Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Robert Reich had this to say (Score 3, Informative) 99

What the Reich piece fails to address are 2 core points: (1) why Boeing changed from its previous dominant position in aircraft safety. (2) And who owned the company back then. I'm not convinced by the argument that government ownership somehow makes Airbus "safe".

I observed the change in Boeing culture when I was on the government side of a major DoD project. And I learned about software safety from people who worked for "old Boeing" on projects like 777. The change in the procedures I learned about (e.g. Designated Engineering Representatives) that let Boeing do much more -unsupervised- self-certification is definitely part of the problem.

But at the end of the day, someone signed off on 737 MAX designs, including the incomplete hazard analysis. And someone signed off on the aircraft with the missing bolts. THOSE PEOPLE SHOULD BE CRIMINALLY CHARGED. And that is most certainly an appropriate role for government.

Comment Advantage of Apple's walled garden (Score 1) 42

Is that Apple can pretty much cancel this, not just preventing future downloads, but I think they also have mechanisms to revoke existing downloads (developer certificate revokation, I think.) Now Apple should explain how this got through their curation, which is part of how they earn their fee.

Comment at what point do these become DDOS? (Score 3, Insightful) 82

A friend carefully monitors his network, and sees a fair amount of this security scanning. Of course, that sets off the alarms he's added to his systems, clogging up logfiles and generally chewing through both bandwidth and server. At some point, this moves beyond "fair use" into "unfair use," but I don't know where to draw this line. Seems to me that "responsible" security scanning should be infrequent and probably announced ahead of time. But I could see arguments the other way.

And of course, the only way to distinguish a 'security scan' from a 'vulnerabiity scan' is to look at the originator IP and draw conclusions from that, which we know is not really authoritative.

Comment Consistent with other Separatist movements (Score 1) 200

and they're full of old people asking "when we succeed will I still get my social security check?".

And of course there's the world famous "Keep Government Out of My Medicare" sign....

It's astonishing how little people understand our country. And there's a never ending supply of grifters willing to take advantage of that...

Well, we lived in Canada during the Quebec Separation Referendum of 1995 (https://en.wikipedia.org/wiki/Quebec_sovereignty_movement#History), and we saw similar ignorance during that event. Politicians were actively dishonest (on both sides), newspapers tended to be either pro- or anti- and talked only to their own side. It was hard to find credible factual analysis of the impacts if the referendum succeeded. (It was particularly galling for the premier of Quebec, who had a PhD in economics from London School of Economics, to spout blatant nonsense. https://en.wikipedia.org/wiki/...)

And from the little bit I saw across the pond, a similar dynamic seemed to be in effect during the Scottish referendum in 2014 (https://en.wikipedia.org/wiki/Scottish_independence_referendum_2014)

Comment Honestly, given citi, sure. (Score 1) 50

A person I know had a story once, I believe about Citi, where they had a phishing message and wanted to report it to the bank's fraud/security people. And the person they got to told them that to see whether an email is legit, look at the email and see if it has a citibank logo, because that's how you can tell it's legitimate.

If my fuzzy memory of years back is correct, and that was indeed Citi, then yeah, they should absolutely be on the hook for some amount of this fraud.

Comment Re:you could argue... (Score 1) 155

Well, a large proportion of the developers I worked with over the last 40 years preferred and still use the Mac. In part that's because when they need to, they can pop up terminal.app and do something with the familiar Unix toolset, such as setting up a quick tool stream using pipes.

So I'm sure it makes some people here happy to toss insults at Mac users as all computer-illiterate hipsters. And I'm sure there are a lot of those using Macs. But that's not the reason why I use it, or my developer friends use it.

p.s. I stumbled across my "POSIX Pioneer" certificate, signed by Jim Isaak, when looking for something else.

Comment Re:Market definition is the critical decision (Score 1) 52

Google's market definition was set by the jury in trial court. Apple's was set by the judge and affirmed by the appeals court and implicitly by SCOTUS. So it's not clear to me how strong the Apple precedent is.

I was surprised the judge assigned the market definition to the jury in the Google case. I thought that would have been a 'ruling of law'.

Slashdot Top Deals

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...