If you have a LinkedIn account, stop what you’re doing and change your LinkedIn password immediately. I’m not kidding–just do it. Once you’re logged in, click on your name near the upper-right corner, click Settings from the menu, click the Account tab near the lower-left corner, and click Change password. Now that you’ve changed yourContinue reading “Heads-Up for LinkedIn Users”
I’m migrating a Business Intelligence project from SQL Server 2005 to SQL Server 2012. Microsoft has, overall, done a great job with their development and migration tools, and some of the new features of SQL 2012 are great and will save me a lot of time going forward. One neat new feature in SQL ServerContinue reading “Converting to Project Connection Across Multiple Packages in SSIS 2012”
Working on a report from a MySQL database, I needed a table of all dates for the next year. With SQL Server (2005 and later) there’s a CTE/recursive method to do this pretty elegantly, but I couldn’t find anything similar for MySQL. All the solutions I found involved temporary tables, loops, and/or stored procedures–none ofContinue reading “Generating a Range of Dates in MySQL”
I mentioned a while ago that I have a Linux web server set up with Kerberos SSO in our AD domain. Setting it up was a lot more tedious than it seems like it should have been. I found bits and pieces of useful information here and there, and some step-by-step guides to help withContinue reading “Active Directory Single Sign-On for Linux Intranet Servers”
I’ve started a project to move the front-end of our intranet from SharePoint to WordPress (SP is just too icky to do any serious front-end work with). The plan is for WordPress to become the front-end and CMS for news-type content, keep SharePoint for file library and calendar-type stuff (at least for now), and useContinue reading “Intranet Milestone: Transparent Authentication”
I’m a fan of David Allen’s Getting Things Done, but it suffers from one major shortcoming, at least for me: it offers some great methods for managing inputs and outcomes, but it is little help for managing knowledge in a usable electronic form, largely due to its reliance on paper as a least-common-denominator representation ofContinue reading “The Problem With GTD”
I’m beginning a personal project to help me manage the barrage of different inputs I juggle every day. I know I’m not alone in this, so I’ll be sharing my thoughts here as I work through this project. I don’t know what form the end-result will take—could be software, could be a change of myContinue reading “Knowledge Work: Marshaling Inputs”
“I was young and crazy… I didn’t know what is possible and what’s not, so I did impossible things.” Mart Laar, Prime Minister of Estonia 1992-1994 and 1999-2002
This is a great video from Steven Johnson about where good ideas come from.
There are more things in Heaven and Earth, Horatio, than are dreamt of in your philosophies. – Shakespeare I said before that generalization, patterns, and abstraction are powerful ideas, but they have their limits. It is useful to reduce a thing to its core principles, but beware! Taking reductionism too far you can lose theContinue reading “Beware the Limits of Reductionism”
εν αρχη ην ο λογος – John 1:1 Our world behaves in consistent, predictable ways. If it were not so, biology, chemistry, physics, mathematics, philosophy, economics, engineering, medicine, and countless other disciplines would simply not work. Every discipline studies a range of specific phenomena and aims to distill the detailed observations into general principles orContinue reading “Generalization, Patterns, and Abstraction”
Ideas are the most basic of tools with which we understand and influence our world. And like tools, not all ideas are created equal—some ideas are more powerful than others. What makes an idea powerful? A powerful idea conforms to absolute truth—the way the world actually is, not necessarily the way we think it isContinue reading “Powerful Ideas”
Charlie Savage reported Monday in the New York Times that the Obama administration is seeking legislation that would require “back-doors” in all encryption products and services in the US. Of course, they cite terrorism as a primary motivation. How best to balance the needs of law enforcement (and of government in general) with the privacyContinue reading “Internet Wiretap Bill Misses the Mark”
From my trip to Seattle a while back. Unfortunate circumstances that took us there, but we did get a chance to hang out at the waterfront for a while. I just kinda liked the unusual perspective and framing of this one.
We’ve been thinking about developing a quick application to replace a paper HR process—should be a simple state machine with four possible states: Submitted, Accepted, Rejected, and Completed. But then we realized we would need email notifications and a coherent security model. These requirements—workflow, notification, and security—happen reasonably well in the old paper model. NotContinue reading “When Low Tech Is the Best Tech”
It used to be that network infrastructure was one of an organization’s most valuable assets and security was geared toward protecting the infrastructure; but costs are falling, and the network has become a commodity. Meanwhile, the volume and value of information stored electronically are growing rapidly. For this reason, Dan Greer advocates a paradigm shiftContinue reading “The Enterprise Information Protection Paradigm”
(1/4 sec at f/5.6, ISO 400) I borrowed my wife’s Valentine flowers for a while Saturday. This lily was a very patient model, and I had a lot of fun!
I was blown away by how good these are. I inherited this recipe from a friend. I can’t find it anywhere on the Web, so I’m putting it here. Enjoy! Ingredients: 1 lb Hamburger 1/2 cup Ketchup 1 Tbsp Mustard 1 tsp Worcestershire sauce 1/2 tsp Chili powder Onion powder and garlic powder to tasteContinue reading “Recipe: Missile Burgers”
Stressed at work? I highly recommend Getting Things Done by David Allen. The main thing I learned from GTD was how to manage my email—keeping my inbox empty and using a single folder for archived messages. It’s been several months, and I need to read it again, but even the few tips I remember fromContinue reading “Book Recommendation: Getting Things Done”
All of my company’s inbound and outbound email goes through a security service that scans for spam and viruses. From time to time I get an email from someone saying that they got a message that they consider spam. I see that as a good sign. Here’s why: Spam filters are machines, with some humanContinue reading “The Spam That Got Through”