Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:That's a billion people (Score 1) 126

Since GA is based off of Urchin, I assume that they are using something close to it. Urchin works off of a server's access logs. Primarily, it tries to set a cookie that is then used for tracking. The standard practice is to modify the access logs to include that tracking token in the log entry. If no cookie can be set, then it approximates a session based on source IP, user-agent, referrer, time between requests, etc.

I would imagine that most people are being counted multiple times, thus inflating the number considerably.

Comment What are the intention? (Score 2) 61

Some companies get patents for defensive purposes to ensure no one else patents it and uses it against them. I had a serious knee-jerk reaction when my employer sent out an email advertising our patent program. The explanation I got was that we weren't going to be patenting stuff to keep others from doing those things, but to patent them before others do so that we can't be sued. Facebook could be doing just that. In that same email, I was told that the company despises the state of IP and have active lobbying efforts to change things. I felt much better about my employer after hearing all of that.

Comment Re:I'm not giving them my data! (Score 3, Insightful) 396

It sounds like you're not the type of person that is the target of most managed solutions. Cloud products aren't right for everyone and certainly not for every application. Cloud solutions won't ever take the place of bare-metal hardware for folks that need it. I am an operations admin for a cloud product and I have no problem telling customers when their stuff just isn't the right fit for our product. But, what's not right for you, doesn't make it wrong for everyone else.

Comment Stop being a douche (Score 5, Insightful) 539

As someone that works in support for a hosting provider, you're the type of customer that irritates me the most. While they shouldn't be rebooting your box to get root access without your consent, you should at least help them help you. Give them an account with limited sudo access to view your logs. If that won't do, then provide them with the necessary logs. If that's not good enough, don't expect support and move your stuff to some place that doesn't provide the level of support you're paying for.
GNU is Not Unix

Submission + - Joomla! GPL Compliance Issues Sparks Upheaval (

jascat writes: "An article at highlights the recent flap with developers of closed-source extensions to the Joomla! Content Management System after Open Source Matters, Inc., the organization created by the Joomla! developers to serve as protector of Joomla! and copyright owner, announced that such extensions violate the GPL.

Joomla! project leader Louis Landry and his colleagues want to protect the project they love. That's why, after two years of allowing proprietary plugins for the open source CMS, the group has decided to ask third-party developers for voluntary compliance with the terms of the GNU General Public License, under which Joomla! is licensed. Those developers are complaining that it's unfair for Joomla! to reverse its position after "a bunch of companies spent millions," according to one developer employed by a company that markets the proprietary extensions. Landry says he and the Joomla! team were wrong to have allowed the exceptions, and a return to compliance is essential in order to legally protect the open nature of Joomla!."


Submission + - Scanning Ajax for XSS Entry Points

An anonymous reader writes: Ajax code loaded in browser can have entry points to XSS and it is the job of the security analyst to identify these entry points. It is difficult to decisively conclude that possible entry points to an application can be exploited. One may need to do a trace or debug to measure the risk of these entry points. This paper introduces you to a quick way to identify XSS entry points in an application.

Submission + - Robert Adler, co-inventor of TV remote, dead at 93

yroJJory writes: "Hit the mute button for a moment of silence: The co-inventor of the TV remote, Robert Adler, has died. Adler, who won an Emmy Award along with fellow engineer Eugene Polley for the device that made the couch potato possible, died Thursday of heart failure at a Boise nursing home at 93, Zenith Electronics Corp. said Friday.

In his six-decade career with Zenith, Adler was a prolific inventor, earning more than 180 U.S. patents. He was best known for his 1956 Zenith Space Command remote control, which helped make TV a truly sedentary pastime.

In a May 2004 interview with The Associated Press, Adler recalled being among two dozen engineers at Zenith given the mission to find a new way for television viewers to change channels without getting out of their chairs or tripping over a cable.

Adler also was considered a pioneer in SAW technology, or surface acoustic waves, in color television sets and touch screens. The technology has also been used in cellular telephones.

The U.S. Patent and Trademark Office published his most recent patent application, for advances in touch screen technology, on Feb. 1."
The Courts

Submission + - GPL click-through licenses?

Kuciwalker writes: It seems that every other open-source program I download includes the GPL as a click-through license during the install. What's the point of this? If the GPL is a distribution, not use license then I don't do anything by agreeing to it during installation. Are we just so acclimated to clicking "yes" to an EULA, or are there valid legal reasons it's put there?

Submission + - Search for New Autism Genes

iuvasago writes: "The largest search for autism genes to date, funded in part by the National Institutes of Health (NIH), has implicated components of the brain's glutamate chemical messenger system and a previously overlooked site on chromosome 11. Based on 1,168 families with at least two affected members, the genome scan adds to evidence that tiny, rare variations in genes may heighten risk for autism spectrum disorders (ASD). [Read More] from"

Tech Toys Dominate Toy Fair 2007 48

Edis Krad writes "An CNN Money article previews the Hot Toys for 2007 from this past week's Toy Fair. The article is a great place to start looking through the hundreds of new products that were on display at the annual industry event. Among those featured in the article, I was particularly impressed with the Video Journal (blogging for kids?), the virtual bicycle (apparently, riding a real bicycle isn't cool enough anymore), and last but not least, the robotic parrot, that oddly reminds me of the replicant owl in Blade Runner. For more details on tech toys at the event, IEEE Spectrum has a rundown on the nerdier toys available. Artificial snow and a pre-assembled Mentos/Coke kit were two of that journalist's favorites. For different perspectives Forbes has a look at the toy business as it stands since last week, and Wired's Luddite column crabs that kids have too many techie toys nowadays. Dagnabit."

Submission + - New bill that will curb outrageous cell phone tax

ziggz writes: "If you have a cell phone, then you are probably aware that you are paying much more each month than the calling plan you signed up for. Why? Greedy Uncle Sam is hitting you up with double digit taxes. Everyone is required to pay a 6.05% federal tax plus all kinds of various trumped up state taxes. Baltimore, for example, simply decided to add a $3.50 additional tax to their residents' bills in 2005. A USA today article breaks down the total taxes you are paying by state, most averaging 15% or more. States have gotten so ridiculous in hiding taxes on your cell phone bill that Congress has finally stepped up by introducing the Cell Phone Tax Freedom Act of 2007. You can also have emails sent to your congressmen."

Submission + - "Happy 2nd Birthday, AJAX!" Say Pre-AJAX P

jg21 writes: AJAXWorld Magazine celebrates the second birthday of the coining of AJAX by going behind the scenes and asking the early pioneers of rich applications delivered into web browsers how it was for them from February 18, 2005, when suddenly a single, easy-to-comprehend term arrived to help them propagate their new-web goals.

Slashdot Top Deals

Prototype designs always work. -- Don Vonada