Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Hard to believe (Score 1) 804

That is hard to believe both Lenovo and HP make solid workstations... for now anyway.

Apple is relying on ssd on the pci bus to gain speed, sorry to say this but those ssd drives have a short life span when used for heavy lifting. Currently my workstation is a lenovo and runs sas, with a raid 10 set of 4 900 gig 15 k drives. Blindly fast and quiet. Dual 10 Core Xeons and 32 gigs of ram, I can run most anything on my workstation and it doesn't break a sweat. It's solid even in 80 degree heat here in colombia.

I run linux, and use a macbook for mobility. Hiring based on seeing what workstation someone selects is just a bad way to even joke about getting talent in the door. My Lenovo has a 4k price tag to our business, show me an apple product that low with those specs and I'll be the first to line up to purchase.

Comment Re:I'm torn... (Score 1) 579

I live in a municipality zone at the moment for power, and they don't buy back power at all, matter of fact they won't even give credits for what solar will put back into their system. How this is legal, I don't know but stuff like this needs to be addressed, and it's easily addressed by giving the customer credit for half of what they produce on the bill.

Comment Re:No (Score 4, Insightful) 522

There is a real need for dedicated IT staff.Especially if your building customers environments.

I'd hate to say it but I have seen this first hand. Firstly security is ignored, and secondly there has to e a level of over site.

Im a systems admin for a fortune 500 and in charge of security, you don't even know how many times "staff" have setup a replica of the customers environment and missed the security aspect or even forgot huge parts of the environment or even misconfigured half of it and we could not replicate bugs. My team goes in and notices this stuff off the bat.

There needs to be dedicated staff because core infrastructure should not be pieced together, It should be engineered, when not properly engineered and just thrown together based on what people want.... This usually ends up ina giant mess, which dedicated staff are called in to unravel and repair.

Google

Submission + - Oracle Vs Google: The issue of copyrighting ideas (unixmen.com)

An anonymous reader writes: The issue of Oracle challenging Google on the use of Java APIs may, on the surface, appear to be a case of IT corporate establishing themselves on a common turf. However, the implications of these digital corporate wars are serious. The ongoing battle is for Oracle to gain complete control on Java programming language and for Google to establish that the components of the Java language it has used were already in the open source domain.
In fact, the Java programming language that Oracle is seeking to gain complete control over was not even developed by it. Oracle has technically gained copyrights on Java APIs through its acquisition of Sun Microsystems, in 2010, the original developers of Java.

Submission + - Syrian regime uses Skype to fire Trojan at opposition activists (techworld.com)

concertina226 writes: Further evidence has emerged that the Syrian Government is targeting opposition activists using a well-known remote access Trojan distributed through bogus Skype calls.

A blog this week by Mikko Hypponen of antivirus company F-Secure describes receiving the hard drive image of a Syrian dissident’s PC which turned out to have been infected with the widely-available ‘Xtreme RAT’, a backdoor tool for remotely controlling and accessing PCs.

Piracy

Submission + - The holes in a News Corp/NDS pay TV pirate's defence (afr.com)

Presto Vivace writes: "In response to the recent allegations of pay TV piracy on Frontline, Panorama, and the Australian Financial Review, News Corp/NDS has said that they have consistently been vindicated by the courts. However, in relation to the Echostar case there are significant holes in their defense. For example, much of Echostar's most compelling evidence was excluded by the statue of limitations, and the jury never got to hear it.

In interviews with the BBC Panorama program and emails with the Financial Review, Oliver Kömmerling said that when he downloaded the Canal Plus file on DR7, it showed up on his computer directory as having been created at exactly the same time as the identical Canal Plus file that the NDS Black Hat team created in Haifa nine months before – July 6, 1998, at 15 seconds past 4pm.

There are 23 million seconds in a year. Two identical files, the only ones not held by Canal Plus. What are the odds that they would be created at exactly the same moment?

There is additional evidence that Tarnovsky posted the Nargra hack on the internet, if additional evidence is needed:

In the 2009 interview, Tarnovsky denied putting any code on the internet. However, he told the Financial Review that he had “played around” with the EchoStar Nagra code – in fact, he had made it work better. “Sometimes I see through the algorithms, like, and stuff. Like the cypher in the Nagra chip. They had some shift going on at the beginning and the end. And I totally realised, well, wait a second, I can go the reverse, I can skip it, remove it, and just shift the other way. And I totally removed like – I don’t know how many clock cycles of their code. And their algorithm was like – 20, 15 times faster.”

A Swiss hacker, Jan Saggiori, later testified that two days after the Canal Plus file appeared on the DR7 website in March 1999, Tarnovsky sent him a file with part of the system code for the smartcard used by EchoStar.

"

Slashdot Top Deals

Living on Earth may be expensive, but it includes an annual free trip around the Sun.

Working...