Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:it's not really just storage (Score 1) 168

IT should be there to offer training and provide guidance but in the end it's a support function, not a business driver. IT is there to support the sales staff, not school them or patronize them.

What a very 1980s view of IT. We work in partnership with the business to both deliver the expected value from existing services and to identify where additional business value can be gained from process changes. We're service driven rather than sales though, sales is something of a dirty word in my industry at the moment.

If IT believes that a business process is suboptimal and should be addressed, there is a chain of command for that; you prepare a nice spreadsheet with itemized expenses and you run that up the chain. If the person in charge determines that the waste is in fact unacceptable, he/she will initiate a change.

John Kotter would disagree with you, spreadsheets are a poor way to build a sense of urgency.

NASA

NASA To Encrypt All of Its Laptops 226

pev writes "After losing another laptop containing personal information, NASA wants to have all of its laptops encrypted within a month's time with an intermediate ban on laptops containing sensitive information leaving its facilities. Between April 2009 and April 2011 it lost or had stolen 48 'mobile computing devices.' I wonder how long it will be before other large organizations start following suit as a sensible precaution?"
Earth

NRC Report Links Climate Change To National Security 242

WOOFYGOOFY writes "The NY Times and Voice Of America are reporting on a study by the U.S. National Research Council (PDF) which was released Friday linking global climate change to national security. The report, which was developed at the request of the C.I.A., characterizes the threats posed by climate change as 'similar to and in many cases greater than those posed by terrorist attacks. 'Climate-driven crises could lead to internal instability or international conflict and might force the United States to provide humanitarian assistance or, in some cases, military force to protect vital energy, economic or other interests, the study said.' If the effect of unaddressed climate change is the functional equivalent of terrorist attacks on the nation, does the Executive Branch, as a matter of national security, have a duty and a right to begin to act unilaterally against climate change irrespective of what Congress currently believes?"
The Courts

UK Court Sanctions Apple For Non-Compliance 217

drinkypoo writes "We've been following the story that Apple was ordered by a UK court to post an apology to Samsung both in newspapers and on Apple's UK website. After originally posting a non-apology and then hiding a real one, Apple finally complied. Now, PJ over at Groklaw reports on the ruling from the UK court itself, which condemns Apple's conduct in this matter. 'Since Apple did not comply with the order in its estimation, adding materials that were not ordered and in addition were "false," the judges ordered Apple to pay Samsung's lawyers' fees on an indemnity basis, and they add some public humiliation.' The judge wrote, 'Finally I should mention the time for compliance. Mr Beloff, on instructions (presumably given with the authority of Apple) told us that "for technical reasons" Apple needed fourteen days to comply. I found that very disturbing: that it was beyond the technical abilities of Apple to make the minor changes required to own website in less time beggared belief. ... I hope that the lack of integrity involved in this incident is entirely atypical of Apple.'"
Canada

Canada's Supreme Court Tosses Viagra Patent For Vagueness 100

Freshly Exhumed writes "In a 7-to-0 decision, the Supreme Court Of Canada has ruled that Pfizer Canada Inc.'s patent on well-known erectile dysfunction remedy Viagra is now invalid due to insufficient information in Pfizer's patent application. The upshot is that competitors can now manufacture cheaper, generic versions of Viagra for sale in Canada."
Businesses

Should Hacked Companies Disclose Their Losses? 68

derekmead writes "By law, US companies don't have to say a word about hacker attacks, regardless of how much it might've cost their bottom line. Comment, the group of Chinese hackers suspected in the recent-reported Coke breach, also broke into the computers of the world's largest steel company, ArcelorMittal. ArcelorMittal doesn't know exactly how much was stolen and didn't think it was relevant to share news of the attack with its shareholders. Same goes for Lockheed Martin who fended off a 'significant and tenacious' attack last May but failed to disclose the details to investors and the Securities Exchange Commission. Dupont got hit twice by Chinese hackers in 2009 and 2010 and didn't say a word. Former U.S. counterintelligence chief Joel Brenner recently said that over 2,000 companies, ISPs and research centers had been hit by Chinese hackers in the past decade and few of them told their shareholders about it. This is even after the SEC has made multiple requests for companies to come clean about cyber security breaches in their quarterly or annual earnings reports. Because the potential losses, do hacked companies have a responsibility to report security breaches to investors?"
Businesses

Is It Time To Commit To Ongoing Payphone Availability? 267

jenningsthecat writes "Public payphones seem headed the way of the dinosaur, as noted here on Slashdot 10 years ago, and again by the CBC earlier this year. Reasons typically cited for their demise are falling usage, (thanks to the ubiquitous cell phone), and rising maintenance costs. But during the recent disaster in NYC caused by Hurricane Sandy public payphones proved their worth, allowing people to stay in contact in spite of the widespread loss of both cellular service and the electricity required to charge mobile devices. In light of this news, at least one Canadian news outlet is questioning the wisdom of scrapping payphones. Should we in North America make sure that public pay phones will always be widely available? (After all, it's not as though they don't have additional value-added uses). And, should their continued existence be dependent on corporations whose primary duty is to their shareholders, rather than to the average citizen?"
Security

New Jersey Residents Displaced By Storm Can Vote By Email 189

First time accepted submitter danbuter writes "In probably the most poorly thought-out reaction to allowing people displaced by Hurricane Sandy in New Jersey [to take part in the 2012 presidential election], residents will be allowed to vote by email. Of course, this will be completely secure and work perfectly!" Writes user Beryllium Sphere: "There's no mention of any protocol that might possibly make this acceptable. Perhaps the worst thing that could happen would be if it appears to work OK and gains acceptance." I know someone they should consult first.
Businesses

Ask Slashdot: How To Deal With a DDoS Attack? 303

First time accepted submitter TheUnFounded writes "A site that I administer was recently 'held hostage' for the vast sum of $800. We were contacted by a guy (who was, it turns out, in Lebanon), who told us that he had been asked to perform a DDoS on our site by a competitor, and that they were paying him $600. He then said for $800, he would basically go away. Not a vast sum, but we weren't going to pay just because he said he 'could' do something. Within 5 minutes, our site was down. The owner of the company negotiated with the guy, and he stopped his attack after receiving $400. A small price to pay to get the site online in our case. But obviously we want to come up with a solution that'll allow us to deal with these kinds of attacks in the future. While the site was down, I contacted our hosting company, Rackspace. They proceeded to tell me that they have 'DDoS mitigation services,' but they cost $6,000 if your site is under attack at the time you use the service. Once the attack was over, the price dropped to $1500. (Nice touch there Rackspace, so much for Fanatical support; price gouging at its worst). So, obviously, I'm looking for alternative solutions for DDoS mitigation. I'm considering CloudFlare as an option; does anyone have any other suggestions or thoughts on the matter?"
Windows

Windows Phone 8 Having Trouble Attracting Developers 268

colinneagle writes "Microsoft has promised that cross-platform development across the 8s – from Windows 8 on a desktop to Windows Phone 8 – will be a simple matter, but that's still not enough to get some developers moving on Windows Phone 8 support. The Windows Phone platform has made a remarkable recovery since its reset with version 7. Since then, WP7 has grown to 100,000 apps. But that pales in comparison to the 675,000 in Google Play and 700,000 in the Apple App Store. Granted, there's a ton of redundancy – how many weather or newsfeed apps does one person need? – but it points to availability and developer support. A report from VentureBeat points out what should be obvious: that while developers like Windows 8, they aren't as excited about Windows Phone 8 software because they have already made huge investments in other platforms and don't want to support another platform. A survey by IDC and Appcelerator found 78% of Android developers were 'very interested' in programming for Android smartphones, a slight drop from the 83% in a prior survey. Interest in the iPhone and iPad remained undiminished, with 89% and 88% interest, respectively."
Google

Google's Nexus 4, 7, 10 Strategy: Openness At All Costs 359

MrSeb writes "There have been plenty of rumors about how the Nexus program was going to grow and change with this year's announcement. Now that we have all the details, it looks like almost none of them were right. There is no Nexus certification program, and the dream of multiple Nexus phones seems well and truly dead. What we do have is a range of device sizes with the Nexus 4, Nexus 7, and Nexus 10. However, the Nexus program has been altered in one important way: we know what Nexus means now. There can no longer be any doubt: a Nexus device is about openness first and foremost. Last year the technology sphere was busily discussing whether or not the Verizon Galaxy Nexus was a 'true' Nexus device. This year we have an answer: a Nexus controlled by a carrier is no Nexus. Rather than get in bed with Verizon, Sprint, or AT&T to produce an LTE version of the Nexus 4, we have HSPA+ only. Even the new Nexus 7 with mobile data is limited to this enhanced 3G standard. And then there's the pricing: The super high-resolution (2560×1600) Nexus 10 tablet starts at just $399; The Nexus 7 is dropping in price to $199 for a 16GB tablet; The Nexus 4 with 16GB of storage is going to sell for $349, exactly the same as the old Galaxy Nexus was until yesterday. To put this into perspective, the LG Optimus G, which the Nexus 4 is based on, sells for $550 without subsidy. Google is pushing the idea of openness with the Nexus devices, but it's not an entirely altruistic endeavor. By giving us cheap and open devices, Google is making sure it's in control — not the carriers. That's better for the consumers, but it's also better for Google."
Earth

Sandy Sinks HMS Bounty, Knocks Off Gawker Websites 238

Black Parrot writes "Several news sites are reporting that the 1962 replica of the HMS bounty was lost at sea due to hurricane Sandy, about 90 miles off North Carolina. The latest news I find says 14 of 16 crew rescued, one drowned, and the Captain still missing." And on land, the combination of wind and water surges knocked off Gawker sites and the Huffington Post for a time, and forced the evacuation of NYU's Langone Medical Center. Did it affect you?
Cellphones

HTC Losing Ground Faster Than RIM or Nokia 280

zacharye writes "How bad is HTC's current tailspin? So bad it makes Nokia look like a growth company. HTC's handset volume declined by -43% in the autumn quarter vs. Nokia's -23% volume decline. This is very interesting because HTC is using Android, the world's most popular smartphone OS, that is powering 40% annualized growth among its vendors. Nokia is limping along with an unholy mix of the obsolete Symbian platform, the moribund S40 feature phone platform and a niche OS called Windows Phone."
Encryption

How a Google Headhunter's E-Mail Revealed Massive Misuse of DKIM 115

concealment writes with a tale of how an email sent to a mathematician led to him discovering that dozens of high profile companies were using easily crackable keys to authenticate mail sent from their domains. From the article: "The problem lay with the DKIM key (DomainKeys Identified Mail) Google used for its google.com e-mails. DKIM involves a cryptographic key that domains use to sign e-mail originating from them – or passing through them – to validate to a recipient that the header information on an e-mail is correct and that the correspondence indeed came from the stated domain. When e-mail arrives at its destination, the receiving server can look up the public key through the sender's DNS records and verify the validity of the signature. Harris wasn't interested in the job at Google, but he decided to crack the key and send an e-mail to Google founders Brin and Page, as each other, just to show them that he was onto their game."

Slashdot Top Deals

The best laid plans of mice and men are held up in the legal department.

Working...