Follow Slashdot stories on Twitter


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Prototype Raspberry Pi Case (Score 1) 258 258

by grilled-cheese (#50011485) Attached to: Ask Slashdot: For What Are You Using 3-D Printing?
I've used ours as part of an internal innovation challenge to prototype a specialty purpose raspberry pi case we could securely mount inside a classroom that could house a touchscreen and a magstripe card swipe, but was tough enough it could be smacked with a backpack without significant damage and expose only the barest of essential external ports of the raspberry pi.

Comment: Interesting implications for subterranean homes (Score 1) 94 94

by grilled-cheese (#49698411) Attached to: Biologists Create Self-Healing Concrete
One of the challenges faced by building subterranean homes is the threat of water damage over time as the home settles. Typical solutions include lining the outside of the shell, french drains, and/or reinforced plasticized concrete. Even when thinking more inside the box with traditional building, there are significant benefits to things like healing cracked slabs or preventing basement water damage.

Comment: It's a simple question of trust (Score 1) 438 438

by grilled-cheese (#49585757) Attached to: Rand Paul Moves To Block New "Net Neutrality" Rules
Net Neutrality boils down to a basic concept. Who do you trust to maintain order and prevent abuse? An industry that has demonstrated an inability to do that with itself, or a government revolving door that has demonstrated the same thing? I lean toward letting the government get their paws on it from a regulatory standpoint just because in theory it's more accountable to the people and we already know the path we're on won't end well for consumers. It's only the lesser of two evils, and admitting that once regulatory bodies get their hands into an industry rarely do they ever let that power go in the future.

Comment: Ignore other auth holes (Score 1) 76 76

Ignore the fact that a Google Apps domain can use their own SAML SSO solution to effectively replace the Google signin page. This means that their new anti-phishing plugin would be rendered useless. Additionaly if this is used on a domain, it also bypasses their two-factor authentication mechanism (even if you set it up).

Comment: Not quite a monoculture (Score 1) 35 35

by grilled-cheese (#49521727) Attached to: OSGeo Foundation Up In Arms Over ESRI LAS Lock-In Plans
ESRI does have some competition, just not a lot. You can find GIS shops that run Autodesk Map 3D (merged with autodesk topobase a while back) and Intergraph. Which of the 3 you use is largely dependent on your region. Intergraph is fairly popular outside the US. Autodesk tends to be more used in the western US, and ESRI is about everywhere else.

Comment: Lack of an air gap, the first mistake (Score 1) 105 105

by grilled-cheese (#49487799) Attached to: The Voting Machine Anyone Can Hack
What person in their right mind thought giving these things any kind of network connectivity was a good idea? Have we not learned from stupid decisions by SCADA system architects/administrators? If a network exists, the scale of a breach that will occur goes up drastically. A human being needs to be involved to physically relocate a certified write-once component from each machine to a central aggregator and then seal those removed components for audit verification. If I can have a hash verified write once knoppix dvd, why can't they build a verified write once voting machine OS/Application?

Comment: Let companies decide how they value experience! (Score 2) 348 348

by grilled-cheese (#49220433) Attached to: Obama Administration Claims There Are 545,000 IT Job Openings
Good hiring IT companies already include a years of experience equivalency to higher education. There is basically two traditional paths in IT work. First, you get the 4 year degree and have less experience in the field with specific technologies. Second, you dive straight into the industry doing grunt work while getting whatever certifications you can along the way and generally end up being more specialized. Your hiring policies can discriminate between the two because they are actually different, or they can dictate whatever period of industry experience/higher ed ratio you view as sufficient to do a job. Even once you have applicants, you still have to vet their credentials by checking certification, employment history, and degree course catalog. Not every degree is worth something. Universities that try to pawn off bachelor degrees as just a collection of certifications are very different than ones that provide a broad understanding of IT from top to bottom with the ability to learn on their own quickly to adapt to the rapid pace of technology changes.

I have my BS in computer science and I've been able to fill the roles of system administrator in multiple OS, storage administrator, network administrator, telecom worker, QA manager, DevOps lead, and programmer. I couldn't do all that if somebody had just fed me the cisco certification path. There is a market for people who did that though.

Comment: An ISP Fast lane you say? (Score 1) 131 131

So what you're saying is that an ISP is creating a "fast lane". I'm sure that this is for everyone's benefit, and will continue to encourage them to increase their overall support capacity while ignoring the monetization/influence effects it might have.

If you can't learn to do it well, learn to enjoy doing it badly.