×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Figuring Out Where To Live Using Math

porsche911 Check your arithmatic (214 comments)

If Midtown Atlanta made the top 10 list for walkability you need to check your math.

about 4 months ago
top

Ask Slashdot: In What Other Occupations Are IT Skills and Background Useful?

porsche911 What jobs don't require IT now? (158 comments)

All companies are Information companies now. Any job that you can get will require some minimal knowledge of how to use a computer.

about 7 months ago
top

Ask Slashdot: Beginner To Intermediate Programming Projects?

porsche911 Intermediate Programming (172 comments)

If you are really trying to get to an "intermediate" level you could start doing simple data structures and algorithms. Learn the classic sorting routines, linked lists, etc. Once you understand those you can start seeing how they are used in large programs. Look at some of the annotated programs -- the Lion's book on Unix is a good collection of readings to see how an operating system is structured for example. Games are a great way to develop your skills but you may not have enough background yet to get very far. Read the Python source code - you may not understand all of it but you will learn how a language interpreter is put together.

Welcome to a long and twisty path as a programmer. Something new to learn every day.

about 8 months ago
top

Ask Slashdot: Can an Old Programmer Learn New Tricks?

porsche911 No Old Programmers (306 comments)

Old Joke: "What do they do with Engineers when they turn 40?" A: Buy them a birthday cake then take them out to the parking lot and shoot them.

18 years of experience probably means you are either getting close to your 2nd cycle of becoming an "expert" in a technology area or you've been doing the same 2 years work 9 times in a row. Either way, it's time to get out of your current sweet spot and learning something entirely new. You need to get "leverage" with your experience. Really learn something like Agile Processes, Project Management, Finance, a critical business area, requirements management, Continuous Integration/deployment tools, DevOps, etc. Don't try to recreate the same old skills in a new programming language -- it's a dead end.

Me? I started programming 40 years ago in high school and have over 30 years industry experience. I've tried to learn something new every 18 months and have managed to survive so far.

Good luck, the next 10 years of your career can either be the best decade or the hardest depending on how flexible you are.

about 9 months ago
top

Ask Slashdot: Best Alternative To the Canonical Computer Science Degree?

porsche911 Digital Design (347 comments)

You could always look into a digital design or graphics design curriculum. Some of the better art schools are lightyears ahead of the computer sci schools in teaching ways to really use the web and digital media.

Good luck,

about 2 years ago
top

Ask Slashdot: Dedicating Code?

porsche911 Things to do (186 comments)

Plant a tree,
Rescue an abandoned pet
Help kids,

Be a person your Grandmother would respect.

more than 2 years ago
top

Ask Slashdot: Best Science-Fiction/Fantasy For Kids?

porsche911 Re:Heinlein Juvies. (726 comments)

My thought exactly. You could go through the entire series then get him started on some of the short stories.

more than 2 years ago
top

Iran Reverse Engineers Cobra Attack Helicopter

porsche911 Next they'll off-shore them (532 comments)

I can see them off-shoring production to China and getting 100's a month. Their big problem is going to be training pilots fast enough.

As far as the "age" - it was a good design then and is still a good design. Upgrade the weapons to something more modern and they are going to be very dangerous on a battlefield.

more than 2 years ago
top

Ask Slashdot: Good, Forgotten Fantasy & Science Fiction Novels?

porsche911 early Heinlein (1244 comments)

All of the early Robert Heinlein are fun. Lots of great stuff out there.

-c

more than 2 years ago
top

Ask Slashdot: Best Practices For Leaving an IT Admin Position?

porsche911 Checklist (290 comments)

Put together a very detailed checklist of everything you are going to hand off. Make him own the list and take notes then make him do a review with you and his manager of what he's learned and then have both of them sign off on the training. Be available for quick questions but keep very detailed notes about how much time you are spending during the first couple of weeks. When he calls you should ask what he's done already with the problem to make sure he isn't getting into the default behavior of calling you first. You need to make sure he can be successful (as in the don't burn bridges philosophy) but at the same time is taking ownership of the job.

Good luck,
-c

more than 2 years ago
top

Ask Slashdot: Advancing a Programming Career?

porsche911 "Programmer" verses "Problem Solver/Value Adder" (165 comments)

If you continue to present yourself as a "programmer" you will continue to get programming assignments. What sort of projects are you good at? What types of problems can you solve? Think of yourself as a business instead of as an 'employee'. The old "You Weren't Meant to Have A Boss" mindset (see: http://www.paulgraham.com/boss.html ).

Get out there and do something cool, don't sit around waiting for someone to tell you what to do!

more than 2 years ago
top

Michael Dell Dismisses Tablet Threat To the PC Market

porsche911 Famous Last Words (352 comments)

This could end up in the same museum as "No one will ever want a computer in their house" (Ken Olsen), "The world only needs 7 computers", and "640K memory will always be enough". It's a bad idea to make long-term generalizations based on the first release of a new form factor.

more than 2 years ago
top

New York Times Hacked?

porsche911 "e-mail sent by us in error" (103 comments)

It looks like someone at the Times made a mistake.

I just received this from NYTimes:
"Dear New York Times Reader,
You may have received an e-mail today from The New York Times with the subject line “Important information regarding your subscription."
This e-mail was sent by us in error. Please disregard the message. We apologize for any confusion this may have caused.
Sincerely,
The New York Times"

more than 2 years ago
top

Ask Slashdot: Transitioning From Developer To Executive?

porsche911 Congratulations! (229 comments)

Welcome to a whole new world. Get Michael Lopp's "Managing Humans", start thinking about the business value of what you are doing instead of just the technology, and at some point you may want to read Peter Senge's "The Fifth Discipline". You have 3 priorities you need to keep in balance: 1) your financial responsibilities to the company, 2) taking care of your people, and 3) doing the right thing for the customers.

Good luck,

about 3 years ago
top

Ask Slashdot: CS Degree Without Gen-Ed Requirements?

porsche911 Don't think that coding is all you need (913 comments)

Beware: If all you can do is code there's a great chance your job will end up in India. You have to have broader skills now to be competitive. Instead of taking classes in an area you obviously know well (i.e. coding), why not take more general business classes or in the sciences so you can use your coding skills as a tool to solve critical problems rather than being a coder waiting for a problem to get assigned to you? 99% of the people you will need to work with aren't coders and if you don't have any general skills you won't be able to work with them as effectively.

Good luck,
-c

more than 3 years ago
top

Recommendations For C++/OpenGL Linux Tutorials?

porsche911 Re:Standard C++ books (117 comments)

Agreed. It isn't meant for raw beginners but it is still the best reference for the language and essential for a hard core C++ programmer to have as a reference.

Thanks for adding the Lippman Object Model book. Another very worthwhile book to have if someone wants to be a real C++ guru.

more than 3 years ago
top

Recommendations For C++/OpenGL Linux Tutorials?

porsche911 Standard C++ books (117 comments)

I would recommend the following books:
Alexandrescu - "Modern C++ Design: Generic Programming and Design Patterns Applied"
Meyers - "Effective C++" and "More Effective C++"
Stroustrup "The C++ Programming Language"
Stepanov - "Elements of Programming"
Koenig - "Accelerated C++"
Koenig - "Ruminations on C++" (A little out of date but still a good read)

Good luck, C++ has evolved into a large and complex language. You may want to read Stroustrups "The Design and Evolution of C++" on the side to understand how it developed.

-c

more than 3 years ago
top

For CS Majors, How Important Is the "Where?"

porsche911 short-term or long-term (991 comments)

The Technical School will help you get your first job, the Liberal Arts education will help you long after you have to write code, especially if you want to move into management later on.

Good luck,

more than 6 years ago

Submissions

top

Who owns your health data?

porsche911 porsche911 writes  |  about 2 years ago

porsche911 (64841) writes "The Wall Street Journal has an interesting article about how the data from Implanted health devices is managed and the limitations patients run into when they want to see the data. Companies like Medtronic plan to sell the data but won't provide it to the person who generated it."
Link to Original Source
top

Hackers stole information from IAEA servers

porsche911 porsche911 writes  |  about 2 years ago

porsche911 (64841) writes "A hacker group called "Parastoo" have broken into an International Atomic Energy Agency computer and released details of more than 100 IAEA experts. They are asking the experts to criticize Israel's nuclear arsenal. Original article in German here: http://www.sueddeutsche.de/politik/un-atombehoerde-hacker-brechen-in-iaea-netzwerk-ein-1.1535207

Google translation:
http://preview.tinyurl.com/c8da9sd"

Link to Original Source
top

Google-Oracle Jury

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes ""The jury decided Google did make use of Oracle's Java interfaces, but was unable to reach a decision on whether that was protected under the so-called fair-use doctrine.

The jury did find separately that Google infringed a minimal amount of Java source code as it developed its Android mobile phone software, though the judge overseeing the case indicated Oracle would only be entitled to statutory damages as a result. ""

Link to Original Source
top

IBM

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes "Cringely has a series of blogs about IBMs plans going up this week. The first one talks about plans to double Earnings per Share by moving everything but Sales off-shore (i.e., India). Some great and still very applicable quotes from the late Steve Jobs about what happens when "content" people get pushed out by "marketing" and "accounting" folks."
Link to Original Source
top

Economist on the death of distance

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes "Interesting article from The Economist on the bifurcation of jobs in America.
"While employment in retail trade is down by more than 300,000 jobs over the past decade, employment in "computer systems design and related services" is up nearly 400,000 jobs.""

Link to Original Source
top

Hacking is Important

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes "As usual, Rands nails the discussion in his bolt "Hacking is Important".

"Failure to create some form of predictability will result in chaos. Failure to create some sort of well-maintained Barbaric chaos inside the company guarantees that a fast-moving, ambitious, risk-taking and ruthless someone else — someone outside the company will invade, because they know what you forgot: hacking is important.""

Link to Original Source
top

The Computer-controlled future

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes "Great article in Spiegel about the future with computers and the social impacts.
"the power of computers is growing so quickly that they will be capable of operating with absolutely no human involvement at some point in the future. Ford believes that 75-percent unemployment is a possibility before the end of the century.""

Link to Original Source
top

Inventor of the Pinball machine dies

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes ""Steve Kordek, who revolutionized the game of pinball in the 1940s by designing what became the standard two-flipper machine found in bars and penny arcades around the world, died on Sunday at a hospice in Park Ridge, Ill. He was 100."

“Steve’s impact would be comparable to D. W. Griffith moving from silent films through talkies and color and CinemaScope and 3-D with computer-generated graphics,” Mr. Sharpe said. “He moved through each era seamlessly.”""

Link to Original Source
top

New encryption flaw discovered

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes "" The researchers whimsically titled their paper “Ron Was Wrong, Whit Is Right,” a reference to two pioneers in public key cryptography, Ron Rivest and Whitfield Diffie."

It appears that there is a new flaw in the standard encryption algorithms being used that causes about 2 out of every 1,000 keys to be nonrandom.

"“This comes as an unwelcome warning that underscores the difficulty of key generation in the real world,” said James P. Hughes, an independent Silicon Valley cryptanalyst who worked with a group of researchers led by Arjen K. Lenstra, a widely respected Dutch mathematician who is a professor at the École Polytechnique Fédérale de Lausanne in Switzerland. “Some people may say that 99.8 percent security is fine,” he added. That still means that approximately as many as two out of every thousand keys would not be secure.

The researchers examined public databases of 7.1 million public keys used to secure e-mail messages, online banking transactions and other secure data exchanges. The researchers employed the Euclidean algorithm, an efficient way to find the greatest common divisor of two integers, to examine those public key numbers. They were able to produce evidence that a small percentage of those numbers were not truly random, making it possible to determine the underlying numbers, or secret keys, used to generate the public key.""

Link to Original Source
top

Chinese Hackers in Nortel

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes "The Wall Street Journal is reporting that suspected Chinese hackers had control over Nortel's computers as far back as 2000 but the extent wasn't known until 2009.
"Using seven passwords stolen from top Nortel executives, including the chief executive, the hackers—who appeared to be working in China—penetrated Nortel's computers at least as far back as 2000 ""

Link to Original Source
top

Apple verses Google innovation approaches

porsche911 porsche911 writes  |  more than 2 years ago

porsche911 (64841) writes "Good article comparing the innovation strategies of Google and Apple.

“There is nothing democratic about innovation,” says Paul Saffo, a veteran technology forecaster in Silicon Valley. “It is always an elite activity, whether by a recognized or unrecognized elite.”"

Link to Original Source
top

2nd and 3rd Generation Internet Repression

porsche911 porsche911 writes  |  more than 4 years ago

porsche911 (64841) writes "Forbes blog about "Access Controlled" from the Open Net Initiative describes the next generation information control techniques being developed. Pointers to the book and more background. Basically the open net we've all grown to know and love may be a very different place in the future if these techniques become common."
Link to Original Source

Journals

porsche911 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?