Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Open Source

Submission + - Type safety coming to DB queries

An anonymous reader writes: A new type-safe query language for the popular full-text search platform Solr, called Slashem (a Rogue-like), hash just been released. Slashem is implemented as a DSL in Scala providing compile time type-safety, allowing you do things like date range queries against date fields but keeping you from trying to do a date range query against a string field. Hopefully this trend catches on, resulting in less invalid queries exploding at runtime.
Open Source

Submission + - A new DSL for querying Solr

An anonymous reader writes: A new type-safe query language for Solr, called Slashem (a Rogue-like), hash just been released. Slashem is implemented as a DSL in Scala providing compile time type-safety, allowing you do things like date range queries against date fields but keeping you from trying to do a date range query against a string field. Hopefully this catches on, resulting in less invalid queries exploding at runtime.
Open Source

Submission + - Compile time type safety coming to ORMs

An anonymous reader writes: Who among us has not written a query that exploded at runtime? Some ORMs provide rudimentery checking (like making sure the field exists), but new open source projects from Foursquare are hoping to catch more errors at compile time. Named after popular RPGs, Rogue and Slashem (a rogue-like) provide compile time type safe querying for both Mongo and Solr.
Privacy

Submission + - Are Some CAs Too Big to Fail? (threatpost.com)

Trailrunner7 writes: In the wake of this weekend's revelations of the seriousness of the attack on certificate authority DigiNotar, security experts have renewed criticism of the Internet's digital certificate infrastructure, with some wondering if larger certificate authorities (CAs) might be too big to fail.

Would Mozilla and Microsoft and Google have revoked trust in root certificates from VeriSign or Thawte had they been compromised? Unlikely.

"It's not a simple matter of removing certificates from a database, because they're not in any databases," says researcher Moxie Marlinspike, who presented an alternative approach to the current SSL infrastructure last month at DEFCON. "We may never track them all down."

Open Source

Submission + - Automatic spelling corrections on Github

An anonymous reader writes: Github projects may be seeing a different kind of contributor than normal, a small little bot is now crawling projects contribution spelling corrections. It builds on top the github API and existing documentation style checking code. Future directions for the project look beyond spelling mistakes and at automated bug fixing on a large scale.
Programming

Google's Launches 2nd Android Developer Contest 26

coffeeisclassy writes "Google's second Android Developer Contest (ADC2) has started, despite some confusion around how to submit applications. The prizes are different from the first ADC, with each category having prizes of 100k, 50k, and 25k and an overall best of 150k,50k and 25k, meaning the best Android application from ADC2 is eligible for ~250k. The rules seem to allow any application never published before August 1st to compete, and the contest is open through the end of August (so break out your keyboards!). The top prizes are certainly less than that of first ADC, but with the prizes broken down by category, Google may be hoping to inspire some love for less popular categories."
Cellphones

Submission + - DeviceScape port to OpenMoko finished & availa

crazyirishhobo writes: As slashdot reported awhile ago on the start of a port of device scape to the OpenMoko, the port is now been completed and is available for public download. However like other things in the OpenMoko community (including the phones), it appears that it has reached the end of the line, with the developer behind it apparently moving to the Android platform.
Earth

Submission + - Classified evidence of global warming revealed (thinkprogress.org)

An anonymous reader writes: The Obama administration has released more than a thousand intelligence images of Arctic ice, following a declassification request by the National Academy of Sciences. These high-resolution spy photos of rapid sea ice loss off the northern coast of Alaska, kept classified by the Bush administration, show the devastating impact of global warming in the Arctic. The newly-declassified images also reveal the retreat of glaciers in Washington and Alaska.
Privacy

Submission + - Your browser history is showing

tiffanydanica writes: For a lot of us our browser history is something we consider private, or at least not something we want to expose to every website we visit.Web2.0collage is showing just how easy it is (with code!)for sites to determine what sites you visit. When you visit the site it sniffs your browser history, and creates a collage of the (safe for work) sites that you visit. It is an interesting application of potentially scary technology (imagine a job application site using this to screen candidates). You can jump right into having your history sniffed if you so desire. While the collages are cool on their own merit, they also serve as an illustration of the privacy implications of browser history sniffing.
The Internet

Submission + - omnomnom browser history (uwaterloo.ca)

An anonymous reader writes: What does your browser history look like when visualized? An awkward question for many ofhttp://slashdot.org/submit.pl us to be sure. A new open source project, web2.0collage.com, aims to answer this question using browser history sniffing. When you visit the page, using a combination of javascript & scheme code, it determine your browser history, fetches the icon's associated with them and combines it into a collage. Before you get too worried about visiting the site, uses a white-list of safe-for-work sites :) For those interested the AGPL'd code is only a click away.
Privacy

Submission + - Generating Meta-collages from browser history

bobdole3k writes: With some simple javascript & scheme code (under the AGPL) its possible to sniff a users browser history. A new browser history sniffing site uses this to generate a collage of the sites you visit. Before you get worried, it uses a list of "web2.0" sites, so the collage will (probably) be appropriate (unless you don't want your colleagues knowing about your slashdot/blogging habits). An interesting application of potentially scary technology. While the results by them selves are kind of interesting, the collage also serves as a cool illustration of the privacy concerns surrounding browser history sniffing.
Privacy

Submission + - Browser history sniffing illustrated

Anonymous Pants writes: A new open-source website, Web2.0 Collage, illustrates just how easy browser sniffing is. Once it's gotten a list of all the sites you visit it constructs a (somewhat creepy) collage graphically illustrating the websites you visit. Depending on your browser history the results can be nifty or creepy (fortunately it does use a filtered SFW list). While the results on it own are kind of interesting, it also serves as a cool way to illustrate the privacy concerns of browser history sniffing.
Security

Submission + - Website hijacks browser history & makes collag

itsamemario writes: With some basic javascript its possible to sniff a users browser history. A new browser history sniffing site uses this to generate a collage of the sites you visit. Before you get worried, it uses a list of "web2.0" sites, so the collage will (probably) be appropriate (unless you don't want your colleagues knowing about your slashdot/blogging habits). An interesting application of potentially scary technology. For those wanting to skip the warning screen and go straight to the browser sniffing this should do the trick. While the results by them selves are kind of interesting, it also serves as a cool way to illustrate the privacy concerns of browser history sniffing.

Slashdot Top Deals

We are experiencing system trouble -- do not adjust your terminal.

Working...