Conference weeks in St. Louis

It is wall-to-wall conferences for the next couple of weeks here in St. Louis. There are various events that you might want to attend, some free, some with small fees. A few I am actually speaking at too!

  • Association of Information Technology Professionals, national student conference. I am speaking at this conference on Friday, providing two sessions (Going beyond Facebook: Social Collaboration Tools to Kickstart your first job and  What every student needs to know about LinkedIn to get your first job)
  • ITEC, Put on by Bill Sell, this has a great lineup of IT speakers on Wed.
  • Geek Day, an annual gathering of virtualization specialists and vendors on Thursday
  • Missouri Invest Midwest, an annual conference that has short pitches from start-ups in a wide variety of fields on Wednesday and Thursday
  • Global Communications Summit, at St. Louis University. I will be speaking (Making sense of social networking strategies for marketing professionals) on March 30th at this conference

I will also be moderator of this ITexpertVoice.com Webinar on Windows 7 Migration Options and Tools on April 13th, if you are interested, please sign up and join us.

Simple online database collaboration

If you have to jointly author a spreadsheet with a colleague, what is the first thing that you do? Email it back and forth. This can be painful, particularly as you try to keep track of your partner’s changes and hope the emails transit back and forth across the Internet. Add a third or fourth person, and things get worse. Luckily, there is a better way, and a number of providers have stepped up with tools to make spreadsheet sharing a lot easier than sending attachments.

I take a look at several of these services for an article published in ITworld here.

Why I love archival research: Lewis Hine and Rushdie

My college experience was perhaps a bit different from many of you. I was very lucky to be able to design my own curriculum around what turned out to be an entire year’s worth of independent study classes. Perhaps that set the tone for my working life, where much of my day is spent doing research and writing articles and designing my presentations.

I thought about this during the past week when I read in the NY Times about the digital archives of novelist Salman Rushdie that is being curated at Emory University in Atlanta. Rushdie was fanatical about keeping digital copies of all of his work product and donated his older Macs to the university several years ago. Since then, a team of computer programmers has been working on ways to make it more accessible to researchers.

What does this have to do with my own education? One of my independent classes was to research and create a series of photographs that mimicked well-known photographers of the past. One of them was Lewis Hine, who created a series of images of underage factory and mill workers around 1910 before there were any child labor laws. Some of his work is kept at the Library of Congress. As part of my independent study, I went to DC and got to see his pictures firsthand.

It was fascinating to be able to walk into the archives and within a few minutes have these old photos in front of me. And what was even better was that for a small fee, I could have the government make contemporary prints from some of the original negatives. I thought, how cool can this be? It was then that I got interested in what archivists do. And even cooler, I can link to it on the Web now.

Fast forward to today. Now we have to deal with what archivists call born digital works. This means that instead of paper copies, we have to deal with preserving computer files that were never or infrequently printed out. My Hine negatives and prints aren’t an issue – other than their deteriorating condition, you can still take a 4×5 negative and print it out on modern enlargers and so forth.

But there is a problem if we are trying to view the records of someone who creates digital content so that later historians and even the general public can go back and examine them. This is where it gets tricky, and we run into issues.

As an IT person, you initially might say: this is simple, just make bulk copies or image the hard drives and you are done. But wait. Some of the programs are no longer available. Newer versions don’t necessarily read very old file formats. As an example, try buying a version of a 1990s era software program today. And even if you can find it on eBay or in your attic, it might be difficult to run it on modern hardware.

That is the situation that the Emory archivists found themselves in when they got Rushdie’s old Macs. But through some hard work, they have been able to reconstruct things and allow us to become immersed in the complete environment that Rushdie was working in at the time he was writing his books. You can view the same files, work through the revisions and edits that he made, and be completely brought back to the past, care of some very clever programming tricks.

You can read more about what the team of programmers and archivists have done to set up this exhibit and what they are doing with all the materials that Rushdie donated to the library here.

What struck me was that I doubt many of us could even attempt to recreate the computing environments that we have had over our careers, let alone last year. Granted, it isn’t like some university is knocking on my door wanting my Model 200 Radio Shack, not that I have kept it or many of the other computers that I have used over the past 30 years. Nor would I want to turn over my old PCs and Macs, even if I had them, to the world to see what is all on them. But still. I do have copies of many of my previous’ years work on my hard drive. Sometimes I actually do search for something that I wrote and even find it, but most of the time these files remain untouched. I took a quick look at what I have been carting around with me digitally speaking and it is a real mess. I have presentations in software that is no longer in my possession, documents in Xywrite (which for the most part are text files that I can still open and read), and older versions of accounting software (DOS QuickBooks, anyone). Speaking of DOS, trying to decode an eight letter file name into a meaningful article is an exercise in frustration. I can’t imagine what an archivist would have to deal with if I am having problems.

I will have more to say about this for an article I am writing for Baseline magazine. In the meantime, I am enjoying looking at Hine’s photos again, you can find many of them easily online. And I don’t have to leave my office either. This Web thing is pretty cool.

Markmonitor Brandjacking Report: 2009 in review

While 2009 was a year of economic downturn for most legitimate businesses, fraudsters worked overtime to trap unwary Internet victims.  In this edition of the Brandjacking Index, we look at the overall trends for 2009. We found that con artists are exploiting the economy and sharpening their targets at well-known brands for their own profit. Cybersquatting continues as the tool of choice and there was a big increase in phishing attacks last year, particularly targeted at financial services businesses.

You can download the report here (registration required).

ITexpertVoice: Prowess SmartDeploy Eases Windows 7 Migration

SmartDeploy is a software tool that converts virtual machine disk files into Windows Image files that can be used to deploy new OSs, including Windows 7, across an enterprise. This screencast demonstrates its features. SmartDeploy is easier to use than Microsoft’s WAIK, and Kbox, both of which we reviewed earlier on ITexpertVoice.com.
You can watch the video here:
http://itexpertvoice.com/home/prowess-smartdeploy-eases-windows-7-migration/#more-1781

ITexpertVoice: Prowess SmartDeploy Eases Windows 7 Migration

SmartDeploy is a software tool that converts virtual machine disk files into Windows Image files that can be used to deploy new OSs, including Windows 7, across an enterprise. This screencast demonstrates its features. SmartDeploy is easier to use than Microsoft’s WAIK, and Kbox, both of which we reviewed earlier on ITexpertVoice.com.
You can watch the video here:
http://itexpertvoice.com/home/prowess-smartdeploy-eases-windows-7-migration/#more-1781

Warnings about Wifi-enabled air travel

I have been on a few planes in the past couple of weeks that are Wifi-enabled. American has created an entirely new opportunity for identity thieves here, and while the opportunity to surf and email at 30,000 feet is tempting, count me out for those that will become frequent users.

The problem is that most people get lost in the wonderfulness of the Web and tend to forget that their seatmates can watch every move, see every keystroke (it doesn’t take much to follow along, especially at the speed that many people type), and collect all sorts of information. By the end of one flight I was on, I had Larry (not his real name) the HP sales rep’s Amazon account, read several of his emails, got to see his new sales presentations that HP corporate sales office had sent him, figured out that he was a recent hire as he was checking HP’s Intranet to understand some corporate travel policies, found out who his clients that he had just visited were, and more.

Now, I wasn’t really paying that much attention. I was tired, and just wanted to be left by myself for the trip. And I think we exchanged maybe ten words between us all told. But if I really wanted to do some damage, I could be all over Larry’s accounts by now (he had some nice taste from what I could see he was looking for on Amazon, too).

Yes, people have been using laptops on planes for years. I used to do it all the time, back when the middle seat was rarely occupied and you didn’t have to almost disrobe to get to the gate. But those days are almost as much part of history as calling the people that worked on planes stews. The difference is now that we have Internet piped directly to the seat, people are free to go anywhere and everywhere, and where they go are places that are critical to their life. I wouldn’t be surprised if someone was doing their online banking in-flight.

So people, if you are going online up in the air, get a privacy filter for your laptop so that no one else can see your screen. They cost about $30. This isn’t complex technology: it has been available almost as long as Windows has been around. And while you are at it, dim your screens to save on power anyway (Larry had one of those nifty power-packs to boost his battery, too). Or better yet: don’t work on anything important on a crowded plane – and these days, what other kinds of planes are there? Bring a book or watch a movie if you must be immersed in your electronic cocoon.

I am reminded of a story from my early days as a reporter for PC Week, back in the late 1980s. We were very scoop-oriented, and would always try to get information from the vendors through all sorts of means, some of them probably unethical or at least uncomfortable in the light of the present day. One of our reporters was having dinner with her boyfriend (now husband) at a quaint and cozy Cambridge Mass. restaurant, and overhead two businessmen at the next table gossiping about work. What was unusual was they were speaking rapid German, and both were working for Lotus Development, at the time a powerhouse spreadsheet player. They were in town to discuss the company’s future product plans. Trouble was, my colleague spoke German fluently, and got a couple of scoops that were published the next week in the paper. No one knew who the source of the leak was.

Remember loose lips sink ships, the World War 2 posters put up by the government? We need something similar on Wifi-enabled planes. Be careful out there people. You never know whom you are sitting next to.

Datamation: Three Steps to High Availability Virtual Machines

As enterprises become more involved in virtualizing their servers, they are finding that virtualization can deliver more than just better utilization of their computing resources. But the potential risk for downtime can increase substantially. The value of one particular physical server goes up as it carries more and more virtual machines (VMs) running on it. This makes having a failover solution more important.

You can read the entire article that was posted today here in Datamation.com

ITExpertVoice screencast: Using Windows AIK to Automate Windows 7 Deployment

If you are looking for a way to do massive Windows 7 migration, Microsoft has updated its own tool sets for this purpose, called the Windows Automated Installation Kit or WAIK. It has a lot of new features for both Windows 7 and Windows Server 2008 R2. This screencast shows how it works:

http://itexpertvoice.com/home/using-windows-aik-to-automate-windows-7-deployment/