Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - Hacking is Important (randsinrepose.com)

porsche911 writes: As usual, Rands nails the discussion in his bolt "Hacking is Important".

"Failure to create some form of predictability will result in chaos. Failure to create some sort of well-maintained Barbaric chaos inside the company guarantees that a fast-moving, ambitious, risk-taking and ruthless someone else — someone outside the company will invade, because they know what you forgot: hacking is important."

Submission + - The Computer-controlled future (spiegel.de)

porsche911 writes: Great article in Spiegel about the future with computers and the social impacts.
"the power of computers is growing so quickly that they will be capable of operating with absolutely no human involvement at some point in the future. Ford believes that 75-percent unemployment is a possibility before the end of the century."

Comment Checklist (Score 2) 290

Put together a very detailed checklist of everything you are going to hand off. Make him own the list and take notes then make him do a review with you and his manager of what he's learned and then have both of them sign off on the training. Be available for quick questions but keep very detailed notes about how much time you are spending during the first couple of weeks. When he calls you should ask what he's done already with the problem to make sure he isn't getting into the default behavior of calling you first. You need to make sure he can be successful (as in the don't burn bridges philosophy) but at the same time is taking ownership of the job.

Good luck,
-c

Submission + - True Innovation (nytimes.com)

porsche911 writes: http://tinyurl.com/6wuetg3
A good opinion piece about Bell Labs and how our current style of innovation doesn't create the massive new industries that the Labs model started.
When AT&T shutdown the labs, one of my friends made the comment that "the executives who closed Bell Labs so they could spend the money on advertising should be put in prison."

Games

Submission + - Inventor of the Pinball machine dies (nytimes.com)

porsche911 writes: "Steve Kordek, who revolutionized the game of pinball in the 1940s by designing what became the standard two-flipper machine found in bars and penny arcades around the world, died on Sunday at a hospice in Park Ridge, Ill. He was 100."

“Steve’s impact would be comparable to D. W. Griffith moving from silent films through talkies and color and CinemaScope and 3-D with computer-generated graphics,” Mr. Sharpe said. “He moved through each era seamlessly.”"

Encryption

Submission + - New encryption flaw discovered (nytimes.com)

porsche911 writes: " The researchers whimsically titled their paper “Ron Was Wrong, Whit Is Right,” a reference to two pioneers in public key cryptography, Ron Rivest and Whitfield Diffie."

It appears that there is a new flaw in the standard encryption algorithms being used that causes about 2 out of every 1,000 keys to be nonrandom.

"“This comes as an unwelcome warning that underscores the difficulty of key generation in the real world,” said James P. Hughes, an independent Silicon Valley cryptanalyst who worked with a group of researchers led by Arjen K. Lenstra, a widely respected Dutch mathematician who is a professor at the École Polytechnique Fédérale de Lausanne in Switzerland. “Some people may say that 99.8 percent security is fine,” he added. That still means that approximately as many as two out of every thousand keys would not be secure.

The researchers examined public databases of 7.1 million public keys used to secure e-mail messages, online banking transactions and other secure data exchanges. The researchers employed the Euclidean algorithm, an efficient way to find the greatest common divisor of two integers, to examine those public key numbers. They were able to produce evidence that a small percentage of those numbers were not truly random, making it possible to determine the underlying numbers, or secret keys, used to generate the public key."

Submission + - Chinese Hackers in Nortel (wsj.com)

porsche911 writes: The Wall Street Journal is reporting that suspected Chinese hackers had control over Nortel's computers as far back as 2000 but the extent wasn't known until 2009.
"Using seven passwords stolen from top Nortel executives, including the chief executive, the hackers—who appeared to be working in China—penetrated Nortel's computers at least as far back as 2000 "

Google

Submission + - Apple verses Google innovation approaches (nytimes.com)

porsche911 writes: Good article comparing the innovation strategies of Google and Apple.

“There is nothing democratic about innovation,” says Paul Saffo, a veteran technology forecaster in Silicon Valley. “It is always an elite activity, whether by a recognized or unrecognized elite.”

Comment "Programmer" verses "Problem Solver/Value Adder" (Score 2) 165

If you continue to present yourself as a "programmer" you will continue to get programming assignments. What sort of projects are you good at? What types of problems can you solve? Think of yourself as a business instead of as an 'employee'. The old "You Weren't Meant to Have A Boss" mindset (see: http://www.paulgraham.com/boss.html ).

Get out there and do something cool, don't sit around waiting for someone to tell you what to do!

Comment "e-mail sent by us in error" (Score 1) 103

It looks like someone at the Times made a mistake.

I just received this from NYTimes:
"Dear New York Times Reader,
You may have received an e-mail today from The New York Times with the subject line “Important information regarding your subscription."
This e-mail was sent by us in error. Please disregard the message. We apologize for any confusion this may have caused.
Sincerely,
The New York Times"

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.

Working...