Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment: Counter-culture in full effect! (Score 1) 250

by PhrostyMcByte (#48681599) Attached to: The Interview Bombs In US, Kills In China, Threatens N. Korea

So many people are panning this movie. Have you guys posting negative comments actually seen it, or are you just reacting to the press?

I mean, I get it -- there's bound to be some sort of automatic counter-culture response to defend against the massive amount of press talking about how controversial and important it is.

Yes, it's a little controversial to target an actual country and an actual leader so directly. But you know what, their message while embellished for comedic effect isn't really far off base. I think the world could use some more of this controversy, and there's nothing saying this type of thing needs to be in dry journalistic form.

As far as the movie itself goes --- it's a Seth Rogan bromance dick joke movie. It really doesn't bring anything new to the table. It's not his best movie, but it's by no means bad. It's fun and entertained me the whole way through.

Comment: Re:Waste (Score 4, Insightful) 170

Makes you wonder what kind of good could have been done or how many lives could have been saved with that $70 million.

It's not like he's throwing bills into a fire. That money goes back into the economy which is good for everybody, and its recipients are still free to spend it on whatever good deeds they want.

Comment: Can we stop the embellishment? (Score 5, Insightful) 177

by PhrostyMcByte (#48640049) Attached to: Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony

I haven't seen any evidence that the mechanics of the attack itself is at all noteworthy, yet we keep hearing about how this attack was unstoppable, "nasty", etc. -- not just from Sony's PR guys, but from the FBI. As if it could have targeted literally any company and caused just as unmitigated damage.

To me, a "nasty" worm is Stuxnet: it spread in a very standard innocuous way and seemed like any other worm, but ended up being highly targeted.

This Sony hack just seems like your average trojan worm leaking an admin password back to someone. The only noteworthy part of this hack is that Sony had such horrifyingly moronic security practices that one attack was able to compromise such a large and varying corpus of valuable data.

Comment: Even the TSA knows they've become a joke (Score 1) 184

by PhrostyMcByte (#48578185) Attached to: Are the TSA's New Electronic Device Screenings Necessary?

Last flight I took out of LAX, they were randomly handing out "expedited security" slips to people. Keep your shoes on, laptops can stay in bags, no x-rays or pat-downs, etc. and I was through in about 30 seconds. I even found out after I went through the metal detector that I had left keys in my pocket and my belt on.

Basically, it was like security used to be, pre-9/11. It was marvelous.

Comment: Re:Freenet? (Score 3, Informative) 67

by PhrostyMcByte (#48568251) Attached to: BitTorrent Launches Project Maelstrom, the First Torrent-Based Browser

Freenet had some issues. Most of them won't apply to BitTorrent's offering.

The main one is receiving content was dog slow compared to, say, Tor. This is simply an artifact of how it was routing connections and the distributed storage aspect.

Second, but still contributing to the poor experience is that the app itself had some architectural flaws that made it and your PC run dog slow -- the choice was either use hundreds of threads or let the operations stall.

The third, more of a security/philosophical flaw, is that the base protocol was not documented in any significant fashion. To review the protocol's security, you'd need to have an expert understanding of Java and a large part of the codebase. So it never really had many eyes on it looking for flaws.

I haven't used Freenet in around 5 years, so this may have improved. It was pretty clear why it never caught on at the time.

Comment: Re:why would I write to that? (Score 1) 187

by PhrostyMcByte (#48534659) Attached to: Microsoft Introduces<nobr> <wbr></nobr>.NET Core

Merely needing to convert time zones is a trivial requirement. Work with them any other way and it's a nightmare. My first exposure to it was when implementing a crontab-like scheduling software, which on proper implementations has defined behavior to not fall on its face when daylight savings time wreaks havoc on the world. I couldn't find a way to do this reliably in .NET, but Noda made it possible.

Don't take my word on why Noda should be used though... read from it's blog for plenty of examples for why the seemingly great .NET DateTime can be a minefield in far more common situations than mine.

Comment: Re:why would I write to that? (Score 4, Insightful) 187

by PhrostyMcByte (#48534083) Attached to: Microsoft Introduces<nobr> <wbr></nobr>.NET Core

Why should I have to use a third party library to get decent date support?

I've questioned that myself while working in .NET. Ever needed to write time zone aware code?

Date libraries, as it turns out, are rather monstrously difficult to make. While .NET did a great job for the common stuff, uncommon things can be painful, error prone, or impossible.

The fullest solution I've found so far is Noda Time, which is actually based on the Joda-Time Java library. It feels out of place with a number of Javaisms still in it, but it provides a much richer functionality and better separation of concerns.

Comment: What's so special about Google? (Score 4, Interesting) 334

by PhrostyMcByte (#48437533) Attached to: The EU Has a Plan To Break Up Google
The EU seems to have a chip on their shoulders about Google. I get it, they're huge and they need to be kept on a leash. But when are we going to see them go after other huge companies abusing their market share? We have Amazon regularly putting full-page ads for their latest electronics right on their front page.

After any salary raise, you will have less money at the end of the month than you did before.