Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Medicine

Caffeine Linked To Lower Skin Cancer Risk 130

THE_WELL_HUNG_OYSTER writes "The curative effects of coffee continue to be discovered as the Harvard School of Public Health and Boston's Brigham & Women's Hospital published a new study today that links caffeine consumption with reduced skin cancer rates. Quoting: 'The study of nearly 113,000 men and women found those who drank three or more cups of coffee a day had a 20 percent lower risk of basal cell carcinoma than those who said no to Joe. Caffeine in non-coffee substances was found equally effective. The cause is speculated to be related to caffeine's ability to "kill off damaged skin cells," said Dr. Josh Zeichner, assistant professor of dermatology at Mount Sinai Medical Center in New York. "If you get rid of these cells that are damaged, then they don't have the opportunity to grow and form cancers."'"

Comment the costs of business (Score 1) 1

my vote is that if it is not being paid, it should not have to maintain the files; except, of course, unless it is an e-discovery issue. I admit that I am not read-up on all of this story, but nothing reported here or in the article linked, says that it is an e-discovery issue. If a governing body requires it (when it's not for e-discovery), that body should pay. If this was an e-discovery issue, the 3rd party could make a business-loss claim against its insurance company for payment, and that insurance company should have plans in place to mitigate against an extended period of time. . . . I admit that this is probably an issue for those whose data it is, and I think the network should now plan for such occurrences to happen again in the future (data-owners should have redundant systems for the same data, AND\OR The business owners [not the host] should have redundant systems and to auto-enable the data owners to remove their data; and to put clauses in their agreements to enable access-for-the-explicit-purpose-of-determining-contact-for-the-data-owners, in such a situation as this only, to enable a governing body to contact the data owners to notify that there is a small charge required to retrieve their data [for instance]. AND\OR The business owner [the host] should build-in an agreement with its customers for access only under supervision of a governing body [or something like that] to determine contact for the data owners.) For a business to be required by a law\court\rule to maintain the data in a situation that is not insurable, that is actually preventing the host from doing business. my .02

Comment 'The role of IT' or 'the need for change'? (Score 1) 3

What I have seen is that either their lack of understanding of the need for security exists solely because they really have no idea (even that they have been operating under false assumptions that the 800 pound gorillas that they use in their daily work will some how 'save' them), or, it exists because they choose to ignore facts. -Some would say that ignoring facts could be thought of as a strategy for operations, but that's another conversation. When they have already chosen to ignore, logic is not going to convince them without a great big fight. So, in that scenario, as the first commenter here suggested: Walk away from the endeavor. But if it's that they really have no idea or are misinformed, in my experience, to be successful in getting buy-in for the need, I had to be ready to take the conversation through the entire scenario. --> Start by asking them how much they enjoy \ can afford risk. The answer is usually “not much.” This opens the path to a conversation about how much risk exists in \ for the organization, why and how\where it exists, and how risk can be mitigated by proper management of it, and the potential consequences of failure to do so. Of course, to have this conversation, you must be educated and convincing in your knowledge, and you must be able to point to relevant examples. --> identify a serious problem; demonstrate a 'fix'; and obtain buy-in to resolve it. --> THEN there are the initial costs to discuss concerning your proposals for the remedy \ mitigation efforts. Here, you must really be prepared AND understood by your audience, so your 'talk' has to be knowledgeable and practiced. You’ll most likely have to initialize a risk analysis for the organization, as well as a ROI analysis. You must also be able to convincingly convey the concept of 'increased risk with time', and speak to their desires for success and good reputation. If you want to be doing this; if you are passionate about the cause; if you are comfortable with 'the end justifies the means', then this is something you MAY be able to accomplish. But if you are not able to passionately talk about the issue and its causes and its costs and its fixes, you will be wasting your time, and, also, making it harder for the next person who attempts to get that buy-in.

Comment Employee-Owned Devices Muddy Data Privacy Rights (Score 2) 165

Not everybody has the talent to be a good author (I don't fool myself). Some writings get muddled, and some responders simply interject confusions. The topic(s) of ‘data privacy rights’, why they are needed, and including who is subject to adhere to regulations concerning them, why they are subject, when they are subject, and the regulations themselves, all deserve to be logically discussed .. . .. .Because there ARE regulations. -Regulations concerning information that a person or other entity may hold [about] another person, or other entity, which, if obtained by an unauthorized 3rd party, could be used in an unauthorized manner. (If you legitimately [authorized] collect and save someone else's information, you have a responsibility to protect that information from unauthorized access, viewing, collection and\or use. And, generally, authorized for your use does not authorize you to authorize any other person or entity.) The Ops’ title is: - “Employee-Owned Devices Muddy Privacy Rights” - Business and Tech headlines lately are loaded with mentions about, and references to such things as, “Bring your own device to work(BYOD)”, “Commercialization of Corporate IT”, etc., etc., which talk about employees using their own devices to access work-related assets, for different reasons. As is pointed-out in various comments above, the persons or entities that are subject to the aforementioned regulations are required to take ‘reasonable steps' to comply with those regulations. It is NOT reasonable to ‘assume’ an employee’s personal device is and will remain to be ‘in compliance’ with the subject regulations, therefore, it is NOT a ‘reasonable step’ to openly allow employee-owned devices access to the internal information. The computer systems we saw on television, Star Trek and the like, will one day govern us; but not yet.

Comment when using Data\Document Classification methods... (Score 2) 241

As it does become costlier to 'keep all data', regarding business data, when using a data or document 'classification' method which identifies data that poses greater risks for the organization, regulatory and\or legal, or in unnecessary costs, once the data can be moved from 'riskiest' to 'least risky', maybe then it becomes acceptable to introduce the 'unknown' of 'where' the data is located, (if you keep it, at all), but surely not while the data is classified as 'risky'.

Comment The "CIA" of electronically stored data . . . (Score 1) 241

Concerning stored data, one way or another, one or more of these requirements comes into play: "confidentiality, integrity, availability", or sometimes "authenticity" If you are seeking 'proof' of any one of these concepts regarding the data, at any of the varying stages of consideration, how can you, or your service provider, prove it if there is a question of "where" the data resides?

Submission + - How to remove duplicates from large external hard 9

johnedmiston1956 writes: I have been given a number of external hard drives full of resources, many of which are the same, I think I have about 4 Tb which after duplicate removal would go down to 1.5 TB or less.

My largest external drive is 2TB. I propose to remove the duplicates from that one first, then upload a smaller HDD to it, remove the duplicates again, ad nauseum, until we have one HDD, with all the resources, organized and without duplicates. Or perhaps when I upload
the new files I could use a sync utility....??

So I need:

a) a good duplicate remover (preferably free or low cost) that someone has used on a large external drive and which works (those I have tried
have just given up..)

b) A good sync utility (Win 7)

and it would be really, really nice if a program could then
automatically index the drive and create an html index page or search (though Wilma / Wilbur search might do..)
Businesses

Submission + - Become the CIO your company needs (itwire.com) 1

davidmwilliams writes: "Too often business views IT as merely a commodity there "to keep the lights on". Yet, if you're an IT leader, you have the opportunity to change this. IT ought rightly be a strategic element of any business and can be transformed to become a competitive differentiator — if you're up for the challenge.

This is the first post on a new blog, The Wired CIO, by the author of the Linux Distillery blog, which has been running for almost four years."

Submission + - RAID 0 SSD Diagnostics?

KeithConover writes: "A question.
I recently decided to replace my aging but venerable 3.5 year old Panasonic "Let's Note" W5 laptop (grey market from dynamism.com) that's held together with duct tape and superglue (no exaggeration).
Decided to scrape up the $$ for a really high-end machine, a Sony Vaio Z. Thus far, very impressed with the engineering. It is very, very, very fast, because it has dual SSD hard drives in RAID 0. I was a bit reluctant to do this based on a previous bad experience with RAID 0 — my SilentPC desktop originally shipped with RAID 0, and I found exactly no diagnostics available to monitor my hard drives, So when a hard drive failed, I got rid of the RAID 0.
Anyway, my Sony laptop, which is about 6 weeks old, has been just sitting there and twice, despite being Win7 64bit, got a spontaneous Blue Screen of Death. And once it locked up and required a power off reboot. Two of these times, the little Intel RAID utility noted that Drive 2 failed (0). (I love simple error messages.) I was able to "reset to normal" and the system worked fine thereafter. All Sony diagnostics, including the Recovery Mode hard drive scan, found no errors, and memtest86+ 4.2 found nothing wrong with the RAM. I am now about to reformat the hard drive and reinstall the OS from the recovery partiion, and reinstall all my software. (Luckily, when I install on a new machine, I keep a running log of everything I do so it's easy to redo.)
Anyone know of any diagnostics to run on a suspect RAID0 SSD? I hate to return such a beautiful machine as a lemon, but I'm getting closer and closer..."

Comment It's all in the contract for service . . . (Score 1) 459

Where tiers are possible in service, service is tiered. This is not new. This is good business. For residential-class service they charge X and they block the port. For business-class service they charge X + and they unblock the port. there's nothing 'unfair' here, the contract defined the tiers. You do not 'own' the network, nor the access to it. You have a contract for access to use the network, and you agreed to fine print in the contract. The fine print states that if you want to run a web server, or email server, you must purchase business-class service. move along now. there is no story here. It has been this way

Comment WARRANTY = Contract. (was: Re:Ha) (Score 1) 272

I am not necessarily pro-Dell, but I am for making money, so I learned 'contracts' -(IANAL) When you call a 'Hardware' company for tech support regarding 3rd party SOFTWARE that the hardware company did not install on the hardware you bought, and so therefore could not have had the opportunity to configure their hardware for that software, how would it be profitable for that company to support you? It could not be. MOSTLY because if they did that for you, they'd also have to do it for everyone else, but mainly because [you contracted with them to provide tech support based upon the hardware and software configuration that you purchased] YOU made the contract for their services. If they were expected to provide unlimited services to you, no matter what you did, then they would have been justified to charge you for that. It's common knowledge that Dell is a hardware company, not a software company. If they tried to charge you for support of software they did not 'build', you'd really get heated. -They would not be able to alter the software to your configurations, so what would you be paying for ? Also, 'increased service' above your warranty -just because its relatively soon after you made your purchase, is not kosher, either. There is no 'Service' without 'contract', and 'Contract' is two-way, never only one-way. On another note - I can say from experience that had you purchased your upgrade from Dell based upon the system as it was sold (you had that choice), they would have slip-streamed all necessary drivers into your installation CD and the entire upgrade process would have been pretty quick. Also, Dell does not abandon their hardware because you change the software. They would continue to provide hardware support as best they could based upon the contract. -Its just that when you change the operating system, sometimes the hardware then needs new drivers and setting configurations TO WORK. So if you expect them to work (provide service) on what you did not pay for, who would it be getting the short end of the interaction? any company's shareholders would have lots to say about that business model.

Slashdot Top Deals

That does not compute.

Working...