Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment In what way is this a "vulnerabilty"? (Score 1) 121

Given that the machines have to have the acoustic networking software installed on them (requiring already having root access), this is at worst a covert communications channel that could be used to bypass network security controls in order to exfiltrate information from an otherwise secure network. It has no impact on whether machines can be hacked to begin with.

Comment Exploiting ambiguity to latch onto hype (Score 2) 186

I don't know why people keep submitting this garbage from Espresso Logic, who is just taking advantage of the fact the the term "reactive" has been overloaded to mean different things to exploit the hype surrounding the Reactive Manifesto and related technologies (e.g., Akka, Rx, Node.js, etc.) to push their own, completely unrelated product, which is based on the more traditional (i.e., the one you find in Wikipedia) definition of "Reactive Programming".

"Reactive programming", as defined by the Reactive Manifesto (which is what all the hype is about), is about designing applications that operate in an entirely asynchronous and non-blocking manner, so as to maximize CPU utilization and fully exploit parallelism, and ensure that the system is always responsive to new events (user input, incoming data streams, errors, changes in load, etc.) rather than having resources tied up waiting for external processes (e.g., blocking on I/O). It has nothing to do with "reactive databases".

Comment Re:Not a tank (Score 1) 232

Many early tanks (up through WW2) had anti-tank capabilities (indeed, the first tanks had no reason to have anti-tank capabilities - there were no other tanks to fight against). The main distinguishing features of a tank are its armor (which need not necessarily be very heavy - just enough to deflect small arms fire), its tracks, and the fact that it has some sort of weapon mounted on a turret.

The Panzer I was classified as a light tank but was armed only with MG13 machine guns. The British Vickers Light Tank Mk VI likewise only had .50cal and .303cal machine guns.

Comment Re:Don't let them patent it! (Score 1) 80

Rhino runs an interpreter that first compiles JavaScript into its own pseudo-bytecode, and then interprets the pseudo-bytecode. I believe what Oracle is proposing is to compile JavaScript directly into Java bytecode, using the new features of the JVM to handle the dynamic aspects that weren't possible with previous versions of the JVM.


Submission + - Router Maker AVM Makes Copyright Claim On GPL Code->

judgecorp writes: "German router maker AVM has brought a copyright case against a third party software maker, which critics say is an attack on the principles of free software. AVM appears to be claiming copyright on software which includes the Linux kernel — no way, say free software advocates."
Link to Original Source

The possession of a book becomes a substitute for reading it. -- Anthony Burgess