Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:Why roads? (Score 1) 405

I could see the side-benefits of an easily repairable/lightable/etc road system making up for the general stupidity of the idea. Of course, if you've ever driven on one of the concrete slab roadways like in upstate NY the constant clicking of the tires on the seams drives you batty after a while, and there'd be way more seams.

Roofs also need maintenance and replacing, and this is not cheap as any homeowner knows -- so the material displacement theory has to compete with that as well, though currently many rooftop solar installations do not replace shingles.

I bet we also get the solar-panels-in-space microwave beam stupid idea thing built before this is all over. Anything to avoid just doing the sensible boring thing and building the cheaper solutions.

Comment Re: PHP vs Perl (Score 1) 145

and the need to revise existing code when adding a new method/function that has the same name as an existing one

Let's be precise: the need to add one multi to the one only sub that was allowed before you made it a multi. Compared to the benefits of being able to close the definition of the sub for the optimizer to inline it under more circumstances, this is a minor incovenience.

If such calling conventions are 'good' then why not use them for all subroutines?

Because different calling conventions are better at different things. Generally in he style that uses subs, you do not want an unknown named parameter to be ignored, but when inheritance is involved, you do.

It doesn't appear to have any revolutionary multi-threading/parallel processing magic that other languages don't have.

Other languages have hyper/race operators and composeable concurrency primitives baked into the core? News to me.

Time will tell. The same arguments you make could have been levied against, for instance, go. There's enough dissatisfaction with currently available languages that new ones crop up all the time. Perl 6 has aimed at producing something that will gain more users fed up with the status quo than it will lose to alternatives, and I think as it stabilizes, that objective will have been achieved. Unless it gets pushed in the media as a fad, all languages have to go through an adoption curve and this is the healthier way for it to grow, because it allows more feedback to be generated from less aggregate frustration.

Comment Re: PHP vs Perl (Score 1) 145

Why do I have to go find other instances of the same sub/method and rename them 'multi' just because I now have 2 signatures?

So you can get compiler warnings when you accidentally try to shadow an 'only' sub definition in the same scope when you are not using multis.

why is there sub and method as separate things in the first place

Because calling conventions are customized to OO in methods -- you have an invocant, and unknown named parameters are, by default, ignored so you can easily subclass.

and WHY is 'sub' changed mysteriously to '->' when the method is anonymous

anonymous subs using "sub" still work. '->' is a generic closure syntax which you may prefer if you like it.

I'm having a hard time seeing what was gained

It's as much about what was lost than what was gained -- Perl 6 leaves behind a lot of the things that demanded a spirit of loyalty to put up with, like variant sigils, so it will be less irritating to a wider audience. The whole language is much more self-consistent, and things that would have required a complete overhaul of Perl 5 to implement have not had to contend with the obstacle of backwards compatibility.

Comment Re:Simple. (Score 1) 265

Well, on professional grade routers/firewalls ACLs are compiled and pushed down to the FIB/CAM, which can indeed reject things in hardware. Some commodity cards also include onboard packet processors, but YMMV on support for configuring it.

As far as it generating alerts, that's the software's shortcoming for not supporting a way to selectivey silence alerts.

As far as the wasted bandwidth, if it is any consequenctial amount, you're pretty much without recourse unless you can show it is having a financial impact, and given home ISPs rarely give you access to metering information to do so, you're hosed.

In an enterprise setup where you are peering BGP to your ISP, the ISP might support BGP communities for selectively blackholing traffic from certain networks to your ranges at their border, on a limited basis (routers only have so much space to contain the rules so you'll only be alllowed a few prefixes.)

Comment Brain drain (Score 1) 167

I can't help but imagine a world where lots of philanthropists fund the most talented CS/IT staff
to work on world-changing beneficent technology, meanwhile the masses all have less than
ten fingers because their knife-bearing IoT kitchen appliances were written by whatever idiot
was left at the keyboard after our saviors left their respective industries.

I'm all for altruistic things, heck, I do some myself, but humility is often the first casualty
of working "outside the system" -- when SV millionaires volunteer their money they tend to
think big and reach high and ignore all the hard work that needs to be done on more mundane
problems, and that's a powerful siren song to someone wading through a bunch of work
that is well below their capabilities.

When I was in college I was training to design microchips -- a prestigious thing at the time.
About halfway through that, I noticed that no matter how many more HZ the CPUs ran at,
software was devolving at a rate to compensate. So I finished that degree and then totally
did not go design microchips.

I got a blandish job deploying the technology we already had, because it does not matter
what we have collecting dust on laboratory shelves, it's what ordinaty people can actually
use that matters, and if smart people are too arrogant or elitist to wade into an everyday work
environment and do some smart person things to improve it -- which yes will also requires
doing some work that isn't particularly challenging, it'll just always be the same keystone cops

So, i don't get to bummed when I read about stunning acheivements on and think
I could have been working on that team if I'd chosen a different path, I just picture what an
utter wreck my workplace might have become without me.

Comment Re:Typing versus Reading (Score 1) 304

Mnemonics are for people who want to later have to remember which DSLs decided on "ne" and which ones decided on "neq" and hence lose most of the benefit.

The only real advantage to them is on the commandline so you don't have to escape shell syntax. Or when you actually make them do something subtly different (but useful) than the symbolic ones, as in Perl.

Comment Re:Verified boot by who? (Score 1) 150

Except that the verification keys used are not public, and in general, no option to install additional trusted keys is made available. It basically kills the ability to have custom boot loaders for backup/restore or for any other reason and makes it rather easy to hard-brick the device as no utility to undo an unverifiable bootloader is made availble to the public. The age of mods is coming to an end unless consumer demand for devices that they can add keys to rises to unlikely levels.

(Often the keys are manufacturer specific and roms from different carriers can be booted on the same device, but the carriers could easily lobby the manufacturers to truly lock the devices they sell to their network.)

Comment Re:Good thing actually (Score 1) 217

Well, for the more-BYOD-than-BYOD sector, what will happen is we'll install a new VPN that is not quite as crusty as our old one which always "just worked" and so never got budgeted for an upgrade, configure it for best practices security, and then weaken it when 10% the must-have clients turn out to be too crummy to deal and don't support installation of a 3rd party client, even if we could get front-row to shoulder the support burden involved in doing that (or doing an on-site CA and dealing with cert installation.)

(I'm going to try to sell the idea of forcing those weakest-link clients to use a different SAP IP so we can tell them apart and not cripple security for the rest, we'll see how that goes.)

Slashdot Top Deals

In every non-trivial program there is at least one bug.