Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Scaaam.... (Score 1) 279

The 'work' involves searching for a very hard to find hash. The result has to be legitimately random, in order to prevent tampering.

If you can figure out how to process 'real data' and still keep it 'random', then you can certainly raise it.

Comment Uh. So? (Score 0) 195

I fail to see any issue with this. The bank that owns my credit card has a list of the transactions I've made on it. And they are now going to send me spam targeting me based on those transactions. The bank has always had the information. The bank still has it. There is no privacy issue here.

What there might be is banks annoying their customers. That shouldn't be illegal. It should result in customers finding banks that don't annoy them. Or, if customers don't care, then whatever.

Another thing that puzzles me: I work in the credit union marketing industry. We sell insurance to members of credit unions. The credit unions send us a list of their members names and account numbers, we mass snail mail them enrollment forms for free offers (with potential to buy in for more.) We don't get transaction history. But that doesn't matter. We buy the user's profiles from Experian and other companies. I'd be amazed if banks didn't already do this, since we've been doing it for a decade. And we have lots of competitors. So... maybe their user profiles are going to be better and they'll not annoy people with products they definitely don't care about. Beats the status quo.

Comment Re:Everything is an INCOMPATIBLE object (Score 2) 317

Translation: it's foreign to me and I don't want to learn it. There is nothing convoluted about any Unix command once you learn how to use it. Grep and awk are second nature to many people. That's a particularly weak and, quite frankly intellectually dishonest argument when presented to expers and power users like many people on Slashdot are.

I know them. I've been using Linux since the mid 90's. i write kernel drivers for fuck's sake. PowerShell commands are self discoverable. Man pages are auto generated from thedocumentation stored with the commands themselves. If anything is weak it's your argument that I don't know the commands.

The core utilities have been going strong for 30-40 years and most changes have only added features not taken old ones away. You have no idea what the future has in store for PS so that too is a weak argument.

Well, you just made my point for you. In that sentence you acknowledge that I'm right. Only a small set of core utilities have had non-altered output for the last 30 years. I'd like to point out that 'ps' at least has been altered a few times in the last decade. ifconfig, same. Replaced with 'ip'. So you admit, Unix utilties break when the author changes them.

My entire point about powershell was that you don't have to know what changes are in store in the future. Didn't I mention that? You can add properties without requiring downstream users to be concerned with it. That's the point I made. You missed it, I guess.

There is nothing PS can do that can't be accomplished by streams of text. The Unix model is very simple, every argument I've seen against it has amounted to little more than strawman bs,and unlike your flavor of the week utility, it will be here long after we are all long gone.

There's nothing that C can do that can't be accomplished in assembly. Really? This isn't even an argument. It's a basic fallacy.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...