Control of Cybersecurity Becomes Divisive Issue

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Complex Event Processing RSS News Control of Cybersecurity Becomes Divisive Issue
# 1  
Old 04-21-2009
Control of Cybersecurity Becomes Divisive Issue

by JAMES RISEN and ERIC LICHTBLAU New York Times The National Security Agency has been campaigning to lead the government's rapidly growing cybersecurity programs, raising privacy and civil liberties concerns among some officials who fear that the move could give the spy agency too much control over government computer networks. The Obama administration is expected to complete [...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

if elif control issue

The below script is been ran on MYSQL database.... but control is not reaching to MYSQL elif block :wall: The complete code is: #!/usr/bin/ksh MR=eml_msp131233 start=`date +%s%N` echo "***Clean-up for Static Tables removal***" | tee /tmp/$MR.log set -A mname1... (9 Replies)
Discussion started by: ambarginni
9 Replies

2. SuSE

Installin Suse 11 - Mouse issue using Remote Control

hi guys I want to exhaust all the possibilities so I'm going to ask this here I am installing a Suse 11 on IBM Blade Center using Remote Control. when using this is impossible to use the mouse I see the mouse but I have no control over it I try to move it but no way it moves to fast s no... (3 Replies)
Discussion started by: kopper
3 Replies

3. UNIX for Dummies Questions & Answers

Odd Control Character issue ^A

Sorry to bug you, but my sed is failing me, I have a file auto generated from abinitio, it has a string of chars ending with a line break, and then it has added a ^A character, I can remove this is vi by using the following %s/^A//g (where ^A is ctrl v and control A), however when I try to sed... (1 Reply)
Discussion started by: badg3r
1 Replies
Login or Register to Ask a Question
slurmdbd(8)							 Slurm components						       slurmdbd(8)

NAME
slurmdbd - Slurm Database Daemon. SYNOPSIS
slurmdbd [OPTIONS...] DESCRIPTION
slurmdbd provides a secure enterprise-wide interface to a database for Slurm. This is particularly useful for archiving accounting records. OPTIONS -D Debug mode. Execute slurmdbd in the foreground with logging to stdout. -h Help; print a brief summary of command options. -n <value> Set the daemon's nice value to the specified value, typically a negative number. -v Verbose operation. Multiple -v's increase verbosity. -V Print version information and exit. NOTES
It may be useful to experiment with different slurmctld specific configuration parameters using a distinct configuration file (e.g. time- outs). However, this special configuration file will not be used by the slurmd daemon or the Slurm programs, unless you specifically tell each of them to use it. If you desire changing communication ports, the location of the temporary file system, or other parameters used by other Slurm components, change the common configuration file, slurm.conf. COPYING
Copyright (C) 2008 Lawrence Livermore National Security. Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER). CODE-OCEC-09-009. All rights reserved. This file is part of SLURM, a resource management program. For details, see <http://www.schedmd.com/slurmdocs/>. SLURM is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. SLURM is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. SEE ALSO
slurm.conf(5), slurmdbd.conf(5), slurmctld(8) slurmdbd 2.2 March 2010 slurmdbd(8)