Yes, there is a difference! If you are making a comparison, choose than.
If you are not making a comparison, the correct word is then. Then shows time, sequence, or consequence.
TechRepublic featured a good article about “the 10 best practices for successful project management“. These steps give you a good outline of the things you should cover. Have fun reading!
Listening to the sales talk
Sales persons in regards to IT software always say it’s easy to install & use. Yet from experience we know that this is correct if it’s done without straying from the path they had in mind. This being a “default default default” installlation without attempting to do anything “custom”. I use the term “custom” here very lightly, as mostly deviating from using a superuser will turn the application useless. Yet sadly enough, such a default installation is something that never occurs, unless you want to accept the given application as an “island” within your IT environment.
Integration & Maintenance are key!
The biggest downfalls of software is situated within Integration and on maintenance. If the integration part isn’t advertised during the sales round, then you can probably forget about that. To be clear; integration meaning when you want to use the data from a given application into another.
Good maintenance is a bulletproof installation which will last for ages! To be honest, I have yet to see an external party who thinks about the long term and therefor set up a system that’s rock solid and won’t budge even if an earthquake occurred. Most vendors think merely in regards to sales, where an unstable application provides them with billable hours (“consultancy” or support services).
As every management book tells you, think about our TCO. What’s that first character stand for? TOTAL… being the costs you’ll accumulate over the years. Looking short term will give your a big increase on maintenance which should not be treaded lightly. F*cked up installations are dreadfull to manage and will (Note: WILL, not might) give you disruptions in your availability. How much is such a downtime worth to you?
Simply put; you can avoid common costing mistakes by being well prepared up-front. Yet here are three tips for sidestepping project estimating mistakes.
- Never assume anyting, get confirmation! : Often people assume that things get done, but in reality things have a different outcome. Realise that you don’t have a view on people’s mind and full agenda.
- Expect the unkown, prepare for it! : Each project will uncover unkown things. Being utterly prepared narrows down that risk, yet it doesn’t remove it…
- Write a clear scope! : Miscommunication is easy. Specify exactly what you will and won’t do.
- First “unlock” your ESXi
- Create your sshkey (puttykeygen or ssh-keygen) on the client machine
- Place the keyfile (for example : id_rsa.pub) from the client on the host
- Create “.ssh” directory on the root of ESXi device
- cat id_rsa.pub >> /.ssh/authorized_keys
- chmod 0600 -R /.ssh on the ESXi
A whopping 40% of the used hard drives on eBay contain easily recoverable personal data. Use the following guide to ensure your personal data never makes it out into the wild.
Pretty scary words ain’t it… but it’s not far from the truth! Read the article to tutor yourself about the matter as you probably don’t want anyone to invade your privacy.
The first step in securing your data is bolstering your understanding of how data is stored and what happens when you delete it. Many people operate under the impression that when they delete a file it’s gone, as though they had torn a page from a book. But the way most operating systems handle such events is by simply removing the little marker that points to the file. That’s more like having information written on a chalk board in columns, each column labeled with a header, and then simply erasing that header to signify that column is “deleted” and available for future writing over. Anyone who looks at the board can read everything written in the column, until someone starts writing over it.
- Go to the ESXi console and press alt+F1
- Type: unsupported
- Enter the root password
- At the prompt type “vi /etc/inetd.conf”
- Look for the line that starts with “#ssh” (you can search with pressing “/”)
- Remove the “#” (press the “x” if the cursor is on the character)
- Save “/etc/inetd.conf” by typing “:wq!”
- Restart the server. Many guides say that you just have to restart the services, but this fails…
Login through ssh after the reboot and get the following:
login as: root
Tech Support Mode successfully accessed.
The time and date of this access have been sent to the system logs.
WARNING – Tech Support Mode is not supported unless used in
consultation with VMware Tech Support.
Huddle is a network of secure online workspaces where you and your team, your customers (even your friends) can come together to work on files, plan projects and collaborate on ideas. Each individual workspace contains files, notes, reminders and information on your project. You can even manage multiple ongoing projects across different teams with huddle.
I came across huddle when looking for a collaboration tool. I found it a very decent solution for groups with a flat structure. You can do the most basic file sharing things at a reasonable price (freemium model, with a fair enterprise pricing model).
Check out an article at Lifehacker: “How to recover deleted files with free software”
Ack! The computer ate my term paper! We’ve all been there at some point. You delete an important file, somehow it skips your Recycle Bin altogether, and for all practical purposes, it’s disappeared into the ether. But before you hit the big red panic button, there’s a very good chance that your file is still alive and kicking somewhere on your hard drive—you just need to know how to find it. With the right tools, finding and recovering that deleted file can be as simple as a few clicks of your mouse.