Become a fan of Slashdot on Facebook


Forgot your password?

Comment No it can not, because most is not science (Score 1) 444

No, it can not. The problem is science long ago became a buzzword and has since been used for many things which is not science at all. The entire scientific process is about observations and experimentation and developing repeatable and predictable experiments which can be used to prove or disprove theories which are used to explain the behavior. If you can't create a repeatable and predictable experiment then it's not really science.

This isn't to say that theories can not be used to potentially explain past events and much of science is done trying to do just that, but as soon as you make a claim that some past event *MUST* have been caused by some previous event you have left the realm of science. It may be the best theory and there may not be any other understood cause but unless you have a reliable observation you can never be certain. Therefore much of science is also based on assumptions which is fine as long as you understand that they are just that... they are unproven assumptions.

It gets more complicated when theories build on each other because while it can be very helpful it is often easy to lose sight of the base assumptions or worse get into cases where your basis of support is a circular argument that theory A proves Theory B which proves theory A though almost never as simple as two theories.

Comment Re:H1B distorts the market - a form of slavery (Score 1) 612

My idea has always been to just make sure that the cost of the visa to the company includes the cost of sending 3 Current Residents to though an educational program to enable them to qualify for the position. When faces with paying college tuition for 3 others, plus the cost of the person they hired... the difference between in cost is unlikely to favor using the visas for cheap labor.

Comment No, but they may not be right for you. (Score 1) 464

I have had progressive glasses for more years than I care to think about. But I am near sighted so can read without them. My first glasses had small bifocals in the inside bottom corner and that worked when everything you needed to see was either near (reading distance) or far away. The problem is a computer screen is in between and what progressive lens do is give a smooth transition between near and far, so for any distance you can look though some part of your glasses and have it in focus.

If you only need reading glasses and can see the monitor without your glasses then maybe you can skip them when using the computer, but if you need them to view the monitor but not distances greater then talk with your optometrist and get a prescription that uses the top part for a monitor and then decide if you want a lower corner for reading or not.

Comment Re:Not this again. (Score 1) 637

Yes and No. Java may automate memory management but it can't read your mind and if you don't understand memory management it can't help you. I have seen java code and programmers who merrily go on allocating object after object and then run out of memory and complain that java isn't doing its job. Java and most of your GC code will going a very good job of taking care of the details but you still better have some idea of memory management. Even standard C will automatically manage your memory if you stick with automatic variables which get put on the stack.

If you don't know if that object you created still needs to be around, then how do you expect Java or any GC to know if it should be kept or discarded. The GCs use algorithms to determine if an object can still be reached but while they may be getting better they are limited. So, while Java may take care of the details, you had better know about memory management.

Comment Re:Base the Key on a Natural Periodic System (Score 1) 170

The problem I see is that no matter what key(s) are used. If they are known then they are known and there is nothing to stop someone from using them early. How many people set the time on their systems ahead of the actual time to test something, what would stop them from doing it to break a code? Every wonder why the night sky would look like in 1 million years... if someone calculated the values for the key then knowing that the key was a starry sky a millions years from the future, then someone could look up the same for the key.

The idea that no one ( living ) knows the exact nature of the key, ie... the lock will for some time after 60 years would have another issue in that the code would need to check checked each second ( or 1/10 of a second, etc... ) and if something happens that a the key is skipped then it will be lost forever. The best idea so far is to generate a key which requires X out of Y samples to solve and then hope that at least X survive to the desired time and that no more than X-1 get released early.

Comment What philosophy of Education are you using? (Score 3, Interesting) 264

There is a basic point missing in that expected grade distribution is very much dependent upon if you are trying to teach a subject to mastery or teach a subject the students limits of understanding. Ie. what is your philosophy of education?

If you are teaching a class covering a subject which can be mastered, then there is no reason everyone should not master the material and get an 100% baring lazyness.

An example would be written test for a drivers license, is there really any reason everyone who takes it should not get 100%?

If you are teaching to a scale, then you don't really care how much absolute material is transferred and your tests are designed to not to measure the material taught in the class as much as then general subject matter which the class covers, and they are designed to test the level of understanding of the subject as a whole with an emphasis on trying to prevent anyone from mastering the test.

Most of your Engineering classes.

Comment If they have a key, they publish it, otherwise.... (Score 1) 399

Since encryption can use either private keys or public keys, the only reason to ask for a public key is because you aren't in direct communications with someone in order to securely exchange a private key. Public keys are used for more than just encrypting data, so if you have a public key you want it as public as possible. Since there is also a secret key behind the public key, it's either set up as a fully automatic process that would decrypt your data as soon as it was received or it is saved in encrypted form and only a small group can decrypt it.

So, where a company feels like they need secure encryption they may often have multiple public keys, sometimes tied to a department or even an individual, but in all cases if they have a public key they publish it. If you don't see one listed then they don't have a public key in place for at least that group. Check for the group that handles security concerns and they may have a public key, but unless that is where you want your data to do,,, I wouldn't use it,.



Comment There is not 'One (1)' American English (Score 1) 200

Please See:

You do all recall that all the Romance languages are based on Roman, but they were once all dialects of Roman. Welcome to America, we we have all kinds of regional and local dialects.

Comment Re:https does not mean they are stored encrypted (Score 1) 252

But he doesn't seem to realize (at least not stating) what of the original data provided was intended to be encrypted and what of the original data was just along for the ride.

Ie. Is his credit card number being sent in e-mail or only his name and address ( which will be posted on the outside of any package he receives from them via any postal system, and read by everyone from the order fillers to the person that drops it off at his residence )

Maybe he has a 'secure' phone number, what information is being sent in plain text via e-mail that he thinks should be secured better? On the Other hand, he only needs to provide 'valid' data for which they need to fulfill their business transaction. So, if they don't need to physically send him anything, get a PO Box and use some alias at the PO. Box. Get a 'burner phone', between P.O. Box and non-attached phone number, they shouldn't have any real information to leak, unless they go thought a court somewhere.

Comment Re:Seperation of classes (Score 0) 292

Ignoring everything except "As long as the wealth is created in a free market, that wealth is a reflection of merit"

I have to ask 2 questions:
1) What merit is reflected into ones birth that causes the reflection of wealth there?

2) What is the reflection of merit when the increase in wealth before expenses would be the same percentage but due to the starting point of rich over poor. The Rich's expenses are well under that percentage and his wealth grows, but the Poor's expenses vary around that percentage and while occasionally the wealth grows, it also often shrinks. Bonus points if you don't fall back on living within one's means and extol the virtues of living as a pauper or working 24x7 so as to avoid needing to have a place to sleep.

Comment Re:I can think of 3 reasons (Score 1) 524

I seriously doubt any people will actually quit... the memo actually states that your managers are already aware of the next steps, so it going to be dependent on managers...

If I was affected I would just continue the status quo while looking for a new job on the side....
once they cut my access and closed done my office and layed me off... I would file unemployment...

Be careful when a loop exits to the same place from side and bottom.