Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Recycle and reuse (Score 1) 122

Obviously, the device's components all have their place in the world. The arming components most likely are destroyed by shredding and/or smelting down to slag. The explosives are taken to White Sands or a similar location for disposal by EOD.

Now the fissionables, you know the major components are all isolated and kept in separate, classified locations so they could not be recovered by Threats for reassembly. The big parts is Uranium (big surprise) and Lithium 7 Hydride. The former can be refined and used in reactors of many types. The latter can be reprocessed and used in power cell production.

PU, OTOH, is a tricky beast. There is so little due to the "spark plug" Lithium component used in 3 Stage "Super" Thermonuclear devices. But its rare and not used in public or commercial projects without severe restrictions. So it can be reprocessed into 238PU02 Oxide. Which is used in SNAP RTG's. The PLOWSHARE program which took nuclear weapons from countries broken away from the dissolved Soviet Union, was reprocessed to be used in RTGs for spacecraft.

Comment Re:Intensive screening of applications is required (Score 1) 35

I've threatened to pack up my desk several times while isolating the servers from the users to keep things going. Fortunately, management had the brain cells to realize what was happening and pretty much sent a paper memo to the staff to fall into compliance and work with IT to ensure the security of their systems.

Comment Intensive screening of applications is required (Score 1) 35

Both white- and black-lists are needed in group policy or security screening applications go a long way in preventing the majority of crypto breaches. The clients my MSP takes care of use GP filtering and have yet to experience an attack that directly affected their servers. Sure, there were a minority that got their workstations encrypted and killed, but their core data on the servers was safe and sound.

Preemptive measures go a long way in ensuring the majority of these attacks do not get very far, or get in at all. Plus education and continuing education, no matter how much they hate it, needs to be ongoing. This includes top-down suits.

Or they get to use Commodore 64's from here on out...

Comment This works fine for non-service type (Score 2) 253

But has there been any studies regarding it being effective for service sector types, read: medical, IT support, food service, maintenance/janitorial, bus drivers... I'm afraid that this will not work out as effective in those areas because of the utility of those jobs. There will have to be other ways of compensation to them so there will be equality across the board, or there might be sparks flying sooner or later.

Comment As much as I respect the two titans... (Score 1) 129

That is not going to do a bit of good for the service and support industry. IT is not going to stop, the servers run 24/7/365 and need tending to whenever there is a problem, or they will be waiting until Monday comes rolling around. Same for healthcare, and the food services. In fact, their hours might get longer and longer.

Comment Re:Soooo..... (Score 1) 34

It works and works well, if you know how to wriggle around their premium services. I've taken snaps of documents and created PDFs of them out in the field, then fired them off at people by email, surprising them with the speed of the turnaround. It works and works well, just keep clear of their cloud service.

Slashdot Top Deals

Man is an animal that makes bargains: no other animal does this-- no dog exchanges bones with another. -- Adam Smith

Working...