Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Perl

Higher-Order Perl Available For Free Download 68

Christopher Cashell writes "As noted on Perlbuzz, Mark Jason Dominus's amazing book, Higher-Order Perl, is now available for free download. This is a great book that goes way beyond your normal programming reference. This will change the way you look at programs, and make you a better programmer in any language. It sits on that special shelf reserved for books like Structure and Interpretation of Computer Programs, The C Programming Language, and The Practice of Programming."
Censorship

Aussie Censorship "Live Trials" Won't Be Live 148

Xiroth writes "In what could be the first step to backing down on the plans to censor the Australian Internet, Communication Minister Stephen Conroy has made it known that the live trials of the Government filter will not, in fact, be live, instead being downgraded to a closed network test. Given that this would provide no further information than what Government tests have already provided, this may prove to be a face-saving measure before the plan is quietly scrapped. Nonetheless, concerned Australians are encouraged to attend protests planned for this weekend to ensure that the Government gets the message."
Education

Bjarne Stroustrup On Educating Software Developers 538

jammag writes "Bjarne Stroustrup, creator of C++ and a professor at Texas A&M, weighs in on the problems in today's CS programs. In particular, Java (there's too much of it), the quality of graduates (companies aren't happy), and the need to balance the theoretical and the practical (long overdue). Not pulling punches, Stroustrup even talks about high schools — 'High schools could teach students to work hard at something (just about anything), to search out information as needed, and learn to express their ideas in writing and orally.' He finishes by giving advice to working developers: 'Serious programming is a team sport, brush up on your social skills. The sloppy fat geek computer genius semi-buried in a pile of pizza boxes and cola cans is a mythical creature, best buried deep, never to be seen again.'" Read on for more choice quotes from the quotable professor.
Censorship

IWF Backs Down On Wiki Censorship 226

jonbryce writes "The Internet Watch Foundation, guardians of the Great Firewall of Britain, have stopped censoring Wikipedia for hosting what they considered to be a child porn image. They had previously threatened to block Amazon for hosting the same image." Here is the IWF's statement, which credits the Streisand Effect for opening their eyes: "...in light of the length of time the image has existed and its wide availability, the decision has been taken to remove this webpage from our list. Any further reported instances of this image which are hosted abroad, will not be added to the list. ... IWF's overriding objective is to minimize the availability of indecent images of children on the internet, however, on this occasion our efforts have had the opposite effect."
Censorship

Student Faces Suspension For Spamming Profs 516

edmicman sends word of a Fox News report about a Michigan State University student who is facing suspension for bulk emailing a number of professors at the university about a proposed change to the school calendar — an e-mail that the university is labeling spam. The article contains links to a copy of the original email, the allegations against the student, and the university's Email Acceptable Use Policy. The student, Kara Spencer, asked a Philadelphia rights organization, FIRE, to get involved. The article quotes the FIRE defense program director: "The fact that MSU is considering punishment of Spencer simply for exercising her right to contact selected faculty members by e-mail shows a disturbing disregard for students' freedom of expression. ... Threatening a member of the student government with suspension for sending relevant, timely e-mails to faculty members is outrageous." Spencer is awaiting the school's judgement after a hearing, and vows to take to the courts if suspended.
Software

Google Native Client Puts x86 On the Web 367

t3rmin4t0r writes "Google has announced its Google native client, which enables x86 native code to be run securely inside a browser. With Java applets already dead and buried, this could mean the end of the new war between browsers and the various JavaScript engines (V8, Squirrelfish, Tracemonkey). The only question remains whether it can be secured (ala ActiveX) and whether the advantages carry over onto non-x86 platforms. The package is available for download from its Google code site. Hopefully, I can finally write my web apps in asm." Note: the Google code page description points out that this is not ready for production use: "We've released this project at an early, research stage to get feedback from the security and broader open-source communities." Reader eldavojohn links to a technical paper linked from that Google code page [PDF] titled "Native Client: A Sandbox for Portable, Untrusted x86 Native Code," and suggests this in-browser Quake demo, which requires the Native Code plug-in.
Businesses

Freelance Web Developer Best Practices? 438

SirLurksAlot writes "My last employer had to make a series of budget cuts, and I was laid off. I have been on the job hunt since then; however in the meantime I have begun freelancing as a Web developer. This is my first time in this role and so I would like the ask the Slashdot community: are there any best practices for freelance developers? What kind of process should I use when dealing with clients? Should I bill by the hour or provide a fixed quote on a per-project basis? What kind of assurances should I get from the client before I begin work? What is the best way to create accurate time estimates? I'm also wondering if there are any good open source tools for freelancers, such as for time-tracking and invoice creation (aside from simply using a spreadsheet). Any suggestions or insights would be welcome."
Input Devices

Logitech Makes 1 Billionth Mouse 456

Smivs writes "Logitech has hailed as a major landmark the production of their one billionth computer mouse. The news comes at a time when analysts claim the days of the mouse are numbered. 'It's rare in human history that a billionth of anything has been shipped by one company,' said Logitech's general manager Rory Dooley. 'Look at any other industry and it has never happened. This is a significant milestone.' The computer mouse will achieve a milestone of its own next week when it turns 40. It was 9 December 1968 when Douglas C. Engelbart and his group of researchers at Stanford University put the first mouse through its paces."
Linux Business

"FOSS Business Model Broken" — Former OSDL CEO 412

liraz writes "Stuart Cohen, former CEO of Open Source Development Labs, has written an op-ed on BusinessWeek claiming that the traditional open source business model, which relies solely on support and service revenue streams, is failing to meet the expectations of investors. He discusses the 'great paradox' of the FOSS business model, saying: 'For anyone who hasn't been paying attention to the software industry lately, I have some bad news. The open source business model is broken. Open source code is generally great code, not requiring much support. So open source companies that rely on support and service alone are not long for this world.' Cohen goes on to outline the beginnings of a business model that can work for FOSS going forward."
Security

Significant Russian Attack On US Military Networks 270

killmofasta notes an LA Times story on a severe and widespread attack on US military computers that may have originated in Russia. Turns out the military's recent ban on flash drives was a precursor to this attack, which was significant enough that the President and the Defense Secretary were briefed on it. "The 'malware' strike, thought to be from inside Russia, hit combat zone computers and the US Central Command overseeing Iraq and Afghanistan. The attack underscores concerns about computer warfare. 'This one was significant; this one got our attention,' said one defense official, speaking on condition of anonymity when discussing internal assessments. Although officials are withholding many details, the attack underscores the increasing danger and potential significance of computer warfare, which defense experts say could one day be used by combatants to undermine even a militarily superior adversary. ... [A defense official said] 'We have taken a number of corrective measures, but I would be overstating it if I said we were through this.'"
Security

Estonian ISP Shuts Srizbi Back Down, For Now 237

wiedzmin writes "In response to the recent resurrection of the Srizbi botnet, an Estonian ISP has shut down the hosting company that was housing its new control servers. Starline Web Services, based in Estonia's capital Tallinn, had become the new home for the Srizbi botnet control center after the McColo hosting company (which was taken down earlier this month) has briefly come back to life last week, allowing the botnet to hand-off control to the Estonian network. After Estonia's biggest ISP Linxtelecom demanded that Starline Web Service be taken offline, the newly acquired Srizbi control servers went down with it. However, as the rootkit is armed with an algorithm that periodically generates new domain names where the malware then looks for new instructions, it is only a matter of time before a new set of control servers is created and used to manipulate one of the biggest spam botnets in the world."
Patents

IBM's But-I-Only-Got-The-Soup Patent 267

theodp writes "In an Onion-worthy move, the USPTO has decided that IBM inventors deserve a patent for splitting a restaurant bill. Ending an 8+ year battle with the USPTO, self-anointed patent system savior IBM got a less-than-impressed USPTO Examiner's final rejection overruled in June and snagged US Patent No. 7,457,767 Tuesday for its Pay at the Table System. From the patent: 'Though US Pat. No. 5,933,812 to Meyer, et al. discussed previously provides for an entire table of patrons to pay the total bill using a credit card, including the gratuity, it does not provide an ability for the check to be split among the various patrons, and for those individual patrons to then pay their desired portion of the bill. This deficiency is addressed by the present invention.'"
Robotics

Ethical Killing Machines 785

ubermiester writes "The New York Times reports on research to develop autonomous battlefield robots that would 'behave more ethically in the battlefield than humans.' The researchers claim that these real-life terminators 'can be designed without an instinct for self-preservation and, as a result, no tendency to lash out in fear. They can be built without anger or recklessness ... and they can be made invulnerable to ... "scenario fulfillment," which causes people to absorb new information more easily if it agrees with their pre-existing ideas.' Based on a recent report stating that 'fewer than half of soldiers and marines serving in Iraq said that noncombatants should be treated with dignity and respect, and 17 percent said all civilians should be treated as insurgents,' this might not be all that dumb an idea."

Slashdot Top Deals

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...