Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Funny thing. (Score 1) 99

I think i did not. Back then i only bought used thinkpads, so i did not by that drive from a manufacturer - and probably these were made before 2003 (I anyway used mainly external USB-dvd drive). Next step (around 2008) was to buy laptops without optical drives embedded (i had an external one+did not see the need for installing OSses-1G USB drives worked fine for debian/ubuntu).

Comment Forgotten? Forbidden? (Score 1) 600

(Exclude recursion here - i think he talks about the examples given in school for recursion, which often are not good in terms of resource usage)

About the rest: Bullshit. These are not forgotten, and they are forbidden in most coding guidelines for a reason. His musing about that goto is only bad if you jump "backwards" is borderline funny.

There is a reason that goto should only be used in extremely rare occasions (and i would agree that some of these *may* be for kernel programming). The examples of this "programmer" are excellent examples why for people like him these should be forbidden. Any of his examples are better off without goto, and if you don't see a more efficient, clearer and safer solution without his shit, you should not program any high-level language.

Eval is another piece of cake (I exclude python here because it seems to get eval right). My practical experience is that i is rather overused by inexperienced programmers. Filtering a string that should be evaled in a way that it has a predictable outcome is as difficult as writing an eval. Typically my recommendation would be that evals need to be a) sanctioned by a senior developer (just to make sure nobody uses these out of pure incompetence) b) encapsulated in a function (e.g. for the dection of a laguange feature/level) c) filtered carefully if they accept user input.

Comment Security expert? (Score 1) 377

Wow. Some obviously clueless thief manages to log in into his computer without re-installation? Doesn't he use LUKS/Bitlocker?

My Laptops are encrypted. I dont plan to change that for the slim change of catching a hardware thief by installing a tracking SW, which requires the OS to boot up unencrypted.

Comment Why not? (Score 1) 161

i have a real workstation in the office, thanks.

I mean - i could imagine very limited use cases where you want to have something like a movable office which you may need to set at a customer site as soon as you arrive there.

But 17' is already big, and unless you have a table somehwere unfolding this thing is a no-go.

Comment Yes. statistics homework in school (Score 1) 313

Company optimizes for money earned - shocking! finding the optimum overcommitment of resources was a homework in statistics in our class.

It's simple:
* Probability distribution of people appearing for a given flight
* take cumulative probability distibution
* multiply earning per ticket sold with number of tickets
* multiply cost per over committed seat with remaining probability
* subtract these two values
* find minimum as function of commited seats

And let me ask a question: Would you accept a several % increase in ticket price for reducing the risk from a small chance (i was offered compensation for voluntarily giving up a booking once and never not boarded) to 0?

Comment Weird times (Score 1) 524

As somebody who actually uses ESC in the way it was defined on most GUIs from the 1990-2010, namely "stop this input without commiting the change", I find that sad.

However I came to recognize that the current UI designers seems to like "forwards" and "backwards" pre-defined sequences of things to endure by the user. And so they killed the meanding of the ESC Key in the same way as they already started to make UIs which do not use system/framework element just to look a little better (supposedly) and drop the meaning of the PGUP and PGDOWN key.

   

Comment Re:Forbid flatrates on DSL lines (Score 1) 351

Thats the good thing: I did not state that i would define malicious traffic. Then the use has to decide. He/She pays for everything. It's like a car - the gas station does not care if your car uses to much gas due to you driving fast, the car having a problem due to bad service, or the manufacturer lying to you. They bill you for what you use, and it is in your interest to make the best use of it.

If gas would be "free" (a flatrate), people would probably leave the car running 24/7 so that they don't have to wait a few minutes until the AC has cooled it down. They also would not care if that would be the solution proposed by the manufacturer.

Comment Re:Forbid flatrates on DSL lines (Score 1) 351

The Problem with VW is: They claimed something, whic hthe customers cared about, and they lied about it. As a matter of fact they actually advertised with being environmentally friendly. If the customers did not care about the enviroment it would be a different story.

On which IoT product have seen explicit traceable claims about Security standards on the package or in the advertisements? Have you seen somebody saying: Oh, this setup procedure is safer because I understand i have to type the number on both devices to pair, so i am happily doing that? Or was it more like: "Can you believe I had to press the button for 20 seconds to set it up, worsk so much better if the app just finds everything automatically, and it's cheaper, too"

I hope you get the difference.

Comment Forbid flatrates on DSL lines (Score 1) 351

As long as data transfer on DSL lines seems to be "free" to the user, the user will not care very much about the possibility that his device is used in a DDOS attack. I believe even the prospect of a minor additional charge (e.g. $10 per year) by malicious traffic for the end user would do much good for the willingness of the user to accept inconveniences which make the IoT devices more secure against arbitrary access.

Comment Not ignore. (Score 2) 361

Good Journalism always means:
* look at the source available to you
* decide which facts you can show by these
* decide which of these facts are of public interest
* summarize these facts
* decide which of your original sources you want to show along with the facts

Slashdot Top Deals

We are Microsoft. Unix is irrelevant. Openness is futile. Prepare to be assimilated.

Working...