Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Not at all. (Score 1) 532

Perhaps that "tested, trusted company code" is a steaming mess of spaghetti code that's been cautiously poked, prodded, and duct-taped over the years into something that in the end works but is a maintainability nightmare?

Probably. I've seen my share of that.

An interesting aspect is that a quick hack can actually be the fastest way to get the job done - in the first two or three iterations. But later on, the side effects of even minor changes grow dificult to contain and things that should be minor programming tasks start taking weeks.
So if you are content to use the old code exactly as it is, GP's approach of leaving the code alone is fine. But in my experience, sooner or later some business requirement comes up that means changing the functionality. At that point, the steaming mess of spaghetti code will really hurt you.

It is easy to fall into that trap, and getting out of it takes patient refactoring. Usually takes more time than a proper design would have taken in the first place.

Comment Step cautiously! (Score 1) 532

Just last summer I took over a project with over 250,000 lines of code. It was a complete disaster of a codebase, a total Rube Goldberg machine... but somehow, after years of poking and prodding and band-aids and what-not, it WORKED...however, even the tinest code change too weeks to happen because the code was so badly written. The project had a ton of turnover through the years, and from the looks of it many of the coders use conventions from different languages they were familiar with, copy/paste all over the place, bad structure, fragile inheritance schemes, etc., etc.

So, I did the only thing that made sense. Started completely from scratch, picking out the parts that were usable as we went. We haven't finished yet, but I haven't looked back...

Comment Re:Not at all. (Score 1) 532

Yes, but there's also when you hire the new guy, fresh from college, and he sits down at his work station. After a few days of getting absolutely no work done, he comes to you and tells you he wants to rewrite the core 50K lines of tested, trusted company code because he thinks it's not written "by the book". To which, the only sane reply is "You touch that code, and I will set you on fire."

Perhaps that "tested, trusted company code" is a steaming mess of spaghetti code that's been cautiously poked, prodded, and duct-taped over the years into something that in the end works but is a maintainability nightmare?

Comment Trust your first level support a bit more? (Score 1) 749

What you say may be correct for talking to the customer, but when one of the first level supporters (who presumably have at least a bit of experience) asks 2nd level to check server X, doing so might be smarter than to argue with the 1st level.

After all, the whole purpose of 1st level support is to solve simple stuff and escalate those things that are not obvious cases. If you treat 1st level like a potentially dumb customer, you end up with a $30/hour guy asking standard questions to a $8/hour guy.
Exactly what isolating 2nd level from the dumb customer was meant to avoid, only that you pay both guys for it ;-)

Communications

US Army Sees Twitter As Possible Terrorist "Operation Tool" 320

Mike writes "A draft US Army intelligence report has identified the popular micro-blogging service Twitter as a potential terrorist tool. A chapter titled 'Potential for Terrorist Use of Twitter' notes that Twitter members reported the July Los Angeles earthquake faster than news outlets and activists at the Republican National Convention in Minneapolis used it to provide information on police movements. 'Twitter is already used by some members to post and/or support extremist ideologies and perspectives,' the report said. The report goes on to say, 'Terrorists could theoretically use Twitter social networking in the US as an operation tool.' Just wait until the Army finds out about chat rooms and email!"
Security

Submission + - New AACS Processing Key Discovered

An anonymous reader writes: The movie studios recently released new HD-DVDs that can no longer be circumvented using the infamous 09 F9... AACS processing key that floated around the Net last month, but today a new key has surfaced. Like hundreds of other readers of Freedom-To-Tinker's "Own Your Own Integer" story, someone named BtCB posted his "randomly generated" number in the comments, asking, "What are the odds that this is the new processing key?" As it turns out, BtCB's key was not so random, and, a week after he posted it, the hackers over at doom9 realized that it really is the new processing key. With this kind of hacker "luck," it doesn't look like AACS will last for long.
The Internet

MySpace Gets False Positive In Sex Offender Search 345

gbulmash writes "In its eagerness to clear sex offenders off its site and publish their identities, MySpace identified an innocent woman as a sex offender. She shares a name and birth month with a sex offender who lives in a neighboring state and that was apparently enough to get MySpace to wrongly brand her and completely ignore her protests."
Microsoft

Submission + - OOXML Balloting Begun

An anonymous reader writes: The ISO has started the balloting process for the Open Office XML format (aka "ISO/IEC DIS 29500" — all 6000 pages of it). If you want your opinion heard, now is the time to contact your country's local standard body so they can then decide how to vote. Contact information is available for the US, Canada, Germany, and over 100 other countries. The ISO standard will cost you CHF64 to read, but ECMA 376 is available as DOCX and PDF files.

Will ISPs Spoil Online Video? 301

mrspin writes "last100 writes: "With an ever greater amount of video being consumed online, many Internet users are in for a shock. There's a dirty little secret in the broadband industry: Internet Service Providers (ISPs) don't have the capacity to deliver the bandwidth that they claim to offer. One way ISPs attempt to conceal this problem is to place a cap of say 1GB per-month per user, something which is common in the UK for many of the lower-cost broadband packages on the market. Considering that a mere three hours viewing of Joost (the new online video service from the founders of Skype) would all but use up this monthly allowance, it's clear that lots of Internet users aren't invited to the party. But what about those who (like me) pay more for 'unlimited' broadband access? There shouldn't be a problem, right? Wrong." The article then goes on to discuss the recent trend of bandwidth throttling based on techniques such as packet shaping which punishes p2p traffic whether it's legitimate or not."

Backyard Chefs Fired Up Over Infrared Grills 229

Vicissidude writes "With the expiration of a key patent, major gas-grill manufacturers have scrambled to bring infrared cooking to the masses. The grills are still powered by propane and have traditional gas burners that heat mostly by convection — or hot air. But they also can cook foods with radiant heat generated by one or more infrared burners. Char-Broil says its advanced burners operate at 450 to 900 degrees, hotter than the 450 to 750 degrees of standard gas burners. And unlike charcoal, which can require 20 to 30 minutes to reach its 700-degree cooking temperature, heat from the infrared burners can be adjusted quickly. Bill Best, founder of Thermal Electric of Columbia, S.C., developed the technology in the 1960s, primarily to give automakers a faster way to dry the paint on cars."
Privacy

Submission + - No charges for chatroom suicide observers

Benjamin Fox writes: "The BBC reports that chatroom participants who apparently "watched" a man commit kill himself will not face charges for the comments made up to and during the suicide. A crown prosecution spokesman said, "We examined all the evidence passed to us by the police and have concluded that none of the comments made in the chatroom amounted to a criminal offense." What could this mean for electronic witnesses of other meatspace crimes and tragedies in the UK?"
Google

New Jersey Sues YouTube Over Crash Video 410

eldavojohn writes "The New Jersey Turnpike Authority (NJTA) has sued YouTube and a number of other video sites for showing footage of a car crash that happened on the turnpike and was, therefore, property of the turnpike. The NJTA requested the footage be removed under the DMCA — which YouTube complied with — unfortunately, the video was copied to several other sites. The NJTA still seems to be targeting YouTube since YouTube 'did not try to prevent the very same video from being uploaded again by users immediately after it was purportedly removed.' We'll have to watch this closely and see if, even after you take down material violating the DMCA, you are at fault to any extent for people who already copied said material."

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...