Category Archives: General

If it doesn’t fit somewhere else…

CHLAUTH research updates

I’ve added a “Versions” tab to the results matrix, corrected some copy/paste errors, and uploaded new copies of the PDF and Excel versions.  Over time as new results are added or corrections made I’ll replace the existing documents so the … Continue reading

Posted in General | Leave a comment

If you can read this…

…we are back up at the new web hosting service, Site5!

Posted in General | 2 Comments

Are messaging hubs an anti-pattern?

I have worked over the last decade with many customers who were consolidating their MQ footprint. It’s a familiar pattern – there are many queue managers, they tend to be lightly loaded, why not consolidate to a central hub? Now … Continue reading

Posted in General, WMQ | Tagged , , , , | 4 Comments

Presentation from today’s NY/NJ MQ User Group meeting

I will move this to SlideShare after making a few more edits per today’s comments and notes.  At that point I will link to it from the Links page, same as all the others.  But for now, please enjoy! This … Continue reading

Posted in General | Leave a comment

Configuration backups: the forgotten WMQ security control

Update: IBM has reconsidered and has announced that dmpmqcfg will be fixed as a defect! Subscribe if you would like a notification when the fix is announced. But please do read the post, especially if you are using amqoamd for … Continue reading

Posted in Fail, General, IIB, Security, WMQ, WMQ AMS, WMQ ESE, WMQ FTE, WMQ Security | Tagged , , , , , , , | Leave a comment

Webinar: Security Defenses that Withstand the Test of Time

Please join AJ Aronoff and me for a Prolifics webinar: IIB: Security Defenses that Withstand the Test of Time For the last 7 years my security focus has mainly been intrusion prevention.  That’s all the controls you use to keep … Continue reading

Posted in General | Leave a comment

It’s time for sensible password security standards in the PCI-DSS

Passwords are the keys to the Internet kingdom.  Sure, there are certificates that identify sites and provide the basis for TLS encryption, but it is the user ID and password that authenticate you almost everywhere you log on to something.  … Continue reading

Posted in General | Leave a comment