Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Operating Systems

Submission + - Early Speed Tests For Windows 8

adeelarshad82 writes: You often hear in the software industry that performance optimization is one of the last steps in the software development process. That bodes well for Windows 8, considering at the early stage of Developer Preview—even before we've seen an actual beta—the nascent operating system is getting widespread praise for its performance, particularly in startup times. Anecdotal evidence is always encouraging, but PCMag decided to run some very early tests on the OS to see if the reports were wishful thinking or if there was a real, measurable boost in speed. Along with startup and shutdown times, they used several standard industry benchmarks to compare Windows 8 performance with that of Windows 7 running on the same machine.

Submission + - Do we need pseudonymous social networking?

An anonymous reader writes: While the idea of anonymous social networking sounds like an oxymoron, the use of pseudonyms to mask a user's online identity has a long history that stretches back to the earliest days of the Internet and local bulletin board systems (BBS). Such imperfect anonymity, which can often be unmasked with a few well-defined Google searches, has led to abuses like the invention of "spambots" and the persistence of forum trolls.

But, as the BBC reports pseudonyms, have their place in online communities, especially where identities are a risky commodity, under oppressive state regimes and governments where corporate interests increasingly dominate the interests of individuals: "Some users choose to hide their identity to avoid being found by people they would not like to be contacted by. Others live in countries where identification could have serious implications for those who have expressed political views or associated themselves with others who have."

Should Google+ and maybe even the notorious Facebook evolve into two-tiered sites where those who choose to remain anonymous are "identified" as such and denied access to certain site features, while being free to post, blog, or tweet their views, without summarily getting their accounts suspended or revoked?
Programming

Submission + - The Most Dangerous Programming Mistakes (infoworld.com)

snydeq writes: "Fatal Exception's Neil McAllister discusses the most dangerous programming mistakes, and what can be done to avoid them. 'Even more than input validation errors, this year's top 25 list is rife with application security blunders of all kinds. Some of them sound fairly esoteric, such as "inclusion of functionality from untrusted control sphere." But of all such errors, the highest-ranking one on the list is "missing authentication for critical function" — in other words, the attacker was able to gain access because there was no lock on the door to begin with,' McAllister writes. 'With the pace of Internet attacks accelerating, now is not the time to cut QA staff or skimp on testing and code review.'"

Slashdot Top Deals

One can search the brain with a microscope and not find the mind, and can search the stars with a telescope and not find God. -- J. Gustav White

Working...