Forgot your password?
typodupeerror

Submission Summary: 1 pending, 922 declined, 573 accepted (1496 total, 38.30% accepted)

+ - iPhone 6 Expected To Fetch Over $3,000 In China's Grey Market->

Submitted by itwbennett
itwbennett (1594911) writes "Apple has yet to say when the new iPhones might arrive in China, but grey market dealers in Beijing expect unofficial shipments of the iPhone 6 from Hong Kong and Australia to start arriving in China this weekend. Saying 'Chinese people will buy anything,' Beijing electronics dealer Wang Qingyun said he expects initial prices will reach over 20,000 yuan ($3,251) and perhaps up to 25,000 yuan, depending on how many iPhone 6 units actually make it to Beijing."
Link to Original Source

+ - Scary Video Highlights Danger of Damaged Lithium Ion Batteries->

Submitted by itwbennett
itwbennett (1594911) writes "As part of its work testing electronic components, the Japanese National Institute for Technology and Evaluation (NITE) tested batteries about the size of those used in cellphones. They were struck with a hammer then left on a work bench, unconnected from any apparatus. Later — the period of time is unclear from the edited footage — one of the batteries ruptures with a bang, flying across the laboratory. A second clip shows a similar battery erupting in a shower of sparks."
Link to Original Source

+ - US Military Unaware of Chinese Attacks Against Transport Contractors->

Submitted by itwbennett
itwbennett (1594911) writes "The Senate Armed Service Committee released on Wednesday an unclassified version of a report (PDF) commissioned last year to investigate cyberattacks against contractors for the U.S. Transportation Command (TRANSCOM). The report alleges that the Chinese military successfully stole emails, documents, login credentials and more from contractors, but few of those incidents were ever reported to TRANSCOM. During a one-year period starting in June 2012, TRANSCOM contractors endured more than 50 intrusions, 20 of which were successful in planting malware. TRANSCOM learned of only two of the incidents. The FBI, however, was aware of 10 of the attacks."
Link to Original Source

+ - Use of Forced Labor 'Systemic' in Malaysian IT Manufacturing->

Submitted by itwbennett
itwbennett (1594911) writes "The use of forced labor is so prevalent in the Malaysian electronics manufacturing industry that there is hardly a major brand name that isn't touched by the illegal practice, according to a report funded by the U.S. Department of Labor and undertaken by Verité, a nonprofit organization focused on labor issues. The two-year study surveyed more than 500 migrant workers at around 200 companies in Malaysia's IT manufacturing sector and found one in three were working under conditions of forced labor."
Link to Original Source

+ - FCC Gets Record Number of Net Neutrality Comments. What Now?->

Submitted by itwbennett
itwbennett (1594911) writes "The deadline for the public to comment on the FCC's proposed net neutrality rules passed Monday with more than 3 million comments filed, a record number for an FCC proceeding — and by far eclipsing the 1.4 million complaints the FCC received over Janet Jackson's wardrobe malfunction. The agency will now focus on reading and analyzing comments, said agency spokeswoman Kim Hart. Employees from across the FCC will be called on to read comments and technology tools will also be used to analyze comments, she said. But the record-breaking number of comments may slow the process and there's no set timeline for the FCC to act on net neutrality rules, Hart said."
Link to Original Source

+ - How can programmers move up professionally?->

Submitted by itwbennett
itwbennett (1594911) writes "Climb the ladder; make more money. Sounds good, right? But if you're a developer, you've first got to choose your ladder. In a recent blog post, Eric Bloom, an IT leadership development consultant and former CIO, tackles the question of developer career advancement. His advice sends readers down one of two (very broad) possible paths: 1) get deeply technical or 2) use your tech cred to open doors, but start pivoting into management. Are those really the only two options available to developers who want to advance in their careers?"
Link to Original Source

+ - How China's E-waste Capital Is Trying to Clean Itself Up->

Submitted by itwbennett
itwbennett (1594911) writes "If you want to see where your old electronics go to die, take a trip to Guiyu. For two decades, PCs, phones and other electronics have been shipped to this town on the southeast coast of China, where locals in thousands of small workshops pull them apart with buzz saws and pliers to extract the valuable components inside. But things may finally be changing. A sign posted by a small stream in the town declares that Guiyu will crack down on any 'acid cleaning, and burning activities.' And residents said it's rare now to see 'board burning' in the town itself, with that and other dangerous activities having been moved to an industrial park to the north."
Link to Original Source

+ - Home Depot Confirms Breach Of Its Payment Systems->

Submitted by itwbennett
itwbennett (1594911) writes "Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the U.S. and Canada since April. There's no evidence yet that debit card PIN numbers had been compromised, the company said, though it is still figuring out the scope and scale of the attacks."
Link to Original Source

+ - Just Five Gangs in Nigeria Are Behind Most Craigslist Buyer Scams->

Submitted by itwbennett
itwbennett (1594911) writes "Five Nigerian criminal gangs are behind most scams targeting sellers on Craigslist, and they've taken new measures to make their swindles appear legitimate, according to a study by George Mason University researchers Damon McCoy and Jackie Jones. In a new innovation, they're using professional check-writing equipment plus U.S.-based accomplices to not raise suspicions among their victims. McCoy and Jones will present their paper on Sept. 24 at the IEEE eCrime Research Summit in Birmingham, Alabama."
Link to Original Source

+ - What Are the Most Confounding Features of Various Programming Languages?->

Submitted by itwbennett
itwbennett (1594911) writes "Every programming language has its own unique quirks, such as weird syntax, unusual functionality or non-standard implementations, things that can cause developers new to the language, or even seasoned pros, to scratch their heads in wonder (or throw their hands up in despair). ITworld's Phil Johnson has rounded up some of the WTFiest — from the + operator in JavaScript to the trigraphs in C and C++ and indentation level in Python. What programming language oddities cause you the most grief?"
Link to Original Source

+ - White House Names Google's Megan Smith As CTO->

Submitted by itwbennett
itwbennett (1594911) writes "The White House has named long-time Google executive Megan Smith as the government's new CTO, in charge of improving technology and the use of data across agencies. Smith most recently served as vice president at Google's tech lab, Google[x]. She previously served as CEO of PlanetOut, helped design early smartphone technologies at General Magic and worked on multimedia products at Apple Japan in Tokyo. She holds bachelor's and master's degrees in mechanical engineering from MIT, and just might be, as noted in a previous Slashdot post, the first US CTO worthy of the title. Also on Thursday, the White House named Alexander Macgillivray, a former general counsel and head of public policy at Twitter, as deputy U.S. CTO."
Link to Original Source

+ - The Forensic Tool That Grabs Nude Selfies From iCloud Accounts->

Submitted by itwbennett
itwbennett (1594911) writes "There's a seedy trade in compromising photos stored in Apple iCloud accounts, and it is in part aided by a software program that cleanly collects the data. The software tool they're using is Moscow-based Elcomsoft's Phone Password Breaker (EPPB), one of many forensic tools the company develops for law enforcement and other clients. Elcomsoft CEO Vladimir Katalov said via email on Wednesday that there are legitimate uses for his company's software and that it doesn't exploit flaws in Apple services, but at the same time, Elcomsoft doesn’t restrict who it sells EPPB to and over time the software has been sold and then leaked to underground websites, like Anon-IB where some of the nude celebrity photos are believed to have first been circulated."
Link to Original Source

+ - This is Tim: How Tim Cook is Becoming the Un-Jobs->

Submitted by itwbennett
itwbennett (1594911) writes "Back in June, the New York Times ran an article (which was picked up by Slashdot) about how Tim Cook is putting his own stamp on Apple. That article, though, focused mainly on personality and style, and ITworld's Andy Patrizio has followed up with a collection of some of the technical, business, and product decisions Cook has made — from embracing the enterprise to dumping Objective C — that let us know we're firmly in the Tim Cook Era."
Link to Original Source

+ - FCC Allowed To Question AT&T, Verizon On Business Broadband Pricing->

Submitted by itwbennett
itwbennett (1594911) writes "The White House Office of Management and Budget (OMB) has given the FCC permission to collect new data in the long-running dispute over special access pricing. AT&T and Verizon Communications control an estimated 80 percent of the special access market, and competitors have complained for years that the two dominant telecom carriers are charging excessive prices for special access services. The FCC circulated a proposed order on special access in mid-2012, but late that year, also asked for comments on the special access market. Those comments aren't due until late this year."
Link to Original Source

+ - Why Chinese Hackers Would Want US Hospital Patient Data->

Submitted by itwbennett
itwbennett (1594911) writes "In a follow-up to yesterday's story about the Chinese hackers who stole hospital data of 4.5 million patients, IDG News Service's Martyn Williams set out to learn why the data, which didn't include credit card information was so valuable. The answer is depressingly simple: people without health insurance can potentially get treatment by using medical data of one of the hacking victims. John Halamka, chief information officer of the Beth Israel Deaconess Medical Center and chairman of the New England Healthcare Exchange Network, said a medical record can be worth between $50 and $250 to the right customer — many times more than the amount typically paid for a credit card number, or the cents paid for a user name and password. 'If I am one of the 50 million Americans who are uninsured ... and I need a million-dollar heart transplant, for $250 I can get a complete medical record including insurance company details,' he said."
Link to Original Source

A memorandum is written not to inform the reader, but to protect the writer. -- Dean Acheson

Working...