Forgot your password?
typodupeerror

Comment: The Elephant in the Room (Score 1) 504

by kgo (#32167784) Attached to: Can Employer Usurp Copyright On GPL-Derived Work?

Depending on the circumstances, the employer may or may not be legally entitled to use the code how they like. But there's enough discussions here on what constitutes development. But...

The developer may not have been legally entitled to collect a paycheck to work on GPL software on company time.

You hear horror stories all the time going everywhere from rent-a-coder to some utility bundled on the Microsoft CD, where the employer had the expectation that they owned the code, only to find out a developer cheated and used some GPL code.

Since the developer even said that there was no written of verbal agreement with the company, the default assumption would be that they are paying you to write code that they will own.

I don't want to get into legal quibbles here, but the developer has basically defrauded the company if he got paid to deliver code that they can't use because of the license.

Comment: Re:What would be the point of encrypting the datab (Score 1) 510

by kgo (#31977202) Attached to: Mass. Data Security Law Says "Thou Shalt Encrypt"

Well you would have the administrator manually mount the encrypted db after a reboot and type the passphrase at that time, not hardcode it in the app. It doesn't help when someone cracks the running system. It does help when they steal the server or the database files. You pretty much get the same benefits as full drive encryption.

Comment: Definition of PII from the text of the law (Score 5, Informative) 510

by kgo (#31976592) Attached to: Mass. Data Security Law Says "Thou Shalt Encrypt"

"""
Personal information, a Massachusetts resident's first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident’s financial account; provided, however, that “Personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.
"""

So this doesn't apply to places like slashdot and facebook. Only places that should be securing your data in the first place.

Comment: Re:Why choose Ubuntu? Why not something else? (Score 2, Interesting) 165

by kgo (#31967966) Attached to: Ubuntu Linux Claims 12,000 Cloud Deployments

When Fedora first came out, I felt like Red Hat went out of their way to make fedora the "hobbiest" version, and RHEL the "corporate" version. Have they got more or less divergent as time has gone on? It's kind of nice to run the same version of the software at home and in the server room, where Ubuntu is Ubuntu is Ubuntu. One less thing to deal with. Just wondering if I should give Fedora another try...

Comment: Re:Linux? Yawn... boring... (Score 1) 742

by kgo (#31889744) Attached to: Why Linux Is Not Attracting Young Developers

Slashdot was written in someone's spare time... All I'm saying is there were plenty of shiny new things back then in the ancient olden times before smart phones that were sexier than kernel hacking. A lot more shiny new things and opportunities between 1995 and 2000 than there are now. It's just silly to say that the dot-com-mania era didn't have anything more exciting to offer than today's smartphones.

If a subordinate asks you a pertinent question, look at him as if he had lost his senses. When he looks down, paraphrase the question back at him.

Working...