Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Why? (Score 1) 279

It's common practice to stand up a Microsoft Windows 2013 server as a Certificate Authority, and put the CA key on all computers by Group Policy. Then you intercept every SSL connection and replace the certificate with an internal one, of which the IDS has the private key. The routers and such also use the same private key. The proxy server (transparent or otherwise) handshakes with the remote server using the correct certificate, decrypting and re-encrypting all traffic as it flows through.

Comment 4/1 Story Recommendations (Score 3, Funny) 60

Let's help out our editors! Let's propose 4/1 stories that we'd like to see, and we just mod up/down good ideas & bad ideas. Maybe they'll take notice.

Good 4/1 stories:

Slashdot Beta code adopted for official North Korea website.
Bill Gates first in line at Apple Store to buy Gold iWatch.
World returns to normal as Hell, Michigan, begins to thaw.

Comment Re:Investment Tax Credit (Score 1) 265

Good. Once it's gone, maybe we'll all be rich enough to buy solar panels.

A solar panel tax break just raises the damand by, say, $500 of government incentive, plus persuasive incentive margin. That is to say: a $1500 installation that gets a consumer-reaching $500 rebate becomes a $2000 installation, in theory; in reality, the consumer sees a chance to obtain a discount on a $2000 installation, and manufacturers can profit more by raising that installation cost to $2100 because fewer than 20% of customers are turned off by that extra $100. Thus the consumer needs $600 more in his pocket, and comes out $100 poorer in the end.

These numbers are, of course, illustrative of a concept in market demand economics dealing with subsidies on the consumption end. The reality is more complex. For example, as you have pointed out, the imminent revocation of the ITC is driving up demand as people grab for the perceived free money; this means prices can go even higher, people can be even more disadvantaged by the government rebate, but they will still have more incentive to buy than in a non-credit market where the total cost to themselves is lower because there is no perceived monetary benefit in such a market.

Comment Re:Really? (Score 1) 232

The main point is not to jump into new things in your industry. When I grabbed for MongoDB, it wasn't MongoDB 0.2 alpha or 1.0 or whatnot; it was MongoDB 2.2, a relatively mature product. At the time, it was new to the industry: a lot of articles on Slashdot and so forth were jabbering about these new "NoSQL" databases and "Document stores" and whatnot, and arguing their merits and shortcomings. The article proscribes that MongoDB would be something that cost me an "Innovation Token" if I were to grab it right then.

My point is that I did just that: I saw MySQL wasn't working, at all, for our projects, and that MongoDB fit some of our needs much better. Our software design and code became orders of magnitude more manageable and efficient. After that, we rewrote the MySQL calls as ORM, while using MongoDB via direct query--we quickly integrated and profited from two new technologies, reducing our risk and streamlining our business.

We did exactly the opposite of what the article says, and gained great benefits in opposition to what the article claims. By identifying and selecting the correct tools, be they old or new, we opened the path to innovation, allowing ourselves to carry out new strategies and develop new ideas quickly and effectively.

Comment Re:Why? (Score 3, Insightful) 279

Yes, and there are also key close-out tasks to cap off open projects to deliver to the next guy, or to transfer knowledge and move off responsibilities gracefully. Cutting off is a great strategy where the user is not unique, and a devastating one where he is training his replacement or in charge of things that rarely require attention; most often, it's somewhere in-between, and some careful decisions are required.

Comment Re:Why? (Score 4, Insightful) 279

Malware isn't as targeted as an individual, although I've seen financial records damaged and personal e-mails disseminated by malware. My stint at various companies, contractors, government positions, and private sector jobs has given me a lot of exposure to shit that goes wrong. Even when I had little technical power, I slowly identified ways to leverage the small access I needed, and to gain higher access; access control is idyllic, and information often leaks around a lot due to the need for certain things to be available.

I used to administrate IDS systems and approve firewall requests. In this capacity, I had no ability to do any real damage: every system I interfaced with was handled by an agent, either to install my hardware, to set my network routes, to configure the firewalls, to route span traffic to me, or to shut off ports when I discovered dangerous behavior on the network. I could damage our IDS, but nothing else. By contrast, those administrators each had a massive amount of power: they could sniff network traffic, route it for man-in-the-middle attacks, leak any information they wanted; even I was able to regularly extract administrative network passwords from our traffic, since our IDS ran decryption through our internal certificates and showed me raw attack traffic. I couldn't see your personal gmail account, but I could see the plaintext of your ssh connection to a CISCO switch.

I do work in network security; most mundanes who dabble figure that security is this rock-hard wall of protection, or it's wrong. They often forget the definition of information security, which includes confidentiality, integrity, and accessibility; it is the accessibility that people most forget, demanding confidentiality and integrity while refusing to sacrifice either where accessibility is impacted unacceptably. In my example with the IDS, the IDS must decrypt traffic to search for attacks which may compromise confidentiality or integrity, yet it also reveals passwords to a small group of people who may themselves compromise confidentiality or integrity by using these passwords; this is why HMAC was invented, but it is not always available within a protocol suite.

Comment Re:Broken thinking... (Score 0) 397

Oh, they can read and listen fine enough; but they don't always have social tact or good English grammar. Improving these things is incidental to employing good project management: it often happens when you take a direct approach to stakeholder communication and project planning, but it's not strictly a prerequisite. Even then, much of that only entails improving the clarity and completeness of communication; while there are structural and informational improvements, grammatical improvements don't necessarily come along.

Consider for a moment an e-mail that claims there are problems, that things aren't working, and that people want things too much. Such an e-mail can communicate the situation in all its completeness as I've just done, with little to no information on the specifics, with fragments of one thought jumbled with fragments of another as the text races back and forth between different issues. Such an e-mail would be much better if it first grouped together each part of the problem and relayed these groups sequentially, and second included a complete explanation for each part of the problem. Even then, the e-mail may be one giant paragraph, loads of run-on sentences, fragments of thoughts, and so forth.

As a project manager, you might learn to interpret this, and then produce a better-formed document to pass on to the other stakeholders; you'll continue to receive hackneyed garbage from your engineers, who still communicate like brain-damaged gradeschoolers, and just deal with it.

In the same way, these people may not deal elegantly at all with human beings; I myself am a very logical, fact-driven person, and have such a problem. In my case, I prefer to look at a problem and produce a solution; however, responding to problems often entails pointing out some painful, annoying things that people are still sore over, in the process highlighting all of their recent personal failures and generally shoving these things back in their faces while showing them how much better and more intelligent you are than they. I've found it more effective to separate out the case study and describe a solution, theoretical risks, and justification from the broad field of my work, allowing them to make the implications themselves and offering to provide the case studies if they need some specific concerns to raise to upper management. After rolling the ideas around and discussing them, the sting of failure is anesthetized, and they're far less hurt by the reminder now that they feel some control over the situation.

Of course, either approach I've described here is technically correct: I follow the same analytic process and deliver the same results regardless. I've learned to apply some consideration of complex human interactions when delivering those results, which is a whole different concern from my hard technical skills. I have said many times that there are no super brains: genius is technique, and I was born with the same capacity as everyone around me; this, too, is technique, and anyone can learn, as I have to only a small degree yet, to interact better with people just as well as they can learn grammar, computer programming, or quantum physics. As I've also come to understand lately, such skills are critical for success in the workplace.

Comment Re:Way too many humanities majors (Score 2) 397

People with STEM degrees have lower unemployment, and higher salaries. To say there is a "glut" relative to humanities is silly.

People with STEM degrees tend to be more affluent, thus more articulate, than poor, inner-city negroes who nobody likes anyway. They can pass an interview at Burger King better than a fourth-generation-welfare black kid. If we fixed our school systems--if we adjusted schools in our poorest cities to attend to the needs of the poverty-stricken minorities they service--such individuals would grow up poor and without a college education, but articulate, sociable, and on the same footing as middle-class engineers when they walk into the local WalMart looking for a job.

They are indeed important skills. But they are not "humanities".

Speaking, writing, organizing your office memos, dealing skillfully with people. These are called soft skills, and are humanities. Humanities include linguistics, social sciences, communications studies, and even law. A lawyer goes to a specialized school and then apprentices for years in nearly a decade of study entirely in humanities; diplomats, politicians, and business executives make a critical study of humanities to learn to negotiate and to speak in public; teachers go to college to study humanities, learning how to interact with children and parents. These are all studies in humanities.

Comment Re:Broken thinking... (Score 1, Flamebait) 397

Yeah I work with technical people. 99% of them are moronic, drooling fuckups who somehow secured themselves a job without being able to construct a clear sentence. Somehow, they're able to do complex things in databases and write architecturally demanding software, even though they communicate like brain-damaged teenagers high on some unholy concoction of mind-altering substances.

Comment Re:Way too many humanities majors (Score 2, Funny) 397

I thought this would be a similar economic argument: 74% of STEM majors don't work in STEM fields, but instead in services (fast food), retail, social services (trashmen) or as aids running papers back and forth. I've made such arguments to illustrate why we need to dismantle the government's activities in post-K-12 education and leave workforce building up to the market, using this STEM market glut as a prime example.

They made a more humanizing argument which I can't disagree with. Both arguments are quite valid: the ability to deal with people, to write well, to communicate, to create, these are also important job skills.

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...