Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment abuse@organizationname.com (Score 3, Informative) 241

It's been years, but a few times I found the organization sending traffic and sent an email to abuse@
the domain name and had positive results.

You can look up the whois online registry information on where the traffic is coming from, and there can be additional contact information there.

Regards,

Sam

Comment Re:Easy to demand more security (Score 1) 266

Medical / Legal power of attorney?

Had she formally conveyed approprate powers of attorney to a family member or someone she trusts?
If she did, you may be able to get a certified copy / notarized representation of such documentation into the right hands at AT&T, and they could respond to you.
The holder of such authority would have a legal basis to represent her to anyone in her interests, including these matters.

I'm not saying it's guaranteed, but if you can navigate their bureaucracy a bit, you may be able to get the needed access if she's still locked out.

Regards,

Sam

Comment Broadcast on Internet for those who cant be there (Score 1) 399

If you have any close friends or family members who can't attend, I'd recommend working out a way to broadcast the wedding over the Internet so they can see it.
Assuming you are digitally recording it anyway, this may not be too difficult, and they don't have to wait for a DVD or image file of it later. They can still get a sense of being there.

Perhaps doing something similar for any reception as well.

I'd test the equipment and setups at their end prior to the big day to make sure they didn't have any little browser issues or sw or connectivity issues interfering, so there wouldn't be unpleasant surprises if they couldn't get through.

-- Sam

Comment It was good enough for this guy... (Score 0) 422

Yes, Ken Thompson....

Quote:

http://www.brainyquote.com/quotes/quotes/k/kenthompso254835.html

From the original document...

http://docs.google.com/viewer?a=v&q=cache:7bAOKq-gu0oJ:citeseerx.ist.psu.edu/viewdoc/download%3Fdoi%3D10.1.1.167.4096%26rep%3Drep1%26type%3Dpdf+I+am+a+programmer,ken+thompson&hl=en&gl=us&pid=bl&srcid=ADGEESibF-uVJXM7x_bfCWNz5chFMmYAUIxab__PJLL6zJOzKIFFP7_matZ6wmwqghTasmglEDX-UeS3McfIK1xR5i8_BY-wZ9fcbOitAsETD0o-MyewT8PPveCyQ7lZZD2jI0ArQA52&sig=AHIEtbSKScx76XaTVYkxJ0sl05FJWnQI2A

Comment Re:Yes, this is legit and no, we're not idiots (Score 1) 387

I like the other comment on this thread, to visit the supercomputing conference/s for ideas. Besides, a lot of useful contacts will likely be made, and it can help you or your team get familiar with a bunch of issues.

You indicated that you have a private philanthropist that has a medical issue being researched by your labs. I don't know if your organization is a non-profit, or what it's charter is, but if your current labs project/s aren't enough to keep a supercomputer / cluster running at capacity right now, perhaps you can team up with other centers working on related problems. You have a great opportunity with this gear to help solve real problems.

I took a quick look for what the NIH is doing with supercomputing (just for ideas), and found this link:

http://cit.nih.gov/Science/SupercomputingResources/

I'd actually look for a list of projects, and prioritize them based on your organizations mission. Depending on your setup (I'm not a clustering / super-computing expert), you may wish to break your array down into more groups of fewer computers, or run it as one large system.

Good luck...

- Sam

Comment Does the company know it's security posture? (Score 1) 412

What is their security posture like? (Don't answer here...)

Have they done any security audits or reports internally - even if they haven't, do they have someone in the company who is familiar with the security posture the company has across the board? This could be a person who has it as his formal job, or someone handling network and system operations who is familiar with their setup and had a general interest in security.

That person needs (I think) to have a sit-down with appropriate staff and then with the CIO to discuss what can be done to immediately perform any key hardening and tightening up some defenses. They should also check their system to see that their appropriate configurations are intact and haven't been compromised. There may be limits to what can be done immediately, but this would be the time to tighten up the easiest ways for their networks or systems to be compromised, and eliminate some unnecessary risk. The biggest risk may be if any systems were already compromised.

This company could bring in a consulting firm (and maybe it should), but I'd start by leveraging in-house knowledge and see if they immediately couldn't identify / review where they stand, what current risks exist, and what can be fixed in 24 hours, 48/72 hours, one business week, and longer. For now, the company shouldn't skimp on the overtime pay for these efforts, or at least let the people involved know their efforts are important and will be appreciated, and their efforts will be rewarded in some manner.

Let us know how things work out... Good luck...

-- Sam

Comment Other - Upon Completion of the Towers of Hanoi (Score 1) 585

From the classic problem...

From Wikipedia:

The puzzle was invented by the French mathematician Édouard Lucas in 1883. There is a legend about an Indian temple which contains a large room with three time-worn posts in it surrounded by 64 golden disks. Brahmin priests, acting out the command of an ancient prophecy, have been moving these disks, in accordance with the rules of the puzzle, since that time. The puzzle is therefore also known as the Tower of Brahma puzzle. According to the legend, when the last move of the puzzle is completed, the world will end.[1] It is not clear whether Lucas invented this legend or was inspired by it.

If the legend were true, and if the priests were able to move disks at a rate of one per second, using the smallest number of moves, it would take them 2641 seconds or roughly 585 billion years;[2] it would take 18,446,744,073,709,551,615 turns to finish.

http://en.wikipedia.org/wiki/Tower_of_Hanoi

Comment Re:wiring diagram on the inside of the lid ? (Score 1) 153

I had a late model Apple II+ (Revision 7 motherboard). Loved the machine.

The System Manual for the Apple II (forget the exact designation) had a fold-out circuit diagram of the entire system.

One of the other manuals also provided a significant amount of assembly code (relating to some aspect of the system). I don't remember the exact nature of the code provided.

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...