Forgot your password?
typodupeerror

Comment: What about capital expense? (Score 2) 202

by rdunnell (#43630123) Attached to: Ask Slashdot: What's Your Company's Marketing-to-Engineering Ratio?

You're looking at one aspect of the budget. Non-labor expense is usually stuff like paying consulting firms, "cloud services," buying advertisements, paying for training, etc. Capital expense is where you typically book things like servers, enterprise software, storage, etc. So this could be a company who spends a ton of money on marketing crap, or it could just be a company that spends more on external advertising buys and focus studies than it does on sending IT guys to training and outsourcing business apps. Without looking at the total picture it's hard to say what they really invest in.

Comment: Check their contracts etc. (Score 1) 238

by rdunnell (#43380589) Attached to: Ask Slashdot: Dealing With Unwanted But Official Security Probes?

You say that you are "connected to" the network but you don't say what this relationship actually is. If you are hosted by the hospital (i.e. actually part of their network), then they may have an information security department who is checking all the hosts that are on their network. This may or may not be part of the contract, either as a service provided or something that is required by the contract or hosting arrangement.

If you are not actually part of their network or hosted by them, there may still be something in the contracts that says that they can do this sort of penetration testing with partner companies. It isn't the best idea to accept this as a contract term, but I have seen it requested before and it may have been in there with nobody to notice it.

I would say that whoever handles the arrangement with the hospital should probably talk with their counterpart on the hospital's side about this and learn more about why it is happening and what is done with the information.

With respect to the various posts that have/will happen about HIPAA, I would say that it's totally possible (and desirable) to have a proactive information security policy that can still comply with regulations. Proactive penetration testing is not prohibited.

Comment: Re:That's what you get (Score 3, Informative) 60

by rdunnell (#41237409) Attached to: ICS-CERT Warns That Infrastructure Switches Have Hard-Coded Account Holes

That's not exactly the point. Sure, if a switch is sparking, then it is broken. The point of this gear is that it has been built such that if it breaks, it won't be able to emit dangerous sparks that might do something like cause an explosion in the presence of a buildup of gas or whatever. It still has to be replaced, just like the non-hardened switch, but it is less risky to deploy in an environment where such hazards might be present.

Comment: Technology isn't the problem. (Score 1) 290

by rdunnell (#35392676) Attached to: Ask Slashdot: Could We Reconnect Eastern Libya?

You don't even need junked-together tin can wi-fi. Assuming there is something in the air to talk to, you could probably just set up a satellite uplink/downlink and not need to worry about distance or anything. The technology for this is readily available and has been deployed all around the world.

The problem is that the government would probably not like this and is also probably very likely to find it and "deal with it" in the same way that they deal with any other communications channel they don't approve of.

Comment: But that makes sense anyway. (Score 3, Insightful) 185

by rdunnell (#34827754) Attached to: Hospital Wireless Networks May Be Regulated Medical Devices

And that's part of the point. Why would you want your radiology machines on any sort of main network, regardless of whether they can or can't be updated? There's no reason for them to be widely available and the technology to firewall it off is not expensive when compared to the cost of, say, a collection of medical imaging systems that will sit behind it.

Comment: Re:Allow me to translate. (Score 5, Insightful) 306

by rdunnell (#31932148) Attached to: Cox Discontinues Usenet, Starting In June

I don't see how this translates to a conflict with net neutrality.

They aren't saying you can't use Usenet, that they are going to block it somehow or that you have to use their Usenet servers at a premium price. They're just saying they aren't going to host it and offer it as part of their service package.

Regardless of whether this is a nice thing to do or not, it doesn't have anything to do with net neutrality.

Comment: Fifty fold savings in servers? Awful writing. (Score 2, Interesting) 305

by rdunnell (#30886920) Attached to: NZ School Goes Open Source Amid Microsoft Mandate

So the article basically says that they have a machine room with four somewhat standard racks. That's pretty small. Figure that at some point you'll need some network gear which will likely take up at least one of the racks (switches, patch panels to other areas of the building, routers/firewalls), hopefully some UPS gear, a few servers.. four 48U racks doesn't go very far. And it only makes sense nowadays to have a couple larger servers hosting a bunch of virtual machines for mundane things. They would be wise to do that no matter what OS they run, and that more than anything is why you can cut down on the number of physical machines that are installed.

Comment: The Yahoo list isn't much of anything. (Score 2, Informative) 245

by rdunnell (#30344788) Attached to: "Lawful Spying" Price Lists Leaked

If you read it, you'll see that it's basically an explanation of what information they do and do not have, how their various properties work and what information they store, and how much it will cost an agency to have certain information requests addressed. It doesn't represent some sort of sinister pipeline of information directly from their users' keyboards to the "evil government." If anything it's useful to everyone because it shows exactly what they do and don't save, and it might act as a deterrent for the casual or clueless investigator who watches too much CSI and thinks sending a request off will instantly pinpoint the bad guy by backtracking his DNS through the GPS IP address of his netbook's MAC module or whatever.

Comment: Re:"Forward Looking Comment" (Score 1) 332

by rdunnell (#29734385) Attached to: High-Temp Superconductors To Connect Power Grids

That sort of disclosure is on almost every statement that is issued by companies that are regulated by the SEC or some other regulatory body. Go look at any company's annual report, quarterly SEC filings, etc. Even press releases might have that sort of language on it. You basically have to try to spell out everything that could possibly go wrong so that stupid investors who don't understand that every business carries potential risks don't sue you later.

Comment: I have seen placement firms help with resumes... (Score 1) 344

by rdunnell (#29698695) Attached to: When Do You Fire a Headhunter?

...but I personally would not think it was acceptable for them to edit a resume without collaborating with the candidate. If they want to suggest changes and work with them, that's one thing, but changes without the candidate's knowledge are a totally different matter.

Also, from the interviewer's point, they probably don't have the time or interest to weed through "why" it's wrong. And yeah, they may check in the future, and if stuff does not line up you might be held accountable for it. So even from an interviewer's point of view, it creates a potential problem. I would find another recruiting firm if you think it is beneficial to use one (I don't, necessarily, but it depends on your career and the types of companies you are looking for).

P.S. To question 3 - the recruiter is not your friend.

NASA

Mystery of the Missing Sunspots, Solved? 99

Posted by samzenpus
from the hide-and-go-seek dept.
PRB_Ohio writes "The sun is in the middle of a century long solar minimum, and sunspots have been puzzlingly scarce for more than two years. Now, for the first time, solar physicists might understand why. The gist is that there is a 'jet stream' like phenomenon about 7,000km below the surface of the sun. The streams migrate slowly from the poles to the equator and when a jet stream reaches the critical latitude of 22 degrees, new-cycle sunspots begin to appear. Scientists at the National Solar Observatory (NSO) in Tucson, Arizona, used a technique called helioseismology to track and analyze the streams."

Philogyny recapitulates erogeny; erogeny recapitulates philogyny.

Working...