Bookmarks
|
|
Suche
|
|
Login
|
|
|
|
Kategorien
|
|
|
RSS-Feed
|
|
RSS-Feed - Einträge
|
|
|
|
When I applied for an internship at IBM, least I expected was
a long-term career at Big Blue.
My first summer job involved porting a commercial
application from IBM System/36 to IBM AS/400 using RPG and the
command language (QWRKSPLF, anyone?), copying and labelling the 8” release
master floppy disks for another product and passing the quality assurance leader’s
fierce interrogation on database normalization up to the fifth normal form.
At the end of the two month cycle, I had a job offer in the
mail to work in IBM’s Information Systems AD/M group, passed the interview and was
ready to start the new academic year as a part time employee.
Today I celebrate a milestone in my career, my quarter century anniversary. Working at IBM has been an exciting, instructional, challenging, rewarding and sometimes crazy experience. I have been an application developer, course
instructor, product tester, customer support engineer, infrastructure architect
and corporate webmaster (aka webworm), team leader, manager, and enterprise architect.
I still have a copy of the original job offer, the small blue
employee handbook which outlined the company believes and policies, the internal
“facebook” booklet and an office cupboard filled with books, papers and various
memorabilia, from conferences badges to award certificates and my first patent
plaque.
What’s more important than the “stuff” are the connections with the many smart, dedicated
and supportive people whom I met and had the pleasure to work with over the
years, locally and around the world.
Thank
you to all my colleagues and friends who have made my first twenty-five years
special!
|
02.10.2014 - 21:47:00
|
http://klausrusch.atmedia.net/blog/2014/10/how-internship-turned-into-twenty-fiv ...
|
|
|
|
Some twenty developers and security experts gathered at the Stockwork Coworking Space for today?'s joint Vienna DevOps & Security and System Architects Group meetup http://meetu.ps/2v2DGg.
Best practices for AWS Security
Philipp Krenn (@xeraa) nicely explained the fundamental risks of AWS services:
Starting services on AWS is easy. So is stopping.
Recent incidents show that a compromised infrastructure can cause more than short disruptions. Several companies went out of business when not only their online services but also data stores and backups were gone:
Code Spaces goes dark after AWS cloud security hack
DrawQuest permanently shuts down after security breach
Bonsai.io suffers from an AWS security incident
(Some) recommendation for using AWS services:
Lock away the root account. Never use this account for service or action authentication, ever.
Create an IAM user with a password policy for every service or action to limit damage in case an API key gets compromised.
Use groups to manage permissions.
Use two-factor authentication (2FA) using Google Authenticator.
Never commit your credentials to a source code repository.
Enable IP restrictions to limit who can manage your services even with an API key.
Enable Cloudtrail to trace which user triggered an event using which API key.
Other cloud security providers may offer different security features
The (fancy!) slides are available here: https://speakerdeck.com/xeraa/i-am-what-iam-for-devops-vienna
ISO 27001 - Goals of ISO 27001, relation to similar standards, implementation scenarios
Roman Kellner, Chief Happiness Officer :-) at @xtradesoft, gave an overview of the ISO 27001 and related standards:
ISO 27001:2013 Information Security Management System (ISMS) Requirements
ISO 27002:2013 Code of Practice
ISO 31000 Risk Management
Information security management is not limited to computer security; it is equally relevant for paper documents, human knowledge, etc.
The structure of ISO 27001 looks somewhat similar to ISO 9001 Quality Assurance, including the monitoring and continuous improvement loop of Plan-Do-Check-Act (PDCA).
For a successful implementation and certification, the ISO 27001 efforts must be supported and driven by the company leadership
The third talk about Splunk unfortunately had to be postponed.
|
09.09.2014 - 21:42:00
|
http://klausrusch.atmedia.net/blog/2014/09/vienna-devops-security-and-system.htm ...
|
|
|
|
JPEG images downloaded from a digital camera often contain thumbnails in the EXIF metadata, which Windows 7 appears to use for the thumbnails shown in folders.
Unfortunately not every image editor also updates the thumbnails. As a result, changes to images are only visible on the full image, not on the thumbnail preview.
That's where the marvelous ExifTool library and command-line application by Phil Harvey come into play. This one-liner removes the thumbnail image and related size information, and sets the file modification timestamp to the capture timestamp:
exiftool -if "$exif:IFD1:XResolution" "-filemodifydate<datetimeoriginal" -ext jpg -IFD1:all= %*
Combined with Matt Ginzton's CmdUtils, the full batch script for Windows removes image backup copies before and after processing:
@echo off
if exist *.JPG_original recycle -f *.JPG_original
exiftool -if "$exif:IFD1:XResolution" "-filemodifydate<datetimeoriginal" -ext jpg -IFD1:all= %*
if exist *.JPG_original recycle -f *.JPG_original
|
01.09.2014 - 21:30:00
|
http://klausrusch.atmedia.net/blog/2014/09/removing-thumbnails-from-jpeg-images. ...
|
|
|
|
Thirty years ago, on July 2, 1984, I started my first summer job in the accounting department of Gebrüder Ulmer, a hardware retailer and wholesale firm.
The little I remember from those days are fixed working hours from 8–12 and 14–18, with sufficient time for a lunch break at home, handwritten memos, a plethora of documents arriving every few hours that needed to be stamped, sorted, numbered, processed and forwarded to the next department or stored in the archive, and the mix of historic and then-modern business machines.
My responsibilities were mostly sorting and archiving documents, and typing letters on an ancient mechanical Underwood typewriter.
The most advanced device was “the accounting machine”, most likely a Philips P354 Visible Records Computer or similar. Accounting information was stored on large Magnetic Ledger Cards, with transactions getting recorded on a magnetic stripe as well as printed on the card, so one could easily access the information without a computer. Transactions were recorded on individual customer and supplier account cards, and the totals got transferred to the general ledger cards automatically at the end.
The accounting system was eventually re-implemented on an IBM System/36 minicomputer, and later ported to the IBM AS/400. As a teenager who proudly owned a Commodore 64, these big irons were quite impressive and a motivation to know more about business computing, data modelling and programming languages. (I still have a copy of the COBOL 78 manual, just in case.)
In the thirty years since my first summer job, there have been tremendous changes. No longer do most of us work fixed working hours, rarely do we exchange handwritten memos, and data processing usually means instantaneously and electronically, not in paper batches.
I am grateful for what I learned during my first summer job and during my professional career since, and looking forward to the next big shifts ahead.
Photo courtesy of The Centre for Computing History - Computer Museum, http://www.computinghistory.org.uk/det/505/philips-p354-visible-records-computer/
|
02.07.2014 - 09:30:00
|
http://klausrusch.atmedia.net/blog/2014/07/thirty-years-ago-on-july-2-1984-i.htm ...
|
|
|
|
When the World Wide Web was created 25 years ago few people probably realized how much change this would bring, not only to the academic community where this started but to the world at large.
Twenty years ago, IBM published the first homepage on www.ibm.com. The initial site on May 24, 1994 had only a few pages of content and an audio greeting by then-CEO and Chairman Lou Gerstner. (That was the time when most homepages greeted visitors with “Welcome to the Internet”.) Among the things Gerstner said, in retrospective the most important statement was “We are committed to the Internet, and we are excited about providing information to the Internet community”.
Back then I was happily coding System/370 mainframe applications and just had my first encounter with the now defunct Trojan Room Coffee Machine at the University of Cambridge. SNA and Token Ring were our preferred network technologies, and access to the Internet required special permission and signing an NSFnet Acceptable Use Policy document outlining the rules for commercial activities on international networks. Soon much of our business would become e-business.
Only a few years later was I invited to join the www.ibm.com team, a very fine, special team. At a time when business was mainly local, we were already globally integrated, collaborating electronically through an internal IRC network (Alister, remember our daily "gma, hay?" routine) and eventually the predecessor of IBM Sametime.
Last week the creators of the first homepage and some who worked in Corporate Internet Programs in the early days came together in New York City for an unofficial “motherserver meeting” to celebrate the anniversary. I missed the party, but the pictures brought back memories of the good times (and yes, occasionally bad times) we had running the IBM Website.
Happy Birthday, www.ibm.com!
|
24.05.2014 - 21:04:00
|
http://klausrusch.atmedia.net/blog/2014/05/happy-birthday-wwwibmcom.html
|
|
|
|
This month’s ViennaJS meetup brought together a bunch of awesome people with awesome talks at the new location Sektor 5:
Veganizer: Having fun with image manipulation using canvas and vegetables (including a commercial for filepicker.io) https://github.com/franzenzenhofer/veganizer by @enzenhofer
Enterprise Software Development for JavaScript refugees – Scala.JS (and not EJBJS 2.0, LOL) @rafacm @sebnozzi
Responsiveview: http://rv.k94n.com/ https://github.com/k9ordon/responsiveview.Other tools at http://responsinator.com/ http://lab.maltewassermann.com/viewport-resizer @thisisgordon
Web components: Cool talk by @nikgraf about HTML imports and more. http://www.x-tags.org/ can be used to enable Web components in current browsers already
Twitter hashtag: #viennajs
|
31.08.2013 - 00:03:00
|
http://klausrusch.atmedia.net/blog/2013/08/viennajs-meetup-veganizer-enterprise. ...
|
|
|
|
IT security is not just about computers and smartphones any more. Your smart TV may be allow attackers to get access to sensitive information and control the device, as security start-up ReVuln demonstrates for Samsung's Smart TV.
Once simple stand-alone receivers, TV sets, set top boxes and digital recorders are full featured computers and connect to home networks for downloading program guides and software updates, sharing pictures and videos and enabling social media integration.
Read more about recently discovered security flaws in home entertainment equipment on The Register.
|
12.12.2012 - 21:46:00
|
http://klausrusch.atmedia.net/blog/2012/12/it-security-beyond-computers-and.html
|
|
|
|
One year has passed since I left Phnom Penh after my IBM Corporate Service Corps assignment in Cambodia had ended.
In the following months, I wrote articles about the CSC experience for our local employee magazine and for our corporate social responsibility site. A professional writer covered the story for the THINK! Magazin. Our company internal Global Web Services newsletter featured another article. This one happened to find its way to my client HRINC, where it got published on their company website as well.
In February, another #ibmcsc team visited Cambodia and worked with a different group of clients, mostly educational institutions. During their preparation I had the pleasure to share some of our team’s experiences, including recommendations for sight-seeing, dining and entertainment.
Writing and talking with colleagues, friends and family about the trip always brings back fond memories of the great time spent in Cambodia with the “Tissabamokah” team, our hosts and the various people we met during our stay.
I occasionally hear from my friends at HRINC about life and work, and follow the updates from the Cambodia Retirement Village (CRV) project.
The IBM team has stayed in loose contact also. We didn’t manage to arrange our first annual reunion that we had talked about before we left, and we never completed our team video. Somewhere that raw footage is waiting to be edited and cut, maybe for another anniversary.
If you ever have an opportunity to spend some time on a voluntary assignment, whether as a company sponsored activity or with a volunteer organization like Australian Business Volunteers (ABV), go for it, and if you don’t, try harder to find one.
Looking back a year later, I wouldn’t say that one month abroad made me a completely different person, but I certainly learned a few things about myself too. What made the most lasting impression on me was the Khmer people’s positive and cheerful attitude, which I admire and often miss.
Related links:IBM Corporate Service CorpsCSC Cambodia 1 team blogBlog posts tagged with #cambodia
|
09.08.2012 - 21:29:00
|
http://klausrusch.atmedia.net/blog/2012/08/cambodia-revisited.html
|
|
|
|
|
|
|