Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment: Security challenge (Score 1) 382

by bbasgen (#49737417) Attached to: Ask Slashdot: Best Way To Solve a Unique Networking Issue?
As others indicate, it is certainly possible to overcome this challenge. Practically, I wonder about cost to scale. The cost efficiency argument is cost to build out and maintain the solution versus the labor cost of manual changes.

Security hasn't been mentioned, and is rather important. Principally, I would want to know about (a) the regulatory requirements and (b) the risk of whatever security controls you would put in place (e.g. the loss potential) versus the value gained.

All of that said, if I owned a company doing what you described, I would certainly investigate options six ways from Sunday to find a better method, and I would suspect a better one than what you described is possible.

Comment: Long term decision, short term concerns? (Score 1) 734

by bbasgen (#49197047) Attached to: Ask Slashdot: Should I Let My Kids Become American Citizens?
The US tax code for expats is presently highly problematic. There is good cause to have little faith in near term remedy. The decision on citizenship is considerably long term. My dad gave me advice as a teenager that has been the most valuable guiding light in my life: in whatever decisions you make, tend towards solutions that open more doors of future opportunity than they close. Us citizenship doesn't really limit opportunities, but it certainly has present day liabilities. Renouncing citizenship is a relatively inexpensive option. Gaining citizenship is considerably more expensive.

Comment: Security requires availability! (Score 4, Interesting) 244

by bbasgen (#47456051) Attached to: German NSA Committee May Turn To Typewriters To Stop Leaks

The core components of information security are often misunderstood. The triad of confidentiality, integrity and availability are important to consider. There is a symbiosis between these three components. For example, if confidentiality and availability is highly restrictive, can we really be confident in the integrity of the data with so few people who have such limited access?

The old adage, being so tragically expressed here in real world terms, that the only "secure" computer is locked in a vault at the bottom of an ocean belies the very nature of security. For data to be useful and meaningful, it must be accessible to the people who need it when they need it. Failure to properly deliver accessibility will consequently build pressure on confidentiality (e.g. it will be shared inappropriately) and/or data integrity (e.g. the data will grow stale/irrelevant/etc).

A typewriter is a medieval instrument for data security. Because they have rockets, they might as well start building castle walls. They are, in essence and by design, surrendering. Sun Tzu would be proud of such an adversary that could create this result. Masterful.

Comment: That that is (Score 1) 66

by bbasgen (#47270921) Attached to: HUGO Winning Author Daniel Keyes Has Died

Perhaps one of the more important works in the geek lexicon of art. The book and the film were very inspirational for me. For the first time as a child, I understood and could relate to that thing we have called pattern recognition. The moment in the film at the chalkboard was etched into my mind -- that that is is that that that is not is not is that it it is. Understanding the differences between people, and understanding them in their depths without glorification, is such a positive thing.

We are lucky to have art such as this and for all you old folks (over 30, naturally), ask the geek kids you work with or know to read the book or see the film. They may never have heard of it!

Comment: Re:FTL or Wormhole Travel (Score 1) 358

by bbasgen (#47164447) Attached to: The Disappearing Universe
Great post overall, just one comment:

It doesn't matter, it's just math(s), the end result is that we will never see that laser and we will never be able to reach that galaxy either.

Infinity and void are incredibly powerful concepts, but I don't think "never" is particularly useful, especially when describing a universe for which our body of knowledge is so incredibly limited.

Comment: Re:Not so quick (Score 4, Interesting) 358

by bbasgen (#47164359) Attached to: The Disappearing Universe

From every description I've heard of "dark energy" it sounds like a kind of place-filler variable for something--as in, "This equation only works if we put in X, but we have no idea what X is."

Physicists brought us the dark energy hypothesis, not mathematicians. This is an important distinction: dark energy is not used to solve an equation, rather it is a phenomenon that we can indirectly observe.

Black holes, Dark energy, Zero point energy -- there are so many nascent concepts that hint at great disruption to our theories but that have not had the time to sort themselves out. Humanity rigorously worked on the concept of gravity for several hundred years before we had our Einstein.

Comment: Re:... or just don't take notes in class (Score 2) 191

Well said. The finding of the article is interesting: student's that use laptops tend to attempt to take verbatim notes. The laptop isn't the issue, this is a problem of how to properly take notes. Class time is best used for comprehension rather than rote learning. To that end, an effective use of a laptop during class would be to look things up as the professor talks about them. As stated above, notes are best saved for after class to be taken during study time.

Comment: Re:"Three years ago today" (Score 1) 142

by bbasgen (#46902397) Attached to: The Guy Who Unknowingly 'Live-Blogged' the Bin Laden Raid

I think you have made a good, reasoned argument.

I just have one important point of caution for you on this statement: "The two atomic bombings killed a quarter million people. On its own, that's horrifying. In the context of the Second World War, that's a rounding error."

While relativity is important in a great many things, it is problematic to use from an ethical point of view. Many atrocities were committed by all sides in WW2. In fact, all sides committed mass atrocities of some kind or another: the fire bombings being particularly awful. This was the reality of WW2 and has given terrible clarity to the reality of what "total war" means.

My point here is simply this: the atomic bombings of Japan were absolutely horrific tragedies. It is an event that stands alone in human history when so many civilians have been killed in an instant. It stands in rare company by the magnitude of civilians that slowly died a truly barbaric death in the hours following. I don't think it is possible to ethically justify total war, and by consequence, no substantive part of it. Thus, while total war was necessary for all sides to wage, all sides had to take unethical actions. I think we would agree on this point: that being ethical in total war would be self-defeating in fact: it would completely ignore the reality of what total war is. This is, simply, where I think people get mixed up about the bombings. They happened because it was total war. But they were not a rounding error on any scale: they were an awful event in our human history that we can only hope is never emulated.

Comment: Change your mind set (Score 1) 125

by bbasgen (#46870175) Attached to: Ask Slashdot: Intelligently Moving From IT Into Management?

You are challenged by a common struggle for IT professionals who start technical and move up through management. When moving up from within, it is very important to challenge yourself to let go of the old role and start anew. Your starting point when you hire someone should be that you trust and have confidence in them to run the shop under your direction. By retaining any sort of privileges, you would undercut that confidence and place your relationship with your IT staff on crutches.

Develop your abilities to hire well and trust your hiring decisions. Be willing to take a chance: become uncomfortable with your new role. You should have reservations, not about departing from your old role however, but instead about all the changes and unfamiliarity that come with moving to the "top floor". Good luck. It sounds like you are in a great position with a bright future.

Comment: Claude Shannon: the enemy knows the system (Score 1) 381

by bbasgen (#44220497) Attached to: Ask Slashdot: Preventing Snowden-Style Security Breaches?
As the founder of modern information theory Claude Shannon so eloquently stated: the enemy knows the system (Kerckhoffs's principle). To the question being asked: it is problematic when the information assets are published, like the wikileaks exposure of diplomatic cables. In this instance, however, it is the system being exposed, and not particular information assets (at least to my limited knowledge). Thus, as an organization I think the worry is not about the system you use, but instead about your information assets. There is no simple answer to protecting information assets from insiders short of saying: defense in depth. :)

If I have seen farther than others, it is because I was standing on the shoulders of giants. -- Isaac Newton