And then what happens after the sun goes down and we don't have enough storage capacity to run the peak times ? We just fire up more solar... oh wait no sunlight. A well balanced approach is much better, replace some with solar and wind, and also try and scrub out what we can when we can.
they have also done a lot of buying of other companies as of late... Big data and cloud services are what they are buying now.
Not true... I worked at IBM as a contractor and was compensated very well.
I chose to leave for a better job/ higher paying role with benefits. The real problem is they are using contractors for a huge part of the us work force but paying pretty good comp for them, so that they don't have to cover all the little things. Like benefits....
I chose to leave after being the primary responsable admin in the group, who was denied a job in that group 4 times, due to "not hiring in the US at this time" their process for this stuff is completely short sighted. They can pay people 1/8th less and cover the benefits, but refuse to because if thier numbers don't look good it's not easy to dump a perm employee, where as a contractor they can just put on furlow or ask them not to come back.
Link to Original Source
And that is different from Apple how ?
Ohhh thats right they are perfect for each other.
they did it for the costs. parts changers are cheap, and power and bandwidth are cheap there as well.
When you have a parts changer, but good sysadmins across the globe you can do that. with remote kvm's and now most servers with good baseband management tools, it's cheaper to have good sysadmins do the cleanup and setup work from half a world away.
Pay the sysadmins to automate most of the process and have cheap parts changers on hand and it's easy as sin to keep a datacenter running well. It's pricey but the sysadmins are constantly busy across multiple datacenters and it lowers cost.
Tesla uses can-bus like every other auto in the world with advanced controls.
My s550 does the same, so there is obviously some work around here. I had 2 occasions where my car lost the display and both speed and rpm on the screen were lost. They come back after 15 seconds and the system reboots. But there is obviously a work around here, it can't be "illegal".
Haven't gotten any of the scam calls that are from indian call centers requesting you install remote sessions for them to "assess your virus infections" yet have you ? These for some reason are still allowed to run there from the same scum trying to get cash out of google there.
They usually target more then 1 chain, but have to taylor it to each chain as the pci-dss standard is enacted differently in each chain. Usually they will breach a big chain and use the same method for others but taylor the way they do it a bit differently and most times this helps them avoid early detection. Often the breach is discovered later, much later because it was not using the same carbon copy methods that were used in another breach.
There is supposed to be multiple log servers, and they get backed up.
So what happens is the logs are kept in the machines as well as shipped to a log server.. Depends on how they went about this.... but everything should be logging to multiple places for just this reason, hackers have automated log scrubbers that they can hide as a binary like say cd. the cd bin will get executed, but after the hook runs and scrubs the logs.
Most IDS systems should trigger alerts and close the route when sending massive amounts of data ANYWHERE !
All my gear is set up that if your sending a pack over 5 megs and you didn't get auth from secops and the mac cleared the route is shut down. Yes it's draconian but it prevents a lot of network abuse and has left me with 2 300 meg circuits instead of 2 gig circuits.
As some one who deals with security on a daily basis, I have seen tools to prevent this.
What happens is someone advertises say 10 K cards for sale. They actually package 15 K cards in the pack, when the user gets the pack they have a robot ap that goes and makes purchases from shops that are on the internet and are known to be able to easycard fraud friendly. The robots order something quickly like a $20 cable or piece of merchandise. If its declined the card is dropped from the database.
Once all the cards are checked if the buy has close to 10 K they don't care. If less then say 8 K they get another chunk of 4 K to go at again. Until they get close to the 10 K they were promised. This is how the good groups do it. The ones who don't care just sell in chunks of 5 K to 10 K with no guarantees.
Now they also can use another system for cards to do quick transactions checks just like paypal would do to check if the card is valid. Small bump purchase then issue a refund if they want to hide from the owner of the card.
I have to monitor these "groups" as I need to make sure that none of my servers are being used in their scams. A good security guy keeps his eye on everything ! And yes we monitor IRC and other methods of chatter to see if any of our servers have been compromised.
Everyone has a passion even kids ! How bout we foster their passions and let them grow with their passion ! at that point we will become a stronger nation.
No way , it's not like broadband is every where in Russia, and Skype is not even remotely a possibility !
The real question is , will Microsoft shut down Skype for the NSA so he can't testify ?