Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Idealism blows when the rubber meets the road (Score 2, Interesting) 149

I'm complaining about IT overreach in power. As it stands now, one over-zealous IT guy at the top is preventing the librarians from taking any steps toward rectifying misuse of technology. For example, it would help us out tremendously to switch the computers that are in unsupervised corners of the library to authenticated log-in use only (like WiFi) and allow free public access in areas that can be surveyed by library workers at all times. We want to protect the safety of our real patrons while still welcoming the general public to surf safely on the web for free. The idealistic jerk at the top is preventing us from changing anything.

Comment Idealism blows when the rubber meets the road (Score 2, Informative) 149

I am almost finished with my undergrad at a large public university. I worked in several of the branch libraries during my years here, including a full-time stint this summer. The computers in our library allow anyone to use one application: IE7. We have no time limit on computer usage or have any web filtering. The problems that arise from misuse of these computers from non-university community members are astounding. In just one branch library here this year alone, several incidents have been reported of non-university people masturbating to Internet porn. All incidents were reported to staff by young female co-eds, who were visibly traumatized by the experience. These kinds of folks have also brought along other problems for us to deal with: drug use and selling, theft of personal property, theft of library materials (including computer peripherals), etc etc.

With incidents like these in mind, don't let idealism confound your tech policies. Think of the people who are going to interact with the public that are using university technology. It is maddening to have your hands tied by some lofty IT person's idealistic vision of free data access for all when you're trying to deal with serious breaches of public safety.

How To Help With a University ICT Strategy? 149

An anonymous reader writes "I have been asked to contribute to my university's revised ICT (Information and Communication Technology) strategy and I am curious what fellow Slashdot members consider to be the main advice in this context. What are the major mistakes that organizations like universities make? Given the complexity of the different participants in a university, how does one have a coherent strategy that fulfills the needs of such a wide audience? How does one promote open source in a managerial culture? How does one deal with the curse of the virtual learning environment?"
The Media

Submission + - WikiLeaks victorious over media gag order (wikileaks.org)

Mark Klien writes: WikiLeaks has set a very interesting legal precedent. On Tuesday the Supreme court of British-Caribbean nation of the Turks & Caicos Islands lifted a gag order which had prevented publishers and broadcasters from mentioning 'corruption report' and 'WikiLeaks' in the same sentence. The order, first issued on Saturday against 11 media companies, and reissued last night, over PDF redactions removed by WikiLeaks has lead to bizarre press coverage, where WikiLeaks was not named, but referred to instead using Orwellian terms such as 'a multi-jurisdictional website'. The injuncted media companies today argued before the Supreme Court of the Turks & Caicos Islands (a British Overseas Territory and tax haven), that the popularity of WikiLeaks means that the corruption report in question is effectively in the public domain anyway. The Guardian newspaper found itself in same position earlier this year, when a High Court judge ordered it not to tell its readers that documents exposing a multi-billion dollar Barclay's bank tax avoidance scam were available on WikiLeaks. Caribbean media has mentioned an ongoing legal action in London to suppress the report, and strangely there has been nothing in the UK media on the case (which the UK is intimately bound up in, having threated to seize control of the Turks & Caicos by force over the corruption allegations).
Medicine

Submission + - Artificial brain '10 years away' (bbc.co.uk) 1

SpuriousLogic writes: A detailed, functional artificial human brain can be built within the next 10 years, a leading scientist has claimed. Henry Markram, director of the Blue Brain Project, has already built elements of a rat brain. He told the TED global conference in Oxford that a synthetic human brain would be of particular use finding treatments for mental illnesses. Around two billion people are thought to suffer some kind of brain impairment, he said. "It is not impossible to build a human brain and we can do it in 10 years," he said.
Google

Submission + - Google Wave: 'Like Real-Time E-Mail. On Crack.' (bnet.com) 1

Michael_Curator writes: "Developers are finally getting their hands on the developer preview of Google's Wave, which means we can finally get some first-hand accounts of what it's really like to use, unfiltered by Google's own programmers. Ben Rometsch, a developer with U.K. Web development firm Solid State, blogged that, it's "probably the most advanced 'application in a browser' that I've seen." Wave is like giant Web page onto which users can drag and drop any kind of object, including instant messaging and IRC [Internet Relay Client] clients, e-mail, and wikis, as well as gadgets like maps and video. All conversations, work product and applications are stored on remote servers — presumably forever. "It's like real time email. On crack," he wrote. And unlike the typically minimalist Google UI, "It feels a lot more like a desktop application that just so happens to live in your browser.""
Power

Submission + - 'Power Capping' The Datacenter (infoworld.com)

snydeq writes: "Datacenter operators seeking increased server density may soon turn to power capping, an emerging technology that limits the amount of electricity a server can consume, InfoWorld reports. The practice, which can be applied at the rack level, ensures that no server draws above a set power level, thereby increasing datacenter capacity within a rack-level power envelope by as much as 20 percent, according to a proof-of-concept study at Baidu, China's largest search company. As with powering down servers during off hours, of course, power capping incurs calculated risk, as those in charge of business-critical applications may be reluctant to set power limits below maximum utilization. Yet given IT's need to contend with the permanent energy crisis, the notion of power capping the datacenter could prove advantageous."
Space

Submission + - Astronomer Photographs Meteor Thru Telescope (mikesastrophotos.com) 1

Matt Rogers writes: "Amateur astronomer Mike Hankey may be the first person on earth to take a picture of a fireball meteor thru a telescope. The picture has been confirmed authentic by numerous professional astronomers and asteroid hunters. This picture could possibly be the first of its kind. Taking a picture of a meteor is a very difficult thing to do, taking a picture of a meteor thru a telescope is near impossible. The hunt is on in southern PA for the meteorites that broke away from this space rock. Using Hankey's picture as well as security tape meteorite hunters have been able to narrow down the crash site to a smaller area. Even with the trajectory roughly determined, professional meteorite hunters think finding these meteorites may be near impossible. However if they are found they will be immensely valuable and could be very large."
Space

Submission + - Moon Rock from Apollo 11 Sent Back Into Space

AaronW writes: "According to this article at collectspace.com, a rock collected by Neil Armstrong during the Apollo 11 mission was quietly sent up to the ISS back in March. It was sent up in a special case to protect it with instructions given to the astronauts to not open it. Contamination isn't a huge issue since the rock sample had already been exposed to the air and was not that remarkable, resembling Hawaiian lava. It will be revealed tonight for a 40th anniversary celebration at the National Air and Space Museum in Washington DC."
Security

Submission + - OpenSSH zero-day exploit in two days? (seclists.org) 2

ScytheBlade1 writes: "Anti-Sec, a security group dedicated to the eradication of full disclosure (as evidenced by their recent attack on ImageShack), just posted an ominous warning to the full disclosure mailing list: "In 48 hours, the anti-sec movement will publicly unveil working exploit code and full details for the zero-day OpenSSH vulnerability we discovered. [...] Within 10 hours of the initial release of the OpenSSH 0-day exploit code, anti-sec will be unleashing powerful computer worm source code with the ability to auotmatically find and compromise systems running any and all versions of OpenSSH." The question: is this real, or just some rather potent FUD? After all, nothing scares me more than an OpenSSH vulnerability."
Privacy

Submission + - Deleted Tweets are here to stay (time.com) 1

fudreporter writes: "Delete a Tweet? Not so fast. For your voyeuristic pleasure, allow me to introduce Tweleted. All public Tweets are recoverable, but be sure sure to switch to "Evil" mode first. Be the first on your block to recover that most embarrassing of Tweets..."I think I will take a hike on the Appalachian Trail today."

Time.com has the full scoop here...

Get past the cheesy name — honestly, this Twitter-izing of words needs to stop — and you'll find Tweleted is an occasionally useful service. Set against clouds on a bright blue background, Tweleted promises to recover any Twitter posts you may have accidentally deleted. A nice feature, but one hardly worth, well, twittering about.

But across the top of the page, there's an option to switch the site into evil mode. Click on it and the blue skies disappear, replaced with the fires of Hell and an ominous message: "Recover embarrassing deleted tweets for fun and profit." Because Tweleted uses publicly available records, the website can recover not only your deleted tweets but also everyone else's. And since Twitter users aren't exactly known for filtering their thoughts, the few things they think twice about should be interesting.

Tweleted raises some larger privacy concerns. When a user deletes a post on Twitter, it disappears from their user profile but not from Twitter's search engine results. Tweleted uses this loophole to dig up its deleted posts. Some Twitter users are crying foul, arguing that when they delete something, it should be gone for good. The company says they're working to make this happen, although setting your Twitter profile to private fixes the issues. For now, it's worth remembering the old adage: If you don't want someone to read it, it's better not to write it — or tweet it — in the first place."

Books

Submission + - What will physical books in the future look like? (fictioncircus.com) 2

kev-san writes: "The Fiction Circus has posted an article regarding the future of physical books with the increasing market prominence of electronic books. The article discusses the possibility that USB drives embedded in sculptures and art objects might replace what we think of as physical books. How will the shifting world of publishing react to the idea that books might not retain their current physical form? What else will change if books become works of art rather than dust covers that shelter dead trees?"
Space

Submission + - Multiple Debris Events During Endeavour Launch

j-stroy writes: During the launch of Space Shuttle Endeavour at least a dozen unique debris events have been counted. One hit far forward on the underbelly. Several of the events on launch videos show what appears to be larger and many smaller sharp edged black fragments quickly flying past. Some streaks and damage are apparent on the visible tiles. The story continues to develop as imagery is acquired.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...