Microsoft Azure vs. Amazon Web Services, For Programmers
All That Cloud: Amazon, Google App Engine, Windows Azure, Heroku, Jelastic
The PHP Singularity
Ever since programming languages existed, they have been classified in 2 categories:
- Those every one bitches about,
- and those nobody uses...
Sounds clever, but it's plainly false.
C, Java, C# are among the most used languages today. Very few serious programmers will say that they are stupid or awful. And, many criticisms aside, most programmers respect them - even love them. I program in all these languages, I like them all, and I hate PHP with passion. It's not an issue of popularity; PHP, its community, its history, all of it, is a tale of terror.
Facebook Says Your Email Is @Facebook
Just do it.
I deleted mine over a year ago and haven't missed it for a second.
Obligatory condescending-meme link http://zipmeme.com/meme/25624/
But, yes, and also closed mine and never regretted it.
MariaDB and MySQL Authentication Bypass Exploit
I guess the db shouldn't answer to any requests outside from known address space.. but still..
There is something called "shared web hosting".
Unicode 6.1 Released
There's also a carrousel horse.
What To Do With a 1,000 Foot Wrecked Cruise Ship?
to a 300 meters Wrecked Cruise Ship.
Are Brain Teasers Good Hiring Criteria?
In my experience: They're a moderately good indicator of a special kind of intelligence; which is not a very useful indicator in the typical hiring process.
Puzzles help to distinguish programmers from lawyers. Not to discriminate good programmers from bad programmers.
Ask Slashdot: Free/Open Deduplication Software?
Dirvish does exactly this.
Marx May Have Had a Point
But identifying a problem is not identical to finding the correct solution.
It is a prerequisite, though.
A book of modern social inquiry has a shape that is somewhat sharply defined. It begins as a rule with an analysis, with statistics, tables of population, decrease of crime among Congregationalists, growth of hysteria among policemen, and similar ascertained facts; it ends with a chapter that is generally called "The Remedy." It is almost wholly due to this careful, solid, and scientific method that "The Remedy" is never found. For this scheme of medical question and answer is a blunder; the first great blunder of sociology. It is always called stating the disease before we find the cure. But it is the whole definition and dignity of man that in social matters we must actually find the cure before we find the disease .
G. K. Chesterton
Google Uncovers China-Based Password Collection Campaign
Some days ago I tried to login in http://www.linkedin.com/ , using my gmail address as my id.
I typed my linkedin password (as I remembered it) and an error appeared with this message:
"Invalid username and/or password. Please enter your email password, not your LinkedIn account password"
You can try that yourself, using any dummy email address.
I saved a screenshot here.
(notice that it's not even a secure -https- page!)
Ok, I said to my myself, it seems I must enter my google password... I entered it, press "continue"... and two seconds later I though:
"Wait a moment... What...? What I have done?? How can linkedin ask me to sent to THEM my Google password ? Are they nuts? Am I nuts?"
I immediately went to my Google account and changed my password, just in case. But I still can't understand it.
Dropbox Can't See Your Dat– Er, Never Mind
The old policy said our files were encrypted with mil-spec encryption, etc etc. Now they're telling us they'll turn our files over if asked.
I don't follow the reasoning, I really don't get the lie. Files are encrypted, but Dropbox system knows the encryption keys. That "employees" cannot decrypt them, it's an issue of internal privileges and internal security - I always assumed that we are speaking of support/maitainance people here. Mr root-Dropbox can read my files (if I've not encrypted them myself), I always have taken that for granted, as a Dropbox user.
To point to another privacy issue: it's well know, for example, that Dropbox has a clever management of file contents, based on hashes, to allow efficient renames and content sharing. Say I upload a porn clip and I call it "leaning_java.avi". If another user has upload the same clip with a truthful name, then dropbox is aware of that (and ot doesn't duplicate the storage bytes, just links both files to the same storage), and my upload is practically instantaneous. So, Dropbox knows that my "learning_java.avi" is the same file as pornaddict's file "anal_fest.avi". Go figure.
Happy Pi Day
I too was once an ardent pi supporter. However, I have seen the light... let us eliminate spurious factors of two everywhere and embrace a more reasonable transcendental number: tau
Agree. Pi es definitely overrated.
Firefox 4, A Huge Pile of Bugs
Bugzilla can run over http://www.bugzilla.org/docs/3.0/html/installation.html>mod_perl. Without it (in pure CGI use) it's a nightmare to use. With it, it can be tolerable.
I'd guess (I'd hope) bugzilla.mozilla.org runs mod_perl.
Bjarne Stroustrup Reflects On 25 Years of C++
C++ FQA (frequently questioned answers)
(Defective C++ is a summary)
'There are only two things wrong with C++: The initial concept and the implementation' - and other quotes
Why C++ sucks
And, previsibly: http://cplusplussucks.com/
Outlook Plug-In Keeps Tone of Your Email In Check
Google and see peppers here
Objective-C Enters Top Ten In Language Popularity
... I value most than Tiobe's dummy ranking, is the popularity of tags in Stackoverflow.
Granted, it correlates more with questions asked by programmers (many of them beginners)
than with jobs.
Anyway, you can see that also there "Objective-C" has a (surprising for me) high position (as well as "iPhone").
The Apple Paradox, Closed Culture & Free-Thinking Fans
You don't buy a computer because of its culture, you buy it because it serves you purposes better than other brands.
Often your real purpose is belonging to a culture (ie: being cool).
Firefox Most Vulnerable Browser, Safari Close
The funny thing is that the article seems to blame the browser for SQL Injection...
...all of the exploits blamed on the browsers are based on SQL Injections and propagating malicious code from the originator of the web..
No. "Vulnerabities in web aplications" is the total set, of which just 8% correspond to web browsers.
(From that 8%, the 44% goes to Firefox)
The remaining 92% are problems due to web servers and applications (phpMyAdmin, and so); SQL Injections among them.
I agree with many other posters, though, in that the report is bullshit, just some graphs and no information about how the data was obtained.
20 Years of MS Word and Why It Should Die a Swift Death
... should die a slow and horrible death.
Concrete Comparisons of Theora Vs. Mpeg-4
for the same bitrate (1000 kbit/s) the Mpeg-4 file is 5.2% bigger than the Ogg one;
Isn't this like saying "At the same speed (100 km/h) my car goes 10% faster than yours" ?
leonbloy hasn't submitted any stories.
leonbloy has no journal entries.