Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
Operating Systems

Submission + - Early Speed Tests For Windows 8

adeelarshad82 writes: You often hear in the software industry that performance optimization is one of the last steps in the software development process. That bodes well for Windows 8, considering at the early stage of Developer Preview—even before we've seen an actual beta—the nascent operating system is getting widespread praise for its performance, particularly in startup times. Anecdotal evidence is always encouraging, but PCMag decided to run some very early tests on the OS to see if the reports were wishful thinking or if there was a real, measurable boost in speed. Along with startup and shutdown times, they used several standard industry benchmarks to compare Windows 8 performance with that of Windows 7 running on the same machine.

Submission + - Google TV sales "Negative" (

starglider29a writes: In its fiscal first-quarter earnings release, Logitech said demand for the Revue, which works with special Google TV software to allow viewers to navigate Internet content, had been disappointing. The Swiss firm said customer returns of the Revue have outpaced the device's "very modest sales."

Submission + - Do we need pseudonymous social networking?

An anonymous reader writes: While the idea of anonymous social networking sounds like an oxymoron, the use of pseudonyms to mask a user's online identity has a long history that stretches back to the earliest days of the Internet and local bulletin board systems (BBS). Such imperfect anonymity, which can often be unmasked with a few well-defined Google searches, has led to abuses like the invention of "spambots" and the persistence of forum trolls.

But, as the BBC reports pseudonyms, have their place in online communities, especially where identities are a risky commodity, under oppressive state regimes and governments where corporate interests increasingly dominate the interests of individuals: "Some users choose to hide their identity to avoid being found by people they would not like to be contacted by. Others live in countries where identification could have serious implications for those who have expressed political views or associated themselves with others who have."

Should Google+ and maybe even the notorious Facebook evolve into two-tiered sites where those who choose to remain anonymous are "identified" as such and denied access to certain site features, while being free to post, blog, or tweet their views, without summarily getting their accounts suspended or revoked?

Submission + - Newly Discovered Quasar Defies Age of Universe (

jjp9999 writes: The brightest and most distant quasar ever discovered is giving astronomers a window to space 12.9 billion years old. The findings were published in the June 30 issue of the Journal Nature. Joshua Philipp wrote in his blog, TechZwn, that "the age of the quasar poses some difficult questions" as its intense light helped researchers conclude the black hole at its center has the mass of two billion suns. Matching its age and size with the Big Bang theory, however, the quasar is similar to “finding a 6-foot-tall child in kindergarten,” as noted by astrophysicist Marta Volonteri, in Science News. The European Southern Observatory (ESO), which found the quasar, wrote on its website “This very high mass is hard to explain so early on after the Big Bang."

Submission + - The Most Dangerous Programming Mistakes (

snydeq writes: "Fatal Exception's Neil McAllister discusses the most dangerous programming mistakes, and what can be done to avoid them. 'Even more than input validation errors, this year's top 25 list is rife with application security blunders of all kinds. Some of them sound fairly esoteric, such as "inclusion of functionality from untrusted control sphere." But of all such errors, the highest-ranking one on the list is "missing authentication for critical function" — in other words, the attacker was able to gain access because there was no lock on the door to begin with,' McAllister writes. 'With the pace of Internet attacks accelerating, now is not the time to cut QA staff or skimp on testing and code review.'"

Submission + - Anonymous strikes Malaysian govt (

durianwool writes: Anonymous has struck at least 10 Malaysian government portals in retaliation of last week's blocking of 10 popular file sharing sites like Pirate Bay. The sites have been defaced with the message,"Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world's strictest governments, even blocking out movies, and television shows.These acts of censorship are inexcusable. You are taking away a basic human right. The Internet is here for freedom, without fear of government interference. Do not think that no one else notices".

Currently the Malaysian government doesn't censor politically sensitive sites, but they have been accused of doing so during election campaigns, such as the 2-week DDOS attacks on Malaysiakini and Sarawak Reporter in April during the by-elections then. Those attacks were traced to apparrently to China. Are there cracker guns for hire there?

Just a matter of principle, shouldn't Anonymous attack places like China where they have effectively broken the Internet. Not only Pirate Bay is blocked, but IMDB to and most of Google.


Submission + - How the Internet Works for web design class? 3

cultiv8 writes: I am teaching an Intro to Web Design class this next fall at a local college that specializes in arts and design. This is the most "technical" class required for their major (other than the Adobe suite of software) and I'm looking for papers and resources that describe "how the internet works". Subjects I want to cover (during the course of 3 hours) include LAMP, TCP/IP & related protocols, DNS, principles of OSS, and why you should love your system admin. I'm searching for resources, preferably under a Creative Commons license, to distribute and share with students. Any recommendations?

Slashdot Top Deals

I have the simplest tastes. I am always satisfied with the best. -- Oscar Wilde