Monthly Archives: May 2014

OpenLMI: HWInfo Working as Intended on Virtual Machine

I was recently told that someone had installed OpenLMI and it wasn’t working. They ran the hwinfo command to test the installation and it wasn’t reporting the correct information – most of the information was reported as “not specified” or … Continue reading

Posted in System Management | Leave a comment

Operational Integrity

The previous article looked at application and system integrity – let’s now look at the next level of integrity. Introducing Operational Integrity Let’s take the next step in integrity and look at the integrity of running systems over the life … Continue reading

Posted in Security | Leave a comment

Application and System Integrity

The previous article looked at user needs, which include the integrity of the applications and systems they are using. We have defined integrity as one of the three pillars of IT. Now let’s define what we mean by application and … Continue reading

Posted in Security | Leave a comment

User Needs

In the last post we postulated that business value is created by users running applications which provide value added transformations of data. Users need three things from applications: Availability Performance Integrity Of course, applications depend on the entire IT infrastructure. … Continue reading

Posted in Security | 2 Comments

Creating Business Value

The previous article started a discussion of security. Let’s take a look at the bigger picture, starting with a somewhat philosophical perspective: Why do companies have computers? Why do they have IT? As a starting point, companies are looking for … Continue reading

Posted in Security | 4 Comments

Security

Security means keeping the Bad Guys out, right? Locking down the system so that it is difficult to use and turning on SELinux. And forcing users to comply with security policies they don’t understand and which interfere with their ability … Continue reading

Posted in Security | 4 Comments