Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Two Cents (Score 1) 573

Not sure why they're singling out JQuery but at least some of Javascript could stand to be reworked since here we are in 2014. There are weirdnesses like the Ajax onreadystate callback not blocking even if you put false in the XMLHttpRequest specifically saying block until you hear a callback. I could go on but you get the idea.

Comment My Take (Score 1) 876

Truth is that there is definitely an upside to having graphically driven development. That is if you know your program can be broken down into 55 reuseable components and you know the mapping between function and name (widget 103 links into the network widget 12 to form Voltron let's pretend) then you can save a ton of time and money by literally dragging and dropping. The problem as others rightly point out is that there are probably tens of thousands of widgets that could be created and then you'd have to memorize at least 200 to have any value. Where code can be pressed into hierarchy and reusability it usually has been done so; so whether it's graphical or text based you'll still have the implementation methods to complete which may not be trivial. Google code reusability movements really because that's a significant part of graphical drag and drop programming.

Comment My two cents (Score 1) 157

RSA is the thing we should be worried about; primarily since it's used so widely. The math behind quick factorization is probably already known, add in quantum computing and you'd need like 2^1024 bit keys for RSA to make sense. So that leaves really symmetric encryption systems (don't know enough about the curve based stuff) and those are typically based on shifting, XORing with key and repeating. With respect to the article I'm not at all sure that anything can be inferred from having ciphertext and plaintext for a given key without having a quick way to do set subtraction between the set of all possible keys and the keys that could feasibly produce the ciphertext given the plaintext. Even then the key length could be increased very easily so you'd need something like a linear time method to do the set subtraction. Then, you'd just keep doing set subtraction until you had a reasonable number of keys like 1,000,000 and then go the other way and just brute force future ciphertexts to see which ones spit out coherent plaintext. But really why not just work with OTPs, steganography, multiple layers of encryption or private encryption schemes?

Comment Linux fanboy? (Score 1) 774

After reading most of this guys article I just get the feeling he's a linux fanboy wanting to join the bandwagon of anti-MS ppl. There are viruses on linux. You can get hacked on the internet on linux. You can get rootkitted on linux. Yes, let me read a 100 page man file to figure out to use a command line argument bc its so much easier and intuitive than a Windows GUI analog. Has this guy heard of ghosting his images? WTF -- a total nub -- GAH! Ya I'll take my free MSDNAA copy of Windows for now. I've run OpenSuse 10.2 on my laptop so I do know that linux isn't THAT friendly.

Slashdot Top Deals

The unfacts, did we have them, are too imprecisely few to warrant our certitude.

Working...