Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Not significant - ignore (Score 5, Insightful) 247

I wouldn't call that study publish worthy.

It certainly isn't statistically significant. 4,500 lines of C# code is nothing. I work with systems that have millions of lines of code. I've seen single class files that have thousands of lines of code (and vomited when I saw it). An important question here would be whether the volume of code in a system is a significant factor in the value of refactoring.

Based on their own statistics the refactoring was poorly done. Their result was more code, more complexity, and more coupling. Certainly not the work I would expect from an experienced software developer, but certainly something I would expect to see from undergraduate students who don't fully understand what they are doing.

I think the last sentence in the actual study sums it up pretty well - "Furthermore, it would be better that the same
experimental setup can be executed in industry environment with the industry experts and with
the industry level matured source code."

Comment Missing a few requirements (Score 1) 146

The article focuses on the technical aspects: can it be done. Yes, I'm sure it can be done. But that wouldn't suddenly turn air travel into rail travel.

Think on the differences here for a bit. Air travel security is very tight because of the security risks. As much as some may call it security theater, there are real risks with getting that many people together on an airplane loaded with fuel which can go anywhere. This proposal does nothing to mitigate those security issues, so none of those security precautions common in airports would likely change.

Comment Security Compromised... (Score 1) 45

"There should be easy practices for anyone to open up an otherwise-closed Wi-Fi access point if it's still connected to broadband and is near people in trouble"

That sounds like an open invitation for every hacker in the world to open up any Wi-Fi access point. How can you guarantee that such a capability wouldn't be abused?

Comment Conjecture (Score 1) 114

The conclusion is pure conjecture. There is no time dimension in their analysis. This shows that people who saw Facebook pictures of friends who voted are slightly more likely to admit that they also voted. To prove that the Facebook pictures actually influenced whether people voted the study would have to know the time people saw the Facebook message AND the time they voted to know whether the person voted before or after seeing the message. They couldn't have gotten that information from voting rolls.

Interpreting the results leaves no clear causal conclusions. It just opens the door for more studies to find more information.

Comment Re:Simply put (Score 1) 528

Wait, so you are talking adding something so that I need to think about how I want to organize the applications I have open? How would that be improving my productivity? Things improve my productivity if they reduce or eliminate the amount of thought or effort I have to put into a task. I'm not sure I see how this would do that any better than the Winblows Taskbar.

Slashdot Top Deals

Sendmail may be safely run set-user-id to root. -- Eric Allman, "Sendmail Installation Guide"