How to manage smart people

uiweb: How to manage smart people. Over the years I've experienced many mistakes and successes in both how I was managed, and how I managed others. What follows is a short distillation of some of what I've learned. There's no one way to manage people, but there are some approaches that I think most good… Continue reading How to manage smart people

Structured search, phase two

Structured search, phase two. The next phase of my structured search project is coming to life. For the new version I'm parsing all 200+ of the RSS feeds to which I subscribe, XHTML-izing the content, storing it in Berkeley DB XML, and exposing it to the same kinds of searches I've been applying to my… Continue reading Structured search, phase two

Security Breach in U.S. Senate

Security Breach in U.S. Senate. Over at eLawyer Blog, Doug Simpson has some tough questions concerning the computer security breach in the U.S. Senate. [Netlawblog]

NIST releases paper on Risk Management Guide for Information Technology Systems

NIST releases paper on Risk Management Guide for Information Technology Systems. NIST has released a DRAFT paper on risk management for IT Systems. Published as Special Publication 800-30 Rev A its shaping up to be a good reference. Taken from the paper's introduction: An effective risk management process is an important component of a successful… Continue reading NIST releases paper on Risk Management Guide for Information Technology Systems

The new influencers

The new influencers. Can one person decide what the entire industry will buy and use? Anita Rowland points at one story (the Zamboni) where that seems to have happened. That's precisely why evangelists like me pay attention to influentials so much. The problem is, now EVERYONE is an influential. Why? Weblogs. That's why I subscribe… Continue reading The new influencers