Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment Similar for me (Score 1) 345

I recently tried to make a small online from from a UK-based site. It was for 7 UK pounds. They declined the transaction. We called and they too were suspicious with the activity to a foreign country. Fair enough. But I had made identical 7 pound purchases from the same company earlier in the year. It can't be that difficult to check against previous transactions?

My other problem with our Visa-providing bank is that they allowed us to set up several alerts so we can be notified of suspicious activity. Unfortunately the first one occurred while I was driving in a foreign country. My wife called in while we drove, as we were both panicking that we would lose access to our card (and be unable to do mundane things like buy gasoline to reach our destination). Here the issue is my wife is the primary credit card holder. I am secondary only. The bank was annoyed that the alerts were set up to go to my email and cell phone rather than hers. I work with security stuff all of the time. My wife is somewhat technically illiterate. I need to see the alerts more than she does. They should let us decide who sees the alerts and recognize this situation too.

Comment GRRR (Score 1) 698

HULK HATE CAPS LOCK. ALWAYS HITTING BY MISTAKE! Oh sorry. Hulk hates caps lock. Always hitting by mistake!

On one IBM laptop I was so exasperated by caps lock that I did a registry hack to effectively nullify the key.

I used to shake my head at some of the old IBM 3270 mainframe consoles that had a physical rocker switch to convert lower case displayed to upper case. As I recall though, if you were typing in case-sensitive stuff, it would display as upper case but actually the bytes entered would represent the lower case characters (unless you remembered to use shift of course).

Comment Hangouts thrown out (Score 1) 62

When I got my Nexus 5 android phone last year the first thing I did was to send SMS messages to my kids to notify them that I had a new phone. Hangouts failed to send them. After several hours of messing around I installed 8SMS with no problems. How can the most basic of apps on a phone be somewhat broken out of the box?

As a general Google rant, I am security conscious and want nothing shared and nothing in the cloud. Automatically Google sucked my contact list out of my phone and stuck it in the cloud. The latest Google Photos app update said something like "click here to store all your photos in the cloud". Grrrr. I felt like I was one errant tap away from losing control of my photos. I nearly went ballistic.

I feel like they want to grab my wallet out of my pocket if I happen to turn in the wrong direction. "Here let us hold on to that for you. If you need some money just let us know and we'll get it out for you. Aren't we nice?".

Comment Do the job now and later (Score 1) 298

The first thing is, most of us are coding as house painters rather than as Rembrandt. So it needs to do the industrial job. I tend to put as much effort into documentation and style for my personal code as for working code.

If the code is for a micro-controller in C then the emphasis might be more on raw efficiency and preciseness. A command line utility run ad hoc with low resource usage can afford to be a little less efficient and more readable. Code for an online transaction system needs the efficiency, perhaps as a tradeoff to readability but in most cases hopefully not.

I have written code and products and have had to go back to stuff I wrote 15 years ago. So I learned a long time ago to document as clearly as possible for the poor sod in the future (i.e. me) who will have to come back and make sense of everything. Mostly I succeed here but sometimes I fail.

I also supported other people's assembler code for a few years. That provides lots of what not-to-do's.

If you are coding examples for a book or website then the rules and aesthetics can be changed again. Maybe think more Rembrandt here.

Functionally, document everything, use meaningful and consistent naming conventions, catch errors, log, provide trace capabilities where needed, be as generic as possible and think about reusability but don't obsess over it (depends on the context as always).

Submission + - Oct 25 is Root 2 day

Ted Stoner writes: The Unix timestamp (also used by Java) tomorrow (Oct 25) at about 1:04:16 AM GMT-4:00 DST (EDT) will hit 1414213456. Divide by 10**9 and square it and you get 2.

Root 3 day (timestamp 1732050808) does not occur until Nov 2024 so party now.

Visit the Epoch Converter site for more zany madness.

Slashdot Top Deals

The star of riches is shining upon you.