There are quite a few platitudes that we support, in terms of business IT. Some that we haven’t really touched on, however, are Schofield's Laws of Computing. Let’s fix that today by reviewing where they came from, and what these laws entail.
Jack Schofield, born in Yorkshire on March 31, 1947, spent decades writing for The Guardian until his passing in 2020. His work appeared in numerous tech-centric media outlets throughout his tenure, but his best-known contribution is the collection of best practices that he published while working for The Guardian, which he referred to as his Laws of Computing. While the first of these laws is about two decades old at this point, they still offer critically valuable advice for businesses.
These laws are as follows:
Let’s take a closer look at each of these tenets.
Let’s say that Jane Q. Businessperson works with Initech for her business’ cloud services, which help support her organization’s extensive data storage and software needs. However, one day, Initech is bought out by ACME, resulting in changes to the terms of service and the pricing structure. According to Schofield’s First Law, Jane Q. Businessperson should have no issue migrating her data out of Initech if she does not accept ACME’s new terms.
This principle of ensured data portability covers any reason a company would want to remove their data from a given software or service, from end-of-service events to those we highlighted above.
While “redundant” isn’t usually seen as a positive attribute, Schofield posits that your data absolutely needs to be—and for more reasons than we would normally emphasize, too. Naturally, data that is redundant means that you have at least one other copy to fall back on if something were to happen to the original data…and that “something” could be caused by an alarming variety of circumstances.
There’s the usual suspects, of course—lost or malfunctioning devices/infrastructure, user error, and criminal activity—but Schofield also referenced other possibilities, such as issues on the provider’s side. What if the cloud provider hosting your data goes out of business?
All of this is to say that the more copies of your data you have in different places, the better.
We’re not going to pretend that today’s necessary cybersecurity measures are any fun. They aren’t. However, with alternative means of storing data now available, and more data than ever presenting value for cybercriminals, it is important to keep in mind that the easier you find it to access your data, the more likely it is that someone without authorization will be able to as well.
Are the countless multi-factor authentication prompts annoying? Absolutely—but “annoying” doesn’t begin to describe how a successful cyberattack against your business would feel.
Through the managed services that we here at Preferred offer, we can ensure that your business’ technology follows all of these laws, along with many different compliance requirements and otherwise sound business security and productivity practices. Give us a call at 708-781-7110 to learn more, and to set up a complete technology evaluation.
Preferred is once again, honored for being a Best Place to Work for the fifth straight year! Our team is what makes Preferred a Best Place to Work.
Daily Herald Suburban Business 2024 Best Places to Work Honorees The Daily Herald Suburban Business has announced the names of 51 companies, in 5 categories of competition, that are honored as the 2024 Best Places to Work in Illinois. This statewide survey and awards program was designed to identify, recognize and honor the best places of employment in Illinois, benefiting the state's economy, its workforce and businesses.
Comments