Otto Moore

Otto George Moore (born August 27, 1946) is a retired American professional basketball player.

Otto Moore
Personal information
Born (1946-08-27) August 27, 1946
Miami, Florida
NationalityAmerican
Listed height6 ft 11 in (2.11 m)
Listed weight205 lb (93 kg)
Career information
High schoolBooker T. Washington
(Miami, Florida)
CollegeTexas–Pan American (1964–1968)
NBA draft1968 / Round: 1 / Pick: 6th overall
Selected by the Detroit Pistons
Playing career1968–1980
PositionPower forward / Center
Number20, 34, 43,
Career history
19681971Detroit Pistons
1971–1972Phoenix Suns
19721973Houston Rockets
1973–1974Kansas City–Omaha Kings
1974Detroit Pistons
19741976New Orleans Jazz
1977–1978Virtus Banco di Roma
1978–1979Maine Lumberjacks
1979–1980Royal Tru-Orangemen
Career highlights and awards
Career NBA statistics
Points5,616 (8.2 ppg)
Rebounds5,575 (8.2 rpg)
Assists1,060 (1.6 apg)
Stats at Basketball-Reference.com

A 6'11" center from the University of Texas-Pan American, Moore played nine seasons (1968–1977) in the National Basketball Association as a member of the Detroit Pistons, Phoenix Suns, Houston Rockets, Kansas City–Omaha Kings, and New Orleans Jazz. He averaged a double-double twice in his career, once with the Pistons (11.9 points and 11.1 rebounds per game in 1969-70), and once for the Rockets (11.7 points and 10.6 rebounds per game in 1972-73). Across his entire career, he averaged 8.2 points and 8.2 rebounds per game. He also ranked eighth in the league in blocks per game (1.7) during the 1975–76 NBA season with the Jazz.[1]

Notes


gollark: I have no idea about that specific API, I'll check.
gollark: Modern password hashing functions are designed to be slow to run (and to be fastest on general-purpose computing hardware and not ASICs) to mitigate this sort of thing.
gollark: If you do *not* use that, then people can store a bunch of precalculated mappings from hashes to original passwords (rainbow tables, yes) and work out the original.
gollark: That's why salts are recommended (they're a bit of extra data you store along with the password and feed to the hash function when hashing it in the first place and comparing passwords with the hash).
gollark: The main attack on this is that you can, sometimes even using dedicated ASICs/FPGAs, run hashes *very fast* on a lot of possibilities and figure out what the original password was.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.