| LinkedIn Groups | | | | | | | October 28, 2011 | New Discussions (27) OPen Source??? Started by Abhinav Jayaram, Student at Visvesvaraya Technological University i am a fresher in Engineering....Pl guide me ...is Open source having Future? By Abhinav Jayaram, Student at Visvesvaraya Technological University | | | Like · Flag | HTML5 main structure Started by Angelescu Violeta, software developer Very good presentation of difference between HTML4 and HTML5. Greet job. By Ivan Ivanov, Looking for job opportunity in Washington Metro Area or MD, VA, NC | | | Like · Flag | Hi, looking for Server Engineer – Project Web Lead Engineer in Seattle Started by Quy Nguyen (OPEN NETWORK) LION™, Recruiting/Senior Sourcer (qnguyen@startuprecroot.com) at Startup Recroot SweetLabs (makers of Pokki and OpenCandy), a Google Venture backed San Diego-based startup is recruiting a Server Engineer – Project Web... more » By Quy Nguyen (OPEN NETWORK) LION™, Recruiting/Senior Sourcer (qnguyen@startuprecroot.com) at Startup Recroot | | | Like · Flag | Switching Menus in Joomla Started by Ben Winter, Owner at Winter Web Method Have you had to find a solution for this? After coming up with a solution to this problem in WordPress, I thought that the simple... more » By Ben Winter, Owner at Winter Web Method | | | Like · Flag | Get Started with Jenkins in uberSVN Started by Katie W, Sales and Marketing Assistant at WANdisco In this post, we’ll walk you through downloading Jenkins and creating your first job, before looking at some more advanced project... more » By Katie W, Sales and Marketing Assistant at WANdisco | | | Like · Flag | Large Video Play in Linux Started by Niraj Bhatt, Linux Consultant you might want to look at Kaltura http://www.kaltura.org/ they seem to have an interesting solution, but you might first look at some CMS, and see if any fit your need, and then check what solution is allready integrated. By Patrick Sinz, General Manager at Fabrica Bahiti | | | Like · Flag | What types of control would you recommend to mitigate the risks arising from use of unauthorized software within an organization? And regarding individuals? Started by Laura García Pérez, Técnico del Observatorio de la Seguridad de la Información en INTECO, SA You'd first would have to factor in the reasons you want to stop unauthorized software and check the way software is authorized. IMHO there are two core cases: - people use software and incorporate them in whatever software you are producing, without thinking too much about the licenses and consequences, for this you might look at something like black duck software, particularly if your organisation start to be too big to have a real overview of the situation. - people download crap and "interesting software" on their personal platforms or on shared server to "do stuff". Something like OCSInventory would help you track digital assets ( http://www.ocsinventory-ng.org/en/ ) and check "what people are using". But the most important part is probably linked to the reasons people are installing "non authorized" software: If it is "random crapware" (games and such) the real issue is with the management, how come people have time for this ? and a technical solution will not fix the real issue (after all they can still play angy birds on their <what ever>phone. If they are downloading pirated sofware then it is probably either a sign of closemindness or lack of training. A good example is graphics designer downloading 3DMAX because they do not know how to use blender and don't have a recent version. This can be aleviated with training and explanation (i.e. if you put the company at risk by running unlicensed software it is a "good reason to fire you without compensation and a black markt on your resume") A trickier issue is people who want to use software for legitimate but poorly undestood reasons: eg: somebody wants to install R to do serious data mining, and of course it's "free software" but "unsuported"... The best solution is to have some sort of ticketing system in you IT support that enable people to do requests, and get answers like: no way => you need to tell why and maybe to think about alternative ok but don't call us => you cannot offer support sure great idea => ... Lastly some software might be a source of security weaknesses, but in any case you should assume that all "well managed" computers have been highjacketed by "really bad guys" and plan your network and application level security accordingly, or you are close to be "roadkill" anyway... By Patrick Sinz, General Manager at Fabrica Bahiti | | | Like · Flag | Job Discussions (24) | | | Don't want to receive email notifications? Adjust your message settings. Stop inappropriate content the moment it is posted. Send me an email for each new discussion » Do you know anybody that might like this group? Invite others to join » LinkedIn values your privacy. At no time has LinkedIn made your email address available to any other LinkedIn user without your permission. © 2011, LinkedIn Corporation. | |
No comments:
Post a Comment