Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Supply Chain / Vendor Management (Score 1) 341

Every medium & above -sized Corporation has at least two departments, possibly three.

1 - Vendor Management
2 - Supply Chain
3 - Accounts Payable

Find out who the Vendor Relations Manager. Ask your customer at the Company.

Engage them. They should be able to guide you through the abyss that is Supply Chain and Accounting.

Most large Companies have specific guidelines for Emailing or Faxing invoices. Purchase Order numbers typically have to be referenced on all invoices.

Do you have a Master Agreement? Refer to that for remittance instructions.

You don't have a Master Agreement? Don't do any more work until you obtain one.

If this Company doesn't have a Vendor Relations department, ask your contact for a contact in Supply Chain.

Supply Chain would be the one's to work up any Master Agreements between you and them anyway. They'll also be able to provide remittance guidelines and instructions.

Last, ask your Contact at the Company for a name and telephone number of somebody in Accounts Payable. Reach out to them.

It's not that difficult.

But your first stop is with your contact inside the Company, not here on Slashdot.

Comment Re:CALEA (Score 1) 127

Oh agreed. Definitely. In fact I already knew the answer before writing the guy originally. Any telecom provider located in the US *must* be CALEA compliant. However the entire service will give folks a false sense of security and that's the larger point I was trying to make.

Most speech isn't prohibited today, but political winds change all too often and what may be legal today may become illegal tomorrow.

Just hope and wish folks realize that their calls can and WILL be intercepted no matter what Silent Circle may say on the matter, that's all.

Comment CALEA (Score 5, Informative) 127

I wrote to Silent Circle over a week ago when news of the impending launch first started making circles.

SC's COO was kind to respond in an attempt to allay my fears. Sadly though his answer was more "non" than one.

A week ago replied back with a follow-up question, and have yet to receive a response.

While my political activism is pretty much limited to change.org petitions, SC is directly marketing their services TO activists. As the Occupy movement has shown, political activism, and the free-speech that goes along with it, are becoming in jeopardy. My concern, and I feel it's a valid one, is that CALEA will give subscribers a false sense of security. After all when Microsoft purchased Skype, one of the first things they did (they had no choice) was to install CALEA intercepts.

Hopefully somebody at Silent Circle will be able to answer this. Until then, I wouldn't recommend it. Check out The Guardian Project and Jitsi instead.

(Note - I'm only posting this because as Silent Circle's COO, Vic Hyder is authorized to speak on behalf of the Company.)

-----BEGIN EMAIL-----
Mr. Hyder,

Thank you very much for the reply and information you've provided below,
but I'm afraid I'm still unclear on one particular point: /does Silent
Circle fall under /CALEA/jurisdiction or not/?

Kind regards,

George Ellenburg

On 10/11/12 7:43 PM, Vic Hyder wrote:
> *George*,
> Thanks for the note. Quick response - Silent Circle provides peer to
> peer encryption from subscriber to subscriber. The Secure Calling Plan
> offers members a little flexibility to use their Silent Phone number
> to send and receive calls outside the Circle (encrypted to our servers
> but decrypted from servers to non-subscriber). We'll let our members
> determine what their threat model is and how they need to protect
> their transmissions.
> Circle up.
> *______________*
> Vic Hyder
> Chief Operations Officer
> Silent Circle
> Private Encrypted Communications
> Silicon Valley | Washington DC
> w: SilentCircle.com
> This email and any files transmitted with it are confidential and
> intended solely for the use of the individual or entity to whom they
> are addressed. If you received this e-mail in error, please notify the
> sender immediately and destroy and/or delete all copies. Circle up.
> On Oct 11, 2012, at 6:01 AM, George Ellenburg > wrote:
>> Hello-
>> I read with interest news reports yesterday that Silent Circle was
>> getting ready to launch. As an activist and privacy advocate, I was
>> troubled though to read that Silent Circle was planning on offering a
>> Secure Calling Plan amongst other communication services.
>> I understand the obvious revenue stream such an offering will generate,
>> but I'm intrigued as to how you plan to not comply with CALEA, or
>> curious as to how CALEA wouldn't do an end-run around your service
>> altogether? CALEA, as you probably know, is the Communications
>> Assistance for Law Enforcement Act, which requires mandatory technical
>> intercept points for Law Enforcement and Intelligence purposes.
>> Being a United States Company, offering Communication services, located
>> in the United States, your Company is certainly subjected to mandatory
>> CALEA implementations.
>> Thanks for your time. I earnestly look forward to your response.
>> -George Ellenburg
-----END EMAIL-----

Comment Re:Showers (Score 1) 365

Thank you for this. This is precisely what I'm planning on doing myself in a few years when hopefully the housing market can recover even just a little.

Sell everything (house, car, most furnishings, etc.) and buy a used 40' 5th wheel & truck and basically live and work out of it full-time.

Only thing I'm debating is whether to get one with 2 bedrooms (1 for office) or "work" out of the living room.

(And I'm a pretty hardcore geek so power & network access is a must.) :-)

Comment Re:Perspectives (Score 4, Interesting) 782

LOL. We're not injecting anything.

We've got a Microsoft Enterprise PKI.

Our own Root CA, Policy CA, and Issuing CA.

All of the machines that are joined to our domain are company-owned workstations and servers.

The Local & Personal Certificate Stores are controlled through Group Policy.

All of our workstations have our internal root certificate already on the machines, and all of our workstations and servers explicitly trust our root certificate.

Again: Our stuff. Our network. Our data. You have no privacy.

If employees stopped conducting themselves like they thought they had privacy while they were surfing the net while they were at work they wouldn't be so shocked and amazed when they find out they have none.

Comment Re:Perspectives (Score 2) 782

Not saying I disagree with anything you've written, but the courts have stated an employee has an implicit expectation of privacy while reading their blackberry sitting on the toilet.

However, they have none while they're surfing the net.

There is a distinct difference than an employer installing a video camera in the bathrooms than installing technical controls to fulfill their fiduciary and regulatory responsibilities to protect their trade secrets and other company data.

Slashdot Top Deals

Remember: use logout to logout.