Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment ... or stay stuck on outdated software (Score 1) 106

Anyone stubbornly clinging to Windows 7 or 8 now has two choices: upgrade or stay stuck on outdated software.

I may not have a PhD in thinky stuff, but someone running Windows7 is on outdated software even if their word processor is current.

"Grocery store in the arctic goes out of business. Residents now have two choices: move or live in harsh conditions."

Comment In other words... (Score 2) 138

Corporate Vice President and head of Windows, said that voice will emerge as a primary input

Translation: In the same manner that Windows came up with a narrative about why screenshotting user activity is "good for the user", they're now coming up with a narrative about why listening/storing all audio at all times is "good for the user".

Whereas to me, this means windows machines now officially join the ranks of other machines-- like Alexa -- that I refuse to allow in my house EVER. It's arguable I could/should have gotten there even prior to this; let's call this the straw that will finally motivate me to go to the mattress about the issue with other people I live with.

Comment Re:Nice to see the WSJ on it (Score 1) 61

The WSJ is actually read by influential people in most industries and there's been a problem with the lack of pushback against those promoting AI.

I read that Luigi Mangione was motivated by his conversations with an AI. I wonder if that'd get through to them?

(It was, btw, an AI that told me that.)

Comment "More valuable for code than words"... riiiiiight (Score 2) 128

Artificial intelligence has proved to be even more valuable as a writer of computer code than as a writer of words.

I see zero evidence of this. I HEAR it all the time in articles like this, but as far as people I work with or code I experiment with myself using AI, AI has proven to be maybe break-even for very simple, limited-domain things (basically the rough equiv of looking up an answer on stackexchange), and far worse than nothing when doing complex system design (during which I spend so much time shaking out the plausible-sounding but ultimately-bullshit answers that I net lose time).

I know I'm just an anecdote and a small sample base, but I do this for a living, and I don't see anything approaching the benefit that such articles spin.

Ask yourself: if it's so easy to use, where are all the apps written by your neighbors, and the local firemen, and the grocery store folks, and so on?

Comment Telecoms not interested in security (Score 4, Interesting) 10

About twenty years ago, I was privileged to be one of the authors of a security specification written at the behest of cable-based telecom companies that described the detailed design of a system for securing phone conversations that were carried over their networks. https://www.cablelabs.com/spec.... The design specifically started with the assumption that the network was penetrated, and was designed to ensure that the attacker could neither disrupt service nor learn anything useful about the traffic (for example, taken from the specification: "All media packets and all sensitive signaling communication across the network [are] safe from eavesdropping. Unauthorized message modification, insertion, deletion and replays anywhere in the network [are] easily detectable and [do] not affect proper network operation").

Once the specification was completed and it came time to deploy, all the telecom companies decided (whether in concert or individually, I do not know) that they were not going to deploy the design. When the lead security VP at one of the major telecom companies explained their decision to me: "We don't need gold-plated security like you've designed: we have firewalls"; I knew that the battle was lost. I also wondered how long it would be before the kind of intrusion like the one described in the article would occur.

Frankly, I'm amazed that it took this long; perhaps, though, what took the time was not the fact of a thorough intrusion, but, rather, the detecting of one.

Comment Re:Local connections (Score 2) 52

When you call the store three miles from you using a local number, you won't get routed to Vidhya who's sitting in a call center somewhere in India.

Not true: I had exactly this happen to me this past week. FWIW, it was the local UPS store... and I got routed to India instead of the phone at the local store despite having called the local number.

Then not only did I have to navigate a phone tree that very nearly caused me to throw the phone across the room, but then (after hitting '0' so many times I lost count) got to speak to two lovely Indians, neither of whom -- as far as I could tell - had more than a very basic grasp of English. I say "as far as I could tell" because both the initial person and her supervisor had accents that were all but incomprehensible. In the end, I slammed the phone down, got into my car, and drove several miles to the store to talk to one of the people there in person (I should mention that they were very nice, sympathetic and apologised for the experience I'd been put through, even though, obviously, there was nothing they could have done about it).

Still, corporate UPS -- like so many companies these days -- are obviously unconcerned about the image they are projecting to the public.

Slashdot Top Deals

In computing, the mean time to failure keeps getting shorter.

Working...