|ECM is about software. But is also about knowing the workflow of your people, where the information is being stored and how people are using the information.
Doug Cornelius, Enterprise Content Management
I am trying to shift the firm from “ask for permission” to “ask for forgiveness.” At the same time, moving it from a “need to know culture” to a “need to share culture.” I do not think that enterprise content management fits into my approach of collecting my firm’s knowledge.
Doug hit the nail on the head. Part of the problem with Enterprise Content Mangement software is that it’s so permission-driven that the software itself builds up walls and isolates groups from each other. I’m not sure how to get around that though — except to say that good ECM is not just about the software.
|The problem arises when you have duplicate IV values. If an attacker knows the content of one of the packets he has the IV for, he can use the collision to extract the contents of the other packet. In other words, an attacker can decrypt data without ever knowing the password. Assuming an attacker can collect enough known IV-data matches, they can comprise the entire network.
Seth Fogie, WPA Part 2: Weak IV’s
|Communications-Enabled Business Processes, or CEBP, is one of the hot buzzwords in enterprise communications. Many people see CEBP as the Holy Grail of communications technology, something that may be attained years from now. But, in fact, you have CEBP in your enterprise now. It’s called PBX features.|
|The technician “said it looked like he tried to delete this, but she knew a way to go around and get some of the deleted stuff,” Palin said in an interview. “I didn’t know what I was looking for, but I was there.”|
Lots of buzz about how Sarah Palin once hacked into Republican boss Randy Ruedrich’s computer back in 2004 at the request of Alaska’s Attorney General. (She was looking for evidence that he’d broken a state ethics law while he was a member of the Alaska Oil & Gas Conservation Commission.)
As a mom with two daughters, I’m proud that we finally have a woman VP candidate again — but I’m even more proud that the technician was a woman. ;- )
|In the coming era of cloud computing, the Web will be much more than just a means of delivering content — it will be a platform in its own right.|
I highly recommend Steven Levy’s article on Chrome. He provides a good overview of the project’s cultural and technical background. It was only a matter of time until someone had to re-invent the browser from the ground up. (After all, how many plug-ins can one piece of software have?) It was nice to learn that there was some concern over at Google about Chrome’s affect on Firefox — and that Chrome will remain open source.
And if you wondered where the name came from, here you go:
A less weighty issue was what to dub the product. After considering some ridiculous codenames (Upson says they were so awful that he took the un-Googly step of a top-down veto), the project borrowed its moniker from the term used to describe the frame, toolbars, and menus bordering a browser window: chrome.
|Dedupe does not change data any more than compression changes data, or traditional file systems change data. Plain old LZ compression gives you a different output bitstream than what went in, with redundant parts removed, just like deduplication. But when you decompress the file, you get your exact original bitstream back. No information is lost.
Conventional file systems break up files into blocks and scatter those blocks across one or more disks, requiring complicated algorithms to retrieve and reassemble the data. Dedupe is no different. Nonrepudiation requirements are satisfied by the reliability and immutability of the system as a whole, deduplicating or not.
Jered Floyd, Deduplication is Not a Crime
|Chrome is effectively a Cloud Operating Environment in the same way that early releases of Windows were GUIs for DOS. All we need to do now is load it on to a free operating system like Linux and wire it up to cloud storage (a la Mozilla Weave for preferences and user files) and we have a full blown Cloud Operating System!
Sam Johnston, Google Chrome
|Last month, I tagged Ken Stewart.|
1. Ken, when did you first discover your love for technology?
I think I have always loved to play with gadgets. I was always tearing things apart to see how things worked, but I always had spare pieces when I put them back together, and often broke more than I fixed. Gee, not much has changed
It wasn’t until I joined the US Marine Corps that I really understood where my calling was, though. It was there I really discovered that there needed to be a bridge between people and technology.
2. How do you earn a living?
I am presently the Director of Technology at Kearns Business Solutions, finding ways to connect people with technology to hopefully make their work life much more satisfying. In other words, I focus on enabling technologies.
3. What do you love most about your job?
The beating drums of change. Although the pace can be a little harrowing, I relish the fast-pace and challenges I am tasked with overcoming, as well as the puzzles about how to build a better mousetrap I think up myself
4. What keeps you up at night?
Not too much really. I could sleep 18 hours straight if you let me. I suppose what worries me the most is staying focused on being a servant to my team and my family and not allow life to get in the way of living.
5. What do you do when you’re not working?
Hmm I don’t think I ever quit working. Outside of focusing a lot of energy on my new blog, ChangeForge.com, I enjoy weekends with my family and spending time in Aikido. Those 2 things give me a chance to be more balanced in my life and offer me a much needed recharge for my batteries.
6. You’ve looked in your crystal ball and have seen the future of enterprise IT. What does it look like?
Enterprise IT must learn to be the servant and not the gatekeeper. With demand increase on everyone’s time, IT will align itself to deliver business-enabling technologies. Security will continually become an increasing concern and will most likely be the counter-balance to the enabling technologies. This dynamic will create a very tight road for IT to walk, but businesses will find a way to carry on as they always have either in finding, creating, or doing without this component of the business.
Bonus Question: What’s your favorite quote?
Here’s one by Max Lucado from A Gentle Thunder that really stuck in my craw:
Much of life is spent rowing. Getting out of bed. fixing lunches. Turning in assignments. Changing diapers. Paying bills. Routine. Regular. More struggle than strut. More wrestling than resting
You thought marriage was going to be a lifelong date? You thought having kids was going to be like baby-sitting? You thought the company who hired you wanted to hear all the ideas you had in college?
Then you learned otherwise. The honeymoon ended. The IRS called, and the boss wanted you to spend the week in Muleshoe, Texas. Much of life is spent rowing.
|Greenhouse-gas emissions will be one of the critical business risks of the 21st century.
Dan Anderson, as quoted in Cleaning Up Carbon
Dan Anderson coined the buzzword “sustainability risk management.”
|Since the efficacy of the P4P protocol largely relies on the availability of network topology information, Verizon and the P4P workgroup aim to make the new protocol an industrywide standard and convince other carriers to share their own data and participate.|