Click on our Sponsors to help Support SunWorld
Letters to the Editor

Carole Fennelly's social engineering column is a hit, and one reader offers a suggestion for using idle CPU cycles that doesn't involve searching for aliens

SunWorld
August  1999
[Next story]
[Table of Contents]
[Search]
Subscribe to SunWorld, it's free!

Mail this
article to
a friend

'The human side of computer security,' Carole Fennelly, Wizard's Guide to Security

[Read Me]http://www.sunworld.com/swol-07-1999/swol-07-security.html

Praises for column on social engineering

This article is very well written and includes a lot of truths that most of us computer security folks do not take into consideration. Thank you!

Sincerely,
Addie McBride

More compliments

Hi Carole,

I thought that this particular article was brilliant. I am an avid follower of all matters relating to Internet security, and this one is a must-read.

Thanks again,
Ryan McCabe


Advertisements

'Database administration vs. security,' Edgar Saadi, Career Advisor

[Read Me]http://www.sunworld.com/swol-07-1999/swol-07-career.html

Ed was right on

I agree completely with Edgar Saadi in his response to the question of whether a sysadmin should pursue database or security administration. I am a DBA, and have been a security administrator in the past as part of my duties in deploying Web- and database-driven applications. In my humble opinion, security -- for both systems and networks -- is a facet of database/systems/network/applications design, and is a fundamental requirement for anyone deploying new systems. As a DBA, I've found it necessary to keep up on a broad range of skills, as no one can properly deploy a database without understanding the underlying (Unix) systems and the networks that connect that database to its users.

Good job!

Regards,
Michael Werneburg

'A busy computer is a happy computer,' Rich Morin, Silicon Carny

[Read Me]http://www.sunworld.com/swol-07-1999/swol-07-silicon.html

Condor flies

I enjoyed the article "A busy computer is a happy computer," but Rich Morin only discusses ad hoc programs which solve specific problems (like SETI@home). In contrast, a system called Condor allows organizations to make use of idle machines to run any program without having to change any of their source code. Instead of running a program in the background, you submit your program to Condor. Condor finds an idle machine on your network, runs your jobs there, and can even transparently migrate a running process to a different machine -- allowing you to move the work back to your own terminal when you come back from lunch! Condor is available as a free download at http://www.cs.wisc.edu/condor. Many companies, universities, and government labs are using Condor to scavenge for cycles for their own CPU-bound simulation, scientific, or engineering codes. I think many of SunWorld's readers would like to know how to use idle CPU cycles for their own programs, instead of solely searching for aliens.

Best regards,
Todd Tannenbaum


Click on our Sponsors to help Support SunWorld

What did you think of this article?
-Very worth reading
-Worth reading
-Not worth reading
-Too long
-Just right
-Too short
-Too technical
-Just right
-Not technical enough
 
 
 
    

SunWorld
[Table of Contents]
Subscribe to SunWorld, it's free!
[Search]
Feedback
[Next story]
Sun's Site

[(c) Copyright  Web Publishing Inc., and IDG Communication company]

If you have technical problems with this magazine, contact webmaster@sunworld.com

URL: http://www.sunworld.com/swol-08-1999/swol-08-letters.html
Last modified: