Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:VistA - VA Open Source (Score 1) 136

You do raise some good points about VistA. There are some folks in the old guard that cling to M, but I think the vast majority of the the VA's OI&T group have realized that M needs to go away at some point.

The problem is that the "D" in DHCP really became a joke. Due to some of the quirks of the M language, and the way they were abused back in the late '80s to early '90s, the whole system is really a big hairball at this point. So, the first thing that the VA has to do is to tease all of the separate subsystems out from each other. These can then be modernized onto new systems (the strategic direction going forward is Java on the middle-tier and client, and either M or Oracle on the backend, the last I heard). And, since the VA these days uses Cache almost exclusively, those old M globals can be mapped to SQL tables when the time comes to grab the data and move it.

So, the Feds can't just help by throwing resources at PatientOS (or anything else, for that matter). Without those slow backend upgrades, you'd be left with a whole load of data in a legacy system that would be virtually impossible to migrate. If the migration is going to succeed, we have to get the data onto something like a standard system first, and THEN we can start looking at options to go into the future.

Comment Re:VistA - VA Open Source (Score 2, Interesting) 136

Even more unfortunately, that name was picked in about 1997 or 1998 or so. The prior name of the VHA's electronic medical record system was DHCP (the Decentralized Hospital Computer Program), which was confusing for obvious reasons.

So, they switched to VistA about 10 years or so ago, and look what Microsoft did.

Security

Submission + - Is IT losing the battle against DNS attacks? (networkworld.com)

coondoggie writes: "Few things can strike fear into the heart of the IT department like an attack on a company's Domain Name System servers. Which may explain why companies are sending so much time and to deploy a complex myriad security measures to keep their DNS protected from malicious attackers. A study released today of 465 IT and business professionals says despite the Sisyphean efforts, many businesses remain vulnerable, as over half the respondents reported having fallen victim to some form of malware attack. Over one third had been hit by a denial-of-service attack while over 44% had experienced either a pharming or cache poisoning attack. Findings showed both external and internal DNS servers were equally vulnerable, as both types succumbed to attacks with roughly the same frequency, according to the study by Mazerov Research and Consulting. A DNS server compromised by a hacker could be used to funnel Web surfers to all sorts of phishing attacks and malicious Web sites and even cause havoc with directory services and e-mail in some cases, according to the father of the technology, Paul Mockapetris in a Network World article earlier this year. http://www.networkworld.com/community/node/17598"
Software

Submission + - Samsung Linux printer driver sets OO as root

An anonymous reader writes: The April 2007 Samsung Linux printer drivers "update" many applications, including OpenOffice.org, to open with root permissions. http://linuxfr.org/comments/850495,1.html, shows the installation script and the whole story is at http://linuxfr.org/forums/15/22562.html

Originally found on digg at http://digg.com/linux_unix/Samsung_Linux_printer_d river_modifies_the_permissions_of_many_executables 1 by apterium — http://digg.com/users/apterium

Slashdot Top Deals

An adequate bootstrap is a contradiction in terms.

Working...