Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Pair sysadminning (Score 1) 186

Pair sysadminning is something I have actually done, and that has its uses. The guy who knows most has the keyboard, and the other guy has one finger tracing the manual's instructions, as well as a notebook where he writes down what happens and why, especially including things that won't be in the terminal session script like "I'll correct that later" or "This value should work, let's check".

But nowadays with Infrastructure as Code and Network as Code and what have you, you check your sysadminning code into git and you do reviews on it!

Comment Re:Email (Score 1) 146

Yes over 2 dollars per megabyte. I shit you not.

Using Sosh (a sub-brand of French Orange, whose client I have been since 1997, even though the monthly price is substantially higher than that of competitor Free), I got two different SMSs when arriving in the US. The voice price was substantially different between the two, but the data price was over USD 13 per megabyte. My fellow travelers use Free, the newest big French mobile phone company. They got an SMS saying that all their voice and data were counted like at home: unlimited with no surcharge, restricted bandwidth after 50 MB in 4G and 3GB in 3G, max 35 days/year/destination/person. For less that 2 MB using the Sosh price, I could have bought a month with Free just to visit the US. I'm wondering why my carrier still has clients.

Comment Re: John Oliver (Score 1) 954

Maybe you have enough gun laws where you live, and I'll not even contradict you if you say there are too many, I don't know in which state you live and I actually somewhat like the armed citizen concept.

On the other hand, there are lots of people on the so-called No-Fly list, who are not informed that they are on it and who cannot learn why they were put on it and have the greatest difficulties in getting off it.

These people are deprived of their constitutional right to travel from one state to another, they are supposedly too dangerous to board a plane after being X-Rayed and frisked, but they keep their constitutional right to buy machine pistols specially designed to be hidden under a coat or in a purse. Don't you see a contradiction there?

Submission + - NASA offers $15k for wicked cool air traffic technology (networkworld.com)

coondoggie writes: The space agency this week announced a $15,000 public contest — called the “Sky for All challenge” — to develop technologies that could be part of what it calls “a clean-slate, revolutionary design and concept of operations for the airspace of the future.” The challenge opens Dec. 21, and participants may pre-register now. The deadline for submissions is Feb. 26, 2016 and is being administered by crowdsourcing site HeroX.

Submission + - Contradicting previous study, cancer risk has strong environmental component (nature.com)

The Real Dr John writes: A new study published in the journal Nature provides evidence that intrinsic risk factors contribute only modestly (less than ~10–30% of lifetime risk) to cancer development in humans. The researchers found that the more stem-cell divisions that occurred in a given tissue over a lifetime, the more likely it was to become cancerous. They said that though some cancers clearly had strong outside links – such as liver cancers caused by hepatitis C or lung cancer resulting from smoking – there were others for which the variation was explained mainly by defects in stem-cell division.The researchers showed that the correlation between stem-cell division and cancer risk does not distinguish between the effects of internal (genetic) and external (environmental) factors such as chemical toxicity and radiation.They also found that the rates of endogenous mutation accumulation by internal processes are not sufficient to account for the observed cancer risks. The authors conclude that cancer risk is heavily influenced by environmental factors.

Submission + - Top 10 Predictions of the IT Predictions for 2016 (castsoftware.com)

OnQuality writes: Tired of Top 10 IT predictions? Well, we are. Mostly because they are usually too obvious. So to have a little fun, Lev Lesokhin, VP Strategy and Analytics, CAST software put this list together:

Top 10 Tech Predictions of Predictions

#1 — Robots will replace humans

Source – Robot manufacturers and robotics professors looking for funding

Our Prediction — The entire human population will soon be living a luxurious life of leisure as-yet-unrevealed robots, wholly unlike the unconvincing wire-strewn devices we currently see, will so remove any reason to get out of bed each day.

Automotive manufacturers and others will indeed further automate existing uses for machines. The task of integrating the various layers of software required to perform even such basic tasks in a ‘smart way’ will be harder than ever. On the brightside, software development will also be taken over by robots and the promise of standardized, interoperable and compliance systems may have a chance after all.

#2 — Your parents discuss the ’Internet of Everything’

Source – Telcos and Big Data vendors

Our Prediction — The irrational urge to connect every domestic and industrial appliance to the internet becomes unstoppable. More new uses will be found to link sensors, smartphones and corporate systems.

Integration of multiple devices and interfaces will cause more security holes because the app security industry hasn’t yet figured out that real security problems happen because of poor interfaces at the whole-system level

#3 – SQL Injections will be bigger than Drugs and Malware, Hack and Phishing will empty your bank accounts

Source – IT Security Vendors

Our Prediction – The cyber security hype cycle will continue to churn as companies keep throwing money at cyber training, tools and consulting. Yet still after billions spent over the past 10 years, several name brands will experience significant breaches. Customers will be up in arms, experts will continue to be mystified and CEOs will head for the door.

Those who continue to ignore the underlying structural integrity of their software will once again make headlines. SQL injection is the most common technique among hackers for stealing confidential. personal and financial information. In fact, the scars of multiple SQL injections can be seen on almost any critical app. Programmers will spread the epidemic by sharing tainted

compilers.

#4 — Software will be measurable (as if..)

Source – IT departments

Our Prediction — The dark art of code development will soon become, just a little, more like a science. Just as many other advances in technology the ability to improve quality will spur more innovation.

At this heavenly time of year, it is perhaps relevant to remember, the father of quality himself, W Edward Deming, once said “"In God we trust, all others bring data”. The combination of automated function points, a recognised set of global standards and tools to visualise progress on quality will finally provide some certainty to the effort and the costs in developing software, both in-house and by outsourcers.

#5 – Big Data and analytics will be evenBigger

Source – Big Data vendors (again)

Our Prediction — Even cleverer insights are possible, yet arguably, not necessarily needed, thanks to super clever software that analyzes every micro moment of every smartphone and web session. The data of the future will be so, er, Big.

As data pools increase the data hype will decrease. The vast amount of Big Data created will finally focus attention on real issues, like application health.

#6 — DevOps becomes Dev-Oops

Source – Storage and Data Management vendors

Our Prediction — DevOps, the bastard son of Developers and Operations, has become the ‘Jack of All Trades’ who is ‘Master of None’. The losers in this, the guys down in the basement, with the still-spinning disks, make a bid to reclaim their ‘rightful place’.

The de-skilling of IT operations and smaller teams, will produce worse code more quickly, which will result in IT systems which are fragile, not just agile.

#7 – 3D Printers Print 3D Printers

Source – 3D Printer manufacturers

Our Prediction — Just like PCs, iPhones and microwaves, every household will soon have its very own 3D printer. Reliability, safety and standards will be overrun by convenience and speed as the Hacker Manufacturercripples the consumer electrons sector, displacing millions jobs worldwide as Mom and Dad print whatever they need rather than buying it online. “Hey Mom can you print me a new IPhone? This one is cracked.”

#8 – The Cloud Turns to Smog

Source – Cloud-based enterprise software vendors

Our Prediction – Now that the rush to the cloud is mainstream, clear choice to cloudify everything will get a bit murky as legacy apps and brittle architecture fail to hold up to the demands in the cloud. To solve cloud performance, reliability and stability issues, business will simply move apps back on premise.

#9– Outsourcing becomes Outcome-based at last

Source – Systems integrators

Our Prediction – Instead of just paying for bodies, clients will start to pay for outcomes, or at least paying by output for software-related work. As automated software measurement becomes a broader reality, application service providers will be able to meter their output and provide a meaningful invoice to clients.

#10 Tech predictions will cease to exist by 2018

Source — CAST

Our Prediction – As the hype around vendor’s tech predictions gets a bit too cynical, the media will stop publishing these types of articles.

So what?

As has been proven time and again, in many cases, the effects of new innovations are overestimated in the short term and under-estimated in the long term. The common theme CAST sees in all of these predictions, one we thoroughly agree with is that the importance of software and so its quality, will be significantly greater in 2016.

Submission + - Security+, Ethical Hacking Top Security Certs (cybrary.it)

Nerval's Lobster writes: In its recent survey of 435 senior-level cybersecurity professionals, security-training firm Cybrary found that the demand for people who can protect IT infrastructure against attacks is only increasing. According to the data, the most in-demand certifications included (sequentially) Security+, Ethical Hacking, Network+, CISSP, and A+. The high ranking of the Ethical Hacking certification is interesting, given the longtime debate over its worth to security professionals.(Dice link) Whatever certifications they earn, however, tech pros will face a number of significant challenges in 2016 if they want to keep their workplaces secure, including vulnerabilities in the Internet of Things, the rise of “super bad guys” with increasingly sophisticated tools, and a generalized lack of funding to invest in relevant people and technologies. (For those interested, there’s also an interesting piece in Business Insider on how Ran Corey, who co-founded Cybrary, had to deal with Google abruptly banning his company’s app from the Google Play Store. For developers, it’s a good tutorial on what to do if you ever find yourself in a similar situation, and need to get your app unblocked.)

Comment Re: Sounds like a psycopath. (Score 2) 486

The news has reported that many of the attackers, prior to recent radicalization were shiftless layabouts with no particular interest in their religion and violated most of the popular tenets of it. They drank. They had sex. They did drugs. They obviously weren't praying on a schedule.

One of them actually owned and operated a bar (which was closed three months ago for drug-related activities).

Comment Bad compiler, then (Score 3, Informative) 246

My students regularly copy-paste from an otherwise excellent source in which plain vertical double quotes have been auto-replaced with pretty slanted quotes. GCC complains about the illegal character on line XXX, I usually have to explain, and that's it. No hair-pulling involved, only git pulling.

Slashdot Top Deals

Were there fewer fools, knaves would starve. - Anonymous

Working...