Follow Slashdot stories on Twitter


Forgot your password?
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:Decimal Numbers? (Score 1) 302

BigDecimal is not a work-around. It is the exact solution to the problem.

All mechanical representations of numbers lead to inaccuracies.

Computer scientists using binary-based representations realize this and design their algorithms to minimize the errors.

Accountants just define any inaccurate decimal-based results as "correct".

Comment Same as it ever was (Score 3, Insightful) 130

Flashback to the 80s: Worker productivity temporarily increased when they took away copies of "PC Week" tabloids and stopped people from running "Tetris". Workers eventually found other ways to kill time.

Flashback to the 90s: Worker productivity temporarily increased when they didn't let people access the World Wide Web and stopped people from running "Doom". Workers eventually found other ways to kill time.

Flashback to the 00s: Worker productivity temporarily increased when they didn't let people access Napster and stopped people from running "Quake III". Workers eventually found other ways to kill time.

Comment Re:Necessary, but a waste of time. (Score 1) 38

Unless they are in disposable positions, their manager rightly points out that they're valuable members of the HR/Finance/Sales team, and that if their CEO writes them an email ordering them to give something up, they're going to follow orders.

I mostly agree with you, but I think you might have missed my intent...

Why does a random HR employee have the ability to send an export of all employee data to an external address? Why would the CEO legitimately need to ask anyone to send them data (as in, the data itself, not a link to an internal webpage or file)?

Yes, people will always make mistakes, and non-techies will never keep up with the latest social attacks - Thus my point; not saying someone should lose their job for an offense they don't even understand, but rather, that they shouldn't have the physical capability of accidentally causing such a breach.

Though rare, this counts as one area where we could take a tip from high-security government agencies - No removable media, no direct internet access, no email attachments can leave (or enter) the local network without some form of sign-off by InfoSec, etc. And yes, of course people will always find ways around such technical barriers, but at that point it becomes a lot harder to claim ignorance instead of malice.

Comment Necessary, but a waste of time. (Score 1) 38

I can easily see the theoretical value in this. In practice, this will just scare and confuse 99% of non-IT people.

Corporate cybersecurity must operate in such a way that it doesn't require the end users' cooperation, or it will fail. Sure, you can teach people best practices, how to spot phishing attacks, not to use the same password on every system they use; but as soon as you move beyond that, you've set yourself up for complete failure.

Comment Re:Who are the main characters based on (Score 1) 75

Take it more for the nostalgia of what the 80s were like in the tech industry and less about real history. And enjoy it - Season 1 didn't get great ratings, but AMC felt it had potential and gave it a season 2. Season 2 had terrible ratings and for some reason or other, AMC renewed it.

Meh, as much as I like tech, these kind of drama shows about tech history don't translate into good entertainment. A documentary like Triump of the Nerds is more informative and entertaining to watch.

Comment Re:The problem with GPL (Score 1) 237

My freedom to own you as a slave is imposed on by your freedom not to be a slave.

Being a slave owner involves force over another, making them take actions against their will.

The developer's freedom to release a binary blob without source imposes on the user's freedom to change the functionality of that blob later.

There is no force on the user to accept the binary in the first place. Once they have the binary, they are free to change it as they wish. To require the developer to also release the binary is to force an action on his part.

Freedom involves complex choices. If you believe that isn't true, report to Raqqa as a volunteer slave since you are now imposing on ISIS's freedom and there can't possibly be any contradiction.

And so concludes our Bad Analogy of the Day segment.

Comment Re:The problem with GPL (Score 1) 237

Binary blobs don't violate the GPL.

Yes they do, but I wasn't talking in particular about the firmware issue, if that's what you mean. I'm talking about the requirement to release source code as an "essential freedom":

The freedom to study how the program works, and change it so it does your computing as you wish (freedom 1). Access to the source code is a precondition for this.

Slashdot Top Deals

This universe shipped by weight, not by volume. Some expansion of the contents may have occurred during shipment.