Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Grow up (Score 1) 404

It seems that on the other side of the pond you still can not invite a female colleague for dinner without having the fear of it being called sexual harassment, call a black guy black, a Phillipino Phillipino and so on. Lately, a video mixing a science subject and high heels is a no-go zone. Whatever! (and yes my gf agrees, so this is not an isolated one-man view). So, attempt to suspect there might even be good intentions, some times. Give it a try.
Android

Submission + - Build a mobile app in 36 hours; HOW TO? (apps-foundry-contest.org)

gef7 writes: Together with another 2 fellows, I recently had the chance to participate in a hackathon for building mobile applications; the experience was great and we even got one of the winning spots. It is a good moment to probe some collective geek knowledge though. The question for slashdot folks follows hereby: If you had to participate in such a contest, which approach would you take if you wished to have an app across multiple platforms and why? hint: smartphones are the particular target but, adding web access in the mix would broaden the horizons.

Comment AWS, Grid, Owned hardware, many options (Score 1) 264

In short:
  • AWS could be good value for money, if you DON'T have data-intensive tasks (otherwise it gets expensive quickly)
  • Grid could be even better value for money, assuming you can get the service AND assistance in your lab, for low or zero cost (eg. in US/EU this should be fine)
  • Owning hardware is a MUST if you have sensitive data (medical, financial etc) or just need to build local expertise (more input needed here)

Assuming the later, check among Supermicro & Dell servers. Last time I needed to setup a cluster, the Dell R610s were a good pick, giving great manageability over the LAN, low volume and decent features (balanced storage space along with cpu capacity, around 8 cores + 8 TBs per 1u blade). Don't rule out also options like Shuttle XPCs, they are damned robust in thermal aspects (hey, you'll be running these continuously, won't you?). Finally, don't underestimate the need for local sysadmining; you will likely need to setup a queueing system (Torque, *PBS*, SLURM, SGE, LSF, NQS, Condor) and manage the whole thing. This won't happen automatically, take a note on that. If you run something of the pbs or sge family I can happily help with setting up a tool called qtop

Comment Re:Facts are stubborn things (Score 1) 500

I'm pretty certain that the science is sound), Morgado's pump is in limbo because he hasn't yet found anyone who'd lend him $4-million or $10-million to build a factory. He has plenty of offers to buy the technology outright, but he has the audacity to presume that he should be the one to profit from his invention.

Imagine if the demand for energy suddenly plunged by more than 25%. Oil is only going for $100/barell because demand roughly matches supply. If supply exceeds demand by a significant percentage, we'd be back to $1/gallon gas in a heartbeat.

If Morgado's invention is at present tested and reliable enough to do all that, it worths more than 10^7 $ and everyone who has that money not investing it is stupid. If not, don't make us cry for his uninvested intellectual property, he is just a hacking good inventor who can build something lesser to raise 10^7 $s until the next stage. In short, if he has faith about this invention, then he should make a business compromise. btw. oil supply is controlled by OPEC, prices are not really an accident.

Comment Re:"Most" doesn't mean "very". (Score 1) 465

Let's recall this is the company in the 80s which provided vital parts of the DOS "OS" under undocumented function calls, leaving competitors with crippled options (technical or business wise): http://www.htl-steyr.ac.at/~morg/pcinfo/hardware/interrupts/inte8980.htm . I was reverse engineering much code at those times, only to find out that Microsoft was using the undocumented calls, games were using them, any virus around was using them, ONLY competitors were left in cold! It is also the same company which cripples content, on recipient basis: http://support.microsoft.com/kb/95555 . It is also the same company which does not honor even its own standards, with an incredible impact on consumers (and crippling their freedom): http://arstechnica.com/microsoft/news/2010/04/iso-ooxml-convener-microsofts-format-heading-for-failure.ars & http://en.wikipedia.org/wiki/Office_Open_XML -> Compatibility_between_versions . If you don't get this, check well the attachments in your mailbox. Is tampering with government and standards bodies "ethical" "business" "attitude"? I think Ethisphere Institute has no place near any ethical list.

Submission + - Poll: do you sneeze when you look at the sun?

gef7 writes: Answers:
* it has no effect on me
* I'm photophobic/must put on my sunglasses
* the sun makes me sneeze
* the sun makes me burp

Comment Re:Take some time and think (Score 1) 537

The problem is your "ownership" is derived from management's ownership of that hardware and software. So if they demand access, you do not have the authority to deny it.

Yes and no.

If the the authority clause can imply full automatic access, then the boss should ask for a copy of all passwords, disks or files, too. I am not sure that this is even automatically permitted under many jurisdictions. Think of forensics and liability here.

We can understand the problem as similar one to an airplane owner and a pilot (or a shipping magnate and a captain, etc): Being the owner of the plane does not imply that you should fly it every now and then, maybe "on-the-fly", just because you own it. You surely have reserved the right to do so. BUT. The pilot should also have the right, to exit the plane safely on ground upon your demand, inform his crew on the spot of his actions and properly handing over the control. This is how business should be done.

Talking about systems, a solution could be to put all administrative passwords in an envelope, seal it, hand it to your boss on the condition that you take responsibility of the systems as long as the envelope remains sealed. If the envelope is broken, it's his job. If you are asked to hand-over the systems, you unseal together the envelope; the "agreed protocol" takes care of the rest. At any such step, it is appropriate for the sysadmin to disclaim further responsibility to his users, in some brief, formal, communication.

I refuse to co-sysadmin my systems together with my managers, unless they can also share the responsibility, solve problems etc. After all, *I* have choice in the job market and I am authoritative enough to make use of that. ;-)

In the end of the day, it's just a question of professionalism from all parties involved.

Comment a 2nd chance? (Score 1) 355

Wow! this is an invention people have been waiting for years. There are quite a few that would like to be given a 2nd chance for another head! And not the kind of head that face-lifting would provide for!

Slashdot Top Deals

If all else fails, lower your standards.

Working...