Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment XCAT and post scripts (Score 2, Informative) 113

We have XCAT and post scripts setup to do the majority of our work. Images the machine (PXE generation, DHCP config), installs files based on group, sets the ganglia config. I don't have any monitoring setup on compute nodes as I have ganglia open daily to watch for cluster node failures. Zenoss is done afterwards as I have yet to find a good way to automate that.

It's funny.  Laugh.

PETA Using Games To Spread Its Message 477

Cooking Mama is a series of games for the Wii and the DS in which players go through a number of steps to prepare meals using a variety of recipes. Last week, People for the Ethical Treatment of Animals (PETA) created their own Flash-based parody of the game, highlighting the use of meat products by having a more bloody-minded Mama do things like pull the internal organs from a Thanksgiving turkey. Cooking Mama's maker, Majesco, issued a light-hearted response, pointing out the vegetarian meals in the game. PETA then said they plan to continue making parody games as a way of "engaging the public."
Sun Microsystems

Submission + - Sun to Counter sue Network Appliance (sun.com) 1

An anonymous reader writes: Sun's CEO has posted on his blog that Sun will be filing a counter suit some time this week to quote from the article:
"And to be clear, once again, we have no interest whatever in suing NetApps — we didn't before this case, and we don't now. But given the impracticality of what they're seeking as resolution, to take back an innovation that helps their customers as much as ours, we have no choice but to respond in court.

So later this week, we're going to use our defensive portfolio to respond to Network Appliance, filing a comprehensive reciprocal suit. As a part of this suit, we are requesting a permanent injunction to remove all of their filer products from the marketplace, and are examining the original NFS license — on which Network Appliance was started. By opting to litigate vs. innovate, they are disrupting their customers and employees across the world. "

Books

Submission + - Robert Jorden Passes Away (dragonmount.com) 1

OS24Ever writes: "From the site (having server issues already): It is with great sadness that I tell you that the Dragon is gone. RJ left us today at 2:45 PM. He fought a valiant fight against this most horrid disease. In the end, he left peacefully and in no pain.

Robert Jordan had amyloidosis, a disease characterized by extracellular accumulation of amyloid in various organs and tissues of the body"

Television

Submission + - Getting Video to Multiple Remote TVs

2names writes: The facility where I work consists of multiple buildings spread across a fairly large campus. I have been tasked with setting up a media server of some sort so that multiple televisions in the different buildings can access stored video, satellite video (such as DirecTV), and also be able to show live video from our conference room. I have looked into MythTV, SageTV, and a couple of other options, but nothing has really covered all the bases so far. What I envision is a central server to house the archived video and connection to the "television" and camera sources and a menu driven selection method on each remote TV. Have any of you slashdotters had to set up something like this, and if so, what was your solution?
Google

Submission + - Google revoking DRM permissions on bought videos! 1

DoofusOfDeath writes: A few months ago I purchased a great Discovery Channel video from Google's downloadable video service. Sure I can't media-shift it, but I was willing to trade away some fair-use rights so my kids could see the video. I paid cash, they give me the video. End of story, right?

Wrong. Today I got this email (see below). It just goes to show that with DRM, there's little limit to the evil that can be done to you:

Hello,

As a valued Google user, we're contacting you with some important information about the videos you've purchased or rented from Google Video. In an effort to improve all Google services, we will no longer offer the ability to buy or rent videos for download from Google Video, ending the DTO/DTR (download-to-own/rent) program. This change will be effective August 15, 2007.

To fully account for the video purchases you made before July 18, 2007, we are providing you with a Google Checkout bonus for $20. Your bonus expires in 60 days, and you can use it at the stores listed here: http://www.google.com/checkout/signupwelcome.html. The minimum purchase amount must be equal to or greater than your bonus amount, before shipping and tax.

After August 15, 2007, you will no longer be able to view your purchased or rented videos.

If you have further questions or requests, please do not hesitate to contact us. Thank you for your continued support.

Sincerely,

The Google Video Team

Google Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
Security

Submission + - How to Break Into a Server Room--With a Pizza (darkreading.com)

talkinsecurity writes: "Penetration tester Steve Stasiukonis discusses three memorable jobs in which he broke into enterprises' server rooms, which are usually among the most secure rooms in a building. In one case, he was granted entry by an employee whose badge he had stolen just minutes before. In another case, he brought in a pizza and some buffalo wings — and got access to the full company network. These are the kinds of stories that are great fun to read — as long as they don't happen to your IT organization. http://www.darkreading.com/document.asp?doc_id=126 823&WT.svl=column1_1"
Java

Submission + - Google Guices up Java dependency injection

LauraW writes: "Google recently open sourced Guice, a dependency injection framework for Java 1.5, under the Apache License. Guice bucks the "convention over configuration" trend started by Ruby on Rails in favor of concise but explicit configuration and maintainability. Unlike other J2EE frameworks such as Spring, Guice does only dependency injection, but does it very well, taking full advantage of modern Java features such as annotations and generics. Google is currently using Guice in mission-critical enterprise applications such as AdWords, and other companies are starting to experiment with it as well.

Disclaimer: I am a Google engineer. I didn't contribute to Guice, but I use it in my projects and think it's insanely great."
Linux Business

Submission + - Central User Management w/Linux desktop and server

mvip writes: "With the Desktop improvements of the latest releases of Ubuntu Desktop I'm seriously considering migrating one of the offices I administrate entirely over to Linux. All the software that is not available for Linux will run under Wine, so no problems as far as that is concerned.

My thoughts is to install a server with some Linux distribution (Ubuntu Server or Gentoo), and then Ubuntu Desktop on the clients (a handful of them). The only thing I really need from the server is to share files, but I would also like to have central user management.

Now, as far as I know there are two ways to go when it comes to central user authentication; Kerberos or Samba w/ PDC. Kerberos seems to be the 'Unix'-way to do it (recommended in FreeBSD's handbook) , while Samba PDC is more like a mixed-environment solution. Both of these solutions can use OpenLDAP as a back-end, which I need. As for the file-sharing, I guess NFS goes with Kerberos, while obviously Samba takes care of the Samba file-sharing.

What I really want to know is what kind of experience people have when it comes to this. Which is the most 'optimal' way to go, and what would work with the least amount of tweaking/hacking?

I posted on both Ubuntu and Gentoo's forum, but received little feedback."
Internet Explorer

Submission + - IE7 and FF 2.0 share vulnerability

hcmtnbiker writes: Internet Explorer 7 and Firefox 2.0 share a logic flaw. The issue is actually more severe, as the two versions of the Microsoft and Mozilla browsers are not the only ones affected. The vulnerability impacts Internet Explorer 5.01, Internet Explorer 6 and Internet Explorer 7, and Firefox 1.5.0.9. "In all modern browsers, form fields (used to upload user-specified files to a remote server) enjoy some added protection meant to prevent scripts from arbitrarily choosing local files to be sent, and automatically submitting the form without user knowledge. For example, ".value" parameter cannot be set or changed, and any changes to .type reset the contents of the field," said Michal Zalewski, the person that discovered the IE7 flaw. There are Proof of concepts for both IE7 and firefox
It's funny.  Laugh.

Submission + - Chimp snack: bushbaby on a stick

SpinyNorman writes: If you have an interest in animal tool use, you should already know about horses that scratch themselves with sticks, and crows using SUVs as nut crackers, but New Scientist is now reporting on a rather more sophisticated use — Chimps using sharpended sticks to skewer bushbabys hiding in holes in trees so that they can snack on them! This snacking behaviour seems mostly limited to the female of the species.
Printer

Submission + - New Details on Xerox Inkless Printer

Iddo Genuth writes: "Xerox is developing a new printing technology which does not require ink of any kind. The new technology includes reusable paper which can be printed and erased dozens of times and has the potential to revolutionize printing. New details on this upcoming technology, which was first reported on September 2006, are now revealed."
Intel

Submission + - Intel tests 80 Core chip

Zeinfeld writes: Intel has announced a test chip with 80 cores. The chip has a nominal processing capacity of over a teraflop. Whether the chip actually delivers that performance over a sustained interval on real processing problems is another question. Also unmentioned is how the issue of heat dissipation is dealt with. It is probably going to be a while before such chips are production.

This marks a major departure from tactics such as introducing more parallelism into the processor core and adding more cache memory that have been the norm since 64 mainstream processors reached 64 bits.

Slashdot Top Deals

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...