Coffee pod compatibility : not so Nespresso compatible after all

Posted on August 28, 2014

I have two coffee machines. The Nespresso CitiZ (with milk) and a Verona Espresso Caffe Lux machine

Over the past two years or so since I got the first Nespresso machine I have tried out various Nespresso compatible pods. These come with brand names such as :

  1. Caffe Luxe (caffeeluxe.com) (R40 for 10 to R90 for 25)
  2. Vida e Caffe (from Vida or from Cafe Lux) (+-R62 per 10)
  3. Mycoffee (First from Groupon and on allmycoffee.co.za) (R40 for 10)
  4. Beaver Creek Coffee (from their shop on the Farm in Margate – beavercreek.co.za)  (R55-R64 per 10)
  5. Foreign Ground (Checkers) (R36 for 10, sometimes R29)
  6. Caffe Impresso (Some Pick n Pay’s and some Spars – wholesaler is RFI.co.za) (R50 – R62 per 10)
  7. Caffe Cagliari (First from Groupon and they were being sold by Aquazania but aren’t being stocked anymore) (R40 for 10, decaf only on special now for R20)
  8. Nespresso (the genuine article) (R63 – R73 per 10)

Now all of these different brands have worked (almost) perfectly across both of the machines I have. The very first Cafe Luxe pods I had sometimes didn’t pierce properly and a little bit of water would come out before the coffee, but it didn’t affect the flavour of the coffee. The did an upgrade which seemed to mostly fix the problem, but the pods remain a rather thick plastic container.

A few weeks back I had a reader complaining that the Caffe Luxe pods didn’t work at all in his machine. I hadn’t had that problem before and replied as much. I didn’t hear back from the individual.

Tonight I heard from another friend that there is definitely a problem. She bought a Nespresso U milk machine. It works quite nicely, makes your coffee then spits the pod out into its little basket without you having to “eject” it. When trying with the Mycoffee pods though, it huffs and puffs and a very little bit of water comes through but no coffee. Then it ejects the pod with no coffee having been produced. On examining the used pod it can be seen that the machine is having trouble piercing the plastic pod and therefore is unable to pump the water through the pod to brew the coffee. A further test with a Foreign Ground pod produced the same result.

Now a number of the local manufacturers seem to use the same plastic pods (numbers 1 to 5 on the list above). that somewhat limits your options in terms of which coffee pods you can buy. Caffe Luxe are quite adamant on their website and in their adverts that their pods work on all machines (they even expressly name the newer generation machines), so it seems more tested is going to be needed on their pods. I will test out some of the newer “Origins” range and update the post.

Options 6 and 7 seem to be imported (from Italy) and also use plastic pods, but a very different much thinner plastic. Further testing needs to be done to see if these will work but I cant see there being a problem here. (watch this space).

This is a bit of a pain as one of the benefits of using the Nespresso system over some of the others was that there seemed to be a growing range of alternate (and cheaper) pods that could buy for daily use.  If you have come across other sources of compatible pods, and have any further test results as to which machines they may work in please do share your experiences.

 

Visualisation of time based attacks on DMZ (videos)

Posted on August 24, 2014

Visualisation of two weeks of IPS data

Critical and high significant IPS events detected on a public facing Palto Alto device, visualised using Microsoft Excel Power Map for a period in November and December 2013.

The data is taken from daily detection summaries so although it covers a nearly two-week period has 24 hour time resolutions.

The attacks are differentiated between Spyware and Vulnerability.

Note the fairly constant levels of vulnerability attacks from China, Turkey & Indonesia.

The practical application of such a visualisation in detecting or preventing attacks is limited, however, it provides an effective mechanism to explain the level of attack (directed and random) against the organisation on a pretty much constant basis.

 

 

Visualisation of 24 hours of IPS data

Critical and high significant IPS events detected on a public facing Palto Alto device, visualised using Microsoft Excel Power Map for a 24 hour period on the 10th and 11th December 2013.

The source data is per event detected over that 24 hour period.

The attacks are differentiated between Spyware and Vulnerability.

The video shows two types of visualisation, first a “phased decay” where the attack is plotted and then fades away if not detected. This shows the attacks coming and going across the globe with the exception of China which is fairly constant source of attack.

The second segment shows a continuous growth in the sizes of the attack bubbles over the period. This illustrates the overall relative number of attacks from the various sources.

Note the main sources of vulnerability attacks being China, Turkey, Argentina & Indonesia.

The practical application of such a visualisation in detecting or preventing attacks is limited, however, it provides an effective mechanism to explain the level of attack (directed and random) against the organisation on a pretty much constant basis.

 

Guest lecture to UKZN 2014 MBA Class : Security & Ethics

Posted on August 24, 2014

In this past week I once again had the pleasure of speaking with the UKZN MBA Class. It is always a pleasure to speak to a large group of some of the brightest minds in KZN. Unlike other presentations, these sessions are normally quite interactive and the class willing to share their ideas, experiences and questions.

What stands out for me in this set of discussions were three key diversions.

1. Bank fraud, and the divergence in opinions between the bank representatives and victims (customers)

There is always a lot of interest in, and debate over on-line frauds as they affect individuals. We all know someone, if not ourselves, who has been hit through some kind of bank fraud. In the class were a number of (un-named) employees of various (nameless) banks. They were adamant that the banks do their utmost to refund their customers in the event of frauds. The victims, however, had a polar opposite view and experience. They contended that the banks make it difficult to get your money back, denying, obstructing and delaying in the process while the victim suffers through no having access to the affected funds. For a bank dealing with hundreds of thousands of affected customers and millions in losses, a month may be a short period to resolve such an incident. For a victim needing access to their funds, a month is a payday away and that money could mean the difference between being able to pay your bills or defaulting.

2. Online identities (and password management)

Online identities are increasingly becoming integrated with your professional life. When being hired more and more organisations scan these to see whether they wish to employ you. Whether this is done as part of the background checks (for which prospective employees normally sign permission) or through other means varies. However, needing to take control of and responsibility for your on-line identity is important. Also don’t forget about your children. They may not yet comprehend the gravity of the situation, and could be creating a fun-filled but wholly undesirable persona that they come to regret later in life when they join the job market and are unable to control or erase their past sharings.

Related to this discussion was the age old one of passwords and password re-use. The dangers of password re-use were discussed in detail with some schemes for password protection. The example of people using the same password across all on-line services, and then having the local camera club hacked, with usernames and passwords being revealed and then those same passwords being used to log into gmail, a facebook “I lost my password” event resulting in the password being mailed to gmail, and very quickly the entire on-line identity can be stolen.

Some tips :  Use different passwords on-line, and at very least don’t use your primary mail account password anywhere else. It is better to use a password manager on your mobile (LastPass, Blackberry password keeper etc) then to re-use passwords. Also don’t use your phone address book to store passwords or bank pins and account numbers. If you use an iPhone or Android phone then this information is generally synchronised to the cloud, so when that Gmail account is hacked they also have all of your phone book without you ever knowing.

3. Return to old school

There was a comment / view put forward that with all of the information security breaches and discoveries of organisations and nation states lying to citizens about what is happening in this space that it would be better to return to the (golden) “olden days” . While that may appear to be the case, memory can be a strange thing. We often remember the good and forget the bad. Not so many years ago when cheques were still in common use cheque fraud was rife. The banks didnt like to disclose information on fraud (and still don’t) but some of the stats I remember seeing flashed up at fraud conferences indicate that the fraud we are seeing now is just a fraction of what was experienced at the peak of cheque fraud. Social media and the online information era just increase the level and speed of information sharing. The fewer incidents that happen now are just more widely reported and shared then ever before. Instances of misrepresentation and abuse by companies(and countries) are now more widely shared and reported, what is not clear is whether the actual occurrences are on the rise or just more visible.

We cannot go back in time, we need to move with the times. That said a dose of healthy skepticism in all we are doing can only be a good thing. Ask questions until your are satisfied with the answers. You may choose to trust, but trust and verify, don’t trust blindly.

Finally

Embedded below is a link to download the slides. Thanks for attending the sessions and for participating.  Feel free to drop me any questions you may have (or leave them here).

Information Security and Ethics 2014 August 2014

 

Thanks Andrew for the invitation and facilitating the discussion.

 

Finally tried Uber (X), great service!

Posted on August 23, 2014

I finally got around to trying out Uber last night. I must say I was pleasantly surprised by the experience. Everything was just slick, pleasant and worked. I ordered the ride off my phone (using the App I had installed the week before), it gave me the estimated time of arrival of the driver, his name and the car registration and details of the vehicle. He arrived right on time and Mthokozisi was very pleasant. He had been working for Uber for 6 months and seemed quite happy with them as an employer.

I was delivered home 12 minutes later, right to the address I had entered when I ordered the car. In-between ordering my ride and arriving home my phone battery had gone flat, so I was concerned it may have been an issue but not to be. My credit card details were preloaded into the app so no issue with payment, and its all cashless. The trip cost is calculated based on a combination of time and distance. R7/km and 70 cents (or so) per minute. So my 12 minute 7.5km trip came to R65.59.

My trip was however free as there is an UberX launch campaign going on in Durban this weekend (See details below).

After the trip the driver “rated” me as a passenger and provided feedback on his Uber App. He asked me to do the same on mine (which I did a few minutes later). A short while after I also received a follow-up email from Uber summarising the journey, the costs, time, and showing the exact route. All super slick.

If you are interested, then download the app and sign up. It’s free. If you use promo code Uberjjza you can get R90 credited to your account (and I get R90 too). Furthermore, if you enter the second promo code UBERXDBN you can get six uberX rides in Durban, up to R250 in value each, until Sun 24 Aug 2014 at 11pm.

It is no wonder that Uber is changing the face of personalised public transport across the Globe. I don’t see myself using conventional Taxi services again. Install the App and give them a try, you will be pleasantly surprised. Whats really cool is you can use the App to get quotes of how much it would be for various trips, so you can already price the trip to and from the rugby / motor cycle event etc.

Share you experiences, good (or bad) once you have given it a go.

Below is a screenshot of the summary mail that arrived post trip (with address and credit card digits removed)

Summary Mail

Summary mail

Timeline of my tweets for #share4biz Share 2014 conference (updated with images)

Posted on June 21, 2014

During this last week (Wednesday and Thursday) I had the pleasure of attending my first Share conference covering Microsoft’s Sharepoint platform (#share4biz). As always I like to cover the events I attend on Twitter – it helps me focus on the presentations and overcome those ADHD tendencies.

As with the #ITWebSec Security Summit I tried to capture my timeline of tweets from the event to package, archive and share what happened at the event. After that event I tried to journalise my tweets and explored a number of options. Twournal looked the most promising but never produced a valid PDF that could be opened. Tweetbook.in produced a plain PDF of the text of the tweets but with no images which is unfortunate as the content of a large number of the presentation slides was captured in the images.

For now, here is my #share4biz conference timeline courtesy of Tweetbook. If I can find a better way I will add that in. Suggestions welcomed if you know of one.

Download it here : @jjza #share4biz

Update : 

I am delighted to say that Twournal sent through a notification to say the e-book is ready and this time it produce a valid PDF file which is available below, with all of the pictures embedded. 110 pages of full colour tweets with supporting graphics, bringing to life the coverage of the event. Wonderful.

Download it here : @jjza coverage of Share4Biz with images (Twournal)

 

Some photos from the event (all embedded in the PDF twournal above)

citizens expect outcomes all tied up keep it simple future of collab where business be in 2015

 

Analysing SCCM Logs with Log Parser Studio

Posted on June 21, 2014

Microsoft System Centre Configuration Manager (SCCM) is used in an Active Directory environment to amongst other things deliver patches and antivirus to the servers and workstations.

In a large environment you can have quite a number of SCCM servers operating in tandem to deliver the data to the client devices. Obtaining details in an SCCM environment of exactly which endpoints are being served by which servers (or how busy each server is) isn’t quite as straightforward as one might imagine.  The client devices all connect to the servers through HTTP calls to collect the packages they require. The IIS logs from the SCCM servers can be downloaded and analysed to try to figure out what is happening in the environment.

The IIS logs contain a number of useful fields (a sample included below) :

LogFilename : E:\logs\SCCMP101\SCCMP101\W3SVC1\u_ex140410.log
LogRow : 5
date : 41739
time : 36526.7730902778
c-ip : 10.75.xx.xx
cs-username :
s-sitename :
s-computername :
s-ip : 10.98.xx.xx
s-port : 80
cs-method : GET
cs-uri-stem : /SMS_MP/.sms_aut
cs-uri-query : MPLIST
sc-status : 200
sc-substatus : 0
sc-win32-status : 0
sc-bytes : 608
cs-bytes : 124
time-taken : 15
cs-version :
cs-host : sccmp101.xx.net
cs(User-Agent) : SMS+CCM

Further fields such as Cookie, Referer events and process types are present but I found these to be generally blank.  The above example includes the data transferred (sc-bytes and cs-bytes) which were not turned on by default and which I found quite useful. These can be activated in IIS easily enough.

In my use case I obtained the logs from 83 servers which amounted to 2859 files over 254 folders coming to 122GB (uncompressed). The proves to be a little bit of a challenge when I don’t have SQL server installed on my PC or Laptop, MS Access is limited to 2GB database and even SQL Express 2014 is limited to 10GB.

I had previously heard of (but not used) Microsoft Log Parser. A quick search revealed version 2.2 (released some 9 years ago in 2005 – but don’t let that put you off) available for download. Now this is a pretty nifty tool as it understands log files in many different formats (and even plain text files). This saves you from having to clean up the log files to strip out headers (which are written to the logs every time the web server starts / restarts) and from having to combine many different files. A real time-saver.

You can then write SQL-like queries and have them executed against your log files to get your results. Now with data of the size above on my 8 Gig i7 870 @ 2.93GHZ running off a Seagate 2TB 7200rpm SATA drive it takes around 3.5 hours to run a query (know how to speed this up fundamentally do share).  Using Task Manager to monitor the execution of the query shows CPU utilisation of only around 8% (one thread sits at about a 50% utilisation) memory utilisation of between 50MB upwards (as the result set grows) and disk speed varying from about 8MB/s to 30MB/s. So not quite sure where the bottleneck lies.

Writing the queries at the command line is a little bit of a pain so the next bit of genius is the Log Parser Studio.  Unlike Log Parser, the studio is kept up to date, with the latest build being 2.0.0.100 from 23 May 2014. The studio provides a library of queries (over 170)  covering logs from ActiveSync, IIS, Windows event logs, Exchange, Outlook Web access amongst others. Covers a huge number of ideas for useful analysis and provides the queries to do it for you.  What is great is that you can use these, modify them for your own purposes or create your own from scratch, and add them all to your own personal library.

For example, to understand what the patterns of access look like over a month a query such as this can be pretty useful.

/* Server total time and data transferred by date */
SELECT s-ip,date,count (s-ip),sum(time-taken),sum(sc-bytes),sum(cs-bytes)
FROM '[LOGFILEPATH]'
GROUP BY s-ip,date

A challenge that you quickly come across is that both the Log Parser and the Studio (which is dependent on the Parser) are 32 bit applications so you need to be careful as to which fields and how much summarisation is included in the result set. If the results grow to quickly then the query will crash as it runs out of memory. The trick is to find a balance between too much information (it crashes) and too little information (need to run many queries). Finding the right balance means further analysis can be done in Excel or Access. I have found that 30 000+ rows still works if few enough fields are chosen and some smart queries are used.

When executing the above query a problem is that the bytes transferred exceeds the value that can be stored in the data type, so you end up with negative numbers for some of the lines returned. Rewriting the query as follows assists in resolving this problem :

/* Server total time and data transferred by date */
SELECT s-ip,date,count (s-ip),sum(div(time-taken,60)),sum(div(sc-bytes,1024)),sum(div(cs-bytes,1024))
FROM '[LOGFILEPATH]'
GROUP BY s-ip,date

Log parser supports a huge number of different functions but you need to know the format to use them. Take a look here for a listing and examples : http://logparserplus.com/Functions

So whereas I would have expected sum(time-taken/60) to give me a result in minutes it fails with an unknown field. Even (sum((time-taken)/60) fails. Check the function reference shows that log parser wants it as sum(div(time-taken,60)) and then life is happy again. Running your query again having just spent 3 hours waiting for the last one to complete – a little less so.

Using these tools and queries I was then able to summarise down the 160 gig of source data into a few thousand rows that could be imported into Access and joined to CMDB data to produce really useful intelligence that can be analysed directly in Access, Excel or Gephi. Thanks Microsoft for these great free products.

I was also looking for further pre-built queries for Log Parser Studio but was unable to find any. If you know where such may be found, please do share. If there is interest and as I use the tool more I will be happy to share anything I have created.

 

 

 

 

 

 

 

 

Timeline of my tweets for #itwebsec IT Web Security Summit 2014

Posted on June 03, 2014

I once again had the privilege of attending the IT Web Security Summit in May 2014.  As always when attending these large events I try and cover the presentations I attend through tweets. This creates quite comprehensive coverage as I also monitor the hashtag for the event (#itwebsec in this case) and then re-tweet other bloggers, journalists and active people’s tweets. In the end I believe my timeline is quite a useful archive of the social media (Twitter) coverage of the event.

Now trying to archive this for particular event is somewhat problematic. The web interface for Twitter provides a nice view with the tweeters profile pics, stats (retweets etc) of each tweet and the like. It is however a real pain to put this into a format which I can post onto my blog. I tried editing the HTML of a saved page but without decent tools that HTML code is just unmanageable.

I came across tweetbook.in which provides a sort of journal creation facility and allows you to give a start and end date, then spews out a PDF. Sadly the formatting is quite poor and no pictures are included. It does however give the basic timeline and the tweets are provided timestamped in chronological order so it is much better than nothing.

Below is the tweetbook

JJZA Tweetbook

And the PDF’d twitter page, scroll down until you find the relevant tweets, sorry no selection options – and it is in reverse chronological order.

(oops – the file was 72 meg so exceeds the filesize limit for inserting. Pity indeed).

I found another option (twournal.com) which lets you create (and even sell if you like) books from your tweets. I generated a book from the period but it will mail the book to me in 24 hours. Depending on the size and outcome I will link that here too.

(twournal to come here)

If anybody knows of a better way of doing this then please do share. Sad to see may various events covered go to waste and be lost in the depths of cyberspace.

 

 

 

ISACA SA Annual Conference 2014 : 25/26 August 2014

Posted on June 03, 2014

Just some advanced notice that the ISACA South African Chapter Annual conference for 2014 has been announced.

The conference is taking place from 25 August 2014 To 26 August 2014 at Emperors Palace. Visit the conference page for details and online bookings or contact: Nadine Schreiber – admin@isaca.org.za

ISACA is also still looking for speakers so if you have something interesting to share please contact Nadine.

Conference web page

 

The Heartbleed bug : a short presentation given at the Kzn ISACA Chapter Meeting

Posted on June 03, 2014

I was honoured to be asked to make a (short) presentation at the May 2014 KZN ISACA Chapter meeting. The meeting went down well with probably around 25 people attending.

Attached is the PDF of the presentation.

I hope that some of the members present found it useful and that you, my readers, do too.

Feedback as always most welcome.

The Heartbleed Bug ISACA presentation v3

 

Visualising Security Data : SCCM patching traffic flows

Posted on March 03, 2014

I have been experimenting a little recently with visualisation of security data.

We have had some challenges with SCCM and needing to understand which clients were connecting to which servers, where and why. This data seemed very hard to come by and after some discussions with some helpful Microsoft South Africa folk the service provider pulled the IIS logs from most of our SCCM Primary Servers and the Distribution Points.

I then added in a Destination column (being the server from which the log was pulled) and combined the logs from all of the servers (6 Primary and 6 Distribution). In MS Access I then summarised the data by source and destination pairs, providing 13952 connections. This was exported as a CSV and headings added in using Notepad (Gephi wouldn’t read the data file without headings named to its liking).

The data was then loaded into Gephi as edge data. I then searched for each of the 12 servers in the node table, added in a Label, changed the colour and size (Red 30 for Primary Blue 20 for secondary), selected the Force Atlas option and let it plot my data. The 13 546 nodes and 113952 were then plotted providing the graph below (when exported as PDF).

The graph was somewhat unexpected in that I did not foresee so many of the workstations being served from Primary servers nor so many devices receiving data from multiple servers. A few of the DP’s (top and bottom of screen) clearly are not serving the numbers of workstations we would expect and need deeper investigation.

While Excel cross tabs and more detailed access queries provide more detailed insight into what is going on this visualisation very quickly demonstrates a very different picture to which the service provider running the SCCM infrastructure had been describing.

Have you done anything similar? Please do share.

 

Map of SCCM links using Gephi

Map of SCCM links using Gephi

 

Download the PDF version here :  map of sccm v2

 

UKZN MBA presentation 8th August 2013 : Information Security & Ethics

Posted on August 11, 2013

On Thursday the 8th August 2013 I was once again privileged to be the guest lecturer for the UKZN MBA programme. Despite Friday being a holiday and the start of the long weekend there was a great turnout. Thanks to all the students for all your questions and contributing to making it an entertaining session.

Below is the link to the slides. Please feel free to contact me if you have an questions or would like to discuss the subject further.

security and ethics UKZN MBA August 2013

Award winning presentation on director interlocks on the JSE (SAAA conference June 2013)

Posted on July 14, 2013

 

SAAA biennial conference logo

My MBA dissertation was entitled “An analysis of director interlocks on the JSE -with reference to the top 40 listed companies” and took me quite some years to complete. There were complexities of having to collect all my own data due to inaccuracies in the CIPC database, having to relearn that matrix mathematics that I thought I would never use again after first year university 20 years ago, then figure out how all these analytical tools work.

During the completion process a few people commented that the only people who would ever read the document would be my supervisor and the two examiners (and even then I would be operating on faith). After all the work I had put in this was quite disheartening. When Leo Deodutt (my supervisor) suggested that we create a paper from the dissertation and submit it for the Southern African Accounting Association Biennial Conference to be held in Cape Town in June I jumped at the chance. What an opportunity to get the message out. Leo did a lot of hard work to cut down the dissertation to a 20 page paper, and in the process we had to restrict the paper to just one of the research questions covered in the dissertation. When the comments came back from the blind peer reviewer there was a nomination for best paper award, which was most gratifying. What an honour just to be nominated.

The presentation itself was again a challenge: to try to fit into 20m what took years to research, and to try to simplify the complexities and distil the message to one that can easily be conveyed to a broad audience. In the end this was achieved and the final presentation is attached. Leo is looking for opportunities to further present the work, and it is likely that we will present again at UKZN in the coming months. Mail me if you have ideas of appropriate forums who may be interested.

The day after the presentation I was absolutely thrilled to discover that we did indeed win the best paper award. I am pretty sure I didn’t stop smiling for a week. Thanks to Leo for all his hard work in making this happen.

Enjoy the presentation and leave any questions in the comments or drop me a mail.

Justin

Download a copy of the presentation :  SAAA conference June 2013 – director interlocks on the JSE final

 

Thought for the day : What makes you good at what you do ?

Posted on May 18, 2013

This morning I received a message from one of our Graduates In Training (GIT’s) : “Hi Justin, quick question. What would you say is the one thing that makes you good at what you do. The key ingredient?”

Now that isn’t quite as easy to answer as it first seems. The challenge is keeping it down to one, when there are a number of things that one is or one does that makes you who you are, but which of those makes you GOOD at what you do.

My first answer was “Willingness to learn” sent fairly quickly. To me we have to be learning things all the time, formal learning, reading, on the job, always sucking up new knowledge and building on the skill set we have. But that still doesn’t really quite get to the heart of it.

So I sent a second message “That + questioning all the time, if you don’t understand something ask, don’t just accept what people say, make them explain why, that way you learn or find out they are not right”.

That was much closer to the heart of it. Have that questioning, enquiring mind. Want to know why things are the way they are and don’t just accept them for the way they are.
The other extension to that is creating a learning culture and environment wherever you are. Not accepting things have to be the way they are and encouraging people around you to learn and to share. Knowledge is power, if shared and if used to support one another. Standing on the shoulders of giants comes to mind**. Some people sadly still see knowledge as power for themselves, so hold onto knowledge and don’t want to share. Those aren’t my kind of people and I certainly don’t want to work with them or surround myself with them.

There are many other things that make one good at what we do :

  • Quality
  • Persistence
  • Perseverance
  • Technical competence
  • Hard Work
  • Lead from the front
  • Surround yourself with good people, with diverse skills
  • Recognise the contribution of others and publicly & privately acknowledge it (the latter half of that I’m not particularly good at – don’t do it often enough).

Perhaps each of us is different enough that we will all have a different “one thing” that makes us good at what we do, and the challenge for each of us is to find that one thing for us that allows us to be the best we can be. If we can see someone similar to ourselves who resonates with us and we can learn from them, great.

Be delighted for you to share your thoughts on the matter.

Simphiwe, thanks for asking the question, and for your enthusiasm and infectious laughter every day, brings sunshine to our lives.

Other Comments from respected IT personalities : 

Great blog post, for me it’s passion, heart, attitude. All synonymous for how one feels towards something, one can be the best in one’s field or subject matter, but without these qualities you just not going to get people to rally behind you.  Yusuf Loonat (Head : Service Delivery : Enterprise Information Management Services : Transnet)

The key ingredients for me  is pride, passionate, commitment and ethics. All the others are important but these are the threads that hold it together and provide meaning and relevance. Kevin Govender (Head : Strategy and Architecture : Enterprise Information Management Services : Transnet)

to @jjza well written. A passion to make a difference would be my answer. One will find all the ingredients required to satisfy the passion.. Raghuvansh Swami (Partner : Ernst & Young)  (@swamira)

 

From twitter conversation with Darren Smith (@DazMSmith) :

to @DazMSmith Would appreciate your thoughts on this - Question raised by a graduate intern of mine

to @jjza A fascinating question. With no easy answer. But “attitude” separates the mediocre from the exceptional. They envisage 1st, then do.

to @DazMSmith True. I’m intrigued to see most of the answers relate to personal traits rather than knowledge, skill or experience.

to @jjza Absolutely agree! All the skill in the world will get you nowhere if you do nothing with your potential. Or knowledge. Or opportunity.

 

**  Wikipedia tells me to thank Bernard of Chartres not Sir Isaac Newton – interesting

 

Southern African Accounting Association : INTERNATIONAL BIENNIAL CONFERENCE

Posted on May 18, 2013

The SOUTHERN AFRICAN ACCOUNTING ASSOCIATION (SAAA) in collaboration with the INTERNATIONAL ASSOCIATION OF ACCOUNTING EDUCATION AND RESEARCH are presenting an INTERNATIONAL BIENNIAL CONFERENCE THEMED: The challenge of responsible Accountancy Academic Citizenship: The quest to balance teaching, research and academic leadership from 26-28th June 2013 at the LORD CHARLES HOTEL, SOMERSET WEST, CAPE TOWN, SOUTH AFRICA. Website here

I am delighted that a paper prepared from my Masters thesis by my supervisors, Leo Deodutt and myself has been accepted for presentation at the above conference.

During the finalisation of my dissertation there were a number of people who were gleefully reminding me that the examiners and I would probably be the only people who ever read or cared about my research. This didn’t fill me with any joy, so I am truly delighted to have the opportunity to share some of my research. It provides further impetus to the original thinking of publishing the material is a book of some format.

Watch this space :)

New location for Nespresso in Durban (updated with pics)

Posted on March 28, 2013

I received an SMS from Nespresso the other day to say they are currently located at 254 Lilian Ngoyi Road (formerly Windermere road). Their new phone number is 031-303 3374.

Having struggled in the past to find them, and the fact the address and number is not listed on www.nespresso.co.za nor does it come up on a Google search, this may be useful to some of you looking for them.

Update : So as you drive up Windermere road, their shop is a converted house on the right hand side, you can see the palms outside. As you get closer you can see the sign on the road facing part of the building to the left of the palms. At this point you want to be slowing down already as they have off-street parking. and it is easy to miss. The parking is right up against the building, and the solid island does stop so you can turn right into the parking. The security guard will have to open the boom for you.

While you are here, if you are interested in some other Nespresso compatible pods (depending on your machine) take a look at this post.

 

 

 

Nespresso Shop nes2 nes3

 

 

%d bloggers like this: