Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment: Some Basic Todos (Score 1) 52

by denpun (#48088025) Attached to: Ask Slashdot: Designing a Telecom Configuration Center?

Small Budget.....eh...

Things to ponder on:
1) Primary and Secondary UPS/Generator to ensure good clean supply at all times. Depending on your power source and and stability, you may or may not need this. If you have a budget, go for it.
2) Primary and Secondary Temperature/Humidity Control to ensure a stable environment. Can get pretty hot in a Telecom room when AC is not working. Depending on your geo-location, you may or may not need this.
3) Raised Floor/Ceiling space to run cables. If budget allows, Cable Trays to run cables from one side of the room to another....could be done neatly and on a budget.
5) Position of Racks to ensure Accessibility....especially cable racks. You never know when you need to punchdown new cables and getting behind the little space behind a rack can be a pain. Make sure you can easily work around your server/cable racks.
6) Proper electrical grounding for all equipment. Ground the racks properly...equipment can thus be grounded via racks.
7) Physical separation of Electrical cabling and Data cabling as much as possible.
8) Labeling
9) Physical Security to the room and building room is in. - Fire/Water Alarms. Temperature sensor if budget allows. Break-in protection...etc.
10) Position of Telephone - During remote support this can be a pain unless you have a cordless phone.
11) Consider how many people will be in room at same time.

Best way to start is plan a layout using some software. Position everything. AC/ UPS/ RACKS/ TELEPHONE/ PEOPLE IN ROOM.

Just some basic considerations....among others...

All the best!

+ - Mt Gox hacked. All coins gone. ->

Submitted by ch0ad
ch0ad writes: Mt. Gox, once the world’s largest bitcoin exchange, has gone offline, apparently after losing hundreds of millions of dollars due to a years-long hacking effort that went unnoticed by the company.

The hacking attack is detailed in a leaked “crisis strategy draft” plan, apparently created by Gox and published Monday by Ryan Selkis, a bitcoin entrepreneur and blogger (see below). According to the document, the exchange is insolvent after losing 744,408 bitcoins — worth about $350 million at Monday’s trading prices.

Link to Original Source

+ - How to Choose the Right Antivirus for Your Computer->

Submitted by Anonymous Coward
An anonymous reader writes: The Internet is becoming an increasingly dangerous place. With almost everyone connected, it is very easy for scam artists to use viruses to get all of your personal information. However, people have become quite savvy to the techniques that people use to get viruses on their computer. They ignore dangerous emails, they stay away from vulgar sites, and they don’t download media from non-reputable sources.
Link to Original Source

+ - maths in trouble, pooters sound, secrecy must die->

Submitted by Anonymous Coward
An anonymous reader writes: I have a proof that P strictly contains NP. My Slashdot user is is the largest three digit one with different digits. Publication would destroy much of the assumed sound foundations of the world financial system. The only solution us to totally ditch secrecy. I have spent all I gave chasing this. And I need some money to live on, since my conscience won't allow me to greedily claim the prize. Http colon slas slash thewikiman dot allsup dot co details my current soyl searching. What do I do?
Link to Original Source

Comment: Re:And when they get bitten in the ass? (Score 5, Informative) 94

by denpun (#43860965) Attached to: Google Advocates 7-Day Deadline For Vulnerability Disclosure

Seem like they recommending it only for "critical vulnerabilities under active exploitation". For vulnerabilities where exploits increase as each day passes because of non-disclosure, I would want quick notification.

FTA and not quite in the summary:

“Our standing recommendation is that companies should fix critical vulnerabilities within 60 days — or, if a fix is not possible, they should notify the public about the risk and offer workarounds,” the two said in a blog post today. “We encourage researchers to publish their findings if reported issues will take longer to patch. Based on our experience, however, we believe that more urgent action — within seven days — is appropriate for critical vulnerabilities under active exploitation. The reason for this special designation is that each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised.”

Comment: Turtle Graphics (Score 1) 185

by denpun (#43502469) Attached to: Localized (Visual) Programming Language For Kids?

Not Dutch but available in German, English and Vietnamese!
http://blockly-demo.appspot.com/static/apps/turtle/de.html

Here is the main page
http://blockly-demo.appspot.com/static/apps/turtle/index.html

It uses Blockly, a visual programming editor...
http://blockly-demo.appspot.com/static/apps/index.html

Its browser based and I think with your help initially, she can play around by herself eventually... :)

Here are some examples of what can be done:
http://blockly-demo.appspot.com/static/apps/turtle/contest/index.html

If she likes drawing..you can use that as a relation to see if she likes this as well....
Here is one that someone did that creates a random pattern everytime....
http://blockly-demo.appspot.com/static/apps/turtle/en.html#zdpxaa

Comment: archive.org? (Score 5, Interesting) 89

by denpun (#43383075) Attached to: British Library To Archive One Billion UK Websites

Why not work with the good folks at archive.org and their Internet wayback machine?

Is it not a similar idea?

The Internet Wayback Machine folks could use the funding and would be achieving the same purpose, albeit not in a format that the library folks might want....but they could come to agreement.

Comment: Went back on his suggestion (Score 3, Interesting) 244

by denpun (#42567463) Attached to: Should Microsoft Switch To WebKit?

There is an update on MVP Bill Reiss's blog now.

http://www.billreiss.com/follow-up-to-webkit-for-ie-hint-i-was-wrong/

Seems like he changed his mind. He is now against the idea and has instead suggested allow Win mobile devices to be allowed to change their default browser.
Sounds like a good idea, effectively making IE, a tool used by the OS that has browsing functionality.

Effectively what he is saying is that the other browsers, can serve as browsers while IE is now reduced to a tool!

Crime

+ - John McAfee accused of murder, wanted by Belize police-> 1

Submitted by
thn
thn writes: "John McAfee, who started the antivirus software giant named after him, has been accused of murder in Belize and wanted. McAfee had taken to "posting on a drug-focused Russian message board...about his attempts to purify the psychoactive compounds colloquially known as 'bath salts,'" Gizmodo wrote. The scariest aspect of this story may be the fact that an entire lab was constructed for John McAfee’s research purposes. Because of his efforts to extract chemicals from natural chemical plans McAfee was able to justify his experiments in a country that is largely unregulated."
Link to Original Source

This is now. Later is later.

Working...