Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - The Myth of Outsourcing's Efficiency

Presto Vivace writes: Why outsourcing winds up producing cost creep over time

Outsouring over time starts to create its own bureaucracy bloat. It’s the modern corporate version of one of the observations of C. Northcote Parkinson: “Officials make work for each other.” As Clive describes, the first response to the problems resulting from outsourcing is to try to bury them, since outsourcing is a corporate religion and thus cannot be reversed even when the evidence comes in against it. And then when those costs start becoming more visible, the response is to try to manage them, which means more work (more managerial cost!) and/or hiring more outside specialists (another transfer to highly-paid individuals).

Submission + - UK Intelligence officers given immunity from hacking laws

Presto Vivace writes: Legislative changes exempting law enforcement officers from ban on breaking into people’s digital devices were never debated by parliament, tribunal hears

The unnoticed rewriting of a key clause of the Computer Misuse Act has exempted law enforcement officials from the prohibition on breaking into other people’s laptops, databases, mobile phones or digital systems. It came into force in May.

The amended clause 10, entitled somewhat misleadingly “Savings”, is designed to prevent officers from committing a crime when they remotely access computers of suspected criminals. It is not known what category of offences are covered.

I would love to know how much malware is government sponsored.

Submission + - North Carolina Still Wants To Block Municipal Broadband (arstechnica.com)

An anonymous reader writes: In February, when the FCC rolled out its net neutrality rules, it also voted to override state laws that let Texas and North Carolina block ISPs created by local governments and public utilities. These laws frequently leave citizens facing a monopoly or duopoly with no recourse, so the FCC abolished them. Now, North Carolina has sued the FCC to get them back. North Carolina Attorney General Roy Cooper claims, "the FCC unlawfully inserted itself between the State and the State’s political subdivisions." He adds that the new rule is "arbitrary, capricious, and an abuse of discretion within the meaning of the Administrative Procedure Act; and is otherwise contrary to law."

Submission + - Snowden via teleconference from Moscow – " I've lost a lot, but I have a t (thehacktimes.com)

Cexy writes: At an event at Stanford University on Friday on May 15th Snowden, via teleconference from Moscow, shared his thoughts about the ethics of modern whistle-blowing and gave his audience a glimpse of what his life is like in Russia now.
“I have to work a lot harder to do the same thing. The difference is that, even though I’ve lost a lot, I have a tremendous sense of satisfaction.” Edward Snowden.

Submission + - Texas appearently sharing drivers' license photos with FBI (dallasnews.com)

An anonymous reader writes: The Dallas Morning News "Watchdog" column reports that the Texas Dept. of Public Safety entered into a "Memorandum of Understanding" with the FBI back in 2013 that allows the DPS to share drivers' license photos with the FBI under limited circumstances. It also reports that back in 2012 the FBI was working to get similar agreements with other states.

Texas is the state that recently added — and later repealed — a requirement that you submit a full set of fingerprints to get or renew your driver's license.

Submission + - Ancestery.com caught sharing DNA database with government (eff.org)

SonicSpike writes: In 1996, a young woman named Angie Dodge was murdered in her apartment in a small town in Idaho. Although the police collected DNA from semen left at the crime scene, they haven’t been able to match the DNA to existing profiles in any criminal database, and the murder has never been solved.

Fast forward to 2014. The Idaho police sent the semen sample to a private lab to extract a DNA profile that included YSTR and mtDNA—the two genetic markers used to determine patrilineal and matrilineal relationships (it’s unclear why they reopened the case after nearly 20 years). These markers would allow investigators to search some existing databases to try to find a match between the sample and genetic relatives.

The cops chose to use a lab linked to a private collection of genetic genealogical data called the Sorenson Database (now owned by Ancestry.com), which claims it’s “the foremost collection of genetic genealogy data in the world.” The reason the Sorenson Database can make such an audacious claim is because it has obtained its more than 100,000 DNA samples and documented multi-generational family histories from “volunteers in more than 100 countries around the world.”

Sorenson promised volunteers their genetic data would only be used for “genealogical services, including the determination of family migration patterns and geographic origins” and would not be shared outside Sorenson.

Despite this promise, Sorenson shared its vast collection of data with the Idaho police. Without a warrant or court order, investigators asked the lab to run the crime scene DNA against Sorenson’s private genealogical DNA database. Sorenson found 41 potential familial matches, one of which matched on 34 out of 35 alleles—a very close match that would generally indicate a close familial relationship. The cops then asked, not only for the “protected” name associated with that profile, but also for all “all information including full names, date of births, date and other information pertaining to the original donor to the Sorenson Molecular Genealogy project.”

Submission + - How the NSA Converts Spoken Words Into Searchable Text

Presto Vivace writes: Dan Froomkin reports:

Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.

I am torn between admiration of the technical brilliance of building software like this and horror as to how it is being used.

Submission + - Inside the Military-Police Center That Spies on Baltimore's Rioters (gawker.com)

Lasrick writes: Adam Weinstein on a program designed to catch terrorists attacking Baltimore that is now being used to spy on protesters: 'On Ambassador Road, just off I-695 around the corner from the FBI, nearly 100 employees sit in a high-tech suite and wait for terrorists to attack Baltimore. They’ve waited 11 years. But they still have plenty of work to do, like using the intel community’s toys to target this week’s street protests.' Great read.

Submission + - Bernie Sanders, H-1B skeptic

Presto Vivace writes: Will the Vermont senator raise the visibility of the visa issue with his presidential run?

The H-1B visa issue rarely surfaces during presidential races, and that's what makes the entrance by Sen. Bernie Sanders (I-Vt.) into the 2016 presidential race so interesting. ... ...Sanders is very skeptical of the H-1B program, and has lambasted tech firms for hiring visa workers at the same time they're cutting staff. He's especially critical of the visa's use in offshore outsourcing.

Submission + - Median age at Google is 29, says age discrimination lawsuit (computerworld.com)

dcblogs writes: The typical employee at Google is relatively young, according to a lawsuit brought by an older programmer who is alleging age discrimination. Between 2007 and 2013, Google's workforce grew from 9,500 to more than 28,000 employees, "yet as of 2013, its employees' median age was 29 years old," the lawsuit claims. That's in contrast to the median age of nearly 43 for all U.S. workers who are computer programmers, according to the lawsuit.

Submission + - Software, tractors, and property rights

Presto Vivace writes: We Can’t Let John Deere Destroy the Very Idea of Ownership

In a particularly spectacular display of corporate delusion, John Deere—the world’s largest agricultural machinery maker —told the Copyright Office that farmers don’t own their tractors. Because computer code snakes through the DNA of modern tractors, farmers receive “an implied license for the life of the vehicle to operate the vehicle.”

Slashdot Top Deals

"When anyone says `theoretically,' they really mean `not really.'" -- David Parnas

Working...