Please create an account to participate in the Slashdot moderation system


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Hiring A War Criminal highlights something else... (Score 3, Insightful) 448 448

Hiring a war criminal and domestic-spying person may not change Dropbox's stance on privacy, but it shows another darker side of DB, it's business-at-the-expense-of-morality side.

Did they really think, "She approved the mass snooping of private data saved online, which certainly included targeting our infrastructure to breach our customers' privacy. Oh, we won't worry about that, we need her expertise, we'll hire her!".

Then again, writing the above paragraph, what the fuck was their stance on privacy then, if hiring her didn't make them ask themselves whether they're doing the right thing?

And how exactly will Dropbox succeed in the international scene, when all the foreign companies fucking realize that they're basically in-bed with the Washington "Elite", the same people that created and supported PRISM?!?


What Sci-Fi Movies Teach Us About Project Management Skills 186 186

Esther Schindler writes "It's certainly fun to pretend to find work inspiration from our favorite SF films. That's what Carol Pinchefsky does in two posts, one about positive business lessons you can take away from SF films (such as 'agile thinking can save many a project (and project manager) in a crisis' from Robocop and team motivation lessons from Buffy), and the other, 5 Project Management Horror Stories Found in Sci-Fi Movies, with examples of the impact of poor documentation on Captain America."

Comment: Re:Your best bet is (Score 2, Interesting) 682 682

Android 4.3 now has multiple user capabilities, where features can be disabled:

I'd say have 3 accounts: Admin, for Kindergarten use (no games), and for play time (Kiddie has to ask a parent for the password)...

Comment: Re:Done us all a favor (Score 4, Insightful) 629 629

He talked to the civilian Chinese newspaper about the US government hacking Chinese civilian servers.

I trust him, if his motive was really to sell those secrets for money to the Chinese, he would've done it covertly. He wants everyone, not just the Chinese, to have information about what the US Secret Police is doing. Want to bet that there are backups of ALL the files on NSA's illegal activities in the hands of Guardian reporters too? Snowden can disappear at any moment, he'll have trusted someone like Greenwald/a Guardian IT person to take care of his secrets, maybe as an insurance policy as well.

Just like we get pissed if the Chinese hacked Google, the Chinese are pissed that the US hacked into university servers. If it were military targets like the Pentagon, we would think it's fair game...

Comment: Re:Security (Score 1) 114 114

It'd be more interesting to send parts of the password to different people. So for example 3 people out of a group of 7 would have to join their parts to get the whole password. Redundancies are there in case some of the people fall off the face of the planet. Ideally you'd find 7 people where no three of them would join up to conspire against you -- that is admittedly very hard.

I'm sure there's a mathematical function to split up a piece of information so that 3 out of 7 pieces is enough to restore it. How to do it is an exercise left for the reader.

Comment: Re:Big Android Problem (Score 1) 176 176

I played with a BlackBerry in 2008, and they already had/have this. If an app doesn't have a particular permission, it would get a SecurityException. It's supposed to keep functioning (e.g. a chat app might not be able to read your contacts, so it would have to have its own contacts database that you'd manage manually).

But of course Google apps just say "I have to have all permissions or I won't install myself" :(

Open Source

ARM Publishes 64-bit "AArch64" Linux Kernel Support 90 90

An anonymous reader writes "ARM Holdings has made available Linux kernel support for AArch64, the ARMv8 64-bit architecture. No 64-bit ARMv8 hardware is yet shipping until later this year, but ARM has prepared the 36 patches amounting to 23,000 lines of architecture code for mainline integration."

Excessive login or logout messages are a sure sign of senility.