Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
The Military

Submission + - Most Wanted corporate human rights abusers (makeahistory.com)

An anonymous reader writes: Corporations carry out some of the most horrific human rights abuses of modern times, but it is increasingly difficult to hold them to account. Economic globalization and the rise of transnational corporate power have created a favorable climate for corporate human rights abusers, which are governed principally by the codes of supply and demand and show genuine loyalty only to their stockholders.
Perl

Submission + - Research Shows Perl No Better Than a Random Langua (neverworkintheory.org)

jkleint writes: It Will Never Work In Theory has a summary of a great paper studying novice programmers grappling with Perl:

We present here an empirical study comparing the accuracy rates of novices writing software in three programming languages: Quorum, Perl, and Randomo. The first language, Quorum, we call an evidence-based programming language, where the syntax, semantics, and API designs change in correspondence to the latest academic research and literature on programming language usability. Second, while Perl is well known, we call Randomo a Placebo-language, where some of the syntax was chosen with a random number generator and the ASCII table. We compared novices that were programming for the first time using each of these languages, testing how accurately they could write simple programs using common program constructs (e.g., loops, conditionals, functions, variables, parameters). Results showed that while Quorum users were afforded significantly greater accuracy compared to those using Perl and Randomo, Perl users were unable to write programs more accurately than those using a language designed by chance.

Let the flamewars begin!

Twitter

Submission + - New Bill Makes Copyright INDUCEMENT and Streaming (fightforthefuture.org) 2

An anonymous reader writes: The Protect IP Act's House version came out yesterday and according to Public Knowledge, it is broader and worse than expected. What the Grokster case failed to get support from in the courts, this bill, now also called SOPA and E-PARASITES, has put in — sites can get shut down on the premise that they didn't do enough to deter copyright infringement before it happened. This ends the DMCA safe harbor provision that sites like Youtube and Twitter depend on. This bill also includes the streaming bill S. 978 in it, but reduces the number of required public performances, or views, from 10 to 1 — you just need to share your video that has a song playing in the background to 1 person. The video and a way to stop Congress on the bill is here.

Submission + - EFF, ACLU file lawsuits over Patriot Act data coll (techworld.com.au)

angry tapir writes: "Two civil liberties groups have filed lawsuits asking the U.S. Department of Justice to detail its collection of electronic data and other information under the 10-year-old counterterrorism law, the USA Patriot Act. The lawsuits, from the Electronic Frontier Foundation and the American Civil Liberties Union, seek to have the DOJ and its U.S. Federal Bureau of Investigation branch turn over all information related to information requests allowed under Section 215 of the Patriot Act. Section 215 allows the FBI to ask for a court order to obtain "any tangible things," including books, records, papers, and documents, related to a terrorism investigation."
Censorship

Submission + - PROTECT IP Renamed to the E-PARASITE Act (activepolitic.com)

bs0d3 writes: As reported, the US House has drafted their version of Protect IP today. They have renamed the bill to "the Enforcing and Protecting American Rights Against Sites Intent on Theft and Exploitation Act" or the E-PARASITE Act. The new house version of Protect IP is far worse than the Senate bill s.968 and it massively expands the sites that will be covered by the law. While the Senate bill limited its focus to sites that were "dedicated to infringing activities", the house bill targets "foreign infringing sites" and "has only limited purpose or use other than infringement". They're also including an "inducement" claim, any foreign site declared by the Attorney General to be "inducing" infringement, can now be censored by the US. With no adversarial hearing. The bill can be read here.
Microsoft

Submission + - Antitrust Case Over, Microsoft ties IE 10 to Win 8 (crn.com)

deadeyefred writes: With the last vestiges of Microsoft's U.S. antitrust consent decree expiring earlier this year, the company is again tying its browser tightly to Windows. In pre-release versions of IE 10 and Windows 8, IE 10 cannot be uninstalled and is required to enable the new "Metro"-style apps.
China

Submission + - slashdot blocked in china 2

tvlinux writes: I woke up this morning, and accessed /. I received a "connection reset". After living in China to a few years, I know what that means. Slashdot is being blocked by "Golden Shield". I am in ShenZhen, anybody else being blocked?
Slashdot is a great place to keep track of the latest technology advances. Google is some times throttled. Many other technical sites are blocked just because they are on a blog site.
Is China cutting it throat learning about new technology?

Submission + - lensfree holographic microscope (opticsinfobase.org)

tvlinux writes: "Now a cost-effective and field-portable assembly we built a lensless reflection mode microscope based on digital off-axis holography where a beam-splitter is used to interfere a tilted reference wave with the reflected light from the object surface, creating an off-axis hologram of the specimens on a CMOS sensor-chip can detect bacteria in the field. This should save lives in poorer areas and allow for better food safety."

Comment The Server Controls the App (Score 1) 265

The Server controls the web app.
The only data in the client is temporary local data and display data. All data is stored on the server.
When a user logins in a session is created. At this point resynchronization happens. All the data stored in the client is downloaded to the server. the server then deals with what needs to be updated.
Yes, expect people to try to crash the server and corrupt data. Design the server framework to deal with it. Then the server application does data validation and checking. then finally use the data to update the server storage.
The standard frameworks now do not deal with "Data Only" processing. By using a server framework the uses small callbacks for RPC with session security tokens creates a secure enviroment.
The biggest problem are RPC calls that are automated to harvest data. This can be mitigated by throttling in the server framework.

Slashdot Top Deals

"Being against torture ought to be sort of a bipartisan thing." -- Karl Lehenbauer

Working...