Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:So which way do you propose? (Score 4, Insightful) 247

That's a lousy analogy. A better analogy in this case would be that someone offended by apartheid took an axe to the bus, and after being arrested, ranted about the white people's plot to breed black people into Morlocks. Does that help clarify why Lumsdaine is such a counter-productive "activist"? His attempt was doomed to fail -- it would not stop either the military-industrial complex, or even the particular program he went after, but would put off practically everyone who disagreed with him and some of those who did agree with him.

Businesses

Demand For Linux Skills Rising This Year 94

Nerval's Lobster writes This year is shaping up as a really good one for Linux, at least on the jobs front. According to a new report (PDF) from The Linux Foundation and Dice, nearly all surveyed hiring managers want to recruit Linux professionals within the next six months, with 44 percent of them indicating they're more likely to hire a candidate with Linux certification over one who does not. Forty-two percent of hiring managers say that experience in OpenStack and CloudStack will have a major impact on their hiring decisions, while 23 percent report security is a sought-after area of expertise and 19 percent are looking for Linux-skilled people with Software-Defined Networking skills. Ninety-seven percent of hiring managers report they will bring on Linux talent relative to other skills areas in the next six months.
Google

Google Taking Over New TLDs 185

bobo the hobo writes: In the corner of the internet where people care about DNS, there is a bit of an uproar at Google's application for over a hundred new top-level domains, including .dev, .lol, .app, .blog, .cloud and .search. Their application includes statements such as: "By contrast, our application for the .blog TLD describes a new way of automatically linking new second level domains to blogs on our Blogger platform – this approach eliminates the need for any technical configuration on the part of the user and thus makes the domain name more user friendly." They also mention limiting usage of .dev to Google only: "Second-level domain names within the proposed gTLD are intended for registration and use by Google only, and domain names under the new gTLD will not be available to the general public for purchase, sale, or registration. As such, [Google's shell company] intends to apply for an exemption to the ICANN Registry Operator Code of Conduct as Google is intended to be the sole registrar and registrant."

Comment Re:Wait.. (Score 2) 301

Unless a state passes a right-to-work law (California has not), "closed shops" are allowed under Federal law and typically required by union contracts. A "closed shop" agreement means that employees must be union members at the time of hire, or must join the union within a certain period. To conform with the First Amendment, employees who do not wish to pay for the union's "extra" activities (beyond collective negotiation for their bargaining unit that the employee belongs to) can opt out of full union membership and pay a reduced rate for the union's representation. The reduction is almost never a big reduction, which might surprise people who know how much unions spend on political activity. Also, people who do opt out can no longer vote on what the union should negotiate for, and unions like to make them social outcasts, so there are strong incentives to not opt out.

Comment Re:Sick (Score 0) 301

The money to pay for benefits will come out of the employee's paycheck one way or another. If the employer has to pay employees when they're not working, it means the employee's per-working-hour salary will be lower than it would be otherwise.

Drivers who would get "50% pay when ill" are probably not that likely to stay home, and most companies that have policies like that require a doctor's note when someone takes advantage of the policy (to deter people from abusing it). Making your employer part of your relationship with your doctor should be an option for the employee, not a requirement.

Encryption

Moxie Marlinspike: GPG Has Run Its Course 309

An anonymous reader writes: Security researcher Moxie Marlinspike has an interesting post about the state of GPG-encrypted communications. After using GPG for much of its lifetime, he says he now dreads getting a GPG-encrypted email in his inbox. "Instead of developing opinionated software with a simple interface, GPG was written to be as powerful and flexible as possible. It's up to the user whether the underlying cipher is SERPENT or IDEA or TwoFish. The GnuPG man page is over sixteen thousand words long; for comparison, the novel Fahrenheit 451 is only 40k words. Worse, it turns out that nobody else found all this stuff to be fascinating. Even though GPG has been around for almost 20 years, there are only ~50,000 keys in the "strong set," and less than 4 million keys have ever been published to the SKS keyserver pool ever. By today's standards, that's a shockingly small user base for a month of activity, much less 20 years." Marlinspike concludes, "I think of GPG as a glorious experiment that has run its course. ... GPG isn't the thing that's going to take us to ubiquitous end to end encryption, and if it were, it'd be kind of a shame to finally get there with 1990's cryptography."

Comment Re: Not this shit again (Score 1) 681

You do know that IEEE 754 defines, and two IBM mainframe architectures implement, decimal floating point formats and arithmetic, right? Some languages -- mostly to support financial applications -- provide data types that are defined in decimal floating-point terms.

Using these is uncommon, there are various tradeoffs for decimal floating point, and the values are encoded using bits, but the high-level semantics and in some cases hardware instructions are explicitly base 10.

Security

Ars: SSL-Busting Code That Threatened Lenovo Users Found In a Dozen More Apps 113

Ars Technica reports on the continuing revelations about the same junkware that Lenovo has shipped on their computers, but which is known now to be present in at least 14 pieces of software. The list of software known to use the same HTTPS-breaking technology recently found preinstalled on Lenovo laptops has risen dramatically with the discovery of at least 12 new titles, including one that's categorized as a malicious trojan by a major antivirus provider. ... What all these applications have in common is that they make people less secure through their use of an easily obtained root CA [certificate authority], they provide little information about the risks of the technology, and in some cases they are difficult to remove," Matt Richard, a threats researcher on the Facebook security team, wrote in Friday's post. "Furthermore, it is likely that these intercepting SSL proxies won't keep up with the HTTPS features in browsers (e.g., certificate pinning and forward secrecy), meaning they could potentially expose private data to network attackers. Some of these deficiencies can be detected by antivirus products as malware or adware, though from our research, detection successes are sporadic."
Open Source

Ask Slashdot: Parental Content Control For Free OSs? 260

m.alessandrini writes Children grow up, and inevitably they will start using internet and social networks, both for educational and recreational purposes. And it won't take long to them to learn to be autonomous, especially with all the smartphones and tablets around and your limited time. Unlike the years of my youth, when internet started to enter our lives gradually, now I'm afraid of the amount of inappropriate contents a child can be exposed to unprepared: porn, scammers, cyberbullies or worse, are just a click away.

For Windows many solutions claim to exist, usually in form of massive antivirus suites. What about GNU/Linux? Or Android? Several solutions rely on setting up a proxy with a whitelist of sites, or similar, but I'm afraid this approach can make internet unusable, or otherwise be easy to bypass. Have you any experiences or suggestions? Do you think software solutions are only a part of the solution, provided children can learn hacking tricks better than us, and if so, what other 'human' techniques are most effective?
Businesses

Torvalds: "People Who Start Writing Kernel Code Get Hired Really Quickly" 130

alphadogg writes Now more than ever, the development of the Linux kernel is a matter for the professionals, as unpaid volunteer contributions to the project reached their lowest recorded levels in the latest "Who Writes Linux" report, which was released today. According to the report, which is compiled by the Linux Foundation, just 11.8% of kernel development last year was done by unpaid volunteers – a 19% downturn from the 2012 figure of 14.6%. The foundation says that the downward trend in volunteer contributions has been present for years. According to Linus Torvalds, the shift towards paid developers hasn’t changed much about kernel development on its own. “I think one reason it hasn't changed things all that much is that it's not so much unpaid volunteers are going away as people who start writing kernel code get hired really quickly,” he said.
Programming

Should We Really Try To Teach Everyone To Code? 291

theodp writes: Gottfried Sehringer asks Should We Really Try to Teach Everyone to Code? He writes, "While everyone today needs to be an app developer, is learning to code really the answer? Henry Ford said that, 'If I had asked people what they wanted, they would have said faster horses.' I view everyone learning to code as app development's version of a faster horse. What we all really want — and need — is a car. The industry is falling back on code because for most people, it's the only thing they know. If you want to build an application, you have to code it. And if you want to build more apps, then you have to teach more people how to code, right? Instead, shouldn't we be asking whether coding is really the best way to build apps in the first place? Sure, code will always have a place in the world, but is it the language for the masses? Is it what we should be teaching everyone, including our kids?" President Obama thinks so, telling Re/code at Friday's Cyber Security Summit that 'everybody's got to learn to code early' (video). But until domestic girls (including his daughters) and underrepresented groups get with the program(ming), the President explained he's pushing tech immigration reform hard and using executive action to help address tech's "urgent need" for global talent.
Microsoft

Report: Samsung Replacing Its Apps With Microsoft's For Galaxy S6 148

An anonymous reader writes: SamMobile is reporting that the next major revision of Samsung's Galaxy S line of phones is going to have some major changes. According to insider sources, Samsung has gotten rid of many of their pre-loaded apps, making them optional downloads. What's interesting is that they're replacing these apps with software from Microsoft — apps like Skype, Office Mobile, and OneDrive. "With Windows Phone failing to make a dent on the smartphone market, Microsoft has recently shifted focus to its software services, and having them pre-installed on one of the bestselling Android smartphone lineups might just give the Redmond giant the exposure it needs to court consumers into switching from Google's massively more popular services that come preloaded on all Android devices."
Chrome

Google Chrome Will Adopt HTTP/2 In the Coming Weeks, Drop SPDY Support 88

An anonymous reader writes: Google today announced it will add HTTP/2, the second major version of Hypertext Transfer Protocol (HTTP), to Google Chrome. The company plans to gradually roll out support to the latest version of its browser, Chrome 40, "in the upcoming weeks." At the same time, Google says it will remove support for SPDY in early 2016. SPDY, which is not an acronym but just a short version for the word "speedy," is a protocol developed primarily at Google to improve browsing by forcing SSL encryption for all sites and speeding up page loads. Chrome will also lose support for the TLS extension NPN in favor of ALPN.
The Almighty Buck

Microsoft Trademarks "Windows 365" 191

jones_supa writes The talks about a subscription-based Windows have begun again. With Windows 10 those ideas did not materialize in the way that many had speculated. Even though Microsoft has not fully detailed its Windows 10 pricing strategy, it is not believed that Microsoft is targeting an annual subscription charge for Windows at this time. However, it turns out that Microsoft has recently filed for a trademark for Windows 365, which adds a bit of fuel to the subscription based version of Windows. As of right now, Microsoft has only claimed this branding right, but as for what they will do with it, only time will tell. Deep inside the company, the idea is clearly still bubbling there.

Slashdot Top Deals

After any salary raise, you will have less money at the end of the month than you did before.

Working...