Screencast: Martin Heller demonstrates how to configure the Cast Iron Integration Appliance. The walk-through includes database end-points, layouts for flat files, and others, as well as how to test what you’ve done. Watch it here. Columnist’s corner: All operating systmes are not created equal, and that holds particular truth when it comes to security. No matter, though, because distrusting (or merely disliking) Windows does not sanction one to ignore basic security principles. “Windows is just as secure as any other popular OS, if not better, despite knee-jerk criticism to the contrary,” posits Roger Grimes in this week’s Security Adviser. “Many Linux, BSD, and Solaris administrators I know are excellent security caretakers. But they also know that you have to follow basic security guidelines regardless of what OS you run.” The news beat: Employment is once again growing in Silicon Valley, providing evidence that the downturn is over, with venture capital investment in renewable energy and clean technology on the rise. Linden Lab’s CEO Joe Miller explains in this interview that Second Life has the potential to be a new kind of operating system, replete with social interactions, commerce and entertainment. And Intel takes chips a step forward into the 45-nanometer realm which will ultimately translate into “extremely high compute power at extremely low power usage.” Poll: Seeking the answer to what’s right and what’s wrong in the debate sparked when News Corp.’s Twentieth Century Fox subpoenaed YouTube for the identities of those who posted unaired clips of “24,” Eprhaim Schwartz asks should YouTube and its parent company, Google, reveal the name of ECOtotal or not? Send in your comments. Technology Industry