Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Where is the User choice in all of this (Score 2, Interesting) 203

Whenever I read stories like this, ie. Windows vs. Linux vs. OSX vs. it seems to always be from the perspective of the implementers or those looking to make a point about whether it can be done. Why not offer choice? Why the constant insistence that users must have the flavour of the day foisted upon them?

There is complexity in running an estate with multiple OS on offer but the truth is, any sysadmins capable of running a *nix infrastructure and operation should find supporting and mainlining other OS estates relatively straightforward.

In my personal life I make good use of all 3 mainstream OS and at work I have a choice which is made available all users too.

And with modern browsers offering productivity suites through web based platforms and file storage and infrastructure delivered via consolidated IaaS / AWS / Azure / Google Compute / NEOther why does anyone even care about the opinions techies have in regards to their own preferences.

Use what's right for you and let the technology work with your choice to ensure interoperability, security and information management. That's where the techies should focus.

Comment Run out of ideas? (Score 1) 63

Have you run out of ideas to improve your product? Is listening to your customers too difficult and time consuming?

Why not do what every lazy marketing department does, REBRAND!

It gives the illusion of doing something whilst actually doing nothing. Who cares if you are doing something as long as it _feels_ like you are!

Now available wherever the kool-aid is drunk!

Comment Honesty is the best policy... (Score 1) 308

Someone hired you to take over a development that was clearly in trouble.

If it is your honest opinion that the codebase you have to work with is substandard you need to bring this to the attention of the person who pays your invoice.

You should put your case forward in relation to the codebase you have been given to work with and the issues you feel are pertinent. Make it about the code, not the people.

Your statement that "The person who worked on the project before you is well respected in the company" is a subjective one and should not be part of your argument or decision on what needs to happen to fix things.

If they dismiss you for being honest then that is their problem. You will have done your best. That's what you are being paid for.

Comment Re:The numbers (Score 1) 139

- $3.2B Moto's 2011 cash

- $2.4B Moto's 2011 deferred tax assets

- $2.35B Moto's Set-top-box business sold in 2012

- $75M Moto's factories business sold in 2013

- $2.91B Moto's Mobility business sold in 2014

So the "patents, engineering talent, and insight into the mobile-device marketplace" cost $1.56B, not $7.1B

Don't forget :

$??? Perpetual licensing agreement to Motorola Patent Portfolio

That's got to be worth a fair chunk of change too.

Comment Hey, NSA, Welcome to the 1980's (Score 1) 698

First off, a BIOS attack? Really? Welcome to the 1980's!

Secondly, Request for software update to attack BIOS? Have you tried to update your BIOS? It aint that easy and any bios made since the late 80's has safeguards to prevent BIOS updates in the way that's described.

Thirdly, to brick enough computers to ruin the US economy using a bios update would be practically impossible. Never mind that such an attack would have to target people stupid enough to apply updates to systems in locked server rooms. Good luck with that!

Comment BIOS Attack? (Score 5, Informative) 504

The BIOS attack mentioned in the article was really telling about how the spin machine works: To Quote:

This is the BIOS system which starts most computers. The attack would have been disguised as a request for a software update. If the user agreed, the virus would’ve infected the computer.

John Miller: So, this basically would have gone into the system that starts up the computer, runs the systems, tells it what to do.

Debora Plunkett: That's right.

John Miller: --and basically turned it into a cinderblock.

Debora Plunkett: A brick.

John Miller: And after that, there wouldn't be much you could do with that computer.

Debora Plunkett: That's right. Think about the impact of that across the entire globe. It could literally take down the U.S. economy.

First off, a BIOS attack? Really? Welcome to the 1980's!

Secondly, Request for software update to attack BIOS? Have you tried to update your BIOS? It aint that easy and any bios made since the late 80's has safeguards to prevent BIOS updates in the way that's described.

Thirdly, to brick enough computers to ruin the US economy using a bios update would be practically impossible. Never mind that such an attack would have to target people stupid enough to apply updates to systems in locked server rooms. Good luck with that!

Finally, this whole article just demonstrated how they just don't 'get it'. They collect data on you and your loved ones but they don't "look" at it because "that" would be illegal. And if they get caught well then it's "their PR" which is bad, not their actions.

And surely hacking the answers to cheat on a test to be a spy surely qualifies you for the job by default?

Comment ARPA vs INTER nets (Score 1) 413

I realise this will not come as a shock to most of the /. community but the internet was born out a government program under the Advanced Research Projects Agency. To pretend like government intrusion and monitoring was never built into the DNA of the net is naive in the extreme.

If you start with the assumption that anything you do on a networked device is vulnerable then you wont be disappointed when your online 'privacy' or 'rights' are violated by the very people who gave you the ability to expose yourself in such a way.

Its better to think of yourself as less interesting to the government than you would think. Yes, the government can spy on you and your online habits but chances are you are not interesting enough to be of interest. If you suspect you are then get clued up on how to protect your own privacy rather than bleat to the very people who are violating it in the first place.

Comment Rubbish (Score 1) 441

This is now the second inane piece of trollbait I have seen on the frontpage of /. in the last 2 days. I know pleanty of twentysomething developers who are awful and plenty of 40+ devs who can do in a day what it takes junior developers weeks to accomplish. And vice versa.

I think the OP says more about competent developers over 40 who want to work for such an idiot rather than saying a lot about talented youths who are willing to tolerate such crap!

Slashdot Top Deals

"Probably the best operating system in the world is the [operating system] made for the PDP-11 by Bell Laboratories." - Ted Nelson, October 1977

Working...