Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment From Second Hand Experience... (Score 1) 207

My wife is an Art teacher and runs in to this problem all of the time. She tries to show her students famous works of art, the easiest way being through Google Image Search. Of course, this doesn't work, since you could possibly get something bad. For now, she uses Bing's image search, but it's only a matter of time before this is killed, too.

Comment Parse Tree Analytics (Score 1) 684

Although I never saw it in action, my professor told us in our compilers class that they use a piece of software for the intro classes which compares the parse tree of the Java apps the students submitted and could show commonality between the programs.

Of course, you would see similarity because everyone was writing a similar program, but it would catch someone just renaming a pile of variables and changing comments.

Comment Re:Voicing This Problem Now (Score 1) 250

You'd need an isolation network for every single business in the US (10's of millions, IIRC).

Also, the current IP solutions are SSL encrypted. Also PIN based transactions have an even higher encryption on them. The PIN Pads have a specific key attached to them so they will only work with the current backend. If you switch processors, you have to switch PIN pads as well.

Another problem, the IP terminals a quite a bit more expensive. $200-$300 for dialup, $500-$600 for IP. (If you're paying more, you're being robbed!)

Comment Re:Voicing This Problem Now (Score 1) 250

IP terminals do exist. The problem: merchants typically aren't savy enough to first, set up an IP network and second, request an IP terminal.

We have to do a lot of discovery on our end to provide the right solution.

Also, the IP terminals are fairly "dumb". The OS is very minimal and it only makes outbound connections. You can't really administer them remotely; it's all through the machine interface.

Comment Voicing This Problem Now (Score 1) 250

You can throw away your dial-up credit card machines then. We are starting to see telcos switch to SIP trunking. Credit Card machines are very sensitive, even more so than fax, which causes them to flake out across a SIP trunk. We already can't sell dial-up terminals to people using DSL or VoIP (Vonage, Time Warner) because the terminals just can't handle it.

Comment HIdden Cost (Score 2, Interesting) 362

I won't name names, but one of our competitors does this. The down side, they over-inflate their prices to the customers to compensate for 6 digit salaries for sales people. They are lucky to be in a business where they can pull this off because of the complexity of pricing, but as with any market, the margins get thinner and thinner and they just won't last.

Comment Security Is About Trust (Score 1) 730

If you are that afraid of them doing something wrong, it better be in the contract you sign with them with all of the penalties plainly laid out.

I would much rather have the IT Admin in house, but then again, I'm an IT Admin. We have to sit in a weird spot in the company. We have to learn all of the dirty secrets. If someone is divulging secrets, we are the ones that have to pull up their email records and browser history.

I take that responsibility very seriously. You have to find someone that takes it seriously, too.

Comment Re:Vim (Score 1) 1055

I primarily program using Ruby on Rails. When I started, it was with an Eclipse based IDE. I then jumped to Netbeans when their support for RoR matured. Now it's all (gvim/mvim), a command line and git.

For Java work, I stick with Netbeans, since hand building a Java project from scratch can be a lot of work.

Slashdot Top Deals

* UNIX is a Trademark of Bell Laboratories.

Working...