Forgot your password?
typodupeerror
Operating Systems

+ - Early Speed Tests For Windows 8

Submitted by adeelarshad82
adeelarshad82 (1482093) writes "You often hear in the software industry that performance optimization is one of the last steps in the software development process. That bodes well for Windows 8, considering at the early stage of Developer Preview—even before we've seen an actual beta—the nascent operating system is getting widespread praise for its performance, particularly in startup times. Anecdotal evidence is always encouraging, but PCMag decided to run some very early tests on the OS to see if the reports were wishful thinking or if there was a real, measurable boost in speed. Along with startup and shutdown times, they used several standard industry benchmarks to compare Windows 8 performance with that of Windows 7 running on the same machine."
Google

+ - Google TV sales "Negative"->

Submitted by starglider29a
starglider29a (719559) writes "In its fiscal first-quarter earnings release, Logitech said demand for the Revue, which works with special Google TV software to allow viewers to navigate Internet content, had been disappointing. The Swiss firm said customer returns of the Revue have outpaced the device's "very modest sales.""
Link to Original Source

+ - Do we need pseudonymous social networking?

Submitted by Anonymous Coward
An anonymous reader writes "While the idea of anonymous social networking sounds like an oxymoron, the use of pseudonyms to mask a user's online identity has a long history that stretches back to the earliest days of the Internet and local bulletin board systems (BBS). Such imperfect anonymity, which can often be unmasked with a few well-defined Google searches, has led to abuses like the invention of "spambots" and the persistence of forum trolls.

But, as the BBC reports pseudonyms, have their place in online communities, especially where identities are a risky commodity, under oppressive state regimes and governments where corporate interests increasingly dominate the interests of individuals: "Some users choose to hide their identity to avoid being found by people they would not like to be contacted by. Others live in countries where identification could have serious implications for those who have expressed political views or associated themselves with others who have."

Should Google+ and maybe even the notorious Facebook evolve into two-tiered sites where those who choose to remain anonymous are "identified" as such and denied access to certain site features, while being free to post, blog, or tweet their views, without summarily getting their accounts suspended or revoked?"
Space

+ - Newly Discovered Quasar Defies Age of Universe->

Submitted by jjp9999
jjp9999 (2180664) writes "The brightest and most distant quasar ever discovered is giving astronomers a window to space 12.9 billion years old. The findings were published in the June 30 issue of the Journal Nature. Joshua Philipp wrote in his blog, TechZwn, that "the age of the quasar poses some difficult questions" as its intense light helped researchers conclude the black hole at its center has the mass of two billion suns. Matching its age and size with the Big Bang theory, however, the quasar is similar to “finding a 6-foot-tall child in kindergarten,” as noted by astrophysicist Marta Volonteri, in Science News. The European Southern Observatory (ESO), which found the quasar, wrote on its website “This very high mass is hard to explain so early on after the Big Bang.""
Link to Original Source
Programming

+ - The Most Dangerous Programming Mistakes->

Submitted by
snydeq
snydeq writes "Fatal Exception's Neil McAllister discusses the most dangerous programming mistakes, and what can be done to avoid them. 'Even more than input validation errors, this year's top 25 list is rife with application security blunders of all kinds. Some of them sound fairly esoteric, such as "inclusion of functionality from untrusted control sphere." But of all such errors, the highest-ranking one on the list is "missing authentication for critical function" — in other words, the attacker was able to gain access because there was no lock on the door to begin with,' McAllister writes. 'With the pace of Internet attacks accelerating, now is not the time to cut QA staff or skimp on testing and code review.'"
Link to Original Source
Censorship

+ - Anonymous strikes Malaysian govt->

Submitted by durianwool
durianwool (218051) writes "Anonymous has struck at least 10 Malaysian government portals in retaliation of last week's blocking of 10 popular file sharing sites like Pirate Bay. The sites have been defaced with the message,"Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world's strictest governments, even blocking out movies, and television shows.These acts of censorship are inexcusable. You are taking away a basic human right. The Internet is here for freedom, without fear of government interference. Do not think that no one else notices".

Currently the Malaysian government doesn't censor politically sensitive sites, but they have been accused of doing so during election campaigns, such as the 2-week DDOS attacks on Malaysiakini and Sarawak Reporter in April during the by-elections then. Those attacks were traced to apparrently to China. Are there cracker guns for hire there?

Just a matter of principle, shouldn't Anonymous attack places like China where they have effectively broken the Internet. Not only Pirate Bay is blocked, but IMDB to and most of Google."

Link to Original Source
Education

+ - How the Internet Works for web design class? 3

Submitted by cultiv8
cultiv8 (1660093) writes "I am teaching an Intro to Web Design class this next fall at a local college that specializes in arts and design. This is the most "technical" class required for their major (other than the Adobe suite of software) and I'm looking for papers and resources that describe "how the internet works". Subjects I want to cover (during the course of 3 hours) include LAMP, TCP/IP & related protocols, DNS, principles of OSS, and why you should love your system admin. I'm searching for resources, preferably under a Creative Commons license, to distribute and share with students. Any recommendations?"

"Stupidity, like virtue, is its own reward" -- William E. Davidsen

Working...