Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:Am I Confused? (Score 2) 700

NP: set of problems you can solve in polynomial time on a non-deterministic Turing Machine
P: ...on a deterministic TM

Any problem in NP can be reduced to an NP-Complete problem (clique, vertex cover, 3-SAT, etc...) in polynomial time.

So, if you have an algorithm to solve an NP-Complete (like 3-SAT) problem in p(n) on a deterministic Turing Machine then you have NP == P.

Programming

What Programming Language For Linux Development? 997

k33l0r writes "Recently I've been thinking about developing (or learning to develop) for Linux. I'm an IT university student but my degree program focuses almost exclusively on Microsoft tools (Visual Studio, C#, ASP.NET, etc.) which is why I would like to expand my repertoire on my own. Personally I'm quite comfortable in a Linux environment, but have never programmed for it. Over the years I've developed a healthy fear of everything Java and I'm not too sure of what I think of Python's use of indentation to delimit blocks. The question that remains is: what language and tools should I be using?"
Government

Army Buys Macs to Beef Up Security 342

agent_blue writes "The Army is integrating Macs into their IT network to thwart hack attempts. The Mac platform, they argue, is more secure because there are fewer attacks against OS X than Windows-based systems. 'Military procurement has long been driven by cost and availability of additional software--two measures where Macintosh computers have typically come up short against Windows-based PCs. Then there have been subtle but important barriers: For instance, Macintosh computers have long been incompatible with a security keycard-reading system known as Common Access Cards system, or CAC, which is heavily used by the military. The Army's Apple program, created [in 2005], is working to change that.'"
Software

What's the Right Amount of Copy Protection? 561

WPIDalamar writes "I'm currently working on a piece of commercial software that will be available through a download and will use a license key to activate it. The software is aimed at helping people schedule projects and will be targeted mostly to corporate users. With the recent Windows Vista black screen of death, it got me thinking about what sort of measures I should go through to prevent unauthorized users from using the software. While I don't wish to burden legitimate users, I do want to prevent most piracy. How much copy protection is appropriate? Is it acceptable for the software to phone home? If so, what data is appropriate to report on? The license key? Software version? What about a unique installation ID? Should I disable license keys for small amounts of piracy, like when there's 3 active installations of the software? What about widespread piracy where we detect dozens or hundreds of uses of the same license key? Would a simple message stating the software may be pirated with instructions on how to purchase a valid license be sufficient?"
It's funny.  Laugh.

Realtime ASCII Goggles 331

jabjoe writes "Russian artists from Moscow have created goggles with realtime image filtering. Among the Photoshop-like filters that can be applied is, interestingly, ASCII: you can view the world in real time as ASCII. Pointless but cool."
GNU is Not Unix

New Method To Detect and Prove GPL Violations 218

qwerty writes "A paper to be presented at the upcoming academic conference Automated Software Engineering describes a new method to detect code theft and could be used to detect GPL violations in particular. While the co-called birthmarking method is demonstrated for Java, it is general enough to work for other languages as well. The API Benchmark observes the interaction between an application and (dynamic) libraries that are part of the runtime system. This captures the observable behavior of the program and cannot be easily foiled using code obfuscation techniques, as shown in the paper (PDF). Once such a birthmark is captured, it can be searched for in other programs. By capturing the birthmarks from popular open-source frameworks, GPL-violating applications could be identified."
Music

The CD Turns 25 Today 326

netbuzz writes "Seems like only yesterday to those of us of a certain age, but the CD turns 25 today. Philips, maker of the first CD on Aug. 17, 1982, estimates that more than 200 billion have been sold since. The younger set might have trouble appreciating the difference in auditory quality that the compact disc represented over vinyl or cassette tapes (some have probably never even seen a record). And all but true trivia buffs will have trouble coming up with the name of the artist on that first disc."
The Courts

RIAA Short on Funds? Fails to Pay Attorney Fees 341

NewYorkCountryLawyer writes "Can it be that the RIAA, or the "Big 4" record companies it represents, are short on funds? It turns out that despite the Judge's order, entered a month ago, telling them to pay Debbie Foster $68,685.23 in attorneys fees, in Capitol v. Foster, they have failed to make payment. Ms. Foster has now had to ask the Court to enter Judgment, so that she can commence 'post judgment collection proceedings'. According to Ms. Foster's motion papers (pdf), her attorneys received no response to their email inquiry about payment. Perhaps the RIAA should ask their lawyers for a loan?"

Bank Run in Second Life 336

Jamie found an interesting bit about a bank run in Second Life. The recent ban on gambling combined with a $12k theft from the 2L stock market has caused people to try to get their money back. The article mentions that this could supposedly affect 8.5M players even tho most estimates of actual hard core players in the system are in the 5 to low 6 figure range.
Bug

Symantec Updates Cause Chaos in China 266

Hello Kitty writes "According to Computerworld, a signature update to Symantec's anti-virus software has knocked out thousands of Chinese PCs. Apparently the latest update for the AV component of the various Norton packages mistook two system files in the Chinese edition of Windows XP SP2 for the 'Backdoor.Haxdoor' trojan. Piracy issues may complicate recovery, since once the updates are installed Symantec says the only hope for reviving an affected system is to re-copy the affected DLLs from the Windows restore disks. Everyone has their official restore disks handy, right?"
Security

AACS Revision Cracked A Week Before Release 346

stevedcc writes "Ars Technica is running a story about next week's release of AACS, which is intended to fix the currently compromised version. The only problem is, the patched version has already been cracked. From the article: 'AACS LA's attempts to stifle dissemination of AACS keys and prevent hackers from compromising new keys are obviously meeting with extremely limited success. The hacker collective continues to adapt to AACS revisions and is demonstrating a capacity to assimilate new volume keys at a rate which truly reveals the futility of resistance. If keys can be compromised before HD DVDs bearing those keys are even released into the wild, one has to question the viability of the entire key revocation model.'"

Hilf Claims Free Software Movement Dead 395

moe1975 writes to mention that Bill Hilf has taken a rather aggressive stance with regard to the status of the Free Software movement. With claims like; "The Free Software movement is dead. Linux doesn't exist in 2007. Even Linus has got a job today" it would certainly seem that the next offensive is going to be sponsored by denial. "For the desktop, Hilf sees a new frontier in terms of rich client programming. With more and more services by Amazon, Google, Yahoo and, of course, Microsoft being run as services rather than as software installed locally, it will be up to the desktop to provide richer functionality."

Slashdot Top Deals

The best things in life go on sale sooner or later.

Working...