Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Displaced US Technology Workers Resist Nondisparagement Agreements (nytimes.com)

dangle writes: The New York Times writes about a group of recently laid-off Abbott technology employees from the Chicago area, including Marco Peña's refusal to sign a nondisparagement agreement, a decision he says cost him nearly $10,000.

US corporate executives have worked publicly to defend their use of H-1B visas to Congress and the public, but US workers who have lost jobs to global outsourcing companies have been largely silent out of concern that any criticism of their past employers will be viewed as violation of nondisparagement agreements required as part of their severance packages.

Members of Congress from both major parties have questioned these agreements, and have proposed revisions to visa laws to include measures allowing former employees to contest their layoffs.

Comment Re:collateral damage (Score 1) 73

One wonders if this is true, but beyond the internal and external DPRK propaganda, it seems like there must be enough men and women of reason in their government and research facilities to make the case for and maintain these complex weapons/energy programs in a relatively protected environment, knowing that failures and quality improvement are necessary and inherent to the process.

That sentence was a lot longer than I planned, sorry.

Comment Re:Only 10,000 times lower? (Score 1) 134

Sometimes, but many times the drug is excreted unchanged (during the early penicillin era, drug scarcity drove urine collection from treated patients to recycle the still-active penicillin molecules). Many times, the metabolites are also biologically active, either as part of the intended physiological effect, or active in other related or unrelated ways.

Comment Loophole (Score 1) 819

At least in the 80's in the US, a friend from school and I decided to reload our own shotgun shells to save money and the hassle of finding an adult to buy us ammo. Even at the time, I was a little baffled by the fact that my friend and I could walk into a store and buy cans of powder, primers, and shot, but couldn't buy factory made ammo.

Submission + - Private company leads to arrests of three hackers ten years after attack 2

Jdogatl writes: I was intruiged by a bit of news that reports that 10 years after a digital attack, a forensic investigation company, Digital Investigation, lead to the arrest of three hackers (actually two hackers hired by a third party). They were asked in 2013 to investigate an attack on a lawfirm 9 years after the initial attack. The investigating company says that someone hacked and leaked a DDoS commercial service's userdatabase and was able to eventually track down the hackers because one of them logged did not login through a VPN once. Oops.

The company lays out the details of their investigation and though it is in Dutch it was interesting that the conclusion was largely due to "someone" leaking the information about the hacker. It raises a couple of questions, if you were a security company and obviously not going to get anywhere would you hack a company's user database (regardless of the legality of the service provided) and say that it was leaked by "some" hacker to avoid being charged yourself? Also, is it not a bit odd that the information that brought down the hackers was still retained 9 years after the attacks? Or that being stupid once, 10 years ago, can still bring you down. Should there not be a push for statute of limitations on cyber crime?

Sorry, the link is in Dutch.
http://www.digital-investigati...

Submission + - Endeavor stack being rebuilt piece by piece (latimes.com)

dangle writes: The Exposition Park museum in LA is working to rebuild the Endeavor launch stack, a display that will take thousands of pieces to complete due to parts that are scattered at NASA facilities, museums and other places across the U.S. Most are one of a kind and impossible to replicate. Dennis Jenkins, who spent his entire 30-plus year career sending the shuttles into space, is playing a key role in locating essential parts using his own and his colleagues' institutional memory. Employed by NASA contractor Martin Marietta, he helped write the software used in loading and controlling the liquid oxygen needed to launch the 2,250-ton shuttle assembly into low Earth orbit. Now, with the program part of a bygone era of exploration, the 57-year-old works for the California Science Center, helping officials figure out how to rebuild Endeavour.

Submission + - Windows XP can put SOX, HIPAA, credit card security-compliance at risk (networkworld.com)

coondoggie writes: When Microsoft stops supporting Windows XP next month businesses that have to comply with payment card industry (PCI) data security standards as well as health care and financial standards may find themselves out of compliance unless they call in some creative fixes, experts say. Strictly interpreted, the PCI Security Standards Council requires that all software have the latest vendor-supplied security patches installed, so when Microsoft stops issuing security patches April 8, businesses processing credit cards on machines using XP should fall out of PCI compliance,

Comment Re:Overstating their case (Score 1) 168

Exactly. For a while I was "going for it" to see how far I could rise in academics. I used to joke that I had risen from street thug to one of the guys that gets to sit at the bar in the local don's place. But I always added the caveat "at least I don't have to kill anyone or worry about being killed."

Submission + - Syrian Electronic Army Hacks Domain Data for Twitter, NY Times

Trailrunner7 writes: The Syrian Electronic Army, a group known for attacking high-profile media sites in the last year or so, has in the last few hours compromised the domain information for a large number of sites, including the New York Times home page and some of Twitter’s domains. Security researchers say that the most likely attack vector was the domain registrar used by the companies.

Both the Times and Twitter, as well as a long list of other companies including Google and Yahoo, use a company called Melbourne IT as a domain registrar. Researchers following the attack say that the WHOIS and domain information for the Times and Twitter domains was changing back and forth between legitimate data and the hacked SEA data for much of the last few hours. The Times home page was offline sporadically Tuesday afternoon and the paper reported that the company’s CIO told employees to be cautious sending email “until this situation is resolved”.

Slashdot Top Deals

"When it comes to humility, I'm the greatest." -- Bullwinkle Moose

Working...