Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Windows focus (Score 3) 482

The programmer can write any shit he wants, the OS should not respect the demand from the application without proper permissions. Demanding focus is a privileged command. At least we should have a matching, "Do not give focus to any other application" to other programs. And a click to specifically gives focus overrides both and resolves conflicts.

Comment Re:Junk? (Score 1) 104

All the tapes had significant amount of mould and it was considered a health risk to try to read them.

My wedding video tape original master too was affected seriously by mold. We were able to take it to India where they took the tape out of the cassette, cleaned the tape and re wound it in a new cassette. The tape was readable but quality of the video was severely degraded. If it is digital tape I dont think any useful info could be recovered.

Comment What if he is a victim of a hack? (Score 1) 187

The original developer signed an NDA and could not talk about it.

Let us say his computer gets hacked and some unknown thirdparty finds all the dirty laundry. And this hacker blabs all over the media about the deal. Now the original developer is not responsible for the behavior of the hacker right? She/He is also a victim of the hacker. If the original developer is able to show that she/he was not negligent then she/he is off the hook.

I am not suggesting the original hacker to leak all information and blame it on Russian hackers ... before making sure he/she can make the blame stick.

Comment Survivor bias is very high here (Score 1) 217

Lots of people are offered the chance to work from home. Those who are disciplined, and who actually work well and deliver results continue to be employed and allowed to work from home. The slackers get fired, and they find jobs where they need to be monitored constantly. Thus in the end, the sample of people who work from home is biased towards the survivors and it skews the results.

Comment Re:Exposed PIN numbers of Wireless customers (Score 2) 44

So Verizon contracts with some company to analyze customer interactions in real time. They provide them with their raw logs. The logs contain pin numbers and cell phone numbers. Recording the password in plaintext in log files itself is a huge security lapse. Any employee with access to the logs can actually mess with any customers account. Then they gave the raw unsanitized logs to some third party company. That company has even worse security policy and stores the raw log files in some publicly accessible server.

In the end all the top brass will find some scape goat. "Our policy guidelines specifically state the security procedures followed should be of the highest order. They violated our guidelines and policy. They are solely responsible!". The people who write the guidelines to protect their rear ends get paid millions of dollars, and they also implement a pay/bonus/promotion/reward system where following the very same guidelines will make your performance very very bad. With a wink and a nod, knowing fully well their policies are not followed, they could not be followed, they exist only as a CMA shield, they carry on.

Unless we hold the fire the entire chain of command and dock their pay and bonus and clawback past bonuses and pay they would not change.

Comment Exposed PIN numbers of Wireless customers (Score 1) 44

The customer records were contained in log files that were generated when Verizon customers in the last six months called customer service. These interactions are recorded, obtained, and analyzed by Nice, which says it can "realize intent, and extract and leverage insights to deliver impact in real time." Verizon uses that data to verify account holders and to improve customer service. Each record included a customer's name, a cell phone number, and their account PIN -- which if obtained would grant anyone access to a subscriber's account, according to a Verizon call center representative, who spoke on the condition of anonymity as they were not authorized to speak to the press.

Why would they record the pin in plain text in the log files? Irrespective of the leak to public domain, this would expose pins of all customers to all employees who can log in? Stupid to the core.

Comment Nothing to see here ... (Score 1, Interesting) 305

Nothing to see here folks.. Move along. Don't pay any attention to weeds and bugs that are moving north... Move along. Just another stupid ice thing broke in some god forsaken land. Just pay not attention.

Hey look! The latest outrageous tweet. Keep chasing that like a dog chases the laser pointer dot.

Comment Re: I don't think this means they're polluters (Score 1) 180

USA, 2013, energy consumed is 25,000 Twh. Area of USA 4 million square miles. 10 million km^2. Works out to 2.5 kwh per m^2. 8760 hours per year. Average is 0.29 watts. Not the 5 watts claimed by the GP.

Peak solar radiation is around 1 kW/m^2. Factor 0.5 for day/night, 0.5 for angle/latitude/overcast, 0.1 for efficiency of conversion, you get 25 W/m^2. Not too far from GP's 20 w/m^2

You need 40,000 sq km. 1 Rhode island?

Total paved area of USA, all the parking lots and roads is around 60,000 square miles, or 154,000 square km. So you need to pave 25% of all the paved area (roads and parking lots) of USA with solar panels to satisfy all the energy needs using solar alone.

If we choose to put it where the conversion efficiency is better, like Arizona or New Mexico or California we need much less than 40,000 sq km. Probably 16,000 sq km should be enough.

Slashdot Top Deals

"Don't think; let the machine do it for you!" -- E. C. Berkeley

Working...