Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:How about... (Score 1) 101

...Older people (60+) seem to have the hardest time grasping the the difference between the concept of the Internet and a local hard drive.. no matter how many times you explain it.

You are over-generalizing. Think of the pioneers of the industry: Don Knuth, Nicklaus Wirth, John McCarthy, Richard Stallman, Ken Thompson, Brian Kernighan, Grace Murray Hopper, and others. They were all doing innovative work after age 60 or (in some cases) are still doing it. If you had told Amazing Grace that she didn't know the difference between a hard drive and the Internet in 1966 (when she turned 60) she would have laughed in your face.

Comment Re:This happens about... (Score 2) 131

Agreed. I've been writing software for 32 years, and "We've completely changed your requirements, but that shouldn't affect your schedule or your budget any!" happens all the time. The point is, you have to push back. Tell them exactly what every change is going to cost (padded heavily). Unless they agree to add time and money to the project, then just deliver the originally agreed to project. Don't let people make unilateral changes in the contract after it is signed, unless you actually like working on money-losing projects!

When I was a commercial software developer I did this religiously. Once my supervisor told me “I cannot believe that adding a one-day item to the project causes the delivery date to slip by a day.”

Comment two good things that managers do (Score 1) 261

There are two good things that managers do: get their people what they need, and shield them from upper management.

A manager once found us a System/360 with a paper tape punch in Detroit so we could recompile the software we was installing at Michigan Bell. We had to use it on third shift, but it sure beat having to come back to New Hampshire for every bug fix.

A different manager told us that one of the mechanisms he used to shield us from having our priorities changed so frequently that we never got anything completed was "That horse has left the gate." He took the position that once we had gotten a project to a certain point, we were going to complete it and deliver the product, even if Marketing no longer thought it was the most important product we could be working on.

Comment Re:Amiga Clock virus.. (Score 1) 120

This isn't anything new, Amiga in the 90's had a CMOS happy virus that used the battery power to stay in memory. It wasn't in the clock but rewrote that area of the working bios to stay resident. I remember having to take the battery out of my A500 to get rid of it, as it survived reboots and power offs.

I heard a rumor about the Amiga clock virus when I was an Amiga dealer in the 1990s. I didn't believe it, because I knew that the clock had too little RAM to hold a virus. Your description is much more believable.

Comment Re:We desperately need unflashable firmwares (Score 1) 120

A third possibility is that the NSA and their friends abroad might have pressured the manufacturers to remove these security features.

Which is not a possibility since my company ships hundreds of USB drives out with hardware write switches every week. They are extremely easy to find and buy.

Would you be kind enough to share the brand name(s) those USB drives are sold under, or some other way to identify them in the marketplace? I am assuming, of course, that the hardware write switch cannot be defeated by re-flashing the drive's firmware, or, if it can, that firmware flashing is also protected by a physical switch.

Comment Re:We desperately need unflashable firmwares (Score 2) 120

What's infuriating is that USB drives used to come with hardware write switches and now you can't find them anywhere. And motherboards used to require you to move a jumper to flash the BIOS but, those are gone too. I don't know if it was cost cutting or a case of user stupidity or both but, the hardware write switch has faded into history. I'm fine with the being in a default-write setup as long as they had the option to cut it off.

A third possibility is that the NSA and their friends abroad might have pressured the manufacturers to remove these security features. The pressure might have subtle, like pointing out "good" places for cost savings.

Comment originally file extensions were never hidden (Score 1) 564

We gave them extensions for a reason - to let people easily tell what kind of code it was.

Historically, that isn't correct. File extensions were invented in the 1960s to distrnguish files for the same program but with a different purpose. For example, I might have a program named FOONLY. It is written in Fortran, so its source file is FOONLY.FOR. When I compile FOONLY.FOR the output of the Fortran compiler is FOONLY.REL. When I link FOONLY.REL the output of the linker is FOONLY.EXE.

In a system like this, hiding the file extensions would be counter-productive.

Comment even older (Score 1) 564

The idea of using file name extensions as a means to denote content/application association dates to the 1970s (or even earlier).

I first encountered filename extensions in 1966, on a DEC PDP-6. We had 36 bits (six characters) for the file name, and 18 bits (three characters) for the extension. Early extensions were .FOR (for Fortran) and .REL (for relocatable binary). The .EXE extension on executable programs was invented in the late 1960s for the Execute command, which would compile and link your program if your sources were newer than your executable.

Comment Re: Who cares what RMS wants? (Score 1) 551

Because of the GPL, GNU/Linux does not fragment, as Unix did.

Of course it does. You think say Android's version of Linux is the same as the Linux mainline? Or Oracle Linux's version of the Linux kernel is the same as the mainline?

Android's version of the kernel is available in source form, and there are rumblings of an effort to integrate it into mainline. Even if this doesn't happen now, it can happen in the future because the source is available, unlike computer manufacturer's proprietary versions of Unix.

I don't know anything about Oracle's kernel, but unless they are violating the GPL their source is also available.

Comment Re: Who cares what RMS wants? (Score 2) 551

It didn't solve it, it just created yet another entry to the UNIX wars, it didn't supplant the major players BSD, Darwin, HP-UX, AIX, Solaris. The problem was that developers had many systems to target, Linux hasn't solved that, it is solved by having multi-platform frameworks and language standards.

And yet today GNU/Linux is the premier Unix-like system which everyone targets, after Microsoft and Apple. IBM actively supports it, even on their mainframes, though they haven't forgotten AIX. Dell advertises GNU/Linux on some of their offerings. Oracle offers a distribution of its own, though it hasn't forgotten Solaris. HP offers GNU/Linux on their Integrity servers along with HP-UX. Because of the GPL, GNU/Linux does not fragment, as Unix did.

Comment Re: Who cares what RMS wants? (Score 2) 551

BSD-style license does not guarantee these freedoms, and Stallman sees wider adoption of projects using those licenses as a threat to free software.

But why is that the case? I know there is the contrived case of a codebase being improved and re-packaged under a proprietary license but that just doesn't happen, part of the reason is the original codebase is still there and other people can still use and improve upon it. The most popular web server in the world is licensed under this model and it hasn't happened there.

The standard example is Unix. Each computer manufacturer ported it to his computers, then improved it to make his product (hardware plus software) more appealing in the marketplace. The improvements weren't shared, so there was fragmentation: applications would run on some Unix systems but not others. POSIX and Single Unix System were attempts to fix the problem by standardizing certain parts of the user-mode API, but they weren't enough.

The problem was finally solved by a clean-room reimplementation of the utilities (GNU) and the kernel (Linux). Both are available under the GPL, which requires improvements to code to be released in source if the binary is distributed.

Comment non-free formatter is risky (Score 3, Insightful) 178

The SD Association has a special formatter which avoids this problem.

Interesting that the special formatter is only available for Microsoft Windows and Apple Macintosh, and apparently only in binary form. Even if I had such a computer I would not be comfortable formatting my disk with non-free software. Who knows, it might be putting an encrypted child porn picture on a hidden part of the disk, exposing me to the risk of prosecution. No thanks.

Comment euphemism (Score 1) 120

Basically it works like this. 1) Amy has a contract to wash Bob's car for $100 month. 2) Carl sues Bob for murdering his dog. 3) The courts can not give Carl a contract with Amy. The courts can only award Carl with property and money taken from Bob. Basically the courts can't force Amy to work with Carl. They can't force ICANN to work with the plantiffs.

A very thought-provoking post. I had trouble understanding why Bob would pay $100 a month to have his car washed, until I realized that washing his car is a euphemism. Upon realizing that, your argument became much more persuasive.

Slashdot Top Deals

Marriage is the triumph of imagination over intelligence. Second marriage is the triumph of hope over experience.

Working...