Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Big Data Knows When You Are About to Quit Your Job

HughPickens.com writes: Quentin Hardy reports at the NYT that a leading maker of cloud-based software for running corporate human resources and financial operations has announced new products that provide the kind of data analysis that Netflix uses to recommend movies, LinkedIn has to suggest people you might know, or Facebook needs to put a likely ad in front of you. One version of the software, called Insight Applications, predicts which high-performing employees are likely to leave a company in the next year; it then offers possible actions (more money, new job) that might make them stay. In another instance, expense reporting software can predict which employee populations are most likely to exceed their budgets. “We’ve applied machine learning to affect consumer tastes,” says Mohammad Sabah, director of data science at Workday. “putting it to career choices, to pay and employment, have a huge upside if we do it right.” Already, Sabah says, “we’re surprised how accurately we can predict someone will leave a job.” The goal is to predict future business outcomes to take advantage of opportunities and cut risk levels. One future product may be the ability to predict who will and won’t make their sales quotas, and suggest who should be hired to improve the outcome. “Making an employee happy, improving the efficiency of a company these are hard problems that affect corporations.

Comment Capable of infecting non-jailbroken devices (Score 1) 1

What the submitter missed mentioning is that this is the first known malware found in the wild that is capable of installing 3rd party applications on iOS devices that have not been jailbroken. The path of infection is that a user install trojanized software on a machine running OSX then connects an iOS device to the computer with USB.
In the last half year 467 OS X applications on a third party Mac application store have been trojanized and downloaded over 356,104 times, how many iOS devices that have been infected through these is any ones guess.

Original source: http://researchcenter.paloalto...

Submission + - A nasty Trojan/virus from China for Apple devices (slashgear.com) 1

grantspassalan writes: Just when you thought only Windows received the bulk of horrifying viruses and crapware, here comes WireLurker, a new family of malware, not even just a single one, that targets both Apple's desktop and mobile platforms for maximum reach. Palo Alto Networks, the cybersecurity company that discovered and reported this situation calls this an "unprecedented" type of malware, at least as far as iOS and OS X are concerned, hinting at the developing, or rather worsening, situation when it comes to malware and hackers' abilities to infiltrate our computers.

Of course, OS X and iOS have never been completely immune to malware, especially the recent bout of ransomware that have encrypted computers without authorization. But according to Palo Alto Network's research, this new family could probably be one of the worst to hit Apple's platforms because of four reasons.

Comment Re:And so therefor it follows and I quote (Score 2) 353

The question at hand is whether the software is free, which it is if you obtain it via the download link found here. Whether you can install it legally on non-apple hardware or not is not relevant to the context but since you asked; doing so is in breach with their EULA and at least in the US courts have reached the conclusion that even selling Hackintosh friendly hardware is illegal when done in the manner that Psystar used to do when they provided the OS asa bundle together with their hardware. http://www.lockergnome.com/osx...

Submission + - ISPs Violating Net Neutrality, Blocking Encryption And Putting Users At Risk (hothardware.com)

MojoKid writes: In July, VPN provider Golden Frog (creators of the VyprVPN service) debuted front and center in the debate over net neutrality. One of their customers, Colin Nederkoorn, published a video showing how switching to VyprVPN increased his network performance by a factor of 10 on Verizon while streaming Netflix. Now, Golden Frog has filed a brief with the FCC, discussing both this incident and another, more troubling problem for security advocates — the detection of ISPs performing man-in-the-middle attacks against their own customers. According to information cited in the briefing, one wireless provider was caught blocking the use of STARTTLS encryption. STARTTLS is used to encrypt traffic sent over SMTP — email, in other words. Because an email from Point A to Point Z may travel through a number of unsecured routers to reach its final destination, unencrypted email is intrinsically insecure. STARTTLS was developed to mitigate this problem. What Golden Frog documented was the interception and modification of multiple requests to begin using STARTTLS into an entirely different set of commands, thereby preventing the encrypted link from ever being established. The problem of overwritten encryption is potentially far more serious than an issue of Netflix throttling, even if the latter tapped consumer discontent more readily.

Submission + - Microsoft serves takedown notices to videos not infringing on anything (wired.com)

mrnick writes: Microsoft serves youtube takedown notices on many youtube videos that do not appear to have any DRM issue. They say there was an algorithm problem and that non offending notices will be removed. The premise was that these videos had embedded windows keys in the comments. Is the video creator responsible for the comments on their video?

Submission + - FBI: backdoors in software may need to be mandatory (nytimes.com)

wabrandsma writes: The New York Times:

The director of the F.B.I., James B. Comey, said on Thursday that the "post-Snowden pendulum" that has driven Apple and Google to offer fully encrypted cellphones had "gone too far." He hinted that as a result, the administration might seek regulations and laws forcing companies to create a way for the government to unlock the photos, emails and contacts stored on the phones.

But Mr. Comey appeared to have few answers for critics who have argued that any portal created for the F.B.I. and the police could be exploited by the National Security Agency, or even Russian and Chinese intelligence agencies or criminals. And his position seemed to put him at odds with a White House advisory committee that recommended against any effort to weaken commercial encryption.

Comment Re:It's time to start a trade war. (Score 1) 106

My intention were not to lump everyone in the US together which is why I used the term 'muricans which in the context refer to a specific category, namely the ones that blindly believe everything uttered by the likes of Glenn Beck or whatever the flavour of right wing pundit is nowadays in other words the same ones that think it is perfectly fine when NSA use undercover agents in foreign corporations but cry foul when other nations have the audacity to do the same.
And at no point did I attempt to change the opinion of the OP as I quite frankly believe that anyone that someone who voice a belief that extreme is beyond reason, or a troll. In either case reason and logic is failed cause, thus I vented my frustration rather than attempted to fuel some innate sense of superiority as you suggest.

Comment Re:It's time to start a trade war. (Score 1, Informative) 106

I should have added this little reality check:
NSA Has Undercover Operatives in Foreign Companies
The latest Intercept article on the Snowden documents talks about the NSA's undercover operatives working in foreign companies. There are no specifics, although the countries China, Germany, and South Korea are mentioned.

Comment Re:It's time to start a trade war. (Score 1, Insightful) 106

Free trade doesn't work if both sides are not playing the same game.

Right, the US would never consider spying on Chinese companies and government branches. /sarcasm
I like to believe that you are just trolling, but based on the inane world view frequently voiced by 'muricans online it is very hard to tell.

Comment Re: Are you patenting software? (Score 3, Funny) 224

And also the abuses of software patents cause economic harm that FAR outweighs the benefits.

Indeed, just look at all the productivity that goes to waste whenever /. posts an article containing the word patent. In a nanosecond hordes of well paid tech professionals stop coding, innovating and creating just to read through all 389 posts and post a couple of their own. By the time they are done posting others have posted too, generating a whole bunch of new posts that have to be read and replied to, severely delaying the calculation of the Ultimate question

Slashdot Top Deals

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...