Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:So what? (Score 4, Informative) 271

I've occasionally daydreamed a fun academic paper would be to collect sets of password hashes, rub them up against a rainbow table, and make graphs and correlations and wild assumptions about the correlation coeff of IQ and rate of easily cracked pwd vs site etc etc. Sounds like fun so its probably been done before.

Yes, it's been done on 70 million passwords. See http://www.cl.cam.ac.uk/~jcb82/doc/B12-IEEESP-analyzing_70M_anonymized_passwords.pdf

Comment Re:adoption associated with.less productive employ (Score 1) 116

The rules of academic publishing are that you have to cite relevant related work. This includes both fresh results and old classics. Where possible, we tried to cite the most recent studies. Some studies that are appear dated indicate a research opportunity to update the corresponding area. Also, it would be wrong to dismiss a paper because of its age. Some of the older studies we cite present theoretical frameworks of enduring value and importance, demonstrated by the thousands of citations they have received over the years. For instance, the 2003 study by Venkatesh and his colleagues on the user acceptance of information technology, which we cite, has received almost five thousand citations. It would be wrong to ignore it, just because of its age.

Comment Re:adoption associated with.less productive employ (Score 2) 116

You have a point here. And you haven't mentioned the huge cost associated with procurement processes for proprietary software, especially in the public sector. These can drag on for months. In contrast, acquiring an open-source product is often simply a matter of a one-click download. Even if the organization's legal has trouble understanding open source licenses, this is a hurdle you have to overcome just once.
Open Source

Submission + - How do Big US Firms Use Open Source Software? (spinellis.gr)

Diomidis Spinellis writes: "We hear a lot about the adoption of open source software, but when I was asked to provide hard evidence there was little I could find. In a recently article we tried to fill this gap by examining the type of software the US Fortune 1000 companies use in their web-facing operations. Our study shows that the adoption of OSS in large US companies is significant and is increasing over time through a low-churn transition, advancing from applications to platforms, and influenced by network effects. The adoption is likelier in larger organizations and is associated with IT and knowledge-intensive work, operating efficiencies, and less productive employees. Yet, the results were not what I was expecting."
Security

Submission + - Content poisoning in p2p networks (usc.edu)

Diomidis Spinellis writes: "Two UCLA researchers published a paper in the prestigious IEEE Transactions on Computers that describes a technique for p2p content poisoning targeted exclusively on detected copyright violators. Using identity-based signatures and time-stamped tokens they report a 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet and a 85-98 percent prevention rate on eMule, eDonkey, and Morpheus. Poison-resilient networks based on the BitTorrent protocol are not affected. Also the system can't protect small files, like a single song MP3. Although the authors don't say so explicitly, my understanding is that the scheme is only useful on commercial p2p distribution systems that adopt the proposed protocol."

Slashdot Top Deals

Heisenberg may have slept here...

Working...