Archive for the ‘LINKS’ Category.

Gartner: Microsoft looks to improve Active Directory in Windows 2002

Gartner tech perspective:
Microsoft looks to improve Active Directory in Windows 2002
“These LDAP-related changes represent progress, but they do not propel Active Directory to the head of the pack of all platform and LDAP directories. Microsoft cannot obtain market leadership based on technology alone. It must continue to recruit application partners to support and advance Active Directory, and it must come to grips with a programming community that is averse to proprietary interfaces (i.e., ADSI). As a result, Active Directory will not be widely deployed as a general-purpose LDAP application directory (as opposed to a platform directory) through the first half of 2003 (0.7 probability).”

“Windows 2000 was simply a jumping-off point for Active Directory. Microsoft continues to revise Active Directory to better address platform directory needs and general-purpose LDAP directory needs. However, enterprises should avoid a mixed Windows 2000/2002 Active Directory domain controller environment and should choose one release as the basis for their domain controllers. The operating-system releases for other types of systems (e.g., desktops, laptops, member servers) can be safely mixed.”

Gartner originally published this report on May 14, 2001.

Datamation: Case Study: Perseus Re-Starts Intranet Engines

Datamation: Case Study: Perseus Re-Starts Intranet Engines “What if you threw an intranet and nobdy came?” [Linux Today]

page of links regarding electronic paper

UnixReview.com: Top 31 Things to Know for the Red Hat RHCE Exam

VNUNet: Linux based Trojan gets a closer look

Xmldiff 0.5

Creating and Using XML-Based Internal Documents?

VNUNet: Linux users warned of new Trojan danger

VNUNet: Linux users warned of new Trojan danger
Also includes links to various other related Linux worm articles
[Linux Today]

A directory of vision statements for Seybold

A directory of vision statements for Seybold. Thanks to everyone for participating. We’re getting ready to mail to all the registered attendees. The room holds 2500 people. I want to fill it with minds on Sept 26. We’re serious about building flow for these ideas. [Scripting News]

Exploiting and Protecting 802.11b Wireless Networks

ExtremeTech – Exploiting and Protecting 802.11b Wireless Networks.

How many network administrators do you think would allow a complete stranger to walk into their wiring closet and plug in their notebook to their company’s network? Not too many, I suspect. But that’s what’s happening to companies coast-to-coast. Well, not exactly. Strangers aren’t plugging into networks, but they are attaching to networks using 802.11b wireless network cards, and that’s essentially the same thing.

[Privacy Digest]