Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Idle

The Great Office War 11

You may be thankful that twenty years from now when you are sitting by the fireplace with your grandson on your knee and he asks you what you did in the great Office War, you won't have to cough, shift him to the other knee and say, "Well, your Granddaddy sent a fax in the copy room."
Science

Huge Reservoir Discovered Beneath Asia 273

anthemaniac writes "Seismic observations reveal a huge reservoir of water in Earth's mantle beneath Asia. It's actually rock saturated with water, but it's an ocean's worth of water ... as much as is in the whole Arctic Ocean. How did it get there? A slab of water-laden crust sank, and the water evaporated out when it was heated, and then it was trapped, the thinking goes. The discovery fits neatly with the region's heavy seismic activity and fits neatly with the idea that the planet's moving crustal plates are lubricated with water."
The Courts

Submission + - I violated copyright law. Now what?

An anonymous reader writes: I am US-based and have recently been doing part-time subcontracting work for a friend in the UK who runs her own small marketing firm. She sells a complete branding/identity plan and if that includes a web site refresh, she calls me. The clients do not know who or where I am, or even that the work is being subbed. Like many designers, I often use Corbis and other photo merchants to mock up layouts for review. It is legal to download images ("comps") from Corbis to use offline for the this purpose. If the client likes the design/images, I get a quote from the photo vendor and the client has the option to purchase. If the price is too high, which it often is with Corbis, I turn to less expensive or free alternatives.

One of her clients, for whom I recently designed a site, just received a $25,000 invoice from a law firm in London representing Corbis, who claimed their content was on the client's site. The client of course was frantic when they received the bill and called my marketing friend, who called me. I investigated and sure enough, there were images on the site that were rightfully the property of Corbis, which I put there. In this instance I neglected to swap out the comps with legal images I purchased for the client from another online source before I made the site live. As a designer I respect content rights and did not, would not, maliciuosly steal images. The client and my friend had no idea.

I moved quickly to correct the situation — scrubbed the site and looked through other clients' sites to make sure nothing else had gotten through. I called Corbis and told their legal department what happened and they told me I would have to deal with the law firm, who handles "all our overseas affairs." I then sent a certified letter to the law firm telling them what happened in an attempt to exonerate the client, and by default, my friend. That was today.

I quoted the images in question on the Corbis site and the total would have been about $800. I did my due-googling and in the spectrum of copyright infringement, I want to believe I'm closer to the speeder than I am the serial-killer. Other photo houses (Getty) send out cease and desist letter and it's done. There is mention of similar situations on some forums, especially in the UK, but I can't seem to find any precedent as to what my fate might be. Does anyone have any idea? I made about $1,000 for the site about a year ago, and as much as it would pain me, would be willing to give that up to make this go away. But something tells me this is going to get ugly.
Businesses

Is Network Engineering a Viable Career? 229

An anonymous reader asks: "I'm fresh out of high school and interested in getting a job in networking. One option is a degree in networking, the alternative I've considered is just getting certificates (CCNA/P, A+, MCSA). A large factor in my decision is which route is most likely to land a secure and well-paid full time job. I'm located in Melbourne, Australia and I don't have any local contacts in the industry who can advise me, and so was hoping some other Australian (or international) readers could share their knowledge and experience with these issues."
Security

A Myspace Lockdown - Is It Possible? 180

Raxxon asks: "We (my business partner and I) were asked by a local company to help 'tighten up' their security. After looking at a few things we ran some options by the owner and he asked that we attempt to block access to MySpace. He cited reasons of wasted work time as well as some of the nightmare stories about spyware/viruses/etc. Work began and the more I dig into the subject the worse things look. You can block the 19 or 20 Class C Address Blocks that MySpace has, but then you get into problems of sites like "MySpace Bypass" and other such sites that allow you to bypass most of the filtering that's done. Other than becoming rather invasive (like installing Squid with customized screening setups) is there a way to effectively block MySpace from being accessed at a business? What about at home for those who would like to keep their kids off of it? If a dedicated web cache/proxy system is needed how do you prevent things like SSL enabled Proxy sites (denying MySpace but allowing any potentially 'legal' aspects)? In the end is it worth it compared to just adopting an Acceptable Use Policy that states that going to MySpace can lead to eventual dismissal from your job?"
Linux Business

Submission + - Samba Success in the Enterprise?

gunnk writes: "We've deployed a Samba server here to replace some aging Novell Netware boxes. It works great: fast, secure, stable. However, we have one VIP that feels that Samba is "amateur" software and that we should be buying Windows servers. I've been searching with little success for large Samba deployments in enterprise environments. Anyone out there care to share stories of places that are happily running large Samba installations for their file servers? Or not so happy, for that matter — better to be informed!"
Security

Benefits of Vista's User Access Control? 118

Abtin Forouzandeh asks: "Having used Vista for a few months, something keeps nagging me about the user account control. For the UAC to be useful, the user needs to have a fair amount of knowledge about: what the UAC is; what application it is blocking; the consequences of blocking the action; and an alternate approach if the blocked action did something useful. Anyone who has ever worked with end-users can tell you that they are generally disinterested in learning anything about computer usage beyond how to use word and make a spreadsheet. Frankly, even as a highly technical user, I nearly always approve the UAC dialog, even if I don't know the consequences. Since users lack knowledge, and Vista keeps asking esoteric/ambiguous questions, then users will always approve UAC dialogs. Since the UAC so clearly fails in its goal of making computing more secure, and substantially increases complexity, why is it common wisdom that turning off UAC is 'not recommended'? For 99% of users, is there any true downside? Has the community come up with ways to make UAC useful?"
Be

Haiku Tech Talk at Google a Success 127

mikesum writes "February 13 was Haiku's big day at Google, and we can say with a good degree of confidence that the Haiku Tech Talk was quite successful. We had a very special guest for this event: former Be Inc. CEO Jean Louis Gassée, who not only joined us at Google for our presentation, but also gave a few words of support and encouragement for our project. It was great to have JLG's presence, as well as that of the several ex-Be engineers who showed up for the talk. We were also glad to see Java for BeOS developer Andrew Bachman join us for this special event. Have a look at the pictures taken during the presentation, as well as the video of the event."

Slashdot Top Deals

RADIO SHACK LEVEL II BASIC READY >_

Working...