Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Ask Slashdot: Why is it so difficult to find basic database speed information? (comasdf.html) 2

DidgetMaster writes: I am developing a new general-purpose data management system that handles unstructured, semi-structured, and structured data well, so it has features found in file systems, relational databases, and NoSQL solutions. I am a file system expert so it is very easy for me to see how my system outperforms traditional file systems (e.g. search is 1000x+ times faster), but although I have moderate DB experience it is tough to tell just how my database features compare to the likes of MySQL, PostgreSQL, Oracle, etc.. I have tried to find simple performance metrics on sites that compare various database products, but none of them seem to give any basic information.

I realize that every setup is different and you can tune most databases to get benchmarks to make a particular product look good against the competition, but something simple like "good performance today means you can insert 10 column rows into a table at a rate of 25,000 rows per second" or "a simple database view for finding all customer names that start with the letter 'B' on a 10 million row table should take 3.5 seconds or less". Using my software on a desktop system (intel i7), I can read, parse, and insert 5 million rows (10 columns each) into a table in 1 minute 6 seconds. Queries against that table (e.g. SELECT * FROM table WHERE customerName LIKE '%au%';) usually take less than 2 seconds. (My custom database is a column store that de-dupes all data and does not need any indexes.)

It seems fast to me but is it really? I tried doing the same thing using MySQL Workbench and it always took much longer (sometimes 17 seconds or more for each query), but I can't tell if I am just not doing it right. How long should it take on a desktop machine to import a 5 million row, 10 column .CSV file into a database table? How long should it take to execute simple views against that table? I don't need exact millisecond numbers, just ballpark figures.

Submission + - Researcher proposes "multicompiler" to prevent instruction-level exploits (

Beeftopia writes: A researcher proposes the concept of a "multicompiler" to generate a unique, slightly different set of binary instructions in each compiled output file in order to disable instruction-level attacks. From the article: "Dr Franz has already built a prototype that can diversify programs such as Firefox and Apache Linux. Test attacks designed to take over computers running the resulting machine code always failed. The worst thing that happened was that the attack crashed the target machine, requiring a reboot. The rest of the time it simply had no perceptible effect. Dr Franz puts the chance of a hacker successfully penetrating one of his randomised application programs at about one in a billion."

Submission + - FCC Proposal to Limit Access to 5725-5850 MHz Band

thittesd0375 writes: New rules adopted by the FCC will greatly limit the amount of bandwidth available in the unlicensed U-NII band used to deliver internet to rural areas. The filters required to comply with the new rules would shrink the available frequencies from 125MHz to only 45MHz. Petitions to reconsider this ruling can be submitted here and previous petitions can be found here.

Submission + - Have We Been Interpreting Quantum Mechanics Wrong This Whole Time? (

An anonymous reader writes: The idea that pilot waves might explain the peculiarities of particles dates back to the early days of quantum mechanics. The French physicist Louis de Broglie presented the earliest version of pilot-wave theory at the 1927 Solvay Conference. As de Broglie explained that day to Bohr, Albert Einstein, and two dozen other celebrated physicists, pilot-wave theory made all the same predictions as the probabilistic formulation of quantum mechanics, but without the ghostliness or mysterious collapse.

Submission + - 3D Printed PiGRRL - Raspberry Pi Gameboy

coop0030 writes: Celebrate the 20th anniversary of the classic gaming device, Game Boy, by building your own with 3d printing and DIY electronics. This project uses a Raspberry Pi and TFT touch screen to make an epic DIY Game Girl. The 3d printed enclosure houses all of the components and can be printed in your favorite color. It's controlled with SNES gaming controller components, reusing the printed circuit board, buttons and elastomers. The 3D files can be found on Thingiverse, and a video of the finished product is provided as well.

Submission + - Facebook Adapts To Indian Market With Ads That Call You Back (

jfruh writes: In much of the developing world, millions of people use low-cost featurephones to access the internet — and for phone calls, those phones use the "caller pays" method, where receiving calls are free. To adapt to this maket, Facebook is launching ads in India that call users back after they click on them to indicate their interest.

Submission + - "Evolution = Satan" part of Atlanta Public Schools' Biology Curriculum (

McGruber writes: The young journalists at The Southerner (, the student newspaper at Grady High School in Atlanta, Georgia, recently broke the news that creationism and other Christian religious views are incorporated into the Biology curriculum used by the City of Atlanta Public Schools. As the newspaper put it (

A PowerPoint shown to a freshman biology class featured a cartoon depicting dueling castles, one labeled “Creation (Christ)” and the other labeled “Evolution (Satan).” Balloons attached to the evolution castle were labeled euthanasia, homosexuality, pornography, divorce, racism and abortion...... The PowerPoint, which has more than 50 slides largely consisting of material about evolution, was downloaded from SharePoint, an APS file-sharing database for teachers. It was uploaded by Mary E. King, a project manager at APS who has also uploaded more than 2,000 other documents. Phone calls and emails to King have not been returned. Tommy Molden, science coordinator for APS, also did not respond to requests for comment.

Students were offended by the cartoon:

“[I] have gay parents, and [the cartoon] said that evolution caused homosexuality and it implied that to be negative, so I was pretty offended by it,” [freshman Seraphina Cooley] said.

Cooley said that another student emailed the administration complaining about the PowerPoint.

Freshman Griffin Ricker, who is also in Jones’ class, said [Biology class teacher Anquinette Jones] got angry with the class when she found out students had notified the administration.

“She had a 10-minute rant,” Ricker said. “She yelled and said, ‘This is on the APS website, and it was certified.’”

In case of slashdotting, the student reporting is also posted on a local newspaper's blog (

Submission + - Why did Eric Schmidt (and Jared Cohen) go to Cuba? 1

lpress writes: Eric Schmidt traveled recently to Cuba, where he visited members of the Internet community, the University of Information Sciences and unspecified government officials. The object of the trip was to "promote a free and open Internet," a laudable goal, but might there have been a more substantive reason for visiting Cuba? Might the trip have been to feel out the possibility of a Google "moonshot" — providing Internet access to Cubans. Google is experimenting with extra-terrestrial connectivity and Cuba, which has very poor domestic backbone infrastructure, could afford to extend Internet connectivity via satellite. To pursue this "moonshot" Google would need the permission of both the US and Cuban governments — tougher obstacles than the technology. Maybe that is why Google's Director of Ideas, Jared Stone, came along. Before joining Google, he was a member of the Secretary of State's Policy Planning Staff and an advisor to both Condoleezza Rice and Hillary Clinton.

Submission + - Stan O'Neal may not have requested the "right to be forgotten"

AmiMoJo writes: Yesterday Slashdot reported that Stan O'Neal may have requested that a BBC News blog post be removed from Google's search results under the EU "right to be forgotten". Late last night Robert Peston, the author of the article that made the original claim, updated it to state that in fact the blog post was still indexed when searching for "Stan O'Neal", speculating that it may in fact have been one of the commentators who requested removal when searching for their name.

Submission + - SPAM: 2014 Audi Sport Quattro Laserlight Concept

An anonymous reader writes: 2014 Audi sport quattro laserlight concept has been people’s interest for some times as Audi has released its teasing design a while back. People has been asking how is the phenomenal concept really is. And in the CES 2014, Audi has answered it by showing off his new product and inviting people’s awe for the magnificent breakthrough.
Link to Original Source

Comment Re:Not any time soon (Score 1) 305

The Internet rarely sees radical, clean change and IPv4 is going to limp on for a long, long time.

This. Oh for some mod points, I'd have sent one this way. FWIW, I think we'll see concerted efforts to reclaim unused addresses or blocks. It'll take some serious hurt to governmental and corporate wallets before any meaningful change happens.

Submission + - ask slashdot: tight firewall for brand-new linux user 2

An anonymous reader writes: Hi all,

I am a new Linux user. I'm on 2nd day now. Currently I am trying out Ubuntu, but that could change.

I am looking for a USER FRIENDLY firewall that I can setup that lets me do these things:
(requirement1) set up a default deny rule
(requirement2) carve out exceptions for these programs: browser, email client, chat client, yum and/or apt.
(requirement3) carve out exceptions to the exceptions in requirement2. i.e. I want to be able to then block off IPs and IP ranges known to be used by malware, marketers, etc., and all protocols which aren't needed for requirement2.
(requirement4) it needs to have good enough documentation that a beginner like me can figure it out

Previously, I had done all of the above in AVG firewall on windows, and it was very easy to do...

So far I have tried these things:
(try1) IPTABLES — it looked really easy to screw it up and then not notice that its screwed up and/or not be able to fix it even if I did notice, so I tried other things at that point...
(try2) searched the internet and found various free firewalls such as Firestarter, GUFW, etc., which I weren't able to make meet my requirements.

Can someone either point me to a firewall that meets my needs or else give me some hints on how to make firestarter or GUFW do what I need?

Thank You

Submission + - Five Year Old uncovers XBOX ONE log in flaw. (

Smiffa2001 writes: The BBC are reporting that five-year-old Kristoffer Von Hassel from San Diego has uncovered a (frankly embarrassing) security flaw within the XBOX ONE log in screen. Apparently by entering an incorrect password in the first prompt and then filling the second field with spaces, a user can log in without knowing a password to an account.

Young Kristoffer's Dad has submitted the flaw to Microsoft — who have patched the flaw — and have generously provided four free games, $50, a year-long subscription to Xbox Live and an entry on their list of Security Researcher Acknowledgements.

Slashdot Top Deals

Someday somebody has got to decide whether the typewriter is the machine, or the person who operates it.