Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment: It's the wrong question. (Score 1) 448

by Crizzam (#47827271) Attached to: Could Tech Have Stopped ISIS From Using Our Own Heavy Weapons Against Us?
HMMWV's don't have keys, you think a soldier wants a key to turn on / off the weapon that could save his life? Technical options simply aren't feasible. That equipment was already "lost" as the cost to take it back to the US exceeded the value of the equipment. The decision was made to leave it. When it began to fall in to enemy hands, it should have been immediately destroyed.

Comment: Standards (Score 3, Insightful) 152

by Crizzam (#47817193) Attached to: Can ISO 29119 Software Testing "Standard" Really Be a Standard?
Are rules for some and suggestions for the rest of us. The IEEE can put a standard on cleaning the toilet. If your company wants to follow it to the letter, or just use it as another reference, that's your call. I think the organization of conceptually difficult concepts is a good thing, overall. What we do with that is a whole other thing.

+ - Remote server support and monitoring solution

Submitted by Crizzam
Crizzam (749336) writes "I have about 500 clients which have my servers installed in their data centers as a hosted solution for time & attendance (employee attendance / vacation / etc). I want to actively monitor all the client servers from my desktop, so know when a server failure has occurred. I am thinking I need to trap SNMP data and collect it in a dashboard. I'd also like to have each client connect to my server via HTTP tunnel using something like OpenVPN. In this way I maintain a site-site tunnel open so if I need to access my server remotely, I can. Any suggestions as to the technology stack I should put together to pull off this task? I was looking at Zabbix / Nagios for SNMP monitoring and OpenVPN for the other part. What else should I include? How does one put together a good remote monitoring / access solution that clients can live with and will still allow me to offer great proactive service to my servers located on-site?"

Comment: Chile + Microsoft = Cray Cray (Score 1) 159

by Crizzam (#47730073) Attached to: Microsoft Lobby Denies the State of Chile Access To Free Software
I live in Chile and am amazed by the deathgrip that Microsoft has here. It's amazing. When you use Microsoft software in Chile, according to the terms of use, you unconditionally agree to an inspection, in your business, by Microsoft, without warning. What happens is that a Microsoft representative arrives WITH POLICE and they are prepared to file criminal charges against END USERS and MANAGERS for the discovery of unlicensed software. They perform a scan of the network with their tools and require proof that each copy is licensed. To me, this is simple crazy corporate control.

Comment: courses not degrees (Score 1) 433

by eagl (#42420269) Attached to: Ask Slashdot: CS Degree While Working Full Time?

If you want to rise in your current company, you might consider finding out what skills you need to rise to the next level on the corporate ladder and then target those skills with individual courses. For example, my Mom was a "senior programming analyst" for about 20 years. She was told that she needed personnel and project management skills to rise to the next level of project or group leader. She decided she was having fun where she was, so her continuing education focused on a couple of courses that let her broaden her personal approach to her tasks. Her decision worked in the sense that since she was at the top of the pay scale for her job, she got the max annual bonus for many years in a row, and the company did not fire her through 3 complete corporate mergers. She did have a bachelors degree in math, but her focus was programming and the courses she took were programming courses.

UCSD has extension courses that may be available for open enrollment. That's where she went. She was a Berkeley alum but I'm not sure that was a pre-req for admission to the extension courses.

For you personally I suggest courses in software engineering, rather than "pure" computer science which will touch on a wide variety of topics that may not apply. Or pick/choose courses from the CS degree program at the university of your choice, on the theory that you can learn stuff that applies to you now and can later on be applied to a degree program. But if you're already a programmer, your next step up may be software engineering and project management.

Comment: Yes and no (Score 1) 601

by eagl (#38430082) Attached to: Do Slashdotters Encrypt Their Email?

I encrypt work email whenever it includes private or sensitive information. But that is only because my company has a global email address book and every single user has published encryption certificates. My company has also mandated that every email gets digitally signed, whether it is encrypted or not.

Which brings me to my no answer, my personal email. I would encrypt all personal email if I could, but the problem is that it is unlikely I could get all of my email recipients (or even most of them) to bother to deal with keys and making sure their email client could decrypt as required. Not only that, I use webmail a lot and it's not easy to get everyone onboard the same scheme that would allow encrypted email via webmail.

If everyone did it, then heck yes I'd encrypt all of my personal email too. If it was as easy as microsoft putting a big button "enable encryption", along with another button "send public key to email correspondent", then everyone would be using encrypted email. But they won't, so I'm pretty much out of luck.

Comment: Yes and no (Score 1) 3

by eagl (#38420868) Attached to: Do Slashdotters encrypt their email?

I encrypt work email whenever it includes private or sensitive information. But that is only because my company has a global email address book and every single user has published encryption certificates.

Which brings me to my no answer, my personal email. I would encrypt all personal email if I could, but the problem is that it is unlikely I could get all of my email recipients (or even most of them) to bother to deal with keys and making sure their email client could decrypt as required. Not only that, I use webmail a lot and it's not easy to get everyone onboard the same scheme that would allow encrypted email via webmail.

If everyone did it, then heck yes I'd encrypt all of my personal email too. If it was as easy as microsoft putting a big button "enable encryption", along with another button "send public key to email correspondent", then everyone would be using encrypted email. But they won't, so I'm pretty much out of luck.

Possessions increase to fill the space available for their storage. -- Ryan

Working...