jfruh writes: When the.horse generic top-level domain was launched, it was pitched as a home for equine enthusiasts. But nobody's using race.horse or saddle.horse today — the highest-profile action on the TLD comes from pranksters who snapped up trademarks like walmart.horse for their own silly purposes. The ballad of.horse raises the question of who exactly is buying into the slew of weird top-level domains that have come out recently --.boo,.moe, and.fly among others — and why you might (or might not) want to join them.
dcblogs writes: In March 2000, the NASDAQ composite index reached a historic high of 5,048, at just about the same time undergrad computer science enrollments hit a peak of nearly 24,000 students at Ph.D.-granting institutions in the U.S. and Canada, according to data collected by the Computing Research Association in its most recent annual Taulbee Survey. By 2005, computer science enrollments had halved, declining to just over 12,000. On July 17, the NASDAQ hit its highest point since 2000, reaching a composite index of 5,210. In 2014, computer science undergrad enrollments reached nearly, 24,000, almost equal to the 2000 high. Remarkably, it has taken nearly 15 years to reach the earlier enrollment peak.
jfruh writes: In Pali, the term for which is paiccasamuppda ('mutual arising') means that every action contains the seeds of unknown others, including ones that work toward its own destruction. We can see this in our national political life — when, for instance, a young white man who tried to start a race war by killing nine black people spurred a movement to remove Confederate flags from statehouses instead. And, according to webmaster Sasha Akhavi, we see it in software development as well, where our actions cause nowhere near the linear march towards success that we would like.
chicksdaddy writes: IT World has a story today suggesting that GitHub may be a victim of its own success. Exhibit 1: "GitHub dorking:" the use of GitHub's powerful internal search engine to uncover security holes and sensitive data in published code repositories. (http://www.itworld.com/article/2921135/security/add-github-dorking-to-list-of-security-concerns.html) In a nutshell: GitHub's runaway popularity among developers is putting employers and development shops in a tough spot. As the recent story about Uber accidentally publishing database administrator credentials in a public GitHub repository suggests, (http://arstechnica.com/security/2015/03/in-major-goof-uber-stored-sensitive-database-key-on-public-github-page/), it can be difficult even for sophisticated development organizations to grasp the nuances of how interactions with GitHub's public code repositories might work to undermine corporate security.
The ease with which developers can share and re-use code on GitHub is part of the problem, said Bill Ledingham, chief technology officer at Black Duck Software, which monitors some 300,000 open source software projects that use GitHub. Ledingham said leaked user credentials are inadvertent errors caused by developers too accustomed to the ease with which code can be borrowed, modified and resubmitted to GitHub.
"Developers in some cases are just taking the easiest path forward," he said. "They're checking in code or re-using it and not looking at some of these issues related to security."
Among the issues to watch out for are information leaks by way of vulnerabilities in GitHub.com or the GitHub API, leaks of intellectual property in published repositories and the leak of credentials and other shared secrets that could be used to compromise production applications.
Tools like the GitRob command line application developed by Michael Henriksen (http://michenriksen.com/blog/gitrob-putting-the-open-source-in-osint/) make it a simple matter to analyze all the public GitHub repositories associated with a particular organization. GitRob works by compiling the public repositories belonging to known employees of that firm, then flagging filenames in each repository that match patterns of known sensitive files.
Companies that are doing software development need to take an active interest in GitHub, determining which employees and contractors are using it and verifying that no proprietary code or sensitive information is leaking into the public domain.
Internally, data leak prevention products can identify and block the movement of proprietary code. Concerted education for developers about best practices and proper security hygiene when downloading and uploading code to shared and searchable source repositories can help prevent head slapping mistakes like the leak of database administrator credentials and private keys.
jfruh writes: There were a lot of rumored features of the Xbox One that vanished after public outcry — that it would need an always-on Internet connection, for instance. But another rumor from that era was that every Xbox One sold would include a dev kit that would allow anyone to create games — and it looks like this is one dream that might be coming true soon.
IsoQuantic writes: A new report from the tech career site Gooroo sheds light on which programming skills are most in demand for which tech positions. Its recently released International Tech Careers and Salary Index is based on an analysis of 3 million tech job listings from the United States, Great Britain and Australia from January through September, 2014. For a number of common tech job titles, Gooroo analyzed which skills are mentioned the most in listings for that position.
The bottom line is that different kinds of programming skills are better suited for different kinds of software development jobs. For example, if you want to be an iOS developer, being able to code in Objective-C will help you a lot more than other skills. Also, some programming skills will make you a more attractive candidate for non-developer positions. Being able to write SQL, for instance, comes in handy for system administrators, data scientists and Web designers.
See slide show and comments below the same at the link below.
sfcrazy writes: It’s been long since we heard a good rant from Linus Torvalds. Linux doesn't rant much, but when he does he hits the nail and he doesn't mince worlds and this time he targeted Apple's HFS+. Linus says, "The true horrors of HFS+ are not in how it’s not a great filesystem, but in how it’s actively designed to be a bad filesystem by people who thought they had good ideas."
jfruh writes: Google is still making billions in revenue every quarter, but its income is starting to slip a bit — and, worryingly for the advertising giant, it's making less money per ad click than it has in the past. The culprit is the shift to mobile browing, because mobile users tend to be less lucrative.
jfruh writes: Remember when Intel was going to be the next big TV provider, but then realized that was hard and sold the business to Verizon? Well, Verizon is announcing what it's doing with it: a "mobile TV service" that will bring the big four broadcast networks plus "custom channels" to subscribers. Verizon CEO Lowell McAdam was light on details, but said that the service wouldn't compete traditional pay TV offerings like Verizon's own FiOS, which probably means that it will be restricted to mobile devices only.
jfruh writes: Simple.TV is a DVR for over-the-air television programs with a lot of nifty functionality, and it just gained a new one: the ability to share recorded content with friends over the Internet. The question is, how long will media companies tolerate the ability to stream media to other people, even media that arrived for free over the publicly owned airwaves?
jfruh writes: Wearable tech has been a pretty niche product so far, and a widely derided one at that, but moves are in the works to help the category break into the mainstream. One of the biggest irritants is that most wearable devices must pair with a smartphone to actually connect to the Internet — but an AT&T exec says that his company will be selling a standalone wearable by the end of 2014. Google Glass has been a flashpoint of conflict not least because it's extremely obvious; its creator says that subtle, non intrusive versions are coming. And while everyone wonders what Apple's play in this space will be, it may be best to imagine what they're working on as a successor to their fading iPod line.
jfruh writes: In the early days of bitcoin, a lot of miners used specialized GPU rigs to crunch through the math needed to create more bitcoin. As the calculations grew more difficult, many miners moved to specialized ASICS — and the rumor spread that the shift was having an impact on the overall GPU market. But the extent has been greatly exaggerated.
jfruh writes: A recent survey of developer salaries across various nations has come up with some interesting numbers. Developers have the highest average salary in Switzerland, which makes sense because Swiss salaries are generally quite high. But if you want to make a lot more money than everyone else in the country, move to Pakistan.
jfruh writes: "Experience" as a resume component is a Catch-22 proposition: it's difficult to get experience without a job, and difficult to get a job without experience. Career coach Eric Bloom has some advice to techies on ways to break out of the cycle, including some nonconventional ways to gain experience and ways to make experience you do have look more attractive to potential employers.