Succeeding with Open Source Much like Odysseus—who had to negotiate perils between Scylla and Charybdis—IT managers face daunting challenges. On one side, there is relentless pressure to cut costs. On the other lies an unending demand for innovative solutions. However, unlike Odysseus, IT managers must not simply avoid either fate: Instead, they must fulfill both... Data Architecture: From Zen to Reality
First, note that I have used Zen in the title of this book. I have
been asked many times why I used such an esoteric term. After
all, what is the meaning of Zen? To clarify the meaning of Zen,
we must examine the philosophical environment that gave rise
to Zen: Indian and Chinese philosophies. In India, Buddhism
arose out of a Hindu...
Perfect Passwords: Selection, Protection, Authentication User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According...