Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Education

NSF Wants To Know How Much Software Really Costs 181

eldavojohn writes "It's no secret that the actual cost of software is very complicated. Sure, the companies that write software are spending money on it, but when that software is released, it doesn't stop costing money. You can probably think of a number of relatively tiny things that add up — especially if you're a system administrator — like the man-hours spent patching software to avoid a nasty infection spreading quickly. The bigger debt is that old piece of software you paid a bunch of money for back in 1998 that you're critically dependent on, but it has no support and hasn't been updated in years due to any number of reasons. Well, the National Science Foundation paid Gartner almost half a million dollars to find out what it truly costs to bring an organization to a fully supported environment. According to Gartner, this hidden liability or 'IT debt' is at $500 billion worldwide right now, and in five years it will be at $1 trillion. Along similar lines, a company called Cast that makes software quality tools reported that your average business application comes with a million in IT debt (PDF). And if that's not misapplied enough for you, they estimate that the debt is $2.82 per line of code in the application and also that it's on average higher in the government sector."
Security

Submission + - 1978 Cryptosystem Resists Quantum Attack (technologyreview.com) 1

KentuckyFC writes: In 1978, the CalTech mathematician Robert McEliece developed a cryptosystem based on the (then) new idea of using asymmetric mathematical functions to create different keys for encrypting and decrypting information. The security of these systems relies on mathematical steps that are easy to make in one direction but hard to do in the other. The most famous example is multiplication. It is easy to multiply two numbers together to get a third but hard to start with the third number and work out which two generated it, a process called factorisation. Today, popular encryption systems such as the RSA algorithm use exactly this idea. But in 1994, the mathematician Peter Shor dreamt up a quantum algorithm that could factorise much faster than any classical counterpart and so can break these codes. As soon as the first decent-sized quantum computer is switched on, these codes will become breakable. Since then, cryptographers have been hunting for encryption systems that will be safe in the post quantum world. Now a group of mathematicians have shown that the McEliece encryption system is safe against attack by Shor's algorithm and all other known quantum algorithms. That's because it does not depend on factorisation but gets its security from another asymmetric conundrum known as the hidden subgroup problem which they show is immune to all known quantum attacks (although the work says nothing about its safety against new quantum (or classical) attacks).
Ubuntu

Submission + - Gestures with multitouch in Ubuntu 10.10 (markshuttleworth.com)

jitendraharlalka writes: "Mark Shuttleworth recently announced on his blog that the first cut of Canonical's UTouch framework is ready and will be available in Ubuntu Maverick. He goes on to reveal about the development of "touch language" by the design team. The "touch language" will allow the chaining of basic gestures to create complex gestures. The approach is quite different from the single magic gestures implemented elsewhere. In Maverick, a few Gtk applications will support gesture-based scrolling."
Open Source

Submission + - Mark Shuttleworth Announces UTouch Framework - Lin (linuxpromagazine.com)

An anonymous reader writes: Canonical found Mark Shuttleworth today announced the UTouch gesture suite that will make its first appearance in the 10.10.10 build of Ubuntu. The code is published under GPLv3 and LGPLv3.

"There's no reason why anyone else can't ship them as well," Shuttleworth said. "There's nothing in there proprietary to Canonical," he added.

Shuttleworth explained that UTouch goes beyond standard touch frameworks by allowing users to chain a series of gestures into a sophisticated series of commands known as "gesture sentences."

Comment I am suprised (Score 1) 548

that noone has posted this yet: https://launchpad.net/ubuntu/+archive/partner/+files/canonical-census_0.1.tar.gz
It is a simple bash script with the following comments:

#!/bin/bash
# Send an "I am alive" ping to Canonical. This is used for surveying how many
# original OEM installs are still existing on real machines. Note that this
# does not send any user specific data; it only transmits the operating system
# version (/var/lib/ubuntu_dist_channel), the machine product name, and a
# counter how many pings were sent.
#
# (C) 2010 Canonical Ltd.
# License: GPL v2 or later

simply unpack the tar.gz file and see for yourself what info it is transmitting. IMHO the whole thing i harmless.

Comment bootloader checksum (Score 4, Insightful) 376

If you are the kind of person that are in the danger zone of this happening (not that you would leave a computer with such sensitive information in your hotel room.); You would probably feel a lot better if you were able to checksum the bootloader when returning, maybe from an external usb drive. This would offcourse run it's own OS, not being done from the bootloader(for obvious reasons).

Comment ncat (Score 3, Interesting) 73

i was just about to check out ncat. Seems interesting. The only downside is that is can never reach the same critical mass as the vanilla nc, and hence you cannot rely on the more advanced functions on an unknown computer. would be cool though, SSL could be handy in some situations.

Comment Interesting (Score 1) 67

This is actually quite interesting. With China putting a lot of prestige in being "better than the west", they may actually be able to pull of something good with this one (and hopefully, later missions). There is nothing like a bit of competition to get the party started. Their Changâ(TM)e 1 probe was a sucess, so why not this one ? they have at least proved themselves capable of space exploration, and the more space exploration, the better!

Comment Norwegian oil model (Score 5, Informative) 291

They could consider following the same model the Norwegian government used when oil was discovered in the sea outside Norway; create a lithium fund managed by the government, paid by taxes and exploration fees from the companies wanting to mine the lithium. http://en.wikipedia.org/wiki/Norwegian_Oil_Fund. It worked for Norway, it might work for Bolivia too.

Slashdot Top Deals

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...