Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

+ - How to know if Iran breaks its word: Financial monitoring->

Submitted by Lasrick
Lasrick writes: This is a fascinating read from Aaron Arnold of the Project on Managing the Atom at Harvard's Kennedy School. Arnold points out that the Iran Nuclear Framework Agreement specifies not only that international inspectors will have access to all of Iran’s nuclear facilities, but will also gain access to Iran’s nuclear supply chain, in order to verify that components and materials are not diverted to a covert facility. 'To insure additional transparency, the preliminary framework calls for a dedicated procurement channel to approve the supply, sale, and transfer of certain nuclear-related and dual-use parts, technologies, and materials on a case-by-case basis.' Arnold points out that this is a tricky area, because Iran has shown extraordinary skill at getting around financial sanctions, and it's unclear what international body will monitor Iran's financial transactions. The article then details steps that could be taken to ensure that Iran's financial transactions are transparent and cannot be used to obtain dual-use materials, including the requirement that Iran join the international Financial Action Task Force. Great read..
Link to Original Source

+ - Insurer denies healthcare breach claim citing lack of minimum required practices->

Submitted by chicksdaddy
chicksdaddy writes: In what may become a trend, an insurance company is denying a claim from a California healthcare provider following the leak of data on more than 32,000 patients. The insurer, Columbia Casualty, charges that Cottage Health System did an inadequate job of protecting patient data.

In a complaint filed in U.S. District Court in California, Columbia alleges that the breach occurred because Cottage and a third party vendor, INSYNC Computer Solution, Inc. failed to follow “minimum required practices,” as spelled out in the policy. Among other things, Cottage “stored medical records on a system that was fully accessible to the internet but failed to install encryption or take other security measures to protect patient information from becoming available to anyone who ‘surfed’ the Internet,” the complaint alleges.

Disputes like this may become more common, as insurers anxious to get into a cyber insurance market that's growing by about 40% annually use liberally written exclusions to hedge against 'known unknowns' like lax IT practices, pre-existing conditions (like compromises) and so on. (http://www.itworld.com/article/2839393/cyber-insurance-only-fools-rush-in.html)

Link to Original Source

+ - The Scientific Method and the Art of Troubleshooting

Submitted by HughPickens.com
HughPickens.com writes: Karl Popper came up with the idea in the 1930's that scientists should attempt to falsify their hypotheses rather than to verify them. The basic reasoning is that while you cannot prove a hypothesis to be true by finding a number of different confirming instances (though confirming instances do make you more confident in the truth), you can prove a hypothesis to be false by finding one valid counter-example. Now Orin Thomas writes at WindowsITPro that you’ve probably diagnosed hundreds, if not thousands, of technical problems in your career and Popper's insights can serve as a valuable guide to avoid a couple of hours chasing solutions that turn out to be an incorrect answer. According to Thomas when troubleshooting a technical problem many of us “race ahead” and use our intuition to reach a hypothesis as to a possible cause before we’ve had time to assess the available body of evidence. "When we use our intuition to solve a problem, we look for things that confirm the conclusion. If we find something that confirms that conclusion, we become even more certain of that conclusion. Most people also unconsciously ignore obvious data that would disprove their incorrect hypothesis because the first reaction to a conclusion reached at through intuition is to try and confirm it rather than refute it."

Thomas says that the idea behind using a falsificationist method is to treat your initial conclusions about a complex troubleshooting problem as untrustworthy and rather than look for something to confirm what you think might have happened, try to figure out what evidence would disprove that conclusion. "Trying to disprove your conclusions may not give you the correct answer right away, but at least you won’t spend a couple of hours chasing what turns out to be an incorrect answer."

+ - Amazon Germany pays 0.1% tax rate in 2014, funnels sales through low-tax haven->

Submitted by Anonymous Coward
An anonymous reader writes: E-retail giant Amazon.com’s German branch paid just 11.9 million euros (approx. $16 million) in tax last year, equivalent to a 0.1% tax rate considering the company reported $11.9 billion in gross sales in Germany in 2014. German corporate income tax stood at 29.58% last year which would mean Amazon Germany would have been expected to pay $3.5 billion in tax in 2014. Amazon.de is the group’s largest and most successful market outside of the U.S., according to its annual sales records. However following investigation it has been revealed that almost all of the company’s German sales and profits were reported from businesses in Luxembourg, a low-tax haven. Amazon said last week that it had implemented a number of changes across Europe, including in the United Kingdom, Germany, Spain and Italy from May 1st, in order to ensure that future sales would be managed in the countries themselves.
Link to Original Source

+ - How Employers Get Out of Paying Their Workers

Submitted by HughPickens.com
HughPickens.com writes: We love to talk about crime in America and usually the rhetoric is focused on the acts we can see: bank heists, stolen bicycles and cars, alleyway robberies. But Zachary Crockett writes at Pricenomics that wage theft one of the more widespread crimes in our country today — the non-payment of overtime hours, the failure to give workers a final check upon leaving a job, paying a worker less than minimum wage, or, most flagrantly, just flat out not paying a worker at all. Most commonly, wage theft comes in the form of overtime violations. In a 2008 study, the Center for Urban Economic Development surveyed 4,387 workers in low-wage industries and found that some 76% of full-time workers were not paid the legally required overtime rate by their employers and the average worker with a violation had put in 11 hours of overtime—hours that were either underpaid or not paid at all. Nearly a quarter of the workers in the sample came in early and/or stayed late after their shift during the previous work week. Of these workers, 70 percent did not receive any pay at all for the work they performed outside of their regular shift. In total, unfairly withheld wages in these three cities topped $3 billion. Generalizing this for the rest of the U.S.’s low-wage workforce (some 30 million people), researchers estimate that wage theft could be costing Americans upwards of $50 billion per year.

Last year, the Economic Policy Institute made what is, to date, the most ambitious attempt to quantify the extent of reported wage theft in the U.S.and determined that “the total amount of money recovered for the victims of wage theft who retained private lawyers or complained to federal or state agencies was at least $933 million.” Obviously, the nearly $1 billion collected is only the tip of the wage-theft iceberg, since most victims never sue and never complain to the government. Commissioner Su of California says wage theft has harmed not just low-wage workers. “My agency has found more wages being stolen from workers in California than any time in history,” says Su. “This has spread to multiple industries across many sectors. It’s affected not just minimum-wage workers, but also middle-class workers.”

+ - Can SaaS be open source AND economically viable?->

Submitted by Anonymous Coward
An anonymous reader writes: The CTO behind Lucidchart, an online diagramming app, recently cited the rbush open source project as an invaluable tool for helping implement an "in-memory spatial index" that "increased spatial search performance by a factor of over 1,000 for large documents." My question is this: what risks does a SaaS company like Lucidchart face in making most of their own code public, like Google's recent move with Chrome for Android, and what benefits might be gained by doing so? Wouldn't sharing the code just generate more users and interest? Even if competitors did copy it, they'd always be a step behind the latest developments.
Link to Original Source

+ - Researchers devise a system that looks secure (but is it easy to use?).->

Submitted by Anonymous Coward
An anonymous reader writes: The article in readwrite says that a team of British and American researchers have developed a hacker resistant process for online voting (http://www.cs.bham.ac.uk/~mdr/research/papers/pdf/15-Du-Vote.pdf) called Du-Vote. It uses a credit card sized device that helps to divide the security sensitive tasks between your computer and the device in a way that neither your computer nor the device learns how you voted. If a hacker managed to control the computer and the Du-Vote token, he still can't change the votes without being detected.
Link to Original Source

+ - Congress Seeks to Quash Patent Trolls->

Submitted by walterbyrd
walterbyrd writes: The process is moving quickly. The Senate Judiciary Committee plans to vote on the bill by the end of the month, readying it for a final Senate vote this summer, and the House of Representatives’ Judiciary Committee is likely to vote this week on a similar measure. That gives observers optimism that Congress will finally enact patent-troll legislation after a failed effort last year. “The Senate version really does seem to be hitting some sort of sweet spot,” says Arti Rai, co-director of the Duke Law Center for Innovation Policy in Durham, North Carolina.
Link to Original Source

Comment: Don't like a story? Don't read it. (Score 4, Insightful) 377

"... isn't this completely unrelated to what slashdot is about?"

Please don't post comments to stories that don't interest you.

The sociology of technology is something I must deal with every day. It's interesting to me to read stories about that.

Comment: Re:Either of the poles woulc cause this effect (Score 1) 490

by Tumbleweed (#49739947) Attached to: The Brainteaser Elon Musk Asks New SpaceX Engineers

If you start a mile north of the South Pole, walk a mile south, then you cannot walk west, so it still fails.

Also, the North Pole isn't ice-free all year long. (I've not been keeping up with how much (if it has happened yet) it is ice-free during a year, but it's certainly not the whole year. Yet.)

+ - Cox HSI ends unlimited internet, introduces cap system->

Submitted by Junior J. Junior III
Junior J. Junior III writes: Today, Cox High Speed Internet customers received the following communication:

Dear [Cox HSI Customer],

We spend more time online today than ever before, streaming movies and TV shows, downloading music, sharing photographs and staying connected to friends and family. As Internet and data consumption grows, Cox continues to improve our network to ensure a quality experience for all our customers.

To better support our customers' expanding online activity, we recently increased the amount of data included in all of our Cox High Speed Internet packages. About 95% of customers are now on a data plan that is well-suited for their household. In the event you use more data than is included in your plan, beginning with bill cycles that start on June 15th, we will automatically provide additional data for $10 per 50 Gigabyte (GB) block for that usage period. Based on your last 3 months of data usage and our increased data plans, it is unlikely you will need additional data blocks unless your usage increases.

What this means for you

To help our customers get accustomed to this change, we are providing a grace period for 3 consecutive billing cycles. During this period, customers will not pay for additional data blocks for data used above their data plan. Customers who exceed their data plan will see charges and a matching credit on their bill statement. Beginning with bills dated October 15th and later, grace period credits will no longer be applied, and customers will be charged for usage above their data plan.

Understanding and managing your data usage

You are currently subscribed to the Preferred package which includes a data plan of 350 GB (Gigabytes) per month. To help you stay informed about data usage, Cox will begin to notify you via email and browser alert if you use 85% of your monthly data plan and again if you use 100% of your monthly data plan. Additional blocks of data will only be provided if you exceed your data plan. This will not change your Internet package and there will be NO change to the speed or quality of your service for data usage above your plan. To better understand your household's historical and current data usage, you will find your household's data usage meter and other helpful tools and information here.

Thank you for choosing Cox.

Sincerely,

Cox High Speed Internet Team

In the wake of FCC's ruling reaffirming Network Neutrality, is this what ISPs will be doing to squeeze more money out of its customers?
Link to Original Source

+ - Google Offers Cheap Cloud Computing For Low-Priority Tasks->

Submitted by jfruh
jfruh writes: Much of the history of computing products and services involves getting people desperate for better performance and faster results to pay a premium to get what they want. But Google has a new beta service that's going in the other direction — offering cheap cloud computing services for customers who don't mind waiting. Jobs like data analytics, genomics, and simulation and modeling can require lots of computational power, but they can run periodically, can be interrupted, and can even keep going if one or more nodes they're using goes offline.
Link to Original Source

Dead? No excuse for laying off work.

Working...