Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Programming

Submission + - Did D-Wave really demonstrate a quantum computer?

Qubert writes: Was D-Wave's quantum computer demo last week the real thing? Ars Technica takes a look inside the cold, black box and concludes that whatever was in there, it probably wasn't a 'pure' quantum computer: 'Jumping off the fence, we will say that we think D-Wave demonstrated a real device; however, we think their device is going to set off a debate in the physics community over where the boundary between classical and quantum computation is. At present, quantum computers are "globally phase coherent," which means that every qubit's state is entangled (and therefore correlated) with every other qubit... The D-wave system, however, is certainly not globally phase coherent, which raises the question of whether it is a quantum computer.'
Hardware Hacking

Submission + - A Keyboard on the Edge

An anonymous reader writes: One of the fastest growing trends in consumer electronics is what some people have started to call tech luxury. These are goods that are all about style and performance and don't really concern themselves with the price. One of the best examples of this is Logitech's new diNovo Edge keyboard. It's looks great, has a big price tag, and has lots of innovative features, but has no mouse or numberpad. From the article, "Keyboards don't have to be boring. They don't have to be blocky, beige tools that are tethered to the back of your computer. Companies like Logitech have made it so that keyboards can be comfortable, wireless, stylish, interesting, and, maybe even cool."
Security

Submission + - Scanning Ajax for XSS Entry Points

An anonymous reader writes: Ajax code loaded in browser can have entry points to XSS and it is the job of the security analyst to identify these entry points. It is difficult to decisively conclude that possible entry points to an application can be exploited. One may need to do a trace or debug to measure the risk of these entry points. This paper introduces you to a quick way to identify XSS entry points in an application.
Networking

Submission + - How much storage do you "control"?

linkedlinked writes: While looking for some old backups with a friend, we started talking about storage space, and how so many of our random files wind up in obscure places. We realized that each of us has "access" to a pretty sizable heap of storage (for college kids). I would guess that, between ftp accounts on friends' servers, random school storage space, root access to a few work servers, and my own half-dozen computers and servers, I probably have near 5-6 TB of usable storage. Out of curiosity, we decided to ask Slashdot- legality aside, how much storage space could you feasibly dominate on a whim?

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...