We are in budget star wars when budget talk becomes budget hyper talk

I  have not been the most loyal star wars viewer.   I saw the first movie, then maybe the second.  After that I confess that I lost interest.

But for me,    the most vivid memory of my star wars experience was the moment when the space ship’s captain clicked on the hyper speed switch and the craft instantly lurched ahead at a speed that was larger by a factor of 10 or100.   The millions of stars that populated the surrounding galaxy rushed past in a blur of streaking white shapes.

For today’s economic discussion, the notable issue is not the stars speeding past.  It is the instantaneous increase of speed by a factor of 100.   So it is with the economic discussions of our day.  We talk about dollar amounts that approach $500 billion, $600 billion, $900 billion.  And then, all of a sudden, we are back at 1.  Not 1 billion, but 1 trillion.

To maintain context and continuity of the economic narrative, we should not let our political or economic leaders refer to $1 trillion.  Rather we should insist that they call it like it is $1,000 billion.

After all, which sounds larger, 800 or 1?  If someone were to tell you we were incurring a budget deficit of 1 something, or 800 something, which would sound smaller?  If you were to say the 1, you would not be alone.  And that is the problem.

We should not permit our politicians to hypershift from billions to trillions.  It lulls the vast majority of the public into a sense of comfort and complacency.   If our deficit is larger than $900 billion and is approaching $1,000 billion, let’s call it like it is.  Do not let our political leaders downshift to trillions to make us feel more comfortable with what is fundamentally a very large budget indeed.

When I think back to my childhood, my father would frequently ask which is heavier. a pound of lead or a pound of feathers.

I ask you the budgetary equivalent.  Which is larger?  A budget of $3,800 billion or a budget of $3.8 trillion?

Economics 101 — How did we have a Federal Budget surplus in the year 2000

Who among us can remember the most controversial economic topic of the Presidential Campaign of the year 2000?

As unimaginable as it sounds today, the topic was  “what to do with the federal budget Surplus“.  That’s right, Surplus !!

Without arguing about what individuals or events were responsible for growth of the budget deficit during the intervening years, let’s simply take a look at what happened to the dollar expenditures during the 11 year period from 2000 to 2011.

Total Federal expenditures in $Billions

  Federal budget item

Year 2000

Year 2011

Largest budget items

a Social Security




b Health care




c Education



d Defense




e Welfare




f Protection



g Transportation



h General govt



i Other spending



j Interest




k Total Spending



l Surplus (Deficit)



As we can see, the total expenditures (as shown in row k) have more than doubled in these 11 years from $1,788 billion to $3,600 billion dollars.

If we look further, we can see that the top 5 expense items are

Social security,
Welfare  and

In fact, these five items accounted for 87% of the total budget in 2000.  By 2011, they accounted for 89% of the budget.  Arguably, these are commitments and entitlements with no flexibility whatsoever.

I am not trying to justify this growth in expenditures, nor am I trying to argue for a reduction in these expenditures.  I am simply attempting to establish a common understanding of where the money is going.

Now let’s look at these same Federal expenditures from a different angle.  What percentage of the total do we spend on defense, or social security, or healthcare?  And how has this percentage changed from 2000 to 2011?

Federal line item expenditures as a percent of the total budget

Year 2000

Year 2011

Change in Pct of total Change
in Pct of total
a Social Security




b Health care




c Education




d Defense




e Welfare




f Protection




g Transportation




h General govt




i Other spending




j Interest




As you can see, healthcare, defense, and welfare have risen dramatically as a percentage of total expenditures.  Social security and interest expense have fallen as a percentage of the total.  The other budget items have changed negligibly.

Perhaps the most interesting item is social security.  In total dollars, this item has risen 72%.  Even so, it has become a dramatically smaller part of the total budget in 2011 than it was in 2000.

And watch out for that interest expense item on row j.  If rates were to increase the windfall that the Federal Government has been receiving will disappear.

We now have a sound basis for understanding the trend in Federal spending.  This common understanding will be a foundation for future discussions.

Why do we call it news?

The speed of news

I often wonder, in colonial times, how news traveled from Virginia to Boston or New York to Philadelphia.  How many days did it take to learn that events of political importance took place?

Over time with the advent of the telegraph, the telephone, radio, and TV, the railroad, automobile, and airplane, news can  travel in hours and minutes, not days.

Today, with the advent of the internet, cell phone cameras, and social networking, news can and does travel in seconds.

When news and life can change in an instant

I am an avid newspaper reader.  In fact, on weekends and vacations, I read old newspapers that I didn’t get to when they were freshly published.  These old newspapers are not as relevant as they were when first published, but there are still insights to be gained and information to be gleaned.  But I can tell you that there are times when the news is so startling, so shocking, and so irrevocably new and different, that one immediately recognizes that the world will never be the same.  Under these circumstances, all future events and news will be viewed through a totally different lens and and the old newspapers are rendered  worthless.  These papers, less than a day old,  were describing a world that operated under old and outdated  rules.

The tragic events of 9/11/2001 are the most vivid and visceral recent reminder of one such event.  The financial maelstrom of 2008, though it took longer to develop, is another such event.  Both personal and institutional finance will never be the same.

If it happens over and over again, is it still news?

Fast forward to 2012 and let’s try an experiment.  Have a friend of loved one give you a newspaper article of any of the major topics of the day.  And remove any references to the date.

Greece is about to default on its financial obligations to the European banks. Is this story from Jan 2010 or Jan 2011 or January 2012?

Hold the presses.  Greece has reached an agreement with its Euro zone partners.  What date would you give this article?

Suicide bombs or IED’s have taken dozens of lives in Iraq, Afghanistan or Pakistan.  Is this news event from before, during, or after the US involvement in these countries?  Is it from 2003 or 2012?  This is a period of almost 10 years.  And events of this type occur so frequently, that we see them on the internet, we read about them in the newspaper the next day.  Often, we don’t know if we are looking at two different events or the same one.

And lives are being sacrificed or eliminated in Libya (old news?) and Syria (new news?) in the name of democracy.  Once again, date these events.

Meanwhile, here in the United States, our elected representatives, supposedly acting on our behalf, routinely engage one another in what can best be described as a total lack of cooperation or civility.  Evidence of this governmental intransigence appears over and over again in the newspapers, media, and the internet.  I defy you to date any news article related to the political events (non-events) or actions (inaction)  in Washington DC.

Like a speeding train, news rushes past

This is not to say that the news of the day is unimportant.  There are intensely important events occurring and recurring all over the world.  Iranian nuclear ambitions, revolutions and self-government in the Arab world, United States financial growth, Euro Zone financial solvency and  Chinese economic growth and dominance to name a few.

Lurking somewhere in the numbing and repetitive nature of today’s news is the next world changing and life changing event.  The looming tragedy is that, even with today’s blazing speed of information, we are only equipped to learn about it faster.  We are not equipped to anticipate the event.  Nor, it seems, are we equipped to  prevent it from happening.

If and when the next 9/11 occurs, we will all say to one another, “Do you know what just happened?”

By then, it is no longer news.

Password performance anxiety – a recurring nightmare in the internet age.

What was that password again?

You know the feeling.  You click on a website, one you have not used in a few weeks.  You break out in a cold sweat as the website asks you to enter your user name and password.

“Which user name did I use?”  “What was that password again?”

Each one of us has between 20 and 150 user names and passwords to remember.  How could that be, you ask?  Well we each have a bank, or two, or five.  We have Facebook, Twitter, Linkedin.  We have Amazon, Ebay, Barnes and Noble.  Our ftp password, Dropbox, the company logon at our job, Gmail and Yahoo sign-on. Brokerage firms, 401k or IRA plans,. our dentist, our doctor, Snapfish, the health insurance site, university alumni organization, student loans, several airline frequent flyer sites, Netflix, Cable TV, Our wireless carrier, utility, and countless retailers and department stores.  The list goes on and on.

To make matters worse, some sites require special characters for user names and/or passwords.  Some do not permit these characters.

Some sites require a password greater than 6 or 8 characters.  Others consider these to be maximum lengths you cannot exceed.

Some sites require both numbers and letters.  Other sites permit only one or the other. ATM codes are a great example of numbers only.

Some sites are case sensitive and require some letters of each case.  Others do not.

Some sites REQUIRE you to change your password every few months.  Others do not

Truthfully, as I recount the various requirements and differences, I too am breaking into a cold sweat.

How then, do we manage our user names and passwords?

An essential part of online life, but are there alternatives?

Before we begin to suggest answers, we can all agree that the effective use of passwords is an essential part of our online life.

Technological innovations

Well, there have been discussions about replacing passwords with voice recognition, or finger prints, or retina scans.  But these innovations are a ways off.  And they have their shortcomings as well.

On more than one occasion, my son or daughter or wife has asked me to sign on to one of their accounts to retrieve some information or enter a transaction on their behalf.  With these proposed types of passwords, our ability to help out those who are close and trusted would not be possible.

Password keeper software

If you were to key the above 3 words into a Google search, you would see countless pages of software that enable you to enter passwords into a local or internet database that is, itself, password protected.

But who among is us is looking to buy yet another software tool?

And we want to be sure that this tool is accessible from our office computer, home computer, tablet, and smartphone.  If the software is accessible from all these locations, we assume that the software is located in the cloud.  And if this is the case, how do we ensure that the password keeper itself will not be compromised.

Nowadays, many sites require us to know more than our password.  We need to remember answers to bizarre questions such as which hospital our maternal grandmother was born in or what the middle name of our best friend in kindergarten was.  This information needs to be stored someplace as well.

Lastly, we would want this password keeper software to be usable by other members of our family.  By this we mean that they should be able to store their own passwords.  We also mean that we want them to have access o our passwords if we want them with our permission “borrow” to access our account.

60 days are up, time to change your password… or else!!

There are two schools of thought regarding the need for frequent, required password change.  Of course, there is some truth to both schools.

The good thing about required password changes is that if a user is no longer active at all, the account is more likely to be unusable.  In addition, there are those who believe that frequent password changes will foil hackers and others with ill intent.

However, the reality is that when sites require frequent password changes, the user makes the minimal change to the password each time.  570test for example becomes 571test, 572test, 573test for each successive change.  What’s worse, the users tend to write the password down in a place that is easy to find.  I have even seen users write down the password on a post-it note and stick it to the computer monitor.  So much for improved security.

Like socks, one size fits all

Some users will try to use one password for ALL websites.  This would certainly make the password easier to remember.  But is this practical?  And is it secure?

From a standpoint of practicality, the syntax requirements of various websites make this idea not workable.  There are too many different requirements from one website to another.

As for security, there are those who believe that one password would give a clever hacker unlimited access to all of our financial and internet life.  There is considerable truth to this.

My favorite solution, the root password approach

We now find ourselves at the end of the Blog with a thorough understanding of the password issues.  This would be the perfect time to propose a relatively simple, straight forward solution to the password conundrum.  And we shall proceed to propose one here.

The key to our password solution is to identify 2 or 3 different “root” numbers, one of which you can imbed into any one of your passwords.  For example, three possible root passwords could be:

the month and day of your grandmothers birthday,  e.g. 0327

the address of your dorm building  in college,    e.g. 4815

the license plate number of your first car.  BSG431

You can incorporate any of these “root” numbers into anyof your passwords, and even write them down.  But when you write them down, you don’t use the literal “0327”.  You abbreviate it as “BD”.  For example, your password to Amazon.com might be pur0327ch.  When you write it down, you write it as purbdch.

In this way, you can write down each of your websites, account numbers, user names, and passwords. You can even  write the 2 or 3 or 6 questions and answers that web sites require for additional authentication.  My suggestion here is to write down that answers only, not the questions.

But where do you write them down?

The most secure place is to handwrite them on paper and store them manually.  The difficulty here is that you want the most current password every place you use your computer.  At work, at home, your phone.  Another problem is that over time, the hand-maintained copies will not all share all of your password information.  Another problem is handwriting – and mine is not good. I do not advocate this approach.

The next alternative is to type them into a Word document and store them on the local drive of your computer.  The difficulty here is that you want them accessible at home and at work and on your phone.  And when a password changes, it must be changed on every copy.  If you have different copies of this file, my suggestion is to designate one of the copies as the master file.  And only make changes to this master copy.  You can then copy the master to the other files.

Incidentally, you should always password this document that stores the other password information.   This provides another level of security.

Some final words of advice

Do not store this file that contains passwords on a notebook computer, flash drive, tablet or other portable device.  If you must store it on this device, make sure that the file is itself password protected.  And remember this password.

Passwords can contain upper/lower case, numbers, letters, and special characters ($, %, #, etc. )   Always choose at least 2 of them.  I have a personal preference, but I will not share it here because this would give readers of this Blog the inside track on my personal approach to security.

Final bit of advice, be diligent in the maintenance of your list of passwords.  This is the key to overcoming password performance anxiety.

How you can benefit from cloud computing

You hear it from all directions – Cloud Computing is the Future.  But what is Cloud Computing, and how will it affect your business?

Narrowly defined, Cloud Computing is the use of servers accessed over the Internet.  Rather than housing a dedicated computing facility at your location and at considerable fixed cost, someone else will do it for you.  Cloud computing is typically paid for on a monthly subscription or pay-per use basis.  Because you are sharing the costs with dozens, or hundreds, or thousands of other cloud customers, your proportional cost of the total cloud solution is a fraction of what comparable services would cost in your dedicated environment.

Once you sign the contract with the cloud hosting provider, you will instantly have access to the following benefits:

  1. Increase your computer capacity incrementally as needed.  In essence you replace your fixed cost with a variable cost.
  2. Replace fixed cost software licenses with monthly license fee amounts that are a fraction of the total license cost.
  3. Rely on the cloud host to provide firewalls and security at a lower cost with capabilities that far exceed that which you could do on your own.
  4. The cloud hosting facility will provide reliable backup services.
  5. The speed of the communications line provided by the host typically exceeds that which you can provide on your own.
  6. The specialized staff and cost of this staff that is required to run your data center is largely eliminated.

An appropriate analogy is that when you build a house, you do not include an electric generation plant in the basement or garage (granted that during severe thunder storms it is nice to have a portable generator handy).  You let your local utility provide the power. Similarly, companies will gradually begin to migrate their business applications to the cloud.  Over time, as more and more applications become cloud-based, the proprietary data centers will diminish in size.

You might be surprised to learn that Amazon.com and IBM are two of the largest cloud-based providers in the world.  So this is not some fringe segment of the IT industry.

In addition, some forward-looking software providers have eliminated the buy and install software task altogether.  We are seeing companies like Salesforce.com and Netsuite.com offer their software exclusively on a cloud basis.

How can your company harness this cloudburst?  Which of your applications are candidates for the cloud?  Where are these cloud resources and which ones are the most reliable?  How will these applications talk to the rest of your business systems?

Like all things IT, there is a gap between concept and reality.  At Business Logic, we can help you manage your cloud.  In so doing, we can help you to maximize the benefit and value of cloud computing to you and your organization.

So if you are wondering how SaaS differs from PaaS, if MSP is better for you than UC, give us a call.  We can make sense of it all, and help you translate acronym confusion to bottom line results.