Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Food Chain? Environment? (Score 3, Interesting) 265

Lets see Myxomatosis - 99.8% of the rabbit population destroyed in 2 years

Over time the numbers of rabbits resistant to the virus increased and in 1995 the rabbit haemorraghic disease virus RHDV was released to again cull the numbers. Even in 1995 when RHDV was release the rabbit population was no where near the 1950s population which was destroying pastoral Australia.

Cane toads on the other hand - now that was a fuckup.

Comment Re:Government Intervention (Score 1) 495

The problem with privatising Telecom was the fact they didn't split the entities, not that the final mile was privatised.

If Telecom had been split into Telstra and Telecom wholesale and both sold to private hands but with Telecom Wholesale prevented from selling directly to consumers you would have had a good outcome. Then it would have been similar to an Agile or a pipenetworks except it had the incumbent final mile.

If the setup had been the same as what has just happened to TPG, that they have to allow access to their network to other parties at the same base cost. Then a lot of the problems we have today wouldn't have happened.

Comment Re:Government Intervention (Score 2) 495

There is also a third option. The government builds the ISP and then sells it off.

My very first dialup internet connection was this. It was called Global Info Links and was an entity owned and run by Ipswich City Council. They built all the necessary infrastructure for it to work because the telcos didn't believe there was a business model there. 2 years later they sold the business off to private equity for a healthy profit.

So in the end the tax payer got a service that the market wasn't going to provide and over a longer term walked away with a boost to the public coffers so there was no argument of wasted taxes.

Comment Re:What's more irritating? (Score 4, Funny) 252

I was actually thinking about leveraging the parallel symmetries that exist between the paradigm shifting next generation technology that is the INTERNET of THINGS and the once in a generational market disrupting future shaping technology now known as The Cloud to achieve never before seen levels of synergy, segment alignment and leading edge thought processes, allowing us to disrupt old world dinosaur markets and take us into the new age of Big Data.

Comment Re:It'll never happen (Score 1) 333

How is space tiny relative to the time it has been around when it is expanding at a rate greater than the speed of light? Galaxies that a over 5 gigaparsecs away are travelling away from us at a rate higher than the speed of light so there is no way, without FTL of us ever getting there, let alone our current snails pace tech.

Comment Re:Damn! (Score 2) 129

Then you would need to charge every plaster who used iron cored mesh when they rendered a house.

And seriously think about what you are saying. If they turned their building into a faraday cage then everything inside the building would still be able to talk to each other. It's not like they are saying "please sir, will you please place your phone inside this copper ball please" and cutting your phone off.

If a hotel turned itself into a faraday cage everyone's mobile phone wouldn't be working either and the last thing a hotel would want is to not be able to host a conference because people's phones don't work.

Comment Re: I am mad if I cant unplug my employee hotspots (Score 1) 129

If the hotspot is connected to your internal network then you absolutely have an issue. If it is just a hotspot, ala your mobile phone then there is no security risk as there is no connection to your network

If that vector exists though for the hotspot to be connected to your network you by default have to treat the network as compromised and hostile. So if you are in an office, or a hotel or any other large physical scale environment you have to treat the wider network as if it is compromised already because you are physically incapable of securing it. And it should be as separate from your server network as possible. It is why we have VLANs.

If you have someone with access to your server rooms they should be a trusted individual. If that individual is setting up an unsecured hotspot with access to your network without prior approval they should be immediately be removed.

Comment Re:This is a much bigger problem than you might th (Score 2) 129

I'm still not understanding how your setup allowed them to function. Assuming you are talking about them plugging a router into an active port in a room, how are their devices resolving anything other than your hotels generic hotel login screen. That there should have immediately stopped them as they would have had to authenticate through your portal and you would have had a log of it. Simple case of warning then dismissal.

If it's not a port for guests to access the internet from in their rooms why the hell don't you have port locking turned on at the very least? Why would those ports be of any use what so ever? They either should not have worked via port locking or there should have been no way they resolved and address or had a gateway to the internet. Staff will stop bringing in routers if it doesn't go anywhere.

Comment Re:God, what drivel ... (Score 1) 214

I've never ever ever got on with voice commands. Whether it is on a desktop or my phone. If we take this one "Hey Cortana", firstly I never say Hey to anyone. It is just not a work I use so that feels bad enough. But next, how do you pronounce Cortana.

Just no.

As an aside - why is everything so flat these days?

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...