Archive | December, 2011

Deploy to the OpenShift cloud from an iPad

With Hazel, DropBox, OpenShift and my iPad and I managed to create a little “Cloud IDE” to enable editing and deployment to OpenShift from my iPad.

(Full Story: Deploy to the OpenShift cloud from an iPad)

Top Ten Reasons Why Large Companies Fail To Keep Their Best Talent – Forbes

1. Big Company Bureaucracy.
2. Failing to Find a Project for the Talent that Ignites Their Passion.
3. Poor Annual Performance Reviews.
4. No Discussion around Career Development.

(Full Story: Top Ten Reasons Why Large Companies Fail To Keep Their Best Talent – Forbes)

OwnCloud: An open-source cloud to call your own | ZDNet

OwnCloud is an open-source cloud program. You use it to set up your own cloud server for file-sharing, music-streaming, and calendar, contact, and bookmark sharing project. As a server program it’s not that easy to set up. OpenSUSE, with its Mirall installation program and desktop client makes it easier to set up your own personal ownCloud, but it’s still not a simple operation. That’s going to change.

(Full Story: OwnCloud: An open-source cloud to call your own | ZDNet)

You Have Downloaded – Shows what you torrented

a privately ran site that tracks torrent download sites and every IP number that plugs in. If you think someone on your network has been downloading illegal torrents and want to know, check this out.

(Full Story: You Have Downloaded – Shows what you torrented)

Freakonomics » How Is a Bad Radio Station Like Our Public-School System?

So you’re saying that if plumbers or if IT designers or engineers, or writers, or presidents, performed at the level, at the objective level that New York City teachers did, we’d either get rid of all of them, or radically change the job?…

All the learning modalities –
Large live instruction, small live instruction, virtual live instruction (which we call virtual tutoring, colloquially) independent practice, small group collaboration and independent virtual instruction.

(Full Story: Freakonomics » How Is a Bad Radio Station Like Our Public-School System?)

The history of version control

1. Source code is text in a file! (1960s)
2. Humans can manually keep track of versions of code! (1960s)
3. You can keep lots of versions in one file! (1972, 1982)
4. You can each have your own copy checked out! (1982)
5. Wow! You can version multiple files at once! (1986)
6. Two people can edit the same file at the same time, and it merges what they both did! (1986)
7. The shared repository can be on a remote machine! (1994)
8. Free open source version control hosting! (1999)
9. You can distribute it all so there’s no central repository! (2005)
10. When you checkout that’s a fork too, and you can do that in public! (2008)

(Full Story: The history of version control)

Early Thoughts on MITx

MIT today announced MITx which appears to be an open learning initiative. They describe it as “an online interactive learning platform” that will offer a portfolio of MIT courses.

(Full Story: Early Thoughts on MITx)

Focus on building 10x teams

10x matters because of the Economics of Superstars
In software, the superstar is the team, not the individual
A bunch of 10x people != A 10x team
How to Think About Building a 10x Team

(Full Story: Focus on building 10x teams)

How hackers gave Subway a $30 million lesson in point-of-sale security

While the scale of this particular ring may be significant, the methods used by the attackers were hardly sophisticated. According to the indictment, the systems attacked were discovered through a targeted port scan of blocks of IP addresses to detect systems with a specific type of remote desktop access software running on them. The software provided a ready-made back door for the hackers to gain entry to the POS systems—which is why remote access software is banned from systems that handle payment cards by the PCI Security Standards Council, which governs credit card and debit card payment systems security.

“With PCI compliance, those apps shouldn’t be on those systems,” said Konrad Fellmann, audit and compliance manager for SecureState, an IT security firm with a practice in retail security auditing, in an interview with Ars. But because small retailers who don’t store credit card data, they’re not required to have the same level of auditing as larger companies, Fellmann said.

(Full Story: How hackers gave Subway a $30 million lesson in point-of-sale security)