Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment: Used it, loved it (Score 1) 1

by SmellsLikeTeaSpirit (#36184660) Attached to: A new, original, open source web tech is born
I've been one of the first developers (and users) of Opa, from an early, early, early stage. At the time, the technology was very promising, but not quite mature yet. It took us years to reach the kind of usability and maturity that we have now. And I can testify that Opa is now not only a great technology – it's also ma favorite programming language.
Cloud

+ - A new, original, open source web tech is born-> 1

Submitted by phy_si_kal
phy_si_kal (729421) writes "Today, a secretive startup from Paris, France has announced that it will open source the Opa technology it has been developing for some time.
Opa is a one-tier web technology (right, that means only one layer at runtime) where Opa source code is compiled into a standalone binary. And, this could be really a game changer in the cloud era as it handles distribution very easily.
Sadly, the code is not yet available but a 171-page manual and tutorial is already available (registration required) and packages seem on the wild.
Disclaimer: I am at MLstate (and very happy)"

Link to Original Source
Security

+ - Bug Bounties: Outbidding the Black Hats->

Submitted by
snydeq
snydeq writes "Fatal Exception's Neil McAllister discusses whether independent software developers should follow in the footsteps of Google and Mozilla and begin offering bug bounties before black hats pay up for their undisclosed software flaws. 'Whichever side of the fence you fall on, the fact is that bounties are being paid for undisclosed software flaws. They're just not always being paid by the vendor who developed the software. As ever more commercial data moves into the cloud and the stakes for cyber crime rise, black hat hackers are offering real money for exploitable bugs. In turn, when exploits happen, vendors may be held legally liable for any customer data that was compromised. Maybe it's time more software shops thought seriously about using their own cash to turn the tide in their favor.'"
Link to Original Source
Security

+ - What's Next: 6 Rising Threats From Cybercriminals->

Submitted by
CWmike
CWmike writes "Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector. Whether you're an IT manager protecting employees and corporate systems or you're simply trying to keep your own personal data safe, these threats — some rapidly growing, others still emerging — pose a potential risk. Fortunately, there are some security procedures and tools available to help you win the fight against the bad guys."
Link to Original Source

All the simple programs have been written.

Working...