Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×

Comment Re:Should corporations be above national law? (Score 1) 725

Because if I can get away with murder, that necessarily implies that there is "no political community able to enforce [laws against murder]"

There are several cases to distinguish

If it is not known your are the murderer, then you get away with it, but the sovereign will to ban murders remains intact. Just surrender and you will verify it is.

If you manage to flee to a foreign country (without extradition treaties) and get known as the murderer, then you experience the territoriality of sovereignty. A political community can only enforce laws on the territory it controls

If you are a known murderer you can carry on your everyday life in a given society, this indeed means that this society does not seriously care about banning murder. There may be a law, but obviously it got obsoleted by the lack of sovereign will to enforce it. I would not want to live in such a place.

Comment It's not as easy as you think (Score 1) 95

You can't have an uber-schpiffy S/W front end with all the proper auditing options, and then just shove the back-end up to a generic public cloud; that would never pass muster; a defense lawyer would have a field day with it, and a judge would toss that evidence out on it's sorry tuchus. Too many people that are not the ones that would be testifying as to the chain-of-custody would have full R/W access to it.

There ARE ways to construct a cloud to have all the proper legal-compliance features, which is EXACTLY what Taser has sold the dept. mentioned in the summary.

Comment Re:No Apple (Score 1) 98

The question is why people should care about Apple being in the consortium. The answer is that people want to sell things (e.g. streaming services) to people with mobile devices, and these may depend on vendor support for the codecs that they use (on iOS, you can't easily get hardware acceleration unless you use Apple's AVFoundation framework). Whether this is actually important depends on whether or not that market is one that you care about.

Comment "It's not that hard"? (Score 2) 95

There are entire industries built around data storage and administration solutions for regulatory compliance; it's not a trivial matter to create a system that will pass legal muster. This is far more than just a simple file repository; there's some initial software design, and also high ongoing administration costs (lots of paperwork inevitably involved.) Farming out this responsibility to a 3rd-party is a perfectly reasonable decision.

Comment The cost doesn't sound too far out of line (Score 1) 95

If take into account the "Razors and Razorblades" business model for the storage, the costs don't sound too far out of line. While certainly this is far more expensive than just buying some JBODs of near-line disk, such an installation would not be nearly good enough for legal evidence.

That said, for larger departments, this is just begging for a short-term local disk (with some sort of certified software) along with swift duplication to WORM LTO cartridges.

Comment Re:Status was NOT divulged, only email identities (Score 4, Insightful) 65

Using CC or BCC as a substitute for a mailing list is a good indicator that the organisation in question has no IT skills at all and probably shouldn't be trusted with any data that you might want to be confidential and that they might want to store on a computer.

Comment Re:Interesting (Score 1) 599

why would you ever want to actually write a sorting algorithm? After all, somebody out there has already done it better, and that's nothing you would ever need to do as real programmer.

This sounds like the assignments were badly designed. Unless your data has an entirely random distribution, with some knowledge of the data that you're sorting you can do a much better job of sorting than any generic comparison-based algorithm. If you're sorting English words, for example (a very common example data set for this kind of thing), then a radix sort implemented by a student will do a better job than a standard library quicksort that's doing a full string comparison on each pair. If the course also asks them to implement a quicksort, and to evaluate both against libc's qsort(), then they should hopefully learn both when it is and when it isn't appropriate to implement their own.

Comment Re:the comparison is pointless (Score 1) 83

How do you know he's a desktop user?

Because (in the part of the post that I quoted in my reply), he said:

-Os frankly is of little interest to desktop developers

And I replied that -Os is relevant to desktop users, which you then disputed by saying that it's not relevant to HPC.

Modern desktops are putting a lot of effort into reducing the number of wakeups per second in orer to reduce power draw. This means that on most systems, there are a lot of processes, but very few running at any given time.

Timer coalescing does the exact opposite. It means that you'll have a single wakeup and then a load of processes run, and then sleep. This increases i-cache pressure, it doesn't reduce it.

Comment Re: Programming (Score 3, Insightful) 599

The one that bugs me the most is the imbalance between how society treats knowledge of humanities and sciences. If a scientist doesn't know about history, then he fits the 'ignorant scientist' cliche and is a figure of fun. If a historian knows far less about the science that his daily life depends on, then he's considered a cultured and well-rounded individual. And, in my experience, the humanities person who is ignorant of science is far more prevalent than the scientist or engineer who is ignorant of humanities.

Comment Re:Programming (Score 2) 599

First: NIST? Really? I guess you've not been paying attention for the last couple of years.

Second: You misunderstand the grandparent. If you don't understand the basic ideas behind a crypto algorithm (or, more importantly, crypto protocols) then you will pick the wrong one. No matter how good a cypher is, or how verified the implementation is, if used incorrectly it will still be insecure.

"Luke, I'm yer father, eh. Come over to the dark side, you hoser." -- Dave Thomas, "Strange Brew"

Working...