Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Django killed Ruby on Rails and Node.js. (Score 2) 19

Django's upgrade/deprecation policies are pretty well documented, but if a project is going to be unmaintained for a long time, and you're trying to, say, upgrade a Django 1.6 app to 1.9, you're going to be in for some pain, as in three versions a feature will go from supported, to quiet-deprecation to noisy-deprecation to absent. If a project is not going to be maintained to track the "latest" Django, it should target one of the LTS releases - 1.8 currently - which will have support till 2018.

That will give you security and data-loss-bug updates, but won't give you new features. If you wan't those, then you need to track the current version. If you really are stepping through 3 or more versions (or fewer, if it was already using a deprecated feature) then the best bet is to go through the deprecation documents and convert things over... or just re-write. Sometimes that IS simpler. And, of course, target a LTS if that's appropriate.

Comment The MDM server is in Austria! (Score 1) 123

You have a good point:

$ host leon.webaw.net
leon.webaw.net has address 62.99.250.53

$ whois 62.99.250.53 ... snip...
netname: Schneid-GmbH
descr:
descr: Schneid GmbH
descr: Herbert Schneid
descr: PIRKA
descr: IPs statically assigned
country: AT

maxmind corroborates the information.

So... Sprint are putting control of your phone into the hands of someone in Austria. Nice going, guys!

Comment Reprogramming at the factory. (Score 1) 205

Okay, so, instead the blackhats break into the factory that is manufacturing the chips and modify the firmware that is being written to them. Now, every USB keyboard that the company manufactures looks to the computer as both a USB keyboard, and a USB network device.

I'm sure you remember those instances where malware was being pre-installed onto pre-formatted external drives, right?

Sure, there's a lot more to be done to turn that "Fake network device" into something that can trick the OS into treating it as a default gateway, as well as acting as a forwarding device so that modified packets can make it out the _real_ gateway, but... it only needs one weird combination of behaviours... somewhere... to be effective.

Comment It depends! (Score 1) 1086

I just helped a friend out with a ton of javascript animation for his webcomic (blatant plug: http://www.prequeladventure.com/ ), creating a 3d, semi-interactive environment, all in JS/CSS, and I ended up using a ton of math for it. Simple offset calculations, trig, parabolic arcs, exponential decay, and so on. Ended up giving up some things that would have required finding cubic roots of bezier curves because my math wasn't good enough.

But apart from that, I haven't used any serious math in a long time.

So, it depends... I think the more you rely on interacting or emulating "the real world", the more important math is.

Slashdot Top Deals

We can predict everything, except the future.

Working...