Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

What to Do When Your Security is Breached 177

ancientribe writes "When you've got a full-blown security breach on your hands, what do you do? If you've been smart, you'll already have a computer security incident response team — and a plan — in place. But many companies are too resource-strapped to have a full-blown, fully-tested incident response strategy. DarkReading has some tips on what to do — and what not to do."
Sony

Why the PS3's February Sales May Be Misleading 127

1up's Luke Smith takes a look at February's NPD numbers, and has an observation to make about what they might mean for Sony. Though the company is almost certainly not selling as many PS3s as they'd like, the console still sold more units between November and February than a supply-constrained Xbox 360 did last year ... and despite a $200 more expensive pricetag. Though the console is certainly getting off to a slow start (and really needs great software, fast), it's still keeping pace with Microsoft's console from a year ago. "What does this mean for Sony? Considering the system's higher price point, if the platform can keep pace with the Xbox 360 through the first year (while the software matures), regardless of the installed base, the system has to be considered semi-successful. A concerning statistic between the two platforms' first January and February months is the drop-off in sales for those two months. From January 2006 to February 2006 the Xbox 360 sales trailed off 36% (250K units down to 161k units). At the same point in its lifespan, Sony's PlayStation 3 experienced a drop-off of 48% (244K units down to 127K units). That drop in sales, considering the units are available at retail, is cause for concern. Yet, despite trailing off by 25% more than its supply-constrained predecessor, the system does still cost $200 more."
Republicans

Submission + - Illegal White House Email Causing Security Risk?

An anonymous reader writes: Has White House email policy broken the law and endangered national security? Hold on, this gets complicated. While investigating what happened during the recent firing of eight federal prosecutors, it was revealed that much of the email from the White House were not using official government servers, but using servers provided by the Republican National Committee. (One of these serves was named 'GWB43.com'.) It was also reported that Karl Rove does 95% of his email on these non-governmental accounts.

This raises two critical issues: first, does this violate the Presidential Records Act, passed after Nixon and Watergate? Second, does this create a potential security breach? How much security does the RNC maintain, compared to the White House? There is also the issue of people on the White House payroll doing work for the RNC on government time, another potential law-breaker.

Henry Waxman, D-CA, wants to know what is going on. He has sent a letters to the RNC and the Bush-Cheney campaign to preserve there emails for congressional investigation. http://thinkprogress.org/2007/03/26/rnc-emails-wax man/

For comments on security see http://www.warandpiece.com/blogdirs/005879.html and http://www.tpmmuckraker.com/archives/002875.php.

All these websites are extremely partisan. Let the Flame Wars begin!
Science

Scientists Create Sheep That Are 15 Percent Human 475

anthemaniac writes "Professor Esmail Zanjani and colleagues at the University of Nevada-Reno have created sheep that are 15 percent human at the cellular level. Half the organs in the sheep are human. The idea, of course, is to harvest those organs to transplant into human patients. From the article: 'He has already created a sheep liver which has a large proportion of human cells and eventually hopes to precisely match a sheep to a transplant patient, using their own stem cells to create their own flock of sheep.' One scientists worries, however, that the work could lead to new viruses that cross from animals to humans."
User Journal

Journal Journal: I tick.....

...therefore I am.

Tick tick.... ticktick tick tick........tick....

uh oh

Slashdot Top Deals

Any sufficiently advanced bug is indistinguishable from a feature. -- Rich Kulawiec

Working...