Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Virtualization (Score 1) 235

Opteron6276 vs Xeon5650\

ESXi Windows Load: 3% faster

ESXi Linux Load: 2% slower

Power delta:

ESXi (what version?) Opteron6275 uses ~25% more power

WindowsR2 Opteron 6275 uses ~3-7% more power. (note, at lower load levels, Opteron uses less power

?? Personal note: If you are using vSphere with DPM (Dynamic Power Management), unused cluster nodes will be powered off untill their resources are needed.

Comment Mod up bertok (226922) @6:56PM (#37993032) (Score 1) 383

Especially Active Directory Group Policy Support.

I don't have the time to spend a few days making a adm/admx file to modify the registry keys to make security configuration changes for widgets run from 0: My computer, 1: the local Intranet, 2: The Intranet, 3: untrusted Sites, etc...

I have five pages of settings on how to configure IE on my network. Almost every one of those security settings is applicable to Firefox, or any other browser. I have personally posted this to bugzilla, slashdot, etc... and the answer is: "Do it yourself (TM)" or use an obselete adm template for an old version of (Mozilla, Seamonkey, Firefox 2.x) - they should work.

I want to use a non IE browser at work. Yes, I will also have to use IE due to IE only applications we have - but at least not 100% of the time. The developers want to use Firefox outside of the sandbox. SECURE says: You have to implement the same security settings on every browser.

If I had to guess, I would say that Google will implement adm/admx files for security settings for Chrome on XP/7 before Firefox will. At that point, Chrome will get a large % gain in browser share because it will be implentable on corporate networks.

oops: http://dev.chromium.org/administrators/policy-templates they allready did it. Guess that's why Chrome has surpassed Firefox share.

Dev's requesting Chrome for their department in 3,2,1....

Comment Re:Anyone who asks this question should not be in (Score 1) 450

Hello, I am more of a "drank the vm juce" than the next guy. (Who by the way is kicking me under the table when I keep saying to put everything in my vmWare clusters.) I think a lot of what you are saying is undercut by the statement "many .. changes can only be done by going to each machine individually."

Except for the hardware bits, this is a non issue: See Shavlik, Zen (does it still exist?), SCCM, etc.. Hell, my crappy little office (4K users) does patches & updates using a combination of WSUS & SMS. If we really needed to, we could deploy .msi packages via AD (Please no.), or logon scripts.

As far as the hardware goes, In ten years I have very rarely seen shops that actually update hardware. (exceptions to the rule: Computer savy users (eg: (un)helpful admin proxys); admins) Usually the top dogs have their oldish stuff pushed down the line, and stuff gets thrown out when it depriciates: Too much trouble to buy new memory to upgrade. We want everything the same. Like eMnim.

Anyway, that's my $2 The issue that usually kills VDI is licensing. It's an expletive. Out of curiosity, has anyone used any of the application virtualization products? Symantec (slogan: Where good products go to die;) has one where you can roll out apps in a para-virtual manner with delta updates & rollback capabilities. I saw another one recently where a VM with the OS+application stack was pushed to client machines & managed from a central template. (At least that's what the marketing drones said.)

Image

Thief Posts His Photo To Facebook Victim's Account 222

An anonymous reader writes "Washington Post reporter Marc Fisher discovered his house had been burgled; money, a winter coat, an iPod and his son's laptop were stolen. Imagine his surprise when Facebook friends of his 15-year-old son reported that a photo of the apparent thief, wearing Fisher's coat and holding a wad of notes, had been uploaded to his son's Facebook account. How addicted do you have to be to a social network to post a status update and upload your photo *while* you're burgling someone's house?"

Comment Set up a requirements matrix to rig the outcome (Score 1) 369

You need features xyzpdq: Company 1 has features zyzpa, Company2 has features zyxpdb: Company2 also happens to be free software.

Yeah Me.

However, I suggest that you want the software that will help you do your job better. Crappy Helpdesk software won't help you retain knowledge. If employees who resolved a tricky problem leave, that knowledge is gone.

Handhelds

When You Really, Really Want to Upgrade a Tiny Notebook 104

Benz145 writes "The famous Sony VAIO UX UMPC may have been cancelled a few years back by Sony, but the community at Micro PC Talk won't let it die. Modder Anh has carefully removed the relatively slow 1.33Ghz Core Solo CPU and installed a much faster Intel Core 2 Duo U7700 (a process which involves reballing the entire CPU). On top of this, he managed to install an incredibly small 4-port USB hub into the unit which allowed for the further instillation of a Huawei E172 modem for 3G data/voice/SMS, a GPS receiver, and a Pinnacle HD TV receiver. All of this was done without modifying the device's tiny external case. Great high-res pictures of the motherboard with the modded hardware can be seen through the link."
Idle

Study Finds Most Would Become Supervillians If Given Powers 419

It probably comes as no surprise, but researchers have found that most of us would gladly put on a mask and fight do-gooders if given super powers. From the article: "But power also acts like strong cologne that affects both the wearer and those within smelling distance, Galinsky noted. The person gains an enhanced sense of their importance, and other people may regard them with greater respect as well as extend leniency toward their actions. That combination makes for an easy slide into corruption."
Crime

Girls Bugged Teachers' Staff Room 227

A pair of enterprising Swedish schoolgirls ended up in court after they were caught bugging their teachers break room. The duo hoped they would hear discussions about upcoming tests and school work, allowing them to get better grades. It worked until one of them decided to brag about it on Facebook, and the authorities were called in. The girls were charged with trespassing and fined 2,000 kronor ($270) each in Stockholm District Court.
Image

Girl Seeks Help On Facebook During Assault 417

A 12-year-old girl who was being assaulted by her mother's ex-boyfriend used some quick thinking by sending a message on her iPod to a friend's Facebook account for help. The friend was able to contact the girl's mother who then contacted the police. 42-year-old Raymond Ernest Cesmat was arrested and charged with two counts of criminal sexual conduct in the first degree. He is being held at the Dakota County Jail on $175,000 bail.

Comment Don't Trust the OS! (Score 1) 298

In a virtual world it lies: I suspect that most Operating Systems lie about what physical hardware:

VMware allows for over-commitment of most hardware. (CPU, Memory, and Hard Disk). Windows allows for over-commitment of Memory

Since this is making assumptions about memory management: (Flash: Various algorithms may be tuned for optimized use in your specific use-case).

In your case of grabbing 80% of memory: This works if you really need the memory - in which case you have to have it: If this forces Windows (linux, whatever) to swap some "system" memory it make slow down system processes (disk write, responding to network requests, running tomcat...) and cause your system to slow down. Perhaps it works for you.

If your "system" resides in VMware, your memory may be a swap file depending on over-commitment. Say some Joe-Rent-a-Network has connected you a server in a "secure" location. In a Co-Lo. On VMware. Now if each system has an application (or two) that grabs 80% of available memory...

Lets say Your 80% memory grab meets the swap file, across a network link to the cheapo SAN...

If I'm Joe Rent-a-Network and you make me have to go figure out why performance sucks for everyone I'm gonna kick your ass.
Now get off my lawn

Comment I've taken jobs from these postings... (Score 1) 495

I even got a semi-decent salary: All I had to do was write a coherent letter de-constructing the duties described to job-roles... If the company is sticks to their guns on cheaping out - stay away.

Dear Sirs, I am responding to your advertisement seeking a technical expert. Your ad lists 24 required and desired skills. These skills imply that the person you are seeking is an expert in Cisco Routers, Windows System administration, database administration, and AIX. These positions pay X,Y;Z respectively (link to last years pay report).

If you are still reading at this point, your skill list looks like
*numbered list of skills from advertisement

I am able to do *whatver skills you are expert in* at an expert level, medium skills at a medium level, and the rest of that crap at a remote monkey level.

As I would love to work for your shitty ass company, & I can do the job of X - may I suggest it may make more sense for your company to hire several people to fill these responsibilities? An individual who can do all the positions listed will cost (sum of average salaries linked above x2) and will both cost your company more & create a larger single point of resource failure.

If you are interested in my services as an excellent (Whatever you think you would want to do at the company.)as part of an effecient IT team, please contact me at X

Slashdot Top Deals

The optimum committee has no members. -- Norman Augustine

Working...