Forgot your password?

Comment: Hyperbole (Score 1) 152

by gweihir (#47575717) Attached to: "BadUSB" Exploit Makes Devices Turn "Evil"

For example, my keyboard has exactly 256 Bytes of FLASH storage. And if you put malware in there (which it is too small for), it loses its keymap. So "most" is really "some, and in particular devices modified for this" here. In addition, this attack need to be customized for each specific device, which is expensive. And many devices are not even reprogrammable without circumventing MCU protection bits.

This is mostly a non-issue with regular devices.

Comment: Re:Er, that's a bit confusing (Score 1) 155

by LordLimecat (#47571667) Attached to: The Problems With Drug Testing

From a humanitarian perspective, the quandary is "Do we want to allow the weakest among us to make decisions they are unqualified to properly weigh?"

Alternatively we could choose not to treat them like a helpless puppy or small child and accept that their decisions are as valid as yours and mine.

Honestly judging someone's qualifications to make decisions based on their financial state is pretty condescending.

Comment: Re:Experience outside the valley (Score 1) 477

by LWATCDR (#47568915) Attached to: Jesse Jackson: Tech Diversity Is Next Civil Rights Step

In the firmware development group I work in we actually have a good amount of diversity.
We will hire anyone with talent.
The lack of opportunity is not in the hiring area. It is in the home and education. Hiring someone because of race is bigotry. I doesn't matter if the race happens to be anglo or african descent.

Comment: Simple. (Score 1) 335

The Vendor will have issues with their product running if you do not configure the firewall correctly and will cost the Vendor support time.
If you get hacked because you let malware onto your POS systems or put a compromised machine on the network it is your problem.
A firewall will just prevent an exploit of a service. So only run the services you need. The real issue for this POS would be an exploit that gains access to the SQL server and a firewall is probably not going to stop that.

Comment: Re:Erlang is overrated crap (Score 1) 309

by gweihir (#47566855) Attached to: Programming Languages You'll Need Next Year (and Beyond)

Sorry, for the person I have this observation from, 1000 was actually on the lower end of what he needed. And yes, that was the right approach to the problem. He then found Java was a toy pretending to be a professional tool.

He ended up using processes and shared memory, which was a lot more complicated but did not suffer from extreme slowdown above a few hundred threads. Erlang would have been a viable alternative.

I also did say that this capability of Erlang was "special purpose". So what do you complain about?

Comment: Re:Functional Programming? (Score 1) 309

by gweihir (#47562557) Attached to: Programming Languages You'll Need Next Year (and Beyond)

The author really has no clue. He also doe snot understand what static and dynamic typing means and that it is orthogonal to weak and strong typing. Or that whether you have GC or not is not necessarily dependent on the language. You can attach a GC to C and have it working reasonably well.

This article was written by an incompetent wannabe.

May the bluebird of happiness twiddle your bits.