Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

The State of Ruby VMs — Ruby Renaissance 89

igrigorik writes "In the short span of just a couple of years, the Ruby VM space has evolved to more than just a handful of choices: MRI, JRuby, IronRuby, MacRuby, Rubinius, MagLev, REE and BlueRuby. Four of these VMs will hit 1.0 status in the upcoming year and will open up entirely new possibilities for the language — Mac apps via MacRuby, Ruby in the browser via Silverlight, object persistence via Smalltalk VM, and so forth. This article takes a detailed look at the past year, the progress of each project, and where the community is heading. It's an exciting time to be a Rubyist."

Major Snow Leopard Bug Said To Delete User Data 353

inglishmayjer was one of several readers to send in the news of a major bug in Apple's new OS, 10.6 Snow Leopard, that can wipe out all user data for the administrator account. It is said to be triggered — not every time — by logging in to the Guest account and then back in to the admin account. Some users are reporting that all settings have been reset and most data is gone. The article links to a number of Apple forum threads up to a month old bemoaning the problem. MacFixIt suggests disabling login on the Guest account and, if you need that functionality, creating a non-administrative account named something like Visitor. (The Guest account is special in that its settings are wiped clean after logout.) CNet reports that Apple has acknowledged the bug and is working on a fix.
Social Networks

Facebook User Arrested For a Poke 394

nk497 writes "A woman in Tennessee has been arrested for poking someone over Facebook. Sharon Jackson had been banned by courts from 'telephoning, contacting or otherwise communicating' with the apparent poke recipient, but just couldn't hold back from clicking the 'poke' button. She now faces a sentence of up to a year in prison."

Comment Re:Didn't they make a movie or two about this (Score 1) 102

lower level soldiers can get there net access cut back or removed when needed to provide command guaranteed access to the network when they need it.

Ding Ding Ding. This is taking what we already have in the DSN military phone system and applying it to the tactical and strategic networks. This is more of an issue on the tactical Joint Network Node (JNN) networks as the military continues to expand with the entire BCS suite. CPOF alone demands priority networks to work well between sites. As everything gets digitized the network is getting saturated and it cant grow like this without some sort of traffic control. A JNN can take a good amount of load but the associated Command Post Nodes (CPN) max out real quick.

Comment Re:If you're downloading music at work... (Score 2, Informative) 451

In a DoD environment I Tunes, Amazon Downloader, and other legal forms of downloading music are prohibited from being on the systems as being outside the baseline. I can only speak for the Army but the regulation does not consider music in general stealing. Quoting from AR 25-2 page 27...

(7) Certain activities are never authorized on Army networks. AUPs will include the following minimums as
prohibited. These activities include any personal use of Government resources involving: pornography or obscene
material (adult or child); copyright infringement (such as the sharing of copyright material by means of peer-to-peer
; gambling; the transmission of chain letters; unofficial advertising, soliciting, or selling except on authorized
bulletin boards established for such use; or the violation of any statute or regulation.

In short DISA wrote bad flash training on this one scenario. DoD 8500 series and agency specific regulations DO NOT refer to it as stealing.

Comment Re:Does anyone actually USE IE anymore? (Score 1) 280

Chrome does not install in /programs, so it can be installed in machines at work with ease; kind of a big FU from google to MS and IT departments. I wish the installers for all other browsers followed suit.

While is might be OK to say FU to MS, saying FU to IT departments ensures that it wont be installed per company policy. Anything that you want business to adopt on a serious scale has to be something they can manage across the company with ease. For Windows that means being able to mange settings and restrictions through group policy and having an MSI installer. Without that company policy will not really change because IE's management cost is already accepted as part of the enterprise while you have to have a separate process for Firefox. If your running MS on the desktop, the plan is built in for IE making any other cost extra. I realize that both are available for Firefox BUT they come from organizations other than Mozilla. While IT might be fine with getting it from an outside source, management defiantly balks on this.

Comment Re:Enforcing compliance... (Score 1) 194

3. Inspector then moves on to the server room, where Linux is installed. Inspector can't determine that "latest Microsoft patches are installed", so machines are marked as non-compliant.

The FederalGgovernment uses Linux as well and there are published security standards for it. The NSA and DISA both publish security guides and implementation guidelines for Linux. NSA Secure Configuration Guides DISA STIGS . This will require training for your typical enforcement droid but is not out of reach. To say that regulation would require Microsoft only is ignoring the fact that *nix is very much in use in the Federal Government

Comment Re:EFS? (Score 1) 121

The multiple computer problem in a domain is solved by setting up a PKI through certificate services. This combined with a logon script to encrypt the profile directory takes care of those problems. If you are doing EFS on a large scale in a domain you would be crazy not to use a PKI. Another advantage to this is should the certificate get lost you can set recovery keys that a admin can use to decrypt the data.

This can also in a windows domain be used to create bitlocker keys as well which encrypts the entire system.


2009, Year of the Linux Delusion 696

gadgetopia writes "An article has come out claiming (yet again) that 2009 will be the year of Linux, and bases this prediction on the fact that low-power ARM processors will be in netbooks which won't have enough power to run Windows, but then says these new netbooks will be geared to 'web only' applications which suits Linux perfectly. And, oh yeah, Palm might save Linux, too." The article goes on to skewer the year of Linux thing that seems to show up on pretty much every tech news site throughout December and January as lazy editors round out their year with softball trolling stories and "Year End Lists." We should compile a year-end list about this :)

Researchers Test Whether Sharks Enjoy Christmas Songs 142

Scientists plan to test whether sharks enjoy listening to Christmas pop songs, after US research showed fish could recognize melody. Chris Brown, senior marine biologist at the Loch Lomond aquarium, said seasonal music would be played through walkthrough underwater tunnels where they can be heard by dozens of nurse sharks, black-tip reef sharks, and ray species. Experts will then monitor the sharks' reactions to different songs. We'll play everything from Kim Wilde and Mel Smith's Rocking Around the Christmas Tree and Merry Christmas Everybody by Slade to Wham's Last Christmas. We may find they prefer something softer like White Christmas by Bing Crosby," Brown said. Thank you for answering this question science.
First Person Shooters (Games)

Submission + - Team Fortress for Source Released (

Anonymous Coward writes: "Finally, the much anticipated Team Fortress-inspired Half-Life 2 modification, Fortress Forever, has been released! If you ever played ye'olde QuakeWorldTF, the ever-popular TFC for Half-Life, or any of the many other variations, Fortress Forever is right up your alley."

Slashdot Top Deals

"The value of marriage is not that adults produce children, but that children produce adults." -- Peter De Vries