Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Suck it Millenials (Score 1) 370

by rockmuelle (#49353953) Attached to: Millennial Tech Workers Losing Ground In US

Nice points. I have two kids under 6 right now and was starting to worry about how smart phones might replace computers for most of what they do and thus never expose them to an easy to program platform. What's really exciting for them is the abundance of hobbyist computers and embedded project kits available now. They're going to grow up in a world where simple microcontroller-style projects are completely accessible to them. Makes me almost want to be 6 again!

Today, I can teach my kids some basic UI programming with HTML/CSS/Javascript (not much harder than VB) to get them familiar with high level concepts. I can also get them a BrickPi or any other embedded(ish) system and teach them how hardware works and how to interface with external devices. What a great time to learn technology!

Millennials, by and large, got shafted when it comes to learning how computers work. Most of them went to school when Java was the only language being taught and Linux was becoming too complicated to easily understand for the casual user. When they started working, a little Javascript and CSS got them really far. There weren't many opportunities to really understand how the full stack works. And, with the rise of social media and apps, their exposure to technology was more social than technical. As others in this thread have pointed out, being able to use a simple UI on an iPhone doesn't make you the technology whiz that the media keeps saying you are.

Millennials can still catch up, but I think the next generation is the one that's really going to be primed to do amazing things.

-Chris

Comment: Re:everyone who passed a math class knows (Score 1) 157

by rot26 (#49353597) Attached to: Many Password Strength Meters Are Downright Weak, Researchers Say
My reply in the other thread was more detailed, nuanced, explicit, and reasoned. I just couldn't do that twice in one day, it's exhausting. (I did say "lists" in my response.)

When I googled "diceware", and read what was on their site, I didn't really see any mention of the extra lengths you would have to go to to make the method actually secure. It's not a bad idea, it just has some caveats.

Comment: Re:Really? (Score 1) 318

If a company never hires women it's pretty easy to catch them in a sting where you send two more or less identical CVs, one with a woman's name and one with a man's. If the women's is rejected and the man gets an interview it's lawsuit time.

It doesn't really work that way in the real world. You can certainly embarrass a company that way, and it makes for a good "report" to release to the media. But you're not going to be able to build a lawsuit on a "sting", since you have to show actual harm. You can't sue over a job you never intended to take. Well, you can sue over anything, but you won't win.

The only way to avoid being sued for discrimination is to stop discriminating, not to do more of it.

The system can't be perceived by managers as capricious. If hiring women exposes you to more legal risk than not hiring them, and you don't think you can mitigate that risk, you don't hire women. Or rather you hire only enough women that it's not obvious you're deliberately not hiring women.

Comment: Re:This is because of net neutrality (Score 1) 526

Net neutrality wasn't the entirety of GPs claim. GP's claim was about "laws that essentially make private investments subject to public control"

Net neutrality originally was a local claim, about the last mile regarding non discrimination. It was part of the regulatory framework for last mile. Some aspects of that regulatory framework, have decreased profits and thus decreased infrastructure investment. On first and middle mile it is harder to see the negative impact of net neutrality but it is also much harder to see any impact.

Comment: Re:We should lobby to break the cable companies (Score 1) 526

OK if that's what you meant then bad choice of verbs. To break something is to, "separate or cause to separate into pieces as a result of a blow, shock, or strain". You want to use break then something like "break the power of the cable companies... either through ___ or through ___".

Comment: Really? (Score 4, Insightful) 318

by tsotha (#49351123) Attached to: Win Or Lose, Discrimination Suit Is Having an Effect On Silicon Valley

People are second-guessing and questioning whether there are exclusionary practices [and] everyday subtle acts of exclusion that collectively limit women's ability to succeed or even to compete for the best opportunities. And that's an incredibly positive impact.

Are people really that stupid? Huge payouts in these sorts of lawsuits isn't going to demonstrate to companies they should spend all their time policing their "everyday subtle acts". It's going to convince them women are legally dangerous and shouldn't be hired at all. It's a hell of a lot harder to bring a suit against a company that never hires you than against one for which you're employed, and business owners know this.

Comment: Re:Yes, but.... (Score 3, Interesting) 249

by khasim (#49349791) Attached to: Generate Memorizable Passphrases That Even the NSA Can't Guess

Let's be a bit more specific about that.

If they're restricting the length to something like 8 or 12 or 16 instead of 128 or 256 then they are PROBABLY not hashing the passwords.

Which means that your password is PROBABLY being stored in plain text (or possibly encrypted). NEITHER of which are acceptable methods today.

Comment: Re:change your username (Score 1) 249

by khasim (#49349671) Attached to: Generate Memorizable Passphrases That Even the NSA Can't Guess

Seconded on the different email addresses. And you don't have to own your own domain for that. Just make some random'ish gmail account and use that ONCE for more secure requirements (like your bank).

The trick is to prepare them in advance. And write them down in a PHYSICALLY secure location.

If you're using the same email account for your bank as you use on Facebook then your security could be improved.

Comment: Re:Black and White (Score 1) 171

by khasim (#49349595) Attached to: German Auto Firms Face Roadblock In Testing Driverless Car Software

Well because the mass amount of data that would be grabbed in the event of an accident would far overshadow a reasonable amount of capture memory during normal driving, which would utilize a lesser set of sensors and maybe lower grade video, which didn't have to factor into the explanation for the accident.

256GB of flash is just over $100 right now. Storage is not a problem. Even AIRCRAFT do not have a problem with storage and they have a LOT more data to store.

Step 2 would include choices such as hit the breaks if it would work. I just used summary steps to make it easy to understand.

Taking power from the engine is NOT the same a braking.

Taking your foot off the gas is NOT the same as stepping on the brake.

Seriously. Try it on a hill. You might end up going FASTER at the bottom of the hill than at the top.

Your plates store information about your car, hence you know from looking the number up, everything to know about the car via reference lookup.

Make/model/year/VIN/owner/owner's address. And maybe whether it passed inspection or not.

How will knowing the VIN tell you anything about hitting it?

Or the owner's address?

Or the owner's name?

Or any of the other information?

And what happens when the site you're trying to use to look up that useless information is slow?

Comment: Re:everyone who passed a math class knows (Score 1) 157

by rot26 (#49349417) Attached to: Many Password Strength Meters Are Downright Weak, Researchers Say
Unless the diceware lists are not known to the attackers, how is this any better than any collection of 6 bit numbers? And if you're counting on the attackers not knowing about this method, you've degenerated into security by obscurity. What am I missing? And why did some wanker delete essentially this same response from another thread?

There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence. -- Jeremy S. Anderson

Working...