Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Is that really their job? (Score 1) 99

The point of government research is to learn something new, whether it works or not.

FTFY. Commercial research, as you pointed out further down, includes product development. (Of course, it also includes developing things that help you develop the products as well.) Xerox PARC was/is funded by the sale of copy machines. It isn't unreasonable to require researchers to focus on developing products that help fund more research.

You shouldn't expect Xerox to fund projects that are solely designed to learn something new. Sometimes they will and that is great, but at the end of the day, the responsibility for funding high-risk research (the research that commercial labs often build upon) rests solely on the government.

Comment Re:It's Not ALL Bloggers (Score 1) 353

As I understand it (oblig IANAL), if you can pass a state bar exam, you are a lawyer in that state. You don't have to prove your education in law, or have affiliation with any recognized lawyers' associations. You just need to prove you know everything you could have learned in law school, but didn't. As it is, you can represent yourself in a court of law and it's a bonus if you actually know the protocol, so you are, for all purposes, a lawyer for yourself (Yes, I know there's a difference between representing yourself versus someone else.)

You understand it incorrectly. Passing the state bar exam is one barrier to entry (a VERY DIFFICULT barrier), but you also have to pass the MPRE (an ethics exam), possibly take an additional ethics course (if you're in New York, like I am) and finally, submit an application to the court for admission. The application is very thorough - I just sent mine in and had to include reference letters from every attorney I ever worked with and had to list every job and residence I've had for the last ten-odd years. Here's a link to the packet, if you want to look it over. After you have submitted the packet, you get grilled by the character and fitness committee and then, if you make it through that step, you become a lawyer.

I believe that the original poster isn't a great journalist. (Did you see how I qualified that?) He or she didn't bring up the fact that after creating websites like obsidianfinancesucks.com, she offered her services to Obsidian to clear up their "PR Problem" at $2,500 a month. That seems like an important fact that someone might need to shape his or her opinion on the ruling. As I understand the judge's ruling, it doesn't bar all bloggers from being considered journalists, just this one and even then, only as it applies to this case.

Comment Consider External Drives (Score 1) 253

I'll go on record with a preemptory "what he/she said" to include all of the previous comments. This is one of those things that nearly every slash dotter has to do at one point or another and in my experience, you'll have to deal with at least one of three bottlenecks: time, money, or bandwidth.

If you are doing this to several hundred machines, sneaker net is likely a faster solution than your network. Take advantage of the higher bandwidth and save the backup images to a portable USB drive. With a large enough drive you can also keep the new image local as well. Using this method you can boot into Your Favorite Backup Solution, take the backup, securely erase the disk, and write the new image in one fell swoop. After the imaging is complete collect your various USB drives and march them back to the server.

With large enough USB disks, you could repeat this process several times before off-loading the images to your server.

Comment Re:FIRST BITCHSLAP! (Score 1) 66

I'm not sure how it is done where you work, but this information - location and usage - is not anonymized when you order it from the carriers with a subpoena (at least in New York). In our office, we use this data all the time to defend against auto accident litigants. (Hint: The plaintiff always swears he was not on the phone at the time of the accident.) Regardless, the stuff we get is never anonymized.

Comment Huh? (Score 0, Troll) 94

But instead of accepting responsibility after a Cisco employee provided his ID and password to ex-Cisco engineer Peter Alfred-Adekeye, the networking giant sic'ed the Feds on Adekeye, who was slapped with a five-count indictment by a Federal grand jury last week.

Can someone explain to me why the company's CEO should be responsible for his employee wrongfully sharing his password? Disregarding the specific employee's fate for a moment (the link is dead at this time), how is "sic[ing] the Feds" an inappropriate response for someone who illegally penetrated their network?

For his five downloads of different versions of Cisco IOS — four of which were launched within a 15-minute period in 2006 — the government is seeking a penalty of 5 years imprisonment for Adekeye, a $250K fine, and 3 years supervised release.

Summary: Man penetrates corporate network with hot credentials, man copies software from illegally penetrated network, man complains when law enforcement gets involved.

It's the latest salvo fired in the war Cisco and US prosecutors have waged against Adekeye since he filed an antitrust suit against Cisco in December 2008.

Private citizens cannot file antitrust suits.

Insert comment about the quality of free slashdot submissions and obligatory lawn reference.

Comment Re:11 Dead. Missing from summary (Score 1) 184

Yes, it was. In fact, at least one slashdotter was nearby when the bomb went off.

Maybe this will lead to new standards (or maybe, they'll pay better attention to the old ones) but those standards exist to protect people. The GP was right - the summary could have been a little more helpful in describing the extent of the tragedy.

Comment Re:and how is that different from Google Books? (Score 1) 174

they had no authorization to engage in massive copyright violation, scanning millions of copyrighted books that they had no right to, specifically violating the exact same laws that drove Kinko's to lose massive amount of university campus business in the 1980s.

Google's approach did not involve breaking and entering. Google didn't plug in rogue devices on secured networks, engage in spoofing, unauthorized network access, evade physical security (kudos for masking your face with a bike helmet) and voluntarily circumvent security measures designed to protect the network after admins found him. Google DID scan a bunch of books and they subsequently settled with the copyright holders. Google certainly put themselves on the hook for civil penalties and in the process pissed off a bunch of authors, but they didn't do any of the above.

So to answer your question, this is nothing like what Google did.

Comment Re:Compromising the investigation (Score 2) 363

That's a more or less correct reading, based upon your exposure. However, there would be no chain of custody here because it went from the defendants, to a third party (Lulzsec) and then (presumably) to the authorities. (Proper chain of custody would be something like: scene of the crime -> lab technician -> detective -> prosecutor.) Instead, a prosecutor can take these emails along with additional evidence to get a warrant for the originals, thereby getting a "clean" set of evidence. The clean set would be admissible and likely devastating at trial.

Slashdot Top Deals

Suggest you just sit there and wait till life gets easier.

Working...