I've talked about the problems with the approach Microsoft is using on Get the Facts before. Some of the points Microsoft makes are perfectly valid - but only from a very specific (and often unrealistic) position. Therein lies the major problem with the approach and the TCO studies which it uses to support the point of view.
I remember when I first came across Slashdot.org. It was years ago - it must have been, I was still an employee as opposed to my current freelance status - but one of the main focuses of the Slashdot website was free software. At the time Linux was relatively new in the conciousness of the IT professional, even those of us who had been using free software for years at the time.
They key to slashdot was that it aggregated news items from a huge variety of sources and topics into a single feed that would appeal to the Geeks among us. It covers a lot of material - everything from space exploration and science through to BSD, Linux and Perl.
I love my USB drive - it's only 1GB, and I don't use it to transfer files around between machines (I have a network for that), but what I do use it for is a backup of my important files that I can pick up and take away with me (it's on my key ring, so it's hard to forget).
I also keep a copy of my resume on there, just in case while out on a job I need to hand it out (and I've done that a number of times).
However, I can also appreciate that in a typical company, especially when most companies have removed or disabled their floppy drives, allowing individuals to use USB drives is not a good idea. From the simple angle preventing the introduction of viruses and trojans, through to the more complex problem of preventing individuals stealing software and company information.
Keeping logs is not as difficult as it seems, but some companies have an interesting approach. I keep logs of everything - I've mentioned before some of the steps I take to keep a record of the IT stuff I do, like using WordPress to store information, particularly changes.
Logs I process on a weekly basis, and I extract the information from them that I feel is valuable (for example, I have records going back years of the emails going to and from the internal network. These are retain indefinitely (they are in a DB so I can search and report on them.
One of the elements of IT that I have never been able to understand the is the use of delaying tactics during a support call. Sometimes the tactics are due to bad training, bad staff or simply inexperienced staff, but sometimes I'm sure it's deliberate.
I'll give you two examples - the first is an 'external' delay with a supplier. A piece of hardware failed, and it's under warranty. I filled in the online form (which you do after registration, where they take all you details). What happened over the next few days could have easily been turned into a IT sitcom. First, by email, I was asked to confirm the serial number of the unit. The fact that I'd filled in this information in both the registration and original support request had been ignored.
There have been many stories recently about how open source is beginning to 'legitimize' itself, how commercial companies are beginning to take open source and Linux in particular seriously, and how open source is itself starting to be a viable business model.
Actually this has been 'coming' for some time - you can look back as far as 2002 when the mainstream media started picking up what the effects of the Linux and open source model would be. For example, read Linux battle becomes political or Linux goes from strength to strength and you'll begin to see where we were header all those years ago. More recently the BBC has again examined the open source world with Open source turns money-spinner.
I've been reading the posts about hotel swipecards with interest. I've always been fascinated about the level of information that goes into those keys, and more importantly how secure they are.
For example, if someone had a reader and writer, would they be able to rewrite the code that would let them into my room?
But what fascinates me more is what else is on the key, and what other information the hotel hold about me. I often use Marriot hotels and as a member of their rewards program they hold details about my room preferences (non-smoking, bed size, etc.) so that when I book, or simply turn up, I can get the room I want without having to tell them.
Nexenta is the third operating system to be released based on the OpenSolaris code.
This edition is based on OpenSolaris, with all the extra bolt-on packages that many Linux users may be familiar with, like MySQL, Perl, PHP Abiword and the Gnome GUI.
Nexenta also includes the Debian package system, with some 2,300 packages available to install additional software and functionality.
Now Debian will ring bells - it's a well known Linux distribution base - but actually it's the Debian packaging system that is used within Nexenta to provide software installation and update functionality. Nexenta actually uses the packages included in the Ubuntu package repository as its base.
Nexenta is the third operating system to be released based on the OpenSolaris code.
This edition is based on OpenSolaris, with all the extra bolt-on packages that many Linux users may be familiar with, like MySQL, Perl, PHP Abiword and the Gnome GUI.
Nexenta also includes the Debian package system, with some 2,300 packages available to install additional software and functionality.
Now Debian will ring bells - it's a well known Linux distribution base - but actually it's the Debian packaging system that is used within Nexenta to provide software installation and update functionality. Nexenta actually uses the packages included in the Ubuntu package repository as its base.