Ask Slashdot: How Often Should You Change Jobs?
I have 2 simple rules:
1) If the job is really terrible -- crazy boss, lousy environment, not enough funding -- it should be obvious within 30 days or so. At most companies this is a probationary period anyway. I've quit a couple of jobs quickly for these reasons, and I've found that HR (if not the boss) is generally okay with this. Act professionally, of course, give notice and all that, but It's better to cut ties early if you feel that you and the employer are not a good match.
2) Assuming I get past 30 days and still like it, I've always tried to make it to 2 years before trading up. I've found that after year 1, I'll get a bonus or a bump in salary almost automatically. Year 2 is when the employer starts to look for something more out of me, and also when I'll get a better idea of possible career paths within the company.
My experience is that job hopping is not a big deal as long as you have good reasons, and as long as it's not TOO often. Good reasons include relocation, a substantial (I'd say 25%+) bump in pay, or changing jobs to do what you really want to do. No one will care that you only worked 3 months at The Gap before finding a Web developer job.
Ask Slashdot: What Should Every Programmer Read?
Applied Cryptography by Bruce Schneier. Really any and all of his books.
California Utility May Replace IT Workers with H-1B Workers
Well, they did say "it is more important to focus on how things look from the top than how they actually are down below".
Heartbleed Sparks 'Responsible' Disclosure Debate
I'd say you follow the same process: inform them, wait 1/3/7 days or whatever, then go public. If you suspect the exploit is deliberate, informing the manufacturer isn't telling them anything they didn't already know. Or, maybe it IS telling them, since in the case of open source, the exploit could have been introduced surreptitiously by a developer who's long gone, and the current developers have no idea of the exploit's existence.
Caveat: if you suspect revealing the bug will cause blowback to you. If you think the NSA/FBI/CIA will come after you for threatening to reveal it, I'd say just go public immediately, and include major press orgs so they can't just silence you.
Making a Case For Cyberwar Against Syria
Minor quibble with this. SEAD is a combat tactic which assumes you're already at war and suppressing defenses to advance a specific mission. A no-fly zone is a strategic patrol. It tells the enemy that you have overwhelming air superiority within the theater, and it assumes the enemy isn't willing to risk testing the no-fly zone. In the past no-fly zones have been more or less declared and imposed, and actually SEAD missions were unnecessary.
To be sure, actually enforcing a no-fly zone could require SEAD missions, in which case, it's not so no-fly. But yeah, it's still a dumb idea here, and it could provoke a wider war.
Making a Case For Cyberwar Against Syria
Suppression of Enemy Air Defense (SEAD aka Wild Weasel) is a combat tactic intended to reduce friendly losses and improve the effectiveness of air strikes. That is, to kill more of them and less of us. How in hell does someone consider that "humanitarian"?
This is one of the most Orwellian pieces of doublespeak I've read all year.
Writing Documentation: Teach, Don't Tell
No. Experts in their field shouldn't need to be taught how to understand your system; that's part of being an expert ( or indeed, even a professional).
I completely agree but how are we even calling this "expert" or "professional"? Do I need to educate someone, a "programmer" let's say, about the fundamentals of Java? About electronics? About physics? How to type? How to use the toilet?
Maybe that's over the top, but at some point, if someone claims they can do X, we assume a basic level of skill. To use a car analogy: cars basically all work the same way. The car dealer doesn't make you take a test before you buy it and drive it home. They have to make sure you have a valid license, of course, but licensure is not their problem, and licensure by the state assumes that the basics of driving are the same across different models of cars.
Writing Documentation: Teach, Don't Tell
Since when did the car owner's manual teach the owner how to drive?
I work for an airline. We train pilots on our aircraft and our procedures. We certainly do not teach them how to fly.
HP Discontinue OpenVMS
It's been a while since I read it, but "Showstopper" is a pretty good history of Cutler & Windows NT:
Jeremy Hammond of LulzSec Pleads Guilty To Stratfor Attack
You address it through the statute of limitations and the 6th Amendment. Only the most heinous crimes have no limitations, and for misdemeanors and non-violent felonies, the prosecution must file charges within 2-7 years (depending on the state and crime). Once charges are filed, the right to a speedy trial attaches.
Also, it's not really practical for a prosecutor to run serial trials. They basically have to go to all the same trouble, but it ends up costing more time and money since it's not done all at once, and it will piss off most judges royally. Prosecutors are also usually elected, so they don't often get away with this tactic. The only time it's really useful is if you have a defendant who you can charge with, say, burglary, while gathering evidence toward a murder charge. This is more to prevent the defendant from fleeing, but they still might get bail on the lesser charge. Lots of episodes of "Law & Order" use this as a plot device.
Utilities Racing To Secure Electric Grid
I can appreciate your sentiment, but I think it's wishful thinking. We can certainly argue that these devices SHOULD not be connected to the Internet, but the simple fact is that a great deal of them ARE connected, and many that are not "intended" to be connected will end up connected, and those systems need to be designed with that possibility in mind. They are currently designed with no more security than my pull-start lawn mower.
Ask Slashdot: How Would You Convince Someone To Give Up an Old System?
All good ideas. I think a lot of people are actually open to change as long as they feel their skill and experience is being valued. Suggest that it would be good to simplify and modernise the process and find out what ideas Bob has and the challenges he sees in implementing any changes.
This is definitely true but I would also add "offer to help with the changes" (or find someone who is capable of helping). Outsiders may have good ideas about how to fix things, but anyone can be a critic. That can be annoying to the original maintainer who has to do the work, regardless of how much it improves the system.
Ask Slashdot: Why Does Wireless Gear Degrade Over Time?
That's actually a really cool setup you described. Would you be willing to share detailed build instructions, including the software setup? Strictly for educational and entertainment purposes, of course :)
CPUs Do Affect Gaming Performance, After All
GPUs only tend to allow you to offload the strait-shot parallelized stuff - graphic blits, audio, textures & lighting - but the core of the game logic is still tied to the CPU. Even if you aren't straining the limits of the CPU in the final implementation, programmers are still limited by the capacity of them.
Your theory is basically valid, but the practical reality and the empirical evidence of the last, I dunno, 20 years or so, is that the graphics processing takes a significant amount of computing power. There's a reason that virtually every computer and every game console has a dedicated GPU. For that matter, a dedicated sound processing chip. It's all offloaded and the APIs have improved to the point that it doesn't seem like much work, but those specialized chips are burning an awful lot of power.
For a wide variety of games, the game logic just isn't that complicated, or rather, it doesn't require as much computing horsepower as the rendering. Sports games and FPS are the most obvious but I'm sure there's others. The most CPU intensive game I can think of is Civilization 4. I'm sure it's been surpassed, and yeah the AI still sucks, but late in games you can really tell that the CPU is chugging away.
The truth, of course, is that something will ALWAYS be a bottleneck. The argument seems to be: is it the CPU or GPU?
Could Flying Cars Actually Be On Their Way?
This is sensationalism. Even small planes have a boatload of "distractions" to observe: radio, gauges, displays, maps, etc. Adding a cell phone into the mix isn't exactly overloading the pilot, unless he's doing something REALLY stupid like texting on final. He might have been USING a cell phone, but he was probably just overconfident as to his abilities as a pilot.
There's also a major difference between talking on the phone in your car and in a plane. In auto traffic, you have to manage the car continuously, keep an eye out for traffic, deal with traffic lights, and on and on. Piloting certainly requires a lot of skill but you aren't twitching the stick and throttle and braking every 2 seconds, and since most planes have autopilot, it can be pretty relaxed.. There's plenty of time en route to send a text or make a call, and to do so safely.
Paypal Forces E-Book Publisher To Censor Erotic Content
I never worked in the same industry but I guess it is a bit obvious this is an issue. Basically what PayPal is saying is this distributor is at a higher risk because of their already documented history of charge backs. OK that I can deal with. Charge a higher premium to the distributor to compensate.
Credit card merchant banks already do this. Merchants pay more for "card not present" transactions (anything online) and certain types of businesses pay different discount rates. Hotels generally pay more than "regular" storefront merchants, for example. Restaurants and gas stations pay different rates. I think government agencies generally get the best rates but I'm not sure.
However, the rates for adult content merchants are already sky high (12-15% vs around 3% for non-adult merchants) because, surprise, there's a lot of fraud. Many banks have decided that they simply don't want to deal with it for ANY price. Paypal served adult merchants at one time but they stopped long ago, maybe 2004.
The EFF Reflects On ICE Seizing a Tor Exit Node
Two words: "common carrier". They get to escape liability but the trade-off is that they are regulated and have to cooperate with law enforcement.
You can of course run a Tor node, and claim you are cooperating but unable to trace the connection. I can almost guarantee that some enterprising prosecutor will eventually decide that this is obstruction of justice, or aiding and abetting, and then you will be charged for someone else's criminal activity. Why anyone would want to take this risk is beyond me. You won't even be able to cut a plea bargain because you can't figure out who the crook is to give up.
Hotmail To Ban Common Passwords
Only the most paranoid can remember if they last logged in at 8:15 or 8:25. It's not a credible method of deterring casual logins when the attacker already has the login info. Also, some form factors don't provide a simple means of returning additional information upon a successful login. Think of a Web service where the username and password are included in the request. You'll get a success or failure response and that's it. Even if the service returns more detail, there isn't always a sensible way to alert the actual user, other than denying access on a failure.
Hotmail To Ban Common Passwords
I never understood the reasoning behind the time based password change. No one expects people to get a new key every six months for their home lock. No one expects someone to get a new ATM card every 6 months.
Physical tokens like keys don't require such frequent replacement because (in general) they are difficult to compromise without alerting the holder. Someone has to actually steal your key and take it to the hardware store without you noticing. Passwords, on the other hand, can be shoulder surfed, socially engineered, stolen with malware, stored in plain text in the database, shared with someone else, etc., and the user may have no clue his password is compromised.
Also, if someone steals your key and robs your house, and there was no sign of forced entry, you probably would change the locks. But someone with your password could log in as you without you noticing for... well, maybe forever, depending on the system.
I agree it can be overdone, but it is a good security practice and there is some logic behind it.
What Is Your Game of the Year?
I'll second that and also put in my own vote for Flip Cup. It's a drinking game; I'm sure everyone has their own way of playing, but the rules are not terribly important. The reason I vote for Flip Cup is because it finally got my wife to start drinking beer. "AT LAST! Now we can share everything!"
simishag hasn't submitted any stories.
simishag has no journal entries.