Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment SOME of that is clueless HR. SOME is to get H1Bs. (Score 4, Informative) 348

I cant tell you how many job postings I read that said things like you need 5 years experience with X,Y, and Z.... only problem is Y and Z have only been out for 2 years and 4 years respectively.

Some of that is cluelessness in HR departments. (I recall a time where the jobs adds were filled with posts for entry level sysadmins, which demanded enough years of Unix experience that only Ken Thompson, Dennis Ritchie, M. D. McIlroy, and J. F. Ossanna MIGHT qualify. B-) )

But some of it is part of the "hire a cheap H1B" game. By making the requirements impossible (or rejecting all but a handfull of people who already receive astronomical fees on the consulting market), they can claim that "There are no available US citizens quaified for the post." Then they hire an H1B.

Of course the H1B doesn't have the qualifications, either. But his resume is inflated (typically by his recruiting firm, without his knowledge or approval).

The employer knows the game, and isn't expecting the claimed skills to be present - just enough skill to do the actual job. But a citizen who similarly inflated his resume would be in serious trouble as a result.

The boss gets his cheap laborer, the H1B gets his job and visa, the recruiter gets his fee. Everybody is happy except the rejected US candidates.

So who checks for fraud? The boss is happy. The rejected candidates are in no position to investigate or initiate a claim. The government is not interested. (The boss' company is a big political contributor.) Nobody else has standing.

Comment What's the voltage? (Score 2) 14

"Electroluminescent"? Is this REALLY thin? Or is the voltage substantial, like approaching three digit volts? (Or some third option, like a very low voltage electroluminescent material?)

(I'd check the referenced paper but can't get the time for that for another 12 hours, so if someone else gets to it, please follow up.)

Regardless, this looks very promising. Even if it turns out not to be practical, it should put the pressure on manufacturers to get a move on with commercial products at reasonable price points and improved form factors - or lead to the rise of disruptive competitors.

Comment MCP? (Score 1) 765

I don't have a firm opinion yet on the internals and suitability of systemd, or whether its improvements are worth the thrash. Having been burned by a number of changes (including, notably, init -> upstart), I'm likely to be a hard sell on the cost-benefit tradeoff of "fixing'' what it purports to fix.

But the discussion around it makes it remind me of a movie "character":

The Master Control Program in Tron.

Comment If it goes away if you use it, you didn't have it. (Score 4, Insightful) 367

For regulation to work... You have to not poke the bear.

If you only have a "right" while nobody exercises it, and it goes away as soon as a few people do, did you actually have it? Hardly!

Rights unused can be silently abrogated. You have to use them occasionally, to test whether this has happened, so you can take corrective action if it has.

(If nothing else, it's easy for law enforcement personnel to start assuming that something that doesn't occur often is actually banned. So important things like carrying guns need to be done occasionally, just to keep them aware that it's really OK.)

Provocation like open carry "just because" is why we don't have open carry in most states.

If you can't do something "just because", it's not a right.

In fact its open carry demonstrations that have eduated police forces in many areas, bringing peace between law enforcement personnel and gun-toting ordinary citizens in many places where open carry was legal but had fallen out of use. It also brings the issue to visibility and educates others, especially those who grew up when it was rare, that they DO have these rights, when they hadn't been taught they did. It is a fine icebreaker for bringing out related facts - like the actual numbers on safety and the effect of gun carry on crime and injury rates.

Yes, "Poking the Bear" can also have bad effects: For instance, California's draconin gun bans got started largely when the Black Panthers carried rifles into the gallery of the State Legislature, back during the period of the Civil Rights riots when it was legal. But black people at the time were de-facto banned from carrying guns (which was much of why they could be oppressed). The legislature just made that unconstitutional infrigemet de-jure.

Comment What's the key spacing? (Score 1) 56

Is the key spacing the same as a standard piano keyboard? If not, how does it deviate?

Can it, in combination with some particular, commonly-available, MIDI software package(s), be programmed to have the same touch characteristics and sound as a piano, harpsichord, etc.? If so, are the configurtation parameters to produce equivalent performance already available?

Comment Re:It's not the PC microphone ... (Score 1) 95

Or bypass the problem completely by using a USB microphone. These digitize the audio right next to the microphone proper, with everything floating at the same voltage so nothing substantial is picked up betwen the air pressure sensor and the A-D converter.

Bluetooth headsets work great for this, too. Most current generation laptops already have the bluetooth central-role radio onboard. Or get a cheap low-profile bluetooth dongle.

Comment It's not the PC microphone ... (Score 1) 95

4. PC/laptop microphones suck. I don't know why no one bothers to test them to the same level as your average cheap dumbphone speakerphone. They pick up all kinds of system electrical noise, ...

The problem usually isn't the microphone. It's the way it's wired (per the standard) and the way the desktop/laptop is powered.

PC microphones are wired UNbalanced: They have a signal and a ground wire, rather than the + and - signal wires and everything-but-desired-signal cancelation of the balanced wiring setups typical of professional microphones.

Laptops typically use power supplies that are not grounded, so they don't require a three-prong outlet. This usually ends up with the stray capacatance to BOTH sides of the line wiring capacitively coupling equally to the laptop "ground". That means the "ground" of the laptop is at half the line voltage - about 60 volts of AC (a rotten approximation of a sine wave plus lots of other junk it picked up at an assortment of frequencies). The capacitance is substantial - not enough to shock you if you touch the laptop and ground, but enough to feel a buzz if you rub your hand lightly across a "grounded" metallic part of the device.

Plug in the unblanced microphone and hold it, put the headset on your head, or just leave it sitting on the table. The "ground" is at 60V and you are driving maybe a couple MA of it down the shield wire. The voltage drop of that current (along with any other pickup) adds straight onto your audio input. The best microphone in the world will perform horribly if hooked up this way.

Try this: Unplug the laptop and let it run on battery. Notice how almost all of the noise disappears. You can also get rid of most of the noise by tying a decent ground onto the laptop. (Unfortunately, many meetings last longer than the laptop batteries...)

Plug in a VGA monitor with a three-prog power plug, which grounds the case of the laptop via the shield and the two hold-in screwd. I've done that without actually hooking up the monitor (which would have disabled my laptop screen) by adding a couple of the nuts scavenged from another DB connector as conductive spacers so the actual signal pins are not quite into the plug. And done this on a docking station, so the laptop headset was quieted when the laptop was docked, even though I used none of the docking station features except the power input.

Make a second cable with a three-prong plug to bring a ground up to the laptop. Green wire from the third pin to a screw into or clip onto such a chassis ground point.

Or bypass the problem completely by using a USB microphone. These digitize the audio right next to the microphone proper, with everything floating at the same voltage so nothing substantial is picked up betwen the air pressure sensor and the A-D converter.

Comment Re:Why is Israel not part of the NNPT? (Score 1) 52

Because they didn't sign it.

Saying: "everyone who has them except Israel is allowed to keep them" is just plain wrong.

Which just might be why they didn't sign on - and part of why "Israel has had a policy of opacity regarding its nuclear weapons program."

Some things to remember about the NNPT:
  - Not every country in the world is a signatory.
  - Even signatories didn't permanently give up their right to develop nuclear weapons: By the treaty's own terms (section X(1)), they can drop out on three month's notice:

Article X

1. Each Party shall in exercising its national sovereignty have the right to withdraw from the Treaty if it decides that extraordinary events, related to the subject matter of this Treaty, have jeopardized the supreme interests of its country. It shall give notice of such withdrawal to all other Parties to the Treaty and to the United Nations Security Council three months in advance. Such notice shall include a statement of the extraordinary events it regards as having jeopardized its supreme interests.

Comment Wonder how they'll rate Global Warming discussions (Score 1) 375

... when there is more than one version of the truth (conflicts, spin vs fact)... plus not all information is facts... philosophical questions may have more than one answer etc... so I am definitely curious to see how this works out.

I'm curious as well.

In particular, I wonder how they'll handle Global Warming / Climate Change discussions.

Then there's electoral politics, economics, Illegal immigration / undocumented migrants, ...

Comparing to a knowlege base presupposes that the knowledge base is full of truth. Filtering search results to exclude (or down-rate) anything at odds with the current paradigm is a recipe for hamstriging research, debate, and intellectual progress

  Ideas need to be supported or rejected based on evidence and logic, not whether they're orthodox.

Comment Re:Or the malware might cover its tracks. (Score 1) 324

I mean if they go to the trouble to do this why do it in a way that would be discoverable via jtag for other state actors. I mean if they go to the trouble to do this why do it in a way that would be discoverable via jtag for other state actors.

Because hacking the JTAG to hide malicious hacking of the software is a massive endeavor and a massive PITA.

Besides, if they built it into the original software they wouldn't NEED to hack the JTAG to hide it. The code would match the released version. (You'd have to reverse-engineer it to discover their back doors.)

Comment Or the malware might cover its tracks. (Score 1) 324

If you ask the drive to read out the whole flash.
The maybe the firmware would have to go to the platter to get the real image.

Or the malware could regenerate the un-attacked version.

For instance: If it's a patch that loads into an otherwise cleared-to-known-vallue region it can detect that region while reporting flash content and report the cleared value, instead. Add a couple other tiny regions where it saved (or alread knew) the previous contents where it "sank it's hooks" and you can't tell it's there from its replies to dump requests.

JTAG seems safer.

Yep. JTAG, in principle, could be corrupted. But it would require substantial hardware support that almost certainly isn't there (yet!)

Comment Hashes can be useful. (Score 1) 324

Which is why I always laugh my ass off at all these people who use PGP to sign things and put a hash on the same website you download it from ... look you can verify this file you downloaded from the website hasn't changed because theres no way anyone would be smart enough to update the hash as well!

That's why you SIGN the hash. Then only the public key needs to be published by a different route.

And it doesn't HURT to publish it on the web site as well: Then someone tampering by substituting a different public key sets off alarm bells when that differs from the public key obtained from another site or by another path. Blocking that makes man-in-the-middle more complex: The attacker has to have essentially total control of the path to the victim and be able to recognize and substitute the public key whenever it shows up. One slip-up and somebody may raise the alarm.

Meanwhile: Even if publishing hashes on the same site may not provide additional security against MITM, it DOES let you check the download wasnt corrupted in transit (in ways other than malicious substitution). With modern protocols that's less of a problem these days than it used to be, but a check would be comforting.

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...