Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:For the better? (Score 1) 345

The obscurity of the syntax just builds an extra barrier that's really unnecessary in this day and age

Objective C's form of punctuation abuse isn't any higher a barrier than C++'s forms of punctuation abuse. In fact, it has less total weird syntax. Reports are that Objective C stops looking obscure to most programmers after about 2 weeks of use, even if they were previously biased towards C++ or Java like syntax.

Comment Re:Wow! (Score 3, Insightful) 140

Half the fun of explaining the Cray 1 during museum tours was comparing its cycle time to the time it took light from the nearby ceiling spotlight to hit the Cray. At 33 MHz that would require a really tall room.

Comment Re:I keep saying that (Score 1) 426

The problem with using embedded microcontrollers for this tutorial purpose is that they are usually incomplete slave devices, and thus the experience is incomplete and misleading. Rarely did people ever do or teach development completely on those embedded machines themselves (including compiling compilers, the OS itself, etc. on that microcomputer itself), as people did with old tube mainframes, IBM 360s, PDP-11s, and the like. In addition, some of the newer 8-bit microcontrollers are actually a lot faster than these vintage machines.

Comment Re:Same way you get your kids interested in gaming (Score 4, Insightful) 704

NOOOOOOOOOOOO! "GOTO" is EEEEEEVILLLLLLLLLL!

Just the opposite. Far more kids were interested in science and programming back in the days when the chemistry set could burn or blow your fingers off, and the use of unprotected GOTO's, peeks, poke, and global variables could crash your computer a zillion different ways. Choosing safety has taken all the fun out of play.

Teach the kid how to program in BASIC. Bill Gates and Woz can be his role models. What teenage kid has heard of or wants to be Djiskstra?

Comment Re:I know what I would do. (Score 1) 482

What they can plead is being the victim of fraud. They were given "stolen" goods (a binary that didn't comply with either the GPL license or the SDK agreement). If they pull the app and eject the developer who committed this fraud, what would a court realistically require in addition? Decompile the app to discover the actual source to the exact build they were given? Not likely.

Comment cheap netbook or thin client (Score 1) 555

Get a $300 el-cheapo netbook, and let them configure it however they want. Use it for nothing else. And/or ask them to set up a VM that you can securely RDP into (VPN, VMWare View or Citrix), so there's no data on your remote PC/laptop/mobile phone, just pixels. Or both: have them buy you a thin client netbook.

If you want to be tricky, image the HD of the el-cheapo netbook after they set it up, and run it inside a VM on your personal PC. Note that this may or may not comply with their legal restrictions.

Comment 15 minutes per day (Score 2, Insightful) 547

If you go by the metric that, in the typical large project, the resulting product ends up with 10 to 100 "lines of code" per person per day, hey, most programmer's probably took about 15 minutes to type that in if you exclude all thinking (reading, studying, daydreaming while unconsciously problem solving, etc.) and meeting time.

Comment Re:I'll play Devils Advocate here (Score 1) 547

Is it okay for you to hire a gardener for 20 hours of work and have him actually work 10 hours and take a break for 10 hours?

If that gardener (or web consultant, whatever...) leaves behind a better garden and less mess than any alternative available gardeners for the same billed hours, absolutely. Or if he charges less than half as much per hour and I end up paying him less for his 20 billed hours than any alternative gardener's 10 hours, and my garden looks the same after either, why not?

Comment Switch to using thin clients and VMs (Score 1) 396

Only deploy thin clients or thin client software to users. With some thin clients, you can even forward USB drive mounts to the VM. Partition your VMs into isolated groups, some with internet connections, others completely locked down. Just assume that any VM open to the net or that any user has used for web browsing, etc., is compromised. Take them offline for a full scan and reimage per login, or at least daily.

Slashdot Top Deals

Never test for an error condition you don't know how to handle. -- Steinbach

Working...