Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:So what? (Score 4, Informative) 271

I've occasionally daydreamed a fun academic paper would be to collect sets of password hashes, rub them up against a rainbow table, and make graphs and correlations and wild assumptions about the correlation coeff of IQ and rate of easily cracked pwd vs site etc etc. Sounds like fun so its probably been done before.

Yes, it's been done on 70 million passwords. See http://www.cl.cam.ac.uk/~jcb82/doc/B12-IEEESP-analyzing_70M_anonymized_passwords.pdf

Comment Re:adoption associated with.less productive employ (Score 1) 116

The rules of academic publishing are that you have to cite relevant related work. This includes both fresh results and old classics. Where possible, we tried to cite the most recent studies. Some studies that are appear dated indicate a research opportunity to update the corresponding area. Also, it would be wrong to dismiss a paper because of its age. Some of the older studies we cite present theoretical frameworks of enduring value and importance, demonstrated by the thousands of citations they have received over the years. For instance, the 2003 study by Venkatesh and his colleagues on the user acceptance of information technology, which we cite, has received almost five thousand citations. It would be wrong to ignore it, just because of its age.

Comment Re:adoption associated with.less productive employ (Score 2) 116

You have a point here. And you haven't mentioned the huge cost associated with procurement processes for proprietary software, especially in the public sector. These can drag on for months. In contrast, acquiring an open-source product is often simply a matter of a one-click download. Even if the organization's legal has trouble understanding open source licenses, this is a hurdle you have to overcome just once.
Open Source

Submission + - How do Big US Firms Use Open Source Software? (spinellis.gr)

Diomidis Spinellis writes: "We hear a lot about the adoption of open source software, but when I was asked to provide hard evidence there was little I could find. In a recently article we tried to fill this gap by examining the type of software the US Fortune 1000 companies use in their web-facing operations. Our study shows that the adoption of OSS in large US companies is significant and is increasing over time through a low-churn transition, advancing from applications to platforms, and influenced by network effects. The adoption is likelier in larger organizations and is associated with IT and knowledge-intensive work, operating efficiencies, and less productive employees. Yet, the results were not what I was expecting."
Censorship

Leave a Message, Go To Jail 486

Okian Warrior writes "A man in Weare, New Hampshire was charged with felony wiretapping for recording the police during a traffic stop — based on a cell phone call he made as an officer approached his vehicle. From the article: Police considered it wiretapping because the call was being recorded by a voice mail service without the officer's consent."
Security

Submission + - Content poisoning in p2p networks (usc.edu)

Diomidis Spinellis writes: "Two UCLA researchers published a paper in the prestigious IEEE Transactions on Computers that describes a technique for p2p content poisoning targeted exclusively on detected copyright violators. Using identity-based signatures and time-stamped tokens they report a 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet and a 85-98 percent prevention rate on eMule, eDonkey, and Morpheus. Poison-resilient networks based on the BitTorrent protocol are not affected. Also the system can't protect small files, like a single song MP3. Although the authors don't say so explicitly, my understanding is that the scheme is only useful on commercial p2p distribution systems that adopt the proposed protocol."
Microsoft

Submission + - Microsoft tries a new ad agency (economist.com)

Diomidis Spinellis writes: "An article in this week's Economist outlines Microsoft's marketing response to Vista's travails and Apple's hip Get a Mac campaign. Describing the recent Mojave Experiment as "Microsoft at its worst", the article''s writer wonders whether hiring a new hot ad agency, Crispin Porter + Bogusky, to put together a $300m campaign can make Microsoft look cool. Can money buy you love?"

Comment Re:"Code quality" is bunk (Score 1) 252

A few hours after replying to the "code quality is that it 'works'" comment, I read Joseph Bergin's Do the Right Thing design pattern in an IEEE Software article. I found it quite funny.

The absolute worst part of critiques like yours is the ideas it gives pin headed MBAs who bungee jump into engineering departments, book in hand, with no practical experience. The ideas spouted by the book become the drive, not the product. It is an almost certainty the project will be dreadfully late or never finished.
I absolutely agree.
Programming

Submission + - Open and closed source kernels go head to head (spinellis.gr)

Diomidis Spinellis writes: "Earlier today I presented at the 30th International Conference on Software Engineering a research paper comparing the code quality of Linux, Windows (its research kernel distribution), OpenSolaris, and FreeBSD. For the comparison I parsed multiple configurations of these systems (more than ten million lines), and stored the results in four databases, where I could run SQL queries on them. This amounted to 8GB of data, 160 million records. (I've made the databases and the SQL queries available online.) The areas I examined were file organization, code structure, code style, preprocessing, and data organization. To my surprise there was no clear winner or looser, but there were interesting differences in specific areas."

Slashdot Top Deals

Gravity is a myth, the Earth sucks.

Working...