Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

An Algorithm to End the Lines for Ice at Burning Man

ttucker CS Perspective on Improvements. (326 comments)

The bag on the counter technique provides a time complexity improvement on the scale of O(1)... probably safe to ignore. Forcing people to complete the transactions faster is probably not practical, so the only way to increase throughput is to have more cashier stations.

yesterday
top

PETA Is Not Happy That Google Used a Camel To Get a Desert "StreetView"

ttucker The real news (367 comments)

The real news will be when PETA likes something.

about a week ago
top

The Greatest Keyboard Ever Made

ttucker They are still being made, by Unicomp (304 comments)

I am using a brand new Model M to type this message. Unicomp bought the rights and machinery to manufacture many IBM and Lexmark keyboards. You can buy them from the manufacturer here: http://www.pckeyboard.com/ . It is embarrassing that /. would advertise some shill refurb site without mentioning this great resource.

about two weeks ago
top

Vax, PDP/11, HP3000 and Others Live On In the Cloud

ttucker Re: This shit is why managers think the cloud work (62 comments)

Sharepoint runs on PDP-11s? VAX? Alpha?

Microsoft Sharepoint first came out in 2001. I think if it ran on NT at the time it could run on an Alpha, but why would any company want to have an run MS Sharepoint on unsupported architecture today? It is not that difficult to transfer the MS Sharepoint infrastructure to current X86 architecture. Of course maintaining a Sharepoint structure or even a Wiki is a totally different thing.

Whoooosh....

about two weeks ago
top

Ask Slashdot: Swift Or Objective-C As New iOS Developer's 1st Language?

ttucker Re:Obj-C (316 comments)

You just quoted 106 characters to accomplish the following simple task:

print "Hello, World\n";

That's 23 characters to accomplish the same task, but the core issue isn't even really the character count alone. It's the verbosity combined with the requirement that an object be explicitly constructed to perform something that is a fundamentally procedural task.

So all of Java is garbage, because it is not enough like a scripting language?

You liking Python better is not a good enough reason for Java to be dismissed as trash, and it hardly justifies claiming it is worse than C++, of all the verbose garbage languages.

Try Groovy.

about three weeks ago
top

Ask Slashdot: Swift Or Objective-C As New iOS Developer's 1st Language?

ttucker Re:Obj-C (316 comments)

public class HelloWorld { public static void main(String[] args) { System.out.println("Hello, World"); } }

So what? It is bad for writing three line programs?

about three weeks ago
top

Ask Slashdot: Swift Or Objective-C As New iOS Developer's 1st Language?

ttucker Re:Obj-C (316 comments)

and I definitely prefer all of these languages to Java.

Probably safe to ignore everything else he said too...

about three weeks ago
top

Ask Slashdot: Linux-Friendly Desktop x86 Motherboard Manufacturers?

ttucker Re:Convenient? For whom? (294 comments)

My system boots considerably faster with UEFI...

about a month and a half ago
top

Why Women Have No Time For Wikipedia

ttucker Re:Women interested in inane social bullshit. (579 comments)

Women more interested in inane social bullshit than actually learning about world history, politics, technology, industry, the arts and sciences?

Color me shocked!

More like, women more interested in using sites with good interfaces and less assholes?!? Go back to Wikipedia dickhead.

about 2 months ago
top

Ask Slashdot: Why Are Online Job Applications So Badly Designed?

ttucker Re:HR? What HR? (278 comments)

How much MORE valuable is YOUR time, to THEIRS?

They want the job, so in this case sehryan's time is immeasurably more important in the relationship. Perhaps when the economy changes, and there are less applicants than positions, things will need to change.

about 2 months ago
top

Ask Slashdot: Why Are Online Job Applications So Badly Designed?

ttucker They are a test. (278 comments)

If you can not put up with a BS online job application from Target, how could you ever possibly work for Target?!? Supposedly the best way to get hired, is to answer all of the questions as if you were Ned Flanders. Hard working and honest, but not too ambitious, compliant.

about 2 months ago
top

Ask Slashdot: "Real" Computer Scientists vs. Modern Curriculum?

ttucker Standard Elitist C Bullshit (637 comments)

CS students who primarily learn Java are inferior because they don't have to deal with memory management as they would if they used C.

This is snobbery at its best. Pay attention in computer architecture class, you will be fine.

about 2 months ago
top

Ask Slashdot: When Is It Better To Modify the ERP vs. Interfacing It?

ttucker Re:who not whom. (209 comments)

I care. Language cries when you abuse it like that. It makes me sad. Think of the small words!

Criticizing grammar is a favorite pastime of the uninspired, unintelligent, or generally vapid mind. Teach an English class, or stfu.

about 3 months ago
top

Ask Slashdot: When Is It Better To Modify the ERP vs. Interfacing It?

ttucker Re:who not whom. (209 comments)

Submitter should use smaller words. He's trying to swim in the deep end ("whom", "wrought") when he's barely ready for the kiddy pool.

Amazingly, even in light of this new information, nobody cares. Nobody even cares that you are an asshole. Nobody cares. Just, go back to your basement.

about 3 months ago
top

Critroni Crypto Ransomware Seen Using Tor for Command and Control

ttucker Re: Angler PC malware? (122 comments)

No need. I have this newfangled feature called "sources.list."

That file barely tells you where the repositories are. The main question still remains, where did the programs actually come from, who compiled them, and why do you trust any of the parties involved?

I trust the Ubuntu repositories much more than any app store, but the principle is similar... they could conceivably contain malicious code.

about 3 months ago
top

Critroni Crypto Ransomware Seen Using Tor for Command and Control

ttucker Re:Angler PC malware? (122 comments)

Even a Java plugin exploit requires some level of social engineering to convince the user to visit the attack page.

about 3 months ago
top

Critroni Crypto Ransomware Seen Using Tor for Command and Control

ttucker Re:Misconception (122 comments)

I think XP users are in trouble too, and there is not much to save them.

about 3 months ago
top

Critroni Crypto Ransomware Seen Using Tor for Command and Control

ttucker Re:Angler PC malware? (122 comments)

Have you ever actually asked where the software in repositories comes from?

about 3 months ago
top

Critroni Crypto Ransomware Seen Using Tor for Command and Control

ttucker Re:Angler PC malware? (122 comments)

Well unless you have configured your *nix box to automatically privilege and run windows executables somehow, using a real OS is probably sufficient to stop this attack.

You are trying to say that users needing to type chmod +x ./latest_flash_player_youtube.sh , is sufficient protection to prevent end users from running things they shouldn't....

Ransomware is not prevalent in Linux, but again, it is absurdly naive to think that it couldn't, or that the OS is doing much to prevent it. Again, end user education is key, regardless of OS. Implying to under-informed users that OSX is magically secure against cryptoware, is a recipe for disaster.

about 3 months ago
top

Critroni Crypto Ransomware Seen Using Tor for Command and Control

ttucker Re:Angler PC malware? (122 comments)

How is it you manages to not once mention Microsoft Windows in that whole article? How does the Critroni ransomware get onto the victim’s PC in the first place?

Most of this shit is installed by tricking the user with phishing style emails and general social engineering to download attachments. Certainly zero day stuff is a goldmine for malware, but under-informed end users are much more consistently available. The stuff that cryto ransom software holds hostage is heavily concentrated in the user's home directory, so no privilege escalation is required. It is good to be proud of your operating system of choice, but it is smug to think that Linux/OSX/BSD/Solaris will do anything technical to protect from such an attack.

about 3 months ago

Submissions

ttucker hasn't submitted any stories.

Journals

ttucker has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?