Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Science

Making Magnetic Monopoles and Other Physics Exotica 104

PhysicsDavid writes "Physicists have been searching for magnetic monopoles pretty much since they knew about magnetism and definitely since Maxwell unified electricity and magnetism. Now some researchers have shown that using some weird mirror materials will allow them to create something indistinguishable from a monopole in a lab experiment. A paper about it was published today in the journal Science as an advance online publication (abstract; full article available only to AAAS members). The technique looks like it could be used to create analog systems of other kinds of exotic particles that haven't yet been observed, such as axions. The theorists who proposed this are working with experimenters to try to create these systems and study them in depth this year."
Security

An FBI Agent's 3 Years Undercover With Identity Thieves 196

snydeq writes "InfoWorld offers the inside story of how FBI Supervisory Special Agent J. Keith Mularski, aka Master Splynter, penetrated and took over DarkMarket.ws, the infamous underground carding board hacked by Max Butler and later transformed by Mularski into an FBI sting operation. The three-year tour sent Mularski deeper into the world of online computer fraud than any FBI agent before, resulting in 59 arrests and preventing an estimated $70 million in bank fraud before the FBI pulled the plug on the operation in October."

Comment Re:And thus begans the eternal debate (Score 1) 1656

> The wording of this amendment is intentionally vague. If it was overly strict, the constitution would quickly become irrelevant as the times changed.

Ye gods man! Have you never heard of contract law?

The Constitution is a contract between the people of the US and the Federal Government. It was intentionally written so that the common man could understand it. Indeed, many of the phrases, such as "general welfare", were well accepted and understood common-law phrases. If every contract you signed could be interpreted "according to the times", how is it that any contract could be enforced?

The US Constitution includes within it the mechanism whereby it may be altered -- it's called amendments. Amendments are supposed to be difficult to pass because they affect the whole country as opposed to some portion thereof. Just because it is hard to modify the Constitution, though, does not mean that it should simply be reinterpreted to suit ones needs. THAT is tyranny.

Comment Re:Time for vector processing again (Score 2, Insightful) 251

Faster computation doesn't help communication-limited tasks. Faster communication doesn't help computation-limited tasks.

Computation is communication. It's communication between the CPU and memory.

The problem with multicore is that, as you add more cores, the increased bus contention causes the cores to stall making so they cannot compute. This is why many real supercomputers have memory local to each CPU. Cache memory can help, but just adding more cache per core yields diminishing returns. SMP will only get you so far in the supercomputer world. You have to go NUMA for performance, which means custom code and algorithms.

Programming

Submission + - Components, Builds and Configuration Management

command.com writes: I've recently been placed in charge of configuration management for a modest programming team in a Fortune 500. As a software engineer, I've used version control software before, but I've never had to do it for 100 projects. The repository contains multiple products managed by different development teams on independent release schedules, and some products used shared components (DLLs). The current repository is a mess — you basically have to check out everything in order to build some products because there's no telling what dependencies it's pulled in — and it needs to get reorganized to allow us to achieve CMMI compliance. Best practices on managing repositories of this size and complexity are hard to come by, so I'm looking for some some real world experience on how other people have tackled this problem. How did you organize project folders (e.g. src, bin, include directories per project)? How was the nightly build affected by shared components? How did you track and manage dependencies? If you had to make deployment packages (MSI), how did you manage the shared components?

Bad Password Allowed Swedish Watergate 248

fredr1k writes "The Swedish Watergate reported earlier this week was possible because of the usage of terrible weak passwords (Swedish) and a not functional IT policy. The Swedish newspaper Göterborgs-Posten reports the source of the password was a partymember who's account was "sigge" with password "sigge" and was "stolen" in march this year. Seasoned Slashdot readers would call it "a-not-so-hard-to-crack-password". "

Slashdot Top Deals

I have hardly ever known a mathematician who was capable of reasoning. -- Plato

Working...