business · Integration · Internet · Making things work · Networking · Technology

Wifi blocking wallpapers from a different point of view, for enterprise users

Today I got real excited seeing this WiFi blocking wall paper block in Gizmodo. I see these wall papers giving us capability of having scalable network in an enterprise environment. Most of the blogs I have come across is mainly about keeping home WiFi network single out of neighbor reach (security). This is a good… Continue reading Wifi blocking wallpapers from a different point of view, for enterprise users

business · document management · Integration · Making things work

Document-management-workflow

Via Flickr: A simple workflow for a document management system Read the full blog What is ECM? Document workflow work in an ECM?

business · Linux · Open Source · Work

How to extend your LVM disk

How to extend a LVM This document is a continuation of LVM made easy, my previous blog This document is on LVM2 and assuming your Linux distribution supports LVM2 This document also assumes you have LVM setup out of /dev/sdb Volume group name is “mail-storage-group” Logical volume name is “mail-storage-lv” And we shall attempt to… Continue reading How to extend your LVM disk

business · document management · Internet · Making things work · Open Source · Technology

Knowledge base Systems, a review on phpMyFAQ

An organization needs to maintain a repository of information. This includes common knowledge or business specific information such as white papers, user manuals, policy document, knowledge tags, or answers to frequently asked questions. A general purpose document management system can fill the void, however a single purpose knowledge base system will be a far better fit. A… Continue reading Knowledge base Systems, a review on phpMyFAQ

business · security · Technology · world

Economics of the Zero day exploit

What is a Zero day exploit? A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit application vulnerabilities that are unknown to others or the software developer A life cycle of the Zero-day exploit The developer creates software containing an unknown vulnerability The attacker finds the vulnerability before the developer does The attacker writes and distributes an exploit while the vulnerability is… Continue reading Economics of the Zero day exploit

business · Linux · Open Source · Work

Free Clone build of Red Hat enterprise Linux

Once upon a time (not so long ago) Red Hat Binary distribution used to free. Then they changed their business model, decided to charge for the binary and started of the fedora project where free Red Hat binary took off. Soon after Red Hat, removed freely available Linux distribution from circulation and asked us to… Continue reading Free Clone build of Red Hat enterprise Linux

business · Internet · Personal · security · Technology · world

Who is tracking you online? The BIG Brothers? So many of them?

First I read about this firefox addon called Collusion at Gzimodo. This addon enables us to watch, how we are getting tracked using our own browser. Internet privacy is a widely talked about issue, however we have a little tangible understanding on how it works or how it effects us individually or as a society.… Continue reading Who is tracking you online? The BIG Brothers? So many of them?