×
Businesses

Ask Slashdot: Good Metrics For a Small IT Team? 315

First time accepted submitter shibbyj writes "I'm a member of a small 3 person IT team for a medium sized business (approximately 300-350 employees) that has multiple locations internationally. I have been tasked with logging our performance using the statistics from our ticket management system. I've also been tasked with comparing these stats and determining if we are performing above or below what is considered optimal. I'm wondering what people opinions are on what good metrics should be in regards to mttr mtbf etc. I have had trouble finding information on this."
Encryption

Running Tor On Your TV 80

jaromil writes "TorTV is an early effort to embed Tor in household computing: run it on your TV at home. So far only WDTV installed with the homebrew WDLXTV firmware is supported. What other platforms do you think are viable for it?"
Internet Explorer

Microsoft Upgrading Windows Users To Latest Version of MSIE 476

helix2301 writes "Microsoft will be upgrading all Windows XP, Vista and 7 users to the latest IE silently. They are doing this because they have found a large number of non-patched systems. Microsoft pointed out that Chrome and Firefox do this regularly. They will start with Australia and Brazil in January, then go world-wide after they have assured there are no issues."
Democrats

Meet the Strange Bedfellows Who Could Stop SOPA 231

jfruhlinger writes "In a political environment that's become very strongly defined by partisan lines, the SOPA debate has offered an unexpected ray of hope: the two main Congressional opponents of the bill are Ron Wyden, an Oregon Senator deemed a 'hardcore liberal' and Darrell Issa, a California Representative who is one of the Obama Administration's fiercest critics. (There are both Ds and Rs in favor of the bill, too.)" (Read more below.)
China

Hotel ISP iBahn Denies Breach By Chinese Hackers 30

alphadogg writes "iBahn, a provider of internet services to some 3,000 hotels worldwide, denied on Thursday a news report that its network was breached by hackers. Bloomberg wrote that a highly skilled group of hackers based in China, which U.S. investigators have called 'Byzantine Foothold,' attacked iBahn, citing unnamed sources, including one U.S intelligence official. In a written statement, iBahn said it was aware of the allegations in the news report but it had 'not found proof of any breach on the iBahn network.'"
Oracle

Oracle Sued For 'Extortion, Lies' By Montclair State University 359

angry tapir writes "Montclair State University is suing Oracle in connection with a troubled ERP (enterprise resource planning) project. Montclair's complaint, filed Tuesday in U.S. District Court for the District of New Jersey, states that Oracle made an array of 'intentionally false statements' regarding the functionality of its base ERP system, the amount of customization that would be required, and the amount of 'time, resources, and personnel that the University would have to devote.' 'Ultimately, after missing a critical go-live deadline for the University's finance system, Oracle sought to extort millions of dollars from the University by advising the University that it would not complete the implementation of the ... project unless the University agreed to pay millions of dollars more than the fixed fee the University and Oracle had previously agreed to,' it adds."
IT

The Four Fallacies of IT Metrics 223

snydeq writes "Advice Line's Bob Lewis discusses an all-too-familiar IT mistake: the use of incidents resolved per analyst per week as a metric for assessing help-desk performance. 'If you managed the help desk in question or worked on it as an analyst, would you resist the temptation to ask every friend you had in the business to call in on a regular basis with easy-to-fix problems? Maybe you would. I'm guessing that if you resisted the temptation, not only would you be the exception, but you'd be the exception most likely to be included in the next round of layoffs,' Lewis writes. 'The fact of the matter is it's a lot easier to get metrics wrong than right, and the damage done from getting them wrong usually exceeds the potential benefit from getting them right.' In other words, when it comes to IT metrics, you get what you measure — that's the risk you take."
Crime

Feds Arrest GeneSimmons.Com Attacker 180

gManZboy writes "Federal authorities have arrested an alleged member of Anonymous in connection with an "Operation Payback" attack against the website of Kiss bassist Gene Simmons. The charges stem from a distributed denial-of-service (DDoS) attack against Simmons' website over a five-day period in 2010. Simmons apparently drew the ire of the Anonymous set after he lambasted their peer-to-peer (P2P) downloading proclivities during a 2010 MIPCOM entertainment content media conference panel discussion, where he lamented the failure of the music industry 'to sue every fresh-faced, freckle-faced college kid who downloaded material.'"
China

The Undeclared "Cyber Cold War" With China 260

First time accepted submitter lacaprup writes "Chinese-based hacking of 760 different corporations reflects a growing, undeclared cyber war. From giants like Intel and Google to unknowns like iBahn, the Chinese hackers are accused of stealing everything isn't nailed down. Simply put, it is easier and cheaper to steal rather than develop the legal way. China has consistently denied it has any responsibility for hacking that originated from servers on its soil, but — based on what is known of attacks from China, Russia and other countries — a declassified estimate of the value of the blueprints, chemical formulas and other material stolen from U.S. corporate computers in the last year reached almost $500 billion"
KDE

KDE Releases Plasma Active Two 49

jrepin writes with a snippet from the release announcement of Plasma Active Two: "Mobile devices that adapt to who you are, reflecting what you are doing when you are doing it. This concept is at the heart of the Plasma Active user experience. Plasma Active One was released in October 2011, providing early adopters the first opportunity to experience Activities on a tablet. Since then, the design and development team behind this open source touch interface has been hard at work on an update. ... information about real-world usage enabled the team to improve the end-user experience significantly over the past two months."
Bug

Ask Slashdot: How To Get Non-Developers To Send Meaningful Bug Reports? 360

DemonGenius writes "I'm in the midst of a major rollout of one of our primary internal applications at work and we have a beta version available for all the staff to use. The problem here is most of the staff don't know how to send reports meaningful enough to get us devs started on solving their problems without constant back and forth correspondence that wastes both developer time and theirs. Some common examples are: screenshots of the YSOD that don't include the page URL, scaled screenshots that are unreadable, the complaint that wants to be a bug report but is still just a complaint, etc. From the user's perspective, they just send an email, but that email registers in our tracking system. Any thoughts on how to get the non-devs sending us descriptive and/or meaningful reports? Does anyone here have an efficient and user-friendly bug tracking system/policy/standard at their workplace? How does it work?"
Android

Carrier IQ Responds To FBI Drama, EFF Wants More Information 140

New submitter realized writes "Yesterday Carrier IQ released a report (PDF) which tries to answer some questions about how their system operates. Also, after reports of the FBI using Carrier IQ data, the company responded by saying, 'Carrier IQ has never provided any data to the FBI. If approached by a law enforcement agency, we would refer them to the network operators.' Additionally, the EFF just released a report which says they believe keystroke data 'is in fact being inadvertently transmitted to some third parties,' but they would like to study carrier profiles to verify information." Reader Trailrunner7 adds that Carrier IQ's report indicates "under some limited circumstances its software will log the contents of SMS messages sent to a user's phone, but that that the contents of those messages would not be human readable. Instead, they would be in an encoded form that could not be decoded without special software and the carriers don't have access to the contents of the messages either. The company said it has worked on a fix for the bug, which affected devices running the embedded version of the Carrier IQ agent."
The Military

Ask Slashdot: Working As an IT Contractor In a War Zone? 352

Capt. Picklepants writes "I have been feeling malaise about the IT and technical job market in the United States. I'm interested in doing some IT work for our government in Iraq, Afghanistan, and Africa. I've heard it pays very well. Got any advice, or pointers, aside from the usual combing corporate websites and social networking?"
IT

In Favor of Homegrown IT Solutions 265

snydeq writes "Today's IT organizations turn too readily to vendors, eschewing homegrown solutions to their detriment, writes Deep End's Paul Venezia. 'Back when IT was "simple," several good programmers and support staff could run the whole show. Nowadays, [companies] buy hefty support contracts and shift the burden of maintaining and troubleshooting large parts of their IT infrastructure on to the vendors who may know their own product well, but have a hard time dealing with issues that may crop up during integration with other vendors' gear. ... Relying solely on support contracts and generic solutions is a good way to self-limit the agility and performance of any business. In short, more gurus equals less hand-wringing and stress all around.'"
Businesses

Many Early Adopters of the Amazon Fire Are Unhappy 463

Hugh Pickens writes "The NY Times reports that the Kindle Fire, Amazon's heavily promoted tablet, is less than a blazing success, with many of its early users packing the device up and firing it back to the retailer. A few of their many complaints: there is no external volume control. The off switch is easy to hit by accident. Web pages take a long time to load. There is no privacy on the device; a spouse or child who picks it up will instantly know everything you have been doing and the touch screen is frequently hesitant and sometimes downright balky. Amazon's response was: 'In less than two weeks, we're rolling out an over-the-air update to Kindle Fire.' The only problem with that is many of the complaints are hardware related and no amount of software can fix one of the early blunders: 'The fire is shipped in a box that advertised on the outside of the box exactly what it is. "Hello, you, thief, please come steal me!"' wrote one would-be customer who, as you might guess, had her Fire stolen and was left with the box. This was supposed to be an iPad killer, with its much lower price point, but Apple is tough to beat because most of its mistakes are software-based."
Google

Google Deploys IPv6 For Internal Network 260

itwbennett writes "Google is four years into a project to roll out IPv6 to its entire internal employee network. At the Usenix Large Installation System Administration (LISA) conference in Boston last week, Google network engineer Irena Nikolova shared some lessons others can learn from Google's experience. For example: It requires a lot of work with vendors to get them to fix buggy and still-unfinished code. 'We should not expect something to work just because it is declared supported,' the paper accompanying the presentation concluded."
Security

Was Russia Behind Stuxnet? 281

An anonymous reader writes "Despite the U.S. and Israel being widely assumed to be responsible for Stuxnet, Russia is the more likely culprit, says U.S. Air Force cyber analyst. The nuclear gangsterism of the past 20 years gives it plenty of motive. Quoting: 'So what better way to maintain Russian interests, and innocence, than to plant a worm with digital U.S.-Israeli fingerprints? After all, Russian scientists and engineers are familiar with the cascading centrifuges whose numbers and configuration – and Siemen’s SCADA PLC controller schematics – they have full access to by virtue of designing the plants. ... the observers of the virus could alert the Iranians before full nuclear catastrophe struck. The Belarusian computer security experts who 'discovered' the code seemingly played that role well. They didn't seem too preoccupied with reverse engineering the malicious code to see what it was designed to do.'"
Medicine

Computer Virus Forces Hospital To Divert Ambulances 213

McGruber writes "The Atlanta Journal Constitution newspaper is reporting that a hospital with campuses in Lawrenceville and Duluth, Georgia turned ambulances away after the discovery of 'a system-wide computer virus that slowed patient registration and other operations.' They're only currently accepting patients with 'dire emergencies.' A spokeswoman for the hospital said the diversion happened because 'it's a trauma center and needs to be able to respond rapidly.' The situation began on Thursday afternoon and is expected to last through the weekend."
Google

Google-Funded Study Knocks Firefox Security 225

Sparrowvsrevolution writes "Researchers at the security firm Accuvant released a study Friday that gauges the security features of the top three web browsers. Accuvant admits the study was funded by Google, and naturally, Chrome came out on top. More surprising is that Internet Explorer was rated nearly as secure as Chrome, while Firefox is described as lacking many modern security safeguards. Though the study seems to have been performed objectively, it won't help Google's fraying partnership with Mozilla." The full research document is available here (PDF), and it goes into much greater detail than the Forbes article. Accuvant also published the tools and data they used in the study, which should help to evaluate their objectivity.
Censorship

Malaysia Mulls Compulsory Registration of Tech Workers 187

Viceice writes "Hot on the heels of recently passed legislation further restricting Freedom of Assembly, the National Front-led Malaysian Government is now working to make the registration of all tech workers mandatory, making it an offence punishable by a stiff fine and jail for anyone to plan, deploy, service and maintain any computing system without a license. A leaked draft of the legislation has ignited a backlash among the IT community, which fear the law, when passed, will be devastating to the tech industry in Malaysia."

Slashdot Top Deals