Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Here comes the Hypothalamus Diet! (Score 1) 118

While reading that book sinopsis I didn't find anything really impossible until it says:

"These experiences ranged from being able to “receive” the contents of an email message without using any electronic device to resuming a conversation with an off-world being that he had not been able to speak with, while awake, for 13 years."

I mean... it's still not impossible(tm) but really, how the hell does this help an otherwise "science"-based book?



Security Fix Leads To PostgreSQL Lock Down 100

hypnosec writes "The developers of the PostgreSQL have announced that they are locking down access to the PostgreSQL repositories to only committers while a fix for a "sufficiently bad" security issue applied. The lock down is temporary and will be lifted once the next release is available. The core committee has announced that they 'apologize in advance for any disruption' adding that 'It seems necessary in this instance, however.'"

Comment How is this different from Sandboxing? (Score 1) 201

From what I understand this is somewhat what many sandbox-based software does. For instance, it seems to me that if you installed Chrome on many servers and then, upon a request, deployed the code and used a Chrome sandbox to run and return the data the end result would be the same.

The challenges are still the same: how to deploy the code fast enough and how to route the request to the correct sandbox.

Comment Re:Or IS there even a genetic test?. (Score 1) 626

I'm not a geneticist but although they both started with the same genetic material there are mutations occurring ever since. Diseases and such can also cause additional differences in their DNA. The major source of DNA mutations you hear about is at the moment of "conception" but even a couple mutations after that would make you more "unique".

Of course, in the middle of a trillion DNA sequences, picking up those very few and small changes will be expensive. Most paternity and "identification" DNA tests rely on a few number of specific markers, which btw is why you usually hear things like 98%-99% accuracy and never 100%.

Comment Re:Human not freak show (Score 3, Insightful) 252

Those researchers can't exactly get funding to cure a single patient that's literally unique with a syndrome that most likely never happened or will happen again.

However, if you say she might have the key for the cure of cancer and to stop aging they sure will get funded fast. If by some miracle they find a possible cure in the process, there's a chance that she might get that cure where otherwise the chance is a fat zero.

Comment Re:Genius (Score 1) 143

Actually you make a good point there. Perhaps one possible solution for the much needed patent reform is based on scientific achievement. For example, it could be required that for a patent to be deemed useful you would need at least 2 research papers published on big peer-reviewed publications. The papers could even be funded by the patenter but between the submital and approval of the patent it had to be peer-reviewed and considered useful.

As a nice side effect, by funding a research paper directly or inspiring others for that research, patents would actually be stimulating innovation instead of just big-ass-companies' pockets.

Comment Re:Really? (Score 2) 195

I totally agree with you although I don't think you need to sell something to change the "moral" here.

For instance, if Google advertising their own products on their own services makes for an anti-trust case, then perhaps TV channels should also be forced to advertise the competion's schedule? No one forces you to use/watch either services and some channels are paid, so I fail to see the distinction here.

Comment Some possible models (Score 4, Interesting) 203

It heavily depends on what your product is, but you've at least these possible models:

1) Fully open source with lack or light documentation. This makes your product essentially free but users pay for support and/or the docs. I can't remember any specific example of a project selling the docs but I'm sure someone will.

2) Dual License model. A very popular example is ExtJS which is GPL (v3 iirc), however, if you wish to keep some code secret (including server parts) you might need a commercial license. And of course there are support plans available, as well as SVN/GIT access to the latest (devel) version.

3) Dual License with a Enterprise version. Essentially what MySql does where they offered an open source version but if you wanted fine tunned performance, support for enterprise hardware and support then you need the Enterprise version.

4) Dual License with long term support. Some projects like Liferay or Red Hat Enterprise use free versions as beta versions - after a while they release a long term supported version for enterprises and backport the important security and bug fixes. Maybe you already know but some companies are very slow to adopt new tech and ever slower to keep up, if they can keep a 4 year old version of the software that does the job well and still get support and bug fixes, you're best pals.

5) Early access model. Another possibility is to offer early access to new versions. For instance, the Xming project (a X11 server for Windows) offers donators access to new versions much earlier. You can even create a "pool" mode where you release the new version once X dollars are donated.

Depending on your target audience and the possibility of some of the adjustments required by those suggestions you might find a suitable model or cook some solution with ideas from several.

From someone in a similar spot, I wish you luck!

Comment I'm not a crypto expert but... (Score 1) 75

Sounds to me that this problem is simple to solve, even with a naive solution. Take for example a simple key agreement algorithm like Diffie-Hellman which (for the unfamiliar with the subject) allows 2 parties to reach a secret key (called K) with a simple set of math and shared parameters (which the hackers can get but can't really use them for their advantage/finding K).

With a simple key agreement and some fast cryptographic algorithm (maybe AES) all conversations could be secure no matter what the network security was. It can even be implemented on top of current protocols AFAIK. And if people suggest that the CPU power might be too great then I just would like to remember that nowadays almost every phone has a browser (even if it's a WAP browser) and that HTTPS already uses key agreement and encryption.

I also view this (suggestion of) improvement as raising the bar in protecting the public's privacy because with this protocol in place it would be very difficult/expensive for authorities to break and eavesdrop on people conversations. With a warrant however, the network providers (cell carriers and other phone services) could put in place a way for authorities to get the key to decrypt the conversation taking place.

I for one can't wait to see a green lock next to my in-call HUD.

Comment Re:C-sharp (Score 1) 565

The Windows Forms (the original Microsoft UI toolkit which Mono folks call M(anaged)WF) is very platform specific. That doesn't mean it won't work on other platforms. A good set of features is available on Mono and you can run a lot of MWF applications on Linux/OSX without code changes. That's not to say it will ever be perfect without some tuning or picking a better (cross platform) toolkit like GTK# which will work almost everywhere Mono supports (e.g. it even runs on Nokia devices!).

Slashdot Top Deals

We will have solar energy as soon as the utility companies solve one technical problem -- how to run a sunbeam through a meter.