Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Movies

Submission + - What code DOESN'T do in real life

Billosaur writes: "As with anything, Hollywood has a weird way of viewing computer code. On Drivl.com, they have an article entitled "What code DOESN'T do in real life (that it does in the movies)", a list of ten things that occur to code in Hollywood movies that doesn't happen when you're sitting at your terminal scrolling through it. It's sad to think that as Hollywood is becoming more dependent on coders to produce special effects and such for movies, that they are completely overlooking what coders do and how they do it. But then again, not every NYPD officer acts like Bruce Willis in "Die Hard," so why should any of this be a shock?"
Programming

Submission + - Batch processing in PHP

BlueVoodoo writes: "What do you do when you have a feature in your Web application that takes longer than a second or two to finish? You need some type of http://www.ibm.com/developerworks/opensource/libra ry/os-php-batch/?ca=dgr-lnxw01BatchPHP>offline processing solution. Check out several methods for offline servicing of long-running jobs in your PHP application.

Other Popular Open Source Articles "
Education

Submission + - Seymour Papert, OLPC Proponent, Badly Injured

musicon writes: "Seymour Papert, 78, an expert on how children learn, was struck by a motorbike Tuesday while crossing one of the many traffic-clogged streets near his hotel in Hanoi, Vietnam. He underwent brain surgery at the French Hospital on Wednesday, and is currently in a coma. Papert helped develop the Artificial Intelligence Lab at MIT and was instrumental in launching the Logo computer language."
Security

Submission + - Why can't registrars filter out blatant phishers?

netbuzz writes: "(Note to Slashdot editors: There are now three followup posts to the orignal submission, which I see is still pending. Thought you might want to consider the package in total. Thanks.)

Can't registrars just say no to blatant phishers?

Security expert Mikko Hypponen asks an interesting question: Why can't domain name registrars simply refuse to accept the business of individuals who are trying to register names that would only be used for phishing? Example: directNIC's granting to a "Craig Smith" the obviously phishy "signin-ebay-c.com."

http://www.networkworld.com/community/?q=node/9540

Head of the Anti-Phishing Working Group says ICANN policies are responsible for enabling much of the abuse, and hence the issue is "complex."

http://www.networkworld.com/community/?q=node/9565

DirectNIC's CEO defends his company's anti-fraud practices, acknowledges the system isn't perfect, and suggests a measure that might help make it better.

http://www.networkworld.com/community/?q=node/9573

Finally, directNIC's CEO accuses Network World of throwing stones while working in a glass office building because he registered on the magazine's site using the same telltale sign — eBay — that got his company dinged in the press. Editor explains the difference."
Classic Games (Games)

Submission + - Deep Fritz Beats Chess World Champion

The Saint (ST) writes: Computer chess program Deep Fritz (http://www.chessbase.com) scored a clear victory (4-2) against the chess World Champion V.Kramnik in a match of six games that finished on Dec.5, 2006. This victory is considered more profound than the one of Deep Blue against Kasparov in 1997, because Deep Fritz is actually a commercial product (although running on a very fast computer). More about the duel here: http://www.kramnik.com/default.aspx and here: http://www.chessbase.com/eventlist.asp?eventname=K ramnik%20vs%20Deep%20Fritz
Networking

Submission + - DNS All Over the Place

Juha Holkkola writes: "On November 15, SANS published 2006 annual update of the Top-20 Internet Security Attack Targets (www.sans.org/top20/). Each year, some of the most security conscious organizations all over the world help SANS in compiling this list based on severe vulnerabilities that have been discovered during the last 12 months or so. If any network service or product that has made this list has been more or less safe for more than 12 months, it gets dropped out. What strikes me the most with SANS's Top-20 is that DNS and BIND have made the list every single year since SANS started publishing it in 2000. That's every year for seven years now. And so, one would imagine that the networking community would finally like to do something to address the associated security problems, DNS being one of the most critical TCP/IP services and all. As some information security experts have recently pointed out, network administrators often shun away from interfering DNS as that could potentially have dire implications on functioning networks. I guess what they mean by this is that as DNS is one of the few applications that dates back to the pre-firewall-era of Internet, managing and securing DNS is like having a pet dinosaur. It's really not that cute and you'd really prefer not to touch it at all. Pet talk aside, perhaps the time has come to take the bull by the horns? While DNS and plain BIND may be somewhat cumbersome to secure and to manage, there are also more advanced options out there that make protecting and managing DNS servers a walk in the park."

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...