Today it is Mythos. Tomorrow it will be something else.

The pattern stayvendorlockin #securitystrategy #appsec #operationalresiliencempanies need urgency to position themselves.

Everyone wants to attach themselves to the next big wave and present themselves as the answer.

Real organizational readiness is not about pushing AI into every layer because the current panic cycle says so. The practical test for any change is much simpler:

• Does it strengthen existing tools and workflows?

• Does it preserve model and vendor optionality?

• Does it reduce backlog and repetitive operational drag?

• Does it reduce attack surface by removing software, access, and exposure you do not need?

• Does it reinforce the boring fundamentals like inventory, patching, least privilege, segmentation, and recovery?

Without those checks, you are mostly just trading places. One dependency gets swapped for another. One vendor stack gets replaced by another. One kind of complexity becomes another. Very little materially improves.

Most of the time, we just kick the ball a few months further down the road and call it progress.

I wrote about many of these ideas in my pragmatic guide:
https://cyfinoid.com/a-pragmatic-guide-to-being-mythos-ready/

#securitystrategy #appsec #operationalresiliencempanies #cybersecurity #aisecurity #attacksurfacereduction #vendorlockin #operationalresilience

Product Warning: do *not* buy #ebikes with #bosch motors/controllers. they are locked-down by some #evil #proprietary shit and try to #vendorlockin you into their shitty products. the motors are good, but the apps, the navigation, are horrible, and #interoperability with devices and apps of other vendors is actively hindered.

learn from my mistake, don't repeat it.

pls discuss products/vendors that are open and interoperable in comments below.

Nothing like an honest review from the community to kick off the weekend. 🤗

#NextcloudTalk offers private communication without #vendorlockin, including threads, live translations, federated calls, and more!

Discover more! 👇
https://nextcloud.com/talk/

The NHS owns the data. Palantir owns the tooling. Parliament is debating the NHS contract today in Westminster Hall. Meanwhile the Isle of Man is running its own health "living lab" -- 16 companies from 25 countries, working directly with Manx Care, right now. The DPIA question hasn't been publicly answered. The window is short.
https://sovereignauditor.substack.com/p/the-tooling-owns-you

#NHS #Data #GDPR #VendorLockIn #DataSovereignty

THE TOOLING OWNS YOU

Palantir, the NHS, and what the Isle of Man hasn’t been asked yet

The Sovereign Auditor

"Het kabinet ziet geen aanleiding om aan te nemen dat de uitbesteding van ICT-diensten door de Nederlandse Spoorwegen (NS) aan een Amerikaanse leverancier de continuïteit van het treinverkeer in gevaar brengt."

https://ibestuur.nl/digitale-weerbaarheid/digitale-veiligheid/kabinet-ziet-geen-direct-risico-bij-ns-uitbesteding

#NS #NederlandseSpoorwegen #digitaleautonomie #digitalesoevereiniteit #vendorlockin

Kabinet ziet geen direct risico in Amerikaanse NS-uitbesteding

Het kabinet ziet geen aanleiding om aan te nemen dat de uitbesteding van ICT-diensten door de Nederlandse Spoorwegen (NS) aan een Amerikaanse leverancier de continuïteit van het treinverkeer in gevaar brengt. Dat blijkt uit antwoorden van staatssecretaris Eric van der Burg op Kamervragen van Barbara Kathmann en Habtamu de Hoop (GroenLinks-PvdA).

iBestuur

Understanding Vendor Lock-In: Impacts, Examples, and Avoidance Strategies

This article is intended to help readers better understanding vendor lock-in by identifying its impacts, examining examples, and highlighting avoidance strategies.

After reading, you should:

be familiar with the concept of vendor lock in
be aware of potential impacts vendor lock-in can ...
Continued 👉 https://blog.radwebhosting.com/understanding-vendor-lock-in-impacts-examples-and-avoidance-strategies/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #vendorlockin #digitalsovereignty #supplychain #datagovernance #businesscontinuance

Understanding Vendor Lock-In: Impacts, Examples, and Avoidance Strategies

This article is intended to help readers better understanding vendor lock-in by identifying its impacts, examining examples, and highlighting avoidance strategies.

After reading, you should:

be familiar with the concept of vendor lock in
be aware of potential impacts vendor lock-in can ...
Continued 👉 https://blog.radwebhosting.com/understanding-vendor-lock-in-impacts-examples-and-avoidance-strategies/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.raddemo.host #digitalsovereignty #datagovernance #vendorlockin #businesscontinuance #supplychain

Eigene Domain, Catch-All-Mail, Aliasse, Subaddressing ... Fertig.

heise+ | E-Mail-Dienste im Überblick: Von Freemailer bis Hosting | iX Magazin https://www.heise.de/hintergrund/E-Mail-Dienste-im-Ueberblick-Von-Freemailer-bis-Hosting-11223863.html #heiseplus #DigitalSovereignty #VendorLockin

E-Mail-Dienste im Überblick: Von Freemailer bis Hosting

Die E-Mail zählt zu den wichtigsten Kommunikationsmitteln, unverzichtbar für Unternehmen und praktisch eine Bürger-ID für Privatpersonen. Eine Marktübersicht.

iX Magazin

Understanding Vendor Lock-In: Impacts, Examples, and Avoidance Strategies

This article is intended to help readers better understanding vendor lock-in by identifying its impacts, examining examples, and highlighting avoidance strategies.

After reading, you should:

be familiar with the concept of vendor lock in
be aware of potential impacts vendor lock-in can ...
Continued 👉 https://blog.radwebhosting.com/understanding-vendor-lock-in-impacts-examples-and-avoidance-strategies/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #vendorlockin #datagovernance #digitalsovereignty #businesscontinuance #supplychain

@HeyRay Im Hinblick auf:

> "KI kann zu Wachstum und neuen Geschäftsmodellen und somit zu Arbeitsplätzen führen. Da sind wir die Architekten unseres eigenen Schicksals."

Softwareentwickelnde Menschen, die #CleanCode und #ArchitecturalPatterns lesen, schreiben und je nach Kontext richtig anwenden, können mehr als auf Befehl Code ausspucken – wie ein abgerichteter Hund.  Das hat @bkastl eingangs gut angedeutet.

Der ganze #AISlop führt in der #Softwareentwicklung oft nur zu mangelnder Wartbarkeit und nicht zuletzt auch wieder zum #VendorLockIn bei #BigTech 's #PromptingAsAService Angeboten mit zwangsläufiger #Enshittification à la @pluralistic 💩