Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Old Man Look at yourself I'm a lot like you _are_ (Score 1) 574 574

IMHO, Neil Young has settled in to the Old Man who's younger self was the same, except as the older man. From all the interviews I've seen, he's hated digital recording (cd's), doesn't like what MP3's do to music, and doesn't like streaming. Even though, as a singer/songwriter streaming will pay him just fine.

Comment Re:Knowing when not to (Score 1) 345 345

I really like your point about the C++ Master writing for a C++ Novice. I've always had that as a goal, make statements that are easy to read, but at the same time powerful.

One thing I've thought that is a most important feature of C++ are automatic variables, which leads to Acquisition is Initialization ( https://en.wikipedia.org/wiki/... ). In some ways C# (and .NET) has this ability, but Java definitely doesn't do so well. Resource allocation (pointers, mutexes, files, etc.) are some of the hardest things to keep track of in any language. Garbage collectors are fine, but even languages with these don't do so well with OS objects (files, semaphores, etc.). I think C++ shines when you can master this pattern and use it to make very readable and reliable programs.

Comment A consultant's experience (Score 3, Insightful) 110 110

In my experience as a consultant, this is the case because Business Managers don't trust IT because:

1) The IT department inserts (perceived) too many non functional requirements on a project increasing cost or schedule.
1.a) (Perceived) The IT department doesn't care about the needs of the Business Manager's daily business.
2) Internally the IT department did not deliver on it's own projects within cost or schedule.
3) There's no way that an employee could be as smart as a consultant.

Having been a former IT employee and now a consultant, points 1, 1.a, & 2 are valid, point 3 is just bunk. Now being an consultant, I prefer to work with Business Managers because:

1) Business Managers have a vested interested in seeing a vendor project complete, where as IT typically does not, it's not their money or idea.
2) Business Managers will make time to meet with a vendor, where as IT typically think of vendors as hired hands, about as valuable as the lady who vaccuumes the floors every night.

Comment Re:PRIVATE encryption of everything just became... (Score 1) 379 379

The question is not breaking the key but determining the message underneath. The blocks are still only 128 bits in length, deducing these can be trivial, and that is how the HTTPS/SSL/TLS attach are accomplished, via known plain text attacks.

Comment Re:PRIVATE encryption of everything just became... (Score 2) 379 379

Today on CNN, the commentators after the Brennan press conference said that the CIA was correct in saying that no non-bad-guys were killed by drone strikes. That's because the CIA redefined bad-guys to be any human of fighting age (13-60). So, that means that Grandma and your kid brother are free to use encryption, because they definitely aren't terrorists. They get to keep their shoes on at the airport, so there you go!

Comment Re:PRIVATE encryption of everything just became... (Score 1) 379 379

Thanks TechyImmigrant! Lost track of the block size for a moment. Over the last three years, I've been developing a block cypher. I was surprised to see that AES sole security is XORing the key with mono-substitution translations of the plain text. The 128 bit version can be broken on my laptop...

Comment Re:PRIVATE encryption of everything just became... (Score 2, Informative) 379 379

Don't forget it is the NSA who approves what type of encryption are legal for citizens to own. In the case of AES relies solely that combining 256 random bits with 256 non random bits, sufficiently, is too difficult to decipher except for the most powerful computer systems.

Comment Re:Should be Easy to Check (Score 1) 178 178

There was a case where Best Buy (long time ago when 100MB Zip disk were the rage) re-sold Zip-disks containing someone's pr0n stash. So the source of the media doesn't really matter.

Any media, no matter what it's packaging can be a vector for viruses. USB is the most heinous because a device could be the size of a micro BlueTooth tranciever, report it self as a keyboard, and install gigabytes of virus code on a computer system. There's no bigger risk to security than physical contact.

Comment Re:Diversity vs monoculture (Score 1) 123 123

Mexico really got the short end of the stick, but it happened for a couple of reasons. First off was the nationalization of oil production. US oil and gas companies had explored and drilled for oil and were reaping the benefits of harvesting it. Then the government declared these oil operations were owned by the government (part of a socialist movement, still alive in Mexico today).

Although Mexico was one of the most stable Latin American countries from 1920-1970, the oil crisis of the 1970's (caused by Nixion's decision to take the US of the gold standard and cause US currency to be 100% fiat) caused major inflation during that time period. This causes Mexico to default on its external debt, in 1982. Through out the '80s, the result was inflation and devaluation, causing major harm to many Mexicans who did not have inflation protection based on debt obligations (i.e. the common man).

http://en.wikipedia.org/wiki/M...

http://en.wikipedia.org/wiki/M...

"Kill the Wabbit, Kill the Wabbit, Kill the Wabbit!" -- Looney Tunes, "What's Opera Doc?" (1957, Chuck Jones)

Working...