Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Keeping Secrets (Score 4, Insightful) 134

by Jaime2 (#49455145) Attached to: U.S. Gov't Grapples With Clash Between Privacy, Security

It goes further... their scheme requires that the people holding the parts of the key work together regularly whenever access is needed. This is likely to be thousands of times every year. There's no way to keep a secret that needs to be accessed so often by so many. Enigma was broken due to poor operational security, not poor technology. Venona broke one-time pads due to poor OpSec. An encryption scheme used by all authorities wanting decrypts of cell phones would involve tens of thousands of people and would be impossible to carry out without making egregious operational errors. Add to that the fact that none of those who hold the keys have much to lose when they screw up. War time operatives know their way of life depends on them not screwing up. The local FBI office only cares about decrypting the phone, if they screw up, it doesn't hurt them, but it hurts me.

Comment: Re:not very often that i agree with carly fioni (Score 4, Insightful) 653

by Jaime2 (#49413585) Attached to: Carly Fiorina Calls Apple's Tim Cook a 'Hypocrite' On Gay Rights

Are you suggesting that Cook should not speak out against any social issue until he fully researches how the issue is handled everywhere in the world and only after he has prepared a complete response that is all-encompassing?

Fiorina's statement is a standard deflection technique to change focus from the good things an opponent does to something less good.

Comment: Re:When it works. (Score 1) 298

by Jaime2 (#49358425) Attached to: Ask Slashdot: What Makes Some Code Particularly Good?

Testing is an integral part of every development step, not something you tack on the end.

Good thing you know that we don't do unit testing... otherwise where we we learn that we were doing it wrong? Are you also going to assuming we don't do everything else I don't mention? I re-read my post and I can't find any part of it that could be used to infer that unit testing isn't part of our process.

Also, if you leave code review until after the product has passed all testing phases, then you have two problems. First, if you change anything after the code review, then you're not done testing, so the only way to do code review last is to magically have code that always zooms through code review with no comments. Second, you'll never get approval to fix more than a trivial amount of code if the pointy-haired boss knows the customer has already signed off; that's the classic path to being forced support bad code.

Comment: Re:When it works. (Score 1) 298

by Jaime2 (#49356683) Attached to: Ask Slashdot: What Makes Some Code Particularly Good?

Whether it works is orthogonal to quality. Good code can be fixed easily, so good code is always a short distance from "it works". Bad code can quickly go from "it works" to "it doesn't work and I don't know why" with just a simple change in requirements.

One of my rules is that the customer is the judge of whether is works or not, but the team is the judge of whether it is good or not. If the only person to evaluate the product is the customer, then you are pretty much guaranteed to have bad code. Code quality management comes before testing in the form of design reviews, code reviews, standards, pair programming, etc...

Comment: Re:Still waiting for a "hackability meter" (Score 1) 159

by Jaime2 (#49346647) Attached to: Many Password Strength Meters Are Downright Weak, Researchers Say
But, the main use of cracked offline passwords is to use that password on other services. The current service is already compromised as the person doing offline cracking has the database already. As long as you don't re-use passwords, it doesn't matter that much.

Comment: Re:Most degrees from India... (Score 1) 264

by Jaime2 (#49337759) Attached to: Wikipedia Admin's Manipulation "Messed Up Perhaps 15,000 Students' Lives"
All candidates had to go through HR. HR only had two approved vendors for the "IT Contractors" category. We had over four thousand IT contractors on staff at any one time company wide. My group hired about fifteen per year. With this much contracting, there was still more of a focus on cutting costs by reducing vendor count than on getting quality candidates. Both of the contract vendors were type that says "Ohhh... you're not from India, we'll just put you on the bottom of the pile".

Comment: Re:Most degrees from India... (Score 1) 264

by Jaime2 (#49337721) Attached to: Wikipedia Admin's Manipulation "Messed Up Perhaps 15,000 Students' Lives"

if you lie on anything that can be verified, you're disqualified.

Tried that. Most of the candidates said they were the primary developer using a technology that, after two minutes of questioning, they had obviously never used before. I had several instances where the person I interviewed wasn't the person that showed up for the job.

Comment: Re:This is the dumbest research I've seen this yea (Score 2) 486

by Jaime2 (#49336993) Attached to: No, It's Not Always Quicker To Do Things In Memory
It's dumber than that. They didn't even do it right in Java. There is a note near the end of the paper that says "However, using a mutable data type such as StringBuilder or StringBuffer dramatically improved the results". They didn't present the numbers, but what they really meant was "The performance problems we saw were entirely due to our not using StringBuilder or StringBuffer, this paper shows no meaningful difference in performance between memory-then-disk and disk-only access once the algorithm is fixed."

Comment: Re:Most degrees from India... (Score 4, Interesting) 264

by Jaime2 (#49335771) Attached to: Wikipedia Admin's Manipulation "Messed Up Perhaps 15,000 Students' Lives"

I used to do a lot of contractor hiring. I started with the attitude "if you lie on your resume, I won't even consider you". After realizing that I would never hire anyone - I backed off on the attitude. The interview process became an exercise in determining what the candidate knows, while the candidate made every attempt possible to deceive me. It was very disheartening and I hated hiring someone who lied to my face for 60 minutes straight because he lied less than everyone else and was the most likely of the bunch to get the job done.

BTW, this was at a really big company and 99% of the resumes that HR sent me were educated in India and came to the US to work in the previous three to five years.

Comment: Re:And now why this can not be done in the USofA (Score 2) 317

by Jaime2 (#49319893) Attached to: Costa Rica Goes 75 Days Powering Itself Using Only Renewable Energy

Sure you could put Niagara Falls in a dam, but it wouldn't be pretty.

They went through a lot of effort to get hydro power from Niagara Falls without ruining the tourist attraction factor. Instead of turning it into a dam, a three square mile reservoir was built and water is diverted from the upper river to this reservoir (mostly) at night. During the day, the dam creates energy by draining the reservoir into the lower river. No part of the power generation system is within a mile of the falls itself.

fortune: cannot execute. Out of cookies.