Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Take advantage of Black Friday with 15% off sitewide with coupon code "BLACKFRIDAY" on Slashdot Deals (some exclusions apply)". ×

Comment So how is this different from the promises of 1994 (Score 2) 289

Anybody remember CASE and the drag & drop promises of graphical programming of the 1990's? The at a high level these were great opportunities to both manage software development staff and supposedly increase productivity.

CASE failed because many assigned to the "design" role didn't have a deep enough understanding of the necessary components to produce a system, so many CASE tasks assigned were woefully under specified, and systems had so many gaps they weren't even functional.

Similarly the GUI drag & drop programming has only been successful in structural applications like designing entity relationship models. Anything past a simple loop and these technologies just don't support the complexity necessary to develop the applications of the time.

Comment Re:Thank the Feds (Score 1) 392

I think it was as much that stolen smart phones, especially with the ability to iPay, gWallet, Pay Pal, or what ever technology potentially opened up smart phone manufactures and application developers to new financial liabilities.

For this reason alone, a prudent smart phone manufacturer would want to ensure his/her customers were able to store sensitive financial information on the device and greatly limit the exposure to financial crime carried out by your average everyday pickpocket. Just think about how all of the credit card payment system are moving to "chip cards" that produce a one-time hash for the transaction instead of simply supplying 20 digits to identify a given card and expiration (and up to 24 with CVV).

Comment Re:How did they solve crimes before Smart phones?? (Score 1) 392

Don't you know that prior to 2007, all capitol crimes went unpunished, because it was impossible to determine who had committed such? Then with the universal data gathering tool, created singularly by Steven Jobs, of Cupertino, California, no capitol crime went unavenged. That is until Tim Cook reversed this capability with encryption.

Get your facts straight people!

Comment Old Man Look at yourself I'm a lot like you _are_ (Score 1) 574

IMHO, Neil Young has settled in to the Old Man who's younger self was the same, except as the older man. From all the interviews I've seen, he's hated digital recording (cd's), doesn't like what MP3's do to music, and doesn't like streaming. Even though, as a singer/songwriter streaming will pay him just fine.

Comment Re:Knowing when not to (Score 1) 345

I really like your point about the C++ Master writing for a C++ Novice. I've always had that as a goal, make statements that are easy to read, but at the same time powerful.

One thing I've thought that is a most important feature of C++ are automatic variables, which leads to Acquisition is Initialization ( ). In some ways C# (and .NET) has this ability, but Java definitely doesn't do so well. Resource allocation (pointers, mutexes, files, etc.) are some of the hardest things to keep track of in any language. Garbage collectors are fine, but even languages with these don't do so well with OS objects (files, semaphores, etc.). I think C++ shines when you can master this pattern and use it to make very readable and reliable programs.

Comment A consultant's experience (Score 3, Insightful) 110

In my experience as a consultant, this is the case because Business Managers don't trust IT because:

1) The IT department inserts (perceived) too many non functional requirements on a project increasing cost or schedule.
1.a) (Perceived) The IT department doesn't care about the needs of the Business Manager's daily business.
2) Internally the IT department did not deliver on it's own projects within cost or schedule.
3) There's no way that an employee could be as smart as a consultant.

Having been a former IT employee and now a consultant, points 1, 1.a, & 2 are valid, point 3 is just bunk. Now being an consultant, I prefer to work with Business Managers because:

1) Business Managers have a vested interested in seeing a vendor project complete, where as IT typically does not, it's not their money or idea.
2) Business Managers will make time to meet with a vendor, where as IT typically think of vendors as hired hands, about as valuable as the lady who vaccuumes the floors every night.

Comment Re:PRIVATE encryption of everything just became... (Score 2) 379

Today on CNN, the commentators after the Brennan press conference said that the CIA was correct in saying that no non-bad-guys were killed by drone strikes. That's because the CIA redefined bad-guys to be any human of fighting age (13-60). So, that means that Grandma and your kid brother are free to use encryption, because they definitely aren't terrorists. They get to keep their shoes on at the airport, so there you go!

Comment Re:PRIVATE encryption of everything just became... (Score 1) 379

Thanks TechyImmigrant! Lost track of the block size for a moment. Over the last three years, I've been developing a block cypher. I was surprised to see that AES sole security is XORing the key with mono-substitution translations of the plain text. The 128 bit version can be broken on my laptop...

Comment Re:PRIVATE encryption of everything just became... (Score 2, Informative) 379

Don't forget it is the NSA who approves what type of encryption are legal for citizens to own. In the case of AES relies solely that combining 256 random bits with 256 non random bits, sufficiently, is too difficult to decipher except for the most powerful computer systems.

"Survey says..." -- Richard Dawson, weenie, on "Family Feud"