Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re: Hahaha (Score 2) 18

The Business School does it's own thing, it doesn't dictate what the rest of the University does and often doesn't go along with the rest. The Business School is unusual in that it gives students accounts on Exchange, most of the rest of the University uses Exchange for only faculty/staff, not because the B-School did but because a University is an "enterprise" and Exchange is useful enterprise software.

And for many years, the Exchange instances I was aware of did have SMTP and IMAP gateways enabled, no need to set up one's own. I configured pine as an email client to Exchange, just to see if I could.

Comment Re:Hahaha (Score 4, Informative) 18

I don't think you need a Harvard email address to use any of the exploited platforms, you just need an active account in the single-sign-on system called HarvardKey.

Harvard email addresses are not all @harvard.edu, most include the School in the domain name, as your university did. I know faculty/staff can get @harvard.edu aliases, I don't know if any students can.

Anyone taking an Extension School course can request a Google Apps for Harvard account, which includes a @g.harvard.edu Gmail address, but it's only active while you're registered for a course (semester ends, account access ends unless you're registered for a course in the next semester).

Faculty, staff, and students in some other parts of Harvard can also have a @g.harvard.edu account in addition to their School account. Some may prefer to use it because they prefer Gmail over Outlook and/or because it integrates better with Google Calendar, Drive, etc. This fact makes the email address domain name not a great way to differentiate people signed up for one Extension course from "real" students or people employed by the University. So what? An email address is not a validation tool and attending or working at Harvard does not mean someone is great, or even good.

Comment Re:I mean I got this article through RSS (Score 2, Interesting) 438

I also switched to running TinyTinyRSS after Google Reader. I agree that RSS is very helpful for sites that update infrequently and/or at varied times. I also use it for frequently updated sites, it's so much faster to skim headlines and teasers with little to no ads in a feed reader; I tend to be a completist though so I have to fight the urge to skim everything.

When Twitter dropped their RSS feeds, I added a little code takes a Twitter handle as a parameter and returns their tweets as RSS (I already had the necessary API key).

Social media is so much worse for keeping track of the output of multiple sites. On one end, you have algorithms trying to decide what you want to see (or making businesses pay to be seen), on the other you have sites that send multiple tweets for the same story using different lines to "grab you."

Comment Re:Yay (Score 1) 65

If you don't see, it's because you're not looking. iTunes is the #1 music download store, by far, and it's all AAC. Apple does not sell MP3s. Their streaming service, iTunes Radio, also uses AAC. Pandora also uses AAC, not MP3, for its streams.

Comment Re: Instead of carrying on as a one-man band - (Score 1) 376

he probably lacks the intelligence to be in management anyway.

LOL +1 Funny. Unless you mean he lacks the kind of intelligence, i.e. Emotional Intelligence, required in management. Even that I would disagree with, there are many different strengths a manager can have and no one is strong in all areas. A high EI manager may be good at reading how their staff feels about what they're doing but shit at strategic planning.

I don't see anything wrong with remaining a mid-level programmer, better to serve as a good example through your code and behavior than to suffer from the Peter Principle and "rise to the level of their incompetence."

Comment Re: It doesn't take a genius to come up with an at (Score 1) 155

The people involved with the production of a tv show wouldn't have access to the data being exploited, the attack would have to be closer to the OTA broadcast or cable operator. Changing the files containing the code would be fairly obvious so you'd still need to use some hardware for a MITM attack inside the broadcast or cable facility.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...