Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment My Oma did this too (Score 3, Interesting) 158

Several years back a new hotel opened in Niagara falls. Their phone number was 1 digit off my grand parents number. They started getting several calls a day, all hours of the day, looking to book rooms. They called the hotel several times and asked them to change their number but they refused and told my grandparents they should change theirs. My grandparents had that number for over 30 years so they refused. Eventually they got sick of being polite and telling people they had the wrong number, so they started "taking bookings". The situation was then quickly resolved when the hotel started having people showing up expecting a room. Hotel changed it's number and life went on. I know it sucked for the people who expected rooms, but they tried to be nice and polite for a few months.

Comment It does happen (Score 3, Interesting) 532

We have a user here who got a new laptop last summer, it had a LED backlit LCD. Within 20 minutes she was calling saying it was making her feel sick/headache. We tried adjusting refresh rate, brightness, no help. Put a CFL backlit LED laptop in front of her and she was fine. Tried LED standalone monitor, it also bugged her though not as much. So, we had to find a laptop that had a CFL backlit screen, wasn't junk,and met our other requirements (docking connector mostly). Ended up getting a previous year model Toshiba Tecra with a Core2Duo.All the rest of the laptops we bought had i5's in them by that point.
Java

Why You Can't Dump Java (Even Though You Want To) 402

snydeq writes "Since so many recent exploits have used Java as their attack vector, you might conclude Java should be shown the exit, but the reality is that Java is not the problem, writes Security Advisor's Roger Grimes. 'Sure, I could opt not to use those Java-enabled services or install Java and uninstall when I'm finished. But the core problem isn't necessarily Java's exploitability; nearly all software is exploitable. It's unpatched Java. Few successful Java-related attacks are related to zero-day exploits. Almost all are related to Java security bugs that have been patched for months (or longer),' Grimes writes. 'The bottom line is that we aren't addressing the real problems. It isn't a security bug here and there in a particular piece of software; that's a problem we'll never get rid of. Instead, we allow almost all cyber criminals to get away with their Internet crime without any penalty. They almost never get caught and punished. Until we solve the problem of accountability, we will never get rid of the underlying problem.'"

Comment Re:too much hassle (Score 1) 78

They say on their literature bags may be searched, but I've been walking around with my big vmworld 2011 backpack all week, never searched once. To the original question, I am a network admin at a non-profit religious denomination, not really in "the industry". I registered online, worked on my cover story, but in the end I didn't need it. They didn't even ask for my business card when I picked up my badge, just drivers license.

Comment Veeam and Equallogic (Score 1) 403

We do Veeam backups of our virtual infrastructure nightly. Once a week, a copy of that is taken offsite. Also, every night our Equallogic SAN's replicate with eachother. They are in three separate offices in North America. In the event one building burns down, is blown up by a nuke, or similar, we can fire up our entire virtual infrastructure in the failback location within a couple of hours (minutes really). Since we only have 3-4 non-virtualized servers, and none of them store important data, we're pretty well protected I think.

Comment Incorrect (Score 2) 117

I believe you are wrong there. It says for their wholesale customers, they are allowed to bill based on connection speed, but not total monthly bandwidth usage. This means a small ISP would pay for a 100Mbit link, or 2 Gbit link, etc... It is billed in 100Mbit increments. ISP can use as much as they want, but they will only get that amount per second they paid for. This makes sense to me, you pay for the size of the pipe you need, doesn't matter how much data you put through the pipe.

Comment Re:Root Cause (Score 1) 433

I got a call from Bell the other day asking me to switch back to them. I said no. The guy asked why, and I said it was because Bell was an evil greedy company that didn't care about customers and I would never use one of their products ever again. After about 10 seconds of dead air, I said goodbye :) Bell is a horrid company. At work I switched all our cell phones off them to the slightly less evil Rogers, and our internet off them too (though our fiber connection does go through their network, couldn't avoid that, but at least they just get a fraction of the money, not all of it. Soon our phone lines will all be switched to VOIP too at work, no more Bell.

Comment Re:Forefront analysis (Score 1) 175

We condidered it last year, for about 800 machines. We didn't go with it because it needed multiple servers, and some of those had to be 32 bit servers. The SQL I believe it was, not totally sure but I think it only ran on a 32 bit sql server, which we don't have any of. Went with Kaspersky, been working great.

Comment Re:I love Netflix (Score 1) 188

I'm not sure you understood what I meant. If Rogers is offering a streaming video service through their internet service, they have to count that towards your data cap just as they would for netflix. They can't give their own service an unfair and artificial advantage like that. They certainly would love to, and thats what the whole net neutrality debate is about. This came up when Bell first started throttling customers. One of the reasons the CRTC ruled with Bell initially was because they also throttled customers using Bell's own services.

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...