Latest Fodder on Domino Document Manager

In what has become one of the more interesting soap operas on Planet Lotus, here’s the latest I’ve heard about DDM. Perhaps some of this is redundant, maybe even common knowledge. However, it seems to be a bit of a disconnect from what I had been previously told.

Here’s some history for you my yellow peeps.

For the past 8 months, I’ve been working on a project that would use DDM. I initially wasn’t sure I wanted to use it but knew that DDM had the functionality I needed. There were, of course, questions about DDM’s future so I probed. I hammered. No matter to whom I spoke or whose blog I read, clear answers were no where to be found.

I would have an easier time finding a quarter at the bottom of the Delaware River between the Ben Franklin and Walt Whitman Bridges after 6 weeks of torrential rains flooded Northeast Pennsylvania & Northwest New Jersey and stirred up all the muck in said river then getting someone at IBM to say what the hell was going on with this thing!

In any event, it seems as though DDM will be supported for the next 5 years however only on ND 6.5 or 7. It is not supported on ND8, Vista and/or Office 2007. I found this out Monday and it was news to me. This was the first definitive answer I received and it was AFTER I got everything working with ND 8.0.1, Symphony, Office 2003 Windows 2003 Server & XP clients with no apparent issues. I’m not a fan of Vista or Office 2007 and will get to it eventually but that isn’t the point.

Now this is what gets my goat. If I want a “properly supported environment”, I HAVE to keep all of my DDM users on ND 7.0.3, Office 2003, and XP!

So, let’s see here … end of mainstream support for Office 2003 is January 2009 (That’s less than 6 months away), XP is April 2009 (That’s next year!), ND 7 is most likely EoL in 2010 or 2011 … BUT DDM will outlast them all with a projected EoL of 2013! WOOHOO!!!

Quickr is the heir apparent however; there is no corresponding template that can be used for migration. At this point, I’m not really sure of what role Quickr Content Integrator plays. Perhaps the migration templates lie there but for a new implementation, I’m not going to add, on the low side, US $30,000 to my project.

As I stated in my IdeaJam on the subject back in May, would it really be that difficult to update DDM for either ND 8 or Quickr? I have it running now on 8.0.1 without any major mods so how hard could it be?

Your thoughts?

9/11/01 Remembered – Part 1

It’s hard to forget the events of, man, 8 years ago now, though I try.

I live and work in New Jersey. Throughout my life, trips to Manhattan and DC have been and remain commonplace. I’ve been doing it as long as I can remember.

In August of 2001, a few short weeks before, I interviewed for a job in The WTC. I remember getting done and walking through the PATH station. I glanced up at the signs and saw directions to the observation deck. I thought about going up but didn’t. I remember saying to myself, “Eh, it’ll always be here.”

Little did I know.

On 9/11, I was home. My Mom was staying with me as she recovered from a heart attack. Good to have Mom around on a day like this. I got a call from my then girlfriend who asked me to turn on the TV to see what was going on in New York. It was eerie.

As the horror unfolded in Manhattan, DC and “somewhere else in the skies” live on TV, Mom started panicking. I didn’t really know why.

See, we had the very unique experience of having one of my sisters working in the financial district of Lower Manhattan, my oldest brother was on a flight to somewhere and my #2 brother, the now Admiral then Navy Captain had been recently transferred to a new gig with the Joint Chiefs of Staff in the Pentagon.

In one fell swoop, three of her six living children could be dead!

Since we’re a large Irish-American family, we know the tragedy of losing loved ones well before their time intimately. We aren’t really proud of that fact. It just is what it is. God’s time is … well … whether we admit God exists or not, we are all on His timetable. But this … fuck … this would be too much to bear.

Minutes ticked by … there was no word from anyone. You couldn’t get through on the phones or emails went unanswered. The news coverage of the carnage didn’t help. The minutes turned to hours and still no word from anyone.

Mom finally got a call from my sister at about 2 PM. She wasn’t downtown but, as you can imagine, couldn’t get a call out. About 3 PM, my sister-in-law, wife of my oldest brother, called and told us he was fine.

The only one left was The Captain at The Pentagon. When I heard that it was the Navy’s side of the Pentagon, I couldn’t help but think that tragedy had befallen my family again. When the news would go back to Pentagon coverage, and remind us that it was the Navy side, Mom would start sobbing. I, of course, had no way to comfort her. I made feeble attempts but Mom has had all sorts of tragedy in her life. What could I really say?

Finally, around 7 PM, The Captain called and was fine. Turns out, he had been in a meeting with Rumsfeld and the JCoS on the other side of the building and had been helping rescue efforts.

Simply by His grace, my family spared that day. For that, I was then, am now and will always be tremendously grateful.

In the years since, I have met others whose lives changed that day; some lucky, some not but all undoubtedly changed… [Part 2 later today]

Passport Advantage is Down!!

Hope you got everything you need from them because they are down until 8 PM EDT Sunday.

Now, my question is, ummm really, considering all the patching that will be going on this weekend, is this such a hot idea?

YIKES… has it REALLY been that long? Plus, The Greatest Musical TV Show

So, I noticed I haven’t written anything in a while except the odd response or tweet here and there. Life’s been crazy good of late … A new CIO who gets and supports Notes, digs my vision and put me to work implementing that vision within 5 minutes of her getting the job!! Thanks Sharon!

Then there is finding the woman that could be the love of my life. We do have one slight glitch though. No, it isn’t that she’s an Exchange admin. She actually uses Notes and has for years. See, her company is STILL on ND7 and her BlackBerry is at 4.2. I mean … ewwww to all of that! I mean … how could I be with someone who is still working with 7? I feel dirty just thinking about it! :o) Seriously, if I don’t marry this woman, there is something wrong with me.

The nutshell is, The Good Lord has blessed me on so many levels. So, I suppose on Good Friday, I will thank The Lord not only for dying for all of our sins but also all of the blessings.

As a result of all the blessing rained down upon me, in addition to not writing much, my PS3 and DVR have become a tad bit dusty. Well, I had some time tonight … er morning and just got done 2 of the best hours of TV I have watched in a long time.

The Chris Isaak Hour on the Biography Channel, Thursday @ 10: Music related TV does not get any better than this. http://www.biography.com/chris-isaak-hour/ (Sorry for the poor coding there, it’s late and buttons don’t work)

Anyway, I just watched his interviews with Stevie Nicks and Glen Campbell. I have got to say Stevie Nicks at 60 is still hot as anyone half her age. Glen Campbell, I had no idea how amazing he is.

Isaak does such a great job interviewing his guests. It isn’t the typical host celebrity interviewing another celebrity where the host turns it back on themselves. Isaak has done his research and asks really interesting questions. They even manage to work in a few tunes.

For example, I’m not the biggest country fan in the world and I am as cynical as the next Gen-Xer. But, Isaak made it interesting. I actually enjoyed hearing Campbell’s stories. I’d really like to see the raw footage of that one. The two of them just sitting around with guitars talking about Campbell’s career. I had no idea how many artists and records he did as a session guy: Sinatra, Elvis, The Beach Boys, The Monkees, Dean Martin and he was part of Phil Spector’s infamous “Wall of Sound”.

The upshot is, Chris Isaak does a great interview and there is something for everyone. In addition to the aforementioned, he has so far interviewed: Chicago, The Smashing Pumpkins, Michael Buble’, Trisha Yearwood, Yusuf Islam (formerly Cat Stevens) and next week, Jewel. Check out the website. Previous episodes are there.

OK enough already … it’s 3 am!!

Happy Easter!! Zizen Pesach!!

For the Love of God People Don’t Do This

OK, it is a generally accepted principle in the IT world that Notes/Domino people are pretty much the smartest people in IT. Ed did a comparison that showed Domino does something like what 25 different Microsoft products do, thus making “do more with less” a reality.

I just started a book to which a gent who claims to be some sort of Exchange guru contributed. I’m on page 11 as I write this. So, here’s the thing …

UNDER NO CIRCUMSTANCE IN THE ENGLISH LANGUAGE, I DON’T CARE WHAT DIALECT OR LOCALIZATION YOU USE, IS THE USE OF “BEING THAT”, “BEINGS THAT” OR “AS” EVER ACCEPTABLE FOR THE WORDS “BECAUSE” OR “SINCE”!

I mean, if you want to look like a moron, go right ahead. But, you must understand, that you will look like a complete idiot and your message will be lost no matter how relevant or important it is.

PUBLIC REVIEW: SANS Consensus Audit Guidelines

The SANS Institute today released for comment the “Consensus Audit Guidelines”(CAG).

From the press release:

[The purpose of the CAG] is to define the most critical security controls to protect federal and contractor information and information systems. The draft may be found at http://www.sans.org/cag/. The public review period runs through March 23, 2009.

Below is the proposed list of critical controls:

Automated Measurement and Validation Controls

  1. Inventory of Authorized and Unauthorized Hardware.
  2. Inventory of Authorized and Unauthorized Software.
  3. Secure Configurations for Hardware and Software For Which Such Configurations Are Available.
  4. Secure Configurations of Network Devices Such as Firewalls And Routers.
  5. Boundary Defense
  6. Maintenance and Analysis of Complete Security Audit Logs
  7. Application Software Security
  8. Controlled Use of Administrative Privileges
  9. Controlled Access Based On Need to Know
  10. Continuous Vulnerability Testing and Remediation
  11. Dormant Account Monitoring and Control
  12. Anti-Malware Defenses
  13. Limitation and Control of Ports, Protocols and Services
  14. Wireless Device Control
  15. Data Leakage Protection

Additional Critical Controls (not directly supported by automated
measurement and validation):

  1. Secure Network Engineering
  2. Red Team Exercises
  3. Incident Response Capability
  4. Assured Data Back-Ups
  5. Security Skills Assessment and Training to Fill Gaps

Security is one of those areas that many IT people ignore. There is a certain ambivalence about it. Since we are all SMEs in our own particular environments, it behooves us all to learn what we can about security. Even if you have a specific internal audit and/or security team that focuses on IT, ultimately, everyone in your organization is looking to you to be the cyber cop for your area.

For develppers, this will help you understand how your data flows through your organization. I know a number of developers who don’t know how many firewalls their apps traverse or if their network traffic is encrypted.

If you don’t know that, how then can you design apps to either take advantage of these features OR prevent unauthorized access to the data? You can’t always rely on the admin.

Admins, we know our bollocks are always on the chopping block for security. After a breech, there is always the “why didn’t the admin do …” If you’ve ever had a breech, you know what I mean. It is quite a sweaty time, to say the least. You can’t always rely on the developer.

The bottom line is, if you don’t have a firm grasp on your firm’s IT security, these guidelines are a great primer to expose you to what you need to know.

Lastly, they are looking for worldwide input. Don’t think that because you’re in the EU, India, NZ or elsewhere that you can’t contribute.

TOP 25 Most Dangerous Programming Errors

Last week, the CWE and SANS published a list of the top 25 most dangerous programming errors.

Good stuff … take a look.

In case you don’t know, the Common Weakness Enumeration (CWE) is a Software Assurance strategic initiative sponsored by the National Cyber Security Division of the U.S. Department of Homeland Security.

The SANS (SysAdmin, Audit, Network, Security) Institute is a cooperative research and education organization. It is the largest source for information security training and certification in the world. It develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet’s early warning system, Internet Storm Center.