Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:You're talking about the cloud here (Score 1) 99

meh, yes and no. there could be use cases for SMBs (more medium than small probbly), especially around app dev. if you have devs using AWS and paying for it on expense reports with taxi receipts (I've heard this happening), then a CIO could make a case for building up some internal cloud infrastructure to give users fast access to resources. I don't like the buzzwords, but DevOps could help usher in cloud adoption for regular enterprises.

Comment Re:They should go after the judge and bureaucrats (Score 1) 3

The media coverage of Justina Pelletier has been extremely one-sided. Basically only the parents' side of the story has been told because the organizations (Boston Children's Hospital) that are treating this young woman are not allowed to discuss the case because of patient confidentiality laws. And now they're defending against overload attacks on their systems. There is more to this story than what has been reported.

Submission + - Anonymous's latest target: Boston Children's Hospital (networkworld.com) 3

Brandon Butler writes: Supporters of the faceless collective known as Anonymous have taken up the cause of a young girl, after the State of Massachusetts removed her from her parents earlier this year. However, the methods used to show support may have unintended consequences, which could impact patient care.

On Thursday, the Boston Children's Hospital confirmed that they were subjected to multiple DDoS attacks over the Easter holiday. Said attacks, which have continued throughout the week, aim to take the hospital's website offline. Similar attacks, including website defacement, have also targeted the Wayside Youth and Family Support Network. Both organizations are at the heart of a sensitive topic, child welfare and the rights of a parent.

Submission + - For Red Hat, it's RHEL and then? (networkworld.com)

Brandon Butler writes: Red Hat is hosting its annual summit this week where the company is seemingly basking in the glory of making more than a billion dollars off a free open source project. But as successful as Red Hat Enterprise Linux (RHEL) has been for Red Hat — the company announced a new beta version of RHEL 7 this week — there’s a question of how long the RHEL gravy train will keep growing, and what’s next for the company after that.

Submission + - Happy Pi Day 2014! (networkworld.com)

Brandon Butler writes: It’s the holiday for every mathematician small and large: Pi Day! If you’re not familiar, math enthusiasts around the world embrace March 14 to commemorate the mathematical constant. No matter the size of the circle, the ratio of its circumference to its diameter will always be 3.14. What better way to celebrate this than on 3/14? Here are 10 ways you and your math friends can celebrate the day.

Submission + - Microsoft Lync server gathers employee data just like NSA (networkworld.com)

coondoggie writes: Microsoft's Lync communications platform gathers enough readily analyzable data to let corporations spy on their employees like the NSA can on U.S. citizens, and it's based on the same type of information — call details. At Microsoft’s Lync 2014 conference, software developer Event Zero detailed just how easy it would be, for instance, to figure out who is dating whom within the company and pinpoint people looking for another job.

Submission + - Microsoft Hyper-V bangs away at VMware's hypervisor dominance (networkworld.com)

Brandon Butler writes: More and more software packages that manage virtualized data centers are supporting Hyper-V, reflecting the steady progress Microsoft's hyper-visor is making against VMware's dominance in the market. Just how much interest is there in Hyper-V? At the recent VMworld show, a survey of respondents found that 20% were already implementing Hyper-V. 20% of randomly sampled attendees at a (emphasis) VMWARE trade show were already using Microsoft's hypervisor. Third party vendors are starting to pick up on the trend.

Submission + - Now, more than ever, Twitter knows exactly where you are (networkworld.com)

Brandon Butler writes: Twitter has inked a deal to improve its geotracking feature by using a Location Intelligence platform from IT consulting firm Pitney Bowes. Twitter users have the option of turning the geotracking on or off, and can chose whether their location is displayed in their status updates. Users can also delete their entire history of location tracking, PB says.

Submission + - Cloud pricing: It's (really) complicated (networkworld.com)

Brandon Butler writes: In theory, cloud computing offers a fairly straightforward model for consuming compute and storage resources. Customers request capacity, it is provided by a vendor and it is paid for. Customers should be able to spin up and down resources as they need to and only pay for what they use.

Unfortunately, cloud pricing models are complicated, which makes purchasing decisions for consumers difficult and comparing across providers a challenge as well, a new report from the 451 Research Group shows. There is a large differentiation among providers when it comes to pricing, which it says is because the market is still “finding its feet” so there are not standards for anything across providers, and especially with pricing. “Obviously this isn’t great for consumers, who have to understand each method and weigh every option when selecting a provider. Furthermore, comparing the total price of an application between providers – and working out the value of a number of offerings – is a difficult task.”

To provide a clue into the complexity of cloud pricing, here are just some of the ways 451 found that cloud providers priced their services:

-On-demand pricing: Customers are billed for consumption of virtual machines using a fixed unit price
-Reserved instances: Customers are billed a flat fee in advance for a service and receive a discounted rate for consumption
-Spot pricing: The price of a resource varies with time, and customers must bid to gain access to these resources
-Prepaid VM access: Customers pay a single fixed fee to access a specifically sized instance at the beginning of a term; customers have unlimited access to the VM over the term. Can be done in a recurring plan as well, which is renewed usually monthly.
-Recurring resource pooling: Customers commit to purchase a quantity of resources (number of CPU cores, quantity of RAM, etc.) in advance on a recurring basis
-Prepaid Consumption: Customers pay a set amount at the beginning of a term, and costs of consumption are debited from this prepaid amount. Can be done in a recurring plan as well.

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...