Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Crowdmandering or gerrysourcing? (Score 1) 83

Agreed. Just throw a dart at a map, lay down a fixed-sized hex, and call that a district. Set all the other districts as the same-sized hex built off the first hex.

Once the population density of a hex falls below a specific density, i.e. rural areas, start letting the computers take over and carve it up.

Maybe then, disenfranchised inner-city voters would think they have a voice.

Comment Re:Could Someone Explain to me... (Score 1) 591

The vast majority of the time, I use my bookmarks to hit the sites I love.

Sometimes, I click on a link from a forum (including /., Digg, and Redit links).

Sometimes, I search for something in Google and click the links there.

I *almost* never type in a URL.

Still, not sure that an extra 150~200 pixels is really going to make or break my browsing experience.

Comment Re:I love the smell of napalm in the morning (Score 1) 303

If you build software on top of locked hardware, then you should *never* update the systems until you test what the updated will break.

Now, there may be a group out there that is concerned about not being able to replace failed units. But I doubt any *really* good programmers were bothered by a PS3 firmware update.

Comment Re:Basics (Score 1) 480

We use VTP extensively. I couldn't imagine trying to manage our domain without it.

We have a policy that before we shelve a switch, we blank the config. We also have standard configs on the laptops in our equipment cage. Take a switch off of the shelf, boot into ROMMON, upload the latest IOS, then apply the standard config.

I could see a smaller shop with no real policies or procedures in-place making a mistake like that. I've heard of it happening. And I think that's why we are so paranoid about it.

We take an additional step of whitelist pruning vice blacklist pruning. The CCNA level stuff talks about removing VLANs from trunks. Our default is to prune all VLANs from every trunk and then we allow the VLANs that are in-use downstream.

Comment Re:Basics (Score 1) 480

5a. Why do you avoid VTP?

Everything else is pretty solid. I really like the idea of connecting the access to the core stack using dual links. I'm guessing you mean via EtherChanel?

You could go with HSRP if you *really* need uptime. But HSRP can be a beast to get working properly...

Comment Re:Views from a New Entrant (Score 1) 480

I can second this.

I'm a Sr. network engineer for a *huge* network. For 100 machines, I would probably have a Cisco 3750s for the core and, depending on the distribution of users, something like Cisco 2940s for access. If all the users are in one location, just stack the 3750s.

3750s run about $7K each. 2940s are around $1200.

Get a CCNA book or CCNA videos and start reading/watching.

I haven't used any of the HP kit. I have used Juniper and Marconi for WAN stuff. As a general rule, just buy Cisco until you know you need something else.

Comment Re:Here's what to do. (Score 1) 480

I disagree about the database thing.

1. Create a spreadsheet with your networks. It should have headings like this: IP, mask, DNS name, use, user, phone number.

2. Separate those into subnets.

3. Print that out and put it into a binder.

4. Use something like Solarwinds to map your subnets.

5. Use a *pencil* and fill all the information into the binder.

6. Photocopy the binder and leave one copy at home, one with your boss. Carry the original with you at *all* times.

7. Update often.

I have used databases, spreadsheets, specialized tools like SolarWinds, Orion, HP OpenView, etc. Nothing beats a printed binder that is always with you. Using a pencil will ensure that future updates, additions, or deletions will not mean printing a brand new sheet.

Comment Re:He got notified? (Score 1) 404

You could claim that you suffered a loss by having to check your CC statement daily for a month, then weekly for a year.

Claim the time spent on the phone with the CC company to get a new card issued.

Claim the time you spent between when the old card was axed and the new card arrived.

Claim the increase in SPAM via email and snail mail.

Comment Re:Official word from Sony finally (Score 1) 404

I was thinking about that. It seems to me that there is Alice, Bob, and Charlie.

Alice needs to authorize Bob to take money from Charlie that Alice will pay back in the future.

Alice could do a one-time authentication with Bob, Bob would do an authentication with Charlie. Bob could hash Alice's number and Charlie could store the hash of Bob's hash.

Basically, Alice and Charlie could have a secret number that Bob could never (if properly salted) decode.

To take it a step further, the secret number could revolve based on timestamps; say refreshing every 6 hours. As long as Alice and Charlie's clocks were synched (radio isotope decay), then you could have a super-secure CC# processing system.

Slashdot Top Deals

Physician: One upon whom we set our hopes when ill and our dogs when well. -- Ambrose Bierce

Working...