Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re: Oh noes!!!!11111 (Score 4, Insightful) 449

No problem of this nature is fixed by forcing people to change. The only way is to stick it out in the hostile environment until you are a majority. Then you can change the situation simply by acting differently. When you're the majority, you set the tone.

That's assuming there's a problem to begin with, of course.

The Civils Right movement says otherwise. Sometimes you have to force people to be less of an asshole.

Comment Re: Oh noes!!!!11111 (Score 2) 449

I've worked in IT for over 2 decades. This may have existed back in the late 80's, possibly even into the very early 90's, but since about 1995 has been a fallacy perpetrated by those with an agenda to cast this industry as somehow sexist or backwards. If there are any people left who are still truly hostile to females in IT that haven't been weeded out through attrition, harassment claims, or other HR procedures, they must be really good at hiding how they truly feel and therefore it isn't really an issue anymore.

Stop being disingenuous and perpetrating "what if" scenarios to further a divisive agenda you know is going to lose, anyway.

I tend to agree with you that harassment in the workplace is significantly less than what it used to be. The stigma still lingers, however. It doesn't help when geeks make presentations with sexual parts in conferences, either (and no, the answer is not to develop humor or grow thicker skin, but to be less of a pervert.)

Harassment in academia and in other STEM fields still exists, and it is serious enough to make students switch careers and not pursue work in Academia. I've seen it.

Comment Re: Oh noes!!!!11111 (Score 1) 449

I don't understand why they should be "encouraged" to study computer science to just keep up some random statistic vs. encouraging them to do whatever their hearts tell them they should be doing? Stories like this make me so angry because it casts women as unable to decide for themselves and we should be "correcting" their life choices. Whatever...

It is not just to keep up some random statistic. Software careers are among the most profitable, and when a segment of society does not participate in them, society as a whole suffer.

I do agree that the word "encourage" is a bit mystifying. But it is important since there is not enough done from elementary to HS to show that a career in STEM (not just software) is open to anyone, not just boys.

Furthermore, it is important to understand why STEM is so difficult for women. I know for a fact that there is a shitload of harassment, specially in Academia (I've seen it.)

That will make any woman say "fuck it!". Not so much in software, but in other hard sciences like Math and Biology. The solution is not to say "grow a thicker skin", but to be more decent (or rather, less creepy and grabby.)

Comment Re: Oh noes!!!!11111 (Score 4, Insightful) 449

So if there were outside factors that biologically predisposed men and women towards different career paths or interests would you accept that those might result in something other than an even distribution of employment in certain vocations?

This doesn't make sense. The differences are either innate (biological) or the result of external factors. If they're the result of external factors (i.e. not biological) then they're likely to be amenable to change. The fact that the participation of women varies hugely between cultures (for example, in India, Korea, Israel, Iran, and Lithuania, Romania, it's a lot higher) implies strongly that external factors are far more of a reason why we have so few women than anything biological.

Comment Re: Oh noes!!!!11111 (Score 4, Insightful) 449

Outside factors are not an issue.

If every role model of a programmer you see until you're a teenager is male.

If computer programmer Barbie involves the girl doing some design, but the actual coding being done by boys.

If every children's TV show that includes both women and computers has the woman saying computers are hard and the man solving the problems.

If all of the clever boys at your school are encouraged into extracurricular activities involving computers, but the girls aren't.

I'm sure it would have no impact at all on you.

If you don't think that this is real, then sit down for a couple of hours this evening and watch two hours of children's TV. Count the number of male vs female lead roles. Count the number of times anyone builds anything and whether it's done by a male or female character.

Comment Re: Ignores the issue (Score 1) 115

The problem was the crowded Republican field, and the noisiest got a higher percentage, egged on by the media who not only supports Hillary but sold lots of newspapers and air time.

As a life-long Republican (not for long, I send an voter update to change to independent), I don't buy this. The noisest got a higher percentage because a higher percentage of the constituency are stupid. This is not kindergarten when the teacher ask who can scream "me!" the loudest.

This is a replay of what I saw in 2012, but just worse. Whatever I used to identify myself in the GOP, that's gone, gone for good, eaten inside out by a cancer since 2008, but with cysts growing all over it for the last 20 years.

There is nothing there to salvage, and the constituency has become stupider (or they were stupid all along, but now they have found their voice via the Donald.) Like dodos marching off a cliff, good riddance!

Comment Re:First lesson (Score 4, Interesting) 135

I have two major beefs with IPV6. The first is that the end-point 2^48 switch address space wasn't well thought-through. Hey, wouldn't it be great if we didn't have to use NAT and give all of those IOT devices their own IPV6 address? Well... no actually, NAT does a pretty good job of obscuring the internal topology of the end-point network. Just having a statefull firewall and no NAT exposes the internal topology. Not such a good idea.

The second is that all the discovery protocols were left unencrypted and made complex enough to virtually guarantee a plethora of possible exploits. Some have been discovered and fixed, I guarantee there are many more in the wings. IPV4 security is a well known problem with well known solutions. IPV6 security is a different beast entirely.

Other problems including the excessively flexible protocol layering allowing for all sorts of encapsulation tricks (some of which have already been demonstrated), pasting on a 'mandatory' IPSEC without integration with a mandatory secure validation framework (making it worthless w/regards to generic applications being able to assert a packet-level secure connection), assumptions that the address space would be too big to scan (yah right... the hackers didn't get that memo my tcpdump tells me), not making use of MAC-layer features that would have improved local LAN security, if only a little. Also idiotically and arbitrarily blocking off a switch subspace, eating 48 bits for no good reason and trying to disallow routing within that space (which will soon have to be changed considering that number of people who want to have stateful *routers* to break up their sub-48-bit traffic and who have no desire whatsoever to treat those 48 bits as one big switched sub-space).

The list goes on. But now we are saddled with this pile, so we have to deal with it.


Comment Flood defenses? (Score 5, Informative) 135

There is no flood defense possible for most businesses at the tail-end of the pipe. When an attacker pushes a terrabit/s at you and at all the routers in the path leading to you as well as other leafs that terminate at those routers, from 3 million different IP addresses from compromised IOT devices, your internet pipes are dead, no matter how much redundancy you have.

Only the biggest companies out there can handle these kinds of attacks. The backbone providers have some defenses, but it isn't as simple as just blocking a few IPs.


Comment Re: Ignores the issue (Score 3, Insightful) 115

Part of it is idiots crossing party lines to vote for the "easiest to beat" candidate in the party they don't plan to actually vote with in the general.

I get the idea of "strategic" voting, but for the love of freedom, please only do that by voting for "least bad" in the general, rather than sabotaging All of us In the primaries.

Bullshit. Intra-party results in closed primary states mirrored those of the country as a while. There is a lot to debate how Clinton won over Sanders, but there is no debate there were a whole bunch of idiots on the other side of the fence who ENTHUSIASTICALLY went for Trump, hook, line and sinker.

One has to wonder the type of bubble one must live in to buy into that kind of tripe.

Comment Re:Remote exploit (Score 1) 72

Most attacks these days are a sequence of memory safety violation followed by memory disclosure followed by arbitrary code execution. ASLR is meant to make the memory disclosure part harder, but there are now half a dozen known attack techniques that allow ASLR to be bypassed. Off the shelf attack toolkits will include these mechanisms, so it's a mistake to assume that an attacker won't be able to bypass it. It increases the barrier to entry from script kiddie with 5-year-old toys to script kiddie with new toys.

Slashdot Top Deals

New crypt. See /usr/news/crypt.