By Sandeep Desai (http://www.thedesai.net/)
Websites
www.patentcommons.org (List of patents available for open source use)
Leading Geeks
Do one review per month instead of all at the end of the year
12 ways managers can grade geeks
First 4 applies to junior staffers, Senior staffers would show competence in more
Don't judge people only by project
Data Quality: Before doing ERP or CRM implementation or any new project make sure that the data quality is good. ETL process should not be used for fixing data problems
Tools available for improving data quality are
Data Quality Vendors:
HIPAA: (Health Insurance Portability and Accountability Act)
Sarbanes-Oxley: Regulations requiring companies to identify, document and audit internal controls for fraud, assets (PC, servers), security etc to comply with section 404. Requires changing passwords every 120 days
Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using devices called RFID tags/transponders. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennas to enable them to receive and respond to radio-frequency queries from an RFID transceiver.
RFID generates a large amount of data. See RFID warehouse article
RFID BI practices non-existent according to this Forester view article
A rootkit is a set of software tools used by an intruder or illegal hacker to break into a computer and obtain root privileges in order to perform unauthorized functions, hide traces of its existence and exploit its system wide access
e.g. a rootkit could replace the dir command with a hacked dir command that would delete files first and then show you the list of files in the directory
Acronyms:
Java: Programming Language, 32 bit platform independent programming language
J2EE: Server side Java technology Servlets, JSP (Java Server Pages), JSF (Java Server Faces) EJB (Enterprise Java Beans) JAX-RPC
ETL: Extract Transform Load Data
HTTP: Hyper Text Protocol
RPC: Remote Procedure Call, invoke procedure over the network
SOA: Service Oriented Architecture, RPC over HTTP using XML
XML: Extensible Markup Language, used for creating structured data documents
Links
Database Security Vendors
Scan database for misconfigurations, security vulnerabilities, encrypt data, capture log information from Database, OS
www.ingrian.com (Hardware based cryptography)
www.iplocks.com (Compare database settings to industry standard)
www.lumigent.com (Audit database for user activities, identify change management)
ERP/CRM
Compiere Open Source ERP and CRM