Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Maybe it's really family reasons.. (Score 4, Insightful) 214

I hate this culture. I see it everywhere. My wife works 10-12 hour days then gets home and has to respond to emails for an hour or two after dinner. She has to do that just to meet expectations....needless to say I'm hoping we can find her a new job.

My job is much better but its still here, I just choose to ignore it and can get away with doing so. My manager just had a new kid (well his wife did) and get was back at work the next day and working his normal 12 hour day. A woman I work with had a baby and didn't even take a month off, she was back at work full time.

Disgusting if you ask me and I think a far bigger cause of our societal problems than anything else out there. If you can't enjoy life or be bothered to care for you family then what are you doing this for??

Comment I agree that the tools are a problem (Score 1) 317

I recently decided to try my hand at some mobile app development after 15+ years of programming experience with mostly other non-related tools. The setup was just painful, it took me an entire weekend of tinkering around trying to figure out (ie google search) why various things weren't working/not compiling etc. Once I figured out the methods of getting things setup that works, its fine now and I have been working away with few issues and could start over again in no time. The problem though is that until I learned the the various tool's failure points it was a huge pain.

I've seen things like this happen in classes and new people at work. Once you know a tool you can get going without issue but until then its this painful thing you have to deal with that is problem that is largely not interesting or fun to deal with.

Comment Re:Either it is Linux, or it is a tablet. (Score 1) 69

What this guy said!

I have a Transformer Prime, with the keyboard attached its as useful (form wise) as any small laptop would be. It just needs more productivity programs. I tried for a while to program on it but it wasn't worth the extra effort. This isn't due to its form factor so much as with the apps on it.

I find it completely odd that people have so many preconceived notions for what a smart phone or tablet can and can't be. They's computers, pretty darn powerful ones. I would be completely happy replacing most of my other computing devices with something like the Asus Padfone 2 if the apps were up to it.

Comment Re:Only on Slashdot (Score 1) 198

Well the 5% who have a phone with NFC and Android ICS are in trouble huh? I wasn't saying that the discussion isn't interesting I'm just saying that the OP's comment that we have to focus on finding a solution isn't really relevant since it's already fixed in the OS and NFC can be disabled if you haven't been updated.

Comment Re:Is it really such a big deal? (Score 1) 198

Missed the part about walking down the street, ok so what other anonymous situations do you see? On the bus? Or are we talking about pickpockets? I can see this as an issue for non-anonymous situations (I know that guy and his phone is vulnerable) but for random situations I can't see a lot that would be overly successful. Perhaps you can help me see some of these situations instead of just cussing at me and calling me names?

Comment Going to sum up what I see as the threat here (Score 1) 198

I posted this above but here's what I see (maybe I'm missing something so help me out). So that assumption of danger here is what? Someone walks down the street bumping into random strangers repeatedly hoping that:

1) The bump into the side where the strangers phone was being held.
2) The two phones are perfectly at the same height (presumably in a pocket).
3) The strangers phone is vulnerable.
4) They have NFC enabled.
5) They could hold the phones in contact for the about of time necessary to transfer both an overloaded filed (presumably exceeded a buffer limit) and THEN also transfer the app compromised app that allows the actual hack to work (over a connection with a maximum bandwidth of a few hundred kbits/s).
6) Then after the hack succeeded they remained in contact long enough for the data from the strangers phone to be transferred back to the hackers phone.

All with anyone noticing? That's all assuming they fix whatever issue was causing it to need to be run 185 times before it finally worked? Assuming those 185 times were the incremental transfers of all the data needed? Again I'm still not scared. And this is fixed in Jelly bean (which my S3 is running...doom on you close talking random guy on the street thinking you finally found someone with an S3 to stand uncomfortably close to!).

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...