Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Hardware Hacking

+ - The Duct Tape Server

Submitted by JBoom
JBoom (668930) writes "The Duct Tape Server was build entirely from four rolls of gray Nashua duct tape, a quarter roll of translucent 3M duct tape, and these computer components: Pentium P4 2.4 GHz, Intel SFF Motherboard, 1GB twinned DDR RAM, 80GB SATA HDD, 350W PSU, CDROM and (2) 80mm LED fans."
Democrats

+ - YouTube bungles CNN debate?->

Submitted by
destinyland
destinyland writes "YouTube promised CNN they'd supply questions for a July debate of the Presidential candidates — by letting users upload video questions. But five days in they've only received 50 submissions — and a lot of them were pretty stupid. The Washington Post rounded up the best videos they could find. But if this experiment with interactive democracy is doomed to fail, what's the ultimate lesson? Maybe it's that if you're going to unveil an interactive democracy online, you need to make sure you actually promote it!"
Link to Original Source
Microsoft

+ - Perceptive post compares Microsoft now to IBM then->

Submitted by
kfogel
kfogel writes "Ben Collins-Sussman wrote a very perceptive blog post after reading the "Microsoft Pleads With Consumers to Adopt Vista Now" story today. He notes that a similar situation spelled the beginning of the end of IBM's dominance in the 1980's: although IBM set the hardware standards for a while, the market eventually moved beyond them, and the day came when IBM introduced a standard and *everybody ignored it*. Ben was in high-school then, and writes: "I remember thinking to myself 'Wow, this is a big deal. It's the beginning of the end for IBM.' And I was right! ... Well, I just had that same moment again [about Microsoft]". An excellent read and a spot-on analogy, IMHO. The URL is: http://blog.red-bean.com/sussman/?p=69"
Link to Original Source
Security

+ - Designing IS Strategies To Avoid Network Threats->

Submitted by
Romeo Cole
Romeo Cole writes "Webcast Title:
Designing IS Strategies to Stay Ahead of Network Threats

Event Speakers:
Dave Cullinane, CISO, eBay
Dan Lohrmann, CISO, State of Michigan
Michael Yaffe, Director of Marketing, Core Security Technologies

Event Date:
June 28, 2007 @ 1-3PM EDT

Event Sponsor:
Core Security Technologies

Is your Business Prepared?

Learn about computer security breaches and their devastating consequences on an agency and its constituents. CSO's, CIO's, CISO's and IT Security Professionals are making cyber security a priority concern. Given the recent events, everyone understands the grave impact of security vulnerabilities and communication disruptions to the agency's business if cyber vigilance is not exercised fully.

Now more than ever, CIOs, CSOs, and CISOs have to stay 2 steps ahead to ensure the security of their systems and company data. While many struggle to manage this cyber menace, others have initiated proactive strategies to meet this challenge.

There are always hackers, cyber attacks, and other threats coming from both outside and inside the organization and these threats keep getting more and more sophisticated. Systems are always vulnerable to new attacks or new internal security measure failures.

Listen to recognized practitioners who understand all too well that security is a business issue, and IT is a tool to drive business results. Speakers will share how they are addressing these threats strategically.

Take Away Points Include:
-Demonstrating a Return on Investment in Security
-Strategic Cyber Security Project Case Studies — specifically looking at
-Internet Filtering
-Penetration Testing
-Anti-Spam Filtering
-IT Security Awareness
-Cyber Emergency Exercises — testing your defenses with a case study on Michigan's involvement in DHS's global exercise called Cyber Storm

Program Is Intended For:
-IT Security Professionals, CSOs, CISOs, CIOs, VPs, Directors, Heads of IT, VPs, Directors, Heads of Planning and Network Administrators

Registration for live webcast is free and via email. Complimentary streaming is available. Webinar will also be made available as an archive. Dont miss this informative webinar.

Reserve your spot for free to attend live web cast"

Link to Original Source

After any salary raise, you will have less money at the end of the month than you did before.

Working...