Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

German Health Insurance Card CA Loses Secret Key 174

Christiane writes "The SSL Root CA responsible for issuing the German digital health insurance card lost its secret private key during a test enrollment. After their Hardware Security Module (HSM) dutifully deleted its crypto keys during a power outage, it was all 'Oops, why is there no backup?' All issued cards must be replaced: 'Gematik spokesman Daniel Poeschkens poured scorn on the statement that Gematik had insisted on the service provider carrying out a test without backing up the root CA private keys. "We did not decide against a back-up service. The fact of the matter is that the service provider took over the running of the test system, so it also has to warrant its continuous operation. How it fulfills this obligation is its own responsibility."'"
Upgrades

BASH 4.0 Released 459

An anonymous reader writes "The widely used Bourne-Again Shell (BASH) version 4.0 is out. The new major release fixes several remaining bugs in the 3.x releases, and introduces a bunch of new features. The most notable new features are associative arrays, improvements to the programmable completion functionality, case-modifying word expansions, co-processes, support for the `**' special glob pattern, and additions to the shell syntax and redirections. The shell has been changed to be more rigorous about parsing commands inside command substitutions, fixing one piece of POSIX non-compliance. Most of us will probably wait for the distros to test the new version and upgrade gradually, but you always have the option of grabbing the source and compiling it yourself. Enjoy."
Government

Cuba Launches Own Linux Variation 494

willclem writes "According to Reuters, it seems that Cuba has launched its own variation of Linux in order to fulfill its government's desire to replace Microsoft operating systems. 'Getting greater control over the informatic process is an important issue,' said Communications Minister Ramiro Valdes, who heads a commission pushing Cuba's migration to free software."
Sci-Fi

Please No, Not a Blade Runner Sequel 585

bowman9991 submitted a story that ought to make even the most stone-hearted amongst you cry. He says "Travis Wright, one of the writers behind Eagle Eye, has been working on a sequel to Ridley Scott's Sci-Fi classic Blade Runner. Script proposals have explored the nature of the off-world colonies, what happens to the Tyrell Corporation in the wake of its founder's death, and what would become of Rachel. Travis said he intends to write a script 'with or without anyone's blessings.' Director Ridley Scott appears interested in a sequel too. At Comic-Con in 2007 Ridley said, 'If you have any scripts, you know where to send them.' It's doubtful he'll have time anytime soon though. He's already stated his next two science fiction films will be an adaptation of Aldous Huxley's Brave New Word with Leonardo DiCaprio and an adaptation of Joe Haldeman's The Forever War."
Education

Best Paradigm For a First Programming Course? 592

Keyper7 writes "The first programming course I had during my computer science schooling, aptly named 'Introduction to Programming,' was given in C because its emphasis was on imperative programming. A little before I graduated, though, it was decided that the focus would change to object-oriented programming with Java. (I must emphasize that the change was not made because of any hype about Java or to dumb down the course; back then and still, it's presented by good Java programmers who try to teach good practices and do not encourage excessive reliance on libraries.) But the practices taught are not paradigm-independent, and this sparked a discussion that continues to this day: which paradigm is most appropriate to introduce programming? Besides imperative and object-oriented, I know teachers who firmly believe that functional programming is the best choice. I'm interested in language-independent opinions that Slashdotters might have on this matter. Which paradigm is good to introduce programming while keeping a freshman's mind free enough for him/her to learn other paradigms afterwards?"
Games

The Importance of Procedural Content Generation In Games 160

Gamasutra reports on a talk by Far Cry 2 developer Dominic Guay in which he discussed why procedural content generation is becoming more and more important as games get bigger and more complex. He also talks about some of the related difficulties, such as the amount of work required for the tools and the times when it's hard to retain control of the art direction. Quoting: "Initially, the team created a procedural sky rendering approach based on algorithms — which led to a totally unconvincing skybox that was clearly inferior to what a hand-authored skybox would be. 'We considered it to be a total failure,' he said. He explained that a great deal of focus must be put on the tools that surround the algorithms, to allow the systems to be properly harnessed. In the end, the game shipped with a revamped procedural sky system that ended up much more effective than the first attempt."
Cellphones

(Useful) Stupid BlackBerry Tricks? 238

Wolfger writes "Continuing the recent (useful) stupid theme: I've recently become a BlackBerry user, and I'm in love with the obvious(?) tricks, such as installing MidpSSH to access my home box remotely. But I'd like to know what more experienced Crackberry addicts can share."
Networking

Microsoft Working For Samba Interoperability 221

JP writes "Andrew Bartlett of Samba fame has written a document describing their recent collaboration with Microsoft's Active Directory team. In brief, it would seem that the sky is falling, as Microsoft's engineers seem to be really committed to making Samba fully interoperable with AD. They have organized interoperability fests and have knowledgeable engineers answering technical questions without legal or marketing drones getting in the way. However according to Andrew the Samba AD team is currently very short on manpower, so if you have network experience, now is the time to get coding."
Google

Google To Fund Ideas That Will Change the World 165

Peace Corps Online writes "This week, as part of their tenth birthday celebration, Google announced the launch of project ten to the 100th, a project designed to inspire and fund the development of ideas that will help to change the world. They have called on members of the public to share their ideas for solutions that will help as many people as possible in the global community, offering a $10 million prize pool to back the development of those chosen as winners. 'We know there are countless brilliant ideas that need funding and support to come to fruition,' says Bethany Poole, Project Marketing Manager for Google. 'These ideas can be big or small, technology-driven or brilliantly simple — but they need to have impact.' The project's website asks entrants to classify their ideas into one of eight categories listed as Community, Opportunity, Energy, Environment, Health, Education, Shelter and Everything Else. Members of the public have until October 20th to submit their ideas by completing a simple form and answering a few short questions about their idea."

Comment Re:What about a Comparison Matrix (Score 1) 415

You are wrong. There are scripting languages with dynamic but strong typing like Python for example.
You cannot change types in Python variables implicitly. You have to do type conversions.
you can't do:

print "some string" + some_integer

You have to convert it:

print "some string" + str(some_integer)

Nice troll though...

Encryption

Submission + - Spore Creature Creator uses steganography in PNG. (nedbatchelder.com)

arcanumas writes: "It seems that Spore Creature Creator allows you to save images of creatures in PNG format, that you can later import and get your creature back. Ned Batchelder did some digging using Python and PIL, and discovered that Creature Creator uses steganography to embed creature data within the PNG file. According to Ned:

"These pixels are part of the black transparent edge of the image, except it isn't truly black and it isn't truly transparent. There's one bit of information being encoded in each channel, or four bits per pixel."

The article also raises some questions on why they used this method instead of tEXT records (supported by PNG), but it is a cool hack nevertheless."

What Programming Languages Should You Learn Next? 759

simoniker writes "Over at Dobbs Code Talk, Chris Diggins has been discussing programming languages beyond C++ or Java, suggesting options such as Ruby ('does a great job of showing how powerful a dynamic language can be, and leverages powerful ideas from Smalltalk, Perl, and Lisp') but suggesting Scala as a first choice ('Very accessible to programmers from different backgrounds.') What would your choice be for programmers extending beyond their normal boundaries?"
Input Devices

Use Your Cellphone as a 3D Mouse 77

Roland Piquepaille writes "In recent years, we've started to use our cellphones not only for placing calls or exchanging messages. Now, we take pictures, read our e-mails, listen to music or watch TV. But, according to New Scientist, UK researchers are going further with a prototype software that turns your cellphone into a 3-D mouse. The phone is connected to your computer via Bluetooth. And you control the image on the screen by rotating or moving your phone. As says one of the researchers, 'it feels like a much more natural way to interact and exchange data.' The technology might first be used in shopping malls to buy movie tickets or to interact with advertising displays."
Unix

Submission + - End of 32 Bit Time Problem 1

georgetirebiter writes: "At least one large, very successful financial services organization in the last few days fell victim to the Unix year 2038 problem when trying to create a standard 30 year risk contract in their proprietary financial software. The problem occurred when trying to make a standard time call in sql. I wonder how many other programmers have had to try to solve this problem in legacy systems? What solutions did they use? Is this really an incipient and perhaps more serious successor to the Y2K bug?"

Slashdot Top Deals

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...