Forgot your password?

Comment: Re: Agner Krarup Erlang - The telephone in 1909! (Score 1) 328

by The MAZZTer (#48188467) Attached to: An Algorithm to End the Lines for Ice at Burning Man
Fast food places near me use a "single line" system. When a spot opens the cashier announces "Can I help the next guest?" or otherwise greet you to let you know they're ready to take your order. No reason why that wouldn't work in a grocery store. I think that chain you were talking about was just doing it wrong.

Comment: Re:Outrage (Score 1) 60

AFAIK DoD contractors are required to keep classified data on a separate network from unclassified data. Classified network should have no internet access. "Closed areas" are used to keep the networked machines physically separate. Set procedures are in place for moving data between the two networks. This sounds like Top Secret data would be travelling across the internet (likely there will be strict standards on VPNs to use and encryption and whatever).

Comment: Title Is Misleading (Score 1) 67

by The MAZZTer (#48045985) Attached to: How Hackers Accidentally Sold a Pre-Release XBox One To the FBI
It wasn't a pre-release Xbox One, it was off-the-shelf components that met Xbox One pre-release specs. However given the systems they hacked, what they have been charged with, and why they might have wanted to assemble one, it wouldn't surprise me if they loaded it with Xbox One development kit software.

Comment: Re:Whatever happens... (Score 2) 191

by The MAZZTer (#47992047) Attached to: Ask Slashdot: How To Keep Students' Passwords Secure?
For that matter, assume the school always has full remote access to the hardware they issue to the students. Same reasoning. Don't log into personal accounts from those devices or do anything personal on them. Remember the case of the school that issued laptops to students only to spy on them with the webcams... hopefully nothing like that will happen to you, but at the same time it's prudent to keep anything the school has access to cleanly separated from your child's personal life.

Comment: Re:If only Tim Sweeney could find the ZZT source! (Score 1) 72

by The MAZZTer (#47929841) Attached to: Commander Keen: Keen Dreams Source Code Released
ZZT is pretty transparent in how it operates, and all the data files have been completely disassembled (and I assume documented somewhere). In theory it shouldn't be too hard to clone it from scratch. There are several clones out there, IIRC (I think one was called z2 or something and there was one other good one), though I think most try to extend ZZT in some way and do their own thing with their own data files.

Comment: Re:PowerShell - the whole language (Score 1) 729

The fun stuff is that you can use any .NET object in addition to PowerShell commands and syntax. And then you can also use command line apps as well (though there are annoying issues with delimiting arguments depending on which method of invocation you use).

Comment: Re:Python False = True (Score 1) 729

In JavaScript it is perfectly valid to make a variable called "undefined" and assign it any value you want. Of course, to its credit, any assignment on the global scope (window.undefined is defined as undefined in Chrome) is ignored and it will still have the value of undefined, so it only works inside a function. Still odd though. null, true, and false are all keywords and thus cannot be assigned to.

God made machine language; all the rest is the work of man.