Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re: black box, suckers (Score 1) 100

My understanding is that whereas Huawei have indeed shared source code with various governments and customers, they've been having trouble with the reproduceability of their builds, such that it was difficult for the reviewers of the provided source code to determine whether the binaries had indeed been built from that source code (and from nothing else besides).

Comment Re:Ethics classes (Score 1) 91

I've always wondered why ethics classes are mandatory for engineers in many schools now.

It's usually the business people that have the ethics issues.

People who train as engineers are well placed to become managers. For example: when I trained as an engineer I decided early on that I did not want to remain in a purely technical role beyond 10 years after I graduated. So I took an MBA class and left R&D, which enabled me to work in sales, finance, project management, and most recently quality management. My engineering background was useful in all of these roles.

Comment Quality assurance versus quality control (Score 1) 166

Please excuse the boring terminology point but, hey, we're all nerds here. (Software testing) is a form of quality control, not quality assurance. Quality control is aimed at preventing non-quality from reaching customers, through inspection, test, audit etc. Quality assurance is aimed at preventing non-quality full stop. Quality assurance techniques include left-shifting, design review, buddying, training, process improvements based on root cause analysis and escaped defect cause analysis, ...

Comment Re:Code of Conduct - Exact Text (Score 2) 780

I was blacklisted years ago by David Miller from contributing to the kernel, and from contributing to every other project that user vger as its mailing list server, for calling David out on his use of the word "jackass" in his review of a patch submitted by another contributor. David Miller is the vger admin. This issue affects not only Linus but several of his lieutenants as well.

Comment Re:EMC/UL testing?! (Score 1) 67

As in certain other fields of engineering, the regulatory tests are sadly inadequate at determining whether a product will meet real-world requirements. The particular shortcoming I'm thinking of in this context is the fact that the susceptibility test has to be run at frequencies that stop well short of either of the main wifi frequency bands. (From memory: only up to 1.2GHz or so). The standard also describes a test at higher frequencies which include both of the wifi bands but it is optional.

Comment Re:What's the Solution? (Score 1) 135

These attacks cause service outages because legitimate DNS lookups can't be handled by the servers that are under attack (which I'm assuming here to be the authoritative name servers for the domains that are experiencing service outages). Most users don't ever query the authoritative servers directly; the legitimate queries come from their ISPs' resolvers, and those resolvers only query the authoritative servers if they don't already have the answer in their local cache. And that only happens (in respect of popular sites) when the cache entry's time-to-live has come and gone.

So perhaps one way of at least partially mitigating these attacks is for resolvers to hang onto cached records past their TTL and to continue serving them when the authoritative name servers are unavailable. Those resolvers will then of course need a robust alternative cache ejection policy (e.g. based on the frequency with which an expired record continues to be used, how overdue it is, and overall resource usage).

I do realise that Dyn is also known for their dynamic DNS service, and that the above mitigation isn't effective for ephemeral records which intentionally have a short TTL. That can't be helped.

Comment Re:Magnetic strip? (Score 1) 222

Yes, it's more convenient to just be able to read the 3-digit code from the card without the need for an additional device. But it's less secure than using a card reader because (1) the 3-digit code is a lot shorter than the 8 digits the card reader I described generates, (2) it still does not protect against card theft, since anyone who has the card also has the 3-digit code, and (3) it does not validate the specific transaction, it only demonstrates that the card is in possession of the person who's trying to make payment (modulo no. 1 above) at about the time the transaction is attempted.

Slashdot Top Deals

"I think Michael is like litmus paper - he's always trying to learn." -- Elizabeth Taylor, absurd non-sequitir about Michael Jackson

Working...