Forgot your password?
typodupeerror

Comment: Wonder why women are so uncomfortable... (Score 4, Insightful) 572

by kevjava (#29835783) Attached to: Yahoo Offered Lap Dances At Hack Event

in the Information Technology field? This might go some way to explain it.

Did Yahoo not think that women engineers would be present at this event? They make up roughly ten percent of engineers as a whole. Furthermore, did they think that there was some way that women attendees would be perfectly comfortable watching other women objectified on a stage?

It's not that I mind women being objectified for money -- the women involved are handsomely rewarded for their parts in this business deal. I do mind people in my field saying that they do everything they can to make women comfortable in our field, then turning around and saying that they don't understand why anyone would be offended by this.

Comment: Re:Thanks! (Score 4, Insightful) 216

by kevjava (#29266107) Attached to: The Myths of Security

But, the Schneier chapter isn't meant to piss him off, I have no beef with him whatsoever. I just think the fanboys do the world a disservice by not thinking for themselves, especially when they draw from material that's a decade old.

The thing is, you're not convincing me that the book is out of date. There is plenty of material in the Internet that is over a decade old and is still relatively current. I read the Cathedral and the Bazaar for the first time last month, and drew a good amount of benefit from its words, even if I'm not ready to swallow it whole. The Mythical Man Month shed quite a bit of perspective on project management in a field that our industry has fifty or so years of experience in, and yet we still do terribly at.

The principles of cryptography are still the same today as they were in the days of the Roman Empire and the Caesar Cipher, with all the bits about Alice and Bob with Mallory in the middle. Our toys are much more advanced today, and their rate of advance continues to increase, but just what is it that makes our pulling of information from a 10+-year-old book harmful?

I'm no Schneier "fanboy", and haven't actually read the book; I just genuinely want to know.

Handhelds

Nvidia Lauds Windows CE Over Android For Smartbooks 263

Posted by timothy
from the this-is-2009-ce-after-all dept.
ericatcw writes "Google's Android may enjoy the hype, but an increasing number of key industry players say the mobile OS isn't ready for ARM netbooks, aka smartbooks. Nvidia is the most recent to declare Android unfit for duty, stating its preference for Microsoft's Windows CE, which an Nvidia exec praised for having a "low footprint" and being "rock solid." Nvidia is busy optimizing its multimedia-savvy Tegra system-on-chip for Windows CE. Such improvements won't arrive for at least a year to Android, which has an inflexible UI and poor graphics support for devices larger than a smartphone, says Nvidia. Other firms echoing similar criticism include ARM and Asustek."
The Almighty Buck

Apple Disclosures About Jobs To Face SEC Review 187

Posted by CmdrTaco
from the they-really-hate-turtlenecks dept.
suraj.sun writes "US regulators are examining Apple Inc.'s disclosures about Chief Executive Officer Steve Jobs's health problems to ensure investors weren't misled, a person familiar with the matter said. The Securities and Exchange Commission's review doesn't mean investigators have seen evidence of wrongdoing, the person said, declining to be identified because the inquiry isn't public. Bloomberg News reported last week that Jobs is considering a liver transplant as a result of complications after treatment for cancer, according to people who are monitoring his illness."
Books

On the Economics of the Kindle 398

Posted by kdawson
from the how-much-is-cool-worth dept.
perlow writes "Just how many books a year would you need to read before the cost of Amazon's Kindle is justified? The answer is not so cut-and-dried. If you're a college student and all of your texts were available on Kindle (possible but unlikely), you could recover the cost of the reader in a semester and a half. For consumers to break even with Kindle's cost in that time, they would have to be in the habit of buying and reading four new hardback books per month — if the convenience factor wasn't part of the equation. At two books per month, breakeven would be in three years." Here is the spreadsheet if you want to play with the numbers.
Linux Business

How Long Should an Open Source Project Support Users? 272

Posted by ScuttleMonkey
from the no-implied-support dept.
Ubuntu Kitten writes "Since October the community-generated database of cards known to work with Ndiswrapper has been down. This is apparently due to an on-going site redesign, but right now the usual URL simply directs to a stock Sourceforge page. Without the database, the software's usability is severely diminished but this raises an interesting question: Is an open source project obliged to provide support for its users? If so, for how long should the support last? Web servers cost money, especially for popular sites. While developers can sometimes find sponsorship, is it possible to get sponsorship simply for infrastructure and user services?"

Comment: Re:Telecommute = Outsourced (Score 1) 393

by kevjava (#21427085) Attached to: AT&T Calls Telecommuters Back To the Cubicle
The solution to that problem is pretty simple (and yet at the same time, not simple at all): get a cleared job. If you work for the government and your job requires a clearance, then you have instantly guarded yourself with very good certainty from outsourcing.

Okay, you still can't telecommute, but you probably won't get outsourced.
NASA

+ - NASA is withholding pilot safety survey results

Submitted by
Ranten_N_Raven
Ranten_N_Raven writes "According to Yahoo News, NASA did interviews of airline pilots in 2005 about safety issues. Can't be good news in it, because they have refused to release the results.

Anxious to avoid upsetting air travelers, NASA is withholding results from an unprecedented national survey of pilots that found safety problems like near collisions and runway interference occur far more frequently than the government previously recognized...A senior NASA official, associate administrator Thomas S. Luedtke, said revealing the findings could damage the public's confidence in airlines and affect airline profits.
But don't worry, now, it's being taken care of: NASA is ordering the contractor who did the interviews to 'purge all related data from their computers.'"
Software

Would You Install Pirated Software at Work? 848

Posted by Cliff
from the questionable-PHB-ethics dept.
An anonymous reader asks: "I am an IT professional, and due to budget constraints, I have been told to install multiple copies of MS Office, despite offering to install OpenOffice, and other OpenSource Office products. Even though most of the uses are for people using Excel like a database, or formatting of text in cells, other programs are not tolerated. I have been over ruled by our controller, to my disagreement. I would never turn them in, but I am in tough place by knowing doing something illegal. I want to keep my job, but disagree with some of the decision making on this issue. Other than drafting a letter to the owners of the company on how I disagree with the policy, what else can I do?"
The Courts

Groklaw No Front for IBM 206

Posted by CowboyNeal
from the killing-the-messenger dept.
A Groklaw Reader writes "After all the wild speculation SCO put forth about Pamela Jones, her alleged subpoena by SCO, and her recent vacation due to illness, we now have Stephen J. Vaughan-Nichols writing to say 'Yes, there is a PJ.' In his own words, he says, 'Let me address this directly. Yes, Pamela Jones is a real person. I've met her several times [...] I consider her a friend. She is not a front for anyone.' Hopefully, this statement will be enough to put those SCO-induced conspiracy theories to rest."
Censorship

+ - Ethics of proxy servers

Submitted by
Mav
Mav writes "I was recently asked to host a website for free in return for a lot of advertising. After querying them about how they knew the site would produce traffic they stated the site was going to be running PHPProxy (an open source web proxy). The traffic was a result of him and his contacts (nearly one thousand of them) using the site to bypass his school's firewall in order to view their MySpace pages and get access to their MSN messengers. Given all the attention social networking sites have recently received and the various laws attempting to block or control access to them I feel guilty and unsure making this available. Are there legal implications that I need to worry about? Could I be held liable if one of the students got in trouble? Most importantly, what's the moral thing to do?"
Microsoft

+ - Microsoft blasts IBM in open letter

Submitted by carlmenezes
carlmenezes (204187) writes "Arstechnica has an article on Microsoft's open letter to IBM that adds fresh ammunition to the battle of words between those who support Microsoft's Open XML and OpenOffice.org's OpenDocument file formats. Microsoft has strong words for IBM, which it accuses of deliberately trying to sabotage Microsoft's attempt to get Open XML certified as a standard by the ECMA. In the letter, general managers Tom Robertson and Jean Paol write: "When ODF was under consideration, Microsoft made no effort to slow down the process because we recognized customers' interest in the standardization of document formats." In contrast, the authors charge that IBM "led a global campaign" urging that governments and other organizations demand that International Standards Organization (ISO) reject Open XML outright.
Could MS actually be getting a taste of their own medicine?"
Mozilla

+ - Firefox flaw could let sites fake being "trust

Submitted by thirty-seven
thirty-seven (568076) writes "According to an article on the CBC website, a Firefox bug could be exploited to make it look like users are connected to a trusted site when they are not. Apparently, by exploiting a flaw in the way that Firefox manages data written to the browser's "location.hostname" DOM property, a site could manipulate the authentication cookies for trusted websites such as an online bank, thereby appearing trusted itself."

"Tell the truth and run." -- Yugoslav proverb

Working...