Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Here's Oracle's Example (Score 1) 675

I've been paying my bills for 3 years developing in Java, and many more years programming at all, I don't know if this counts as an expert analysis or not, I don't care.
  • Examining Exhibit J, I believe the Android implementation was copy-pasted from Sun's. In fact, it was a pretty lousy, newbie-ish job trying to mask it.
    Just looking at the bad parameters and local variable names makes me want to punch the idiot who named them. And what's with all the magic numbers hard-coded? On the other hand, I praise the Sun developers for their implementation.
    About the iteration structures, I also prefer using the for iterator instead of a while structure, it makes more sense when you want to scope the variable. Unfortunately the structure becomes a bit top-heavy with all the inlining.
  • Examining Exhibit I, I'd first ask what is the problem. API documentations should be one and the same, it's a standardization FFS! The only strange thing I find with that Javadoc, is why java.security.Security is a java class, and not a java interface.

You could argue that the class design is really trivial, and how two different implementation could be identical under the KISS principle, but it's really hard to believe it's a clean room implementation. It's a bastardized version of Sun's code.

Comment Re:Informative article (Score 5, Informative) 201

From TFA:

An add-on called “Mozilla Sniffer” was uploaded on June 6th to addons.mozilla.org. It was discovered that this add-on contains code that intercepts login data submitted to any website, and sends this data to a remote location. Upon discovery on July 12th, the add-on was disabled and added to the blocklist, which will prompt the add-on to be uninstalled for all current users.

Submission + - Another arrested in Japan for using anonymous P2P (animenewsnetwork.com)

renrutal writes: "A 43-year-old man is the second known person arrested in Japan for using Perfect Dark to share copyrighted material in its encrypted P2P network.

According to the [Kyoto-based] High-Tech Crime Task Force, the Okayama police, and the Saga police, the Osaka-based suspect uploaded about a thousand files, including anime. The suspect admitted that he thought he would not get caught because he was using Perfect Dark.

Perfect Dark is the third generation of japanese anonymous P2P network clients, developed with the intent to fix the security flaws found in its predecessors Winny and Share, in spite of also adopting a "Secure through Obscurity" closed-source model. In 2004, Winny's developer, Isamu Kaneo, was charged 1.5 million yen for assisting in copyright infringement, but he was acquited last October. Since 2008, at least 15 people were arrested in Japan suspect of uploading copyrighted material to those "secure" networks."

Comment Re:WebM/VP8 patent risk for software developers (Score 1) 312

Software developers already live taking patent risks just by doing their work, developing software. Media encoding isn't the only patent elephant stomping in our lawn, we're pretty much surrounded by thousands, specially ye ol' $PATENT which just now happened to be implemented on the internet or on a smartphone/tablet/portable device of the week.

If you are afraid of software patents, I'm afraid you have to look for a job in another area where you don't even come close to inventing/designing anything.

Piracy

Sony Joins the Offensive Against Pre-Owned Games 461

BanjoTed writes "In a move to counter sales of pre-owned games, EA recently revealed DLC perks for those who buy new copies of Mass Effect 2 and Battlefield: Bad Company 2. Now, PlayStation platform holder Sony has jumped on the bandwagon with similar plans for the PSP's SOCOM: Fireteam Bravo 3. '[Players] will need to register their game online before they are able to access the multiplayer component of the title. UMD copies will use a redeemable code while the digital version will authenticate automatically in the background. Furthermore ... anyone buying a pre-owned copy of the game will be forced to cough up $20 to obtain a code to play online."

Comment Doom is still incredible (Score 2, Interesting) 161

Heh, I remember playing Doom in my uncle's computer back in 94 as as 9 year old boy, and loved it, adored it.

16 years later, now an employed programmer, I still think it is made of black sorcery and an ingenious amount of coding. That's awesome!

Does Carmack /id Soft have a donation paypal-esque account? I'd love to give them what is due for all those early years of pure fun.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...