Skunk Works

Skunk Works


<<The nickname Lockheed employees gave to their organization is an adaptation of the name for the ultra-secret high security “Skunk Works” moonshine operation featured in Al Capp’s widely popular comic strip Li’l Amber, which ran from 1934 to 1977.>>

— Smithsonian Air and Space Museum

The name since became widely used for elite research teams especially in the hi tech industry.

Panel from the Smithsonian
Quote from the Air and Space Museum

Cloud Computing in the Midmarket

Midsize businesses are realizing the power of cloud computing–a flexible, cost-effective and proven platform for delivering IT services and products over the web. However, they are also facing tighter budgets, fewer resources and more competition. Now, more than ever, there’s a real need to achieve greater efficiency at lower cost–while also minimizing the risks.

Utilizing cloud-based solutions rooted in robust security and built on advanced protection mechanisms, usage monitoring and cutting-edge encryption, IBM® and NewPush can help turn the huge potential of the cloud into reality.

The following IDC white paper help assess the options offered by cloud computing for the mid-market:

IDC Cloud Assessment

Ten Rules for Success

Here are ten rules for success from Investors Business Daily by way of my friend Mike Linett, President of Zerowait:

  1. How You Think is Everything. Always be positive. Think Success, not Failure. Beware of a negative environment.
  2. Decide upon Your True Dreams and Goals:   Write down your specific goals and develop a plan to reach them.
  3. Take Action.   Goals are nothing without action .
  4. Never Stop Learning:   Go back to school or read books. Get training & acquire skills.
  5. Be Persistent and Work Hard:   Success is a marathon, not a sprint. Never give up.
  6. Learn to Analyze Details: Get all the facts, all the input. Learn from your mistakes.
  7. Focus Your Time And Money:   Don’t let other people or things distract you.
  8. Don’t Be Afraid To Innovate:   Be different. Following the herd is a sure way to mediocrity.
  9. Deal And Communicate With People Effectively:   No person is an island. Learn to understand and motivate others.
  10. Be Honest and Dependable: Take Responsibility, otherwise 1-9 don’t matter.

How to uninstall IBM Lotus Notes client from the Macintosh on OS X

You can uninstall IBM® Lotus® Notes® by dragging from /Applications to the trash. This preserves user data.

You can also uninstall Notes using the uninstaller application supplied with the Notes install media. This preserves user data as well.

You can also uninstall Notes by dragging the following items to the Apple® Mac OS X® trash bin:

  • ~/Library/Application Support/Lotus Notes Data folder (“~” = user’s home directory)
  • ~/Library/Preferences/Notes Preferences
  • /Library/Receipts/Lotus Notes Installer.pkg
  • /Library/Receipts/Lotus Notes Installer_English.pkg
  • /Library/Receipts/xpdcoreinstaller.pkg

via IBM How to uninstall Notes client from the Macintosh – United States.

Intro to Statistics

Q: Could you recommend some books on statistics that would allow me to be more efficient at Business Analytics?

A: Below are some sites that you may find useful.

1)      The online copy of StatSoft, the Statistica textbook, a good resource, and it’s organized as a book.

2) UCLA has an online probability and statistics book, although it may be too elementary for you.

3)      Planet Math has a lot of very useful links.   If you scroll down the page for the URL below, you’ll see a link labeled 62-XX, Statistics.  (There are plenty of other valuable links too.)

4)      The Kahn has some excellent short videos on specific topics in statistics.  More generally, the entire site is very well regarded.

It you share the name(s) of the (text)book(s) that you’ve read I can identify which resources may be of the most use to you.  As I’m sure you’ve discovered, statistics fractures into a myriad of sub topics just like mathematics.  So narrowing this down will let me help you better.

How to query the Domino 8.5.3 LDAP database with ldapsearch

By default the ldapsearch utility is installed on the Domino server in the “bin” directory where all the other utilities are.  You need a local domain admin to bind a domino query on the local server, and you need its credentials. Here is an example:

su - dominouser
cd /path/to/domino/data
/opt/ibm/lotus/bin/ldapsearch -h -D "cn=adminuser,o=org" -w adminpassword uid="adminusershortname"

Creating an easy to deploy SSL certificate in PEM format

When ordering a secure certificate, most often one has to deal with the following files:

  • certificate key file (aka private key): .key
  • certificate request file: .csr
  • primary certificate file (issued by the CA): .crt
  • certificate chain (aka intermediate certificate, or sf bundle): sf_bundle.crt

As a result, when deploying to a web server, it is necessary to configure 3 files: the key, the cert, and the trust chain. However, a little known fact is that these can be combined in a “pem” file that holds all three. One may even include the trusted root certificate optionally. Here is how:

  • download your certificates (your_domain_name.crt) from your NewPush Customer Portal.
  • paste the entire body of each certificate one by one into one text file in the following order:
    • domain.key
    • domain.crt
    • sf_bundle.crt

    Make sure to include the beginning and end tags on each certificate. The result should look like this:

    -----END RSA PRIVATE KEY-----
    -----END CERTIFICATE-----
    -----END CERTIFICATE-----
    -----END CERTIFICATE-----
    -----END CERTIFICATE-----

The number of


sections will depend of the length of the certificate trust chain.

Domain Name Management / Domain Name Setup

  • How do I manage my domain?
    To manage you domain registered with TheNewPush, go to the domain management console and enter your domain name, user name and password.
  • How do I point a new domain to an existing site with cPanel?
    To create domain aliases with a cPanel control panel, you need to be the account admin, reseller admin, or overall admin of the cpanel machine. Once you’re logged in to the control panel, you can edit the properties of the site that you want ot point to, and add the new domain in the add-on domain section.
    If you are not hosting with a cPanel control panel solution, simply send an email to support.
  • How do I check that my domain is protected aginst fraudulent transfers?
    The feature that protects your domain against fraudulent or unautorized transfers is called “domain lock.” To check if your domain is protected by that feature, log on to our domain management tool with your domain name, user name and password, and verify the status of the lock. To make changes of the registrar lock status, please send and email to our support folks.
  • I get “ERROR:This name server is not authoritative for the given zone”
  • SYMPTOMI’m trying to add to a cPanel server so I can experiment a little bit before transfering the DNS from the old server to the new cPanel server, and I get an error.
  • EXPLANATIONYou get this, because you haven’t transfered control to the DNS servers of the cPanel server. The DNS server on a cPanel appliance detected that it doesn’t have authority on the domain.  You can adjust that setting in the advanced WHM preferences is you are the appliance administrator.

My domain name has been stolen and/or registered by a domain squatter

When your domain name is either stolen, or registered by a domain squatter, you need to first try to contact to current owner to give them a chance to relinquish the domain name without any further trouble. If that fails, we recommend that you contact an attorney that is specialized in trademark and domain squatting related topics. If you don’t have an attorney, and don’t know who to turn to, we recommend you contact Adam Lindquist Scoville, at Faegre & Benson LLP. Adam can be reached at +1-303-607-3667 or by email.

A lot of domain squatters do not know about recent changes in the law that Saul Ewing points out: Congress Authorizes Eviction of Domain Name Squatters Additionally, the trademark owner may recover compensatory damages, the costs of pursuing the action and attorneys’ fees. The Anticybersquatting Act further provides that a victim of cybersquatting can opt for statutory damages, rather than compensatory damages, which range from $1,000 to $100,000 per domain name, without any specific proof of economic injury.