Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Makes my decision easy... never going to buy one! (Score 1) 124

Far out, and they have the gaul to pretend it isn't an advertisement! This makes the decision very clear.... I *HATE* ads... like with a vengeance. Doing something like this is a breach of trust (yes, I know Google is an advertising company, but when I *pay* for a device I expect it not to also have ads. This is also the reason I have been holding off on buying a new laptop that runs Windows 10, I've seen the advertising M$ is doing in the interface ("Try Edge!", "Use OneDrive!", etc) and can't bring myself to jump ship from MacOS....

Comment Re:Soylent Blue . . . ?!?!?! (Score 1) 63

They will be "resource allocated"... which everyone else calls "made redundant". These deals always guarantee retention of staff for a set time period, with them working on the account until transformation is complete (i.e. outsourcing to China/India).. after that, only a few key staff are retained on the account for a period of 2 years or so, and then after that.. it's anyone's guess. Don't expect any of the original jobs to be retained by IBM in-country more than a few years.. they're still aggressively "resource allocating" to cheap geographic regions with ongoing targets like 10% reduction of in-country workforce each year... Saying that these deals with make the company more "agile" is a total joke. IBM is heavy on process, it's slow and clunky and highly siloed. But what the bank will get is some vigorous process and associated results... but agile... hope you like 3+ month turn around on new physical servers....

Comment Computer Fraud and Abuse Act (Score 1) 236

Time to make it a federal crime for any organisation public or private that knows of vulnerabilities to fail to disclose those vulnerabilities to the vendor. Circumventing computer security and knowingly allowing vulnerabilities to persist is tantamount to sabotage enabling financial and reputational damage to organisations and individuals that use those computer systems/software. Class action?

Comment Producer responsible for end of life recycling (Score 4, Informative) 274

Similar to the End of Life Vehicles Directive in the EU, Similar to the German End-of-Life Vehicles Act of 2002 (extended from a similar law in 1997). Manufacturers are responsible for recycling their vehicle at the vehicles end of life, this means manufacturers design their cars to be more easily recycled and means any overhead costs are built into the cost of the car up-front. There is no good reason that this shouldn't be the case for any larger or common products, why should the cost of recycling be deferred until the product has reached end of life, no consumer will pay more money to have their product recycled *after* it is useless.

Comment Re:Stuff That Fucking Matters (Score 5, Insightful) 920

I'm inclined to agree with you. This is big news when a professional news organisation deliberately misrepresents someones work like that, and in doing so causes direct harm to their work. It's not up for debate whether the work is in bad taste, boring, annoying, or bat shit crazy... it's a beat up and taken totally out of context, and it's harmful. They shouldn't get away with it, it's poor reporting at best, a free speech issue at worst.

Comment Mac OS? (Score 1) 236

I hate to say it, but really it should "just work".. given Microsoft *can* control what drivers are installed, I simply don't understand why hardware drivers aren't maintained through a quality controlled channel, let people choose which version they want, but otherwise have a default currently supported (and tested in at least the most common hardware configurations) driver that is delivered through windows updates or something...

One of the reason's I (as a Windows admin, and Linux admin too) enjoy using an Apple Mac is because I *never* have to dick around with drivers. This is likely also a major contributor to touted enterprise support cost savings at IBM despite higher initial buy cost for their Macbook Pro fleet.

I realise all the myriad configurations would make extensive testing of every configuration improbable, something that Apple has an advantage over by controlling the hardware as well as OS, but I also refuse to believe this is an insurmountable engineering problem.

Comment Backup/Backup/Backup/Backup/Backup (Score 3, Insightful) 106

I've had the dubious honour of dealing with and recovering from two attacks in the last two years. On both occasions we had one or more staff open a phishing email and execute the ransomware. On both occasions the ransomware successfully encrypted over 250000 files on file shares. We do have quite a reasonable level of protection in place, including 1) AntiVirus and Anti-Malware (useless in both accounts), 2) moderate level of security groups for users limiting access to only those files they require, with exception of a "temp share" which is a dumping ground for all kinds of stuff, but cleared automatically every 30 days, 3) file name/extension ACLs on windows shares that prevent files like .encrypted .EnCiPhErEd from being created on the file system 4) daily backups. In each case, we still had to do targeted purge/restore to get the files back. We never for a second thought about paying the ransom. I restored all files within 4-6 hours, using a mixture of scripts and manual review of folders and files. The best solution is have great back-ups... those backups should be regularly tested and monitored for success. With good backups, you can recover in a very short time frame....

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz