-
Recent Posts
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 3)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 2)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 1)
- Incorporating Disruptive Technologies into Existing Products
- Investing in Disruptive Technologies
Articles
Major articles in chronological order:
Archives
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- November 2019
- October 2017
- August 2017
- July 2017
- November 2016
- July 2016
- June 2016
- August 2015
- July 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
Categories
Monthly Archives: October 2014
Security Specifications
The previous article introduced security audits, which are actually audits of security specifications. There are many potential sources for security specifications. Some of them are government standards. For example, in the United States, HIPAA, the Health Insurance Portability and Accountability … Continue reading
Computer Security Audits
In conversations with large companies and small companies, literature review and looking at best practices for security, one of the most common tools that essentially everyone uses is a security audit. In most cases the security audit is performed regularly … Continue reading
Posted in Security
Leave a comment
LISA14 – Simplified Remote Management of Linux Servers
I am giving a talk on Simplified Remote Management of Linux Servers at the upcoming LISA14 conference in Seattle, which runs from November 9-14. My talk is 9:45-10:30am on Friday, November 14. LISA is Large Installation System Administration SIG of … Continue reading
Posted in System Management
Leave a comment
Yellow Sticky of Doom in the Cloud
The password managers we discussed in the last post are a good start. If you only use one system a local password database is all you need. Most people have multiple “devices” – a PC, a laptop, a smartphone, a … Continue reading
Posted in Security
2 Comments