Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Depends, obviously (Score 2) 249

Management is inherently interrupt-driven: phone calls, meetings, other interactions with the organization

Development is generally NOT interrupt-driven; in fact each interruption has a productivity cost. You want your developers 'in the zone' as much as possible. A phone call, a question, a meeting, not only take time in and of themselves, but in the time it takes for the developer to get back in the zone, which could be much longer than the "quick" question you just interrupted them with.

A good manager (technical or otherwise) keeps interruptions away from their developers as much as possible, A non-technical manager MAY be at a disadvantage, if they cannot do their job without a technical 'guide dog'; but if the organization is structured in such a way that technical proficiency is not required (i.e. not expected to estimate tasks or understand or explain the internal workings of a particular subsystem), then they might be able to manage just fine.

So... depends. Duh.

Comment seriously? because SCIENCE! (Score 5, Insightful) 330

Bruce Schnier may be the front-line spokesperson for the security community, but that should be completely separate from his body of work in cryptography. At the bottom line, he's doing mathematics, and mathematical proofs can be reproduced and confirmed -- or debated and disproven -- by anyone else in any country with sufficient background to understand them.

He is not some guru spouting unprovable wisdom from a mountaintop, he is a member of a scientific community, and if he is able to earn and keep the respect of that community, then that's a pretty good indication that he knows what he's talking about.

Comment Excuse me? (Score 1) 232

FTFA: "Crucial to that is getting to the point, scheduled for 2027, when the first nuclear fuel would be injected into the reactor. "

So... the first *actual attempt at fusion* is some FOURTEEN YEARS AWAY, but the scientists are confident they're on track...

Yeah, I don't think I'll get excited quite yet., Check back in fourteen years and we'll see.

Comment Why does this only apply to naked exes? (Score 2) 528

Why should the law care about whether or not there has been a romantic relationship, or even if there's nudity?

How about, if you have pictures of another person, given with reasonable expectations that it was for your private use (i.e. you do not have any signed permission to the contrary), why not just make it illegal to make these public with intent to bully, defame, humiliate, or shame?

Celebrities and other people in the public eye excepted, as always, or half the entertainment industry would crash overnight.

Comment Okay, fast database - high transaction rate, BUT (Score 0) 174

...how do you replicate this to an offsite hot standby, so that you don't look stupid when the power goes out? Or whatever other disaster occurs, because you just KNOW a single basket full of this many eggs is going to attract tornadoes, Cat 5 hurricanes, earthquakes, and meteors. Also coffee spills, hungry rodents, and burst pipes.

Also I believe OTLP == Oracle Typical Ludicrous Pricing

Comment Sorry, not convinced. (Score 1) 373

Slapping a 'mass hysteria' label on a phenomenon you cannot explain might make you feel more comfortable in your little corner of the universe, but it should not be confused with actually determining a provable cause. Mass hysteria isn't any more provable than demonic possession or alien mind control. It's a catchall for 'I give up'.

Comment What we need... (Score 1) 397

1) we need solid encryption, with decently secure keys, BY DEFAULT, on EVERY box, BEFORE it leaves the box. If it hits a network, it's encrypted first. Period. Even if you're running Windows. Even on your Grandmother's Windows computer. Email, IMs, and Web browsing, file sharing, voice, the works. If I choose to encrypt my transmitted data, I don't want to accrue suspicion because I stand out, because EVERYTHING is encrypted. If the government wants to know what I'm sending or receiving, they can ask for my encryption keys. Depending on the law, maybe they'll get them. But then a) I'll KNOW they're watching me, and b) watching me doesn't automatically let them watch my neighbors. Decrypting one computer at a time doesn't scale well.

This is really, really, hard, and won't happen overnight. But we've learned a lot since the Internet was young, I think it's workable from a technical standpoint. It's the social part that will be hardest, convincing companies that the additional expense is justified and convincing people that a little extra complexity (hopefully none at all -- except maybe when you set up your computer for the first time) is worth it.

2) we need REALLY secure interfaces. Part of this is accomplished by part 1) but not all. We need to work towards fewer viruses, fewer zero-day exploits, and we need them fixed faster and with less manual intervention. Why are botnets STILL possible? This is also really hard. But the government should want this, too. Every time we hear about how vulnerable our power grids, or automobiles, or pacemakers, or telecom might be to cyber warfare, we should be shouting about this. Instead the government wants to exploit the zero-days for themselves, because they are dependent on them for their own cyberwar offensives. Yes, Microsoft might own some of the heat for this, (but not all, by any stretch of the imagination) but by their omnipresence they are in the best position to make a serious dent in the problem, too. IF it was worthwhile for them to do so. I might be interested in Windows 9 or 10 if security -- REAL security, designed in from the ground up, not marketecture -- was the goal. But again, motivating software companies is a social problem, not a technical one.

I'm sure there are other things we need, but these are the ones that seem most important to me.

Slashdot Top Deals

Happiness is twin floppies.

Working...