Forgot your password?

+ - GAO finds inadequate planning and oversight caused cost blowout->

Submitted by stoborrobots
stoborrobots (577882) writes "The Government Accountability Office has investigated the cost blowouts associated with how the Centers for Medicare & Medicaid Services (CMS) handled the project. It has released a 60-page report entitled Ineffective Planning and Oversight Practices Underscore the Need for Improved Contract Management, with a 5 page summary. The key takeaway messages are:
  • CMS undertook the development of and its related systems without effective planning or oversight practices...
  • [The task] was a complex effort with compressed time frames. To be expedient, CMS issued task orders ... when key technical requirements were unknown...
  • CMS identified major performance issues ... but took only limited steps to hold the contractor accountable.
  • CMS awarded a new contract to another firm [and the new contract's cost has doubled] due to changes such as new requirements and other enhancements...

Larry Seltzer has more over at ZDNet."
Link to Original Source

Comment: Re:Er, what? (Score 1) 191

by stoborrobots (#47660395) Attached to: Reversible Type-C USB Connector Ready For Production

I can see them doing this, rather than the much simpler solution of having two ports: a Micro-B port for charging only, and a C port for data/charging.

Compliant with all regulations, simpler for the consumer (no adapter required), minimal outlay (one extra trace on the PCB, one extra component costing fractions of a cent), no questions about cables.

Comment: Re:Who has the market share? (Score 1) 336

by stoborrobots (#47611925) Attached to: Windows XP Falls Below 25% Market Share, Windows 8 Drops Slightly

I would be curious to see how Azure is impacting Windows Server market share

As this is slashdot, the appropriate response would be to turn to Netcraft to confirm it...

Which was from February, and should be read in the context of the February Web Server Survey:

+ - Russian criminals steal 1.2 billion passwords->

Submitted by mpicpp
mpicpp (3454017) writes "Russian criminals have stolen 1.2 billion Internet user names and passwords, amassing what could be the largest collection of stolen digital credentials in history, a respected security firm said Tuesday.

The news was first reported by The New York Times, which cited research from Milwaukee-based Hold Security. The firm didn't reveal the identities of the targeted websites, citing nondisclosure agreements and a desire to prevent existing vulnerabilities from being more widely exploited.

Hold Security founder Alex Holden told CNNMoney that the trove includes credentials gathered from over 420,000 websites — both smaller sites as well as "household names." The criminals didn't breach any major email providers, he said.

Holden said the gang makes its money by sending out spam for bogus products like weight-loss pills, and had apparently amassed its collection of digital credentials for that relatively innocuous purpose.

"It's really not that impactful to the individuals, and that's why they were under the radar for so long," Holden said. "They've ignored financial information almost completely.""

Link to Original Source

Comment: Re:Simple Answers to Simple Questions (Score 1) 246

by stoborrobots (#47610579) Attached to: Ask Slashdot: IT Personnel As Ostriches?


Or the fragment might be part of a statement like "following the issues with the Enron case, we've put in some additional measures to prevent any irregularities in the pension fund" or even "Did you see that episode of the IT Crowd where the new boss was asking the IT department for help deleting the files which showed the irregularities in the pension fund? What a classic..."

+ - iOS global usage falls behind Android for the first time

Submitted by mrspoonsi
mrspoonsi (2955715) writes "For the first time, overall usage of iOS as an operating system has fallen behind its main competitor from over in Mountain View. While it’s well known that the majority market share in terms of install base has long been held by Android, this is one figure in which iOS has been top dog for quite some time. But at least according to research from Net Applications, that’s no longer the case. More people now use Android, too. For the longest time, Apple CEO Tim Cook would mock Android — Android tablets in particular — by saying no one uses them. Last year he said, "I don't know what these other tablets are doing. They must be in warehouses, or on store shelves, or maybe in somebody's bottom drawer!" But, he can't make fun of Android any more. Web traffic to Android is higher than iOS for the first time in history. This shows that Android users are getting more engaged with their devices, using them more and more."

Comment: Re:They don't deserve to be commended. (Score 2, Insightful) 80

by stoborrobots (#47596519) Attached to: Mozilla Dumps Info of 76,000 Developers To Public Web Server

Why should we commend them...?

We shouldn't. They fucked up. We should call them out for fucking up.

What the GP said was not "we should commend them", but "in their defense".

It's a valid defense: they fucked up, they noticed, they cleaned up what they could, and they admitted their mistake and advised people appropriately. That doesn't make their mistake go away, but it changes it from Badness Level 50 (eBay) to Badness Level 30 (Target).

+ - Malaysia flight MH17... not the first... probably not the last

Submitted by Flytrap
Flytrap (939609) writes "Whoever brought down the Malaysian airliner should be held accountable... But history shows us that geopolitics often overshadows accountability and very few of the parties responsible for such disasters are ever held accountable.

An article contrasting the downing of Malaysian Flight M17 (by forces still to be determined) with the downing of Korean Air Flight 007 by Soviet fighters and the downing of Iran Air Flight 655 by the USS Vincennes got me thinking about why the standards of accountability are so inconsistent.

The Independent catalogues 7 passenger planes that were shot down prior to Malaysian Flight M17 (I added 2 more for completeness). This article also raises questions about why some parties are able to get away with downing a civilian aircraft while some parties are held accountable (the article does not attempt to answer the question)
  • 1954. Cathay Pacific VR-HEU shot down by the People’s Liberation Army Air Force. Ten people on board were killed.
  • 1955. El Al Flight 402 shot down in Bulgarian airspace by two MiG-15 jets. Seven crew and 51 passengers were killed.
  • 1973. Libyan Airlines Flight 114 shot down by Israeli Phantom jet fighters. Only 5 survived of the 113 on board.
  • 1978. Korean Air flight 902 shot down by Soviet Sukhoi fighters after it violated Soviet airspace. Remarkably nearly all the passengers on board survived an emergency landing on a frozen lake. Two people were killed.
  • 1978. Air Rhodesia Flight RH 825 and Flight RH827 shot down by Zimbabwe People’s Liberation Army (Zipra) using ground-launched Stela missiles. 10 survivors were murdered at one of the crash sites, in the other none of the 59 passengers and crew survived.
  • 1980. Aerolinee Itavia Flight 870 brought down by a missile fired from French Navy aircraft over the Tyrrhenian Sea. All 77 passengers and 4 crew were killed.
  • 1983. Korean Air Flight 007 shot down by Soviet fighters after the pilot strayed into Soviet airspace. There were no survivors.
  • 1988. Iran Air Flight 655 shot down by the USS Vincennes using a surface-to-air missile while in Iranian territorial waters. All 290 passengers and crew were killed.
  • 2001. Siberia Airlines Flight 1812 shot down by the Ukrainian military over the Black Sea using a BUK S-200 missile. All 66 passengers and 12 crew members died.

The Russians, of course have their own take on this inconsistency, and one suspects that they are counting on a continuation of this practice, in the event that they may have had a hand in the downing of Flight M17. However, despite their obviously ulterior motives, they have a valid point, which other web sites are beginning to also pick up on.

Not withstanding what may have happened in the past, we should not let that get in the way of holding those who may be responsible for shooting down Flight M17 accountable, regardless of whether their act was deliberate or accident — when you wield weapons of that nature, one has to accept culpability for how they are used. The question for us, is: how do we do that when the standard of accountability set by prior incidents is so low and inconsistent and seems to be overshadowed by geopolitical agendas that make it hard to sift fact from fiction — Colin Powell's very detailed presentation to the UN security Council of fake made up evidence of Saddam Hussein's weapons of mass destruction, comes to mind."

Comment: Re:Sorry to tell you... (Score 1) 544

Ditto, from my WinMob-based Dopod 838pro which I had from 2006 to 2010, vs every touchscreen phone I've owned since then. I send fewer and shorter emails from the phone nowadays, and even my sms messages have gotten shorter (from comfortably typing ~8 unit/1200 character messages on the Dopod to now usually staying below ~3 unit/450 character messages).

+ - How do you wipe an Android tablet?

Submitted by UrsaMajor987
UrsaMajor987 (3604759) writes "I have a Asus Transformer tablet that I dropped on the floor. There is no obvious sign of damage but It will no longer boot. Good excuse to get a newer model. I intend to sell it for parts (it comes with an undamaged keyboard) or maybe just toss it. I want to remove all my personal data. I removed the flash memory card but what about the other storage? I know how to wipe a hard drive, but how do you wipe a tablet?"

+ - "Canvas Fingerprinting" Online Tracking Difficult To Block->

Submitted by globaljustin
globaljustin (574257) writes "First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.

[The] fingerprints are unusually hard to block: They can’t be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus.

The researchers found canvas fingerprinting computer code, primarily written by a company called AddThis, on 5 percent of the top 100,000 websites."

Link to Original Source

+ - Australian website waits three years to tell customers about a data breach->

Submitted by AlbanX
AlbanX (2847805) writes "Australian daily deals website Catch of the Day waited three years to tell its customers their email addresses, delivery addresses, hashed passwords, and some credit card details had been stolen.

Its systems got hacked in April 2011 and the company told police, banks and credit cards issues, but didn't tell the Privacy Commissioner until later, or customers until last night."

Link to Original Source

"Life is a garment we continuously alter, but which never seems to fit." -- David McCord