March 27, 2014

OpenLDAP configuration tips for working smarter, evading common stress
OpenLDAP configuration is difficult for some, but your implementation may not be the source of the problem. Those who lament OpenLDAP configuration are actually having issues with Lightweight Directory Access Protocol (LDAP), said Howard Chu, chief architect of OpenLDAP. "It's a very broadly applicable protocol and that tends to leave people lost, wondering where to begin," Chu said. He advised IT pros installing LDAP to read, research and experiment. We asked OpenLDAP users to answer some frequently asked questions on configuring and deploying the protocol.


Dissatisfaction with IT grows
IT managers are being told that "you've got to grow the business, not just run the business," said Mark Peacock, an IT transformation practice leader and principal at Hackett. McKinsey & Co., in its online survey of more than 800 executives -- with 345 having a technology focus -- also found that executives want less of their budgets to go to infrastructure so more resources can be shifted to analytics and innovation. The McKinsey survey found that business executives are less likely to say now that IT performs effectively, compared to their views two years ago.


Hackonomics: Stolen Twitter accounts ‘more valuable’ than credit cards
Stolen Twitter accounts now fetch more than credit cards on the cybercrime black market, according to a new report released by the RAND Corporation. The report is the first in a series commissioned by Juniper Networks. "Markets for Cybercrime Tools and Stolen Data: Hacker's Bazaar" explains that a Twitter account now costs more to purchase than a stolen credit card, because Twitter account credentials potentially have a greater yield.


5 musts to get people on board with social business
It’s a fact that people are still struggling to get social business to take root across the organization. Heck, sometimes it’s still a struggle to get it to work within its own department, wherever it starts. Or to get people to even notice and pay attention to these ideas in the first place. The only way to scale social business is to get it out of its nesting place – marketing, customer service, IT – and get it all the way to the edges of the organization. That means having people buy into the vision for social business, invest the time and resources in the practices and tools, and enthusiastically do what they can to support those efforts.


Convincing the C-suite to fund IT security
"The C-suite doesn't understand the full vulnerabilities that their organizations face," Moss says. "This has always been the challenge. But now that they're finally seeing quantitative losses, they want to get ahead of the problem. They're tired of always acting post-breach." One of the biggest challenges Moss faces with his clients is helping them distinguish between vulnerability and risk. Vulnerability is the likelihood that an organization may suffer a security incident. Risk is the amount of damage that such an incident will inflict on the organization.


Code Kingdoms teaches children to program through gaming
Targett told Computer Weekly that Entrepreneur First founders Matt Clifford and Alice Bentinck had encouraged them to apply. “We had the idea, and they convinced us it was a great idea,” he said. “They helped us to think about raising funds and to think about the customer. We put coding out to kids' imagination and let them build the games.” Code Kingdoms is now available online on desktop and mobile. In six months' time, the company plans to be generating revenue and to have a team of five on board.


Microsoft warns Word users of ongoing attacks exploiting unpatched bug
According to the security bulletin Microsoft issued today, three members of Google's security team reported the Word vulnerability to Microsoft. The bug is in Word's parsing of RTF files, which are often used to exchange documents when all users are not using Microsoft Word. Although the attacks seen so far by Microsoft have been aimed at Word 2010, the bulletin noted that the affected software also includes Word 2003, Word 2007, Word 2013 and Word 2013 RT, the version especially crafted for Microsoft's Windows RT tablet operating system. Office for Mac 2011's version of Word is also vulnerable.


Cloudification denotes opportunity, not despair, for mainframes
So is cloudification of applications a credible threat to the mainframe in coming years? Many people have likened cloud computing to mainframe time-sharing, and there are some viable parallels. The answer is not straightforward, and will depend on user- and application-specific scenarios. But a significant amount of mainframe-based workloads will likely migrate to private and public cloud deployments. On a pure infrastructure and software cost per workload basis, Linux-based open systems prevail over mainframes.


Reliability Series #1: Reliability vs. resilience
The Institute of Electrical and Electronics Engineers (IEEE) Reliability Society states reliability [engineering] is “a design engineering discipline which applies scientific knowledge to assure that a system will perform its intended function for the required duration within a given environment, including the ability to test and support the system through its total lifecycle.” For software, it defines reliability as “the probability of failure-free software operation for a specified period of time in a specified environment.”


Facebook Debuts Web-Scale Variant Of MySQL
In a move that could shake up both the commercial and open source database management system markets, Facebook announced on Thursday that it has worked with fellow Internet giants Google, LinkedIn, and Twitter to develop WebScaleSQL, an open source, web-scale branch on top of Oracle's publically available MySQL Community Edition. "Our goal in launching WebScaleSQL is to enable the scale-oriented members of the MySQL community to work more closely together in order to prioritize the aspects that are most important to us," wrote Facebook software engineer Steaphan Greene in a draft blog post shared with InformationWeek.



Quote for the day:

"Learn to see things as they really are, not as we imagine they are." -- Vernon Howard