Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:epic (Score 1) 294

Well first off the manufacturer works with Microsoft to make Windows work on it as best as they can. I get that Apple isn't following Windows standards. But the Linux community has prided itself on support Mac. Back when Mac's used different CPUs: YellowDog Linux, Gentoo and for time RedHat all had distributions which ran on it and that was certainly a much bigger challenge. Most of the pieces to get it to work are present. Individuals have been able to get various things fixed. This is doable this is just Linux not support the #1 selling high end laptop.

Anyway. Your claim was that there were no problems. I'm definitely having one. 28 months into a new laptop I shouldn't be having problems getting a Linux to boot up everything.

Comment Re:Sigh... (Score 1) 789

It's not a "non-need", but it's not the end of the world, for several reasons.

First off, everything comes down to time. If one had, say a decade, they could build a full, brand new gas production infrastructure from scratch, designed to produce in different parts of the world and export straight to the EU.

Great, except EU gas reserves aren't that big. They have a max capacity of about 6 months, usually filled to about half that at this time of year, though higher than average now. Russia makes up 30% of EU imports. Basically, reserves provides something like 9-12 months of Russian cutoff.

Next we have instant displacement. Much of the EU has been working to shut down coal power plants, and ones that are in operation are often run at lower and lower capacity factors. In the event of a full Russian gas cutoff, these would be all fired up and used heavily, while NG plants would instead be mostly shut down.

Then we have slower displacement, which can take anywhere from a month or so to a couple years. NG power plants can be converted to other thermal sources. Industrial consumers of NG for heat can switch to other heat sources. Etc.

On the home and commercial perspective, the higher cost of gas will lead to more investment in efficiency on its own. Government efficiency programs can improve this even further.

On the production side, the spike in gas prices will instantly make higher-cost, formerly unecomomical European fields economical. Some of these will be available right away, some will require weeks, some months, some years to bring online. But it does put a lot of new gas into the picture.

On the non-European side, there's LNG. The US is really a read herring on this front, at least for the time being, as Sabine Pass won't come online until the winter after next, and others even later. The Middle East is the primary LNG exporter here, particularly Qatar, whose LNG capacity alone is more than all the gas Russia sells Europe. Thankully, the EU is loaded with largely idle LNG import terminals (nearly enough to replace all of Russian gas as-is), and LNG tanker rates are very low right now, there's a glut. Now, Europe would have to pay a very high price for it. LNG is expensive to begin with, and they'll be competing with the gas's current customers, primarily Asia. Europe, of course, would pay more, leading to all of the aforementioned things - increased production, increased displacement, etc - to occur in Asia to offset their reduced LNG imports. Interestingly, the US actually *can* help there - the US does have a Pacific LNG export terminal that was recently brought back into operation at Kenai, Alaska.

The net combination of these factors is that, no, Europe will not just "run out of gas and freeze to death" or any of those other doomsday scenarios that people throw around. But there's no question that Europe will have to pay more for gas, probably at least 50% more. And nobody's going to like the resumed usage of coal power - but in the short term, they're not going to have a choice.

On the other hand... for the EU, the extra energy costs for gas and oil may represent something like a 5-10% GDP hit. But for Russia, losing all of their oil and gas exports would be like dropping a nuclear bomb onto their economy.

Comment Re:Who needs Gnome? (Score 1) 613

I understand Gnome is a UI. But Debian can't not support Gnome for all the distributions that depend on it. I get you may like XFCE but you liking it and Debian mandating it are worlds apart. Mandating systemd is one thing. Mandating Gnome sunk projects like Progeny and UserLinux. I have to assume that mandating XFCE would be far more controversial for something like Debian. It is simply beyond the realm of possibility.

Comment It's all bunk. (Score 3, Informative) 546

The premise in the summary is wrong. Employers have not learned that actual skill outweighs the fact that someone survived college.

The fact is that such a degree in no way indicates that obtaining it involved actually learning what was presented for longer than it takes to pass the relevant examinations.

On the other hand, if the programmer presents a series of complex projects they have completed, this does positively indicate they have both the knowledge (what the degree should attest to, but really doesn't rise to the challenge) and the ability to employ that knowledge (which the degree does not assure anyone of, at all.) Those completed project should also serve to demonstrate that the required portions of theory have both been absorbed and implemented, presuming the project works well and as intended.

Employers and HR departments are rarely focused on actual performance, except in the very smallest of companies. Most use a combination of bean-counting, related age-discrimination, and the supposedly valuable rubber stamp of a degree to winnow out programming job applicants. After all, if said employee screws it up, that's the employee's fault. Not the HR person.

This, in fact, is why most corporate software goes out the door with so many problems, and it is also why those problems typically remain unfixed for very long periods of time.

It sure would be of great benefit to end users and companies if actual skill *did* outweigh a degree. But that's most definitely not happening. It's wishful thinking, that's all. And if you're an older programmer, even your sheepskin won't help you -- you cost too much, your health is significantly more uncertain, they don't like your familial obligations, they don't like your failure to integrate into "youth culture" as in no particular fascination with social media... or even your preference for a shirt and tie. Welcome to the machine. You put your hand in the gears right here. Unless you've enough of an entrepreneurial bent that you can go it on your own. In which case, I salute you and welcome you to the fairly low-population ranks of the escapees.

Comment Re:Doesn't matter how the government gets the data (Score 1) 199

No. You're completely ignoring what the 4th says. It says "unreasonable" is prohibited, and then it goes on to explicitly define what reasonable means.

If all it takes is some functionary going "well, I think it's reasonable" then the 4th has absolutely no meaning at all, which is not a sustainable position one can take for the framer's intent.

Comment Re:Surprising constitutional question from judge (Score 1) 199

Verizon can so choose if their contract with me so stipulates (just as a house helper can treat the information gleaned from searching my home as public if I agree they can.) They may not be coerced into this legally, or exempted by the government from keeping my privacy, either. That's just an end run, and it amounts to exactly the same thing: a search without the cover of a properly executed warrant.

Comment More, done watching (Score 5, Insightful) 199

I just finished watching the entire proceeding, with a few short rewinds.

I'm appalled even at the suggestion that because the government thinks it "needs" to do something, it can. This theory permeates several of the points made; it is invalid from the ground up. If the government believes it needs something that is constitutionally prohibited, its remedy is found in the pursuit of the processes laid out in article five of the constitution -- not in outright ignoring the hard limits set upon it by the bill of rights or other sections of the constitution.

Likewise, the "is it reasonable" sophistry was very upsetting to encounter again. It's an outright stupid tack to take. The 4th does indeed include the word unreasonable, but it then proceeds to describe what is reasonable: probable cause, supported by oath or affirmation, may cause a warrant to be issued though that warrant must be specific as to place(s) and item(s) to be searched for. Those conditions all being met, the search is then both reasonable and authorized. The fact is, if all it takes is someone saying "well, I think it's reasonable that we search fyngyrz premises (or whatever)" and this over-rides the very specific instruction that a warrant is required, then the entire 4th amendment is without any meaning at all other than perhaps, optionally, advisory.

On the subject of who can search what...

If I hire a house-helper to whom I assign the roles of answering the phone, keeping the larder up to date, cleaning and laundering, this person clearly has my permission to search. They will search under furniture, appliances and cushions for debris; they will search cabinets and the refrigerated devices for out of date or missing foodstuffs, they will open my drawers and organize and store my clothing. They will, in large part, know who has called me on my home phone, and who I may have called out to.

Fine. I can give such permission. But this, in and of itself, in no way serves to authorize the government to search my premises -- for anything. The 4th limits the government with regard to my person, houses, papers and effects. It does not (obviously) limit me, or someone I hire a service from and extend such permission to, from searching. The 4th is clearly not limiting action in the public sphere. It is limiting action in the government sphere.

Relating this to Verizon and its peers: By contracting to make phone calls through their capabilities, in no way have I extended the government access to my communications, in any part or parcel. What I have done is arrange for a service by Verizon/peers without extending the government any permissions at all, and the government, absent my explicit permission pretty much identical to that as given to my house-helper, is restrained, intentionally so by the 4th amendment from searching for anything, anywhere, in regard to my communications. Which, in case anyone is wondering, is also the rationale that underlies title communications law with regard to the content of my calls, and also forms the basis for the prohibition of any person monitoring cellular radio links.

Every time the government succeeds in arguments from need instead of authorization, we become subject to the whim of individuals, rather than to a constitutionally limited government. It should frighten the living daylights out of anyone who understands the issues when the rationale is "but we NEED to", as was seen multiple times in the government side of this proceeding; and the more so when the judges don't laugh in the face of the person presenting that argument.

Remember: If the idea is that the constitution is merely advisory, then there is no functional difference between the US government and that of any tin pot dictatorship. Someone says "I wanna", and it happens. That's most definitely not how our country was intended to operate; otherwise the framers were completely wasting their time.

Sigh.

Comment Where Do These Stats Come From? (Score 1, Informative) 546

Nearly half of the software developers in the United States do not have a college degree. Many never even graduated from high school.

What? I pored over the article and the US BLS link in it to find the source of these statements. Aside from a pull quote that appears as an image in the article but isn't even in the article itself and is unattributed, could someone find me the source of this statistic?

Because I'm a software developer in the United States with a Masters of Science in Computer Science. All of my coworkers have at least a bachelor's degree in one field or another. And my undergrad very much so started with a sink-or-swim weed out course in Scheme and then another in Java. Yes, they were both easy if you already knew how to code but ... this article almost sounds like it's written by someone with no field experience. Granted that's a low sample set, I'd like to know where the other half of us are. Everyone keep in mind that a Computer Science degree is a relatively new thing and there very well may be elderly coders doing a great job without technically a degree in computer science.

The only way I can see the misconception spreading is that people who use Wix to drag and drop a WYSIWYG site (for you older readers that's like FrontPage meets Geocities) erroneously consider themselves "software developers".

Comment Re:Seemed pretty obvious this was the case (Score 4, Informative) 311

A strong password CAN be easily remembered. How about remembering 10 and 11?

"Ten!!!!!!!!!!!"

That's 10 and eleven "!" characters.

There are a number of ways to calculate password effectiveness. If you assume zero knowledge of the password characteristics, then the 290 million years the website you linked to calculated may be accurate.

Hackers, however, have typically found that certain patterns are used by humans more frequently than others, and instead of brute-forcing the password from the beginning (following UTF-8 order " ", " ", " !"... etc.), you can instead skip a significant part of the overall password space by only testing these common patterns.

I prefer this tool, which evaluates password entropy. The figures it comes up with do tend to presume that something about the structure of the password is known (i.e: in your example that it is a word followed by a repeating symbol), but IMO this is a good figure to base your password decisions off as it represents a worst-case scenario, and not the best-case scenario the tool you linked presumes.

Using that tooling instead, your passwords strength and estimated crack time is as follows:

  • password: Ten!!!!!!!!!!!
  • entropy: 18.669
  • crack time (seconds): 20.836
  • crack time (display): instant
  • score from 0 to 4: 0
  • calculation time (ms): 3

FWIW, (and purely for the sake of comparison) one of the passwords I use online has, according to this tool, an entropy of 61.819 and a crack time of 203355820622500.06s (about 6.4 million years). And yes, it's something I both change often and have memorized.

Yaz

Comment Re:Ummmm (Score 1) 311

I thought Find My iPhone didn't lock accounts after too many failed logins? [...] I call that a failure in Apple's security.

I call that a way to keep the guy who stole my phone from being able to DOS my attempts to find it afterward.

Or not. Maybe it was just an oversight. But you're making the common mistake of assuming that the requirement you care about is the only one that the designer should have cared about.

Comment Re:Seemed pretty obvious this was the case (Score 1) 311

Using a password manager is pretty much the same thing as writing down your password. And personally, I think it's less secure than writing the password down on paper and storing it securely.

Thank you for warning us of your opinion in advance. That saves time later when trying to decide whether to have an intelligent conversation with you on the subject.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...