Kuro5hin.org: technology and culture, from the trenches
create account | help/FAQ | contact | links | search | IRC | site news
[ Everything | Diaries | Technology | Science | Culture | Politics | Media | News | Internet | Op-Ed | Fiction | Meta | MLP ]
We need your support: buy an ad | premium membership | k5 store

Advertisement
Sponsor: dhecht  
San Francisco Colocation
Starting at just $99. Former Worldcom data center south of finacial district, bandwidth and remote reboot included.
comments (2)
discussions | active | buy ad

Who's Online? (87)
o Why havent I klercked myself
o mwright
o localroger
o zrail
o spooked
o bunk
o Macross
o somaudlin
o Myriad
o Greener
o drwav
o Roman
o issachar
o strabo
o Anonymous Heroes: 72
o Cloaked Users (1)

Note: You may cloak yourself from appearing here in your Display Preferences.

Technology Relaxen und watchen das blinkenlichten.


[P]
A Tutorial on Cutting Up a Breakbeat Using a Tracker (Technology)

By conner_bw
Mon Nov 14th, 2005 at 08:15:52 AM EST

Music

The arcane art of tracking takes what I like to think of as a hacker's approach to making music. The interface is primarily numeric, notes are entered via the keyboard, length, parameters, effects are often entered in hexadecimal notation, and code flies across the screen as if you were looking at the opening credits of The Matrix. What's not to like? This article is a tutorial for beginners, more specifically for nerds with no musical training, on how to start making electronic beats using the most sampled break in the history of recorded music.

Full Story (78 comments, 1639 words in story)


[P]
RFID Passports: Improved, but still flawed? (Technology)

By KC7GR
Mon Nov 7th, 2005 at 11:14:05 AM EST

Security

In February of 2005, the U.S. State Department published a proposed amendment, in the Federal Register, of U.S. passport regulations. The proposal sought public comment on the idea of embedding RFID chips in all newly-issued passports beginning in 2006.

Over 2,300 comments were received in response, and more than 98% of them were negative, focusing on privacy and security concerns. Since the initial proposal had no provisions for encryption or access control of the stored data, people were concerned (rightly so) that their identities could be snooped by anyone with appropriate reader equipment, at any time and without their knowledge.

Now, eight months later, the State Department has made some changes for their final draft. Do you think they went far enough?

Full Story (33 comments, 1046 words in story)


[P]
Sermon at the Soup Kitchen I-IV: How I Was Saved (Technology)

By MichaelCrawford
Sat Nov 5th, 2005 at 09:28:55 AM EST

Technology

I. October 28, 2005: I am working on a project with three young programmers and a manager. The oldest of the programmers is more than ten years younger than I. The manager is older, but does not know much about programming beyond how to check our code out of subversion and type "make" to check our progress.

I was talking to my buddy Leo Baschy yesterday about it. Leo's around the same age I am. He is a Rocket Scientist: he wrote MacsBug 6.2 when he worked for Apple, and spent several years writing an access control application that he is just now bringing to market. Leo Does Things Right. I told Leo I really enjoyed talking shop with someone who had a clue. But I said:

"When I talk to those guys about how to write better code I have the sense that their experience of me is like going to church."

"Many people go to church. How many are without sin?"

"But I didn't learn to preach because I studied at the seminary. It's because I was a derelict on skid row until I was saved by..."

Full Story (101 comments, 11029 words in story)


[P]
Toward Saner Version Control (Technology)

By skyknight
Tue Oct 25th, 2005 at 10:54:34 AM EST

Software

Software engineering is not just a technical domain, but also an intensely social one. Once a project team grows beyond a single developer, the need arises to coordinate the parallel efforts of multiple contributors. To this end source code management tools exist.

Full Story (257 comments, 2289 words in story)


[P]
What to do if a Virus targets/DDoS's your web site? (Technology)

By hulkster
Sat Oct 15th, 2005 at 11:22:07 PM EST

Help! (Ask Kuro5hin)

For years, I've had browser info and geolocation script on my web server that was a quick Perl/CGI hack. So normally, this script gets about a thousand hits/day, but there was a ten-fold increase starting October 4th, 2005. It continues to increase and a week later, there were 74,886 hits (almost one/second) from 8,206 unique IP addresses - YIKES! Complete data (including raw Apache log data) can be seen here.

Full Story (46 comments, 432 words in story)


[P]
How IBM Conned My Execs Out Of Millions (Technology)

By tyates
Wed Sep 28th, 2005 at 06:01:40 PM EST

Software

This is a first-person account of how IBM was able to con my execs out of millions of dollars. Gullible management tries to swim with the shark and gets chewed to pieces. Witness the exec-level FUD sales techniques and the $325/hr subcontractor labor bait and switch.

Full Story (172 comments, 2415 words in story)


[P]
To mock or not to mock (Technology)

By mirleid
Sun Sep 25th, 2005 at 06:07:58 PM EST

Software

Being involved in systems development in Java, I follow discussions on tools and techniques for testing code. One particular area of interest is mock-based approaches to unit testing, whereby you create simulacra of objects your code is dependent upon and use them to break dependencies so that you code may be tested in isolation. While going through some conference proceedings, I found this. And it shocked me to no end...

Full Story (58 comments, 1025 words in story)


[P]
AJAX - beyond the buzzwords (Technology)

By n8f8
Tue Aug 23rd, 2005 at 07:33:11 PM EST

Internet

Since Google decided to use SOAP/XMLHTTP for their new map interface the geek web has been flooded with AJAX articles. Here I will discuss the importance of AJAX as well as some of the tradeoffs developers will encounter if they choose to use this technology. More importantly, I have also posted a version of this article with a running demo on my website (recommended). You can also download the article source and try it for yourself.

Full Story (130 comments, 1081 words in story)


[P]
The Future Is Locked (Technology)

By verifex
Tue Aug 16th, 2005 at 01:00:28 PM EST

Freedom

New media formats such as HD-DVD and Blu-ray promise large capacities of space, at a cost. These new discs will be locked down using one method that dynamically updates the encryption system being used in your player. How this is implemented is still up in the air, but you can bet it is going to lean strongly on the side of protecting the contents of the disc at any cost. New audio CDs have special copy protections that make ripping tracks very difficult if not impossible. The broadcast flag was almost implemented this year, which would have restricted what you could and couldn't do with your TV. Some new software comes encrypted and crippled unless it calls home to the developer. We also have pictures with blaring watermarks obscuring the image yet informing the viewer of where the image came from. And finally, there are the laws making it illegal to tinker with these content restriction systems.

Full Story (91 comments, 1441 words in story)


[P]
A Case for Formal Specification (Technology)

By Coryoth
Sat Jul 30th, 2005 at 11:51:28 AM EST

Software

Formal Specification helps build more robust, more maintainable software with fewer bugs and defects. It has a long history, but it is still a developing field. While it may not be suitable for all software projects, a case can be made that there are many projects not currently using formal specification that stand to benefit from it. As the methods and tools for formal specification develop it is increasingly becoming something that developers and software engineers should learn to use to their advantage.

Full Story (151 comments, 2357 words in story)


Next 10 >>
Sponsors
Voxel dot net
o Managed Servers
o Managed Clusters
o Virtual Hosting


www.johncompanies.com
www.johncompanies.com

Looking for a hosted server? We provide Dedicated, Managed and Virtual servers with unparalleled tech support and world-class network connections.

Starting as low as $15/month
o Linux and FreeBSD
o No set-up fees and no hidden costs
o Tier-one provider bandwidth connections

Login
Make a new account
Username:
Password:

Note: You must accept a cookie to log in.

Poll
New Diary section slogan
o I'll show you the life of the mind (i.e. keep current slogan) 7%
o Bring me your trolls, your freaks, your dupe accounts 17%
o If you have nothing to say, you can say it here 40%
o For when your mom gets tired of your immature, callow rants 10%
o lol what 23%

Votes: 382 | Comments: 38
Results | Other Polls

Technology

Friday July 22nd
o Mary Poppins On Speed (41 comments)

Friday July 15th
o Client-side ADO using Javascript (82 comments)

Saturday June 25th
o Who Reviews the Reviewers? (56 comments)

Saturday June 18th
o GPL Programming: A Lucrative Hobby (95 comments)

Thursday June 9th
o Free software developers receive cease-and-desist letters (55 comments)

Wednesday June 8th
o Libre software developers receive cease-and-desist letters (51 comments)

Saturday May 28th
o So You Want to Make Textfiles (72 comments)

Friday April 15th
o Physical World Hyperlinks (109 comments)

Wednesday March 30th
o Growing Up With Computers (140 comments)

Monday March 21st
o Good Riddance to Bad Tech (103 comments)

Thursday March 3rd
o Leapfrogging Abstractions (178 comments)

Monday January 31st
o The Burning Retina (A LASIK Story) (154 comments)

Sunday January 30th
o Useful Dead Technologies (489 comments)

Friday January 28th
o Politics-Oriented Software Development (98 comments)

Monday December 13th
o Napier's Chessboard Calculator (45 comments)

Older Stories...

Section Stories
Browse all the newest headlines by section >>

Avatar
by mirleid
Fiction::/etc

Operation Teddy: P2P sharing is not illegal
by pik
Internet::Freedom

Fragile Equilibria
by skyknight
Op-Ed::Politics

RFID Passports: Improved, but still flawed?
by KC7GR
Technology::Security

Sermon at the Soup Kitchen I-IV: How I Was Saved
by MichaelCrawford
Technology::Technology

Life, Love and MMO's
by metavisual
Internet::Culture

CIA Holds Terror Suspects in Secret Prisons
by hardcorejon
MLP::Politics

New Diaries
What happens when we die?
by somaudlin

Blacks and gays and inferred context.
by bamcquern

What should I tell my family about my job search?
by Lemon Juice

ASK K5: How does one split up a string by commas into a vector in C++?
by kuroXhin

Male teacher has sex with underage student.
by bighappyface

DAMNIT
by AlwaysAnonyminated

Soundtracks for our software installations?
by IncubatedVitamin

Negroes
by eumenides

Barely Cognizant
by LilDebbie

Top Ecological Correlations With IQ: -Illegals, +Nordics, -Binge Drinking
by Baldrson

ATTN: LilDebbie
by New Me

I have a question
by Cro Magnon

ASH is amusing
by New Me

Computer mod
by weedaddict

Why did LilDebbie turn into a jerk?
by actmodern

kuro5hin.org

[XML]
All trademarks and copyrights on this page are owned by their respective companies. The Rest © 2000 - 2005 Kuro5hin.org Inc.
See our legalese page for copyright policies. Please also read our Privacy Policy.
Kuro5hin.org is powered by Free Software, including Apache, Perl, and Linux, The Scoop Engine that runs this site is freely available, under the terms of the GPL.
Need some help? Email help@kuro5hin.org.
If you can read this, you are sitting too close to your screen.

Powered by Scoop create account | help/FAQ | mission | links | search | IRC | YOU choose the stories! K5 Store by Jinx Hackwear Syndication Supported by NewsIsFree