­

Protect Your Laptop Data from Everyone, Even Yourself - Bruce Schneier

0 Comments
A Blog Post by Bruce SchneierLinkhttp://www.wired.com/politics/security/commentary/securitymatters/2009/07/securitymatters_0715Don't try this at home if you're not very familiar with whatever encryption product you're using. Failure results in a bricked computer. Don't blame me. Step One: Before you board your plane, add another key to your whole-disk encryption (it'll probably mean adding...

Continue Reading

Sharepoint applications - Architecture and Design lessons learned

0 Comments
In this blog post I’m going to highlight some of the design and architecture lessons that I’ve learned so far. In future posts I’ll be drilling down in some of the areas and present concrete examples. So here is my list so far:1) Do not forget standard/proven design...

Continue Reading

Recovering troubled programmes

0 Comments
A Post by ElizabethLink :http://www.pm4girls.elizabeth-harrin.com/2009/07/recovering-troubled-programmes-2/Here’s the 5 step ESI process for getting out of trouble. The whole approach assumes you have been parachuted in to fix someone else’s flailing programme, which I suppose is what ESI do. You can adapt the steps if you are trying to turn...

Continue Reading