Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:Outsider (Score 1) 173

The data they are accused of using is the popularity of the various players on their own site. They can reasonably predict that similar "claim" percentages are on the completing site.

The sites don't list that, for example, 75% of the people on the site have Tom Brady on their teams. The insiders would know this, and would adjust their own picks based on that knowledge.

Comment Re:the circle of strife. (Score 1) 435

IPv6 still has very experimental support for things like PIM (or the equivalent), which is very important if you want to limit which groups get multicast. There are two current methods to have multicast traffic be controlled -- and both are not compatible with each other -- and both cause multicast traffic to hit the CPU of switches and routers in every brand I've found. This is really problematic when you are trying to transfer large amounts of multicast traffic (like video, for example), because every packet will have to be inspected by the CPU or flooded out to each port. In my case I'm constantly streaming ~ 8GB/s of multicast video....

Comment Re:Easily solvable (Score 3, Interesting) 435

The problem with this is that some of the original recipients of those really big blocks like GM and HP were given those addresses, not leased them. They, for all practical purposes, own that address space.

I know the organization I work for is a part of the problem. Before ARIN existed, a group of three schools (I work for one of them) were granted a /8 as a part of our research status. We have no relation with ARIN, and there isn't even a way to really give back 100 of the /16's we don't use.

Comment Re:there has to be a systemic source (Score 1) 149

It comes from all over. Cruise ships and other large carriers dump their trash into the ocean. Some countries dump their trash into the ocean. Some countries don't cover their trash-filled landfills, and the debris becomes airborne and land in the ocean. And those are just the intentional ones -- if a ship capsizes, you don't think it's contents just disappears, do you?

It dosen't take one large source for this to be a problem. As time marches on, it is a bunch of little sources that are contributing to make one big mess.

Comment Re:What do you expect? (Score 1) 146

My laptop holds about a 9 hour battery charge while in use (if I set the display brightness all the way down). My cell lasts about 7 days on moderate use, but if I turn on the tethering, it drops down to about 4 hours. I carry a few of those small USB batteries which usually make the cell last for my trip.

I'm able to travel and have connectivity if the poop hits the oscillator if I need it, provided I'm within data service of Verizon (likely) or TMO (less likely). It's best to check with the carriers first to make sure they have something in that area.

I'm lucky my co-workers can handle about 90% of any situations that can arise. And 50% of those that they can't can usually wait. Unfortunately, being understaffed in an IT role means that you do need connectivity sometimes. You may want to find out if you can form a partnership so you have some backup for those emergencies... Forming a partnership just for coverage isn't bad -- and I'm sure there are people you've learned to trust that can help you out.

Comment Re:In Theory - Thor (Score 1) 87

I for one have seen men and women working in IT with said skills. Besides, why would you even be using an authentication protocol your own staff has no clue about? That's just calling for trouble.

Also, the ROI estimates I've usually seen decision makers rely on are one dimensional plain simple characterizations that hardly reflect the real world we live in. It's an insanely complex task getting it right and all that money could be used in actually getting things done.

Sure, I've seen quite a few people with those skills. They don't work for me, and they probably don't work for the OP. If authentication is not in your line of business for your company, why are you making an internal product to do it? Oh, and it's a lot easier to implement a protocol like LDAP or RADIUS in an existing application than to build one from scratch. Knowing about 3DES TLS sockets is important, but let the professionals write the implementation.

If it was easy to do, the list would include hundreds of products -- many of them open source. That should give you a clue.

Building and open-sourcing custom solutions tailored for your personal needs is pointless. We're not talking about some universal it-does-everything solution, but a solution that will be tailored in-house to fit *your* unique combination of services and software. Nobody else would have the same needs as you.

Sure. Your business is a special snowflake for everything you do. I get it. No other business has ever tackled doing authentication management before ever -- and none of them have ever integrated with one of the common SaaS products before. It's a good thing you are spending multiple man-years building an internal product rather than focusing on stuff you can sell, implement, consult on, or you know, make money on. Spending 1 FTE year building something that can be bought off the shelf for $50,000 is not worth it, if that product for $50,000 can do everything for you already.

Comment Re:In Theory - Thor (Score 2) 87

Oh, it CAN be done. You just have to have somebody on staff who is an expert at RADIUS, LDAP, AD-AUTH, Kerberos, OAuth and probably a dozen other protocols that deal with authentication and authorization. Oh, and then a proper security audit because if you do it in house, are you sure that you can't drive a MAC truck through it?

Having done the ROI estimate on such a project, we couldn't do it. And this was for a company that had at least standardized on products that use RADIUS and LDAP for all things they offered auth for.

If it was easy to do, the list would include hundreds of products -- many of them open source. That should give you a clue.

If in any problem you find yourself doing an immense amount of work, the answer can be obtained by simple inspection.