Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Unix

Submission + - Copyright suit forces shut down unix timezone data (joda.org)

Zecheus writes: The founder and maintainer of The timezone database writes:

A civil suit was filed on September 30 in federal court in Boston; I'm a defendant; the case involves the time zone database. The ftp server at elsie.nci.nih.gov has been shut down. The mailing list will be shut down after this message. Electronic mail can be sent to me at arthurdavidolson gmail.com. I hope there will be better news shortly.


The Internet

Submission + - Northern Canada in the Dark (www.cbc.ca)

zentigger writes: At approximately 06:36 EDT Thursday, October 6, 2011, Anik F2 satellite experienced an attitude control issue and lost earth lock affecting C, Ku and Ka services. The satellite went into safety mode and moved from pointing to the earth to pointing to the sun.
This has put most of Northern Canada in the dark as all internet and phone services come in over F2.

Comment Re:Is Slashdot being astroturfed? (Score 1) 664

Yes, you are astroturfing for the 'clean coal' lobby. All of the complaints you cite as being wrong with nuclear power generation are also true of coal power generation. That's why other people were commenting that coal is still a net-lose to nuclear even with an every-20-years problem like TMI, Chernobyl, Fukushima.

Comment Probably a good idea (Score 1) 7

Because:
  1. 1. You're using their network resources, and it's distinctly possible that they know something you don't, or the system may need some care/maintenance when you're not around,

    2. They're likely responsible for security auditing, etc. And unless this is a very unusual environment, they've already been trained/contracted about non disclosure (HIPAA in your case). It's a lot easier for them to do the job of proving that your box isn't a security risk if they can get inside of it, and providing there's need to know, it's an appropriate and justifed risk to get substantial benefit.

    But:

    3. Choose your trusted party carefully - different organizations have different trust and authority models for their IT departments. Most tend to concentrate administrative logins with particular people with ability and need to know on particular types of systems, so a Windows admin wouldn't have rights on *NIX boxes, an infrastructure admin wouldn't have rights on anything but routers and switches, etc. Depending on the size of the organization this might be one person or three different departments. In any case, verify that the person/group you're granting login rights is knowledgeable in general terms about your system. People who don't know anything about the box seldom have need to log in.

    4. Review your logs. A good idea in any event, but it keeps folks honest if you casually ask them why they logged into your box at 03:15 on Saturday. And if they didn't, you've just identified a possible data breach.

Submission + - Do I give IT a login on our Dept server? (slashdot.org) 7

jddorian writes: I am head of a clinical division at an academic hospital (not Radiology, but similarly tech oriented). My fellow faculty (dozen or so) want to switch from paper calendar to electronic (night and weekend on-call schedule). Most have an iPhone or similar, so I envisaged a CalDAV server. The Hospital IT dept doesn't offer any iPhone compatible calendar tool, so I bought (my cash) a tiny server, installed a BSD, OpenLDAP for accounts, and installed and configured DAViCal. After I tested it out, I emailed IT to ask to allow port 8443 through the hospital firewall to this server. The tech (after asking what port 8443 was for), said he would unblock the port after I provide him with a login account on the machine (though "I don't need root access"). I was taken aback, and after considering it, I am still leaning toward opposing this request, possibly taking this up the chain. I'm happy to allow any scan, to ensure it has no security issues, but I'd rather not let anyone else have a login account. What do the readers of Slashdot think? Should I give IT a login account on a server that is not owned or managed by them?

Comment Nobody remembers IVHS? (Score 1) 317

I see they've discovered platooning...again. Looks like the difference this time is that the lead vehicle is not autonomous. It's not a new idea - there was lots of research and hoopla over increased traffic density, increased safety, and reduced fuel consumption and emissions back in the late 90s. Simply put, a speeding car is very slow compared to speed-of-light communication between vehicles and cell towers, and the rules of physics are pleasantly consistent - it's an easy system to model, and not especially hard to implement - the trailing vehicle driving computer does not need to be aware of the whole road, just its position in the lane and its relation to other vehicles nearby.

The variant I remember used rare earth magnets buried in the center of the lane to give the cars an idea of where they should be on the roadway, and sensors and inter-vehicle communications were used so that each car knew where the others in its platoon were. There was an assumption that something like a cellular communication network and traffic management computer would tell entire platoons what a safe speed for this block of road was. Because the auto drive system had reaction times in the very low millisecond range, it was quite practical and safe to space cars a meter apart at 130 km/h, which offered big fuel economy benefits. Remove the cellular block command and control system and you have what the Europeans are proposing.

http://faculty.washington.edu/jbs/itrans/bishopahs.htm
http://www.williamson-labs.com/ivhs.htm
http://pubs.its.ucdavis.edu/publication_detail.php?id=859

This is yet another thing that evaporated after 9/11 so that the US could afford to create the TSA and replace a dictator in Iraq with a power vacuum...

Comment You have a bigger problem than the piracy... (Score 1) 614

Machines with pirated software usually have malware as well, which means you now have a corporate data security problem. We've found with our Shanghai branch that the only solution has been to make sure nobody on site has admin rights. If they want software, we install it for them. Blast your standard OS and application build onto them and then lock the machines down.

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...