Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Image

IT Worker's Revenge Lands Her In Jail 347

aesoteric writes "A 30-year-old IT worker at a Florida-based health centre was this week sentenced to 19 months in a US federal prison for hacking, and then locking, her former employer's IT systems. Four days after being fired from the Suncoast Community Health Centers' for insubordination, Patricia Marie Fowler exacter her revenge by hacking the centre's systems, deleting files, changing passwords, removing access to infrastructure systems, and tampering with pay and accrued leave rates of staff."
Hardware

Startup's Submerged Servers Could Cut Cooling Costs 147

1sockchuck writes "Are data center operators ready to abandon hot and cold aisles and submerge their servers? An Austin startup says its liquid cooling enclosure can cool high-density server installations for a fraction of the cost of air cooling in traditional data centers. Submersion cooling using mineral oil isn't new, dating back to the use of Fluorinert in the Cray 2. The new startup, Green Revolution Cooling, says its first installation will be at the Texas Advanced Computing Center (also home to the Ranger supercomputer). The company launched at SC09 along with a competing liquid cooling play, the Iceotope cooling bags."
Music

Grateful Dead Percussionist Makes Music From Supernovas 57

At the "Cosmology At the Beach" conference earlier this month, Grammy-award winning percussionist Mickey Hart performed a composition inspired by the eruptions of supernovae. "Keith Jackson, a Berkeley Lab computer scientist who is also a musician, lent his talents to the project, starting with gathering data from astrophysicists like those at the Berkeley Lab’s Nearby Supernova Factory, which collects data from telescopes in space and on earth to quickly detect and analyze short-lived supernovas. 'If you think about it, it's all electromagnetic data — but with a very high frequency,' Jackson said of the raw data. "What we did is turn it into sound by slowing down the frequency and "stretching" it into an audio form. Both light and sound are all wave forms — just at different frequencies. Our goal was to turn the electromagnetic data into audio data while still preserving the science.'"
Mars

Submission + - A proof of life on Mars - at last? (spaceflightnow.com)

siddesu writes: Compelling new data that chemical and fossil evidence of ancient microbial life on Mars was carried to Earth in a Martian meteorite is being elevated to a higher plane by the same NASA team which made the initial discovery 13 years ago. Time to bow to our Marsian overlords?

Comment Re:Time service (Score 2, Informative) 105

Actually not so. I had to have a survey done to mark some specific spots for calibrating our gps receivers for dgps. He used a Trimble receiver to mark the spot. The spot was within +/- .1 inch and he verified the accuracy using the Russian GLONASS system. I was quite surprised that he actually did this. He said it was standard company procedure.
There was a point in time where the Russians didn't have the money to maintain the system, however that has changed, and I believe they have been adding sattelites to bring it up to full capacity.

Comment Re:I swear to you (Score 1) 200

I was moving (NEVER use UHAUL) and informed Bell of the move. They said no problem. On the day of the move my old line was cut and I plugged in the phone at the new location and it didn't work.

Big surprise there.
I called up Bell repair and told them of the problem, to which I was told "didn't you know we're on strike?" No, not really. Then I was told it would be no more than a week, as management was doing the repairs.
Meanwhile Rogers had been and gone and my cable and internet were working great.

After a couple of weeks of hassling bell for phone service and the queue going from a week to a month to at least 3-4 months, I told them to forget it at got Vonage that afternoon.

Been a very happy Vonage customer ever since.

Comment Re:On the Go internet (Score 1) 438

In all honesty I only use a single stick into the router. The documentation says it will provide fail over. I believe the idea is that if you use a cable or dsl link and it goes down, only then will it switch over to the cellular service. Most cell providers also provide a coverage map, and the type of cellular service provided ie 1x, gsm, cdma, edge, 3g, hspa. I would use one of those maps during my trip planning so I would be in an area with appropriate coverage.

Comment On the Go internet (Score 1) 438

I have set up an internet connection using the cradlepoint mbr1000. A very cool little device.
I set this up for an OHL team we that we drive around into a 56 person coach along with a 3000W inverter. This allows up to 18 people (18 outlets) to plug in their laptops and get high speed internet access.

The setup was a snap, I just grabbed a rocket stick, plugged it into the router, gave it juice and followed the setup instructions. Setting up the security, and (yes) parental controls was a snap. So long as there is a cell tower they have access to the internet, and most importantly has yet to drop the connection at highway speeds. I'll keep an eye on this thread and answer any questions.

Comment Re:It will work fine. (Score 1) 465

You definately need to use a plastic sheath through the concrete for the copper lines. Bury the copper will below the concrete in a bed of clean sand. The lime in concrete WILLl corrode the copper pipe, fortunately it will take about 40-45 years for it to happen, so you might note really carer.
My father had to bypass all the copper lines for the recirculating hot water heating system laid in the concrete floor a couple of years ago. The house is about 40-45 years old.

Comment A fake twitter user to plug this scam (Score 1) 128

Someone used my Gmail address to create a Twitter account to pump a google links get rich quick scam.
I hadn't checked my Gmail for a few weeks and in that time someone used my email address to set up a twitter account. I had tons of tweets from strangers in my inbox. Some dude from wisconson was running some get rich quick scam with google links. I had never signed up for a twitter account so I decided to take it away from the scammer..

Voila, down goes one scammer/spammer and a twitter account for me to boot....not that I couldn't have got one anyways.... Now to figure out how to get rid of the fake followers......suggestions?

Comment Re:OK, dumb question after reading the article (Score -1, Troll) 747

This isn't just a security hole its a whole can of worms for what's being suggested by RMS. Suppose I write some javascript to run on the client side and its supposed to return data in a specific way. I do the right thing and make sure the data is clean on the server side so there is no chance of an exploit.
If someone makes a change to the client side javascript that sends back something not expected, but still passes the clean test and it ends up borking my webserver, I'm going to be majorly pissed. There would be no way to test the javascript on the client for the right version because the user modified script would report the right version. As a whole I see this as breaking interactive websites by someone who thinks they know better than the website developer.

What it really boils down to is that there is a difference between controlling & running programs on your own computer and using a website which is not your computer. The web browser is a sandbox for the webserver to run its programs in a safe known environment on the client side. In essence this an extension of the foreign machine running on your machine. There is no other way to have interactive websites.

RMS needs to be reminded that a website is not your local computer.
Intel

High Performance Linux Kernel Project — LinuxDNA 173

Thaidog submits word of a high-performance Linux kernel project called "LinuxDNA," writing "I am heading up a project to get a current kernel version to compile with the Intel ICC compiler and we have finally had success in creating a kernel! All the instructions to compile the kernel are there (geared towards Gentoo, but obviously it can work on any Linux) and it is relatively easy for anyone with the skills to compile a kernel to get it working. We see this as a great project for high performance clusters, gaming and scientific computing. The hopes are to maintain a kernel source along side the current kernel ... the mirror has 2.6.22 on it currently, because there are a few changes after .22 that make compiling a little harder for the average Joe (but not impossible). Here is our first story in Linux Journal."
Businesses

Submission + - Software Piracy at Beijing Branch Office (resub'd)

spirit_fingers writes: "I'm the IT manager for a west coast design company that has a small branch office in Beijing with 5 employees, a few workstations and a couple of servers. Recently, it came to my attention that the Beijing office has been routinely installing and using pirated software on their computers--MS Office and Adobe Creative Suite, mostly. Up until now, the powers that be here in the States have had a relatively laissez faire attitude about what goes on at the Beijing office and our accounting department never noticed that Beijing never submitted receipts for software, until I questioned them about it.

We're very buttoned up about being legal with our software here at the home office, and I consider it unprofessional and risky for our Beijing office to be engaging in this practice. When I called our Beijing office manager on this, he shrugged and replied, "well, every other shop here does it".

I have no doubt that this is true. Frankly, I could care less what those guys do with their personal computers, but when it comes to company-owned gear my attitude is to stay legal no matter what anyone else is doing. And it's not like they need to do it to save money. The Beijing branch turns a tidy profit, thank you very much. It just seems to be an attitude so firmly ingrained in the culture over there that no one gives it a second thought.

So I was wondering if there are any IT manager Slashdotters here in the the U.S. who may have experienced something similar with their colleagues in APAC and how they would handle a situation like this. My response (CC'd to our CFO) was to ask for copies of all receipts and serial numbers for the software they're using and see what happens (this came down today, so I'll give them a day or two to come up with something)."

Slashdot Top Deals

"The four building blocks of the universe are fire, water, gravel and vinyl." -- Dave Barry

Working...