Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Kudos (Score 1) 1061

I don't think anyone in the Patriot Guard Riders would object to widening the scope to include kids funerals the WBC protest.

I know I have to agree with the general sentiment.. There are some lines you just don't cross. Picketing a 6yo's funeral is a few hundred miles beyond that line.

Comment Re:Google Police (Score 1) 200

Try RTFA:
>Not this phone. It sat by the cash register unclaimed all the next day. “I don’t know anything about this stuff, but I know enough to know this phone was different.”

So the phone sat in the bar for a day and then they tried to figure out who owned it. Sounds pretty reasonable to me.

Comment Re:Developers shouldn't have production access (Score 1) 288

We do own the contents of deployment but not the mechanics of deployment. That means we setup software into packages the deployment system can consume. We identify what set of packages goes into an environment. We choose which environments go on which hosts. The actual deployment is kicked off via a web UI.
The merchanics of the deployment then worry about copying the data over and running the deployment scripts.

If something goes wrong with the automated system it is someone elses problem. However if something goes wrong with the scripts in the package we are deploying it is the devs problem.

Comment Re:Developers shouldn't have production access (Score 3, Insightful) 288

I've been in companies that practiced it both ways.

Company A) Developers can never ever access production no matter the reason. The end result in that situation was bugs that couldn't be reproduced on the desktop or in the QA environment. The problems went on for months until I had a lucky break of a developer moving jobs into the system admin role of the production environment. When he looked things over he discovered the previous admin had not configured things in production properly. To the point of lying about it when I had sent a previous check list of things to verify. If I had access to the systems the problem would have been resolved in a few days rather than months.

Company B) Developers own the software and hardware from end to end. In my current company we have to package the software up into a deployment system and deploy it that way. However we do have full access to all the systems. Can/do we do hacks and quick fixes? Yes, if the situation warrants it. But in the end it has to get rolled into the official distribution for it to be correct. Can it be abused? Yes. But that is why the culture of the company become very important. In the end you either trust your developers to do the right thing or you don't. If the company can't trust the developers to have ownership of their code and systems.. Well then at least for me I would say I'm working at the wrong company.

FYI, I enjoy working at company B far more than I ever did at company A. Given a choice I will never go back to an environment where developers don't have access to production.

Comment Re:Everyone ignores Commodore (Score 1) 301

On the C64 you had to move the ROM out of the way to get to the RAM underneath. I don't remember the exact details but you could either see the RAM or the ROM and it was controllable.

If you want to get into memory expanders the C64 had at least a 512K ram expander available. I remember having one and it worked with GEOS at least.. might have been used as a form of ram drive to speed up games as well.

The drive drive was a computer in itself that you could buy ram expanders for and run programs on. Typically used for increasing load speed or duplicating copy protected disks.

Comment Re:wrong logo (Score 3, Informative) 312

He is the Chairman of the Board and was representing the company during the annual shareholders meeting.
That doesn't fit the whole he doesn't really work there anymore statement.

When he isn't on the board and isn't representing the company at the shareholders meetings I'll believe he doesn't work there anymore.

Comment Re:Netalyzr ? (Score 1) 194

Yes because that couldn't be exploited at all..

What's that? The malware/trojan/root kit installed it's own root-certs and is running a proxy listening on 127.0.0.1:80 and 127.0.0.1:443?
That proxy is snarfing up all the data and shipping it off to some other server...

Just because you can't imagine how it could be abused doesn't mean it can't be abused.

Games

Revisiting the "Holy Trinity" of MMORPG Classes 362

A feature at Gamasutra examines one of the foundations of many MMORPGs — the idea that class roles within such a game fall into three basic categories: tank, healer, and damage dealer. The article evaluates the pros and cons of such an arrangement and takes a look at some alternatives. "Eliminating specialized roles means that we do away with boxing a class into a single role. Without Tanks, each class would have features that would help them participate in and survive many different encounters like heavy armor, strong avoidance, or some class or magical abilities that allow them to disengage from direct combat. Without specialized DPS, all classes should be able to do damage in order to defeat enemies. Some classes might specialize in damage type, like area of effect (AoE) damage; others might be able to exploit enemy weaknesses, and some might just be good at swinging a sharpened bit of metal in the right direction at a rapid rate. This design isn't just about having each class able to fill any trinity role. MMO combat would feel more dynamic in this system. Every player would have to react to combat events and defend against attacks."

Slashdot Top Deals

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...