Forgot your password?
typodupeerror

Comment Show Me The Money (Score 4, Interesting) 116

The real story here is that Shared Services was set up to fail almost from the beginning. While the idea of centralized IT is probably a good one from a reducing-duplication standpoint (at the expense of an increasing-bureaucracy standpoint); Shared Services Canada's budget was cut before it was even half-formed, and then cut again in subsequent years (see this November 2016 Ottawa Citizen article: http://ottawacitizen.com/news/...). So of course they are failing to deliver. So while it may be fun to say "Feds Screw Up IT Again, Hurr Durr" let's be sure to blame the real problem makers -- the politicians, mostly Conservative, who dug this hole that Shared Services finds itself in.

Comment Not surprised in the least (Score 4, Interesting) 278

Heh. Just commented on this on the Gizmodo post an hour ago. Please forgive the copypasta for my first post on Slashdot in probably 5 years.

My organization recently had a conference in a hotel owned by Marriott in a large Southern city. Not only did they want $500 per device per day for any Internet access — wired or wireless — the $12.95/day in-room wifi straight up did not work. They'd take your money before you could figure out it didn't work, of course. And if you ponied up the $16.95 for the "high speed" in-room wifi, it...barely worked. Barely.

We request one wired connection now. And once it's connected and the hotel staffers leave, I set up our own router with our own network. I'm pretty sure that if there was will or pressure on various and sundry consumer protection agencies, the prices charged by many hotel chains — with Marriott properties being the worst of them all — would not hold up in court.

I'll also add that our Director of Events is fairly convinced a new Marriott property in Washington, DC is doing this right now.

Comment I Advise On Security Policies Like This (Score 2) 510

Part of my job is to advise companies on security policies like this, and I have advised in favor of such restrictions when asked. However this is done out of respect for the end-user's privacy. The reasoning is that there are two conflicting priorities in permitting BYOD use and network access:

First, as a security officer I have a duty to ensure that the network and all devices connected to it remain secure.

Second, as an agent of the company I have absolutely no right to dictate to an employee what they must or must not do with their device to prove that it is secure. It is their device which they purchased with their money to use for their own purposes.

Since I cannot prove that the device is secure without violating their privacy or exerting an unreasonable amount of control over the device, the only resolution is that the device is not permitted.

If you really need a device, then the resolution to that is to get the company to buy you a device -- at which point the company owns it, and can dictate what security measures are taken.

At the end of the day, a company pays you to do a job, and as such has the final say over how you do it and what tools you use to do it. It may not be your choice, or the best choice, or even an efficient choice. But that's how they want it done.

Good employers will listen to their staff and make adjustments and get the tools that their staff need. But it isn't mandatory.

If you don't like the job, and the employer won't change it to suit you, you have two choices: live with it, or leave.

Comment You will never succeed. (Score 1) 165

Been there. Done that. Failed repeatedly, and for various interesting reasons, none of which are generalizable.

Your problem has several aspects to it, and as far as I can nobody's talked about them. Lots of the answers talk about specific parts of the problem but not in a general way.

Here's your problem:

  • Figure out what you have: this is a basic inventory.
  • Figure out how it is connected together: this is a wiring table. Some people will tell you that a wiring diagram is good enough, but after a certain point you can't use them because they get too big and the layout problems start to get non-trivial. So you need a table. Which means you need a way to identify each wire. At both ends. Uniquely. Accurately.
  • Figure out how to store it all. Visio for simple, high-architecture diagrams, yes. We use Sharepoint and custom tables for the actual device and wiring tables, but Excel will do. There's a whole essay that could be written on this (and I feel like I've written parts of it repeatedly) but the #1 aspect to this issue is that WHATEVER YOU PICK HAS TO BE SIMPLE AND STAY OUT OF PEOPLE'S WAY OR THEY WON'T USE IT. You have to make it trivial to keep the data up to date. You have to somehow make it harder to not do the wrong thing -- but since the wrong thing is to ignore the documentation and just slap your wire in there, that's impossible. Which means you need:
  • A way to detect changes that are made without authorization. I have a home grown collection of tools (rancid, nagios, arpwatch) and scripts that detect most of the day-to-day possible changes that happen on my particular network. I like the idea of NetDisco but have never achieved a working instance. The problem is that while detecting adds and moves is easy (because a move appears as an add) detecting decommissioning is hard. So the documentation rots. So you need:
  • Tools that can detect the current state of the network. One of my copious-spare-time project (for the last ten years *sob*) has been writing a perl script that can query my snmp switches and tell me what port a particular MAC address is connected to, right now. I can't tell you how many times that script has saved hours of f---ing around at various places. But you need SNMP-manageable gear for something like that to work. So you need:
  • Management that will support you in this endeavor. Management that will spend the extra bucks to ensure that equiptment can be monitored for changes by external systems. Management that understands that documentation needs periodic auditing and that the crazy guy ranting about unauthorized changes has been empowered by management to enforce documentation about these changes. (Which is hard when its your boss making the changes.)

Frankly the last issue is the most important. If you can get management to sign off on spending money (and really, your time is their money) then you are 50% of the way home. If you get sandbagged halfway through when you discover you need to unplug three linksys switches that happen to form the iSCSI core network that will take the world offline for six hours to sort out a spanning-tree loop, then you'll have other problems. But the technical ones are easy to sort out once management has committed to spending time and money to solve them.

Comment Volume == defaults (Score 1) 818

Because Gnome is the default. I have to touch dozens of computers in a week, many of them freshly built, and I gave up trying to customize all of them a long time ago. Basically the only thing I customize now is the .bash_profile and the .vimrc -- both of which can be wget'd trivially quickly. I don't have time to fuck around with window managers any more.

Comment Re:Components (Score 1) 162

This doesn't work for the same reason that virtualization rarely yields absolute savings. Instead of "doing the same with less", the pointy heads see all this newly-freed up hardware and decide to re-use it. You end up "doing even more with the same". So your costs-per-work-unit go down, but your absolute costs stay the same (or go up once virtualization costs are factored in).

The same goes for people buying hardware. We rarely say "oh, I can buy this computer that has A) the same performance and B) better energy consuption rates as my existing one for less than I paid for it" -- we say "oh, I can buy one that is so much faster and powerful (and ususally, energy-hungry) than my existing one for the same as I paid for the originial".

Why spend more money to get what you already have, when you can spend more money to get -- more?

Comment Re:Double standards for network tracking (Score 1) 619

Don't be stupid. You very well know that that iPad is worth, at most, $1000, while a single downloaded song is worth easilly ten times that much.

It is all about putting policing resources where they will generate the most revenue for the politicians^W^W^W^W^W^W^W do the most good.

Comment Re:methodically and late into the night (Score 5, Insightful) 424

What happens when he's on vacation or sick and a server dies? What happens when the website has an issue and then *anything* else goes wrong?

Oh, that's easy:

  • He gets called in from being on vacation or sick;
  • he gets to work uncompensated time to fix the problem;
  • if he fails to either respond to the call OR fails to fix the problem, he gets fired;
  • if he succeeds in fixing the problem, he gets threatened with termination should something else fail while he's "unavailable".

In fact, I'd lay odds that's how the vacancy occurred.

Comment Re:You Software Engineers Don't Get It (Score 1) 848

It is more subtle than that. The problem is that the "freedom" being exercised in the current ecosystem is that of the Software Engineer: they have the freedom to write bad applications (or write good applications badly, which is different). The end result is that the end user no longer cares if you, the Software Engineer has unfettered market access to their device. They are tired of dealing with the garbage that the unfettered market is providing. They don't want freedom -- they want to do the things that these devices are supposed to enable, instead of being hung up on the devices themselves. For example, the difference between operating a camera and taking a picture.

Your reply also confuses me, as you seem to take a position against mine, then go on to use your own poor experiences with your non-restricted Android platform as an argument -- which to my mind, just reinforces my argument. If someone had been curating your app experience with the Android, it might not have been so bad.

Slashdot Top Deals

"Just think of a computer as hardware you can program." -- Nigel de la Tierre

Working...