Refugees in Greece work together and build communities AL JAZEERA ENGLISH (AJE)(cached at December 24, 2016, 11:00 pm)

Away from government-run camps and NGO shelters, Syrians, Palestinians, Afghans and Iraqis launch community initiatives.
Refugees in Greece work together and build communities AL JAZEERA ENGLISH (AJE)(cached at December 24, 2016, 11:00 pm)

Away from government-run camps and NGO shelters, Syrians, Palestinians, Afghans and Iraqis launch community initiatives.
How Would You Generate C Code Using Common Lisp Macros? Slashdotby EditorDavid on programming at January 1, 1970, 1:00 am (cached at December 24, 2016, 10:34 pm)

Long-time Slashdot reader kruhft brings news about a new S-Expression based language transpiler that has the feel of C. This structure allows for the creation of code generation macros using the full power of the host Common Lisp environment, a language designed for operating on S-Expressions, also known as Lists. It is unknown exactly what power might come about from this combination of low level processing with high level code generation. This has prompted some discussion online about other attempts to convert Lisp to C -- raising several more questions. How (and why) would you convert your Lisp code into C, and what would then be the best uses for this capability?

Read more of this story at Slashdot.

How Would You Generate C Code Using Common Lisp Macros? Slashdotby EditorDavid on programming at January 1, 1970, 1:00 am (cached at December 24, 2016, 10:34 pm)

Long-time Slashdot reader kruhft brings news about a new S-Expression based language transpiler that has the feel of C. This structure allows for the creation of code generation macros using the full power of the host Common Lisp environment, a language designed for operating on S-Expressions, also known as Lists. It is unknown exactly what power might come about from this combination of low level processing with high level code generation. This has prompted some discussion online about other attempts to convert Lisp to C -- raising several more questions. How (and why) would you convert your Lisp code into C, and what would then be the best uses for this capability?

Read more of this story at Slashdot.

Christians flock to Bethlehem to mark birth of Christ AL JAZEERA ENGLISH (AJE)(cached at December 24, 2016, 10:30 pm)

Tourists and local Christians gather in birthplace of Jesus to mark Christmas Eve despite hurdles of the occupation.
Christians flock to Bethlehem to mark birth of Christ AL JAZEERA ENGLISH (AJE)(cached at December 24, 2016, 10:30 pm)

Tourists and local Christians gather in birthplace of Jesus to mark Christmas Eve despite hurdles of the occupation.
Moonshine-Template-0.02 search.cpan.orgby Robert Acock at January 1, 1970, 1:00 am (cached at December 24, 2016, 10:03 pm)

Template some more html.
Audio-LibSampleRate-0.002 search.cpan.orgby Marius Gavrilescu at January 1, 1970, 1:00 am (cached at December 24, 2016, 10:03 pm)

interface to Secret Rabbit Code audio sample rate converter
Audio-LibSampleRate-0.002 search.cpan.orgby Marius Gavrilescu at January 1, 1970, 1:00 am (cached at December 24, 2016, 10:03 pm)

interface to Secret Rabbit Code audio sample rate converter
Moonshine-Template-0.02 search.cpan.orgby Robert Acock at January 1, 1970, 1:00 am (cached at December 24, 2016, 10:03 pm)

Template some more html.
Sidef-2.34 search.cpan.orgby Daniel Șuteu at January 1, 1970, 1:00 am (cached at December 24, 2016, 10:03 pm)

The Sidef Programming Language
Sidef-2.34 search.cpan.orgby Daniel Șuteu at January 1, 1970, 1:00 am (cached at December 24, 2016, 10:03 pm)

The Sidef Programming Language
US Congressional Committee Concludes Encryption Backdoors Won't Work Slashdotby EditorDavid on encryption at January 1, 1970, 1:00 am (cached at December 24, 2016, 9:04 pm)

"Any measure that weakens encryption works against the national interest," reports a bipartisan committee in the U.S. Congress. Mark Wilson quotes Beta News: The Congressional Encryption Working Group (EWG) was set up in the wake of the Apple vs FBI case in which the FBI wanted to gain access to the encrypted contents of a shooter's iPhone. The group has just published its end-of-year report summarizing months of meetings, analysis and debate. The report makes four key observations, starting off with: "Any measure that weakens encryption works against the national interest". This is certainly not a new argument against encryption backdoors for the likes of the FBI, but it is an important one... The group says: "Congress should not weaken this vital technology... Cryptography experts and information security professionals believe that it is exceedingly difficult and impractical, if not impossible, to devise and implement a system that gives law enforcement exceptional access to encrypted data without also compromising security against hackers, industrial spies, and other malicious actors... The report recommends that instead, Congress "should foster cooperation between the law enforcement community and technology companies," adding "there is already substantial cooperation between the private sector and law enforcement." [PDF] It also suggests that analyzing the metadata from "our digital 'footprints'...could play a role in filling in the gap. The technology community leverages this information every day to improve services and target advertisements. There appears to be an opportunity for law enforcement to better leverage this information in criminal investigations."

Read more of this story at Slashdot.

US Congressional Committee Concludes Encryption Backdoors Won't Work Slashdotby EditorDavid on encryption at January 1, 1970, 1:00 am (cached at December 24, 2016, 9:04 pm)

"Any measure that weakens encryption works against the national interest," reports a bipartisan committee in the U.S. Congress. Mark Wilson quotes Beta News: The Congressional Encryption Working Group (EWG) was set up in the wake of the Apple vs FBI case in which the FBI wanted to gain access to the encrypted contents of a shooter's iPhone. The group has just published its end-of-year report summarizing months of meetings, analysis and debate. The report makes four key observations, starting off with: "Any measure that weakens encryption works against the national interest". This is certainly not a new argument against encryption backdoors for the likes of the FBI, but it is an important one... The group says: "Congress should not weaken this vital technology... Cryptography experts and information security professionals believe that it is exceedingly difficult and impractical, if not impossible, to devise and implement a system that gives law enforcement exceptional access to encrypted data without also compromising security against hackers, industrial spies, and other malicious actors... The report recommends that instead, Congress "should foster cooperation between the law enforcement community and technology companies," adding "there is already substantial cooperation between the private sector and law enforcement." [PDF] It also suggests that analyzing the metadata from "our digital 'footprints'...could play a role in filling in the gap. The technology community leverages this information every day to improve services and target advertisements. There appears to be an opportunity for law enforcement to better leverage this information in criminal investigations."

Read more of this story at Slashdot.

Middle East lauds UN vote on ending Israeli settlements AL JAZEERA ENGLISH (AJE)(cached at December 24, 2016, 9:00 pm)

Resolution urging end to activities in occupied territory lauded by Jordan, Saudi Arabia, Qatar and Iran among others.