Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Security

IT Departments Fear Growing Expertise of Users 499

flatfilsoc recommends a long article in CIO magazine on users who know too much and the IT leaders who fear them. Dubbing the universe of consumer technology the "shadow IT department," the article highlights the extent to which the boundary between users' workplace and home have broken down. It notes the increasing clash — familiar to anyone who works in a company with an IT department — between users' home-grown productivity boosters and IT's mandate to protect corporate data. The inherent tendency of the IT department to want to crack down and control technology that it doesn't supply should be resisted at all costs, according to CIO. The article outlines strategies for co-existence. It just might persuade some desperate CIO somewhere not to embark on a career-limiting path of decreeing against gmail and IM.
User Journal

Journal Journal: Drug patents threatening cheap drugs

This was a story I tried to submit but was rejected by Slashdot's editorial staff. Not grousing, saving my composition here for posterity, as I do with other of my rejected stories.
Music

iTunes Uncovers Musical Hoax 311

holy_calamity writes "The reliance by iTunes on the CDDB has burst open a musical fraud in the usually staid world of classical piano. Albums by the much vaunted British pianist Joyce Hatto, who died in June 2006, are identified by the iTunes player as belonging to other performers. A more scientific analysis by an audio remastering firm has found that none of Hatto's works appear to be hers. Her husband, who produced all her albums, says he 'cannot explain' the similarities."
Windows

Submission + - Vista's RAM sweet spot: 4GB

jcatcw writes: David Short, an IBM consultant who works in the Global Services Divison and has been beta testing Vista for two years, says users should consider 4GB of RAM if they really want optimum Vista performance. With Vista's minimum requirement of 512MB of RAM, Vista will deliver performance that's 'sub-XP,' he says. (Dell and others recommend 2GB.) One reason: SuperFetch, which fetches applications and data, and feeds them into RAM to make them accessible more quickly. With more RAM, there's more caching.
Microsoft

Longhorn Server Will Stress Virtualization 101

Rob writes in with an article from CBROnline based on an interview with Microsoft's UK server director. He says the timing of the release of the next version of Microsoft's server OS, dubbed Longhorn, depends on the company getting virtualization ready to go. Microsoft has apparently decided to embed its hypervisor technology into Windows, an OS-centric approach to virtualization shared by XenSource Inc., its open-source rival and partner. This contrasts with the model of virtualizing the hardware layer being pursued by VMWare. The Microsoft spokesman is coy about a release date for Longhorn, saying it could be earlier or it could be later (but it should be in 2007).
Privacy

Submission + - Scientist make quantum encryption breakthrough

Madas writes: "Scientists working in Cambridge, England have managed to make quantum encryption completely secure by putting decoy pulses in the key transmission stream. According to the story this paves the way for safe, encrypted high-speed data links. Could this allow completely private transmission of data away from snooping eyes and ears? Or will it mean film studios can stop movies from being copied when travelling on the internet?"
Software

Submission + - Lightroom vs. Aperture

Nonu writes: Adobe has officially released its Aperture killer, Lightroom, and the reviews are starting to pop up. Ars looks at Lightroom and concludes that it's a better choice for those without bleeding-edge hardware. 'Aperture's main drawback is still performance as it was designed for bleeding edge machines. On a quad Core 2 Duo Xeon, it is very usable but Lightroom just feels faster for everything regardless of hardware. Since Aperture relies on Core Image and a fast video card to do its adjustments (RAW decoding is done by the CPU), it's limited to what the single 3-D card can do. Lightroom does everything with the CPU and so it is likely to gain more speed as multicore systems get faster.'
Security

Who Pays For Credit Card Breaches? 313

PetManimal writes "A scheme to steal customers' credit and debit card information at a New England supermarket chain highlights a little-understood fact about credit card security: Customers still think that the credit-card companies have to eat fraudulent charges, but since the PCI DSS standards were adopted, it's actually the merchant banks and merchants who have to pay up. And, according to the blogger writing in the latter article, it's a good thing." "The main reason PCI exists is that there are tens of thousands of merchants who don't understand the basics of information security and weren't even taking the very minimum steps to secure their networks and the credit card information they stored... PCI pushes that burden downstream and forces merchants to... put in a properly configured firewall, encrypt sensitive information and maintain a minimum security stance or be fined by their merchant banks... [T]he credit card companies have taken the bulk of the financial burden off of themselves and placed it on the merchants, which is where much of it belongs...'"

Slashdot Top Deals

Our informal mission is to improve the love life of operators worldwide. -- Peter Behrendt, president of Exabyte

Working...