Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Doesn't anyone read the classics? (Score 1) 240

http://docs.oracle.com/cd/E19957-01/806-3568/ncg_goldberg.html "What Every Computer Scientist Should Know About Floating-Point Arithmetic", by David Goldberg, published in the March, 1991 issue of Computing Surveys

I don't know why anyone thought this was surprising (it would have been surprising if they didn't get different results, given that some use GPUs, some don't, etc.). What does tend to get "amusing" is that even with the same processor folks get different results (sometimes due to software issues, chip rev issues, or actual hardware bugs that go undetected ... but are minor enough to remain so unless someone gets really careful and whips out the old logic analyzer).

Comment Contact your site/organizations Security Officer (Score 2) 274

To get a ruling on whether you may do what you want. Otherwise, as others have noted, you may be very deep waters (not only will you be in violation, but anyone in the organization using the service will be, and you will have induced them to do it. Think serious civil as well as criminal consequences).

From a technology angle, it may be "possible" if the folks in charge sign off.

"All" you need to do is encrypt the data before it goes offsite, encrypt it well enough that the data is protected commensurate with its value, etc.

For commercial users, https://jungledisk.com/ provides a very usable interface and GUI. Of course, if the client isn't trustworthy (and you have to take their word for it ;>) that goes out the window even if the algorithms are secure themselves ;>

I use it for some SOHO confidential data; it wouldn't be the end of the world if the data were disclosed, but we have committed to make good faith effort(s) to keep it secure, so we do (rather than moving files to subs via email, etc.). Not all subcontractors could handle sftp and friends.

Comment Perhaps we are missing the point (Score 1) 331

Yes, as many have noted.... client organization unhappiness and excess spend are objective metrics which call into question what's going on.

But ... dig deeper.... are the client organizations behaving rationally or are they constantly asking for change after change? Obviously the organization is dysfunctional ... but is it the IT director, the entire IT department or the organization as a whole?

If it IS the IT director... I imagine the issue he's(or she) has been there for a long time; HR will want "proof" that replacing them isn't age discrimination or any such thing. If the client organizations are healthy and have reasonable expectations and your impression of the "line worker" IT folks is good, perhaps you need to have a heart to heart with the IT director. If he is "parroting" what his staff tell him, he's made some poor hires. He may even understand that, but lack clues as to how to hire better. See if they are rational, and self-aware enough to recognize their limitations and work with he/she/it to hire someone to be the "technical honcho" ... chances are the IT director wouldn't have gotten the job and kept it so long if they didn't have good relationships with the executive staff. That DOES have value. Leverage it, and help them improve ... if they are capable of it.

Just sacking someone is seldom enough; they will have built up an empire of mixed wood (some dead, some living, some actually thriving) and you need to help them prune and fertilize ... not just toss the whole tree away (unless, of course, their entire IT department really could be replaced with SaaS and IaaS and have done with it).

The details of the organization and people matter.

As earlier posters noted, if this is all news to you, you might not be the right consultant.

Comment Civics teacher failed you (Score 1) 768

By not getting through to you ;>

As Blackstone put it, and our Founding "Fathers" enshrined into actionable text, "It is better that ten guilty persons escape than that one innocent suffer". The entire US legal system is based on this notion. It is hard for the State to prove Guilt (beyond a reasonable doubt, hands tied in various ways, etc.). Yes, you could have probably developed a vast complex of rules that could exist without the 5th amendment and still accomplish its ends, but unlike the legislature of today, back then they sought brevity and relative simplicity of rules.

Even with all the rules stacked in favor of the defendant, innocents get convicted.

Imagine that there was not 5th amendment, then the likelihood of government focus on getting "lie detectors" ruled legitimate in court. Since all they actually measure is stress, they'd pepper the suspect with questions and convict of things they were nervous about (objective evidence no longer required). Just one of many probable outcomes of removing this protection.

Comment Most departments teach the wrong math (Score 1) 656

That your gripe is with differential equations suggests that your department is just using the Math courses as a screening process (eliminate the chaff). Statistics (parametric and non-parametric), linear algebra, number theory, numerical methods ... these all have direct application to real world problems folks face in applying computers to business or engineering problems.

Number theory is the basis for cryptosystems. You probably won't be developing your own, but understanding a bit of why they work (or don't) is an example of how advanced mathematics impacts our day to day life in CS applications.

Even if you don't become a "data scientist" understanding statistics (correct and incorrect usage) are key to performance analysis, system tuning, etc.

Numerical methods help one appreciate entire classes of errors which computers make by design; not critical for an OS developer (no fp in kernels) but someday, somehow you may find yourself dealing with floating point computations ... learning about the fine points (see, for example, the Goldberg paper "What Every Computer Scientist Should Know about Floating Point Arithmetic" http://docs.oracle.com/cd/E19957-01/806-3568/ncg_goldberg.html).

The list goes on. But differential equations really shouldn't be part of it. Pity that few CS departments work closely with Math departments to craft courses where the subject matter not only matters, but the linkage is made explicit.

Submission + - (stop) the attack of the Killer Robots! (smh.com.au) 1

khb writes: It seems that the UN has started a debate on whether to place limits or bans on robots that can kill without manual supervision. It seems that bombs are viewed as "kinder" than robots which might be programmed to achieve specific ends (e.g. destroy that bridge, kill anyone carrying a gun, etc.).

Comment Have any of the people griping USED COBOL? (Score 4, Insightful) 256

The 2002 version of the standard added object features. While not my first choice of languages, it is typically not cheaper nor safer to rewrite large amounts of working tested code. Yes, you might do better with a clean sheet of paper and a decade or so, but most IT organizations don't have that luxury.

My favorite COBOL nerdy feature died many versions of the Standard ago (MOVE CORRESPONDING). It was my favorite not because it was a terrific feature, but it was just so unique to COBOL.

Cloud computing is, as a business model, a return to mainframe timesharing services such as dominated in the original COBOL and PL/I eras. It really is not a stretch to see IBM update their zSeries environment to easily enable leveraging the COBOL code base.

Yes, you can (and more cheaply per IBM MIP) run Linux on your zSeries hardware, so you can mix and match (write new applications, or layers in newer environments) ... but there is no need to toss out dull boring functional code that just happens to be business critical.

No doubt the sufficiently intrepid IT staffer could rewrite all the COBOL in Haskell or Perl .. (or for extra credit in REXX) but would it really be an improvement? Indeed, just validating that the new code is logically equivalent to the original code for ALL input sets would be a huge investment ... never underestimate the cost (or importance) of Test and Validation.

Comment Psychologists vs Psychiatrists (Score 1) 329

The folks without MDs and who can't prescribe drugs are asserting that those who are, can and do are wrong and they (the nonMDs) should lead.

They might be right but it would seem to be pretty much a non-story.

Psychologists understandably have *always* held such positions. Either because that's what *their* training says or because its their economic advantage to believe so (or fundamental bias ... If they didn't feel that way they'd have trained in the other camp.

Science

Submission + - Roadkill Forcing Cliff Swallows to Evolve (sciencemag.org)

sciencehabit writes: Cliff swallows that build nests that dangle precariously from highway overpasses have a lower chance of becoming roadkill than in years past thanks to a shorter wingspan that lets them dodge oncoming traffic. That's the conclusion of a new study based on 3 decades of data collected on one population of the birds. The results suggest that shorter wingspan has been selected for over this time period because of the evolutionary pressure put on the population by cars.
Java

Submission + - Java Code, Details Released for Potential Sandbox Bypass Issue (threatpost.com)

msm1267 writes: Additional details and code demonstrating a possible security vulnerability in Java were released this morning by a Polish security research company, bringing to a head a three-week long debate between the researcher and Oracle over whether the issue is indeed a vulnerability or an allowed behavior in Java.
Adam Gowdiak of Security Explorations has been back and forth with Oracle since Feb. 25 over the lack of a security check in a certain Java operation that when combined with another vulnerability discovered by the firm can result in a complete Java sandbox bypass.
Oracle has refused to confirm the issue is a security vulnerability and told Gowdiak that it continues to investigate. A request for comment from Oracle was not returned by the time of publication. Gowdiak said he sent Oracle detailed information on Feb. 25 about two vulnerabilities he calls Issue 54 and 55, along with source and binaries for proof of concept code. Oracle confirmed Issue 55 as a vulnerability, but said 54 is an “allowed behavior.”

Intel

Submission + - Next-generation Intel Haswell Benchmarked (tomshardware.com)

An anonymous reader writes: Tom's Hardware has published a lengthy article and a set of benchmarks on the new "Haswell" CPUs from Intel. It's just a performance preview, but it isn't just more of the same. While it's got the expected 10-15% faster for the same clock speed for integer applications, floating point applications are almost twice as a fast which might be important for digital imaging applications and scientific computing.

Submission + - Keeping science up with the massive supplement market (acs.org)

carmendrahl writes: "Consumers who see “natural” products as safer than pharmaceuticals drove herbal and botanical supplement sales to $5.3 billion in 2011, up $1 billion in a decade. But botanicals are usually complex blends, which presents different challenges than pharmaceuticals. Some suppliers are now carefully controlling plant growth to ensure a consistent product and consistent study results. (Soil, light, pesticide use all can matter). Others are honing analysis techniques to better understand blends and ferret out intentionally doctored batches."
Cellphones

Submission + - We Should Be Allowed to Unlock Everything We Own (wired.com)

An anonymous reader writes: When cell phone unlocking became illegal last month, it set off a firestorm of debate over what rights people should have for phones they have legally purchased. But this is really just one facet of a much larger problem with property rights in general. 'Silicon permeates and powers almost everything we own. This is a property rights issue, and current copyright law gets it backwards, turning regular people — like students, researchers, and small business owners — into criminals. Fortune 500 telecom manufacturer Avaya, for example, is known for suing service companies, accusing them of violating copyright for simply using a password to log in to their phone systems. That’s right: typing in a password is considered "reproducing copyrighted material." Manufacturers have systematically used copyright in this manner over the past 20 years to limit our access to information. Technology has moved too fast for copyright laws to keep pace, so corporations have been exploiting the lag to create information monopolies at our expense and for their profit. After years of extensions and so-called improvements, copyright has turned Mickey Mouse into a monster who can never die.' We need to win the fight for unlocking phones, and then keep pushing until we actually own the objects we own again.

Comment Re:Then Leave (Score 1) 209

Right, so Microsoft should embargo France.....wait ... that would be a Bad Thing? Perhaps they should carpet bomb Paris with free Windows 8 DVD's ... that would teach the French government to toy with Microsoft and it's minions....

Slashdot Top Deals

I think there's a world market for about five computers. -- attr. Thomas J. Watson (Chairman of the Board, IBM), 1943

Working...