Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

/prog/ writes a program [phase 1]

Name: Anonymous 2011-01-20 22:10

to keep this thing rolling we'll use the WATERFALL MODEL
and make a new thread for each phase.

the first step is formulating the requirements as a set of USE 
CASES that describe all the interactions the users will have
with the software.

Name: Anonymous 2011-01-20 22:11

In addition to use cases, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints).

Name: Anonymous 2011-01-20 22:14

In addition to use cases, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). In addition to design constraints, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). In addition to design constraints, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). In addition to design constraints, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). In addition to design constraints, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). In addition to design constraints, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). In addition to design constraints, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). In addition to design constraints, the SRS also contains non-functional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints).

Name: Anonymous 2011-01-20 22:29

USE CASE
Shave my anus hairs in the most excruciatingly painful way possible.

Name: Anonymous 2011-01-20 22:48

>>4
Java.

Name: Anonymous 2011-01-21 0:01

Fuck you and your waterfall {b.i.o.u industry best practices}.

Name: Anonymous 2011-01-21 7:57

right, perhaps i should put more consideration in late night
posts, as i forgot to write down what the program is all about.

what we're going to write is a strongly anonymous distributed
chan and yes i'm 100% serious about this.  i am going to write
this anyways since i can and i want to program something which
could have merit.

some terminology: a 'server' here means a single server that is
running behind a tor hidden service, the 'serverid' is the
hostname of that service (3g2upl4pq6kufc4m.onion). a
'network' means a collection of servers working together by
mirroring each other's posts.

I'll start with some requirements:

* anyone should be able to run a server and configure it to
mirror posts from other servers.

* it should be mathematically impossible for anyone to trace
the identity of a participant (user, server operator).

* the protocol itself should be simple enough that a simple
server can be implemented be the average /prog/rider in a few
hours.

Name: Anonymous 2011-01-21 10:25

>>7
I recommend studying your keyboard attentively, perhaps you'll notice the shift key.

Name: Anonymous 2011-01-21 10:27

>>7
We already have the GJS protocol, and Alex said he'd write a proxy for it but disappeared into nothingness.

Name: Anonymous 2011-01-21 15:41

<--- check 'em motherbitch!

Name: Anonymous 2011-01-21 16:02

Name: Anonymous 2011-01-21 16:25

*** Exception: stack overflow

Name: Anonymous 2011-01-21 17:06

>>9
Why have you named him Alex??

Name: Anonymous 2011-01-21 17:26

>>13
Oops. He won't be happy about my leaking of his name on /prague/

Name: Anonymous 2011-01-21 18:29

>>14
Who are you on #sicp!

Name: Anonymous 2011-01-21 19:01

#sicp is dead.

Don't change these.
Name: Email:
Entire Thread Thread List