Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:a historic relic no longer tolerated. (Score 4, Insightful) 461

strip clubs...they dont exist in Pakistan, Iran, or North Korea ...

Oh, you can be sure strip clubs exist there too. It's just that the average Schmoe is not rich enough or well connected enough to swing an invite. The same economic rules apply everywhere: money can buy anything and corrupt religious hypocrites can usually be found living it up in the local red light district.

Comment Don't collect information you don't need (Score 5, Insightful) 39

Note to Chad: The issue is not how accurate the information is or isn't. This issue is that a truly anonymous service has no need for this information.

If you are providing an anonymous service, then accept the incoming socket, provide the service, and then promptly forget everything about the session. If it is logged, those logs can be requested or outright stolen by the world's TLA's. Even performing a GeoIP lookup without logging it has the potential to leak information from your service that can be collected by mass surveillance and correlated with other information.

Do not collect information that is not relevant to the service being provided. Period.

Comment Re:Automated test in is a minimum (Score 1) 152

The next thing is you tell me to test getters and setters ...

You damn well better test the getters and setters. In my experience they are usually the buggiest part of a class. To save time, sooner or later you will cut-and-paste the previous getter/setter pair and modify the name ... while forgetting to update the variable name behind the API, leaving it side-effecting something else. Now you have a landmine waiting to strike on the rare occasion you set that field. And woe betide you if the setter performs verification on the value, which you will probably get wrong (in fact, I just fixed a verification bug in a setter that was found by a unit test not 5 minutes ago).

Comment Re:I just watched the video (Score 1) 65

Actually I know a little bit about this as I once interviewed for that project before they temporarily lost their funding. Traditional scanners need 2 or more LiDAR emitters on separate axes to build up a 3D scan. They also need to be physically mounted in a stable location which makes it hard to map buildings with staircases and hidden rooms. The purpose of the spring is to flop the scanner around so that a single LiDAR emitter can get a complete view of the environment as the holder walks around along all possible axes. It can also be mounted on unstable platforms like automated farm tractors. The rest is software.

Comment Visual Boxes Aren't Code (Score 1) 876

Because while programming by joining prefabricated boxes together with lines sounds awesome, it's what is inside the boxes that is important. If the box you need is not already written, then you need variable assignment, conditionals, and loops to write a new box. And then all of a sudden you are back to writing text code even if it is drag-n-drop "if" statements encoded in XML. At that point you might as well give the programmer a text edit window and get out of the way. The lines are the least interesting part of an application, but they are the only parts that even make sense to do graphically.

Comment Re:Incorrect (Score 4, Interesting) 194

Yes, because I would just love having to go through regulatory channels and potentially paying fees in order to publish software that I don't even make any money from.

Depends on the regulations: "Commercial software can pick from one of the 5 following standard commercial licenses: ... Any commercial software license that deviates from a Standard License reverts to Standard License Type 1 wherever its EULA conflicts with this regulation. Software that complies with the Open Source Definition or otherwise allows the user to inspect the source code and remove unwanted features independently is exempt from this section."

You are then perfectly free to make money from your software. Pick whichever one of the standard licenses suits your purpose and carry on. But what you cannot do is employ a lawyer to invent a creative way to screw your users in the fine print. If you do, your license is automatically torn up and replaced with something sane.

Comment Re:Slip the backdoor into a precompiled GCC instea (Score 4, Interesting) 576

I wonder if anyone actually takes the responsibility to do this check. Maybe there are GCC binaries in the wild which replicate a backdoor.

Even if there were, you need only recompile your gcc source with llvm, icc, visual studio, or basically anything that isn't gcc to get a new compiler that won't replicate the backdoor any more. For extra fun, randomise the order of this compiling that compiling something else so that even backdoor reinsertions that cross the vendor boundary will eventually fail. Or write your own C++ interpreter in Python/Perl/whatever and use it to (very slowly) run gcc on itself - even if it takes a week you'll have a clean binary at the end. Yes, hiding such a backdoor seems scary to the untrained eye. It's also trivial to get rid of if you're paranoid enough to care.

Comment Re:Why not do what experts have recommended? (Score 2) 32

If you want "networked" configuration nodes, an isolated network should be the only thing accessing equipment. That node should not access anything else, or any other networks...

Because those experts are morons. It ignores the economic cost of companies having to run a separate parallel Internet. Take electricity suppliers that need to monitor and control remote switching devices, for example. GSM/CDMA networks are just there, already deployed by the telecommunications industry. A cheap GSM modem and an account with the local telecomms supplier is economically better at contacting remote stations than running ones own wires out to single-point stations in the suburbs and the bush.

Isolated networks also don't work. Putting a dodgy default-passworded device on an internal network doesn't work when your attacker walks up to the remote station, cuts off the padlock, and installs their own device straight onto your wide-open "no one could possibly hack this because it's disconnected" network. Which is basically how Stuxnet got deployed - direct intervention onto a private network at a weak point.

This problem cannot be solved with simplistic "if you don't want people to hack it, don't connect it to the Internet" solutions. How about building it to be difficult to hack in the first place? Or making VPN layers the default way the Internet works rather than an afterthought? Or teaching (mostly non-software) engineers security techniques that were honed over decades of fighting malware on the open Internet? Or any of a million other practical solutions that don't boil down to "la la, I can't hear you so you can't hear me".

Comment Re:I understand their pain (Score 4, Insightful) 331

As an Android and iOS developer, it is tough to support all possible screen sizes, aspect ratios, hardware specs and versions of Android. Sometimes not having a newer version of Android(>= 4.0) you miss a lot of features that people come to expect and your code is riddle with backwards compatibility stuff just to support Gingerbread, or worse(ie: Donut).

And none of this would be a problem if PBS would simply publish the specification for whatever JSON/XML/etc back end they are using to transmit information to the clients about shows and episodes, and use standard RFC-compatible video formats and streaming protocols with no DRM or other nonsense.

Why would it not be a problem? Because the next day the app stores would be full of "SparkleVideoPlayer now supports PBS!" updates for all of the existing streaming video apps and their loyal users. Or if my screen size, aspect ratio, blah, blah, blah is not supported, I can write my own app!

I can understand why the commercial TV outfits want to control everything - they think it's the only way to poison the experience with ads. But why are public broadcasters like PBS, BBC, and Australia's ABC doling the same thing? It's idiotic - the solution to "how do I support a million devices" is simple: "publish the spec so that the taxpaying public can write their own apps".

Comment College Funds? (Score 1) 74

Do you need to earn "Crime pays" kind of money to fund college funds for 4 children in America?

I don't know whether he wants his kids to have a good education or whether he thinks they'll make better master criminals with a degree & a job in Wall Street :)

But at the very least he thinks a child's education is important, which is more than most.

Comment A whole generation grew up with PCQ Linux (Score 3, Informative) 39

I started using Linux before I got internet or was in a university. I wouldn't have started on Linux (and eventually interned at FSF India) if not for those streams of CDs that were available for a very expensive 100rs (approx 3$ back then).

This wouldn't have been possible without the efforts of toolz. And several others who were behind the curtain (I remember calling up the Digit phone # to ask for help with my i810 video card).

The result was a grass-roots up linux community that sprung up all over India, out of curiousity and tolerating lots of lost partitions.

Both toolz & OldMonk, linux-india old-timers recently lost to us, will not be forgotten (at least by me).

Comment Re:A win for Flash and Silverilght (Score 4, Interesting) 320

Oh shut up - taking a pass on DRM is not "pick your battles carefully". Flash and Silverlight are dying on their own because they don't run, or run barely, on the current generation of smart phones, tablets, and ... wait for it ... smart TV's. The content distributors desperately need standardisation because supporting hundreds of device types and dozens of plug-in technologies is a pain in the neck. The problem is they've chosen to outsource the problem by making browser vendors write the proprietary DRM plug-ins for them. Instead of simply adopting the existing specifications for Internet video formats and protocols. Everything they want to do can already be done with AVI/MP4/etc together with HTTP/RTP and a "video" tag in HTML. Everything that is except spy on users and take away people's ability to enjoy the content on a whim. If we resist DRM, they'll either have to adopt open standards or they'll have no business model at all.

Comment Re:Kill it (Score 2) 646

Incredible amounts of money and aggravation are wasted every year on this leftover from the age of agriculture.

Speaks someone who has no idea where their food comes from. Hint: agriculture.

Here's one simple example: Every morning the cows come in around dawn to be milked. Several hours later the milk tanker arrives to collect the milk and take it to the bottlers to get it ready to put on the trucks to go to the supermarket for you to buy tomorrow.

The cows will come in a little later in winter. Which pushes the schedules for the tanker drivers and bottlers back by an hour. Now the bottlers who used to work 9-5 are working 10-6. Also shifted are the truck drivers going to the supermarkets. And the stockists in the stores. And so on.

Do you really think it is a good idea to force millions and millions of low-paid truck drivers, milk bottlers, and cheese churners to work idiotic shifts and see their families even less just so that you can avoid having to change your office-worker watch twice a year? There are more people in society than you post-industrial types.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...