Issue No. 01 - January/February (2007 vol. 9)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2007.19
Grabbing Tiger by the Tail
Mac OS X: The Missing Manual, Tiger Edition. For Mac users running Mac OS X 10.4, better known as Tiger, this book serves as a guide in getting familiar with the new operating system.
The Tiger Edition thoroughly explores the latest features for the Mac OS. Which ones work well and which do not? What should you look for? This book tackles Spotlight, an enhanced search feature that helps you find anything on your computer; iChat AV for videoconferencing; Automator for automating repetitive, manual or batch tasks; and the hundreds of smaller tweaks and changes, good and bad.
This book is ideal for every user, including people coming to the Mac for the first time. The guide offers an introduction that demystifies the Dock, the unfamiliar Mac OS X folder structure, and the entirely new Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, and a tutorial for Safari, Mac's own Web browser.
Readers can learn to configure Mac OS X using the System Preferences application, keep the Mac secure with FileVault, and learn about Tiger's enhanced firewall capabilities. This manual also offers an introduction to the Terminal application for issuing basic Unix commands.
Chapter one starts with logging into the Mac to organizing documents to setting system preferences and troubleshooting the Mac and everything in between including a chapter titled "Hacking Mac OSX." The book moves through its chapters in a chronological order.
All of the applications that come with Tiger are covered, including Dashboard, creating widgets, Spotlight, Apple remote desktop, Sherlock, iTunes, iSync, iChat, .Mac, Safari RSS for Internet feeds, Automator, iDVD, iChat, iPhoto, iCal, iMic, iMovie, iDisk, iSync, iTunes, Apple Script, and Image Capture.
Creating user accounts is covered along with file and directory permissions, configuring the user environment and user preferences, passwords and other elements of security.
The books also covers the various aspects of networking including Apple Talk, Rendezvous, Bonjour, IP configuration, Bluetooth, firewire devices, hubs, firewalls, terminal, SSH, and routers.
There is an occasional "Nostalgia Corner" sidebar that points out the "old way things were done" and the "new way things are done." The "Gem in the Rough" sidebars explain potentially useful, but probably not obvious, features of OS X. There are also "Power User Clinic" sidebars for the true OS X geeks.
O'Reilly, 2005, ISBN 0596009410, 847 pp., $29.95.
The Mac User Group Resource Site
The Macintosh User Group (MUG) Center is a collection of resources available for MUGs, their members, and their leaders. There are many great Mac sites out there, and more than one with a user group theme, but no other that is a focal point for all of the available resources.
The MUG Center features how-to articles, lists, ideas, and solutions. The site functions as a portal, with links to a wide variety of resources, articles, and essays, all focused on the MUG community. News and updates are also provided.
MUGS range from a few friends who get together to share experiences and expertise, to organized community gatherings, to global organizations dedicated to Apple Computer and the Macintosh.
Community Groups center around a geographic location such as a town or city, and membership in community MUGs is usually open to the public. This is the single largest MUG category.
Government and Corporate Membership MUGs are usually restricted to members of the entity involved. These MUGs may be officially sponsored by their parent organization, or they may be unofficial groups that have the same parent with little else in cpmmon.
K-12 and Higher Education MUGs, although usually oriented towards education and teaching-related topics involving the Macintosh, can also be unofficial, unsponsored MUGs that have the school or university in common. Campus MUGs fall into this category.
Online MUGs exist via email and the Internet. A few general-interest online-only groups exist, but most are focused on a product, profession, or specialty, and membership is limited by the focus.
Professional MUGs, limited in scope, focus solely on Macintosh use within the indicated profession—such as doctor or dentist. Membership may be open or restricted, but the nature of the group limits the interest of potential members.
Emerging Telephony Conference
27 Feb. – 1 March 2007
ETel compares and contrasts Web telephony technology, business, and culture, articulating how they conspire and inform consumers, creators, and purveyors. ETel gets rid of the hype and "conventional wisdom" of the past, presenting a whole new way of looking at the industry for newcomers and established players alike. Explore strategies for taming disruption and exploiting opportunities created by Web telephony innovations in a spirited, collaborative atmosphere at ETel 2007.
ETel will feature one-on-one interviews, keynote-level talks, panels, and short presentations, all with time for audience participation and Q&A sessions.
Open Source Software and Hardware/Open Telephony
Asterisk and Skype are two emerging sources of open telephony. Open source platforms have been created and are being implemented by hackers and businesses alike. The Open Source Software and Hardware/Open Telephony session will explore what hardware is being invented and what tool kits and technologies exist that can fuel new work and ideas for business and projects. Mobile Linux and open source technologies for switching and PBX will receive strong emphasis as foundation platforms for innovation.
Sarbanes Oxley is leading to the documentation of everything. On-demand search on voice is in its infancy. There will be innovation as well as and new privacy concerns. The Voice as Data session will look at some of the startups and research projects investigating what can happen when you can Google conversations.
Wireless Mobility and Mobile Telephony
The Wireless Mobility and Mobile Telephony session will focus on the wireless spectrum. When every device is net connected, what next? What are you doing with this capability? In many parts of the world mobility is defacto and there are growing opportunities for cheap, ubiquitous, high-speed wireless access with a rise in old spectrum being deregulated for new usage.
Ethnography, Culture, and People
The Ethnography, Culture, and People sessions will look at how activists, community groups, gamers, and do-gooders are employing IP telephony to do the right thing. Cultures and societies are the best labs for demonstrating new and novel uses for communications technology. What works with iMode in Japan is anathema in the US. A quick ring and no answer is a (cheap) sign of affection in Italy. This session will present ethnographic research that will help in creating new products and ideas based on unique insights into how people behave with technology.
Mac OS X Sys Admin
Apple Training Series: Mac OS X System Administration Reference, Schoun Regan. This reference provides information on Mac OS X and Mac OS X Server's technical architecture. System administrators, IT professionals, and Mac enthusiasts can learn to customize and tune Mac OS X and Mac OS X Server directory services; integrate Mac OS X, Mac OS X Server, and other Apple technologies within a multiplatform, heterogeneous environment; design and maintain local area and wide area networks; and secure Mac OS X and Mac OS X Server against a variety of potential attacks.
The book covers a range of topics, from file system structures and Directory Services integration to security best practices. Certified by Apple Computer and keyed to the learning objectives of the Apple Certified System Administrator exams, this book is a supplement to Apple's own training classes and an in-depth and engineers.
This technical reference provides details needed to become a Mac OS X Server administrator. Exercises help readers understand concepts that underlie Mac OS X functionality. Illustrations help explain abstract concepts. Chapter review questions summarize what readers learn.
Peachpit Press, 2006, ISBN 032136984X, 848 pp., $59.99.
A Pear to Get the OS X on a PC
Running Mac OSX on Windows: Short Cut, Wei-Meng Lee. In this eBook, available at http://www.oreilly.com/ catalog/runningmacpc/#top, the author explains how to install Mac OS X on your PC using PearPC, an open source emulator that emulates the PowerPC architecture. Despite Apple's move to Intel's CPU architecture, if you want to run the Mac OS X operating system on your Windows PC, the only logical way to do it is to run it in an emulator. In this Short Cut, readers will also learn how to configure additional settings to make Mac OS X functional.
Popular virtualization software such as Virtual PC and VMware have long been on the market, but none support running Mac OS X on Windows. PearPC fills the void. It emulates the PowerPC architecture by using a just-in-time emulator to translate PowerPC code into x86 code. The PearPC installation takes time, but readers who follow the instructions in this Short Cut will soon have Mac OS X running on Windows.
For a long time, a lot of Windows users have been clamoring for the opportunity to run the Mac OS X operating system on their Windows PCs. Since Mac OS X was designed to run on a different CPU architecture (PowerPC), running Mac OS X directly on Intel's CPU would not work. It wasn't until recently that PC users saw a ray of hope, when Apple announced that it was moving to Intel's CPU architecture and would hence port Mac OS X to run natively on Intel's x86 CPU architecture. However, the joy was short-lived, as Mac OS X can still run properly only on Apple's customized hardware, not commodity PCs that run Windows.
This open source project, PearPC, makes it possible to run Mac OS X on Windows. PearPC is an architecture-independent PowerPC platform emulator. It is released under the General Public License—a freely used free software license.
O'Reilly, 2006, ISBN 0-596-52843-4, 48 pp., $7.99.
Tidbits: Mac Community
This newsletter is published by author Adam Engst and is geared toward Mac afficionados. You'll find everything from current events in the Mac world to product reviews and helpful tips. Archives date back to April 1990, which make TidBits one of the longest running mailing lists on the Internet.
The last issue of December of this free email and Web publication covering the Macintosh Internet community contains an article on the release by Adobe of a public beta of Photoshop CS3. There is also coverage of a new version of Color It! An interview with Ben Rudolph of Parallels explores the company's virtualization software, and there is also a review of the Sony PRS ebook reader.
Translations of the site are available in Dutch, German, and Japanese; a sidebar of links contains an option to subscribe, in various formats, to the newsletter.
Photoshop World Conference & Expo
4–6 April 2007
Photoshop World explores techniques for Adobe Photoshop and tips from a team of instructors
This conference brings together photographers, designers, artists, educators, motion graphics designers, and Photoshop users of every kind for a three-day Photoshop event.
More than 80 classes will be taught by Photoshop instructors including Scott Kelby, Ben Willmore, Deke McClelland, Bert Monroy, Dave Cross, Jack Davis, Jim DiVitale, Vincent Versace, Jeff Schewe, Moose Peterson, Katrin Eismann, Julieanne Kost, George Lepp, Dan Margulis, Michael Ninness, Richard Harrington, Eddie Tapp, Terry White, David Ziser, and Jack Reznicki.
Training tracks that concentrate on Photoshop for digital photography, creativity, productivity, motion graphics, the creative suite, graphic design, print/prepress and inspiration.
Eleven half-day pre-conference workshops are available.
The Tech Expo will feature products from companies such as Adobe, Wacom, Canon, Microsoft, and B&H Photo.
Attendees can talk face-to-face with Adobe's own Photoshop product development team at Adobe's booth and show floor theater.
One of the featured pre-conference seminars is Photoshop Channels and Masks. Masking is the art of creating detailed, organic selection outlines to generate photorealistic layered compositions and precisely directed image enhancements. Excerpted from the instructor's 20-hour video series, this half-day event covers masking from alpha channels to Ziv, with a smattering of everything between. Topics include the Color Range command, the quick mask mode, alpha channels, LZW compression, selection tricks, blend modes, luminance blending, layer masks, knockouts, luminance and density masks, blue screening, and Calculations. The seminar will mask highlights, shadows, hair, fabric, glass, flame, smoke, and even a goldfish.
SQL Server 2005
Foundations of SQL Server 2005 Business Intelligence, Lynn Langit. Just as many businesses can benefit from business intelligence (BI) to stay competitive, IT professionals should give consideration to developing BI skills to remain a valuable asset for this segment of information technology. This book, set for publication in May 2007, helps readers understand BI, and it is specifically for those who work with SQL Server 2005.
This book explains how to use Analysis Services, SQL Server Integration Services, SQL Server Reporting Services, and SQL Server Data Mining. It also describes practices for implementing end-to-end BI solutions in small, medium, and large business environments. And it provides information about integrating BI with various client tools, including Excel, Business Scorecards, Proclarity, and SharePoint Portal Server. Developers, end users, and even managers will be interested in this guide to SQL Server 2005 BI. Highlights include coverage of all aspects of the SQL Server 2005 BI tool suite; special focus on features to use—and avoid—to cleanly scale BI solutions and real-world best practices. This book is suitable for developers and users with any level of BI experience.
Apress, ISBN 1590598342, 450 pp., $49.99.
Guide for Data Storage Methodologies
Data Lifecycles: Managing Data for Strategic Advantage, Roger Reid, Gareth Fraser-King, and W. David Schwaderer. The authors believe that businesses rely almost entirely on applications and databases, causing data and storage needs to increase at astounding rates. The authors then believe it is therefore imperative for a company to optimize and simplify the complexity of managing its data resources.
Plenty of storage products are now available, however the challenge remains for companies to manage their storage assets and align the resources to the various departments, divisions, geographical locations, and business processes to improve efficiency and profitability. This book, which is set for publication in February, identifies ways to incorporate an intelligent service platform to manage and map the storage of data. The authors give an overview of the trends and technologies in storage networking and cover issues such as world-wide compliance.
The authors provide a guide to data and storage methodologies, processes, technologies and compliance issues; address the need of an encompassing intelligent data and storage management platform for modern businesses; give an overview of the latest data technologies and concepts such as utility computing and information lifecycle management; define and describe lifecycle management and strategies to ensure growth of critical business data; show how to reduce the total cost of storage ownership and provide rapid return on investment; and help customers make decisions directed toward the purchase of storage tools and storage management solutions.
Wiley, 2007, ISBN 0470016337, 268 pp., $100.
Gantthead.com is a site that aims to make IT project managers more successful. Gantthead is the experience bridge between a community of IT project managers.
This page is actually a subordinate area of information to the main site—gantthead.com—which also contains links to other areas of interest to IT project managers.
This business intelligence section contains links to features, book reviews, and a grouping of "channels," each with its own subsection of articles. Channel topics include one-to-one marketing, architecture, BI delivery, case studies, data mining, data quality, data visualization, enterprise management systems, ERP integration, future of BI, methodology, professional organizations, publications, security, tools, and training.
The Discussions section contains a message board to exchange dialogue with other IT professionals.
The Processes section contains an extensive description of one aspect of the business intelligence process. For example, currently, the Processes section explores the data warehouse process. It even contains a graph depicting the process flow. Other processes available on the site include application solution, business re-engineering, distributed application development, emergency fix, information engineering, information strategy planning, and maintenance. A full listing of the various processes is available at http://www.gantthead.com/ process/processMain.cfm.
Some content requires free registration to access.
Data Mining in the Business Model
Data Mining for Business Intelligence: Concepts, Techniques, and Applications in Microsoft Office Excel with XLMiner, Galit Shmueli, Nitin Patel, and Peter Bruce. Readers can learn how to develop models for classification, prediction, and customer segmentation with the help of this book.
This book, which was developed from a course taught at the Massachusetts Institute of Technology's Sloan School of Management, and the University of Maryland's Smith School of Business, uses real data and actual cases to illustrate the applicability of data mining intelligence to the development of successful business models.
Featuring XLMiner, the Microsoft Office Excel add-in, this book lets readers follow along and implement algorithms at their own speed, with a minimal learning curve. In addition, students and practitioners of data mining techniques are presented with hands-on, business-oriented applications. An abundant amount of exercises and examples are provided to motivate learning and understanding.
The book provides both a theoretical and practical understanding of the key methods of classification, prediction, reduction, exploration, and affinity analysis; features a business decision-making context for these key methods; and illustrates the application and interpretation of these methods using real business cases and data.
This book helps readers understand the beneficial relationship that can be established between data mining and smart business practices.
Wiley-Interscience, 2006, ISBN 0470084854, 279 pp., $99.95.
Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications, Larissa Moss and Shaku Atre. The authors provide a methodology for topics ranging from strategic planning to the selection of new technologies and the evaluation of application releases. The book is a visual guide to developing a BI decision-support application.
This book outlines a methodology that takes into account the complexity of developing applications in an integrated BI environment. The authors walk readers through the process—from strategic planning to the selection of new technologies and the evaluation of application releases. The book also serves as a single-source guide to the best practices of BI projects.
Part 1 steers readers through the six stages of a BI project: justification, planning, business analysis, design, construction, and deployment. Each chapter describes one of 16 development steps and the major activities, deliverables, roles, and responsibilities. The authors express all technical material in tables, graphs, and diagrams.
Part 2 provides five matrices that serve as references for the development process charted in Part 1. Management tools, such as graphs illustrating the timing and coordination of activities, are included throughout the book. The authors conclude by offering the reader a list of dos, don'ts, tips, and rules of thumb. The accompanying CD-ROM includes a complete, customizable work breakdown structure.
Both the book and the methodology it describes are designed to adapt to the specific needs of individual stakeholders and organizations. The book directs business representatives, business sponsors, project managers, and technicians to the chapters that address their distinct responsibilities. The book's framework allows organizations to begin at any step and enables projects to be scheduled and managed in a variety of ways.
Addison Wesley, 2003, ISBN 0201784203, 576 pp., $59.99.
2007 Business Process Management Summit
26–28 March 2007
The American Strategic Management Institute (ASMI) covers measurement and management methodologies for improving individual and organizational performance. ASMI's mission is to identify, study, and disseminate strategic management and performance measurement practices pioneered by best-in-class organizations. Through national conferences, in-house training programs, consulting services, and on-going research, ASMI helps organizations access expertise in planning, implementing and evaluating business strategies to address their management challenges and improve organizational results.
The Business Process Management Summit of 2007 will feature four interactive tracks on business process management. Attendees can learn strategies to use BPM for improved workflow and system transactions, gain advice for incorporating control measures and metrics into BPM implementation, examine solutions for overcoming hurdles and common problems, and master tools and techniques for increased ROI and proper data management.
The BPM Implementation track covers BPM in the office and gaining senior leadership support. Attendees can devise strategies to sell and communicate the need for process improvement through BPM techniques to upper-level leadership, understand how to effectively communicate how BPM will transform an organization and help achieve greater results, and discuss how to introduce innovation to business transformation initiatives
The Data Quality Analysis track explores data quality control, and how to get the most out of a data warehouse. Attendees can gain advice on how to set up and properly maintain a data warehouse, learn how to read the data to find out which data sets are skewed and which are valuable, and explore what data warehouse style is the best fit.
The BPM Implementation track helps attendees create a framework: blueprints, activities, and plans. Attendees can create a strategy and methodology for integrating BPM into an organization, explore different techniques and approaches for a process design, and develop process standards to be used across the enterprise.
The Data Quality Analysis track explores enriching BPM through data mining excellence. Attendees can learn how to develop strategies to search large volumes of data for patterns such as association rules, learn how to avoid common mistakes in data mining such as "data dredging" or "data fishing," and utilize cross-validation techniques to evaluate and improve data mining capabilities.
http://www.asmiweb.com/ events/b192.html?Source= gant&Campaign=b192