Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - How Employers Get Out of Paying Their Workers

HughPickens.com writes: We love to talk about crime in America and usually the rhetoric is focused on the acts we can see: bank heists, stolen bicycles and cars, alleyway robberies. But Zachary Crockett writes at Pricenomics that wage theft one of the more widespread crimes in our country today — the non-payment of overtime hours, the failure to give workers a final check upon leaving a job, paying a worker less than minimum wage, or, most flagrantly, just flat out not paying a worker at all. Most commonly, wage theft comes in the form of overtime violations. In a 2008 study, the Center for Urban Economic Development surveyed 4,387 workers in low-wage industries and found that some 76% of full-time workers were not paid the legally required overtime rate by their employers and the average worker with a violation had put in 11 hours of overtime—hours that were either underpaid or not paid at all. Nearly a quarter of the workers in the sample came in early and/or stayed late after their shift during the previous work week. Of these workers, 70 percent did not receive any pay at all for the work they performed outside of their regular shift. In total, unfairly withheld wages in these three cities topped $3 billion. Generalizing this for the rest of the U.S.’s low-wage workforce (some 30 million people), researchers estimate that wage theft could be costing Americans upwards of $50 billion per year.

Last year, the Economic Policy Institute made what is, to date, the most ambitious attempt to quantify the extent of reported wage theft in the U.S.and determined that “the total amount of money recovered for the victims of wage theft who retained private lawyers or complained to federal or state agencies was at least $933 million.” Obviously, the nearly $1 billion collected is only the tip of the wage-theft iceberg, since most victims never sue and never complain to the government. Commissioner Su of California says wage theft has harmed not just low-wage workers. “My agency has found more wages being stolen from workers in California than any time in history,” says Su. “This has spread to multiple industries across many sectors. It’s affected not just minimum-wage workers, but also middle-class workers.”

Comment tried and failed... and prior art anyway (Score 1) 102

hang on... didn't bunnie huang do the "chumby", and didn't barbie try doing something like this - putting an interactive wifi and mic aspect into one of their barbie dolls... with a huge back-lash as a result? so (a) why is there an expectation that this will succeed (b) why was the patent granted when there is clear prior art???

Submission + - Researchers devise a system that looks secure (but is it easy to use?). (readwrite.com)

An anonymous reader writes: The article in readwrite says that a team of British and American researchers have developed a hacker resistant process for online voting (http://www.cs.bham.ac.uk/~mdr/research/papers/pdf/15-Du-Vote.pdf) called Du-Vote. It uses a credit card sized device that helps to divide the security sensitive tasks between your computer and the device in a way that neither your computer nor the device learns how you voted. If a hacker managed to control the computer and the Du-Vote token, he still can't change the votes without being detected.

Submission + - Congress Seeks to Quash Patent Trolls (scientificamerican.com)

walterbyrd writes: The process is moving quickly. The Senate Judiciary Committee plans to vote on the bill by the end of the month, readying it for a final Senate vote this summer, and the House of Representatives’ Judiciary Committee is likely to vote this week on a similar measure. That gives observers optimism that Congress will finally enact patent-troll legislation after a failed effort last year. “The Senate version really does seem to be hitting some sort of sweet spot,” says Arti Rai, co-director of the Duke Law Center for Innovation Policy in Durham, North Carolina.

Submission + - Can SaaS be open source AND economically viable? (lucidchart.com)

An anonymous reader writes: The CTO behind Lucidchart, an online diagramming app, recently cited the rbush open source project as an invaluable tool for helping implement an "in-memory spatial index" that "increased spatial search performance by a factor of over 1,000 for large documents." My question is this: what risks does a SaaS company like Lucidchart face in making most of their own code public, like Google's recent move with Chrome for Android, and what benefits might be gained by doing so? Wouldn't sharing the code just generate more users and interest? Even if competitors did copy it, they'd always be a step behind the latest developments.

Comment debian digital signing and the GPG keyring (Score 2) 94

this is why debian has the GPG key-signing parties, and why all packages are GPG-signed by the package maintainer when they compile it, why the ftp masters sign the package when it's uploaded, and why the release files which include the checksums of all the packages are also GPG-signed. under this scenario there are an extremely limited number of extremely paranoid methods by which debian may be compromised. even the scenario of "cooperation between long-term sleeper agents within debian's ranks" would have a one-shot opportunity to get away with introducing malicious code, following the discovery of which their GPG keys would be revoked, the perpetrators kicked out of debian, their packages pulled immediately pending a review, and the already-effective procedures reviewed to involve multi-person GPG signing that would make it even harder for compromise to occur in the future.

now, if you recall, there was an announcement a couple of years back that the development of Mozilla's B2G was declared to be "open" to all, so i contributed with a thorough security-conscious review of how to do package distribution. it turns out that Mozilla is *NOT* open - at all. several other contributors have learned that the Mozilla Foundation is in direct violation of its charter.

basically, the Mozilla Foundation *completely* ignored the advice that i gave - which was that the use of SSL as a distribution mechanism would be vulnerable to *exactly* the kinds of attacks that we see the NSA attempting to do on google. they went so far as to enact censorship, preventing and prohibiting me from pointing out the severe security flaws inherent in their chosen method of package distribution. i remain deeply unimpressed with many aspects of so-called "open-ness" of well-funded software libre projects.

Comment correlation between gravity and length of day (Score 1) 95

http://iopscience.iop.org/0295...

just to throw an appropriate spanner in the works, it's worthwhile mentioning the above article which notes a significant statistical correlation between variations in the measurement of the effect known as "gravity", and the (appx) 6.5 year cyclic variation of the earth's length of day.

now, before you go all "ooer" or "waah! gravity varies! we're all gonna dieeee spinning off into space", it's worthwhile pointing out that the author mentions, in the conclusion, that there *might* be some sort of unknown systemic errors in (a) how gravity is measured (b) how the length of day is measured which *happen* to coincide and give the *impression* that there is a statistical correlation between gravitational variation and the length of the earth's day. he does however state that in light of how the measurements are taken it would seem to be very unlikely that there are such systemic errors.

so, anyway, the point is: gravity appears not to be as simple as we assumed, hence why some long-distance space probes (Pioneer for example) have anomalous unexplained behaviour.

Cellphones

Pre-Orders Start For Neo900 Open Source Phone 134

New submitter JoSch1337 writes: After a year and a half of development, the Neo900 project now opened its web shop for the down payments of binding pre-orders for either a full Neo900 phone or the bare circuit board to upgrade an existing Nokia N900. The up-front down payment is necessary to now secure expensive "risk parts" like the modem, 1GB RAM and N900 cases. Thus, without pre-ordering now, there might not be enough parts left after the first batch.

The Neo900 is the spritual successor of the Nokia N900. The new circuit board can be placed into an existing N900 for better specs (faster CPU, more RAM, LTE modem) than the original device while still maintaining fremantle (maemo 5) backwards compatibility. Alternatively, a fully assembled phone can be purchased as well. The Neo900 will be fully operational without any binary blob running on the main CPU. While the modem still requires a non-free firmware, it is completely decoupled from the rest of the device (think of a LTE usb stick you put in your laptop) and can reliably be monitored or switched off by the operating system.

You can follow the development of the project in the maemo forum, read about the specs of the device or consult the FAQ

Submission + - Cox HSI ends unlimited internet, introduces cap system

Junior J. Junior III writes: Today, Cox High Speed Internet customers received the following communication:

Dear [Cox HSI Customer],

We spend more time online today than ever before, streaming movies and TV shows, downloading music, sharing photographs and staying connected to friends and family. As Internet and data consumption grows, Cox continues to improve our network to ensure a quality experience for all our customers.

To better support our customers' expanding online activity, we recently increased the amount of data included in all of our Cox High Speed Internet packages. About 95% of customers are now on a data plan that is well-suited for their household. In the event you use more data than is included in your plan, beginning with bill cycles that start on June 15th, we will automatically provide additional data for $10 per 50 Gigabyte (GB) block for that usage period. Based on your last 3 months of data usage and our increased data plans, it is unlikely you will need additional data blocks unless your usage increases.

What this means for you

To help our customers get accustomed to this change, we are providing a grace period for 3 consecutive billing cycles. During this period, customers will not pay for additional data blocks for data used above their data plan. Customers who exceed their data plan will see charges and a matching credit on their bill statement. Beginning with bills dated October 15th and later, grace period credits will no longer be applied, and customers will be charged for usage above their data plan.

Understanding and managing your data usage

You are currently subscribed to the Preferred package which includes a data plan of 350 GB (Gigabytes) per month. To help you stay informed about data usage, Cox will begin to notify you via email and browser alert if you use 85% of your monthly data plan and again if you use 100% of your monthly data plan. Additional blocks of data will only be provided if you exceed your data plan. This will not change your Internet package and there will be NO change to the speed or quality of your service for data usage above your plan. To better understand your household's historical and current data usage, you will find your household's data usage meter and other helpful tools and information here.

Thank you for choosing Cox.

Sincerely,

Cox High Speed Internet Team

In the wake of FCC's ruling reaffirming Network Neutrality, is this what ISPs will be doing to squeeze more money out of its customers?

Submission + - Google Offers Cheap Cloud Computing For Low-Priority Tasks (itworld.com)

jfruh writes: Much of the history of computing products and services involves getting people desperate for better performance and faster results to pay a premium to get what they want. But Google has a new beta service that's going in the other direction — offering cheap cloud computing services for customers who don't mind waiting. Jobs like data analytics, genomics, and simulation and modeling can require lots of computational power, but they can run periodically, can be interrupted, and can even keep going if one or more nodes they're using goes offline.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...