Forgot your password?

Comment: Re:Corporations have more rights than individuals (Score 1) 559

by gers0667 (#31955058) Attached to: Google Street View Logs Wi-Fi Networks, MAC Addresses

I'm not arguing the legality of decrypting information.

I'm saying if you don't want to be known, don't broadcast that you are around.

And Google isn't decrypting anything. They are taking information which is part of the wireless protocol and recording it.

Comment: From Second Hand Experience... (Score 1) 207

by gers0667 (#31632218) Attached to: Fixing Internet Censorship In Schools

My wife is an Art teacher and runs in to this problem all of the time. She tries to show her students famous works of art, the easiest way being through Google Image Search. Of course, this doesn't work, since you could possibly get something bad. For now, she uses Bing's image search, but it's only a matter of time before this is killed, too.

Comment: Parse Tree Analytics (Score 1) 684

by gers0667 (#31112446) Attached to: How Easy Is It To Cheat In CS?

Although I never saw it in action, my professor told us in our compilers class that they use a piece of software for the intro classes which compares the parse tree of the Java apps the students submitted and could show commonality between the programs.

Of course, you would see similarity because everyone was writing a similar program, but it would catch someone just renaming a pile of variables and changing comments.

Comment: Re:Voicing This Problem Now (Score 1) 250

by gers0667 (#30313020) Attached to: FCC Preparing Transition To VoIP Telephone Network

We don't see too many problems with the machines for transactions, but for longer operations, like batches and reprograms, they tend to fail.

We also deal with a lot of vendors, so some phone systems work if they are set up properly, but most aren't are are not configurable, like Vonage.

Comment: Re:Voicing This Problem Now (Score 1) 250

by gers0667 (#30311856) Attached to: FCC Preparing Transition To VoIP Telephone Network

You'd need an isolation network for every single business in the US (10's of millions, IIRC).

Also, the current IP solutions are SSL encrypted. Also PIN based transactions have an even higher encryption on them. The PIN Pads have a specific key attached to them so they will only work with the current backend. If you switch processors, you have to switch PIN pads as well.

Another problem, the IP terminals a quite a bit more expensive. $200-$300 for dialup, $500-$600 for IP. (If you're paying more, you're being robbed!)

Comment: Re:Voicing This Problem Now (Score 1) 250

by gers0667 (#30311302) Attached to: FCC Preparing Transition To VoIP Telephone Network

IP terminals do exist. The problem: merchants typically aren't savy enough to first, set up an IP network and second, request an IP terminal.

We have to do a lot of discovery on our end to provide the right solution.

Also, the IP terminals are fairly "dumb". The OS is very minimal and it only makes outbound connections. You can't really administer them remotely; it's all through the machine interface.

Comment: Voicing This Problem Now (Score 1) 250

by gers0667 (#30310066) Attached to: FCC Preparing Transition To VoIP Telephone Network

You can throw away your dial-up credit card machines then. We are starting to see telcos switch to SIP trunking. Credit Card machines are very sensitive, even more so than fax, which causes them to flake out across a SIP trunk. We already can't sell dial-up terminals to people using DSL or VoIP (Vonage, Time Warner) because the terminals just can't handle it.

Comment: HIdden Cost (Score 2, Interesting) 362

by gers0667 (#29219925) Attached to: US Call-Center Jobs — That Pay $100K a Year

I won't name names, but one of our competitors does this. The down side, they over-inflate their prices to the customers to compensate for 6 digit salaries for sales people. They are lucky to be in a business where they can pull this off because of the complexity of pricing, but as with any market, the margins get thinner and thinner and they just won't last.

Comment: Security Is About Trust (Score 1) 730

by gers0667 (#29058523) Attached to: Why Should I Trust My Network Administrator?

If you are that afraid of them doing something wrong, it better be in the contract you sign with them with all of the penalties plainly laid out.

I would much rather have the IT Admin in house, but then again, I'm an IT Admin. We have to sit in a weird spot in the company. We have to learn all of the dirty secrets. If someone is divulging secrets, we are the ones that have to pull up their email records and browser history.

I take that responsibility very seriously. You have to find someone that takes it seriously, too.

Comment: Re:Vim (Score 1) 1055

by gers0667 (#28108595) Attached to: What Free IDE Do You Use?

I primarily program using Ruby on Rails. When I started, it was with an Eclipse based IDE. I then jumped to Netbeans when their support for RoR matured. Now it's all (gvim/mvim), a command line and git.

For Java work, I stick with Netbeans, since hand building a Java project from scratch can be a lot of work.

Never say you know a man until you have divided an inheritance with him.