At some point during the last decade, two-speed IT started gaining traction, and looked like the future of IT strategy for all companies. The need for it was undeniable: changing customer requirements and growing reliability on digitally-enabled processes increased the strain on IT infrastructures considerably, this no longer allowing for the slow responses legacy infrastructures returned.
Cybersecurity is no longer a task relegated to the CSO and IT department. A fully engaged and proactive C-suite can dramatically reduce risk. A recent report from The Economist Intelligence Unit and Oracle shed a light on best practices.
One of my favourite open source utilities is tdl, a
command-line to-do list manager. I was recently updating a SmartOS VM
for development work, and noticed that I lacked a working tdl binary.
An attempt to build it resulted in a failure like
Last year, I decided to combine and upload our fourteen years of digital
photos to Google Photos. An enjoyable
aspect of Photos is that the application will notify you of new products
it has created from your incoming photos, such as flipbook-style
animations and filtered/enhanced pictures.
As humans we tend to fear the unknown and the unexpected. I remember as a kid that my younger brother took great pleasure in hiding around corners and yelling “Boo!” as I walked by. For me, the fear of someone or something potentially lurking around the corner was more frightening than the actual thing itself.