Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Note-taking is a life-long skill (Score 1) 569

While no-one cares in college, there are still people in the business world who become annoyed if you take notes on a PC during business meetings. For whatever reasons, pen-and-paper skills are still important at higher levels. (Something about body language, eye contact, and putting others at ease.)

I'm hoping the Apple iPad or the coming HP Slate will not incur this stupid prejudice, but need to be prepared in any environment.

Analogous to your professors' white board diagrams, business white boards also contain knowledge that your re-copying will lose as you struggle to keep up.

To deal with high level meetings, I bring my notebook, but also pen and paper and use that which is appropriate for the audience I am dealing with.

To deal with the whiteboard issue, my laptop case ALWAYS also has my camera. I photograph the white board at various times during the meeting. By definition, my photos are always 100% accurate. Oddly enough, the same people annoyed by computer note taking never seem to take offence at snapping pictures of the white board.

After the meeting, I'll scan any hand-written notes AND my digital images into a single Word document.

Good luck!

Comment Clarification of the issue. (Score 1) 134

What sort of videos are we talking about? The only videos I've ever watched in an educational setting were pointless time wasters intended to give the teacher a break. If that's what we're talking about, they have a point. But there's really no loss as they're a waste of time anyway.
If we're talking about video recording of lectures given by professors, then the professors should have the copyright and should be able to distribute them any way they want. This would be far more useful than some generic educational video anyway.

Your understanding of the problem is close, but imprecise.

What is at stake here are professors whose lectures routinely use copyrighted materials.

One prior post speculated that the resulting video should be legal due to the "fair use" doctrine.

Another prior post speculated that due to a technicality, that lecture reproduction is fair use for an educational DVD, but specifically not legal (i.e. infringing) when used with streaming video.

As a result, rather than figure out which lectures are infringing and which are legal, the school has just banned everything to be safe.

Java

Sun's Project Darkstar Game Server Platform No More 82

sproketboy writes "Project Darkstar, an open source software platform from Sun labs that simplifies the development of horizontally scalable servers for online games, is being discontinued as of the Oracle acquisition. This project, mentioned a couple of years back on Slashdot, was a unique concept for building an application server specific to on-line gaming. Sadly they were so close at version 0.9.11 (which is still very stable). Hopefully the open source community can get involved and help continue work on this project."
NASA

Dying Man Shares Unseen Challenger Video 266

longacre writes "An amateur video of the 1986 Space Shuttle Challenger explosion has been made public for the first time. The Florida man who filmed it from his front yard on his new Betamax camcorder turned the tape over to an educational organization a week before he died this past December. The Space Exploration Archive has since published the video into the public domain in time for the 24th anniversary of the catastrophe. Despite being shot from about 70 miles from Cape Canaveral, the shuttle and the explosion can be seen quite clearly. It is unclear why he never shared the footage with NASA or the media. NASA officials say they were not aware of the video, but are interested in examining it now that it has been made available."
The Almighty Buck

Virtual Currency Becomes Real In South Korea 203

garylian writes "Massively is reporting that the South Korean Supreme Court has stated that virtual currency is the equivalent of real-world money. For those of you who might not be drawing the link, the core there is that selling in-game currency for real money is essentially just an exchange of currency and perfectly legal in South Korea. This could have sweeping implications for RMT operations the world over, not to mention free-to-play games and... well, online games in general. The official story is available online from JoongAng Daily."

Comment How advanced math helps..... (Score 1) 466

In the context of the thread [advanced math for programmers] you never got close to answering the question at hand. How does advanced math really help a programmer? There are small subset of low paying programming positions where one may apply that craft. The majority of programming jobs simply don't need advanced math.

With regard to your narrow definition, you are correct that advanced math is not a "requirement" for the programming positions that report (and have reported) to me. But the individuals with math-focused academic backgrounds have generally displayed intellectual rigor that delivers exceptional results. This often leads to promotion into leadership, tech-lead, and mentoring positions that pay more. I pay them more because they deliver higher quality results than delivered by peers.

This is not in any way to discount the value of contemporary C.S. degrees. When opening occur, I interview both. When figuring out who to hire, I am most concerned that my team is composed of people with multiple backgrounds, not one or the other.

Don't discount other disciplines in shaping your career. I have met a scary number of people who were math majors with skills in classical music theory and composition. Their combination of creativity and discipline translated into outstanding programmers and database administrators.

As either path can result in a nicely paying career, why not instead investigate what subject areas give you the most satisfaction? People who do what they like are likely to do the best work in any given area. Compensation at that point is mostly a factor of the supply and demand for your skills and experience by any given employer or industry.

Comment The money issue is not as simple as stated (Score 4, Interesting) 686

I've been taking my 18 year old to tour colleges as he will be pursuing chemical engineering. Engineering starting salaries across the board (chemical, civil, mechanical, and electrical) are between $50 and $70k.

The solution for many comp sci students is to double major comp sci with one of the above "demand" areas, pass the professional engineering exam, and then the money issue is a non issue. Computer skills are now part and parcel of every engineering profession, so getting paid well to do what you love (if you love computers) should not be difficult.

The challenge for people hell-bent on starting their careers as programmers (as opposed to computer engineers) seems to be that starting programmers are not worth as much.

[By the way, the number of girls on his engineering tours seem to be between 10% and 20%. In other words, nothing there is changing. My son's solution to the ratio issue is to attend a large university where there are more female students overall.]

Databases

Widenius Warns Against MySQL Falling Into Oracle's Hands 278

jamie sends in a blog post from MySQL co-founder Monty Widenius calling for help to "save MySQL from Oracle's clutches." While the US DoJ approved Oracle's purchase of Sun back in August, the European Commission has been less forthcoming. Widenius points out that Oracle has been using their customers to put pressure on the EC, and he questions Oracle's commitment to MySQL, saying their vague promises aren't good enough. He writes: "Oracle has NOT promised (as far as I know and certainly not in a legally binding manner): To keep (all of) MySQL under an open source license; Not to add closed source parts, modules or required tools; To not raise MySQL license or MySQL support prices; To release new MySQL versions in a regular and timely manner; To continue with dual licensing and always provide affordable commercial licenses to MySQL to those who needs them (to storage vendors and application vendors) or provide MySQL under a more permissive license; To develop MySQL as an Open Source project; To actively work with the community; Apply submitted patches in a timely manner; To not discriminate patches that make MySQL compete more with Oracle's other products; To ensure that MySQL is improved also in manners that make it compete even more with Oracle's main offering."
Image

Zombie Pigs First, Hibernating Soldiers Next 193

ColdWetDog writes "Wired is running a story on DARPA's effort to stave off battlefield casualties by turning injured soldiers into zombies by injecting them with a cocktail of one chemical or another (details to be announced). From the article, 'Dr. Fossum predicts that each soldier will carry a syringe into combat zones or remote areas, and medic teams will be equipped with several. A single injection will minimize metabolic needs, de-animating injured troops by shutting down brain and heart function. Once treatment can be carried out, they'll be "re-animated" and — hopefully — as good as new.' If it doesn't pan out we can at least get zombie bacon and spam."
Science

Programmable Quantum Computer Created 132

An anonymous reader writes "A team at NIST (the National Institute of Standards and Technology) used berylium ions, lasers and electrodes to develop a quantum system that performed 160 randomly chosen routines. Other quantum systems to date have only been able to perform single, prescribed tasks. Other researchers say the system could be scaled up. 'The researchers ran each program 900 times. On average, the quantum computer operated accurately 79 percent of the time, the team reported in their paper.'"

Submission + - Allow /. members to fund specific features? (roomberg.com)

managerialslime writes: "Ask Slash Dot:

The purpose for this letter is to present a suggestion for an additional path toward developing features for Slash Dot while also generating some additional revenue.

Several of my clients over the years have been small and medium software companies where the ideas for new features were endless and the programming resources always too limited.

In one, we would develop a cost estimate to develop a particular new feature and then mark it up 30% to account for both cost-overruns and a bonus pool for the programmers. We would then post a "Shared Dutch Auction." Under this scenario, each customer would bid the amount they were willing to pay for a feature. Customers who really wanted a feature badly might bid a quarter or half the cost. Many other customers might submit bids of a couple percent of the cost. (In that situation, 2% was the minimum bid.)

At any point where the bids covered the development cost, we charged credit cards for little customers and started sending invoices to the big ones. As soon as we escrowed the development cost, the programming race was on. (Coming in under the estimate triggered bonus distribution. Blowing the cost estimates meant we ate the loss. Theoretically, failure to deliver a feature meant giving back the money â" we never needed to.)

Under this approach, we knew that the features being developed were truly important to the customer base. (At least enough for payment.) The decision to which project to work on was easy. While at any time we took bids for many features, we only worked on one-at-a-time. The first task to be fully funded was the next project to be attempted.

I know the current path for Slash Dot improvement is through Source Forge. But as I work 70+ hours per week and also volunteer as a geek for the neighborhood recreation association, all I can offer Slash Dot at this point is a small donation here and there.

If my small donations were for features I wanted instead of "early reading," I might be tempted to make them, and make them more frequently. (Big point. Really big point. Yes, I am not kidding.)

I guess I could end the letter here, but while I'm at it, I'll list one of the many features I wish for that may or may not be important enough for your personal attention.

While I read a great many Slash Dot posts, I am hesitant in my replies. I develop every response in Word, check my spelling and grammar, and then usually wait one to four hours. I then re-read and re-edit most responses before posting via cut-and-paste. That is where the aggravation begins.

Even after all these years, (and with a comfort with HTML tags), my formatting is different enough from what I want to see that I spend too much time messing with tags (paragraph, break, list, ec.) and other spacing until my text is suitable for the reader.

While I don't mind carefully thinking about my post content, this fighting over formatting has always been annoying. (Annoying enough to think about how to incent Slash Dot to fund an add-in that would accept and interpret either MS Word cut-and-paste or RTF file importing.) (OK. Now you know. AN old fart with Attention Deficit Disorder and the /. editing skills of a moron. But we count too.)

For my part, I bid $50 toward such a feature. Not a princely sum. But allow a few hundred (or a few thousand) people to contribute to features THEY want to see and Slash Dot might benefit in becoming a better service. Once someone actually gets what they pay for, the reward might incent some to become repeat contributors in "virtuous cycles" of improvement.

Happy Thanksgiving.

Leon Roomberg
Site: www.roomberg.com

Slash Dot ID: managerialslime (739286).

Reader since 1998. Posting since at least 2004. (Sometimes it takes me a while before I have something useful to contribute.)"

User Journal

Journal Journal: Allowing \. members to bid $ for additional features? 1

Dear Commander Taco,

Thank you for Slash Dot and your years of service to the community.

I probably check in with the site more than 250 times a year and depend on it for clues about topics the technical press has missed (or which I overlook even though they are there).

The purpose for this letter is to present a suggestion for an additional path toward developing features for Slash Dot while also generating some additional revenue.

Comment Here is how I got some advice from a professional (Score 1) 264

Before you complete your plans for your upgrade path, you might want to hire a professional to review your infrastructure and assumptions. That is just what I did.

Before doing my upgrade, I wanted to be sure my infrastructure would be up-to-date with current standards. The following 2-part document first qualifies the person giving advice and then presents 25 questions I needed that person to answer.

(As each of the 254 questions are covered on the CISSP exam, a competent consultant should be able to guide you in the right direction.)

Feel free to adjust the estimates of person-hours for each task. The estimates below are for a company with about 50 servers, 50 network devices, and a WAN / MPLS covering a dozen offices across the US.

Good luck!

RFQ Goal: THE COMPANY desires to contract with a consultant who will, on an annual basis, review THE COMPANY’s compliance with its own security policies and standards. The consultant will summarize their findings in a brief report, including any recommendations for future improvement. In addition, as planning for a major upgrade is underway, additional recommendations for the upgraded system are expected.

Consultant Background: The consultant will be an individual skilled and experienced in this task. The consultant will have no less than five years experience in the information security field.

Credentials: The consultant must have at least one of the following credentials and furnish verification that the credential is current:

* Certified Information Systems Security Professional (CISSP)

* Certified Information Systems Auditor (CISA)

* Certified Information Security Manager (CISM)

Work to be Performed:

* THE COMPANY will send the consultant a Purchase Order authorizing the start of the engagement. Depending on consultant availability, the engagement is expected to take from four to ten weeks to compete.

* Supporting material review: Within two weeks of receiving a purchase order authorizing work to begin, the consultant will spend 6 to 8 hours reviewing any supporting materials provided by THE COMPANY (typically answers to prior security assessments) and developing follow-up questions.

* Estimated consulting time: 8 hours.

* Follow-up questions: Within four weeks of receiving a purchase order authorizing work to begin, the consultant will then email those questions to a designated contact at THE COMPANY and then read any answers that are returned.

* Estimated consulting time: 2 hours.

* Within six weeks of receiving a purchase order authorizing work to begin, the consultant will then spend up to 4 hours on-site at THE COMPANY’s data center, asking questions to validate readings.

* Estimated consulting and travel time: 8 hours.

* Within six weeks of receiving a purchase order authorizing work to begin, the consultant will use an industry standard tool of their choosing and at their cost, to attempt a penetration test of THE COMPANY’s system.

* Estimated consulting time: 16 hours.

* Within eight weeks of receiving a purchase order authorizing work to begin, the consultant will then use Microsoft Word to fill in a twenty-five question survey with their observations and recommendations and email their report to their contact at THE COMPANY. Any question not applicable to a security assessment may be left blank.

* Estimated consulting time: 2 hours.

* Within nine weeks of receiving a purchase order authorizing work to begin, the consultant will conduct a conference call reviewing their findings.

* Within ten weeks of receiving a purchase order authorizing work to begin, the consultant will The agrees to forward to THE COMPANY copies of all supporting documents and other working papers and products performed on behalf of THE COMPANY, and also provide THE COMPANY with an invoice for the amount agreed to in the Purchase Order. THE COMPANY will pay the invoice within fifteen days. Confidentiality:

* The consultant agrees that all information, working papers, and work results gathered and developed as a result of this engagement are the confidential property of THE COMPANY and will not be divulged to any other person or organization than contacts at THE COMPANY.

25 Question Security Assessment for (Company Name and location: )

Date of consultant contract:

Date of review meeting:

* Access Control

o 01. Categories and Controls

o 02. Control Threats and Measures

* Application Security

o 03. Software Based Controls

o 04. Software Development Lifecycle and Principles

* Business Continuity and Disaster Recovery Planning

o 05. Response and Recovery Plans

o 06. Restoration Activities

* Cryptography

o 07. Basic Concepts and Algorithms

o 08. Signatures and Certification

o 09. Cryptanalysis

* Information Security and Risk Management

o 10. Policies, Standards, Guidelines and Procedures

o 11. Risk Management Tools and Practices

o 12. Planning and Organization

* Legal, Regulations, Compliance and Investigations

o 13. Major Legal Systems

o 14. Common and Civil Law

o 15. Regulations, Laws and Information Security

* Operations Security

o 16. Media, Backups and Change Control Management

o 17. Controls Categories

* Physical (Environmental) Security

o 18. Layered Physical Defense and Entry Points

o 19. Site Location Principles

* Security Architecture and Design

o 20. Principles and Benefits

o 21. Trusted Systems and Computing Base

o 22. System and Enterprise Architecture

* Telecommunications and Network Security

o 23. Network Security Concepts and Risks

o 24. Business Goals and Network Security

* Penetration Test

o 25. Description of test approach, results, and recommendations.

Comment An attempt to actually be helpful (Score 1) 549

The poster asked a simple question: Is there a source for 24-27" monitors running at 1366x768 that are affordable and don't have all of the 'TV' stuff?

I then read more than 200 reply posts about changing font size in Word, Safari, and Firefox along with non-specific posts telling the poster to go out and "buy something," but not saying what. Unbelievable.

Here's my best shot at answering the question as asked:

Research the Hanns*G 28" monitor for about $336. (with 3-yr warranty)

If you set the monitor at 1280*1024, the "stretchiness" of characters at 28" may give you the visual result you sought when requesting 1366*768.

Source: http://www.amazon.com/Hanns-G-HG281DPB-Widescreen-LCD-Monitor/dp/B000TJV9KW/ref=sr_1_1?ie=UTF8&s=electronics&qid=1258467065&sr=8-1

Good luck

Comment Educate while looking for another job (Score 1) 1006

First, it is up to you to do your best to educate your executives about the real risks of disgruntled former employees turning in your employer in return for a portion of the damages they will be held liable for.

If your employer truly does not have money for MS Office and the like, it is up to you to present the free and inexpensive legal alternatives to 99% of what most users need. (For the rest of the stuff, either pay or accept the risk of shut down.)

If the ethics of your employer are that it is OK to screw your software vendors, there is every probability that they will eventually take other actions not in the interests of their employees, their customers, or their own long-term financial security.

You think Bernie Madoff STARTED big time? No, he got away with little stuff and eventually became the monster that ruined so many lives.

I've become a moralizing old fart and I feel just fine about it.

Slashdot Top Deals

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...