Monday, January 27, 2014

mafia Encrypted Messaging Lessons

As I wrote in past, I used to help Police work in specific investigations where a mix of knowledge between the military and information technology was required.
Encryption wasn't born with computers. It is an ancient discipline and one of the best lessons of my professional life comes from a 72 years old, almost illiterate, mafia  boss.

Previous investigations had shown that this person had been able to give orders to his organization when he was serving a life sentence under the strong controls provided by prison in solitary confinement rules of Italian Article 41-bis prison regime.

General De Gaulle at BBC Radio Londres

Please continue reading this post on my new wordpress site.

Friday, January 24, 2014

Capacity Planning Basics

This is the first, and I hope not the last, of several posts that I want to write about the activity that I consider the "state of art" for a System Administrator: the capacity planning.
As every activity that tries to define the complex systems behavior in the future, capacity planning requires deep knowledge,  discipline, science, a great experience and a bit of luckiness. Is not easy to find all these stuff in just one person, especially the last. So, in every company, there are many programmers, some SA's and just few capacity planners.

Please continue reading this post on my new wordpress site.

Sunday, January 12, 2014

System Administration and Crime: The Really Hidden Data

Having competences both in system administration and in the military is sometime useful. Especially when I'm involved in Police operations to discover systems used by our fellow system administrators working for the dark side of the Force.
Yes, the first interesting thing is that crime uses Information Technology at the highest level not only to stole data but also to manage information about its business. If you still imagine mob guys acting like James Gandolfini in "The Sopranos" you need to update your eeprom. The lower level of crime organizations, people carrying guns and shooting each other, is only the tip of the iceberg. The real danger are people wearing tuxedo.

Please continue reading this post on my new wordpress site.

Sunday, January 5, 2014

MASELTOV: A System Administrator Helping Migrants

IT is all about data. That's definitely true. But, what about people? I'm not talking of wealthy customers ready to get in line for a couple of days just to be the first silly dude owning the last gold plated smartphone model. This kind of people are well placed in the middle of the heart of our companies. That's the business, baby. The business! And there's nothing you can do about it. Nothing!
Sometimes it is sad to think that we spend so more time to assure five nines uptime in order to let someone update his/her status on facebook to let the whole world know of his/her new toy.

Please continue reading this post on my new wordpress site.

Thursday, January 2, 2014

Sending Our Probes Around: The Intelligent Transport System

As we already wrote, IT is all about data. Mining data is like to extract gold with the difference that data are useful, gold is simply rare.
The whole world is a data mine, not only Internet, books or documents. Please, pay attention about the fact that sources of data and the media used to share information are often mixed up and this is really a great logical pitfall. The data (well collected and artfully analyzed) describe phenomena, any kind of media only shares the information. When the media start creating facts, we became all George Orwell characters.

Please continue reading this post on my new wordpress site.