Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Bad analogy (Score 5, Insightful) 185

An Argentinian chef is more likely to make great sushi than a Japanese automotive engineer.

You generally want to use programming languages designed by experienced programmers (even better, experienced language designers) who work closely with subject matter experts. Left to their own devices, experts are likely to get a lot of things wrong, and if the language is sufficiently popular, you are stuck with their mistakes for a long time to come.

Comment Re:Open source still requires license fees (Score 1) 95

That's actually missing a key piece of information. Patent licenses can be very narrow in scope, which allows an owner to charge different parties for different aspects how a device uses a patented technology.

Does anybody know why I wouldn't need a separate licensing deal with MPEG LA if I built a web application using WebRTC? Their typical licensing agreement (as used in Windows and Flash, for instance) does not extend to third-party applications that use the codecs through APIs.

Comment What's wrong with Lua? (Score 1) 254

Is there any indication why Lua scores so highly here? It seems a rather benign little language to me. Certainly, nil-terminated arrays are can be tricky, and a missing local keyword can ruin your day, but that seem minor annoyances. And for the local-vs-global issue, there are now editors with semantics highlighting that clearly disambiguate the two cases.

Comment Re:Enterprise? (Score 5, Informative) 245

And the article confirms the large-scaler users aren't part of that elusive group, either:

Many of the largest MySQL users — Twitter included — do not currently pay Oracle for an enterprise licence. Twitter, like Facebook, prefers to build their own extensions and customisations off the community version.

Comment Re: so-called summary (Score 1) 34

The relays in that networking protocol are decrypt-and-encrypt, so it enables even more (undetectable) eavesdropping.

Quantum key distribution has a strange security model where it is assumed that someone inside the network cannot run two instances of the protocol and give the two parties in a communication the illusion of talking directly to each other, when they in fact talk each to the attacker. In other words, it is assumed that there is confidentiality without authentication. All kinds of strange things follow if you make that kind of a mistake.

Slashdot Top Deals

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...