Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Social Networks

Submission + - Darwin works in mysterious ways (syracuse.com) 1

ckret writes: "Biker dies while attending parade to protest to law on helmets:

“He’s a rebel,” said the older brother, who lives in Liverpool. “That’s what he felt like doing. He protested everything.”"

Virtualization

Submission + - virtulization (blueshield.com.au)

chandiish writes: "BlueShield understands the potential of Disasters and Risks associated with a Business. Our Team of Qualified Technicians and Engineers had implemented customized Disaster Recovery Strategy in many Organisations to help them running their business with peace of mind. BlueShield Disaster Recovery Management Consulting Services are designed to effectively cover a wide range of Risk and Problems that your Organisation might be facing. Our Consulting Team works in conjunction with your Technical Team and ICT environment to formulate Strategy to maximize uptime, helping in reaching the Business Goals. BlueShield Technology can help you in following ways:

Asses and Review your existing Risk Analysis
Asses you Review existing Business Continuity Plan
Assess your ICT Infrastructure & Assets
Assess your Business Requirements
Asses your complex Network Requirement and Dependency
Recommendations on Infrastructure Assessments
Plan and Assist in Disaster Recovery and Business Continuity Processes
Assess and Review existing Backup Technology
When we source your IT equipment, We’re there.

We source the right technology (no matter where it comes from) for your business needs. As a vendor-independent company, we serve no master other than our customers – and have no higher priority than our customer’s needs.

When you build your IT environment, We’re there.

We bring one of Australia’s best teams of engineers and business IT specialists to the job of designing and delivering IT systems that help you maximize your business strengths.

Service and Support, We’re there.

We can look after your technology on your premises (no matter how remote) or at our own tech centre. And, from our Network Operations Centre, we can constantly monitor the health of your systems – and stop troubles before you even become aware of them.

When we look to the future, We’re there.

Our commitment to Research and Development means that a better IT future for Australian business is being developed by BlueShield today. This means that you are always kept up-to-date on the very latest developments in IT throughout the world."

Comment Re:Why sue now? (Score 5, Interesting) 315

This law itself, in it's current form, nullifies the newly passed IPRED law.
The law says that stored information can only be requested by the police or prosecutors if a serious crime has been committed (or the suspicion of a serious crime).
Hence a third party like RIAA cannot request information to file a suit according to the IPRED law.
Another law in Sweden, currently active, says that all identity information MUST immediately be DESTROYED when it is no longer required for completion of business transactions.

That's some fine politics there, Lou!

Comment Actually there are a few more than two. (Score 5, Informative) 92

here you can see a few other ISP's that erases logs.
This behaviour is not a circumvention of the IPPRED law but an enforcement of law of electronic communication that states that customerinformation that is not needed for daily operations must be erased as soon as possible.
This law in itself nullifies the IPRED law.
Security

Submission + - National Swedish Newspaper Hacked

ckret writes: Almost no swedish newspapers or sites have announced anything regarding the incident where VFH (Mature (Grownup) Pissed-Off Hackers) hacked the prominent swedish newspaper Aftonbladet. Some correspondance from VFH can be read at Flashback (swedish only). As it seems Aftonbladet still have no clue what happened or that they still are compromised. Aftonbladet tried to open up (swedish) a dialog with the hackers. What hacker would answer the "call for coffee" that Aftonbladet propose?

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...