Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Android

Submission + - ASUS EeePad Transformer review | Android Central (androidcentral.com)

timothy writes: Android Central has taken a close look at the new Transformer tablet from Asus, giving it an overall positive review, with minor points deducted for a "plasticy" feel. The Transformer joins the Motorola Xoom in the world of Honeycomb (Android 3.0), and has very similar, high-end specs (though it's Wi-Fi only) with one big difference: the Transformer is marketed with a not-included-in-the-price attachable keyboard that adds a battery. I wonder what other OSes will eventually be hacked onto this device; 16 hours of battery life in a netbook-sized computer sure sounds good to me, but I might want that to be with standard Linux apps instead of only with Android.

Comment Re:As much as I love Cisco gear... (Score 2) 160

Cisco warranties are strange creature indeed. In order to get a bug fix on warrantied products, you must have a TAC login. In order to have a TAC login, you must have a smartnet contract. Technically, the warranty is a temporary smartnet contract (I've searched their database using the serial # of new equipment under warranty but not smartnet net, not found it, then called cisco and they pull a smartnet contract number up)

Its really messed up, but what it boils down to is that if you want to get a bug fix and you don't have smartnet, you must go through the reseller you bought from - which is not good because it means without any smartnet you are vulnerable to the next thing that arises. No smartnet, no security, warranty notwithstanding.

Of course, if you do have a TAC login, you can get warrantied equipment added to your userid, but its a manual process and annoying at best. You still need a TAC ID from another smartnet contract though.

Comment Re:I have long been annoyed by Cisco business poli (Score 1) 160

switching packets from NIC 1 to NIC 2

That because cisco has leveraged hardware extensively for just that purpose. It's rare for CPU to get involved in forwarding a frame or packet on a cisco router or switch. That's in part why they're so expensive - its all done in ASICS, and even the memory is hard-wired for bitmasking searches.

The Internet

All of Gopherspace Available For Download 200

An anonymous reader writes "Cory Doctorow tells us that '[i]n 2007, John Goerzen scraped every gopher site he could find (gopher was a menu-driven text-only precursor to the Web; I got my first online gig programming gopher sites). He saved 780,000 documents, totalling 40GB. Today, most of this is offline, so he's making the entire archive available as a .torrent file; the compressed data is only 15GB. Wanna host the entire history of a medium? Here's your chance!' Get yourself a piece of pre-Internet history (torrent)." Update: 04/30 00:16 GMT by T: As several readers have pointed out below, our anonymous friend probably meant to say "pre-Web," rather than "pre-Internet."

Comment Everyone managed to lose (Score 2, Insightful) 537

What bothers me most about this isn't that childs was found guilty, but what he was found guilty of. Yeah he's guilty of not handing over passwords when asked. Yeah he's guilty of manuvering to avoid giving control of the network at every turn, when clearly he was being asked to do so.

I mean, really if his supervisors crashed the network, I would think that once he gives them passwords they become directly responsible for damages. Particularly since cisco routers and switches can be set up log log admin activity, in come cases command by command, to a remote syslog server, so if something did go wrong, the guilty userid can be determined with no question. So yeah, Childs is guilty. But of a DOS? By stretching the definition of what a DOS is, the instructions from the judge and the ruling here places anyone in charge of anything that could be thought of as a computer service of any kind at considerably more risk, and unnecessarily so. This outcome provides no useful legal precedent due to its stretch of definitions.

Comment Re:better yet (Score 1) 982

It would seem that if you define privileged access as a computer service, then denying the passwords would sort constitute a 'denial of service to an authorized user'. However, the language regarding "performs acts which are reasonably necessary to the performance of his or her work assignment" is relevant too.

Giving privileged access to core network equipment to unqualified persons is more than highly dis-recommended and its best practices to avoid this in all situations. In other words, it is reasonable not to give privileged access to people known not to have the qualifications to make changes. I don't know if the fiberWAN was carrying critical services like VoIP for example, but if it was, granting privileged access to anyone who might attempt to make changes could easily, if not likely, cause severe outages. Perhaps in that case, childs' granting of access resulting in outages might not be his fault, but the fault of whoever might try making changes. Maybe. At this point its not clear that network engineers have that protection, and this decision may burden the profession itself with a liability that confers no benefit to either admins or users.

Many Cisco commands take effect immediately, and in many cases access can be lost and widespread outages can easily result from a change that nobody, including cisco, would reasonably expect to cause an outage. Granted, childs painted himself into a bad corner at every opportunity (and in a way, his profession as well), and while he's clearly guilty of withholding information that didn't belong to him, for the question of denial of service to have been decide the way it has conspicuous negative side effects for the entire profession.

Its clear the law was written for those instances when deliberate malicious activity denies access, but this decision so broadens what malicious is such that for professionals managing critical services like networks carrying 911 traffic, a battery of lawyers will be required before anything can be done at all (which is actually not far from the case now - I know network admins who insist on legal waivers from customers for VoIP networks due to 911 liability issues). This obscures what malicious is in a profession already hard for anyone outside the specialty to understand in the first place. Court rulings should clarify such definitions for the precedent set to actually be constructive. This precedent isn't useful at all, and has tremendous potential for abuse.

Yes, childs is partly to blame, but he shares that with the city and the way the court chose to apply this ordinance. Really, nobody won here, but everybody managed to lose.
Microsoft

Microsoft Mice Made in Chinese Youth Sweatshops? 481

An anonymous reader writes "The National Labor Committee offers an in-depth look into working conditions in Chinese sweatshops producing hardware (mice, etc.) for Microsoft, complete with pictures. Apparently, so called 'work study students,' 16 and 17 years of age, work 15-hour shifts, six and seven days a week, for around 65 cents per hour. Microsoft said it is taking the claims seriously and has 'commenced an investigation.'"
Toys

Rudolph the Cadmium-Nosed Reindeer 454

theodp writes "Barred from using lead in children's jewelry because of its toxicity, some Chinese manufacturers have been substituting the more dangerous heavy metal cadmium in sparkling charm bracelets and shiny pendants being sold throughout the US, an AP investigation shows. Charms from 'Rudolph the Red-Nosed Reindeer' bracelets were measured at between 82 and 91 percent cadmium, and leached so much cadmium that they would have to be specially handled and disposed of under US environmental law if they were waste from manufacturing. Cadmium, a known carcinogen, can hinder brain development in the very young. 'There's nothing positive that you can say about this metal. It's a poison,' said the CDC's Bruce Fowler. On the CDC's priority list of 275 most hazardous substances in the environment, cadmium ranks No. 7. Jewelry industry veterans in China say cadmium has been used in domestic products there for years. Hey, at least it doesn't metabolize into GHB when the little tykes ingest it."

Slashdot Top Deals

"This generation may be the one that will face Armageddon." -- Ronald Reagan, "People" magazine, December 26, 1985

Working...