Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Wrong (Score 5, Insightful) 335

That's not the same web devs making those same mistakes. Developers with some experience do not write code that fails against easy sql-injection. But companies prefer to hire younger inexperienced devs for the reasons that have been discussed here on /. many times.

I'll add to that that this isn't limited to web developers.

Comment Increase the cost of the interruptor (Score 5, Insightful) 224

Looking at it from a manager's perspective:

Work in rooms, not an open-plan office. This way, if someone wants to interrupt you, they have to "pay" a higher price, like messaging you (you may not be available or the nature of the asynchronous conversation may not be convenient) or actually getting up and going to your room.

Cultivate a culture of empathy, wherein people learn to pick up signs that someone is busy working. Apply peer pressure when someone doesn't pick up the cues. Make it an "insult" to destroy someone's flow. Don't be a dick about it, though - there are ways of cultivating this slowly and discreetly.

Comment Re:Do older programmers even need help? (Score 1) 435

Networking is a form of communication. If they're not good at this form, what others are they bad at? Code monkeys are cheap and plentiful, people who can communicate their designs, collaborate with others, and work on a team where everyone benefits from the specialist expertise that each individual has are rare. The latter are the ones worth hiring.

Bull. I find networking hard and tasking, but am also one of the best communicators on any team I'm in. They're two different skills - creating new bonds and performing within new ones.

Comment Remain Calm! (Score 3, Insightful) 496

I mean, we could always trust the Russians to work in our best interests. Also, they were never sneaky about anything. Always truthful and honest, them Russians.

And Iran only threatened to wipe The West off the map, starting with Israel, with any means at their disposal. And that they could make a nuclear bomb if they wanted to, because it was a right granted to them from Allah.

Not to mention that they're playing the North Korean game of "let's talk" / "we're not talking to you anymore" / "let's talk" / "we're not talking to you anymore" with the UN. Remember what North Korea has now after a few years of that? Ah, yes, The Bomb.

And all this in the hands of a fanatic regime, intent on spreading Islam through force, feared and hated even by most other Islamic nations, all the while being one of the most horrible human-rights violators of our time.

But there's nothing to fear. They're not after the bomb. They say they are, but there's nothing to worry about. It's just a nuclear power plant.

REMAIN CALM!

Comment Let's make this meta (Score 1) 285

[fanboy of company] was one of a surprisingly large number of people writing in this morning to report that [company's website] is having serious troubles taking pre-orders of the [yearly product refresh]. People are seeing the error page or just waiting an insanely great long time to get pages back. Just imagine [pseudo-snarky comment trying to downplay moderator's asskissing]!

Would this story appear for Microsoft's Windows? Adobe Photoshop? Color me skeptic.

The Internet

Israeli ISPs Caught Interfering With P2P Traffic 139

Fuzzzy writes "For a long time, people have suspected that Israeli ISPs are blocking or delaying P2P traffic. However, no hard evidence was provided, and the ISPs denied any interference. Today Ynetnews published a report on comprehensive research that for the first time proves those suspicions. Using Glasnost and Switzerland, an Internet attorney / blogger found evidence of deep packet inspection and deliberate delays. From the article: 'Since 2007 Ynet has received complaints according to which Israeli ISPs block P2P traffic. Those were brought to the media and were dismissed by the ISPs. Our findings were that there is direct and deliberate interference in P2P traffic by at least two out of the three major ISPs and that this interference exists by both P2P caching and P2P blocking.'"

Comment Re:Every ID card? (Score 3, Insightful) 303

What is a "biometric visual scan of their face"? A photograph?

It is the mathematical function that identifies your facial features as your own to a very high degree of probability.

Every country does that. It's called an ID card. As far as fingerprints, I've had to submit my fingerprints like 10 times for various services, clearances, not to mention immigration documents.

Your fingerprints are not in one big database that can be hacked (as others have been hacked before) along with the rest of your entire country. If you've given your fingerprints 10 times, I hope you're sure you gave them to people who can keep them a secret. You can't really change them later.

As much as it bothers me to have centralized databases of ANYTHING, if there is anything that needs a centralized database, it's identification. I'm a privacy freak and I am not sure that this bothers me, especially in the context of a country that can claim the dubious honor of being the most likely terrorist target in the industrialized world.

Think of someone using this database, along with live CCTV footage from a railway station (say, a public online webcam), singling out the Israelis in the crowd. When they see a large group of Israelis coming by, a suicide bomber comes along and explodes next to them. You don't have to be a privacy freak to shudder at that thought.

Slashdot Top Deals

Kill Ugly Processor Architectures - Karl Lehenbauer

Working...