Forgot your password?

Comment: Re:Can we stop trying to come up with a reason? (Score 1) 464

by phantomfive (#48200837) Attached to: NPR: '80s Ads Are Responsible For the Lack of Women Coders

Read this article about one presumably successful effort. [] And let's look at the assumptions these efforts make, and their solutions.

What bothers me about the article is how little they talk about actually enjoying computer science. They talk about editing Darth Vader's voice, or having all the answers to a quiz be 42, but......what about the actual subject? If you don't enjoy it, maybe you should go to a different field. Because I can tell you, once you've graduated, the real world isn't going to be gamified.

Comment: Re:Until we upgrade the dumb bunnies (Score 1) 159

Do you remember the last time Obama declared that we "don't have a plan" because the conditions in Syria were complex and required addition time to evaluate the various options?

It would have helped if he'd used that time to actually come up with a plan........

Comment: Re:All the movies had women in business (Score 1) 464

by phantomfive (#48199629) Attached to: NPR: '80s Ads Are Responsible For the Lack of Women Coders
It has some nice features related to performance monitoring, debugging (execution logging, for example), and architecture modeling (like UML). Most of the team functionality is available in the Premium version. You can see a comparison here.

For a fun exercise, tell your outsourced developer that his IDE costs more than his salary. See how he responds.

Comment: Re:All the movies had women in business (Score 4, Insightful) 464

by phantomfive (#48198647) Attached to: NPR: '80s Ads Are Responsible For the Lack of Women Coders

Computing IS anti social!

You have no idea how much I wish that were true. For me, it would be a perk.

Instead, I spend plenty of time in meetings, coordinating with fellow programmers, working through issues like their code sucks (and for some reason I can't figure out, they think my code sucks), strange emotional attachments they feel towards Visual Studio (even though it costs over $10000 for the full version). And that's only fellow programmers......figuring out what customers, management, vendors all want is another issue (and it's important).

I just want to sit down, get my job done. Let me program. Instead I end up talking to a bunch of people.

Comment: Re: Why? (Score 1) 106

by phantomfive (#48193113) Attached to: China Staging a Nationwide Attack On iCloud and Microsoft Accounts

The CCP knows they are living on borrowed time and are going to do everything in their power, including perhaps returning to the days of the cultural revolution if it finds it necessary.

The CCP uses fear of the cultural revolution as a way to stay in power. That's what all the talk about 'Harmony' means. Not many people in China want to go back to that. They understand it made no sense to have red stoplights mean go,for example.

Comment: My infringement warning notice (Score 0) 113

The code is implemented for people to be able to play with an insecure algorithm, to test it's weaknesses. If I were the author of the library, I would have added a warning like this:

This code is known insecure. If you ship on a real device to customers, you are such a moron that........imagine every insult Linus Torvalds has ever spoken or written, and that it applied to you. Would you want that? That's what would be the case if you used this in production code.
Furthermore, even if you're the dumbest person on earth, shipping this code on real devices could expose you to threats of lawsuits. I don't know if those threats are real, but don't let it get to that point.

Comment: Patent infringement (Score 5, Informative) 113

He is not being threatened for copyright infringement, he's being warned about patent infringement. Here is the link to the patent in question (there's also a European patent). Furthermore, it seems the lawyers have determined that he has not committed infringement himself, but users of his library may use it to infringe. Therefore, the letter does not even threaten any legal action at all. It's just a friendly request.....or as friendly as lawyers ever get.

Below I will paste the specific patent's independent claims. I don't think this can actually cover generic software written for the PC, because of the 'secret memory' and the fact that they have patented the device implemented in hardware, not a software implementation of the algorithm (and how many computers actually have a pseudo-random shift register?)

1. Method of producing an authentication code (CA), comprising cycles for reading binary words (Mn) out of a secret memory (21) comprising a plurality of binary words, wherein, at each cycle, the address for reading a word out of the secret memory (21) is generated from an address generating binary word (GA) forming the result of a combination operation (Fc, ) of words (M1 to Mn) read out of the memory during previous cycles, characterised in that it comprises a transform operation of the address generating word (GA) consisting in logically combining at least one bit (g'0, g'1, g'2) of the address generating word (GA) with at least one bit (r1, r4, r6) of a pseudo-random shift register (26).

8. Logic machine (20, 20-1, 30) clocked by a clock signal (H), comprising a secret memory (21) in which a plurality of binary words read out at clock rate are stored, wherein the output of the memory (21) is applied to a first input (A) of a logic circuit (22) whose output (C) is fed back to the second input (B), the logic circuit (22) performing a combination (Fc, "+") of its two inputs (A, B) and producing an address generating binary word (GA) supplied to the address input (ADR) of the memory, characterised in that it comprises a pseudo-random shift register (26) and logic means (25-1, 27) for combining at least one bit (r1, r4, r6) of the shift register (26) with at least one bit (g'0, g'1, g'2) of the address generating word (GA).

Natural laws have no pity.