Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×

Submission + - How to monitor solutions installed in client networks?

Crizzam writes: We are a reseller of access control and time & attendance solutions. We install biometric and RFID terminals which connect to Windows based applications. We currently have 1000s of cutomers and we want to be proactive in our service approach. Is there an open source solutions which will aggregate Windows events and SNMP traps and send them back to our office for monitoring? Ideally, we would like a system which is based on a web service and has a clean web interface. Our level 1 tech people will be monitoring, so it needs to be user friendly.

Comment It's the wrong question. (Score 1) 448

HMMWV's don't have keys, you think a soldier wants a key to turn on / off the weapon that could save his life? Technical options simply aren't feasible. That equipment was already "lost" as the cost to take it back to the US exceeded the value of the equipment. The decision was made to leave it. When it began to fall in to enemy hands, it should have been immediately destroyed.

Comment Standards (Score 3, Insightful) 152

Are rules for some and suggestions for the rest of us. The IEEE can put a standard on cleaning the toilet. If your company wants to follow it to the letter, or just use it as another reference, that's your call. I think the organization of conceptually difficult concepts is a good thing, overall. What we do with that is a whole other thing.

Submission + - Remote server support and monitoring solution

Crizzam writes: I have about 500 clients which have my servers installed in their data centers as a hosted solution for time & attendance (employee attendance / vacation / etc). I want to actively monitor all the client servers from my desktop, so know when a server failure has occurred. I am thinking I need to trap SNMP data and collect it in a dashboard. I'd also like to have each client connect to my server via HTTP tunnel using something like OpenVPN. In this way I maintain a site-site tunnel open so if I need to access my server remotely, I can. Any suggestions as to the technology stack I should put together to pull off this task? I was looking at Zabbix / Nagios for SNMP monitoring and OpenVPN for the other part. What else should I include? How does one put together a good remote monitoring / access solution that clients can live with and will still allow me to offer great proactive service to my servers located on-site?

Comment Chile + Microsoft = Cray Cray (Score 1) 159

I live in Chile and am amazed by the deathgrip that Microsoft has here. It's amazing. When you use Microsoft software in Chile, according to the terms of use, you unconditionally agree to an inspection, in your business, by Microsoft, without warning. What happens is that a Microsoft representative arrives WITH POLICE and they are prepared to file criminal charges against END USERS and MANAGERS for the discovery of unlicensed software. They perform a scan of the network with their tools and require proof that each copy is licensed. To me, this is simple crazy corporate control.

Comment Ditch the HP and run more drops (Score 1) 237

As a person with first hand experience on Cisco and HP Access Points, I have some disappointing news for you. There is no comparison between the Cisco and HP wireless gear. The HP stuff is repackaged Calubris Netowrk gear and it is kludgy, at best. I really, really, really have a shudder of fear when client select the HP stuff. It simply doesn't work well. The Cisco gear using a WLC (Wireless LAN Controller) is the absolute best I;ve ever seen. It's a breeze to install and performance is great. Keep in mind that when using a mesh, the bandwidth goed down 50% at each hop. So, if you have 54Mbps at the first access point, the next access points are limites to 27Mbps and the next at down to 13.5. This is under PERFECT conditions. Your distance of 300 feet is too far. I would recommend a mesh being no more than 150 feet outdoors. Preferably 100 ft. There are limitations to wireless LANS and in the end, your best bet is to create multiple meshes, each with a hard drop back to a switch. You can get underground CAT5 pretty cheap. Rather than running the whole mesh off one drop... have 3 or four of them out to the field and set up your access groups accordingly. But seriously... I would just lose the HP gear. It's so bad. I even yelled at the HP rep... just my $0.02.

Comment Re:So hackers like it (Score 1) 339

A lot of people like to segregate themselves in to a special group called "geek". The fact is my 7 year old nephew crasked his buddies iPhone and helped him load apps from Cydia. He's seven years old. Think about what these young consumers will want in the future. These are the manufacturers future target market, not us dusty 30 somethings (soon to be 40 somethings). Easy to use won't cut it for the future consumers.

Comment Doesn't make sense, really. (Score 1) 433

I think the quote stating that having a war video game dishonors those who have fought in real battles.... is interesting. I take issue with this for several reasons. 1) Video games serve as a tactical simulation and provide an enhanced learning experience for participants. 2) Video games will most accurately simulate the war of the future. [Remote control, camera and sensor based] 3) How can a video game dishonor war veterans? Do people really think war veterans care if you play a video game about a battle they were in? Really? I can understand the protester trying to make a point, but let's keep it real.

"Gort, klaatu nikto barada." -- The Day the Earth Stood Still

Working...