Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment Re:there has to be a systemic source (Score 1) 141

It comes from all over. Cruise ships and other large carriers dump their trash into the ocean. Some countries dump their trash into the ocean. Some countries don't cover their trash-filled landfills, and the debris becomes airborne and land in the ocean. And those are just the intentional ones -- if a ship capsizes, you don't think it's contents just disappears, do you?

It dosen't take one large source for this to be a problem. As time marches on, it is a bunch of little sources that are contributing to make one big mess.

Comment Re:What do you expect? (Score 1) 145

My laptop holds about a 9 hour battery charge while in use (if I set the display brightness all the way down). My cell lasts about 7 days on moderate use, but if I turn on the tethering, it drops down to about 4 hours. I carry a few of those small USB batteries which usually make the cell last for my trip.

I'm able to travel and have connectivity if the poop hits the oscillator if I need it, provided I'm within data service of Verizon (likely) or TMO (less likely). It's best to check with the carriers first to make sure they have something in that area.

I'm lucky my co-workers can handle about 90% of any situations that can arise. And 50% of those that they can't can usually wait. Unfortunately, being understaffed in an IT role means that you do need connectivity sometimes. You may want to find out if you can form a partnership so you have some backup for those emergencies... Forming a partnership just for coverage isn't bad -- and I'm sure there are people you've learned to trust that can help you out.

Comment Re:How many license plates is that? (Score 1) 275

You are also assuming that they are only storing the license plate date. Chances are, they are storing lat/lon data, direction of travel, and more than likely, a picture of the scanned license plate. Also, the OS, software for the reader, DB software of some kind, etc. etc.

Comment Re:In Theory - Thor (Score 1) 87

I for one have seen men and women working in IT with said skills. Besides, why would you even be using an authentication protocol your own staff has no clue about? That's just calling for trouble.

Also, the ROI estimates I've usually seen decision makers rely on are one dimensional plain simple characterizations that hardly reflect the real world we live in. It's an insanely complex task getting it right and all that money could be used in actually getting things done.

Sure, I've seen quite a few people with those skills. They don't work for me, and they probably don't work for the OP. If authentication is not in your line of business for your company, why are you making an internal product to do it? Oh, and it's a lot easier to implement a protocol like LDAP or RADIUS in an existing application than to build one from scratch. Knowing about 3DES TLS sockets is important, but let the professionals write the implementation.

If it was easy to do, the list would include hundreds of products -- many of them open source. That should give you a clue.

Building and open-sourcing custom solutions tailored for your personal needs is pointless. We're not talking about some universal it-does-everything solution, but a solution that will be tailored in-house to fit *your* unique combination of services and software. Nobody else would have the same needs as you.

Sure. Your business is a special snowflake for everything you do. I get it. No other business has ever tackled doing authentication management before ever -- and none of them have ever integrated with one of the common SaaS products before. It's a good thing you are spending multiple man-years building an internal product rather than focusing on stuff you can sell, implement, consult on, or you know, make money on. Spending 1 FTE year building something that can be bought off the shelf for $50,000 is not worth it, if that product for $50,000 can do everything for you already.

Comment Re:In Theory - Thor (Score 2) 87

Oh, it CAN be done. You just have to have somebody on staff who is an expert at RADIUS, LDAP, AD-AUTH, Kerberos, OAuth and probably a dozen other protocols that deal with authentication and authorization. Oh, and then a proper security audit because if you do it in house, are you sure that you can't drive a MAC truck through it?

Having done the ROI estimate on such a project, we couldn't do it. And this was for a company that had at least standardized on products that use RADIUS and LDAP for all things they offered auth for.

If it was easy to do, the list would include hundreds of products -- many of them open source. That should give you a clue.

Comment Re:Well, not ALWAYS the case (Score 1) 381

He's never brought it up publicly, so I don't know. The petition on hasn't reached the threashold for him to comment on yet either. Bush Jr. (W) changed the law significantly for those who were in IT. A majority of us weren't considered professionals who now are under the law. In 2002 Network Techs, Programmers, IT workers, etc. were all newly considered "professionals" and became OT exempt at the federal level. Some states like California and Connecticut passed individual laws that didn't make all IT workers OT exempt.

Comment Re:Well, not ALWAYS the case (Score 3, Informative) 381

Overtime is not guaranteed for anybody classified as a professional -- and our last president decided to expand professional to include "anybody who who uses a computer for a primary function of their job." Smart companies who don't like to burn out workers will provide benefits like OT past 40 hours (or in your case, 44), and discourage work outside of business hours. Companies that see employees simply as Human "Resources," no different than copiers or PCs will often get as much as they can out of them without regard to efficiencies, health or happiness.

After the stock market crashed, I saw the shift at my own place of business. Positions were cut or not re-filled after retirements, and more and more workload was added to the job. The number of hours started creeping up -- slowly at first, but then as it happened it became normal then expected. Where we should have two full time shifts we have one. All the after-hours changes and maintenance work is done by those that work the day shifts. It's caused quite a few people in our department to look for new jobs.

I used to work at Intel, and they had a very strong, employee-focused approach at their jobs. They highly discouraged anything beyond 40 hours, and if you did (it happened every so often), we got paid. Projects that required additional resources generally got them either via temporary help or from others in the organization. Places like that do exist, but they are becoming rarer and rarer.

Comment Re:What after one year? (Score 2) 374

As already stated in the comments a few times, it will be free "forever" after you upgrade, since you already had a license. You still keep downgrade rights to the version you upgraded from. New PCs, if you wait longer than a year, and rebuilds where you don't have a license anymore, etc. will have to pay for a full license when it is out.

Comment Re:Just a question on Jira stability (Score 2) 70

We use JIRA at Apache for all the Apache projects. I wouldn't say it's the best software in the world, but it is better than most of the other ones I've personally used. They don't seem to have the stability issues you listed . Some of my direct clients use JIRA as well, and they have never mentioned stability issues with it either...

Comment Re:KISS (Score 1) 103

Or how about you use a large-format "scantron". You fill in the bubble, and scan it. The paper copy can be re-counted, but it can be easily electronically calculated. Why do we need the touch screen? It seems like people want to introduce technology just for the sake of introducing technology.

Comment Re:Accessibility in Linux is NOT great (Score 2) 65

So, you are saying that if you are blind or have partial sight there is no point in you ever being a programmer, maker or grid admin?

While I'm lucky to have most of my sight (I'm only blind in one eye), some of my good friends are completely blind. One is a system admin and is a very functional member of society. He admins a few dozen Linux servers but is completely unable to use Linux as a desktop.

But accessibility is not just about the blind or deaf. It also includes color blindness, those who are unable to fully click a mouse, etc. Having a myopic view of how people use computers is not a great position to be in. If you think about accessibility then your products (or apps you write) start to become more open and easier to use on other platforms like tablets, phones, tv's.

Thus spake the master programmer: "Time for you to leave." -- Geoffrey James, "The Tao of Programming"