Feeds

Spicing up desktop management with social networking

Bringing it all together

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Sysadmin Blog Social networking, at least that which involves computers, has evolved greatly over the past few decades. The internet has allowed many new forms of self expression and interpersonal communication to flourish. By today’s modern standards of social networking, I’m positively a luddite. I simply don’t do social networking.

I still hang out on IRC, and believe it or not I can still be found on Usenet. I have a couple of instant messenger accounts, and I am often found on the forums of technology sites. These are all forms of 'social networking', but they are not the first things most people think of when they hear the term.

Back towards the turn of the century, when these 'blog' things were popping up all over the place like weeds, I could never see myself having one. What could I possibly have to say that anyone would actually want to read? Even if I could produce useful content, would I want to associate myself with the rest of the pap that you generally find on blogs? Thanks to prejudices formed in the early years of these technologies, that I am now penning blogs both here on The Register and my own personal website is a reality that I am still digesting.

Not long after the first web browsers introduced the internet to mainstream users, the first of what would be considered modern social network sites and applications started popping up. Social networking started with sites like Six Degrees, and few of them ever truly caught on.

Someone then took the ideas behind these sites and married them to the concept of blogging. This begat horrors of the internet such as Myspace. Soon we had Facebook and Twitter. If Facebook didn’t kill the likes of Myspace then Twitter surely did. Facebook, shockingly, seems to have become a legitimate communications medium. The percentage of people who use it regularly still boggles my mind. People are using Facebook as a webpage for their business, a political tool, interpersonal communications and more.

If Facebook attracted the bulk of modern “legitimate” social networking usage, Twitter got the pap. While there is some signal on Twitter, the unfortunate majority of it is simply noise. What neither Facebook nor Twitter offer much of is useful content. The nearest thing until very recently that could be considered a form of social networking and actually produced some form of usable content are the old throwbacks: Usenet, forums and blogs.

So why exactly am I giving everyone a lesson on social networking when I am supposed to be producing something close to usable content here on this blog? Amazingly, the evolution of social networking has become directly related to my current IT project. This is the third article in my quest to find decent desktop management software that would allow me to do lights out management (LOM) of my network without costing me a significant fraction of my yearly budget.

That LOM setup would allow me to reduce my power usage and with it my cooling requirements. This would buy me time until the new air conditioner arrives, and lower long-term running costs to boot. Where it all ties together is with an application I have rediscovered called Spiceworks. The connection may seem tenuous at first, but the instant you sit down and take Spiceworks for a spin you will understand. In addition to being a network management tool of exceptional use to small and medium enterprise (SME) systems administrators, it may be one of the only modern social networking sites (other than LinkedIn - perhaps) to actually contain useful information about something.

From a technical standpoint it is an amazing program. You add in appropriate credentials and run a scan of your network. It will identify virtually everything on your network. Port scans, logging into basic services or using supplied credentials to gather all sorts of information. It will count installed applications, free space, warranty information, parse logs for errors and much more. It will even probe your active directory to make itself aware of systems not part of the scan range you gave it, and periodically re-run scans on a schedule you provide. After every scan, it will report any and every abnormality it discovers back to you.

Internet Security Threat Report 2014

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.