Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment My top 4 (Score 5, Informative) 293

There are several very important books: 1. Effective Java - Joshua Bloch. This is by far the most important one. 2. Java, Concurrency in practice - Goetz 3. The art of multiprocessor programming - Herlihy and Shavit. This is much more theory oriented, but essential to become an excellent multithreaded programmer. 4. Java Puzzlers - Joshua Bloch and Neal Gafter. This is quite a fun book - lots of Java Conundrums Enjoy!

Comment Re:Summary is wrong; idea is worthless (Score 1) 88

How about all the other things that can be found in one's browser history, such as Google searches, or, say, one's own name on some websites, such as Facebook when viewing one's own profile?

I think you don't get it. The same-origin principle, enforced by all contemporary browsers, prevents sites from just querying the history. Thus, an arbitrary site is by no means able to just view the user's Google searches or Facebook profile from the browser's history, contrary to what you seem to suggest.

The problem is that it's very, very hard to truly enforce 100% of the same-origin principle. Some limited information might leak due to side channels. For example, an attacker can try to find out if the victim visited site X by attempting to retrieve X, timing how long it takes, and concluding whether or not X was retrieved from the browser's cache based on the response time; see, e.g., "timing attacks on web privacy" (which was BTW published 10 years ago). There are lots of other tricks unrelated to timing that an attacker can employ.

As far as I understand, the contribution of TFA is noticing that group membership information is nearly unique, per user, and (based on the aforesaid methods) suggesting practical ways to trick the browser into revealing this information.

Is this worthless?

Comment Re:Summary is wrong; idea is worthless (Score 1) 88

Not sure why you think it's worthless. Like you say, the paper shows that browser-history-stealing can be exploited in a new way, allowing any web site to uniquely identify those who actively participate in social networks. All people who fall under the latter category (presumably very many) are affected, and I imagine quite a few of them do not wish to be identified. So why is this worthless?

Comment Re:Do you have non anecdotal evidence? (Score 1) 907

and observe how, unfortunately, XP consistently outperforms Linux :(

I went through the first 10 entries which support both OS's and found 8 were exactly the same and two were longer under Windows XP. Is that what you call "Consistently outperforming"?

I take you know what they say about half truths. But just in case you're interested in the whole truth, then here it is:

Out of the 28 machines that are listed in http://event.asus.com/eeepc/comparison/eeepc_comparison.htm, there are exactly 22 that have both a Linux and XP configuration; the remaining 6 machines are either exclusively Linux, or exclusively XP, which means their battery life under the two OSes can't be compared.

From within the 22 machines that can be compared, 11 (=50%) have longer battery life under XP, and 11 have exactly the same battery life under both OSes.

So yes. This is what I call consistently outperforming.

Comment Article about the subject from Berkeley Law Prof (Score 3, Interesting) 144

Pamela Samuelson, a Professor at Berkeley (with a joint appointment in the School of Information and the School of Law) has written an interesting short article about the subject in the July 2009 issue of the Communication of the ACM, titled "Legally Speaking: The Dead Souls of the Google Booksearch Settlement". She argues that

In the short run, the Google Book Search settlement will unquestionably bring about greater access to books collected by major research libraries over the years. But it is very worrisome that this agreement, which was negotiated in secret by Google and a few lawyers working for the Authors Guild and AAP (who will, by the way, get up to $45.5 million in fees for their work on the settlement--more than all of the authors combined!), will create two complementary monopolies with exclusive rights over a research corpus of this magnitude. Monopolies are prone to engage in many abuses.

The Book Search agreement is not really a settlement of a dispute over whether scanning books to index them is fair use. It is a major restructuring of the book industry's future without meaningful government oversight. The market for digitized orphan books could be competitive, but will not be if this settlement is approved as is.

Comment Re:How about some nice menus instead? (Score 2, Informative) 617

It's disallowed by MS specifically for Office-like applications. (nothing else) I have always assumed that clause was added to gain a usability edge over OpenOffice. So this could be interesting. *grabs popcorn*

Here's what Wikipedia has to say about this "patent":

Mike Gunderloy, a former Microsoft developer left the company partially over his disagreement with the company's "sweeping land grab" including its attempt to patent the Ribbon interface. He refused to "contribut[e] to the eventual death of programming."[10] He states: "Microsoft itself represents a grave threat to the future of software development through its increasing inclination to stifle competition through legal shenanigans."[11] KDE developer Jarosaw Staniek[12] has expressed beliefs that the patent cannot be acquired due to the ambiguity of prior art.[12] As no patent has been acquired yet[update], they assert that anyone who has not signed the license can legally implement the concept in their applications without having to conform to Microsoft's requirements.[13] Microsoft will grant free licensing for all to implement the ribbon interface except for products competing directly with Microsoft Office programs.[14] If the design guidelines contain legal loopholes that give Microsoft a basis for future lawsuits against products exploiting this concept, those disenfranchised would not be able to inform others due to the non-disclosure agreement.[8]

KDE developer Jarosaw Staniek notes that the ribbon concept has historically appeared extensively as "tabbed toolbars" in applications such as Macromedia HomeSite, Dreamweaver and Borland Delphi.[12]

Data Storage

Submission + - Five years of PC storage performance compared

theraindog writes: PC storage has come a long way in the last few years. Perpendicular recording tech has fueled climbing capacities, 10k-RPM spindle speeds have migrated from SCSI to Serial ATA, Native Command Queuing has made mechanical drives smarter, and a burgeoning SSD market looks set to fundamentally change the industry. The Tech Report has taken a look back at the last four and a half years of PC storage solutions, probing the capacity and performance of a whopping 70 different notebook and desktop hard drives, SSDs, and exotic RAM disks. There's a lot of test data to digest, but the overall trends are easy to spot, potentially foretelling the future of PC storage.
Censorship

Submission + - Censordyne - net censoring gets toothpaste (smh.com.au)

An anonymous reader writes: Toothpaste is the latest weapon mobilised to fight against the Australian Federal Government's plan to censor the internet.

Online activist group GetUp, which has already run ads slamming the internet filtering policy, today launched a new campaign — Censordyne — a parody ad playing on the Sensodyne brand of toothpaste.

Censordyne promises to offer "unproven, ineffective relief from internet nasties", protection "against fast internet" and a "fresh multimillion-dollar flavour". There is also a video on YouTube that the government attempted to have taken down.

Software

Submission + - MyCyberTwin's AI Technology Put to the Test (davidchess.com) 2

paleshadows writes: In response to slashdot's report from yesterday regarding the recent AI achievements of MyCyberTwin dot com, long-time blogger David Chase of IBM-research decided to put the technology to the test. This rather amusing blog post attempts to verify the following not-less-than-amazing proclamations listed in the MyCyberTwin website:

  • "Make software clones of your staff. Free the humans for valuable work.
  • MyCyberTwin staff increase customer satisfaction, look after your customers, and improve sales.
  • CyberTwin staff are intelligent and always friendly. Every aspect of the conversations with your clients can be analyzed. You will have complete control over what they say, and you can train them to meet specific business objectives.
  • Best of all, CyberTwins are slave labour. They can talk to thousands of clients a second, 24 hours a day. They perform better than humans, for a much lower cost. They can live on your website in a chat environment, or talk out loud.
  • Up until now, clients were only able to talk to you by:
    1. Talking to a real human staff member, on the phone, in a store, or in live chat on your website.
    2. Self service. The client wandering around a website by themselves, or crawling through a rigid IVR system, trying to figure out what they want.

    CyberTwin virtual staff offer the quality of live human support, at a fraction of the cost."

After conversing with some clones, Chess concludes that while all of the above

"sounds pretty revolutionary, there's one problem, sadly, and that is that they are lying. And I don't mean "exaggerating a bit in the way that press releases and website often do", I mean "giving false information intentionally; conveying a false image or impression", to paraphrase Wiktionary."


Enlightenment

Submission + - 123456789 happens today 1

mcgrew writes: "The Chicago Tribune is pointing out that shortly after noon today, the time and date will be 12:34:56 7/8/9. The Trib points out that this happens only once or twice per century, although it actually happens twice on the day it happens in.

serious Cubs fans know the first night game at Wrigley Field was played on 8/8/88 — which just happens to be four sideways infinity symbols.

I imagine you can make any day "special" like this if you try hard enough."

Censorship

Submission + - The "Amazon Rank" Google-Bombing Campaign (smartbitchestrashybooks.com)

paleshadows writes: The girls that run the smartbitchestrashybooks blog were rather enraged by Amazon's new policy to cull "adult" books from their search system. They have therefore decided to retaliate by introducing the term "Amazon Rank" to the lexicon (as underscoring Amazon's shortminded censorship and inconsistent policing of what ought to be accessible to the book-buying public), and by requesting their readers to create a link to http://www.smartbitchestrashybooks.com/amazonrank with "Amazon Rank" as the anchor text, with the explicit goal of turning their definition of the term to be the top most ranking in search engines. (A practice known as Google bombing.) Remarkably, the campaign seems to indeed be successful: the new definition is currently number one in google results.

Example of usage: "I tried to do a report on Lady Chatterly's Lover for English Lit, but my teacher amazon ranked me and I got an F on grounds that it was obscene."

Alternate usage: "My girlfriend wanted to preserve her virginity, and I was happy to respect that, then she amazon ranked and decided anal sex was okay"

Slashdot Top Deals

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...