Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Why is this surprising? (Score 1) 129

> But what does this demonstrate?

I think this can be used as a nice kind of benchmark... as others pointed out, this demo shows that a browser application is currently at the same speed of an old 386/486 native app (not bad IMHO, since a lot of great apps ran perfectly in that kind of system.)

Comment Re:The meaning of random (Score 1) 654

The data extracted from tree rings (I studied the subject in its relation to 14C calibration) doesn't provide a clean nor precise planetary record of the climate (broad regional differences, lack of adequate species near the equator, etc.) Recorded history for 1000 years??? What???

BTW, the GP was talking about geological times.

Offtopic: I don't assume any better knowledge, that's the reason I'm trying to get an answer.

Comment Re:Old system is fine. (Score 1) 182

AFIK the "distributed source control system" is not about networking or Internet, but about giving each developer a whole copy of the central repository so they can "pre-commit" their code and this generates some benefits Spolsky talks about when referring to Mercurial.

BTW, Subversion will not prevent anybody's work being exported to India.

Comment Re:Java is the new COBOL (Score 1) 428

> At one time, COBOL was the only way to develop on tens of thousands of computers. Very expensive computers with very expensive maintenance and licensing contracts. There was a lot of money in this, measured in hundreds of thousands of dollars per year per site.

Why you talk in past tense? How many mainframes are using Ruby for the business?

Comment Re:Have they decided to implement security yet? (Score 3, Insightful) 176

From the article, about a "secure operating system":

> Generally, this would be taken to mean an operating system that was designed with security in mind, and provides various methods and tools to implement security polices and limits on the system.

Sadly most naive users still believe that security is about setting fine grained permissions, roles, resources and tagging system objects in general. In practice 1) security exploits simply bypass or reconfigure such validations or policies for their own purpose, and 2) getting a really good "fine grained" configuration and reconfiguration is pretty difficult, time consuming, and prone to error (i.e. to increase the vulnerability.)

Slashdot Top Deals

DEC diagnostics would run on a dead whale. -- Mel Ferentz

Working...