Forgot your password?

Comment: You're unlikely alone (Score 1) 274

by Lally Singh (#46914623) Attached to: Ask Slashdot: Joining a Startup As an Older Programmer?

If enough of them have young kids (and your 40+ years - 10 puts many of your peers in the mid-30s), then they'll be going through the same stuff, only have less experience. Come in as the voice of wisdom and experience. It's useful!

Just don't spend too much time talking about old systems. Some older programmers do that, and it just distances themselves unnecessarily. Having used an older system isn't a technical merit, it's just saying that you're old. Interesting anecdotes, special features, and spectacular failures of old systems, however, are fun to hear.

Comment: One AMI image, ec2, and shell scripts (Score 3, Informative) 80

by Lally Singh (#45557317) Attached to: Ask Slashdot: Scientific Computing Workflow For the Cloud?

Here's how I ran my PhD simulations on EC2:
- The AMI downloads a manifest file at startup.
    - The manifest has one record per line, two fields per record: the s3 URL of a .tar.gz to download, and the path to download it
- The AMI then runs a shell script (/etc/ that's been put there by a manifest entry

Shell scripts upload new files to s3 (e.g., /etc/ and have ec2 run new VMs. When the VMs are loaded, they're running everything I need, ready to go.
Other shell scripts stopped/started experiments on these VMs.
Other shell scripts shut down the VMs when I'm done.
The scripts did little more than scan the appropriate machine list from the ec2 tools and ssh into them with a specific command.

At the end, I had some of the experiment-specific scripts quickly have git clone/pull in files I was changing quickly per experiment.

All of it worked really well for me. Nothing fancier than the ec2 command-line tools, bash, ssh, & git necessary.

Comment: robots.txt, seriously (Score 1) 533

It's 2012, why does this search engine stuff come up all the time, when it's *so* easy to fix? If they want to publish the names, but not have them come up when people are searching for individual people, shove the list in robots.txt. Not complicated. A moron can figure out robots.txt

Comment: Re:As One of the Hacked (Score 1) 141

by Lally Singh (#38521658) Attached to: Data Exposed In Stratfor Compromise Analyzed

As another hacked reader, yeah I'm unhappy about this too. Considering that I was donating to wikileaks before, this is just painful.

Stratfor's just come out with their email, 8pm, not great, but here we are. They've done the standard 1yr prepaid monitoring service for identity theft.

I looked around to verify that my CC was actually breached (who knows, maybe it was a card I've already canceled?), but all the primary copies of the CC list seem inaccessible. It'd be lovely if they were taken down before I become collateral damage in all this, but it hasn't exactly been a lucky week.

Canceling the card, and watching the account like a hawk. It's all we can do, and hopefully it's enough.

Comment: YES. Obviously. (Score 1) 520

by Lally Singh (#37514132) Attached to: Ask Slashdot: CS Grads Taking IT Jobs?

On your resume, it'll read like this:

I finished school, and interviewed. While every reasonable CS student on the planet, especially in 2011, can get an actual programming gig, I couldn't. So I took a glorified Geek-Squad gig instead*.

* It doesn't matter what the actual job was. It's in IT and not programming, it'll be read the same as geek squad.

There can be no twisted thought without a twisted molecule. -- R. W. Gerard