Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re: [1]=overhead? Not always (Score 1) 520

by stoborrobots (#49084951) Attached to: Nim Programming Language Gaining Traction

If you're storing the length, then "iterate over array and perform this operation" (for example, for a search or a "double every element" transformation) can use the known length to set up a for loop, rather than having to check "am I at the last element of the array" for every element... This could be a good reason to store the length even if you don't want the cost of bounds-checking.

+ - Hackers take banks to the cleaners for at least $300 Million->

Submitted by jjoelc
jjoelc (1589361) writes "In a highly sophisticated attack, hackers struck over 100 different banks over the course of nearly two years making off with at least $300 million, though Kaspersky Labs estimates the true total could be 3 times that. Getting a total is difficult not only because of the scale of the attack, but because transactions were never more than $10 million, though some banks were hit more than once.
“This is likely the most sophisticated attack the world has seen to date in terms of the tactics and methods that cybercriminals have used to remain covert,”
The hackers spent months monitoring infiltrated systems, learning the routines of the bank involved. When it came time to cash out varying methods were used including account transfers to dummy accounts and causing ATM machines to dispense cash at scheduled times. The largest sums were taken by gaining access to the banks accounting systems and artificially inflating an account balance, then quickly transferring the excess balance to a dummy account."

Link to Original Source

+ - AT&T To Match Google Fiber in Kansas City, Charge More If You Want Privacy-> 1

Submitted by Anonymous Coward
An anonymous reader writes "When Google Fiber started bringing gigabit internet to cities around the U.S., we wondered how the incumbent carriers would respond. Now we know: AT&T has announced they will match Google Fiber's gigabit offerings in Kansas City. Of course, there are some caveats. First, AT&T's rollout may stop as it fights the Obama administration over net neutrality. Not that it would be a nationwide rollout anyway: "AT&T does not plan to offer the ultra-fast Internet lines to every home in the market. Rather, he said the company would calculate where demand is strongest and the investment in stringing new cables promised a decent return."

There are also some interesting pricing concerns. The company plans to charge $70/month for gigabit service, but that's a subsidized price. Subsidized by what, you ask? Your privacy. AT&T says if you want to opt out of letting them track your browsing history, you'll have to pay $29 more per month. They say your information is used to serve targeted advertising, and includes any links you follow and search terms you enter."

Link to Original Source

Comment: Re:Nonsense (Score 1) 411

by stoborrobots (#49045351) Attached to: Your Java Code Is Mostly Fluff, New Research Finds

I agree with you on the idea and behaviour of the control classes, but have generally found it handy to have some guarantees of well-formedness in the data objects.

Otherwise, every control object which uses the data object needs to verify every detail about the data object before it uses it - which leads to the duplication of validation code issue you were concerned about in the first place...

Comment: Re:Nonsense (Score 1) 411

by stoborrobots (#49044315) Attached to: Your Java Code Is Mostly Fluff, New Research Finds

So if you are not doing your field validation at creation time, how do you enforce the "interface contract"?

Something somewhere has to verify that the address is a valid address, and the port is a valid port (why would you accept a socket request for port 67890?) - why allow a non-conformant data object to exist?

What domains have such wide-ranging field values that validated data is not a reasonable idea?

Comment: Re:Nonsense (Score 1) 411

by stoborrobots (#49036469) Attached to: Your Java Code Is Mostly Fluff, New Research Finds

Data classes like this?

class TCPSocketAddress
private long ipaddress;
private int port;
string getAddress()
  return long2ip(ipaddress);
void setAddress(string addr)
  if (addr.matches("/^\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3)$/")) ipaddress = ip2long(addr);
  else throw InvalidIPAddressException;
int getPort()
  return port;
void setPort(string addr)
  if (newport > 0 && newport < 65536) port = newport;
  else throw InvalidTCPPortException;

Comment: Space bar? (Score 1) 4

by stoborrobots (#48995767) Attached to: A pdf reader that lets you read a screen full at a time?

In many PDF readers I have used, the space bar key works the way you've described - scrolling by one screenful.

I'm not on my usual PC, but I've just tested both Adobe Reader and the Firefox built-in PDF viewer, and both scroll by a screenful both for the space bar, as well as for the page-down key. Neither of them scrolled by the "page" size.

Comment: Re:That's why nobody sensible wants them (Score 1) 223

by stoborrobots (#48994965) Attached to: US Health Insurer Anthem Suffers Massive Data Breach

Kiss your keyboard goodbye!