Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Don't they have an fiber to the node cable netw (Score 1) 229

Good for you. However, you're not in the majority. In reality, what you have depends on your suburb. All the new developments (ie. in the last 10 years) are serviced by Satelite for Pay-TV and DSL for Internet. It's only the really new developments (last 2 years) that have fibre.

Everyone in my suburb has a DSLproblem. The DSLAMs in most areas are full and Telstra won't upgrade. Mine is about 5km away (as the crow flies), so give it about 7km of crappy copper. Every time it rains, I lose my internet and VoIP, but Telstra don't care, as my service is not through them.

Comment Re:Personally (Score 4, Insightful) 655

I couldn't disagree with you more. That isn't problem solving. That's management.

What you describe is a manager's view of problem solving. They basically don't want problems in the first place. It is a manger's role to ensure succession planning, training, resourcing and appropriation documentation and standards are maintained. A manager doesn't have to do them all. Just create the environment through appropriate "stick & carrot" measures.

Problem solving is a rare gift. I know many competent Design Engineers that cannot solve problems. Most good ones can follow patterns and apply them to new situations. They're the ones you want to do most day to day designs. They'll need attention to detail. But again, they'll get stuck at something that doesn't fit within the those patterns.

The true problem solver is one that can make those intuitive leaps. They can see patterns, where others don't. Or even work with a thousand disconnected clues to get to the root cause. The very best do have a formal background (and they'll draw on those bits of lectures and notes when needed, going back to 1st Principals). Unfortunately, this is difficult and mostly can't be put down in Manuals and Procedures. This doesn't necessarily make them appropriate for Design and quite often they are terrible at mundane tasks. So bad managers don't know how to value or deal with this skill.

Comment Re:Liberal strategy (Score 5, Interesting) 1144

It's interesting to watch this from the outside. I don't quite understand how you got into this situation. In Australia, if the Senate blocks supply of funding for the government to run, that triggers a double dissolution of parliament. At that point, a general election of both the Upper and Lower houses of the Government is triggered. All seats are open. The public then gets to vote on which idiots we want to run the country. Generally, the voters side against the politicians that caused the mess in the first place. So it rarely gets to this point.

Comment Re:direct link (Score 1) 88

Interesting you say that. The way grant funding works in Australia is different from the US. In Australia you can get grant funding becasue you've previously done good research before. Thus, the funding is along the lines of... "You've done good work, so we'll keep funding you to continue researching".

Submission + - Google Requests NSL Transparency, Public Hearings from FISA Court (threatpost.com)

msm1267 writes: Google, Yahoo and Facebook filed amended requests today with the U.S. Foreign Intelligence Surveillance Court (FISC) reiterating their desire to publish numbers on requests for user data related to national security. Google, meanwhile, went a step further asking for an open, public hearing with the court so that the issue could be publicly debated.

Submission + - 7 IT Mistakes That Will Get You Fired

snydeq writes: Dan Tynan offers seven true tales of IT pros who screwed up big and got fired quick. 'There are lots of reasons for instant termination. Failure to fulfill your obligation to protect your employer's digital assets or abusing your vast powers for your own nefarious ends are two sure ways to end up on the unemployment line. You could be fired for opening your mouth at the wrong time or not opening your mouth at the right one. Spying on the boss, lying to your superiors, or being directly responsible for the loss of millions of dollars in downtime through your own negligence are all excellent ways to end up on the chopping block.' Got any you would like to share?

Submission + - A Tale of Two MySQL Bugs

Archie Cobbs writes: Last May I encountered a relatively obscure performance bug present in both MySQL 5.5.x and MariaDB 5.5.x (not surprising since they share the same codebase). This turned out to be a great opportunity to see whether Oracle or the MariaDB project is more responsive to bug reports. On May 31 Oracle got their bug report; within 24 hours they had confirmed the bug — pretty impressive. But since then, it's been radio silence for 3 months and counting. On July 25, MariaDB got their own copy. Within a week, a MariaDB developer had analyzed the bug and committed a patch. The resulting fix will be included in the next release, MariaDB 5.5.33.

Submission + - Research shows "three strikes" anti-piracy laws don't work.

Bismillah writes: Graduated response regimes that warn and then penalise users for infringing file sharing do not appear to work, new research from Monash University in Australia has found. The paper studied "three strikes" laws in France, New Zealand, South Korea, Taiwan and the UK, as well as other anti-filesharing regimes in the US and Ireland, but found scant evidence that they're effective.

Submission + - Keeping Data Secret, Even From Apps That Use It (slashdot.org)

Nerval's Lobster writes: Datacenters wanting to emulate Google by encrypting their data beyond the ability of the NSA to crack it may get some help from a new encryption technique that allows data to be stored, transported and even used by applications without giving away any secrets. In a paper to be presented at a major European security conference this week, researchers from Denmark and the U.K. collaborated on a practical way to implement a long-discussed encryption concept called Multi-Party Computation (MPC). The idea behind MPC is to allow two parties who have to collaborate on an analysis or computation to do so without revealing their own data to the other party. Though the concept was introduced in 1982, ways to accomplish it with more than two parties, or with standardized protocols and procedures, has not become practical in commercial environments. The Danish/British team revamped an MPC protocol nicknamed SPDZ (pronounced “speeds”), which uses secret, securely generated keys to distribute a second set of keys that can be used for MPC encryptions. The big breakthrough, according to Smart, was to streamline SPDZ by reducing the number of times global MAC keys had to be calculated in order to create pairs of public and private keys for other uses. By cutting down on repetitive tasks, the whole process becomes much faster; because the new technique keeps global MAC keys secret, it should also make the faster process more secure.

Submission + - Japanese invent clingy stalker robot (realitypod.com)

Platinumrat writes: I love this story as an example of "What could possibly go wrong?" when I read Robot Programmed to Fall in Love with a Girl Goes too Far. So skynet won't drop nukes on us, they'll just keep all the women away from the men.

Slashdot Top Deals

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...