Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Generic Barebone plus Virtualization (Score 1) 142

You can get a decent generic barebone from Tigerdirect for less than $300 (have to watch for a deal) with a quad-core processor, 8GB of RAM and a TB hard drive. I have one with Xenserver free version because I like the tools and driver support. I have used VMWare 2 GSX and ESX, then ESX3, VMWare Server free version and ESXi, but have been using Xenserver free version in both test and production for the last three years, though I understand that VMWare's solutions are also very workable. A UPS is helpful as well.

My current test Xenserver has at time of this writing 4 VMs on it - two Linux boxes, a Windows server 2003 and an XP instance, all used for testing and development. I have a Windows 7 instance as well, but it happens to be turned off at the moment. I use an external USB storing snapshots of test VMs - get a clean config, store a snapshot of it, then you can test, muck it up, blow it away then start up a copy of the snapshot without having to re-install. Mine has been running continuously since early summer.

This setup can get you started with minimum cost and effort if you are doing development and functional testing that does not include anything too exotic like clustering or a database with a large transaction volume. You're not going to break any speed records but you can build VMs in all the OS types you want to test and limit the number currently running to 4 or 5, and you'll do just fine.

Comment Multilayered defense (Score 1) 429

I have an Untangle gateway perimeter defense that blocks viruses, spyware and over-aggressive marketers. My Windows machines are protected by good Internet Security software, the Linux units have their own protection. My wife's company-owned Mac doesn't have any protection that I know of, but it's not my system to take care of, so it gets the protection of the Untangle gateway.

Comment This is simple consistency with Oracle's practices (Score 2, Insightful) 226

I'm not a big fan of Oracle's 20th century business model, which like a lot of other big name proprietary software companies and other types of companies as well is predicated on doing everything possible to obtain vendor lock-in, then charge through the nose for licensing and support, forcing upgrades, and basically squeezing customers at every opportunity. That's the downside of the model - in one way it sees customers as prey to be devoured.

The flipside of this is that proprietary companies like Oracle do make considerable investment to create solid, reliable product offerings, and they try to provide high quality support.

There are other proprietary companies out there who have Procrustean approaches; they don't spend time developing or innovating but rather continue to ride the gravy train of code that was written years and years ago. Customers have to alter their problems to fit the proprietary solutions. This is true in part of some of the niche applications aimed at specific vertical markets Oracle has acquired, but Oracle's acquisition has actually brought new life to languishing applications and brought Oracle's support processes to those same small app vendors.

Oracle targets customers who are willing to pay high prices for high quality software and willing to pay high prices for support. Is the cost justifiable? It depends - for some companies the risk exposure of getting 90% of the functionality of Oracle-type products for free or for very low cost is worthwhile, and the risk exposure of being without an enterprise-class support organization (or paying for support on a per-instance basis, sometimes through a consultant if no such support plan is offered for a given application) is justifiable. It's a decision each technology using company has to make for themselves.

Oracle's acquisition of the K Splice project is consistent with their business model.

Their business model is not amenable to me personally, but in some cases it might be a good fit for some of my customers. In those cases I can recommend Oracle's solutions, even though I am not fond of Oracle's business practices, which to some may seem avaricious, but to others may simply be a sign of an aggressively run profitable company that offers high end products and services and demands concomitant prices.

As to whether Oracle will contribute to the K Splice community or hold its own code contributions proprietary is their call. Past history indicates that they may not be enthusiastic contributors to the community but any prediction of how they will act in this case is pure conjecture. We'll have to wait and see.

Comment Re:Content Management (Score 1) 545

I'm really glad to see that you are suggesting a Content Management System. While it's inarguable that knowledge of (X)HTML and CSS make better webmasters, much of the world has moved on and let CMS packages like Wordpress, Joomla or Drupal, to name a few of the most popular systems, take care of dynamic HTML presentation. Just keep in mind that in any CMS (the ones mentioned all use Apache, MySQL and PHP as the platform stack) you must use security best practices as defined by the community then add your own extra security in things like extended .htaccess entries to prevent most SQL injection keystroke combos. As always, caveat lector!

Comment 1 - Fair is fair. Play by the rules. (Score 1) 215

I tend to be favorably inclined toward Open Source but I also grant that people whose business model is built around proprietary software licenses have every right to market their software under whichever license they choose. Open Source licensing preserves some very specific freedoms - if you are going to use or distribute Open Source software, you need to comply with its license and keep it open.

If you're going to use proprietary software you should comply with its licenses too, or you should find or code an alternative that has license provisions more to your liking. When I am searching for a software solution I look for Open Source solutions first, followed by proprietary ones if I can't find anything that is free and works. For some functions - and the narrower the vertical market niche that's being serviced is, the more likely this is true - there simply aren't Open Source solutions yet, and you have to go proprietary.

A proprietary niche vendor who sells crap (and there are more than a few) just needs some competition to make him learn how to code. If that competition is Open as well as superior, he may have to not only learn how to code better, but may have to re-examine his business model.

This is what distinguishes cyber-libertarianism from cyber-anarchism, the view that all licenses are bad and all rules are oppressive, which view I don't think is warranted or even possible, but that is for another discussion.

Comment Re:clearly (Score 1) 189

Underscore the "at worst" because no one's fate is completely sealed by nature or by nurture. Mere genius does not necessarily lead to success, whether the metric thereof is financial, academic, or fame-based. Witness Christopher Langan, arguably the world's smartest man, who nevertheless has not achieved great success. Gladwell and others suggest he was handicapped by being raised in poverty (and one doesn't know where his brain wiring came from). There are plenty of examples of people with modest brainpower who have done well simply through discipline, hard work, and positive attitude, and just as many examples of underachieving geniuses.

Comment What about professionalism? (Score 1) 592

There's another trait that's missing here: Professionalism.

Real Veteran Unix Admins are true professionals who know how to function in a business environment without being arrogant or prickly. They are comfortable enough in their own skins and emotionally secure enough that they never need to engage in put-downs of others who don't rise to their level of technical acumen. They never play at being the high priests of the sanctum sanctorum of Unix administration which should not be desecrated by mere mortals. They are capable of doing their jobs without needing constant stroking by management or self-stroking by engaging in endless pissing contests and self-aggrandizement.

Unfortunately there is a small subset of Unix admins who are technically brilliant but emotionally insecure. They can do amazing things with systems but they are often difficult to integrate into a team or an organizational culture. They are high-maintenance employees, both blessing and curse to the companies they work for. With proper structure and coaching (and sometimes therapy) some of these can be developed to become true professionals. Some may be impervious to all efforts to help them mature and become more stable - they will have to be compartmentalized for the good of the organization or let go.

I will leave it to my gentle readers to decide which group the author of the article belongs in.

It's funny.  Laugh.

Submission + - Cloned mammoth = prehistoric zombie apocalypse? (itworld.com)

DillyTonto writes: Here's an excellent idea that hasn't ever been illustrated as a catastrophic example of scientific hubris in a series of incredibly popular action-horror movies in which people innocently sitting in the john are savagely eaten by giant prehistoric things with big teeth: let's clone a mammoth that might not be a mammoth and see if it eats us and then crushes Tokyo.

Submission + - PC Virus Turns 25 (cio.com) 1

Batblue writes: Happy anniversary Basit and Amjad! Twenty-five years ago this month, the Alvi brothers of Lahore, Pakistan, gave the world the Brain Virus, the first bit of malware capable of infecting a DOS-based PC. Back in those relatively innocent times, the brothers actually embedded their real names and business address in the code and later told Time magazine they had written the virus to protect their medical software from piracy.

Who knows what they were really thinking, but by all accounts the Brain Virus was relatively harmless. Twenty-five years later, most malware is anything but benign and cyber criminals pull off exploits the Alvi brothers never envisioned.

Submission + - Criminal charges filed against AT&T iPad attac (computerworld.com)

Batblue writes: The U.S. Department of Justice (DOJ) will file criminal charges against the alleged attackers who copied personal information from the AT&T network of approximately 120,000 iPad users, the U.S. Attorney's Office, District of New Jersey announced Monday.

Daniel Spitler will be charged in U.S. District Court in New Jersey with one count of conspiracy to access a computer without authorization and one count of fraud. Andrew Auernheimer will be charged with the same counts at the U.S. Western District Court of Arkansas, which is in Fayetteville.

Auernheimer made headlines last June when he discovered that AT&T's website was disclosing the e-mail addresses and the unique ICC-ID numbers of multiple iPad owners. Claiming that he wanted to help AT&T improve its security, he wrote a computer script to extract the data from AT&T and then went public with the information. AT&T said that nobody from Auernheimer's hacking group contacted them about the flaw.

Submission + - Gold nanoparticles can cook cancer cells (fiercedrugdelivery.com)

hlovy writes: There are many possible ways to kill a cancer cell, and one of them is to cook them to death. There are nanoparticles worth their weight in gold to do just that. Researchers at the Niels Bohr Institute at the University of Copenhagen are experimenting with tiny gold particles' ability to melt the lipid membranes surrounding cells, paving the way for pinpoint precision when attacking tumors
Security

Submission + - Threat Sharing - A Necessary Defense Strategy (securityweek.com)

wiredmikey writes: Network defense is a challenging undertaking. In today’s environment where the landscape is so open to global cyber threats, it's difficult for any organization to rely solely on itself to provide protection. Just as firefighters, police officers, and federal authorities have had to learn to communicate and work better together, so too do cyber first responders. What’s Driving the Need to Share Threat Data? What’s Worth Sharing and How do we Enable Sharing and Realize the benefits?

Sharing works best when a broad spectrum of participants are involved in a win-win engagement, and more organizations need to be involved.

Television

Submission + - JVC Shrinks Super High-Def Projector (itworld.com)

itwbennett writes: JVC on Tuesday unveiled a projector compatible with an experimental broadcasting format called Super Hi-Vision (higher than high-def) that is less than half the size and a quarter the weight than previous devices — and is cheaper to boot. At 7,680 pixels by 4,320 pixels, a Super Hi-Vision picture has 16-times the resolution of today's high-def TV and four times that of 4K digital cinema. You can watch this video of the device in action, but you'll have to take our word for it that the images are far better than anything you've seen.

Slashdot Top Deals

"Everything should be made as simple as possible, but not simpler." -- Albert Einstein

Working...