|
Affected users complain that the icon indicate that there is no internet connection available, and Microsoft is at a loss to explain what is going on. It's the icon's fault
|
|
|
|
|
Maybe it was the old Lionel Hutz play: 'No-logging VPN? I meant, No! Logging VPN!' I'm sure there is a log some people would like to give them (repeatedly over the head and shoulders)
|
|
|
|
|
Much as in 2015, US surveillance practices and EU privacy law don't mesh well. Did the US fail a GDPR check?
|
|
|
|
|
GitHub announced that the code was successfully deposited in the Arctic Code Vault on July 8, 2020. "Do you know the Klingon proverb that tells us revenge is a dish that is best served cold?"
Dang, and I had one more pull request to complete and it would have been good-to-go.
|
|
|
|
|
Each line of code is more of a liability than an asset. Unless you succeed through scrolling
|
|
|
|
|
I've heard that if you remove all the features from your program your loc goes to 0, too. (Unless it is linked to Crystal Reports.) I bet that would make the author happy!
|
|
|
|
|
Lots of platitudes, which is about what one could expect from a writer who's been VP of This, That, and the Other Thing. Not that this makes the article useless, but it depends on who's reading.
He mentions pride of ownership as a problem, both in an unwillingness to refactor (ironically, usually caused by resistance from managers who don't care about technical debt) and NIH (a valid point). But he doesn't mention that pride of ownership, in the form of having "owners" who manage the evolution of software components, is known to be an important success factor.
|
|
|
|
|
On the contrary.
Th fwr th lns f cd, th bttr!
|
|
|
|
|
It never has been; it was a measurement of relative productivity. If your LOC hits 0 for a few days, something wrong. Might not even be the person your measuring, but the environment or the code base. Like looking at the temperature and drawing conclusions.
Still, LOC gives an indication of what is happening. But agreed, it doesn't measure success. Think the industry knows that already.
As for each line being a liability; if you build a car, then each part is a liability (proven by Tesla). You don't build a car without parts though. So it is a matter of building good parts, control their quality, and have someone looking at the end-result (which Tesla doesn't).
If you too afraid too build, it's because you lack experience and shouldn't be allowed near anything client-related.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Researchers in Germany uncover some unanticipated vulnerabilities Let's just rename it "Flash 2.0"
|
|
|
|
|
unanticipated must mean something else in Germany.
|
|
|
|
|
The JEDEC Solid State Technology Association said I'm a report issued Tuesday the new memory specifications will provide developers with twice the performance power and lower power consumption. "Now! I want it now! Give it to me now!"
|
|
|
|
|
Investigation will cover Alexa, Siri, and Google Assistant I guess they need a little extra cash to meet this quarter's budget?
|
|
|
|
|
Quote: And there’s a risk that big companies could misuse the data collected through such devices,” Is it still considered a risk if it is a certainty?
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
you beat me to it
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Hackers were able to hijack dozens of high-profile Twitter accounts on Wednesday after gaining access to internal user administration tools and systems. Why pick a lock when you can just get the master key from the locksmith?
|
|
|
|
|
Hey let's try to see the positive side...
In some of those accounts, "fake-posts" from the hackers could be an improvement in the usual bullsh1t bingo that the real owners say...
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
We are happy to announce that Visual Studio 2019 version 16.6 contains the first user-visible pieces of C++20 Ranges support. They have the deer in there, but the antelope aren't participating yet
|
|
|
|
|
WinUI 3 Preview 2 is a quality and stability-driven release with a focus on fixing bugs and known issues from the Preview 1 release. I'd put something funny here, but I'm still kind of a WinForms kind of guy
Still no go-live, but would you want to?
|
|
|
|
|
The scams appear to be part of a widespread hacking operation affecting multiple accounts {clears throat} "I said ha ha!" (and something about a petard)
Interesting that they didn't get "the mother load" account on Twitter.
|
|
|
|
|
Kent Sharkey wrote: Interesting that they didn't get "the mother load" account on Twitter.
Sometimes you just can't touch crazy!
|
|
|
|
|
Too good! Anyone who actually follows this bouquet of sphincters and shysters--Bezos, Gates, and Bloomberg were also included--is a prime candidate for getting suckered by yet another scam. The hacked accounts were well chosen.
|
|
|
|
|
IOW, it was an inside job.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Kano and Microsoft have come out with the Kano PC, designed to be fun, educational, usable, and last the test of time and accidents at home or in school. Never mind the kids, looks like a cute little project
|
|
|
|
|
A team of researchers working out of the King Abdullah University of Science and Technology (KAUST) have developed a two-way wireless data connection for use underwater. So the sharks can get their own danged Netflix password now
|
|
|
|