Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Bad idea (Score 2) 385

Actually the sociopaths tend to go into management, not programming. From my own experience I would say that programmers are very rarely in the psychopathy spectrum, more typically going toward the autism spectrum. I was curious as to what value psychopaths had in an evolutionary sense (both individually and in society), and I learned that they can be valuable. In an experiment with spiders, an equivalent to psychopathy was indicated as a group survival trait, as without it nobody defended the group against external enemies. In society, some level of psychopathy is to my mind almost essential to being a successful politician - imagine a President who could not lie ("No, we have no intentions of invading next week."), and truly did "feel our pain" when he ordered thousands of soldiers to kill, and die. I wouldn't want a surgeon to "feel my pain" either.

Incidents of sociopathy/psychopathy increase from about 1% to 4% as you go up in the corporate (or government) hierarchy. (I would say the incidence among executives of big financial institutions is probably more like 20%, but that's just me.) It's also high among surgeons but not other doctors. Sociopaths are often natural leaders. In fact in that sense it is can be a positive trait. This book was recommended to me, and I coincidentally saw an article also recommending it - written by a neuroscientist who discovered in the course of his research that he had psychopathic traits: The Neuroscientist Who Discovered He Was a Psychopath.

See also The Pros to Being a Psychopath. Quote:

Psychopaths are assertive. Psychopaths don’t procrastinate. Psychopaths tend to focus on the positive. Psychopaths don’t take things personally; they don’t beat themselves up if things go wrong, even if they’re to blame. And they’re pretty cool under pressure. Those kinds of characteristics aren’t just important in the business arena, but also in everyday life.

The key here is keeping it in context. Let’s think of psychopathic traits—ruthlessness, toughness, charm, focus—as the dials on a [recording] studio deck. If you were to turn all of those dials up to max, then you’re going to overload the circuit. You’re going to wind up getting 30 years inside or the electric chair or something like that. But if you have some of them up high and some of them down low, depending on the context, in certain endeavors, certain professions, you are going to be predisposed to great success. The key is to be able to turn them back down again.

So I applied my newfound knowledge to the US Constitution. I realized that, having dealt with royal and other psychopaths and seen both their use and their risk, the founding fathers tried to construct a system that essentially pitted power-seekers (which to me is mostly psychopaths) against each other, allowing the system to make use of their talents competitively while never allowing any single one or group to take complete control - and always have a way for the system to re-stabilize away from any monopoly of power over time. This is an interesting new perspective.

Comment Paging Elon Musk...can I get a seat on the next Ma (Score 1) 784

My son is 30. He was raised by a very protective Dad. That said, he was allowed lots of latitude, including walking home from school.

He also trained at our dojo with mostly law enforcement and military folks from age 9. When he was 12, he got his arm broken at Black Belt class...by me. It was an accident in a close combat drill.

Based on the knee jerk BS from CPS and the police in the article, I'd be in jail and even worse, separated from my boy.

At this point, I'm looking for the exit....

Comment That will be a hotel that doesn't get my business (Score 1) 293

My company doesn't have a strong policy - we all try to keep costs down, but we don't go crazy. There are two primary reasons I won't go to a hotel that blocks my use of my phone +/or ipad as a hotspot:

1) security - this is actually pretty much a company policy. We never use public wifi anywhere except in a few rare cases where there was no choice (typically because the cell signal was too weak). If we had a corporate VPN to run everything through it might be less dangerous.

2) bandwidth - in the few times I've actually tried to use the hotel's wifi, or a convention center's wifi, the bandwidth was so bad that it was unusable.

and also, 3) they actually charge for this? Every place I've been to in the last year has had free wifi, and in some cases free hardwired ethernet. Hmm. I am a member of Hilton's HHonors, so I get the wifi for free if I want it. I guess they do charge otherwise. HHonors doesn't cost anything so there's no reason I know of not to be a member. Same goes for Marriott, etc.

Comment Hacky sack (Score 1) 580

We could start with not calling this a hack. It was espionage and theft, aided by humans on the inside as evidenced by the specific target vectors inside sloppy code.

Calling this a hack gives it credence it shouldn't have AND lets Sony off the hook somewhat. It's MUCH better, apparently, to say "we wuz hack-ed!" instead of the more truthful "we are cheap and stupid folks with some of the worst IT policies on Earth!"

Comment Re:C/C++ at $160k/yr (Score 1) 277

Your example reminds me of a powerful understanding I came to a while back. Every program we write defines an "application specific language" that is composed of the text, or the actions if a GUI, that the application supports. This linguistic approach to user interfaces can be a very useful viewpoint from which to define how a user interacts with our program. (where "user" may be a device, or software, or actual person, or whatever). We are constructing a language by which that user "talks" to our program.

Comment Re:Perl! (Score 1) 277

Funny, back in the 1990s I purposely didn't learn Perl beyond the minimal amount I needed to maintain an early web app. To me it all looked like somebody sneezed on the page. But in the last 1/2 decade or so I've become pretty proficient at PCRE - Perl-Compatible Regular Expressions, the very essence of page-sneezing.

I once idly wondered how hard it would be to build a parser/compiler for another language using PCRE. PCRE-Perl? PCRE-PHP? PCRE-Ruby? Of course, PCRE-C could be the first one, and the others just built running GCC through PCRE-C. I'm a sick puppy! :P

Comment Re:Nag, Nag, Nag. (Score 1) 277

Yes. For one, the true value of having two different block begin and end tokens is similar to the value of double entry bookkeeping. In Python there is only one "token" denoting a change of block (in this case the token is just the change in number of indent spaces). As a result, ambiguities and outright errors can be impossible for the parser to recognize.

Comment Re:Problem domain, not language (Score 1) 277

As a long time developer, I would say that nobody should be planning to use C for anything but where it's apparently still considered almost mandatory - kernels, device drivers, maybe compilers & interpreters. Application coders (your "in-between") should almost never waste time and mental effort making up for the lack of memory management and features like bounds checking of more "modern" languages. And I would argue that with most hardware being designed using advanced CAD, the hardware design should be well enough characterized that even device drivers may soon become something that could be almost automatically generated from the hardware specification, eliminating that job.

* footnote: In the 1960s, Burroughs Corporation used Language-directed design for their computers. For at least some of their designs, the entire system was defined and modeled in a high level software language (typically ALGOL) and internal specification language, and then the hardware/software interface was defined according to performance requirements and the hardware was built to implement the originally software-defined low level functionality.

Comment Re:Yes (Score 1) 277

Regardless of other aspects, if you want to learn something new, I would suggest trying one of the functional languages, such as Erlang or Haskell. Not because you actually want to get a job doing that, but because it will rearrange your brain and get you thinking about programs in a different, and I would argue, better way. I have never gotten around to becoming proficient in either one, but the limited effort I made to learn Erlang has greatly changed the way I write in other languages.

Comment Re:Facile nonsense (Score 1) 445

Sigh. Maybe we -- or I, at least -- just need a new 'ism.

Your -ism is wrong. :) Sorry, they all are. Every -ism is an attempt to impose a (usually) rational construct on an inherently arational system to which measures of rationality do not apply. IMHO this is especially true of any social or biological system. The best models of these are more closely related to neural networks and similar bottom-up decision systems based on convergence toward an apparent/semi-local optimum. As the number of nodes increases, the math increasingly looks like fluid dynamics.

Comment Re:Nobody cares (Score 1) 76

NSA's Information Assurance Division (not the spooks) works hard to help and to convince Big Corp to clean up their act. They recognize that financial IT security is fundamental to national security. Also, the FBI has a group that works to help companies improve security. So you might reach out to one of them.

The fundamental problem is typified by Home Depot's management - as a Redditor noted, when IT asked for budget to implement essential security, their upper management said, "We sell nails and hammers. We don't need that." Now it may well cost them $1 billion.

Here are a couple of rules of thumb you can tell your management. These are straight from web security and biometrics people I work with. A website breach (e.g. Target, Ebay, Home Depot, JPM) costs the company an average of $178 per customer (not website user - _customer_). That is a number that should invoke heart palpitations in the CFO - multiplied by the number of customers, it's probably more than the value of the company.

In the healthcare industry, a single lost or misplaced laptop will cost a minimum of $2.5 million in fines (HIPAA violations), liability, paying for patients to get identity theft insurance, etc. - even if no data is actually compromised and the laptop is recovered! If data actually makes it into the black hat world, the price goes up by multiples.

Comment JPM's IT controls have been criticized repeatedly (Score 1) 76

JPM's audits have been "qualified" by PWC for the last couple of years, because (despite inhouse reports) the CIO has refused to implement proper controls. People in JPM who have reported these problems have been fired - from what I've heard, three heads of Risk Management have been fired in the last three years, each time after telling the CIO that he needs to fix these before their pension fund clients have to take action.

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...