Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment The sound sucks because your gear sucks. (Score 1) 95

Get management to pony up for real AV gear. The problem is your gear is garbage and not designed for the use. There is no magical CHEAP thing you can buy.

Now get a biamp or BSS DSP and 4 boundary mics hanging from the ceiling on some 18" diameter glass plates... I can make a meeting room cover all voices in there perfectly for video and teleconference.

Comment Re:Strange (Score 4, Informative) 80

Link aggregation works at layer 2 (e.g. Ethernet). Basically, make multiple cables between 2 devices look like a single one.

Multipath routing works at layer 3 (e.g. IP), you can send outbound packets to multiple routers for further forwarding. It works when there are "real" routes between the hosts (i.e. not behind NAT).

This is one step beyond that, since it also does connection tracking and will work with outbound port NAT, so you can have a private network connected to multiple ISPs.

Comment Re:Bad idea (Score 1) 671

Absolutely, He is a fool if he even thinks about it because the DOJ can promise the world and not abide by it. In fact I guarantee they will make his life a living hell and an example to all those bad bad americans that would dare let out secrets that help terrorists.

Only a fool would come back here after blowing the whistle like that.

Movies

Gritty 'Power Rangers' Short Is Not Fair Use 255

Bennett Haselton writes: Vimeo and Youtube are pressured to remove a dark, fan-made "Power Rangers" short film; Vimeo capitulated, while Youtube has so far left it up. I'm generally against the overreach of copyright law, but in this case, how could anyone argue the short film doesn't violate the rights of the franchise creator? And should Vimeo and Youtube clarify their policies on the unauthorized use of copyrighted characters? Read on for the rest.

Comment Re:Interesting idea, nasty downsides (Score 1) 93

Depends on your risk scenario planning. But yes, it does. A full rundown of our data integrity program would exceed the tl;dr scope on Slashdot, as well as violating NDAs :).

In general though I'd point out that disk based vaulting technologies have advanced considerably in the last few years and if I were providing advice to someone I'd point out that there are cloud based solutions which are write-only type solutions if your risk tolerance permits the use of third parties to store your data (e.g. CrashPlan). Avamar may also be an option depending on costs and resources.

That's where the professional part of IT professional comes in. You weigh your risks and have an honest discussion with your partners on the business side without fear mongering and you all decide on what your risk tolerance is, and have those discussions regularly (hint: Google's risk tolerance was different when they were in a garage then as a publicly traded company :)).

Comment Re:B0ll0cks... (Score 1) 538

It would be my pleasure to see the whole lot of them have the actual text of the law applied to them as though they were a tattooed black guy with multiple priors.

We often have suitable laws; but they just mysteriously never even get brought up, much less by people in a position to do something about them.

Comment Re:File extensions? (Score 2) 564

There are two problems. The first is that the OS allows you to run porn.jpg.exe having downloaded it from some random place on the 'net. I don't think that either OS X or Windows do: they'll both pop up a thing saying 'You are trying to run a program downloaded from the Internet, do you really want to?', which isn't normally something that happens when people try to open a file so ought to trigger them to avoid it (if it doesn't, then seeing the .exe extension probably won't either).

The second is that the OS allows programs and other file types to set icons at all before their first run. This also leads to confused deputy-like attacks where you think you're opening a file with one program but are actually opening it with something that will interpret it as code. The solution to this is probably to have programs keep their generic program icon until after their first run. If you double click on something that has a generic program icon, then you probably intend to run it...

Comment Re:Politics aside for a moment. (Score 1) 538

"Many people have multiple email addresses."

Why would mixing them be an issue here? Information, much of it extremely sensitive, related to her government service as SoS shouldn't ever be kept on a private computer, and using a government computer for personal use is improper:

Executive branch employees have a duty to protect and conserve Government property and may not use Government property, or allow its use, for any purpose other than the one that is authorized.

...The term "Government property" includes real or personal property that the Government owns or leases such as:
telecommunications equipment
computers...

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...