Tom Adelstein's blog

Point of Attack

Recently, as in last week, I learned a new Texas idiom. A senior executive at a client explained what he meant when he said that I was beating his dog. I didn't have a reference for the comment until he said that if he invited me over for a barbecue and I beat his dog that was inappropriate. "How would you like it if you invited me to your house for dinner and I beat your dog?" he asked. more>>

Time to Write About Something Besides Redmond

I plead guilty to past transgressions. So, call me a hypocrite if you will. I don't care anymore. I refuse to get stuck in the past because the present and the near future is fun.

Indulge if you will in recurrent and persistent thoughts, impulses, or images experienced as intrusive and distressing. The obsession with Microsoft in Open Software communities is excessive and unreasonable and a product of the mind. My only hope is that such thoughts, impulses, and, or images can be expunged by logic or reasoning, which is contrary to the notions in the psychiatric community. more>>

A Look at Sourceforge Enterprise Edition

Did you know you can download SourceforgeEE for 15 users for free. You'll find it on Sourceforge.net and it comes in a VMWare appliance. That version will accommodate 50 users if you want to pay for more than 15 seats. From an enterprise point of view, the cost is quite reasonable. more>>

Open Source Being Repositioned in Corporate America

Open Source methodology has gained some ground in one of the last places you and I might expect: In the development area of corporations. Consultants are calling environments like Sourceforge Enterprise Edition a Digital Development Environment. more>>

The Federal Government Sanctioned Spam Trap

Would you like to buy a mailing list and start a Broadcast Campaign? Then just put some kind of message at the bottom of the email that says unsubscribe or opt-out and a physical address like 201 Mullview Place, Bigfoot, Montana 59106. Make sure you have a subject line and a header. more>>

For Aspiring Young Writers: A Linux Book on a Best Sellers List

Four years ago, I bought a book entitled, "Mac OSX: The Missing Manual" and noticed it had reached the #1 best sellers slot at Amazon. I remember wondering how an operating system with 3% of the PC Desktop market could sell enough books to rank #1. Then, I realized there I was buying one too. I didn't use a Mac, but my wife bought one and needed to learn this new fangled UNIX desktop. The point? The Missing Manual served a big need - big enough to warrant a #1 best seller. more>>

Will we see any more Linux System Administration books in the future?

A reliable source says the days of Linux sysadmin books have ended. If you can barely sell 5,000 copies, then why bother? Programming books continue to sell at a fast pace, so you can guess where job demand in IT has gone. more>>

Drivers, patents and other threats, yawn.

Let's see how long have I used Linux as a desktop? Hmmm. Over 10 years? That's right. And the first issue I had at that time was finding an easy way to get to my ISP. The second issue at the time was the lack of a graphical web browser. Then Netscape produced an unsupported one that worked fine. more>>

LDAP -Time to Leave Home, Young Man

If you have followed my articles on LDAP, you know we began looking at objectClasses in the last installment back in March. Since that time, I haven't written much more about directory servers. I began contemplating whether or not to continue the LDAP series because things have changed. Let me explain: more>>

CAN-SPAM Act - Is it working? You Decide.

As I delete spam from my Gmail spam folder, I notice the volumes increasing. A year ago, I would see about five to ten emails a day in that folder. This morning, I woke up to 56 items. The volume of spam has grown, no doubt. more>>

Syndicate content
Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix