Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Pay versus billing rate. (Score 1) 234

Not true... I worked at IBM as a contractor and was compensated very well.

I chose to leave for a better job/ higher paying role with benefits. The real problem is they are using contractors for a huge part of the us work force but paying pretty good comp for them, so that they don't have to cover all the little things. Like benefits....

I chose to leave after being the primary responsable admin in the group, who was denied a job in that group 4 times, due to "not hiring in the US at this time" their process for this stuff is completely short sighted. They can pay people 1/8th less and cover the benefits, but refuse to because if thier numbers don't look good it's not easy to dump a perm employee, where as a contractor they can just put on furlow or ask them not to come back.

Submission + - Court Orders Marvell to Pay Carnegie Mellon $1.5B for Patent Infringement (computerworld.com)

Lucas123 writes: A U.S. District Court has ruled that Marvell Technology must pay Carnegie Mellon University (CMU) $1.54B for infringing on two hard drive chip patents. Marvell was also ordered to pay interest at 0.14% annually, and 50 cents for each chip sold that uses the intellectual property. While Marvell did not comment on the case, CMU said it "understands" that Marvell will again appeal the ruling and the school "will look forward to the federal circuit court" upholding the lower court's ruling. The latest decision by a U.S. District Court in Western Pennsylvania ends for now a five-year legal battle between the two. In 2012, a jury found Marvell had violated CMU's patents, and the chip maker then appealed that ruling.

Comment Re:An educated workforce (Score 1) 164

they did it for the costs. parts changers are cheap, and power and bandwidth are cheap there as well.

When you have a parts changer, but good sysadmins across the globe you can do that. with remote kvm's and now most servers with good baseband management tools, it's cheaper to have good sysadmins do the cleanup and setup work from half a world away.

Pay the sysadmins to automate most of the process and have cheap parts changers on hand and it's easy as sin to keep a datacenter running well. It's pricey but the sysadmins are constantly busy across multiple datacenters and it lowers cost.

Comment Re:Should void warranty (Score 1) 208

My s550 does the same, so there is obviously some work around here. I had 2 occasions where my car lost the display and both speed and rpm on the screen were lost. They come back after 15 seconds and the system reboots. But there is obviously a work around here, it can't be "illegal".

Comment Re:Obviuos question - Who else is infected? (Score 1) 137

They usually target more then 1 chain, but have to taylor it to each chain as the pci-dss standard is enacted differently in each chain. Usually they will breach a big chain and use the same method for others but taylor the way they do it a bit differently and most times this helps them avoid early detection. Often the breach is discovered later, much later because it was not using the same carbon copy methods that were used in another breach.

Comment Re:I don't get it (Score 1) 137

There is supposed to be multiple log servers, and they get backed up.

So what happens is the logs are kept in the machines as well as shipped to a log server.. Depends on how they went about this.... but everything should be logging to multiple places for just this reason, hackers have automated log scrubbers that they can hide as a binary like say cd. the cd bin will get executed, but after the hook runs and scrubs the logs.

Comment Re:Quietly moved ??? (Score 1) 137

Most IDS systems should trigger alerts and close the route when sending massive amounts of data ANYWHERE !

All my gear is set up that if your sending a pack over 5 megs and you didn't get auth from secops and the mac cleared the route is shut down. Yes it's draconian but it prevents a lot of network abuse and has left me with 2 300 meg circuits instead of 2 gig circuits.

Comment Re: Stupid People (Score 3, Interesting) 118

As some one who deals with security on a daily basis, I have seen tools to prevent this.

What happens is someone advertises say 10 K cards for sale. They actually package 15 K cards in the pack, when the user gets the pack they have a robot ap that goes and makes purchases from shops that are on the internet and are known to be able to easycard fraud friendly. The robots order something quickly like a $20 cable or piece of merchandise. If its declined the card is dropped from the database.

Once all the cards are checked if the buy has close to 10 K they don't care. If less then say 8 K they get another chunk of 4 K to go at again. Until they get close to the 10 K they were promised. This is how the good groups do it. The ones who don't care just sell in chunks of 5 K to 10 K with no guarantees.

Now they also can use another system for cards to do quick transactions checks just like paypal would do to check if the card is valid. Small bump purchase then issue a refund if they want to hide from the owner of the card.

I have to monitor these "groups" as I need to make sure that none of my servers are being used in their scams. A good security guy keeps his eye on everything ! And yes we monitor IRC and other methods of chatter to see if any of our servers have been compromised.

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...