Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Pretty sure it doesn't run on Linux (Score 1) 255

Pretty sure there will be a competing browser running on another device other than an xBox which utilizes screens. Pretty sure most of our blade servers make your desktop machines look like ancient Ford jalopies.

The vast majority of work done in the world is done by machines which don't talk to humans most of the time. Including the vast majority of work done on the web itself. Which is just a framing representation of various inputs and outputs we built to allow disparate machines to intercommunicate and occasionally present the data to humans.

Comment Re:Pretty sure it doesn't run on Linux (Score 0) 255

Thank you for that insightful and informative comment which has added so much to the discussion.

Oh, wait, no it didn't, you just wanted to remind everyone that you don't own a television.

Pretty sure my 1080p 42 inch HDTV counts as a TV.

Although it is true many scientists don't own TVs, to minimize distractions.

Comment Re:I don't want to 'feel' it, I want it to be real (Score 1) 255

This is why you don't let the marketroids and UI gurus design tech things. They go for feel, not substance. Substance matters.

You can enhance substance with proper UI design, so that things "fade in" as they become secure, or count down dots indicate what's enabled, but you need to actually build it right in the first place.

(caveat: my first degree was in BusMgmt Sales & Marketing focus)

Comment Re:Fingerprints can't be reissued (Score 1) 123

Technically, we can regrow fingerprints, but it's very expensive, and we have to alter the pattern.

Biometrics are frequently a lazy method that creates just as many problems as they solve. Most security breaches involve people spacing out. And if you make things too difficult, they subvert them, making them even more useless.

Comment Three takeaways (Score 4, Interesting) 123

As a former regional acting Security Officer, this whole thing brings three conclusions, which we all knew in the 80s when we set up security priniciples:

1. Full data should never be fully available on any external or easily linked database. It is far better to have a query/response system that does not have full details.

2. You don't need the full security clearance information unless you're looking for potential spies. Only the CIA internal agency and FBI internal agency data should have been internally available. Ever.

3. Linking position to clearance data (other than NEEDED level of clearance) is never a good idea. We used to keep that on locked laptops (yes, a decade before you civvies got them) in removable locked hard drives for that exact reason. In a safe that was fire proof. And EMP safe.

Comment Very interesting questions (Score 1) 557

And answers.

Since I know what comments tend to be, I'm not going to read the rest of the responses however.

But having had an ex-wife who was in IT and a roommate who was a female gamer and programmer, and working with a lot of women at a professional level in STEM fields, I know it's sadly true how poisonous things are.

Some days I miss when USE*NET was real people's accounts, before we let you trolls in. The good old days of the flame wars.

Slashdot Top Deals

All the simple programs have been written.

Working...