Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Which Eclipse Plug-Ins Do You Use? (dynamicalsoftware.com)

anomalous cohort writes: I'm sure that the /. devs already know about the Eclipse IDE which is most noted for its rich variety of plug-ins but which plug-ins are the best? The Eclipse Marketplace currently lists 887 tools. I assure you that any instance of Eclipse with all of those plug-ins installed would take a very long time to load. So, my question to those coders who use Eclipse is this. What is your short list of "must have" plug-ins?

Comment take a look at Beagle (Score 1) 385

People here seem to think that you are looking for another email client. Instead, it appears to me that what you really need is a way to archive and search your local machine. In light of that, take a look at http://beagle-project.org/ Beagle can search your IMAP stuff and local file system stuff too. I run Ubuntu so the UX for installing, configuring, indexing, and searching with Beagle is pretty easy. Beagle is available in the Ubuntu Software Center. You can search from either the command line or from the firefox search bar once you have configured that.
Linux

Submission + - Latest Ubuntu LTS Out of Beta (ubuntu.com)

anomalous cohort writes: It looks like Ubuntu's latest LTS (Long Term Support) release is ready for GA (General Availability). Has anyone here tried it out? What is the current /. consensus on all things Ubuntu?

Comment the cutting edge itself has moved on (Score 4, Interesting) 667

It's no longer language constructs, data structures, or algorithms that are cutting edge. Innovation has moved on to more fertile pastures. Yes, those who build software tools, libraries, IDEs, and compilers will continue to innovate. They have and will continue to come up with some brilliant stuff. But cutting edge developers don't pick a shop because they write in groovy or whatever the language-de-jeur is. Cutting edge developers go where they believe the next killer app is going to be born.

The best developers are multi-lingual. They don't identify with a single programming language. They're not VB developers or Java developers or even Rails developers. They can pick up any language/library/environment quickly. They don't really get off on curly braces versus colons. What feeds the best developers is the challenge of world domination through innovation.

Change the world, right?

Comment Re:litigation mitigation (Score 1) 79

IANAL but my guess here is if the attack is coming from the IP of the server(s) where your app is running, then you could listed as a defendant. If you are sharing a server or have a VPS account, then you are still not patching the OS of that machine so it is vulnerable to getting infected and caught up in a bot-net. Even with dedicated machines, an incorrectly patched firewall or security appliance could leave your machines vulnerable.

Comment litigation mitigation (Score 1) 79

Why should corporations care? Two words "litigation exposure." A bot-net living in your network takes down an e-commerce site for day. They will see you in court. Good luck with that "don't blame me, blame my ISP" defense.

I think that kind of "not my problem" thinking is what is driving the current cloud computing craze. Corporations seem to think that they can side step the accountability hassle if they outsource IT to the cloud. Good luck with that too.

Comment Re:Other Things... (Score 1) 293

Database, web, frameworks, IDE are all important if you want to get into J2EE. I recently gave a presentation at the local JUG about GWT which is Google's toolkit for writing RIA in J2EE. About half of the talk was an introduction to GWT and the other half covered GWT specific issues with regards to Eclipse, Maven, Spring, JDO, Hibernate, GAE, EC2, Acegi, Lucene, FreeMarker, etc. The point is that there are a lot of OSS Java libraries out there that rapidly accelerate your productivity in Java development and it is important to learn how to consume some of these APIs if you want to be competitive.

Submission + - Scrum Points vs. Billable Hours

matt writes: "We have been having a heated discussion at my company regarding a recent push by management to implement a time tracking system completely separate from Scrum. Management's intention is to be able to more accurately track billable hours, but some team members feel that by doing so, it will go against all things holy (Scrum-wise) and only hurt the development/creative process. Do any Scrum teams also use a time tracking system to track billable hours separately from Scrum points? If so, how well has it worked for you?"

Submission + - Microbin: Recommendation algorithm wants to show you somethi

When it comes to recommendation systems, everybody's looking to increase accuracy: the Netflix Prize was awarded last July for an algorithm that improved the accuracy of the service's recommendation algorithm by 10 percent. However, computer scientists are finding a new metric to improve upon: recommendation diversity. In a paper that will be released by PNAS, a group of scientists are pushing the limits of recommendation systems, creating new algorithms that will make more tangential recommendations to users, which can help expand their interests, which will increase the longevity and utility of the recommendation system itself.

Accuracy has long been the most prized measurement in recommending content, like movies, links, or music. However, computer scientists note that this type of system can narrow the field of interest for each user the more it is used. Improved accuracy can result in a strong filtering based on a user's interests, until the system can only recommend a small subset of all the content it has to offer.





Link to Original Source
Security

Submission + - Pros And Cons Of Biometric Authentication (net-security.org)

An anonymous reader writes: In theory, biometrics are a great way to authenticate a user: it's impossible to lose your fingerprint (barring the most gruesome of developments), you can't forget it like you could a password, and it's unique to you. In practice, though, there are so many things that, for now, limit a more widespread use of this technology. One of the problems has been pointed out by Guy Churchward, CEO of LogLogic: "Once you have your fingerprint scanned it will give a unique data sequence which if compromised is not exactly something you can change," he says. "Imagine having an option of only one password 'ever'. One loss and you are screwed." Do you use biometrics? Can this solve some of the problems associated with passwords? One of the biggest issues is users employing the same password all over and this wouldn't change since you have only so many fingers.

Submission + - Mobile Messaging: Convenience or Compulsion? (themxrecord.com)

emailgirl writes: http://www.themxrecord.com/2010/02/26/mobile-messaging-convenience-or-compulsion/ At what point does checking your email become unhealthy? I’ve read several articles this week about a study conducted by Osterman Research stating that 95% of respondents check their business email outside of work. Is that a high percentage? Yes. Is it particularly alarming or disturbing? Not really. But what really intrigued me is where and when respondents are checking their email. Nights, weekends, vacations, weddings, funerals, intimate moments, and yes.even the toilet. No time or place is too sacred I guess.

So is it time for Inbox Detox when it comes to our mobile devices? Or are we just becoming incredibly effective at multi-tasking?

Ubuntu

Submission + - The (Involuntary) Unification of Linux (lunduke.com) 1

jbChrisLAS writes: A look back over the last few years of Desktop Linux usage shows stunning trends that would seem to indicate a process of natural selection for desktop Linux, one that's leading to a unified Linux Desktop.

Submission + - HTML5 vs Flash (silicon.com)

An anonymous reader writes: Here's an article that provides a lowdown on whether HTML5 is going to smackdown Flash when it comes to mobile apps or whether the standard will be obsolete by the time that its specifications are finally ratified.

Slashdot Top Deals

1 + 1 = 3, for large values of 1.

Working...