Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:op said it was misattributed (Score 1) 5

orig post said the seller is claiming it as their own code, which is a violation of pretty much any license I'm aware of. If the seller is honest, they'd correctly credit the author. Lying about the author upfront suggests they probably removed previous copyright notices and intentionally are violating the license.

Comment Happened to me at NASA... (Score 4, Informative) 312

I worked 30 years in astronaut training facility (full-fidelity simulators), and wrote many many documents on software that I wrote. I always kept my own digital copies, of course. Over the years, the contracts changed hands many times, and different document systems were implemented, and "all" documents were "always" converted from old to new. I was never able to later re-locate *any* document I had submitted to *any* of the document systems. So my copies of my documents were the only ones that actually existed that I knew of. This included meeting minutes, peer review notes, design and 'as-delivered' documents. So I think institutional amnesia is more the norm, and actual memory beyond 3-5 years is rare.

Comment Re:security? My first thot, too... (Score 1) 195

Now malware can be shipped in various partially-compiled steps and in different packaging (one,two,three modules, arriving from different vectors, etc), making detection harder, and can then be compiled targetting the cpu it lands on. Oh, what a fricken great IDEA! platform-independence for malware just got easier! It''s really getting hard to distinguish between the bad guys and producers of ideas like this.

Comment not added security... (Score 1) 2

taking a toll on privacy without bringing added security?
cameras don't add security for the citizens, that is, if someone's gonna get mugged, the camera won't stop it. The number of convience store robbers caught on tape is proof that cameras are not a deterent.
What it adds is statistical accuracy to the reports written by the cops as they examine each victim's violent death.

Comment Re:Good idea to ban common passwords (Score 1) 140

try this: use several unrelated dictionary words, strip the vowels, and make it look like math: prpl=rckt*grnt (purple = rocket * granite) or some similar small set of rules. passowrds are secure, you only have to remember three words, and once you've memorized the simple rules, you can even write down the three words without compromising the real password. You also get longer paswords (14 chars is current recommendation).

Comment bout damn time (Score 1) 140

Approx 20 years ago I wrote code for a system at work to do this, list was 100's of possible, including acronyms from work, userids and real names, stupid stuff like variations of 'password', etc. We had to do it cuz the customer (nasa) considered it "old hat, everyone else is doing this, why aren't we?"
Programming

Submission + - Ask Slashdot: Volunteering for OSS Dev 1

DrZib writes: Being an engineer, I have only had moderate professional experience in application/web programming (mostly web scripting and a little C/C++) but, to broaden my horizons and contribute, I would like to get involved in a (F)OSS group. Anyone know of a good OSS group that will take an intro-programmer like me? And how would I go about getting my foot in the door (if not just shooting an email to one of the members)? Any suggestions welcome!

Comment Correct - cuz they're subtly different... (Score 1) 1

I design realtime simulation kernels, and use a combination. One simple design a few years back: Separate processes (signals) perform drastically different tasks - sequence control, unique device or network I/O, etc. Separate processes were used because each task's execution profile is subtly different: network I/O is all about filling/draining or assigning buffers; device tasks are about waiting on physical devices that will get back to you just whenever the hell they want; sequence control is right now, don't wait, gotta stay on top of it or it all comes crashing down. Within a process, such as sequencing, a single, unique method of communication is used; In sequencing, I used semaphores/condition variables, etc, the Posix mantra we all know and love. They're usually the fastest, because I used separate threads for posting the zoo of myriad programs and functions in the simulation (the "payload" from the view of the sim kernel). Between the various critters in the zoo, shared memory and the various locking mechanisms preferred by their programmers. Each of these mechanisms is different, and the differences are just as important as the similarities.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...