's the calendar connection in this?  In the lesson that in any sufficiently large group of people (let's say a 1000 user calendar migration) you will see the spectrum of all types of behavior.  And this very much includes destruction for its own sake.

We see things like this in raw calendar data all the time: calendars booked through 2039 (no joke), people who have put birthdays in calendars starting in the 1960's (why?) and of course, during a migration the great conference room attempted land grab.

The lesson: any open door can become an opportunity for malfeasance.

No comments: