-
Recent Posts
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 3)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 2)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 1)
- Incorporating Disruptive Technologies into Existing Products
- Investing in Disruptive Technologies
Articles
Major articles in chronological order:
Archives
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- November 2019
- October 2017
- August 2017
- July 2017
- November 2016
- July 2016
- June 2016
- August 2015
- July 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
Categories
Monthly Archives: May 2014
OpenLMI: HWInfo Working as Intended on Virtual Machine
I was recently told that someone had installed OpenLMI and it wasn’t working. They ran the hwinfo command to test the installation and it wasn’t reporting the correct information – most of the information was reported as “not specified” or … Continue reading
Posted in System Management
Leave a comment
Operational Integrity
The previous article looked at application and system integrity – let’s now look at the next level of integrity. Introducing Operational Integrity Let’s take the next step in integrity and look at the integrity of running systems over the life … Continue reading
Posted in Security
Leave a comment
Application and System Integrity
The previous article looked at user needs, which include the integrity of the applications and systems they are using. We have defined integrity as one of the three pillars of IT. Now let’s define what we mean by application and … Continue reading
Posted in Security
Leave a comment
User Needs
In the last post we postulated that business value is created by users running applications which provide value added transformations of data. Users need three things from applications: Availability Performance Integrity Of course, applications depend on the entire IT infrastructure. … Continue reading
Posted in Security
2 Comments
Creating Business Value
The previous article started a discussion of security. Let’s take a look at the bigger picture, starting with a somewhat philosophical perspective: Why do companies have computers? Why do they have IT? As a starting point, companies are looking for … Continue reading
Posted in Security
4 Comments
Security
Security means keeping the Bad Guys out, right? Locking down the system so that it is difficult to use and turning on SELinux. And forcing users to comply with security policies they don’t understand and which interfere with their ability … Continue reading
Posted in Security
4 Comments