Movies

Article about The Lord of the Rings MASSIVE Crowd 304

TheOneRing.net has posted an article going indepth about LotR CGI, and specifically the rendering of extremely large crowds being done byWETA Digital. With the special edition due out soon, and TTT coming out in december, well let's just leave it at "Yay".
Spam

Working Bayesian Mail Filter 313

zonker writes "A real, working honest to god Bayesian spam filter. I've been waiting for something like this for a while (since I first read Paul Graham's research paper on this very topic a few weeks ago). Well here's POPFile, a small but extremely effective Perl script that runs on just about any system Perl does. After just a little training was I able to get very effective filtering out of it. From what I understand the new email client that comes with OS X Jaguar has a feature similar to this, but I don't know if it is true Bayesian. Hopefully this kind of feature will become more prevalant in client software as I see the Google results for it are growing."
Programming

ActiveState releases Komodo for GNU/Linux 38

TorinEdge writes "ActiveState has finally released (as in out of Beta) their Komodo IDE for the GNU/Linux platform! Komodo is an integrated dev environment for open source languages. It provides colour-coded editing (and "code-folding" for collapsing sections of code), debugging etc... It's optimized for Perl, Python, PHP, Tcl, and XSLT. Includes the RxToolkit for testing/checking your regular expressions; a godsend. Get it while it's hot!"
Perl

Use Perl to port Windows DLLs to Palm OS 13

developerWorks writes "Porting existing Windows DLLs to Palm OS has historically been a tedious process. This article introduces you to an interesting technique that makes this process easier by using Perl. It demonstrates a Perl script that analyzes existing C source code and automatically generates many of the source files required for porting. You should be able to use the code outlined in the article to help with your own porting projects."
Programming

Overspecialization in the Computer Field? 120

The Mainframe asks: "I visited a nameless college campus recently and was shocked at the degree of specialization within the student body. Of the many CS and other IT-related majors that I talked to, not a single one had any real breadth of experience. Web developers knew Perl, but couldn't tell Apache from MySQL. C++ coders knew their language, as long as it was presented in Microsoft Visual C++. I suspect if I'd asked them to use G++ they would have said 'bless you'. Essentially, I'm worried. I plan to do some very interesting things in the next few years, but I'm not going to be able to pull it off if I have to wade through 100 narrow-minded people for every 1 useful human being. Is this something that other employers and co-workers have been having a lot of problems with? Is the whole world having to show its database developers how to use a copying machine?"
GNU is Not Unix

MITRE Corp. Report On Open Source In Government 289

Jeremy Allison (of the Samba team) writes "Very interesting paper just published by MITRE corporation. (In PDF - they've learned not to use Microsoft Word. :-). Highlights: 'The main conclusion of the article was that FOSS software plays a more critical role in the DoD than has generally been recognised.'; 'Create a "Generally Recognised as Safe" FOSS list ... including Linux, OpenBSD, NetBSD, FreeBSD, Samba, Apache, Perl, GCC, GNAT, XFree86, OpenSSH, bind, and sendmail.' 'FOSS' stands for 'Free and Open-Source Software.' Looks like these people 'get it.'"
Perl

Embed Perl With Mason -- Read All About It 37

autarch writes "Embedding Perl in HTML with Mason, written by Ken Williams and me, is now available at booksellers of distinction. Mason is a Perl-based templating system and application framework. The book covers Mason from the basics on up to extending the Mason core with your own subclasses. For more details check out our web site and the O'Reilly site. The latter includes the TOC and a sample chapter."
Microsoft

Tim Bray on Microsoft Office 589

jgeelan writes "The co-inventor of XML, Tim Bray, has been talking about the newly XML-enabled version of Microsoft Office, code-named 'Office 11' and tells XML-Journal that 'when the huge universe of MS Office documents becomes available for processing by any programmer with a Perl script and a bit of intelligence, all sorts of wonderful new things can be invented that you and I can't imagine.'"
Perl

Obtaining Shell Access via AIM? 88

Quicksilver31337 asks: "I have recently been faced with a challenge of getting shell access via a AIM(for mobile access purposes), where Perl would be used to recieve messages (prolly from specified users only) over AIM, and pass them as shell commands, and finally, returning output to the user over AIM again. Its seems to be possible to me (maybe using Net::AIM) and I was wondering if anyone has tried something similar with success. Thanks."
Programming

Postmodern Computer Science 390

gnat writes "Two New Zealand computer scientists have a paper accepted for OOPSLA called Notes on Postmodern Programming, which identifies shortcomings in traditional views of computer science. With a section on the difference between "The Matrix" and the net, a bulleted list of new approaches called "We're All Devo", and a section called "Messy is Good" consisting of nothing but a scan of a hand-drawn diagram, this is not your father's computer science paper. It's thought-provoking stuff, though. And you know they did their homework--they cite Larry Wall's Postmodern Perl talk."
Perl

Extending and Embedding Perl 145

habit forming writes "Enjoy using Perl? Ever marvel at how Perl can "do the right thing" but still be written in C? Extending and Embedding Perl aims to take the black magic out of understanding our favorite language. In fact, the authors flat out admit they think it is unfair that only so few of us get to have one foot in Perl and one in C. Tim Jenness and Simon Cozens attempt to break down that barrier with lots of annotated code examples, direct analogies from the structures in Perl to those in C, a fine-grain look at XS and what it takes to robustly use a Perl interpreter in C."
Slashback

Slashback: Dataplay, XviD, PPC 183

Slashback's updates tonight (read on below) have more on Dataplay, background on the PowerPC that Apple and IBM have been brewing, the return (triumphant?) of XviD, Neal Stephenson's next opus, and more.
Security

Windows vs Linux On Security 480

e8johan writes "NewsFactor is running an article asking whether Linux really is more secure that Windows. I'd say that they miss to point out that Microsofts Office suite combined with VBA scripting makes Windows more insecure than anything I've ever seen, but they do make some good points, especially when discussing Open Source and security."
Programming

Write Pure Python Cocoa Apps 30

bbum writes "Today, Ronald Oussoren and I patched the PyObjC (PythonObj-C) bridge to allow for completely standalone Cocoa applications that are implemented in Python. My 11-Oct-2002 weblog entries provide more detail and includes a link to a PyObjC Cocoa app that can be downloaded and hacked upon (with the app, you can actually create other apps without using the dev tools at all!). As the days pass, I'll be updating the 'blog with new software, updates, etc. A Fink package will be submitted shortly. (In reality -- Ronald did the hard stuff in that he figured out how to subclass ObjC classes in Python!!)" Nifty. Note there is also a PerlObjCBridge module included with Jaguar, and there's also CamelBones for Perl-Cocoa; what other scripting frameworks for Mac OS X are out there?
Perl

The Perl Journal On The Ropes 164

rochlin writes "Looks like The Perl Journal might not make it up for air after all. This blurb is on their website. 'Time is running short and we need your help if The Perl Journal is to get another chance at being the real deal. As of a couple of minutes ago, we only have 881 subscriptions and the deadline is fast approaching. Please subscribe now. It only costs 3 cents per day to get the best Perl coverage anywhere.'" They need 3,000 subscribers to move forward.
The Internet

What Does The Internet Look Like? 124

scubacuda writes "What does the Internet have to do with the network of sexual partners? More than you think, according to this Economist article on Albert-Laslo Barabasi's attempt to 'present a general framework for improving the accuracy of Internet models' by treating the net 'as though it were a natural phenomenom.' Dr. Barabasi's findings that the Internet is 'scale free' has a lot of interesting implications: resistance to human failures, as well as vulnerability to malicious attacks. Dr. Barabasi's goal is to create models that are 'statistically indistinguishable from the real Internet. When and if that is achieved, the models should have predictive, as well as descriptive, power.' (BBC and News Factor had stories on his work earlier)"
Education

Ergonomic Arrangement for Computers and Books? 40

An anonymous reader asks: "So here I am with yet another computer book (Network Programming with Perl) and a pending case of neck, back and eye strain as I try and juggle the book and the keyboard and try to keep an eye on what's on the monitor. I've tried all sorts of ways to try and wade through a book and type in the various examples but everything is a bit of a kludge. I'm hoping to learn what creative methods for integrating books and computers that folks have come up with. There has to be ways to keep the juggling acts and the assorted cramps and aches to a minimum."
Perl

Cultured Perl: Genetic Algorithms, The Next Generation 35

BritMit writes "One of the more intriguing types of algorithm is the genetic algorithm. Genetic algorithms mimic Darwinian natural selection, where "fitness" selects individuals for survival, breeding, and, hence, adaptive mutation. A previous article: Genetic algorithms applied with Perl covered the background on this, and provided two Perl implementations, one that bred bytes and another that bred words. This follow-up article expands this idea of Perl evolution with more advanced material on genetic algorithms."
Security

Web Hacking: Attacks and Defense 126

zenomorph writes: "I first heard of this book on amazon.com on a Monday morning, and read the reviews of people who had purchased this book. I noticed that there were no reviews from any person in the web security community had commented on it, either on Amazon or anywhere else (with the exception of two brief comments on the back of the book, of which one was written by the person who wrote the book's foreword). So I decided to pick it up on Friday after I left work and see what it had to offer. After picking up the book I noticed it was co-authored by three people who all work for Foundstone, a very large security company that deals with everything (including web security). This review will cover some of the topics covered in this book, along with things that could or should have been covered in greater detail." Read on for the rest of zenomorph's review.

Slashdot Top Deals