Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Yes, it's called redundancy (Score 1) 107

I fear you may be right, and that's exactly why they don't do it more often... but I think that also underscores my point a bit. Shouldn't they work to get it to the point where users won't be impacted?

Netflix does this pretty aggressively and users don't seem to notice. Though I realize for most companies I am being very idealistic.

Comment Re:Another great Scalia line (Score 1) 1083

I'm pretty sure the Founding Fathers wouldn't have found an inalienable right to buggery in the Constitution, but it seems agreeable to you. "Gay marriage" would have been anathema. But again that is no obstacle for you to freely invent and overlook as desired.

The founding fathers also did not see a right to freedom for blacks, suffrage for women, suffrage for non-property owning white men, or mixed-race marriage.

Funny enough, most openly discussed the need for protection of minority (in the original sense) rights in a democracy. Given that they were at the forefront of "freedom for all" in the context of the norms of their time, it is fairly likely that they would support all of those rights if they adopted modern norms.

Either way, it's all very irrelevant. The founding fathers were very clear about both 1) the separation of church and state and 2) protection of minorities from majorities. These, combined with the 14th amendment and mixed-race marriage protections form a solid legal basis.

Comment Re:Yes, it's called redundancy (Score 1) 107

Because doing it right involves a full fail-over test including transferring loads or test loads, DNS auto-reconfiguration, and possibly even paying extra to bring up extra capacity elsewhere. You need to make sure it happens right when it's needed. Extra paperwork, overtime, it's all in there.

If the system is architected well, shouldn't all of those steps be automated... including monitoring and failover success/failure?

Comment Re:Anyway (Score 1) 546

I'm really too tired to pull links in response to this clueless tripe today. Spies can and do prevent wars by conveying credible information regarding intent, capabilities, and plans.

A government's public statements cannot be trusted. Verification from reliable assets? Very valuable.

It is extremely likely that a soviet spy/American traitor prevented the Cuban missile crisis from leading to nuclear war. The US was actually planning to invade, and did not know that Cuba both a) already had nukes and b) the Soviets lacked the ability to prevent local commanders from using them (no centralized code system). Woops!

Comment Re:Replace everything by the same thing, sure ... (Score 1) 189

Replacing all windows7 installs by new windows7 installs will for sure remove the possibility of the same malware hitting again. DOH!
Maybe change platform.
There are 2 other OS to consider, MacOS and Linux.

An important organization should always have 2 completely different platforms.
Not only 2 different browsers on the same OS, but different OS. And by different I don't mean a Microsoft-different who state the XP is not NT and is not Win7. It's all windows!
Same goes for Linux, where redhat or debian is not different, it stays Linux. Sunos may be different.

double the admin costs, half the interoperability... for an increased attack surface and a higher increased zero-day count on any given day?

The way I see it, the problem isn't that % of workstations are infected. The problem is that all their data are belong to someone else. I think they'd be better off rearchitecting and rethinking things than mixing OSes for the sake of diversifying IT.

Comment Re:Unless it was part of a contract..... (Score 1) 379

No, that is a completely incorrect interpretation.

Anyone can publish photos taken in public places in a reasonable way (i.e. not using a ladder and a supertelephoto on a sidewalk). They can publish these images in any way, with or without editorial, in nearly any way... as long as it's not exploitative of a protected attribute.

Coca-Cola cannot take a picture of Michael Jordan having a soda at a public event on public property, slap the Coke logo on it, and make that into a marketing campaign. The National Enquirer cannot edit that image to show Michael molesting a child, then publish it. But any person can take the unaltered photo, put it on twitter, and say "Hey, check out this photo of Michael!"

Comment Re:More hoops before travelling through USA (Score 1) 200

Unfortunately, I pay taxes in the US, thereby providing material support to a terrorist organization

I hate to burst your bubble, but most definitions of "terrorism" explicitly exclude state actors.

You could certainly argue that that is an artificial constraint designed to protect states from the accusation, but then you'd have to come up with a better definition. There are a few out there, but in all honesty, they tend to suck.

Comment Re:More hoops before travelling through USA (Score 2) 200

Two points.

1) for spinning platters, being able to recover significant amounts of data after even one pass of zeros is a myth. See this article on recovering overwritten data or any of the top google results.

2) SSDs are different, but far easier to wipe if you get a good model. There is an ATA Secure Erase command, and you can use it directly with hdparm on linux. It takes seconds to wipe most SSDs this way.

However, firmware implementation of this is spotty. You will find some studies showing secure erase failures. But the paper is 4 years old, and manufacturers seem to have gotten better. So if you're REALLY concerned about this level of security, encrypt your SSDs and find a manufacturer that properly ATA Sanitize Block Erase.

Slashdot Top Deals

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...