Forgot your password?

Comment: Re:It's still unmaintainable crap (Score 2) 254

by dackroyd (#46404689) Attached to: The New PHP

> It suffers from SQL that lacks proper commit controls.


> Implementations I've used leak connections like a seive, forcing restarts of the database servers on a regular basis.

While that must have been frustrating for you - that's not a common complaint, so was probably specific to either your DB or configuration.

> PHP's biggest problem is lack of modularization and encouragement of inline script hacking.

You mean you suck at writing decent code, without being forced to do things 'properly' ?

Comment: Re:Why use the Zend engine at all? (Score 1) 254

by dackroyd (#46404057) Attached to: The New PHP

> Many of the problems with PHP are from the crappy language implementation.

Yes, because switching to a subtly different language implementation is not going to cause any problems running code that was written for the standard PHP implementation.

> It's Quercus []. It's certainly worth a look as a Zend alternative.

That was release 7 years ago. No one appears to really use it.

Do you really think that if it was such a great improvement over the Zend engine that people wouldn't be using it?

Comment: Not your computer (Score 1) 177

by dackroyd (#46316449) Attached to: Most Alarming: IETF Draft Proposes "Trusted Proxy" In HTTP/2.0

The author who says that this is 'most alarming' is missing one key thing; sometimes people use computers that belong to someone else.

Any company that needs it's employees to be able to use the internet, but also want to be able to detect any employee that is sending documents via the internet to outside of the company would love to use this, as well as have every permission to install this on their own computers. They could then have the employees computers trust the SSL proxy, and it could easily detect any documents being transmitted.

Poul-Henning Kamp covers this at the end of his talk at from 14:40 .

Comment: Re:Don't look now (Score 1) 519

Interesting post, but this is wrong:

Australia dithering leaving NATO to avoid complete economic meltdown when they suddenly can't sell their mining produce to it any more

Australia realised during World War 2, that they were completely dependent on the US to be able to prevent invasion and occupation of Australia from Japanese forces. Since then they a strategy of doing everything that the US wants, to retain the strong military alliance between them.

Although it would hurt massively in the short term, I can't see _anything_ that would break that alliance. It would basically be a declaration that Australia would be prepared to become allied with and accepting military occupation by China.

And it would just be the short term - if there was a military conflict with China that shut down trade, having several hundred million people suddenly unemployed in China would cause a faster change in government there than not being able to buy the latest iPhone or more plastic crap would in the US and Australia.

Comment: Pretty simple rules (Score 1) 219

by dackroyd (#44921217) Attached to: Ask Slashdot: Prioritizing Saleable Used Computer Books?

If it's for either the current version of a technology or is for a technology that is version free - keep it. e.g. The Data compression book, and The Pragmatic Programmer are both 15 years old but are still great books that people could learn a lot from.

If it's for a technology that has had a newer version (or versions) released - probably bin it. Even a book a couple of years old will be massively out of for technologies that are advancing rapidly. e.g. a book on how to develop for iPhones that was released in say, late 2009, would be almost completely irrelevant now.

Comment: CSS already supports it. (Score 2) 138

by dackroyd (#43401613) Attached to: Gecko May Drop the Blink Tag

Fiddle is here

@-webkit-keyframes blink {
                from { opacity: 1.0; }
                to { opacity: 0.0; }
                0% { opacity: 1.0; }
                50% { opacity: 0.0; }
                100% { opacity: 1.0; }
        } .blink {
        -webkit-animation-name: blink;
        -webkit-animation-iteration-count: infinite;
        -webkit-animation-timing-function: steps(1);
        -webkit-animation-duration: 1s;

Comment: Re:Me Too. (Score 2) 52

by dackroyd (#41979985) Attached to: Total Solar Eclipse Bedazzles Northern Australians

I was probably about 4km east of you then. Cloud passed the sun with about 4 minutes to spare before totality.

Didn't get as many pics as I'd like as I was standing there in amazement trying to see if I could get my brain to believe what it was seeing.

Comment: Worse for uncommon items (Score 1) 280

by dackroyd (#41068375) Attached to: Prices Drive Australians To Grey Market For Hardware and Software

Although there is an unjustifiable disparity for the common items they examined, it's even worse for specialist equipment.

E.g. I would like to purchase a large format printer to be able to print and sell my photographs. The price difference between the US and Australia is over 100% !

B and H - $1,575.00 - $3645.00 inc GST - $3,156.00 [Includes GST]

Although Australia is a smaller market than the US, and so there are higher stock costs and lower turnover, having something cost more than twice as much here as it does in the US is just ridiculous.

Comment: Epic facepalm (Score 2) 92

by dackroyd (#41032885) Attached to: iPhone Bug Allows SMS Spoofing

Totally non-authenticated communication method found to be not authenticated ! More details at 11.

I can't believe that this is news to anyone. Do you really think that people who send marketing, information or run 'adult' services via SMS have a huge bank of mobile handsets with people sitting typing messages into them?

No - they have computers that connect to a bulk SMS supplier (e.g. the company I used to work for that allows them to send SMS with any Originating Address that they choose whether that's someone's phone, a shortcode or the name of the company.

Mobile phone operators do sometimes implement limits on what can be set for the O.A. for messages entering their network but there just isn't the infrastructure in place to authenticate what is set for the O.A. within the network.

Comment: Re:Another aspect of this mystery (Score 1) 229

by dackroyd (#40986185) Attached to: Researchers Seek Help Cracking Gauss Mystery Payload

The assumption is that it allows detection of the installation of the virus via a web-browser.

As the virus seems to be only installed on certain machines with known paths, and those paths can be exposed through Microsoft Office document files, it is possible that whoever targeted this attack had received a MS Office document, that told them who to target. I would not be entirely surprised if the font was used to detect installation on the target PC through either the virus using it in a office document as a file - or possibly even through printed material generated by the target machine.

"But this one goes to eleven." -- Nigel Tufnel