Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: A more intringuing question... (Score 5, Informative) 320 320

would be why I still choose to read Slashdot instead of ... anything else.

Let me quote, from the comments thread at a recent article by same submitter:

Could we stop having Dice articles submitted by Nerval's Lobster? Why not fully disclose that the story was submitted by the corporate parent of Slashdot?

Another user, in the same thread, had speculated:

What comes next, a thread on "is Emacs better than Vi"?

No, sir, you were utterly wrong. It came "Postgresql is better than Mysql".

Comment: Paralell cable (Score 1) 466 466

By using the LPT port and a special (but not too rare or expensive) cable, you can transfer at about 50Kb/s If you can at least copy/software from a diskette, you could try with Total Commander, which has a Win 3.1 version (1.5Mb), and which include that functionality, very easy to use.

Comment: Re:Recursive? No, very iterative. (Score 5, Insightful) 622 622

Ever since programming languages existed, they have been classified in 2 categories: - Those every one bitches about, - and those nobody uses...

Sounds clever, but it's plainly false.

C, Java, C# are among the most used languages today. Very few serious programmers will say that they are stupid or awful. And, many criticisms aside, most programmers respect them - even love them. I program in all these languages, I like them all, and I hate PHP with passion. It's not an issue of popularity; PHP, its community, its history, all of it, is a tale of terror.

Comment: Re:Well, they're a good indicator of intelligence (Score 4, Insightful) 672 672

In my experience: They're a moderately good indicator of a special kind of intelligence; which is not a very useful indicator in the typical hiring process.

Puzzles help to distinguish programmers from lawyers. Not to discriminate good programmers from bad programmers.

Comment: Re:For sure Marx had a point (Score 1) 1271 1271

But identifying a problem is not identical to finding the correct solution.

It is a prerequisite, though.

Perhaps not.

A book of modern social inquiry has a shape that is somewhat sharply defined. It begins as a rule with an analysis, with statistics, tables of population, decrease of crime among Congregationalists, growth of hysteria among policemen, and similar ascertained facts; it ends with a chapter that is generally called "The Remedy." It is almost wholly due to this careful, solid, and scientific method that "The Remedy" is never found. For this scheme of medical question and answer is a blunder; the first great blunder of sociology. It is always called stating the disease before we find the cure. But it is the whole definition and dignity of man that in social matters we must actually find the cure before we find the disease .

G. K. Chesterton

Comment: Linkedin teaching bad habits (Score 1) 186 186

Some days ago I tried to login in http://www.linkedin.com/ , using my gmail address as my id. I typed my linkedin password (as I remembered it) and an error appeared with this message:

"Invalid username and/or password. Please enter your email password, not your LinkedIn account password"

You can try that yourself, using any dummy email address.
I saved a screenshot here.

(notice that it's not even a secure -https- page!)

Ok, I said to my myself, it seems I must enter my google password... I entered it, press "continue"... and two seconds later I though:

"Wait a moment... What...? What I have done?? How can linkedin ask me to sent to THEM my Google password ? Are they nuts? Am I nuts?"

I immediately went to my Google account and changed my password, just in case. But I still can't understand it.

Comment: Re:They Lied (Score 2) 333 333

The old policy said our files were encrypted with mil-spec encryption, etc etc. Now they're telling us they'll turn our files over if asked. Dropbox lied.

I don't follow the reasoning, I really don't get the lie. Files are encrypted, but Dropbox system knows the encryption keys. That "employees" cannot decrypt them, it's an issue of internal privileges and internal security - I always assumed that we are speaking of support/maitainance people here. Mr root-Dropbox can read my files (if I've not encrypted them myself), I always have taken that for granted, as a Dropbox user.

To point to another privacy issue: it's well know, for example, that Dropbox has a clever management of file contents, based on hashes, to allow efficient renames and content sharing. Say I upload a porn clip and I call it "leaning_java.avi". If another user has upload the same clip with a truthful name, then dropbox is aware of that (and ot doesn't duplicate the storage bytes, just links both files to the same storage), and my upload is practically instantaneous. So, Dropbox knows that my "learning_java.avi" is the same file as pornaddict's file "anal_fest.avi". Go figure.

VMS must die!

Working...