Starting to implement Sogo on CentOS 6.4 build on x86_64. I was finally able to get the most of the files needed to get things up and running - I hope...At least, I think I have most to the base requirements installed or running. Using my Webmin interface I'm able to test my IMAP, SMTP, and database connections. Plan to setup an OpenLDAP server for the user source at some point once I get the other pieces running. Plan to finalize the configuration of Postfix , Dovecot , and MySQL (but looking to move to MariaDB) in the next few weeks before starting back on Sogo...Looks like a very cool solution or alternative to MS Exchange....
Demo site: http://www.sogo.nu/english/tour/online_demo.html
It took some time to install the files but was able to get then intalled. There's a few dependencies, I hope you find the following install sequence helpful...Some items may not work, or sometimes get a duplicate already exists message....Just continue on and research the missing pieces to complete your install..
My Sogo install sequence using a fresh installation of CentOS as a database server with no GUI and Webmin / Putty for system administration:
My Sogo module install sequence.....hope that helps.
CentOS · EMail · Linux · Opensource · Sogo · Technology
A key challenge many organizations face when implementing technology based management concepts is determining what roles and responsibilities should be assigned to the project team. To help with this issue, I’ve developed a systematic approach to addressing these issues based on my recent experience in doing so for various federal government departments and agencies.
In today’s western society, we see technology everywhere, from the traffic lights at the street corner, the heating and cooling systems in the building that we live and work, to just about anything I can think of, technology play a major role is realizing the products and services that we consume. As a Systems / Business Analyst, and Project Manager, I am very much aware of this fact, since my job revolves around providing solutions to not just problems, but also seek opportunities to make our organization more productive and efficient in the market place.
Given the size and nature of the types of problems/opportunities we continually face, it’s unlikely for solutions to be developed by a single individual; solutions like problems, are becoming increasingly more and more complex; to manage the task at hand requires the skills, knowledge and expertise of many individuals. My topic will focus on the process of defining the roles and responsibilities of such teams, tools and techniques, a strategy for achieving the desired results in the context of team software development; and finally, similarities between software development teams and a bicycling team – or specifically a team within a “Tour de France” cycling race.
Why are roles important?
To solve any complex problem requires the coordination of resources to achieve a desired result. For the most part, the work is usually done by teams, which I will elaborate in the next section. The importances of roles for most of us that work in team environments are usually quite apparent. Lets use an example, this past summer I was watching the of “Tour de France”, a bicycle race that covers approx. 3,200 kilometres (2,000 mi), in which hundreds competitors embark on a race around France.
The competitors are grouped into teams of nine riders with the overall objective of supporting their respective team leader to victory. The members within each team are generally divided into two roles, the domestiques and the team lead. The team lead, perhaps the person with simplest role but with the most responsibility. Ultimately, the role of the team lead is to win the race by completing all 21 stages of the race with the lowest time; also a point system is used to determine winner of various classifications: Sprinter, Climber, etc. In the end, prize money is awarded based on points and lowest times, which is then collected by the team and distributed among its members. Although, the approach used in this event might seem a little less conventional than most races is because at the end, they overall winner is expected to donate his winning back to the team coffers, which in turn supports the team. Likewise, in a software development environment, teams generally perform tasks based on individual roles to deliver a product that is hopefully consistent, timely, economically feasible, and relevant to the clients needs. Some tasks are generally more challenging than others, but the team will usually share one or more responsibilities in accomplishing their goals.
In cycling, domestiques are there to support they team lead, and to do everything they can to help the team lead to win, this role is critical to the overall winner’s success, for the domestiques must bear the burden of blocking the wind for the team leader, I believe this is also called drafting, this helps the leader conserve their energy by approximately 30%, which leader then uses strategically throughout the race to either gains points or to win individual stages in the race. In software development, a leader may take many forms, sometimes in the form of a team lead, architect, or project manager. Although the roles may somewhat differ from organization to organization, the goals are the same, to win the race by meeting the expectations of the stakeholders by delivering quality solutions that are on time, within budget, and quality requirements.
In my next update I will talk about Team Roles.....To be continued.
Business · Process · SDLC · stakeholders · Teams · Technology
"Linking Technology, Design, and Best Practices to Business Success"
To help professionals and companies make the most of technology through passion, hard work, and due diligence; to help inspire individuals to unlock their potential to energize innovative organizations to be the best they can be; using my insights, creativity, and innovative thinking, I promise to help my clients realize their business goals.
Brand · Business · Life · Technology
To always have respect for the individual;
To treat our customers / clients with Honesty and Integrity;
To offer the best of ourselves in the pursuit of mutual goals and building close relationships while taking the time to celebrate our accomplishments;
To commit ourselves to continuous learning and listening to our customers / clients; and
To always remember that a customer / client is the next person inline of a process.
Business · Life · Technology
To live life completely, honestly, and passionately in serving the needs of others to the best of my ability.
This will be realized in following way:
- To start each day by remembering where I can from
- To enjoy physical and mental health through practice
- To maintain consistency between my words and my actions
- To be passionate to inspire others, earn their respect, and always serve out of love
- To energize innovative organizations by modeling the best practices in business performance and personal integrity
- To experience enjoyment in my work by being full of initiative, accepting challenges continuously, and commitment to life-long learning
To go any place I have not been; to do anything I have not done; and to always live life without limits.
Brand · Business · Life · Technology
March 23, 2012 ·
This site uses the following cookies on this website, for the following purposes:
- To provide the best possible user experience through the use of identifiers named “Cookies”
- For analytics to help identify content reach across a global demographic
- To provide a common denominator for user data aggregation across systems
Government of Canada: http://www.priv.gc.ca/fs-fi/02_05_d_49_02_e.cfm
John Lashley uses Google Analytics to analyze the use of this website. Google Analytics generates statistical and other information about website use by means of cookies, which are stored on users' computers. The information generated relating to our website is used to create reports about the use of the website. Google will store and use this information.
Third party cookies
“First-party cookies are cookies set with the same domain (or its subdomain) in your browser's address bar. Third-party cookies are cookies being set with different domains from the one shown on the address bar (i.e. the web pages on that domain may feature content from a third-party domain - e.g. an advertisement run by www.advexample.com showing advert banners).
For example: Suppose a user visits www.example1.com, which sets a cookie with the domain ad.foxytracking.com. When the user later visits www.example2.com, another cookie is set with the domain ad.foxytracking.com. Eventually, both of these cookies will be sent to the advertiser when loading their ads or visiting their website. The advertiser can then use these cookies to build up a browsing history of the user across all the websites this advertiser has footprints on.”
“Local shared objects (LSOs), commonly called Flash cookies (due to their similarities with HTTP cookies), are pieces of data that websites which use Adobe Flash may store on a user's computer. Local shared objects are used by all versions of Adobe Flash Player and version 6 and above of Macromedia's now-obsolete Flash Player.
While websites may use local shared objects for purposes such as storing user preferences, there have been privacy concerns regarding local shared objects, and they may be considered a breach of browser security.”
Cookies · Flash · Information Protection · Legal · Privacy · Protected Information · Security · Technology
Information classification scheme has been adopted from the GoC..
Designated information pertains to any sensitive information that does not relate to national security and cannot be disclosed under the access and privacy legislation because of the possible injury to particular public or private interests.
- Protected A (Low-Sensitive designated information): is applied to low sensitivity information that should not be disclosed to the public without authorisation and could reasonably be expected to cause injury or embarrassment outside the national interest. Example of Protected A information could include employee number, pay deposit banking information, etc.
- Protected B (Particularly Sensitive designated information): is used to protect information that could cause severe injury or damage to the people or group involved if it was released. Examples include medical records, annual personnel performance reviews, etc.
- Protected C (Extremely Sensitive designated information): is used to protect extremely sensitive information if compromised, could reasonably be expected to cause extremely grave injury outside the national interest. Examples could include bankruptcy, identities of informants in criminal investigations, etc.
Business · Information Protection · Legal · Protected Information · Security
Hello! and welcome to my blog. This is my first post just to see how things are working