Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Not worth it (Score 2) 161

At first I wanted to write off your post as just typical, cynical slashdotterism. But I re-read it and - well, I realize that you are probably right, particularly in the IT field (it could be argued that if you want to work in academia, school names _do_ matter).

Reading your post carefully, I see you aren't saying that "college is worthless, blah blah blah" but rather that the differences between the universities for undergrad ain't what they used to be. As another commenter here noted (paraphrasing) information has been liberated by the Internet so University isn't the only way to attain subject matter knowledge anymore, closing the gaps between schools.

However, I continue to believe that if a person goes through 4+ years of accredited university experience, learns how to follow directions, learns how to deal with smart people & foolish people, and discovers that they have a passion for something (be it computer science or otherwise) is a person better prepared to be effective in the working world than otherwise. And if that's university's main benefit, then dammit I guess I have to agree that it matters less where you do it.

Grad school is probably a different story but for undergrad & the kind of jobs you will be getting with an undergrad degree - I think you got it right.

To provide a different perspective, I had the incredible good fortune to attend a top-tier university. In my four undergraduate years, I got to program four of the five computers on campus: an IBM 7090, a Burroughs B5000, a DEC PDP-1 and a DEC PDP-6. After leaving the university, I spent the next 40 years working in the computer industry. I doubt I would have been able to do that had I attended a lesser institution with no approachable computers. Today computers are everywhere, but I suspect there is some other technology present at the top-tier universities that will be very important in the future.

Also, I got to know and work with some of the most intelligent people in the world. That experience is very humbling: I used to think I was pretty smart—I learned I wasn't. That's a valuable life lesson.

Comment end of line codes (Score 1) 729

Probably the same way that most popular operating systems store text files as a list of lines separated by newline characters, encoded as 0x0A on UNIX or Windows but 0x0D on Apple II or classic Mac OS. VMS is an exception in that its "non-stream" text files have each line prefixed by its length.

The conventions for line endings are based on history. DEC's operating systems and operating systems descended from them use CRLF because that is what you had to send to an ASR-33 teletype at the end of an output line. UNIX and its descendents use NL, which has the same code as LF, because they were targeted at later printers.

By the way, the VMS record length field was 16 bits, avoiding the limitation of 255 characters in systems which used only 8 bits for the string length.

Comment Re:Null Terminated Strings (Score 1) 729

- strings terminated by a binary zero rather than their physical size. Who the hell thought that would be a good idea? Well, age old argument. Basically a matter of taste or sadly a historical "evolution".

I'm pretty sure null-terminated strings come from the days of punch cards/punch tape where an unpunched area is read as null (binary zero). Wherever the data-entry clerk stopped typing was the end of the string and the string could be appended to latter (impossible with a non-zero end-of-string symbol or a string length in the header which can't be rewritten on card/tape).

Actually, an unpunched column on a card was a space. You are right about paper tape.

Comment Re:cryptolocker solution (Score 1) 331

There is a solution for this class of malware, but it isn't anti-virus. Since cryptolocker only damages user data, the operating system should provide a secure and automatic backup of the user's data. Any time a user's file is changed, the new version is recorded on the backup, with its date. From the user's point of view, the backups are read-only, so malware can't damage them, and the user can retrieve an old version of a file at any time.

I hope you are aware that this could go wrong in terrible ways: there are some files that you actually want to have only in encrypted state. If your operating system always keeps a backup of their unencrypted versions, you may be secure against certain kinds of ransomwares, but open to all kinds of other data leakage.

Actually, I'm not. I was imagining that my PC, including its secure backups, is under my control. If I take a portable computer out into the world, I don't take the backups with me; they stay in my secure location. If I modify files while I am away, there might be a way for them to be sent back home, but if there isn't the data is backed up when I return.

What am I missing?

Comment cryptolocker solution (Score 1) 331

... The current big thing, cryptolocker, would work just as well on Linux. It needs no special privileges, all it needs is to run as the current user to encrypt all of the current user's documents and hold them for ransom....

There is a solution for this class of malware, but it isn't anti-virus. Since cryptolocker only damages user data, the operating system should provide a secure and automatic backup of the user's data. Any time a user's file is changed, the new version is recorded on the backup, with its date. From the user's point of view, the backups are read-only, so malware can't damage them, and the user can retrieve an old version of a file at any time.

Comment a cautionary tale (Score 1) 246

There is a lot of good advice here, so let me add a cautionary tale. I used to work for a local government as their “computer guy”. I got a call from a user who was unable to watch some video he had on a thumb drive. As part of diagnosing the problem, I logged in to his computer using my own account, copied the contents of the thumb drive to the hard disk, and played it from there. It turned out that playing the video worked from the hard drive and the rear USB connector, but not from the front. I told him this and closed the call, but didn't delete the video from his hard drive. I noted the call in my log, but didn't mention that the video was pornographic.

Much later, about a year after I my employment had been terminated, I got a call from the town's police. One of the detectives wanted to talk to me, and asked me to drop by the police station. It seems that someone had discovered that this user had been watching porn on his computer, and when they examined his computer they found that same porn on his hard drive, under my name. They gave me the third degree, wanting me to admit that I had been the source of the porm. I suspect they wanted me to be the scapegoat, since I was no longer an employee.

I acted calm, pleasant, truthful and stupid. They told me that I could be in big trouble if I didn't cooperate, and I responded by saying if I lied in order to tell them what they wanted to hear, in the long run I would get confused about what lies I had told, and get caught in a contradiction. Of course, it helped that they all knew me, so I had credibility when it came to being stupid. It also helped that these were small-town cops; I probably wouldn't last five minutes in an NYPD interrogation room.

This happened more than five years ago, and I haven't heard anything about it since.

Comment Re:Not in visable uses... (Score 1) 136

The most bad-ass server I've ever had the pleasure of working with was a Digital VAX 11/750 generations ago. It was *built* to be reliable from the very first rivet....You could upgrade its CPUs one at a time without shutting it down.

You must have been using a cluster—the VAX-11/750 only had one CPU. I used a 750 when developing EDT; we called it “MAYTAG”.

Comment Re:can be done (Score 1) 200

...People that are not using the service should not have to pay for it just because someone decided to run a line past their house. That would just encourage the planners to run dark fiber everywhere and collect fees for years before people decide to connect.

There's little reason to charge by the bit or have data caps like most ISP's do. It's not a finite resource like water is. The major cost is last mile, once you have that in place it is a minor cost to upgrade your backbone to support extra usage. The last thing parents need is a huge bill because their kids watched a ton of 1080p youtube videos last month, downloaded a lot of games off steam, or whatever else. The penalty would either be so small that it would be meaningless to have at all or big enough that it would cause massive bills by surprise like cell phone service and smartphone app pricing have done in the past.

I don't think you are taking economic realities into account. I modeled my proposal on the local water company. It costs money to run the fibre past each house. Somebody has to pay for that, and who better than the owners of the houses. Having this source of revenue encourages the utility to run fibre along each street, not just the wealthy neighborhoods. They wouldn't get paid for truly “dark fibre” only for fibre which can be connected to and provide Internet access.

Yes, data communication is a finite resource. It costs money to send a bit reliably across town or around the world—lots of people work hard to make sure the Internet stays up. Who better to pay those costs than the people who want that bit moved?

If parents don't want to monitor their children's (or guests') Internet activity, they can ask the utility to cap their daily data volume to prevent unpleasant surprises. There are other solutions, more difficult technically but not beyond reason. For example, the traffic of children and guests could be marked so that it could be limited in badnwidth and daily volume.

Comment Re:Go Greenlight (Score 1) 200

You'll have to change the system before third parties become viable in this country. First Past the Post has to go, as does letting politicians draw their own goddamn district boundaries.

Not necessarily. Even with the disadvantages you cite, the original two US political parties, the Whigs and the Federalists, were toppled. It can happen again. Even without de-throning the Republicans and Democrats, a third party can gather enough support to make the difference in a close contest, and that causes the major parties to give at least lip service to their concerns.

Comment Re:Go Greenlight (Score 1) 200

I also vote Libertarian when I can; I am a card-carrying member of the Libertarian party. When I can't, and I'm too lazy to run myself, I do enough research to figure out who is the current office-holder, and vote for his opponent. If he is the only person on the ballot for the position, I leave the line blank.

Comment Re:Go Greenlight (Score 1) 200

.... I hate both parties. They're equally scummy. It makes one feel powerless to know that voting the bums out always means voting more bums in that are not any better in the end.

You've bought in to the lie that there are only two parties. Look beyond the Republicans and Democrats and you might find better bums.

Comment can be done (Score 4, Insightful) 200

And when the municipal broadband costs 10x as much, just raise taxes and throw people in jail if they don't pay. And if the service is bad, again raise taxes and throw them in jail if they don't pay. And if they complain, just raise taxes and throw them in jail if they don't pay.

Your competition being able to raise prices (taxes) at the point of a gun to pay for their bad business is a competitive advantage. Not being able to opt-out is a monopoly with the police enforcing it on citizens.

Sure it might be better, but it definitely can be much worse.

If you do a decent job of structuring the municipal broadband delivery company, you can bias it towards the “better” end of the spectrum. For example, you can require that there be no cross-subsidy between broadband and any other municipal function, and no support from general taxation.

The broadband company would have to support itself through user fees, like the Water District does in my town. You pay a monthly fee if the fibre runs past your house. If you want to connect the fibre to your home, you pay a one-time connection charge, followed by a higher monthly fee plus a charge per bit for incoming and outgoing data. If there is a problem you pay to call Customer Service, and a higher price if the call requires a technician to visit your home. These charges would be refunded if the company decides that the problem is their fault. There would also be a service level agreement, and your costs are reduced to near zero if it isn't met.

In addition, and this is crucial, there must be no legal barrier to someone else running his own fibre, and connecting it to the municipal system. He would pay the municipal system for his connection, of course, and provide his own customer service. That competition, or even the possibility of it, will keep customer service quality high.

Comment Re:College is useful for most ... (Score 1) 225

...those with an inherent interest in programming often go far beyond the work required for class and use the incredible resources found at a university to study things that otherwise would have been beyond their resources.....You get out of college what you put in, and you will have access to resources and people you probably could not find anywhere else....The density of useful knowledge and experience is quite high among fellow students at a university, its just a matter of finding people with genuine interests in their respective fields rather than the ticket punchers.

That is exactly what happened to me. I started college never having seen a computer. I hung around the Computation Center, watched the Giant Electronic Brains and got to know the people, which included some of the computer industry's pioneers. I learned to program by auditing classes and writing code for the Stanford Time-Sharing System. The administrator of the AI Project didn't have a pay schedule for an undergraduate, so he had to treat me as a first-year grad student. I did graduate, but not with a CS degree--there was no such thing at the time. I turned my outside-of-class experience into a career.

Slashdot Top Deals

"An organization dries up if you don't challenge it with growth." -- Mark Shepherd, former President and CEO of Texas Instruments

Working...