Follow Slashdot stories on Twitter


Forgot your password?

Comment Completion Bonus (Score 5, Interesting) 524

Hold back 10-15% of the total cost as a completion bonus. Pay the completion bonus when the project reaches a completion milestone of no critical bug reports for three weeks or version 1.1 coding begins.

This gives the programmers an incentive to finish the bug testing and getting to a stable release status so they receive their bonus.

Many contractors have a bonus waiting at the end of a project and know that any mistakes will come out of that bonus. If a new contractor is needed to fix something the original contractor is unwilling to do, then the bonus should be just large enough to pay for the new contractors work.

Comment Perhaps eliminating Secure Boot? (Score 3, Interesting) 319

Because Microsoft requires certified Windows 8 hardware to be shipped with secure boot feature enabled by default, Intel might be interested in designing a computer that isn't purpose built for Microsoft to control.

Intel might be building a computer that gives other operating systems a test bed to innovate and create something new. A multifunction laptop/tablet that can run Android, Chrome, Linux, or Firefox OS as the user desires.

Comment Re:Missing Option (Score 1) 135

Programming assembly on the TI-99/4A was very educational. And like the poster above, I found Intel's assembly language limited, confusing, and missing so many commands. Plus, the assembly language used software registers so you would get a new set of registers each time you changed your frame location. Intel's hardware registers were much faster, but you spent so much time moving things into the registers, operating on them, then moving them back to memory that the RAM-based registers seemed just as fast. You could multiply two numbers together in RAM without worrying about the registers. Plus, the TI-99 was a 16-bit machine which gave some advantages with larger numbers. You could multiply large numbers without converting everything into BCD (binary coded decimal) first.

It has been almost 30 years since I programmed assembly on the TI-99 but I remember it was much easier than learning and coding around the limitations of the x86 assembly.
The Military

United States Begins Flying Stealth Bombers Over South Korea 567

skade88 writes "The New York Times is reporting that the United States has started flying B-2 stealth bomber runs over South Korea as a show of force to North Korea. The bombers flew 6,500 miles to bomb a South Korean island with mock explosives. Earlier this month the U.S. Military ran mock B-52 bombing runs over the same South Korean island. The U.S. military says it shows that it can execute precision bombing runs at will with little notice needed. The U.S. also reaffirmed their commitment to protecting its allies in the region. The North Koreans have been making threats to turn South Korea into a sea of fire. North Korea has also made threats claiming they will nuke the United States' mainland."

Comment Re:Absolutely fantastic! (Score 5, Insightful) 96

Agreed!! One of the major costs of college was the $100 text books that showed the basics of a language and example code, but it wasn't something that I would keep as a reference for future study. I think a Creative Commons book that can be updated and improved each year will be attractive to both the professors and the students. Asking each class that uses the book to send in the top 5 suggestions will help give feedback on what can be improved each year. Not every suggestion will be used, but it can keep the book improving each year. The hard part will be getting the professors to agree to teach from the book until at least the second year it is available.

Comment Re:well... (Score 5, Insightful) 397

Speech, in this context, is anything that conveys an idea. A drawing or cartoon can be speech. Your right to fly the flag is covered under free speech. A picture can be speech. Art can be speech.

Imagine banning great works of art like Venus emerging from the sea or David by Michelangelo, just because genitalia is visible. Books have been banned from some libraries because these images were included and classified as "porn". [Citation]

Comment Re:Is it fixed? (Score 3, Informative) 247

One problem with publicly acknowledging the compromise is the bad guys realize they have been detected and stop connecting to the system. Our security team requires us to leave any compromised machine "as is" so they can monitor what the computer does, who it contacts, who connects to it, and how the infection is spread on the network. They will purposefully leave the machine running and letting the infection spread so they can gather the maximum information about it before they pull the systems for further forensic analysis. This is standard practice at many large companies, even if they don't tell everyone about it for obvious reasons. Just because they don't reply to you doesn't mean they aren't working 16-hour days trying to stop or catch the perpetrators. Even sending you a simple e-mail saying they are reviewing the situation might be enough to scare off the bad guys if they have compromised the email system farther than just harvesting contacts.

Slashdot Top Deals

In computing, the mean time to failure keeps getting shorter.