Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Automatic provisioning? (Score 1) 170

The problem is that without accurate measurements of power consumption to support capacity and availability management data centers aren't able to do this as effectively as they could.

Companies such as nlyte and Modius do have solutions that address some of these issues. CA has a complete suite that address the entire DCIM space: ecoGovernance, which is a data aggregator / analyzer / reporter; ecoMeter, which provides accurate measurements of data center resources (including CRAC units, etc.) for the purposes of availability management; and ecoDesktop, a poorly named solution that ensures optimal usage of desktops and development / test servers by understanding usage patterns and using auto-shutdown / wake-on-LAN to shut down and startup machines when they are not being used to conserve electricity and ultimately save money.

Disclaimer: I am a CA employee, but I'm speaking from the perspective of one who was in IT for 18 years. This stuff is quite good.

Comment Re:Give Em A Call (Score 2) 666

I call bullshit on the first statement. I work in a sales related capacity (after spending 18 years in IT) and I don't exaggerate to make a sale.

Ask for financial metrics or calculate them yourself: what is the percentage reduction based on historical data of determining root cause of problems with Red Hat support vs. without? Multiply that by the going FTE for your industry / geographical region and you have hard dollar cost savings. Use a 20% discount rate (aggressive) to calculate future discounted cash flows (and determine Net Present Value). Solve for n% discount such that NPV = 0 and you have the Internal Rate of Return (IRR).

Then ask the CFO / Controller what the Hurdle Rate is and see if the IRR > Hurdle Rate. If so the investment is sound assuming the data on % savings for root cause analysis is sound.

Comment CBC is weak no matter how you analyze it (Score 1) 80

With AES256 being a government standard for 10 years, why would anyone recommend CBC (which was considered weak long before AES was denoted the standard) as an encryption method?

You could use Diffie-Hellman key exchanges ( to strengthen this, but that wouldn't necessarily prevent the attack that was used in the demonstration.

Comment Sure I'll comment... (Score 1) 114

...and I'll even try to remember to check back in case people respond.

Assumption: the trading application being critiqued is the same one that was there when I was an IT consultant at Morgan Stanley. I left in August 2000.

I know the application well. It was developed by a department headed up by Vinny (whose name is withheld because...I'm senile and don't remember it). I worked in the department that wrote the messaging infrastructure that was used by every application on the sell side of the firm.

If the application is the same one then the mere fact that it was still in use when Mr. Fried left is a testament to the application's effectiveness. Would they do it better now if they were writing it from scratch? Of course. But Morgan Stanley has 3,000-4,000 IT staff in its ranks so they could easily do so if the application were as bad as he says. And the messaging infrastructure...well, I have no love for the original authors (no hard feelings Steve and Arthur...I'm lying of course), but that subsystem was extremely robust, predated TIBCO and Talarian, and provided more functionality that those two products until after they were on the market for several years.

Comment There sure are... (Score 1) 477

There sure are a lot of Anonymous Cowards posting in here...Not for nothing, but I'd rather know the name of the person I shouldn't be listening to (purportedly the author of the article) rather than be expected to trust anything said by someone who doesn't have the balls to post under their Slashdot name. Just sayin'...

Comment Re:Here we go (Score 1) 223

Two factor authentication is popular amongst corporations for a good reason: the password itself isn't sufficient to get access. Arcot's solutions not only provide decoys but also provide two factor authentication. And they are the ones that patented the 3-D Secure technology that Visa uses for mobile transactions.

Comment Re:Who reads the manual? (Score 0) 457

I disagree. Just because you don't sign anything doesn't mean that your usage of the product doesn't constitute an acknowledgment and agreement to the terms of the EULA. Furthermore, you have the option of returning the product for a refund if you do not agree to the EULA so the fact that you can't read it until after you've purchased it does not hold water. Disclaimer: I am not a lawyer.

Comment Re:Realistically.... (Score 1) 457

1. If every camera is covered by the LA then how does this matter, i.e. regardless of the camera you are still infringing. Still, there are cameras (as noted in the article) that use codecs that do not infringe. In this instance... 2. ...the encoding used by a camera will have specific characteristics. While it is more cumbersome to prove in court, it is possible to demonstrate via circumstantial evidence that a particular video exhibits characteristics unique to a particular codec. Disclaimer: I am not a lawyer.

Comment Demo? (Score 1) 303

The game is currently in development and the goal is to release it in downloadable form for consoles and PC/Mac. There is no announced date and platform yet. There is no publicly released demo at this point. There will be one when the game is released though, so please be patient :) Thanks.

I guess the demo is somewhere in the 4th dimension...

Slashdot Top Deals

"There is no statute of limitations on stupidity." -- Randomly produced by a computer program called Markov3.