Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:Third choice (Score 1) 275

Easy enough to say but last time I checked if you want to do anything with the current VR headset boom, you're pretty much going to have to use Windows. Steam's OpenVR initiative makes it sound like you don't, but a few months ago when I checked their Linux examples wouldn't even build.

Comment Re:Meh (Score 1) 178

Is there every any particular need to limit them, though? A couple decades ago it was uncommon to have more than one sound device on a machine. Now it's unusual not to have two or three. Designs and requirements change over time, and having to factor out singleton behavior that was never really necessary in the first place is kind of a pain in the ass. You could easily just create those things with thing factories when the program starts up, and pass them around to objects that need them. No artificial limits, and you don't have to factor out singleton behavior when you decide you want two things where you used to only have one.

I've found that design review boards are becoming increasingly hostile toward singletons, too. There was a narrow window where they'd at least consider one, back when people started talking about design patterns. These days it's next to impossible to get one approved, even if there's pretty good justification for it. You can always design around the need for a singleton, and usually the system design will be better without them.

Comment Meh (Score 5, Interesting) 178

I've yet to see a computer science professor with particularly excellent code, either. I run across assignments and example code from courses on a regular basis that fall into the "Never, ever do that" category of programming. Case in point, a relative of mine recently had some questions about a CS programming assignment. Part of the assignment description talked about design patterns and predictably went straight for the Singleton as an example. I'm pretty sure that's the only pattern that about 90% of programmers ever actually learn when reading about design patterns and it's so abused in the industry right now that you can basically never get one past a design review board.

Anywhoo, back in the '90's I worked for a company that was getting a B2 Certification for its operating system. My job basically consisted of reading the entire AT&T C standard library code, finding potential security flaws, writing tests for those flaws and then writing a report with the tests which would be delivered to the NSA. I found the remote buffer overflow in the AT&T telnet daemon a couple years before the same overflow was discovered in the Linux telnet daemon. So the NSA basically outsourced the hard work of finding all those exploits to the companies that were trying to get security certifications. It took three or four guys just a few months to go through all the stuff we had to look at. I'm sure we missed a bit, but I was much more confident in the security of their OS at the end of all that. Too bad they eventually went out of business, were acquired by IBM and their products were killed. You know, progress!

Comment Conspicuous Silence (Score 3, Insightful) 93

The service, according to Comcast, allows you to download a 5GB HD movie in 40 seconds, [ ...marketing blather... ]

Uh-huh. I notice they're being conspicuously silent on upload speeds. "Gee, how nice I can download a movie in a couple minutes, but how long will I have to wait to upload the video of my daughter's ${WINTER_HOLIDAY} pageant?"

Meanwhile, Google Fiber is 1Gb/sec symmetric.

Comment 35 Years of Rank Incompetence, And Counting... (Score 4, Interesting) 216

Microsoft says it introduced the changes to prevent an issue that was resulting in duplication of encoding the stream (poor performance).

I see. Because squirting 720p or 1080p video as uncompressed YUYV over a USB2 link never results in performance problems...

Comment Re:Linux (Score 1) 157

That's true! I haven't booted back to windows in months and have mostly been mucking around with Factorio and Stellaris lately. There's a pretty decent library of Linux-Compatible games on Steam, a much better situation than a decade ago when Loki was trying to make a business model off porting them. I haven't seen levels of hype like the one in No Man's Sky since Spore, and we all know how THAT turned out. So I was planning to hang out for a bit and watch some gameplay videos before making my mind up about the game. I'm guessing if I bought it, I might get a couple hours out of it and then get bored. I paid $20 for Factorio and have over a hundred hours in on it so far.That's more than worth my money to me. Plus, I'd have to boot back to Windows, so fuck that.

I'm probably going to have to break down and set up a Windows machine for a VR rig I want to build in a couple of months. It doesn't seem like any of the VR headsets support Linux particularly well, although I'll check again when I'm actually doing the build.

Comment Um... What Access Control? (Score 5, Insightful) 62

The developers are fairly up-front about this:

Redis is designed to be accessed by trusted clients inside trusted environments. This means that usually it is not a good idea to expose the Redis instance directly to the internet or, in general, to an environment where untrusted clients can directly access the Redis TCP port or UNIX socket. [ emphasis mine ]

There is an "authentication" feature, but it's amazingly primitive, and the credentials are sent in the clear -- in other words, next to useless. The rest of the page makes it fairly clear: If you are running a Redis server accepting connections from the open Internet, you are an idiot.

Slashdot Top Deals

This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian

Working...