Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Spend Money to Save Money (Score 1) 551

I'm working with a SOHO on a workstation refresh. The brand new Lenovo workstations don't come with OS disks (only the burn-your-own recovery disk option). So, we either have to buy Win7 OS media (which, in my mind, makes licensing tricky), or accept the OS load as is, and try to surgically remove anything bloaty. Either way, no good option when you are only talking about half-a-dozen workstations.

We're trying to de-bloat.

I contrast this with big companies I work for/with. With hundreds or thousands of seats, they have the critical mass to justify an Enterprise Licenses with Microsoft that means they get what they need. Buy a hundred workstations, and blast down a clean, standard image. As an added perk, they don't have to troubleshoot too deep, just re-blast.

Comment Join the Real World (Score 1) 439

My office supplies me an e-mail account for work. I accept the privacy implications there (i.e. there are none). I also have various personal e-mail accounts. I assume my employer won't have access to them (absent a subpoena), and I take into account whatever privacy concerns might be associated with the service I choose to use.

Assuming that Yale isn't blocking access for other mail services, I fail to see how this is any different. Use the yale.edu account for school related matters, and get your own account for private messages.

Of course, this also means that Yale's IT organization has taken into account the implications outsourcing has on the school's intellectual property, etc. As part of the RFP and selection process, these items should be taken into account to ensure the outsourcer's offering has sufficient controls. This is really no different than any large organization choosing to select Exchange, Notes, GroupWise, or outsourcing the service through any number of third party providers. *I do recognize that Google Buzz does change the thought process for GMail users. Of course, that is also a contract issue with Google-as-outsourcer (i.e. privacy and intellectual property protections should be built into the contract, and the outsourcer is obliged to ensure their offering meets the contract specifications).

Comment Re:yes (Score 1) 1049

I totally agree--make it look professional. In an age of free e-mail, there really is no excuse for cutegirl1998 or gamerstud on a resume. I've spoken to recruiters as well as ready scores of job hunt sites. Having an e-mail address based on your name is recommended. In addition to putting on a more professional face than webgod1998, it helps make sure that "Resume of John Deaux.doc" will be associated with johndeaux@gmail.com.

Comment Trickle Down (Score 1) 814

When I got my first Mac, my daughter (almost 5) inherited my old PC. I twas good enough for light web surfing/educational games. If/when she needs more power, we'll revisit it. However, a six-year-old Pentium IV seems to be good-enough for her. So, I suspect that a chunk of the "Mac-and-Windows" households have an older system that has been displaced by a newer one.

Comment Moot Point? (Score 1) 436

I get the whole notion, that the best you can hope for in relating an IP to a specific entity is, most narrowly, a computer, or, more broadly, a network. I wonder what the practical effect of the ruling will be?

If an IP is suspected of criminal activity, and it can be related to only a particular network/house, the case may not be a slam dunk. However, it may well be enough to create all sorts of joy for that network/house. It's probably enough probably cause for a warrant which will then find all computer attached to that network confiscated. If they can pin the behavior to a specific machine, then anyone who had access to that machine could be under suspicion.

If you run an open WiFi site, the net could be broadened to any computer the the radius of your signal--the neighbors will love you. Even though one can make the arguement that some random car with a laptop might have parked in front of your house, and you might carry the day in court, you'll still have a lot of hassle and legal fees.

(And that doesn't include anything that might shake out from what's on those computers (child porn, etc.), discovered as a consequence of the search. For that matter, how are charges filed for such a thing on a shared computer?)

I'm not sure the RIAA would be able to get such warrants/subpoena based solely on an IP address. While it will prevent them from simply creating suits based only on IP address, at the end of the day it's just one more hoop to jump through.

At the end of the day, that's my point: while it definitely raises the bar for legal action, I'm not sure it does much more than that in practice.

Note that I'm not a lawyer--this could be 100% bunk (or more!).

Comment Shredder (Score 4, Interesting) 527

I periodically contract with a company to dispose of old hardware for my company. The first time i talked to them, they mentioned they shredded old media. I assumed he meant floppies and tapes and the like. Given the nature of the material, it didn't seem that impressive, but certainly nice. When I got the estimate, I was a bit shocked--why was it so high? Then they explained--by "media," they meant hard drives. They sent me a PDF on the equipment. Hard drives are removed from machines, and placed on a conveyor belt. This fed the hard drive into the shredder. On the other end, bits of metal came out. I begged them to let me operate it--just for one or two drives. Damn lawyers!

Comment Is "Preferred Medium" a Legitimate Criteria? (Score 1) 715

With respect to the exact circumstance, where the book is unavailable aside from a used copy, I'd probably be less likely to say getting a pirated ebook is wrong. I suspect it is a similar scenario as abandonware, software that is no longer sold or supported (perhaps even the platform it runs on is no longer in common use), but copyright is still technically in effect. If it is a reference rather than, say, a bit of fiction, I'd feel better about it (though really, the ethical argument is the same).

That said, one line in the original post struck me. "You can buy it from Amazon as a used book, but that isn't your preferred medium." What if a book you wanted or needed were only available as a hard copy, and is currently produced? For the sake of argument, let's say it's brand new, hot off the press--only Stallman might argue that the author doesn't have a right to a copyright. It's not your preferred medium, but it is legitimately available. There is a pirated copy available. Would you take the pirated copy? Would you argue that, since they aren't making it in your preferred format, it's fair game?

Take it to the next level: say, a year or two from now, your book is released--brand new printing. Perhaps even expanded! Alas, no etext. Would you buy a copy, just to bring you back to good standing, or would you rationalize it by saying there is no etext (your preferred medium, after all)?

(I'll grant this: in any scenario, while perhaps not legally correct, I would see no ethical problem obtaining a legitimate copy of the book, and grabbing the etext. My comments are more around just going out and grabbing the etext.

Biotech

Submission + - Stem Cells Shown to Protect Dying Motor Neurons

Penguinshit writes: "Amyotrophic lateral sclerosis (ALS) is a fatal, progressive neurodegenerative disease characterized by rapid loss of muscle control and eventual paralysis due to the death of large motor neurons in the brain and spinal cord. Growth factors such as glial cell line derived neurotrophic factor (GDNF) are known to protect motor neurons from damage in a range of models. Human cortical neural progenitor cells derived from fetal tissue (ie. stem cells) can be expanded in culture for long periods and survive transplantation into the central nervous system, in some cases making large numbers of GFAP positive astrocytes. They can also be genetically modified to release GDNF and thus act as long-term 'mini pumps' in specific regions of the brain. In this study a team at UW-Madison's Waisman Center genetically modified human neural stem cells to release GDNF and transplanted them into the spinal cord of rats with mutant SOD1. Following unilateral transplantation into the spinal cord of the rats there was robust cellular migration into degenerating areas, efficient delivery of GDNF and remarkable preservation of motor neurons at early and end stages of the disease within chimeric regions.

This work is especially important to me, as I have been living with ALS for almost three years."
Biotech

Submission + - New antibiotics for pathogenic attacks of bacteria (heraldbiz.com)

allengineering writes: "A team of research directed by the pr. KIM Kyung-Gyu of the Faculty of Medicine of the University of Sungkyunkwan discovered the structure of the protein Rse B playing an essential part in the transmission of the signals of stresses resulting from the pathogenic attacks of bacteria. The article is been published in the edition of May of the Proceedings of the National Academy of Sciences of the the USA (PNAS). This projection should make it possible to develop new antibiotics."
United States

Submission + - Forensics Expert says Al-Qaeda Images Altered

WerewolfOfVulcan writes: Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...