Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Why JavaScript Is the New Perl

Pelam JavaScript: The Good Parts (453 comments)

JavaScript: The Good Parts by Douglas Crockford shows a way to write clean, conscise and predictable code in JavaScript. (It is also very short book, which I find hilarious. Even then the most important points in the book are in the first half or so.)

The most powerful idea IMHO is the use of function scopes as the main data structure instead of dictionaries. Another idea is avoiding or skipping completely some language features that behave in unusual ways and using simpler more fundamental constructs instead. I think the new-operator is the classic example of these.

I recommend this book wholeheartedly for anyone learning JavaScript and having some prior programming experience.

about 2 years ago

Ask Slashdot: Network Backup Solution Out of the Box?

Pelam Re:rsync? (251 comments)

If you solve the dual NAT problem separately then Duplicity is one good complete solution. It adds backup schedules, strong client-side encryption and is still able to do incremental backups. Setting it up requires one line of cron on the client side and some kind of remote account for storing the backup archives (SSH, SFTP, FTP). Choosing the correct command line options and handling the passwords requires some care though.

Duplicity uses the same base tech as rsync (librsync) and it's written in Python. It tries hard not to reinvent the wheel using tar for archive files and gpg for encrypting them. This means that extracting files from backups can even be done with standard tools if things get bad. It's available out of the box at least on Ubuntu and Debian. Also installing on CentOS went pretty smoothly with RPM available from project site.

more than 3 years ago

Some Windows Apps Make GRUB 2 Unbootable

Pelam Use Windows boot loader to boot Linux or other OS (429 comments)

If Windows and Windows programs insist on controlling the boot sector (and stuff that comes after it), you can still boot Linux.
At least starting with Vista, Windows has completely extensible boot loader of its own (the configuration data is called BCD).

The idea is that the Grub (or whatever) is installed on the same Linux *partition* where all the system files are installed (not on the MBR).
(At least Ubuntu installer has the option to install Grub on a partition instead of MBR out of the box.)

Windows boot loader is then used to load Grub from the beginning of that partition. No matter what
windows updates, programs etc. do this does not break.

Too bad that the default Linux installers don't support this option, since it
has been very hassle free for me at least. The initial setup could just as well be automatic.

Instructions for doing this manually here:


more than 4 years ago

Followup On Java As "Damaging" To Students

Pelam Re:Truth (626 comments)

At the beginning of my CS education in Helsinki, the hardest lesson was that I actually need to do some hard work to improve my skills and thinking.

Luckily the Math Department was happy to trash my overconfidence :) The CS department took quite a bit longer to reach the same level of complexity and depth that forced me to actually work hard instead of just relying on my intuition.

From what I gather, the global trend is to lower the bar and remove anything that might overwhelm people. In my view, being given challenges that seem too much at first is just the thing that is educational.

I probably learned much more from the first courses that I just barely passed than from the courses that I just breezed through, although sadly it took years for the lesson to really sink in.

about 7 years ago



Many DDR3 modules vulnerable to bit rot by a simple program

Pelam Pelam writes  |  about a month ago

Pelam (41604) writes "Researchers from Carnegie Mellon and Intel report that a large percentage of tested regular DDR3 modules flip bits in adjacent rows when a voltage in a certain control line is forced to fluctuate. The program that triggers this is dead simple, just 2 memory reads with special relative offset and some cache control instructions in a tight loop. The researchers don't delve deeply into applications of this, but hint at possible security exploits. For example a rather theoretical attack on JVM sandbox using random bit flips has been demonstrated before."
Link to Original Source


Pelam has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?