Become a fan of Slashdot on Facebook


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment If it's available for them to do so.... (Score 1) 136

If the information is available to the cloud provider to do so, then they should.... however... the cloud customer should be encrypting the data in a fashion where the cloud provider has no access, so the cloud provider then just hands over a big lump of encrypted data... then they are not in violation of anything, and are not "interfering with an investigation" etc.., but they also haven't compromised their customer's security... because they aren't capable.

Comment Not impressed (Score 1) 102

Amassing such a huge fortune based on absolutely shite products but excellent marketing isn't impressive. If he wants to impress me, he needs to give away about 77.9 billion of that, funding things like the elimination of daesh/isis/isil, al-queda & boko haram, making an excellent education free and safe across the entire surface of the earth, ensuring no-one goes hungry, and getting things like an amendment to the constitution to reverse the Citizens United decision. When he reduces his wealth so that he here merely has enough for he and his family to live comfortably on for the next 7 generations, MAYBE I'll stop considering him a worthless piece of shit.

Comment Sounds like a job for..... (Score 4, Insightful) 191

I think the closest thing you'll get to "out of the box" for what you're looking for is Apache Cloudstack running on Citrix XenServer for a hypervisor. With basic networking, you can keep things pretty simple. With advanced networking, you can allow your users to build virtual data centres. It can be 100% free open-source software as well, although if you get Citrix CloudPlatform, you get a couple of extra features, and support, but you pay for the support. You could be something similar with other products, but CloudStack actually has a pretty amazing amount of stuff that is just there already, and doesn't need configuring.

Comment CEPH/RADOS/RBD (Score 2) 165

You could use CEPH to do the distribution, then RADOS to create an RBD (Rados Block Device) and when you mount the RBD as asn iSCSI device, you could then build a cryptfs device on top of it, so the provider of the RBD couldn't read/write the data without the keys stored on your server (or wherever you keep them.) The difficulty is getting something like this that is product-ized, so that a provider can give enough economy-of-scale to make it really worthwhile.

Comment Thing one... (Score 1) 507

listen to his concerns, and explain why they aren't valid, or take them on-board if they are. He's trying to make his mark on the team, and assert his position, and may want to be the "alpha" of the group. It might not hurt to remind him he's a junior memeber of the team, but doing so without belittling him could be difficult. You could also just tell him you inherited a lousy code base from previous developers or something like that.

Slashdot Top Deals

If at first you don't succeed, you must be a programmer.