Become a fan of Slashdot on Facebook


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

User Journal

Journal: The iPolice

Journal by mschuyler


"When a top-secret prototype of Apple's new iPhone went missing recently, the computer giant summoned Silicon Valley's version of the cavalry â" an elite squad whose main mission is investigating crimes against high-tech companies.

Little-known outside the tech world, the unit suddenly entered the spotlight with its April 23 raid on the San Francisco Bay Area home of Jason Chen, the 29-year-old technology blogger who had gained possession of the phone.

The unit swept in after Chen posted a photo and details of the new iPhone on the website. But the raid itself became secondary to a larger discussion in Silicon Valley and the blogosphere: What is this high-tech police force, and who controls it?

"It's the iPolice," said Steve Meister, a former Los Angeles County deputy district attorney. "This whole thing appears, rightly or wrongly, to be law enforcement doing the bidding of a private company."


Journal: Are Updates Critical? 2

Journal by mschuyler

Yeah, I know this is /., but I live in a Windows-centric world and come here for fresh air. I have recently come across an attitide by some Techs that suggests performing updates on Windows machines is an utter waste of time and causes more problems than it is worth. This conflicts with my firm's 'Best Practices' which suggests that all updates, whether critical or not, are to be implemented as soon as possible. I certainly agree that it is a pain in the behind to do, even when 'automated,' but I must say I have not experienced updates causing very many problems in real life. It's happened once or twice, usually with esoteric and expensive software on a dedicated server, but it certainly is not pervasive. As I remember, the last security audit we had looked at this issue. Since we do them right now, it wasn't an issue and didn't come up in the discussions. So my question is, what do you all think about this? Thanks.

It is the quality rather than the quantity that matters. - Lucius Annaeus Seneca (4 B.C. - A.D. 65)