In a post titled “IBM is so screwed,” Bob X. Cringely provides his analysis of IBMs most recent earnings report. Spoiler alert: It isn’t pretty.
In preparation to upgrade our Domino environment to Release 9.0.x, we determined it would be a great idea to know how many Notes IDs we were missing from our ID Vault. A little Google searching, I discovered that two people at IBM created an application, ID Vault Database Scanner.
After some fitful starts to getting it to run, this past weekend I scheduled it to start at 1AM and run for 20 hours (I adjusted Agent Manager to allow agents to run for 1200 minutes). I felt that would be more than adequate time to loop through 22,000 Person Documents and the ID Vault.
After 20 hours, the agent stopped and had looped through . . . 1,598 Person Documents.
If my math is good, that is 1.33 Person Documents per minute. And, extrapolating from that data point, it will take, by my estimation, 502 hours (or 21 days) to completely scan both the Domino Directory and the ID Vault.
That is a lot of time for what I see as a “simple” task.
While it could be asked of me to run the application locally, I have tried that to no avail. In fact, within the documentation of the application, it does not allow for the application to be run locally. And, even if it did, I don’t think that tasking one workstation for 20 days on one task is a good use of an asset.
If you are a developer and you take a look at the code on the website, is there anything you see that can be done more efficiently? Something that will allow this application to complete within 20 hours? Yes, I did read the comments where it was mentioned that this application is slow. However, I didn’t think it would be this slow. I was wrong.
If you know of an application that can compare Person Documents with entries in the ID Vault and return a list of missing Notes IDs, I would love to hear about it.
Today, IBM and Box, an online file sharing and personal cloud content management service for businesses, announced a partnership.
IBM is going to let Box plug into its analytics and security technology, while Box will integrate its content management system into Big Blue’s existing products.
For example, they will work on a new data analytics solution that uses IBM’s Watson supercomputer. Box’s technology will also be integrated into IBM Verse and IBM Connections, its business email and collaboration services.
They will also jointly develop mobile apps and analytics solutions. Box said some of that could even be included in the products IBM and Apple are building together. On top of that, IBM will use its massive salesforce and consulting team to sell it to its network of business customers.
Considering IBM deals with some of the biggest businesses in the world, it’s a huge deal for Box, which went public earlier this year.
Thanks to my co-worker, Barb, for pointing this out to me.
The Sametime Proxy server ships with an SSL certificate to allow for push notifications to occur securely for the Sametime Mobile Chat client for Apple iOS via the Apple Push Notification Service (APNS). The current certificate expires 9 June 2015.
Before that date, Sametime administrators should download and apply an updated certificate to continue expected functionality for users.
If you haven’t updated your SSL certificate, time is running out.
Apple put a huge amount of time and effort into the creation of the Apple Watch, the company’s first new product line since the original iPad was released in 2010. The hardware is a cut above anything we’ve seen launch ahead of the device, and the software experience widens the gap even further.
But there’s one area Apple apparently didn’t put much thought into at all, and the Watch is absurdly easy for thieves to steal as a result.
The Register, as well as many other news sources, is reporting a new security vulnerability in Lenovo products.
Security researchers at IOActive uncovered a mechanism that would have allowed hackers to create a fake certificate authority in order to sign executables. The trick could be used to replace legitimate Lenovo programs with malware by hackers on the same untrusted wireless network, of the type commonly found in coffee-shops, pubs and transport hubs, as IOActive explains:
Local and potentially remote attackers can bypass signature validation checks and replace trusted Lenovo applications with malicious applications. These applications will then be run as a privileged user. The System Update downloads executables from the Internet and runs them.
Remote attackers who can perform a man in the middle attack (the classic coffee shop attack) can exploit this to swap Lenovo’s executables with a malicious executable.
You could find a more-to-the-point article on this, but The Register’s writing makes this story much more fun.
Well, it did last longer than some other notable imprints (DominoPro, DominoPower, The Notes Report, to name a few).
It’s hard to believe that it has been 20 years since THE VIEW first arrived into an exciting Lotus market! During that time we’ve had the pleasure of doing business with thousands of subscribers and attendees of our Admin and Developer conferences. Throughout the years, we worked to deliver trusted and valued information to help you do your job better. We remain humbled by the favorable response to our products over the years.
It’s with a sad farewell that we announce we are no longer supporting a subscription model and closing eview.com. As a subscriber, you’ll retain your access to THE VIEW archives through June 30, 2015.
A lot of the people that I know in this community started by submitting articles to The View. As well as the other magazines. From there, many went on to speak at conferences around the world. They were my “rock stars,” and they still are. As well as my friends.
So, it is at times like this, when the venerable The View shuts its doors, that I reflect on some of the fantastic articles I’ve read in that magazine, as well as the others.