Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Cataloging write-only archives (Score 5, Interesting) 259

Based on my experience as an executor, you should pick the best one or two photos from each significant occasion, record the date, location and the people (forename and surname) it shows in a plain text file and trash the rest. Fortunately chronological order is both the easiest and best way of organising such a collection. Don't bother keeping pictures that don't have clearly recognisable people in them because it's only these that will be of any interest in future.

Then, when you die your kids will inherit a nice collection of ca 100 family photos complete with enough information to make them interesting and give them a context.

Namgge

Comment Re:chain of evidence (Score 1) 216

To all of you who are sued for filesharing, you should ask the following proofs or you are not guilty or no copyright-violation has happened at all:[...]

The claimant does not have to prove anything to you they merely have to persuade a judge that, on the balance of probability, they are more likely to be telling the truth than you.

Comment Now you have two problems (Score 3, Informative) 110

So, you're an employer who is short of skilled labour. You sign up to a scheme that requires the skilled personnel you do have, let's call her Nellie, to spend a significant fraction of her time training a school-leaver who's been told to sit next to her for three years. After three years the apprentice says 'Thanks for all the help, I've just been offered a nice job with another company.'. Only a C-level executive would think that this is going to work out well.

This sort of scheme has been tried before in the UK. For example, when there was a shortage of physics and maths teachers in schools a decade or so ago. Long story short, it was paying early career physics and maths teachers a bit more that fixed the problem.

Comment Re:Malware (Score 2) 103

Not really. The nice/nasty thing about Apple's walled garden, depending on your point of view, is that if just one user notices and reports your malware doing something it shouldn't Apple can revoke the relevant certificates and it's game over within a matter of hours.

Since one also has to provide proof of identity and pay a subscription to get the certificates in the first place unless the author took a lot of trouble to create a false identity they could be tracked down and prosecuted.

Now, I am sure there are flaws in this system, but it raises the bar to the point that there are easier ways for a hard-working computer-savvy crook to earn a living.

Namgge.

Comment You can't get blood out of a stone (Score 1) 204

If your business needs a working VPN and your current supplier isn't capable of providing one you must to cut your losses and procure a new solution. And this time get someone who knows what they are doing to run the procurement process. Once you have the working alternative in place let your lawyers try to recover costs if you must. But my experience, which is that the behaviour you are experiencing is what happens shortly before the supplier goes bust. Namgge

Comment Re:From The Front Lines... (Score 2) 166

it is widely known that most humans have an attention span of between 10 to 20 minutes

It may be widely believed, but it's not true for people studying a topic that interests them. In this case their attention span is limited by hunger and/or bladder-capacity.

The oft-quoted 10 minute attention span is applicable to paying attention to material that doesn't interest the subject.

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...