Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
The Almighty Buck

Getting Paid Fairly When Job Responsibilities Spiral? 495

greymond writes "I was originally hired as an Online Content Producer to write articles for a company website as well as start up the company's social media outlets on Facebook and Twitter. With budget cuts and layoffs I ended up also taking over the website facilitation for three of the company's websites (they let go of the current webmaster). During this time the company has been developing a new website and I was handed the role of pseudo project manager to make sure the developer stayed on course with the project's due date. Now that we're closer to launch the company has informed me that they don't have the budget or staff in place to set up the web server and have tasked me with setting up the LAMP and Zend App on an Amazon EC2 setup. While it's been years since I worked this much with Linux I'm picking it up and moving things along. Needless to say I want to ask for more money, as well as more resources (as well as a better title that fits my roles), but what is the best way to go about this? Of course my other thought is that I'd much rather go back to writing and working with marketing than getting back into IT."
Microsoft

Will Steve Ballmer Speak At WWDC Keynote? 280

truthsearch writes "An analyst reports that not only will CEO Steve Jobs return to Apple's Worldwide Developer Conference stage — he missed last year for medical reasons — but he will be joined there by Microsoft CEO Steve Ballmer. Global Equities Research analyst Trip Chowdrey said that Microsoft has been given seven minutes during Jobs' keynote to talk about Visual Studio 2010. Chowdrey said that a new version of the development tools software will support native applications for the iPhone, iPad, and Mac OS." Update: 05/27 19:17 GMT by T : As reader theappwhisperer points out, Microsoft has responded to this rumor via the company's Twitter feed with an unequivocal No.
IBM

IBM's Patent-Pending Traffic Lights Stop Car Engines 423

theodp writes "I'm sorry Dave, I'm afraid I can't let your engine idle. The USPTO has just published IBM's patent application for a 'System and Method for Controlling Vehicle Engine Running State at Busy Intersections for Increased Fuel Consumption Efficiency.' Here's how Big Blue explains the invention: 'The present disclosure is directed to a method for managing engines in response to a traffic signal. The method may comprise establishing communications with participating vehicles; responding to a stop status indicated by the traffic signal, further comprising: receiving a position data from each participating vehicles; determining a queue of participating vehicles stopped at the traffic signal; determining a remaining duration of the stop status; sending a stop-engine notification to the list of participating vehicles stopped at the traffic signal when the remaining duration is greater than a threshold of time; responding to a proceed status indicated by the traffic signal, further comprising: sending a start-engine notification to a first vehicle in the queue; calculating an optimal time for an engine of a second vehicle in the queue to start; and sending the start-engine notification to the second vehicle at the optimal time.' IBM notes that 'traffic signals may include, but are not limited to, traffic lights at intersections, railway crossing signals, or other devices for indicating correct moments to stop and to proceed.'"
Caldera

SCO Asks Judge To Give Them the Unix Copyright 286

Raul654 writes "In March, the jury in the Novell/SCO case found that Novell owns the copyright to Unix. Now, SCO's lawyers have asked judge Ted Stewart to order Novell to turn over the Unix copyright to them. 'SCO contends the jury did not answer the specific issue before Stewart that involves a legal principle called "specific performance," under which a party can ask a court to order another party to fulfill an aspect of an agreement.'" Over at Groklaw, PJ is deep into a community project to annotate SCO's filing. It's for the benefit of future historians, but it makes amusing reading now.
Hardware

MIT Developing Self-Assembling Computer Chips 65

An anonymous reader writes "Researchers at the Massachusetts Institute of Technology on have released research detailing how molecules in chips can self-assemble, potentially reducing manufacturing costs. The researchers have developed a technique in which polymers automatically fall into place to create an integrated circuit."
Image

Tower Switch-Off Embarrasses Electrosensitives Screenshot-sm 292

Sockatume writes "Residents in Craigavon, South Africa complained of '[h]eadaches, nausea, tinnitus, dry burning itchy skins, gastric imbalances and totally disrupted sleep patterns' after an iBurst communications tower was put up in a local park. Symptoms subsided when the residents left the area, often to stay with family and thus evade their suffering. At a public meeting with the afflicted locals, the tower's owners pledged to switch off the mast immediately to assess whether it was responsible for their ailments. One problem: the mast had already been switched off for six weeks. Lawyers representing the locals say their case against iBurst will continue on other grounds."
Math

Which Math For Programmers? 466

An anonymous reader writes "It is no news that the greatest computer scientists and programmers are/were mathematicians. As a kid 'hacking' if-else programs, I was not aware of the importance of math in programming, but few years later, when I read Engines of Logic by Martin Davis I started becoming increasingly more convinced of this. Unfortunately, math doesn't return my love, and prefers me to struggle with it. Now, as the end of the semester approaches, I am faced with a dilemma: What math subject to choose next? I have two choices: 'Discreet structures with graph theory' (discrete math; proofs, sets, algorithms and graphs) on one side, and 'Selected math chapters' (math analysis; vectors, euclidean space, differentials) on the other. I'm scared of the second one because it's said to be harder. But contrary to my own opinion, one assistant told me that it would be more useful for a programmer compared to the first subject. Then again, he's not a programmer. That's why I turn to you for help, fellow slashdotters — any advice?"
Media

New Zealand Reintroduces 3 Strikes Law 165

An anonymous reader writes "The New Zealand government has reintroduced a newly rewritten addition to the Copyright Act which will allow rights' holders to send copyright notices to ISPs, and force them to pass them on to account holders. Section 92A of the Copyright Act will allow rights holders to take people who have been identified as infringers more than three times in front of a Copyright Tribunal. This law will allow the Copyright Tribunal to hand down either a $15,000 fine or six months internet disconnection. The law specifies that the account holder himself is responsible for what is downloaded via the account, and doesn't make allowances for identifying the actual copyright infringer if there are multiple computers tied to an account."
Security

Ethics of Releasing Non-Malicious Linux Malware? 600

buchner.johannes writes "I was fed up with the general consensus that Linux is oh-so-secure and has no malware. After a week of work, I finished a package of malware for Unix/Linux. Its whole purpose is to help white-hat hackers point out that a Linux system can be turned into a botnet client by simply downloading BOINC and attaching it to a user account to help scientific projects. The malware does not exploit any security holes, only loose security configurations and mindless execution of unverified downloads. I tested it to be injected by a PHP script (even circumventing safe mode), so that the Web server runs it; I even got a proxy server that injects it into shell scripts and makefiles in tarballs on the fly, and adds onto Windows executables for execution in Wine. If executed by the user, the malware can persist itself in cron, bashrc and other files. The aim of the exercise was to provide a payload so security people can 'pwn' systems to show security holes, without doing harm (such as deleting files or disrupting normal operation). But now I am unsure of whether it is ethically OK to release this toolkit, which, by ripping out the BOINC payload and putting in something really evil, could be turned into proper Linux malware. On the one hand, the way it persists itself in autostart is really nasty, and that is not really a security hole that can be fixed. On the other hand, such a script can be written by anyone else too, and it would be useful to show people why you need SELinux on a server, and why verifying the source of downloads (checksums through trusted channels) is necessary. Technically, it is a nice piece, but should I release it? I don't want to turn the Linux desktop into Windows, hence I'm slightly leaning towards not releasing it. What does your ethics say about releasing such grayware?"
Bug

Dell Defect Turning 2.2GHz CPU Into 100MHz CPU? 314

jtavares2 writes "In what is being dubbed Throttlegate, scores of users on many message boards have been complaining about nexplicably aggressive throttling policies on their Dell Latitude E6500 and E6400 laptops which cause their CPUs to be throttled to less than 5% of their theoretical maximums even while at room temperatures. In many cases, the issue can be triggered just by playing a video or performing some other trivial, but CPU intensive, task. After being banned [PDF] from the Dell Forums for revealing 'non-public information,' one user went so far as to write and publish a 59-page report [PDF] explaining and diagnosing the throttling problem in incredible detail. Dell seems to be silent on the issue, but many users are hoping for a formal recall."
The Internet

Australian Govt. Proposes Internet "Panic Button" For Kids 434

CuteSteveJobs writes "Children who feel they are being bullied, harassed or groomed online could call for help instantly using a 'panic button' on their PCs under a plan by the Australian Government's cyber-safety working group. The button shall look like a 'friendly dolphin,' who will connect the child victim instantly to police or child protection groups. Australian Internet Censorship Advocate Hetty 'Save the Children' Johnson says the Internet needs something like 000 or 911. Will this be another scheme wasting taxpayer dollars in lieu of parental supervison, or could it actually work? Are 1 in 4 children really sexually abused by the Internet? Can flaming and trolling be classified as bullying?"
Data Storage

RAID's Days May Be Numbered 444

storagedude sends in an article claiming that RAID is nearing the end of the line because of soaring rebuild times and the growing risk of data loss. "The concept of parity-based RAID (levels 3, 5 and 6) is now pretty old in technological terms, and the technology's limitations will become pretty clear in the not-too-distant future — and are probably obvious to some users already. In my opinion, RAID-6 is a reliability Band Aid for RAID-5, and going from one parity drive to two is simply delaying the inevitable. The bottom line is this: Disk density has increased far more than performance and hard error rates haven't changed much, creating much greater RAID rebuild times and a much higher risk of data loss. In short, it's a scenario that will eventually require a solution, if not a whole new way of storing and protecting data."

Slashdot Top Deals

1 + 1 = 3, for large values of 1.

Working...