Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:BackupPC (Score 3, Informative) 272

I couldn't agree more; BackupPC is really great. Not only does it support Tar over SSH and SMB, but it also supports rsync over SSH, rsyncd and now in the new beta, FTP. I backup everything to a NAS and then rsync that every weekend to another DR disk (you have to be careful about hardlinks when copying the pool, since it uses them in the de-duplication process). There are several variants of scripts available on the wiki and other sites for initiating shadow copies on Windows boxes, and with a little tinkering you can even get that working on Server 2008, though of course it really shines with *nix boxes. Highly recommended - the only drawbacks are that, as the parent mentioned, the learning curve can be intimidating at first, and the project has been pretty quiet the past few years since the original developer stopped working on it. Amanda (the MySQL backup company) seems to have picked it back up and they are the ones who released the most recent beta. Did I mention it has a really convenient web interface, emails about problems, auto-retries failed backups (while it's not in a blackout period), and somebody wrote a great Nagios plugin for it? I'm pretty sure I did, oh yes definitely.
NASA

Space Shuttle To Be Replaced By SpaceX For ISS Resupply 297

destinyland writes "Next year SpaceX will perform resupply missions for the International Space Station after the Space Shuttle is grounded, as part of a $3.5 billion NASA resupply contract. 'The fledgling space industry is reminiscent of the early days of the personal computer,' notes one technology reporter, 'when a number of established vendors and startups reversed-engineered Microsoft's DOS and manufactured PCs using the Intel 8080 chip set. We're likely to see a similar industry shakeout in the private space vehicle market segment in the coming decades.'"
Networking

Military To Spend $42M To Build Advanced Network Control 102

coondoggie writes "BBN, which was bought by defense giant Raytheon today, got almost $11 million to help build self-configuring network technology that would identify traffic, let the network infrastructure prioritize it down to the end user, reallocate bandwidth between users or classes of users, and automatically make quality-of-service decisions. The advanced network technology is being developed by Defense Advanced Research Projects Agency (DARPA) and will include support for features like 32 levels of network traffic prioritization that will let data with a higher priority will be handled more expeditiously than traffic with a lower priority."
Robotics

Swarms of Solar-Powered Microbots On the Way 119

Mike writes to tell us that Inhabitat has an interesting article, complete with some pretty pictures, about a new solar-powered swarm robot that could be used to collect data and aid in surveillance. "These mini-robots are quite revolutionary, considering that they contain all that's necessary to collect data and relay it back using one single circuit board. In the past single-chip robots have presented significant design and manufacturing challenges due in part to the use of solder as an adhesive. These new microbots use conductive adhesive to attach the components to a double-sided flexible printed circuit board using surface mount technology. The circuit is then folded into thirds and wrapped around the ASIC (application-specific integrated circuit). On top, a solar cell generates power for the robot and delivers 3.6 V to the unit, which is enough for it to walk. Locomotion is achieved via three vibrating legs, while a fourth horizontal vibrating leg is used as a touch sensor."
The Internet

Internet's First Registered Domain Name Sold 137

MojoKid writes "Believe it or not, it wasn't internet.com or dot.com that was acquired when the Internet was young. Instead, it was the somewhat off-the-wall name of symbolics.com. The Symbolics company was the first to use an internet domain name to guide Internet viewers to its line of Lisp machines, which were single-user computers optimized to run the Lisp programming language. XF.com Investments, which is a Missouri-based Internet investments firm, has managed to secure the domain name from its original owner for an undisclosed sum and XF's CEO was quick to proclaim his excitement over the acquisition. It's hard to say why this domain name was the first registered back on March 15, 1985, but for obvious reasons it holds a special place in history. There has been one original owner for nearly 25 years. Over that time, we've seen the Internet grow to the tune of 180,000,000+ registered domains, and thousands more are being added each and every day."
Image

How Famous OS Logos Got Started Screenshot-sm 103

Shane O'Neill writes "Ronald McDonald and the NBC Peacock may get more TV air time, but today's operating systems have cool logos, too. Google, Apple, Microsoft and the Linux crowd crafted mascots ranging from cute lizards to circles of life. In this slideshow, we look at the origins of the logos and look ahead to their future."

Comment Re:Moron! Word is a word processor (Score 1) 843

I used OpenOffice for 7 years of college and had zero issues, and probably about 75% of submission had to be in electronic form. What do you use Word for that you can't use Wordpad.exe for? Why can't you do the formatting in Mediawiki and then export to PDF?

On my school campus

Ok, it's pretty easy to see why you don't understand why email is still (unfortunately) relevant, but give it a couple years in a corporate or medium business; none of the services you mention have even half the features of email.

Word is still instruemental

Oh if only you had used Word (or Firefox, or OpenOffice) to compose this message it would have been spell checked!

Comment Re:YOURE FIRED (Score 1) 251

What? What if they do some kind of heavy duty number crunching and he's talking about his Beowulf cluster? What if they're a small, high-priced CGI company and they have three render farms of 10 boxes each and ten regular servers? What if they're a web hosting company and those are the hosts?

Comment Re:Thank you (Score 3, Informative) 207

Blackberries on BES offer enterprise features simply unheard of with Winmobile or iphone devices.

Maybe unheard of to you. http://technet.microsoft.com/en-us/library/bb123484.aspx I count well over 100 group policy settings that can be applied through Activesync to a Windows Mobile 6.1 device. Some of these actually do work on an iPhone as well, such as the password and phone lock policies.

Windows mobile only recently got the much needed security features such as remote device deactivation and wiping.

Windows Mobile + Exchange 2003/2007 have had this functionality since 2005 at the release of Exchange 2003 SP2 http://www.microsoft.com/DOWNLOADS/details.aspx?familyid=535BEF85-3096-45F8-AA43-60F1F58B3C40&displaylang=en. It even works on an iPhone. I'd hardly call 2005 "recent" in the IT world.

Comment Re:Good idea (Score 1) 275

Why, exactly, shouldn't it?

Uh... because when you're getting wrecked by those goddamn green hopping jerk bug things, you can't press "start," type in "Justin Bailey," kill them, turn the cheat off and then continue on.

For that matter, Contra also had a cheat built-in. Or does that one "not count" too?

Correct, it does not count. You can only activate it at the very beginning of the game, just like with Justin Bailey; you can't turn it on, pass a hard part, and then turn it off. That's what the summary is talking about.

Comment Re:Maybe I'm missing something... (Score 1) 87

Once the VPN is connected, for all intents and purposes the equipment on both ends of the line are on the same LAN

You're missing the point, which is that whether or not you're connected to the VPN, chances are good that your browser stores some credential information. If you're on a LAN that's the same subnet as your VPN endpoint, then once you disconnect, a malicious local user would be able to coax your browser to give up cookies about the VPN-accessed pages. Your browser uses IP addresses to associate a cookie with a host, which is what makes this possible, and explains why the certificate model of HTTPS on the corporate Intranet foils this attack.

Slashdot Top Deals

"Religion is something left over from the infancy of our intelligence, it will fade away as we adopt reason and science as our guidelines." -- Bertrand Russell

Working...