Google

Google Respins Its Hiring Process For World Class Employees 305

An anonymous reader writes "Maybe you've been intrigued about working at Google (video), but unfortunately you slept through some of those economics classes way back in college. And you wouldn't know how to begin figuring out how many fish there are in the Great Lakes. Relax; Google has decided that GPAs and test scores are pretty much useless for evaluating candidates, except (as a weak indicator) for fresh college graduates. And they've apparently retired brain teasers as an interview screening device (though that's up for debate). SVP Laszlo Beck admitted to the New York Times that an internal evaluation of the effectiveness of its interview process produced sobering results: 'We looked at tens of thousands of interviews, and everyone who had done the interviews and what they scored the candidate, and how that person ultimately performed in their job. We found zero relationship. It's a complete random mess.' This sounds similar to criticism of Google's hiring process occasionally levied by outsiders. Beck says Google also isn't convinced of the efficacy of big data in judging the merits of employees either for individual contributor or leadership roles, although they haven't given up on it either." This has led TechCrunch to declare that the technical interview will soon be dead.
Open Source

Are You Sure This Is the Source Code? 311

oever writes "Software freedom is an interesting concept, but being able to study the source code is useless unless you are certain that the binary you are running corresponds to the alleged source code. It should be possible to recreate the exact binary from the source code. A simple analysis shows that this is very hard in practice, severely limiting the whole point of running free software."
Cellphones

Apple's War Against Jailbreaking Now Makes Perfect Sense 321

An anonymous reader writes "Apple has always been extremely anti jailbreaking, but it might now have a good reason to plug up the exploits. As Hardware 2.0 argues, Apple's new iOS 7 Activation Lock anti-theft mechanism which renders stolen handsets useless (even after wiping) unless the owner's Apple ID is entered relies on having a secure, locked-down OS. Are the days of jailbreaking iOS coming to a close?" I can see a whole new variety of phone-based ransom-ware based on this capability, too.
Science

Interviews: Freeman Dyson Answers Your Questions 141

A while ago you had the chance to ask mathematician and theoretical physicist Freeman Dyson about his work in quantum electrodynamics, nuclear propulsion, and his thoughts on the past, present, and future of science. Below you'll find his answers to your questions.
Android

Popular Android Anti-Virus Software Fooled By Trivial Techniques 94

wiredmikey writes "A group of researchers from Northwestern University and North Carolina State University tested ten of the most popular AV products on Android, and discovered that they were easily fooled by common obfuscation techniques. In a paper (PDF), the researchers said they tested AV software from several well-know security vendors. In order to evaluate the mobile security software, the researchers developed a tool called DroidChameleon, which applies transformation techniques to Android applications. Known malware samples were transformed to generate new variants that contain the exact malicious functions as before. These new variants were then passed to the AV products, and much to the surprise of the paper's authors, they were rarely flagged — if at all. According to the research, 43% of the signatures used by the AV products are based on file names, checksums or information obtained by the PackageManager API. This means that, as mentioned, common transformations will render their protection useless for the most part. For example, the researchers transformed the Android rootkit Droid Dream for their test. DroidDream is a widely-known and highly dangerous application. Yet, when it was transformed, every AV program failed to catch at least two variants."
DRM

New Console Always-Online Requirements and You 435

An anonymous reader writes "The new Xbox is almost here and the details appear to strongly suggest 'always on' is the way forward. We all know that this is an artificial requirement and certainly there are plenty of people on all sides of the table. To paraphrase the user 'tuffy' who commented on this issue at Ars Technica recently; if you're trying to sell 'always online' as a feature of the future, there needs to be some benefit for me the customer. There is not one. Or, rather, there is no sign yet of any actual clearly compelling reason why any end user would support this limitation to their purchase. So, what's the best way to express this? Spend your money on an Ouya? Contact the Xbox team? These are all valid options but they also lack visibility. What we need is a way that could help actually quantify the levels of discontent in the gamer community. Maybe E3 attendees could turn their backs in protest like some did during Thatcher's funeral procession. Or gamers could sign some useless petition. What do Slashdotters think? Is the upcoming Steam box a reasonable plan? As a gamer, I'm of two minds about the whole thing. I really don't like it but I may roll over eventually and join the herd because I could get used to it. Then again part of me is rankled by this slow erosion of access to me and my data."
Books

Book Review: The Death of the Internet 102

benrothke writes "When I first heard about the book The Death of the Internet, it had all the trappings of a second-rate book; a histrionic title and the fact that it had nearly 50 contributors. I have seen far too many books that are pasted together by myriad disparate authors, creating a jerry-rigged book with an ISBN, but little value or substance. The only negative thing about the book is the over the top title, which I think detracts from the important message that is pervasive in it. Other than that, the book is a fascinating read. Editor Markus Jakobsson (Principal Scientist for Consumer Security at PayPal) was able to take the collected wisdom from a large cross-section of expert researchers and engineers, from different countries and nationalities, academic and corporate environments, and create an invaluable and unique reference." Read below for the rest of Ben's review.
Transportation

DARPA Develops Non-GPS Navigation Chip 84

Zothecula writes "The Global Positioning System (GPS) has proved a boon for those with a bad sense of direction, but the satellite-based system isn't without its shortcomings. Something as simple as going indoors or entering a tunnel can render the system useless. That might be inconvenient for civilians, but it's potentially disastrous to military users, for whom the system was originally built. DARPA is addressing such concerns with the development of a self-sufficient navigation system that can aid navigation when GPS is temporarily unavailable."
GNU is Not Unix

Systemd Ditches GNU C Library for Their Own 92

In his typical fashion of replacing perfectly working software with useless broken-by-design crap, our dearest Lennart has decided that the time has come for systemd to gain an email program. He determined that the GNU libc was insufficient for the task of a dbus-enabled cpu hogging email client, leading to the new systemd libc: " Technically, this move makes perfectly sense, too. We are sick of supporting unstable glibc APIs and ABIs, and we believe that we greatly benefit from the fact that we now finally have everything the OS userspace consists of in one single repository. Of course, this new libc is not available to Ubuntu and other Linux distributions that have not yet adopted systemd. However, after deliberately choosing a home-grown display server (Wayland) over the generally accepted one (Mir) we decided creating an incompatible libc would be the best approach to create a strong platform following a strict release cadence."

On the bright side "We also renamed the API call creat() to create()..."

Security

Video When Your Data Absolutely, Positively has to be Destroyed (Video) Screenshot-sm 295

Here's a corporate motto for you: "Destroying data since 1959." Timothy ran into a company called Garner Products (which doesn't use that motto as far as we know), at a security conference. While most exhibitors were busily preserving or encrypting data one way or another, Garner was not only destroying data but delighting in it. And yes, they've really been doing this since 1959; they started out degaussing broadcast cartridges so broadcasters could re-use them without worrying about old cue tones creeping into new recordings. Now, you might ask, "Instead of spending $9,000 or more to render hard drives useless, couldn't you just use a $24 sledge hammer? And have the fun of destroying something physical as a free bonus?" Yes, you could. You'd get healthy exercise as well, and if you only wanted to destroy the data on the hard drives, so what? New drives are cheap these days. But some government agencies and financial institutions require degaussing before the physical destruction (and Garner has machines that do physical destruction, too -- which is how they deal with SSDs). Garner Products President Ron Stofan says in the interview that their destruction process is more certain than shooting a hard drive with a .45. But neither he nor Tim demonstrated a shooting vs. degaussing test for us, so we remain skeptical.
Encryption

Ask Slashdot: Simplifying Encryption and Backup? 148

New submitter FuzzNugget writes "A recent catastrophic hard drive failure has caused me to ponder whether the trade-off between security and convenience with software-based OTFE is worthwhile. My setup involves an encrypted Windows installation with TrueCrypt's pre-boot authentication, in addition to having data stored in a number of TrueCrypt file containers. While it is nice to have some amount of confidence that my data is safe from prying eyes in the case of loss or theft of my laptop, this setup poses a number of significant inconveniences." Read on below; FuzzNugget lists some problems with this set-up, and seeks advice on a simpler system for backing up while keeping things locked down.
Technology

Review: Make: Raspberry Pi Starter Kit 74

XWWT writes "A few weeks ago Make offered to send us a sample of its Raspberry Pi Starter Kit to see if we would do a review of the product. Samzenpus asked around the engineering team to see if there was someone who would be willing to do an on-camera review of the device. With all of the buzz about Raspberry Pi, I was very excited to get hands-on time with the device so I could more closely examine the platform. At first we wanted to do this piece as a video but quickly realized that a) it would probably be boring to see some blinky lights and push buttons working on a sample project, and b) the amount of audio that would need to be bleeped to cover my frustration with parts of the kit would be annoying. On a personal note, I also wanted to document all of my experience here as I thought it would be beneficial for newcomers to the maker technology and sometimes having someone else’s experience documented can help you avoid pitfalls and mistakes. (Full Disclosure: I am the Director of Engineering for Slashdot Media. We were given a review copy of the Make: Raspberry Pi Starter Kit. We were not paid for this review but had fun doing it.)" Keep reading for the rest of Wes's review.
DRM

Ask Slashdot: Dealing With Flagged Channels For XBMC PVR? 328

AlphaWolf_HK writes "I own an HDHomeRun Prime tuner, and unfortunately I live in an area where the cable provider (Cox) blanket flags all channels to be copy restricted. I'm tired of using Windows Media Center due to bugs and other problems, but since the channels are flagged it is the only option. Satellite is of course not an option at all (no cablecard or similar standard.) I've already begun moving most of my content watching to XBMC in the form of using sickbeard and couchpotato, both of which do an amazing job even with torrents now that Usenet has been getting hit pretty hard. To match this, I've already dropped my cable tier to the lowest possible for some basic digital channels that people in my household still watch and aren't available over torrents. But ideally I'd like to cut the cord completely as the service is otherwise useless. Are there any options for obtaining this content without physically moving to Comcast territory where they don't do this? Or perhaps any workarounds for the CCI flag? Ideally, anything that allows XBMC with digital content and no transcoding."
IOS

iOS 6.1.3 Beta 2 Patches evasi0n Jailbreak 272

hypnosec writes "Apple released iOS 6.1.3 beta 2 to developers, patching at least one of the vulnerabilities used by evasi0n thereby rendering the jailbreak tool useless — the time zone settings vulnerability. David Wang aka @planetbeing, has confirmed that iOS 6.1.3 beta 2 does patch one of the vulnerabilities that they exploited in their evasi0n tool."
Medicine

Flu Shot Doing Poor Job of Protecting Older People This Year 205

New submitter Gunilla sends this news from an AP report: "It turns out this year's flu shot is doing a startlingly dismal job of protecting older people, the most vulnerable age group. The vaccine is proving only 9 percent effective in those 65 and older against the harsh strain of the flu that is predominant this season, the Centers for Disease Control and Prevention said Thursday. Health officials are baffled as to why this is so. But the findings help explain why so many older people have been hospitalized with the flu this year. Despite the findings, the CDC stood by its recommendation that everyone over 6 months get flu shots, the elderly included, because some protection is better than none, and because those who are vaccinated and still get sick may suffer less severe symptoms." An anonymous reader adds information about a new drug that treats influenza by hijacking its own infection mechanism. The compound "binds to an enzyme on the surface of the flu virus called neuraminidase. This enzyme is responsible for severing the connection between the flu virus and human cell so it can move on and infect other cells. The new class of drugs — DFSAs — permanently bind to the enzyme, blocking its action and stopping it from spreading further, the journal Science reported (abstract). Currently available antivirals also work by attaching to this enzyme. But DFSAs do so in such a way that the flu virus cannot evolve to be resistant to the drug without rendering itself useless."
Image

Book Review: Enyo: Up and Running Screenshot-sm 46

Michael Ross writes "Upon hearing the name "Enyo," one may wonder if the speaker is referring to the Greek war goddess, or if it is the name of some Celtic New Age music with a Latin twist. In the world of front-end software development, Enyo is a cross-platform open-source JavaScript framework that can be used to build HTML5 web applications for the desktop and for mobile devices, including those powered by iOS and Android. The project website bills it as "an object-oriented JavaScript application framework emphasizing modularity and encapsulation." Any programmer interested in learning Enyo — or at least exploring what it is capable of — can consult the online documentation and the forums, but a more time-efficient approach might be to read a book focusing on the topic, such as Enyo: Up and Running, written by Roy Sutton, a contributor to the project." Read below for the rest of Michael's review.
Open Source

Ask Slashdot: What Does the FOSS Community Currently Need? 356

First time accepted submitter d33tah writes "In the summer term of my final year of IT's bachelor's course in my university, every student is obliged to develop his own project; the only requirement is that the application would use any kind of a database. While others are thinking of another useless system for an imaginary company that nobody would actually use, I'd rather hack up something the FL/OSS community actually needs. The problem is — how to figure out what it could be?"
Science

Paleontologist Jack Horner Answers Your Questions 36

A few weeks ago you had the chance to ask Jack Horner about dinosaurs, science funding, and extinction level events. He's sent back his responses and commented: "Very impressive audience you have!" Read below for more flattery and his answers to your questions.
Piracy

How Proxied Torrents Could End ISP Subpoenas 307

Frequent contributor Bennett Haselton writes "With the announcement of Verizon's "six strikes plan" for movie pirates (which includes reporting users to the RIAA and MPAA), and content companies continuing to sue users en masse for peer-to-peer downloads, I think it's inevitable that we'll see the rise of p2p software that proxifies your downloads through other users. In this model, you would not only download content from other users, but you also use other users' machines as anonymizing proxies for the downloads, which would make it impossible for third parties to identify the source or destination of the file transfer. This would hopefully put an end to the era of movie studios subpoenaing ISPs for the identities of end users and taking those users to court." Read below for the rest of Bennett's thoughts.
Government

GAO Finds US Military's Critical Technologies List Outdated, Useless 71

chicksdaddy writes "The U.S. Department of Defense has stopped updating its main reference list of vital defense technologies that are banned from export, according to a new report from the Government Accountability Office (GAO), The Security Ledger reports. The Militarily Critical Technologies List (MCTL) is used to identify technologies that are critical to national defense and that require extra protection — including bans on exports and the application of anti-tamper technology. GAO warned six years ago that the Departments of State and Commerce, which are supposed to use the list, found it too broad and outdated to be of much use. The latest report (GAO 13-157) finds that the situation has worsened: budget cuts forced the DOD to largely stop updating and grooming the list in 2011. Sections on emerging technologies are outdated, while other sections haven't been updated since 1999. Without the list to rely on, the DOD has turned to a hodgepodge of other lists, while officials in the Departments of State and Commerce who are responsible for making decisions about whether to allow a particular technology to be exported have turned to ad-hoc networks of subject experts. Other agencies are looking into developing their own MCTL equivalents, potentially wasting government resources duplicating work that has already been done, GAO found."

Slashdot Top Deals