Submission + - Microsoft fails to acquire Nokia 1

MouseTheLuckyDog writes: Ars is reporting a failed attempt by Microsoft to acquire Nokia. Ars is also reported that talks are not likely to restartt. I see things a bit differently.

Given Nokia's position Elop's job is very much at risk. Should Elop be fired, the directors will be bringing in someone with a new plan. One which deemphasises the use of WP. This would be a disaster for MS already low market share in the phone arena.

Another aspect is that should Elop get fired, for the first time in history "Someone will have been fired for using Microsoft." A fact that could potentially reverberate very badly in other areas of MS.

For these two reasons, there is severe pressure on MS to acquire Nokia before Elop gets fired.

There is however another aspect to this deal. WIth Nokia's large portfolio, it is very likely that both Apple and Google will complain to antitrust authorities in the EU and the EU anitrust people have not been kind to MS.

Submission + - The McAfee Guide to Uninstalling McAfee Software (

Shivantrill writes: John McAfee has released a video guide to uninstalling the software that bears his name. In every comment section for every article about John McAfee at least one person asks "how do I uninstall this crappy software". John McAfee has heard your cries and has produced a very NSFW video guide. Whatever you may personally think of Mr. McAfee, we all can agree that he has a sense of humor and is not above making fun of himself. This isn't a home made video either, it is production quality

Submission + - Ask Slashdot: How do you get a job when you already have one? 4

datavirtue writes: "I've just entered the job market (this last month) and have been mostly using a popular tech job site with a smattering of CraigsList. I feel like I'm getting attacked! The question I pose is this: How do you deal with getting a job when you already have one? The recruiters literally ring my phone off the hook like a psycho girlfriend and I now spend more time on the phone, answering emails, and in interviews than I do actually working. My paid time off is starting to run out and people are getting suspicious, and I have just started looking! Please help, I need advice.
As a side note, I ran a job posting on CraigsList to get resumes and cover letters from other people looking for similar jobs and all I have gotten is almost a complete failure of applicants to submit cover letters--and the ones who did had a string of developer jobs where they lasted only a year or less. Is this the norm?"

Submission + - Neural networks, Google and cats (

AlbanX writes: Researchers from Stanford University have created an artificial neural network 6.5 times larger than Google’s.

It was achieved with only 16 servers that contained GPUs in addition to traditional CPUs. Reproducing the same network as Google took only three machines in comparison to the 1000 used in Google’s experiments.

Google's network simulated 1.7 billion connections and was used to teach itself to recognise cats, faces and bodies in stills taken from YouTube videos.

Submission + - Stanford, Mozilla, Opera Launch Web Privacy Initiative (

An anonymous reader writes: Stanford Law School has kicked off a "Cookie Clearinghouse" web privacy initiative that brings together researchers and browsers. The project aims to provide a centralized and trusted repository for whitelist and blacklist data on web tracking, much like StopBadware does for malware. Mozilla and Opera are collaborating on the initiative, and Mozilla plans to integrate it into Firefox's new default third-party cookie blocking. The leader of an advertising trade group has, of course, denounced the participating browsers as "oligopolies."

Submission + - Cancer Ray terrorist plot foiled ( 2

gurps_npc writes: Two radical pro-Israel terrorists were caught in upstate NY when they tried to solicit money from various honorable Jewish organizations to build a truck based x-ray machine. They intended to drive the truck around and then turn on the x-ray machine, focusing on enemies of Israel.

But the Jewish organizations they tried to solicit money from refused to participate. Instead they called the FBI, who promptly set up a sting.

They caught and arrested the terrorists before the machine was in working order.

Submission + - Why Naked Mole Rats Don't Get Cancer (

sciencehabit writes: Although they are quite ugly and confined to a life underground, naked mole rats have at least one attribute that other animals, even humans, might aspire to: They don't get cancer. Now, researchers have discovered that the secret to this rodent's good health is a complex sugar that helps keeps cells from clumping together and forming tumors. The sugar--hyaluronan--is used in skin lotions and antiarthritis treatments, and the mole rat version seems to have evolved to make the animal's skin more elastic and able to cope with the tight squeeze of the narrow underground tunnels it lives in. One day, it may even help combat cancer in humans.

Submission + - Monsanto executive gets Nobel Prize for food and agriculture ( 4

sfcrazy writes: A top Monsanto executive has won the prestigious World Food Prize. Secretary of State John Kerry announced the award where Robert T. Fraley, the executive vice president and CTO of Monsanto, won the prize along with two other scientists from Belgium and the US. What's next Gaddafi to get the Nobel prize for world peace?

Submission + - Hackers Exploiting Facebook Graph API Explorer To Spread Malware ( 1

coolnumbr12 writes: Cybercriminals are exploiting the Facebook Graph API Explorer to spread malicious links to groups all over the social network, and Facebook is doing nothing to stop it. The links have been found to contain the Zeus virus, a notorious malware capable of draining bank accounts, and are targeted at professional sports fans. IBTimes previously reported how reports of the Zeus malware have risen steadily in 2013, with hackers targeting NFL fan groups like “Los Angeles NFL Fan Connection.” Now, hackers are turning their attention to Eurpoean football clubs — which are known for large and intensely engaged fan bases — and exploiting the hype around the exciting NBA Finals series.

Submission + - Billion Pixel Photo of Mars Snapped by Curiosity (

astroengine writes: If you were in any doubt as to Curiosity’s photography prowess, this panorama of Gale Crater should allay your concerns. In this billion-pixel photo from Mars, NASA’s Mars Science Laboratory snapped nearly 900 separate images that were then stitched together to create a wonderful high-definition view from the robot’s mast-mounted cameras. “It gives a sense of place and really shows off the cameras’ capabilities,” said Bob Deen of the Multi-Mission Image Processing Laboratory at NASA’s Jet Propulsion Laboratory, Pasadena, Calif., who assembled the scene. “You can see the context and also zoom in to see very fine details.”

Submission + - 21 Financial Sites Found to Store Sensitive Data in Browser Disk Cache (

An anonymous reader writes: The LA Times mentions that after visiting well known sites such as ADP, Verizon Wireless, Scottrade, Geico, Equifax, PayPal and Allstate, sensitive data remains in the browser disk cache despite those sites using SSL. This included full credit reports, prescription history, payroll statements, partial SSNs, credit card statements, and canceled checks. Web servers are supposed to send a Cache-Control: no-store header to prevent this, but many of the sites are sending non-standard headers recognized only by Internet Explorer, and others are sending no cache headers at all. While browsers were once cautious about writing content received over SSL to the disk cache, today, most do so by default unless the server specifies otherwise.

Submission + - Amazon Vows To Fight Government Requests for Data (

itwbennett writes: Speaking at a cloud panel discussion hosted by Reuters on Wednesday, Terry Wise, head of global partner ecosystem for Amazon Web Services, explained how the company handles government requests for data stored on Amazon's cloud: 'If a U.S. entity is serving us with a legally binding subpoena, we contact our customer and work with that customer to fight the subpoena.' But Wise's best advice to customers is to encrypt their data: 'If the data is encrypted, all we'd be handing over would be the cypher text,' he said.

Submission + - Citi Bike "Smart" Helmet Navigates to the Nearest Station by Adafruit (

coop0030 writes: Add GPS, compass navigation & visibility with LEDs to a helmet that helps you find your way to the closest Citi Bike station in New York City. Powered by Adafruit's FLORA, a wearable electronics platform. With a detailed tutorial, you can build the helmet, and customize it to work in most cities with a bike share as well.

Submission + - They Deactivate Droids, Don't They?

malachiorion writes: Does George Lucas hate metal people? I know, sounds like standard click-bait, but I think I present a relatively troll-free argument in the piece I wrote for Slate:

We stuck to the Star Wars canon, in pointing out the relatively grim state of affairs for droid rights, and the lack of any real sympathy for their plight from the heroes, or, it would seem, George Lucas. C-3PO is more correct than he might realize, when the says that droids "seem to be made to suffer."

Submission + - FBI admits to domestic surveillance drone use | World news | (

An anonymous reader writes: At a hearing today before Congress, FBI director Robert Mueller confirmed that the agency is using unmanned drones for surveillance within the U.S. Senator Chuck Grassley asked, 'Does the FBI own or currently use drones and for what purpose?' Mueller replied, 'Yes, for surveillance.' Grassley then asked, 'Does the FBI use drones for surveillance on U.S. soil?' Mueller said, 'Yes, in a very, very minimal way, and seldom.' With regard to restricting the use of drones to protect citizens' privacy, Mueller said, 'It is still in nascent stages but it is worthy of debate and legislation down the road.' According to The Guardian, 'Dianne Feinstein, who is also chair of the Senate intelligence committee, said the issue of drones worried her far more than telephone and internet surveillance, which she believes are subject to sufficient legal oversight.'

Submission + - Microsoft Launches $100k Bug Bounty Program

Trailrunner7 writes: After years of saying that the company didn’t need a bug bounty program, Microsoft is starting one. The company today will announce the start of a new program that will pay security researchers up to $100,000 for serious vulnerabilities and as much as $50,000 for new defensive techniques that help protect against those flaws.

Microsoft security officials say that the program has been a long time in development, and the factor that made this the right time to launch is the recent rise of vulnerability brokers. Up until quite recently, most of the researchers who found bugs in Microsoft products reported them directly to the company. That’s no longer the case.

The system that Microsoft is kicking off on June 26 will pay researchers $100,000 for a new exploit technique that is capable of bypassing the latest existing mitigations in the newest version of Windows.

Submission + - Next SurfaceRT to come with Qualcomm Snapdragon 800 and LTE

recoiledsnake writes: Following up on our previous discussion of Microsoft selling discounted SurfaceRT tablets to schools which fueled speculation about the future of Surface RT, Bloomberg is now reporting that Microsoft is fast at work on the next Surface RT which will replace the current Tegra 3 with a Qualcomm Snapdragon 800 chip which has stellar benchmarks against the likes of the upcoming Tegra 4, Apple A6X, and Exynos processors, especially in the GPU and graphics department. Since the SoC comes with 3g/LTE, this might be the first Surface to support integrated cellular data. There are also indications that there could be an 8" version, and that the new versions might be revealed alongside the Windows 8.1 preview bits at the upcoming BUILD conference, starting on June 26.

Submission + - Crack iOS Mobile Hotspot Passwords in Less than a Minute (

msm1267 writes: Business travelers who tether their iPhones as mobile hotspots beware. Researchers at the University of Erlanger-Nuremberg in Germany have discovered a weakness in the way iOS generates default passwords for such connections that can leave a user’s device vulnerable to man-in-the-middle attacks, information leakage or abuse of the user’s Internet connection.

Andreas Kurtz, Felix Freiling and Daniel Metz published a paper that describes the inner workings of how an attacker can exploit the PSK (pre-shared key) authentication iOS uses to establish a secure WPA2 connection when using the Apple smartphone as a hotspot. The researchers said that attackers would find the least resistance attacking the PSK setup rather than trying their hand at beating the operating system’s complex programming layers.

Submission + - echolocation by smartphone possible. batman phones all around! (

jehan60188 writes: FTA:

Submarines, bats, and even humans can echolocate, but they need high-end acoustic gear, brainpower, or training in order to do it. Now electrical engineer Ivan Dokmani, of the École Polytechnique Fédérale de Lausanne (EPFL), in Switzerland, could bring that capability to smartphones. He has used echolocation combined with a simple algorithm and off-the-shelf microphones to map part of a complex structure—the Lausanne Cathedral. Used in reverse, this kind of technology could one day help smartphones find their location inside buildings.

Echolocation at its most basic consists of sending a sound toward an item of interest and timing its return. If you know the medium, you also know how fast it will carry the sound. Solve a simple equation and you have the distance to the item.

But mapping even the simplest room, let alone a cathedral, is more complex. The first sound reflects from all the room’s surfaces, flooding the listener with signals from many directions. Even after passing the microphone the first time, those first sound waves can reflect on opposing walls and return to the microphone a second time, adding secondary reflections to the already confusing signal. “You need somehow a way to tell, ‘This group of echoes corresponds to one wall, and another group of echoes corresponds to another wall,’ ” Dokmani says.

Some solutions involve sending sound from multiple known locations at different times. Other solutions involve using multiple microphones. Dokmani, who says he has a taste for simplicity, once tried to calculate a hypothetical room’s geometry using just one sound source and one microphone [PDF]. This system worked on paper for some kinds of rooms in noiseless environments, but in the real world, noise is everywhere. “Maybe you’ll have some spurious spikes in your signal,” Dokmani says, “so you also need a way to discard these.”

Dokmani’s method, published online this week in the Proceedings of the National Academy of Sciences, uses a mathematical tool called a Euclidean distance matrix, which helps sort the reflected sounds along a timeline. But he conceded a point to complexity and used multiple microphones—although only one sound source.

Electrical engineering researcher Flavio P. Ribeiro, of Microsoft’s Applied Sciences Group, in Redmond, Wash., calls this application of Euclidean distance matrices “useful” but notes that Dokmani’s algorithm assumes tidier environments than exist in the real world, such as rooms with no furniture or other clutter that might complicate the sound signal. Such clutter creates “sound shadows” that would require more computing power to untangle.

Other algorithms, including one created by electrical engineer Sakari Tervo of Aalto University, in Finland, and a colleague, seek to reconstruct a room’s geometry even in the absence of some of the initial sound reflections, although these algorithms rely on multiple microphones. Dokmani’s latest system assumes he has captured all the first reflections before he can filter out the secondary reflections and noise.

Tervo also worries that Dokmani’s algorithm will not translate to more complex settings. In their paper, Dokmani and his colleagues note that their map of the cathedral is imperfect due to reflections from figurines, columns, and curved surfaces. They were unable to distinguish between some of the smaller walls and the secondary reflections from bigger walls, he says. They achieved much better accuracy when they mapped a simple classroom with a fifth wall made of stacked tables.

Even so, the experiments inspired Dokmani to explore hiring a developer who could help create smartphone applications using his algorithm. In a room with known dimensions, a pair of sound-emitting devices might be able to calculate their positions in the room, he suggests. The algorithm might also help improve teleconferencing sound quality. Electrical engineer Fabio Antonacci at Politecnico di Milano, in Italy, says he and others aim to improve teleconferencing too. They presented a paper last year in which they tried to identify sound sources at multiple locations in order to focus the listening devices on all of them at once, in much the same way that recent experimental cameras allow users to focus on light images at multiple depths.

Achieving those goals will take “smarter algorithms,” Dokmani says, but after this experiment, he is optimistic: “It is kind of surprising that you can do it with so little infrastructure.”

No word yet on funding from Wayne industries

Submission + - A look at quantum computer manufacturer D-Wave and its founder (

tpjunkie writes: Many slashdot readers will remember D-wave's announcement in 2007 of its quantum computer, an announcement met with skepticism and a good amount of scorn. However, today the company has sold quantum computers to such companies as Lockheed Martin and Google, and their computers have gone from a handful of qubits to 512 in their most recent offerings. Nature has a story including an interview with the company's founder Geordi Rose, and a look at where the company is headed and some of the difficulties it has overcome.

Submission + - Top WordPress Plugins Contain Serious Security Vulnerabilities (

wiredmikey writes: According to recent analysis of the top 50 most downloaded plugins for the WordPress platform, 18 were vulnerable and could be exploited to infect Websites and distribute malware. Out of the top 10 most popular e-commerce plugins, seven contained serious security flaws. Two were directly from the WordPress team and affected BuddyPress, and several dealt with online payments or interacted with Facebook and other social networks, according to Maty Siman of security firm Checkmarx.

Many of the popular add-ons could be exploited by a number of common attacks, such as SQL injection and cross-site scripting, Checkmarx found, meaning that attackers can easily use an automated exploit kit and point it to a WordPress site and compromise it.

This problem isn't unique to WordPress. While the survey looked at only WordPress plugins because of the platform's popularity, other content management platforms and other Web software suffer similar problems.

Submission + - AMD's low-powered 64-bit ARM chips (

corando writes: AMD on Tuesday shared initial details on its 64-bit ARM chips, code-named Seattle, which will have up to 16 CPU cores. The chips will be up to four times faster and more power efficient than the quad-core Opteron X-series chips, which draw up to 11 watts of power and are based on the x86 architecture.

While these are targeted for servers, one has to wonder if phones and tablets are next?

Submission + - Police waste 30 minutes each per day waiting for computers to boot up (

girlmad writes: The Met Police in London has revealed that officers have to wait 30 minutes every day for their machines to turn on and be ready to use. It's not surprising, considering that the Met assistant commissioner has admitted that the IT systems the police are using date as far back as the 1970s.

Submission + - The Linux kernel as an exquisitely sensitive stability test for overclocked PCs ( 1

crazyeyes writes: This article looks at using the Linux kernel as a more accurate and sensitive stability test for overclocked PCs :

"Using an overclocked PC is not a problem, provided that the PC is stable at the overclocked settings. Several programs are available to assess system stability by stress-testing the overclocked system. However, most overclockers do not know that the Linux kernel is an exquisitely sensitive tool to detect instabilities in an overclocked system. In fact, it is more accurate and sensitive than either Prime95 or IBT/LinX.

The Linux kernel supplies users with a dead simple method for measuring hardware instabilities — like those caused by an 'unstable' overclock. There is nothing special to install as this functionality seems to be naively included in the kernel itself. To use it, simply run a standard stress test such as Prime95 or Linpack and watch the output from dmesg. If the system is unstable due to insufficient voltage settings, excessive heat, it will report...

Submission + - Length of Applause Not Tied to Quality of Presentation (

sciencehabit writes: The next time you hear extended applause for a performance you didn't think was that great, don't feel like a snob. A new study reveals that audience response has more to do with the people in the seats than those up on stage. Applause, it turns out, is a bit like peer pressure. In a study of college students, individuals were more likely to start clapping if a larger percentage of the audience had already started. If 50% of the audience was clapping, for example, individuals were 10 times more likely to start clapping than if 5% of the audience was clapping. People stop clapping for the same reason. Even more surprising, the applause for a bad presentation could be just as long as applause for a good one. Random interactions in the audience can result in very different lengths of applause regardless of the quality of the talk.

Submission + - Qualcomm's Snapdragon 800 Benchmarked

adeelarshad82 writes: While the Snapdragon 800 processor isn't in any retail phones yet; Qualcomm showed off sample tablets and smartphones to a select group of journalists today. Using Antutu, Geekbench, Basemark OS and GLBenchmark benchmark software, the samples were tested against HTC's One X+, Apple's iPhone 5, Samsung Galaxy S 4 and Nvidia's Tegra 4 developer kit. As one would expect, Snapdragon 800 tablet got better scores than all the phones however Nvidia managed to keep pace with Qualcomm. That said, Qualcomm's processor was able to encode 4K video, a trick that the Tegra 4 can't pull off. Other hallmark Snapdragon 800 features include Dolby and DTS surround sound and Fluence, built-in noise cancellation and 5.1 surround audio capture.

Submission + - Start-up readies network-optimized Linux for data centers (

alphadogg writes: Start-up Cumulus Networks this week has emerged with a Linux network operating system designed for programmable data centers like the ones Google and Facebook are building. The company’s Cumulus Linux OS operating system includes IPv4 and IPv6 routing, plus data center and network orchestration hooks. Much like OpenFlow for independent, software-defined control of network forwarding, Cumulus Linux is intended to run on commodity network hardware and bring open source extensibility to high capacity data centers. The head of the company used to work for Cisco and Google.

Submission + - Relicense of MySQL man pages filed as bug

An anonymous reader writes: As reported earlier on Slashdot it appeared the license covering the MySQL man pages was changed from the GPL to something less good. However, as speculated, this appears to be a bug.

Submission + - Why Your Sysadmin Hates You (

jfruh writes: We've learned many lessons in the fallout from Edward Snowden's whistleblowing and flight to Hong Kong, but here's an important one: Never piss off your sysadmin. Even if your organization isn't running a secret, civil-rights violating surveillance program, you're probably managing to annoy your admins in a number of more pedestrian ways that might still have blowback for you. Learn to stay on their good side by going along with their reasonable requests and being specific with your complaints.

Submission + - BT Chief To Become British Government Minister (

judgecorp writes: BT chief Ian Livingston is leaving the British telecom provider to become a government minister. The executive has been appointed a seat in the House of Lords, which enables him to become Minister for Trade and Investment without having to be elected as a Member of the lower house of Parliament. Livingston has seen BT go from a £134 million loss in 2008 when he was appointed, to a profit of £2.5 billion in 2012. It still has a monopoly over certain sectors of the British telecom market, and has won all the contracts so far for rolling out broadband to rural areas.

Submission + - Thwarting Facial Recognition Systems With Privacy Visors

An anonymous reader writes: Despite Google announcement that it won't allow facial recognition on Google Glass (yet) and Facebook turning it off in Europe, every person should be aware that it is only a matter of time until the option is widely used — and not just on social networks or futuristic projects. So far, you can't do much about it except keep your head down, covered with a wide-brimmed hat, and hope that someone won't snap a clear photo of you. But that's not a great solution if you don't want your life dramatically changed and your interactions with the world and the people in it made difficult. Professor Echizen has developed a device he dubbed "privacy visor", which uses 11 near-infrared LEDs to thwart face detection systems.

Submission + - Sagita's Hot Air-Powered Sherpa Rethinks the Ultra-Light Helicopter (

Zothecula writes: Certainly one of the more intriguing things on display at this year's Paris Air Show, the Sherpa by Belgian startup Sagita aims to make the helicopter simpler, more efficient, more reliable and more affordable. The helicopter's rotors are directly driven by turbines which are themselves powered by hot air and fumes from the helicopter's power plant. Sagita claims that this makes the the aircraft approximately 85 percent efficient while doing away with the need for a tail rotor.

Submission + - The House wants a 'sustained human presence on the Moon and the surface of Mars' (

MarkWhittington writes: Politico reports in a June 18, 2013 story that House Republicans have added a Mars base to its demands for a lunar base in the draft 2013 NASA Authorization bill. Both the Bush era Constellation program and President Obama space plan envisioned eventual human expeditions to Mars. But if Politico is correct, the new bill will be the first time an official piece of legislation will call for permanent habitation of the Red Planet.

The actual legislative language states, “The [NASA] Administrator shall establish a program to develop a sustained human presence on the Moon and the surface of Mars.”

Submission + - AR glasses let profs know if students are understanding their lectures (

cylonlover writes: Despite university professors telling their students to shout out if they don’t understand what’s being said in a lecture, few students are likely to feel comfortable raising their hand in front of the class and saying “I don’t get it.” Scientists at Spain’s la Universidad Carlos III de Madrid are hoping to address that situation, with a set of augmented reality glasses that let profs see who’s “not getting it,” without those students having to say so verbally.

Submission + - Sagita Displays Hot Air Powered Helicopter

rcastro0 writes: Gizmag reports on the Sherpa, an interesting helicopter design at this year's Paris Air Show. As the article explains "Rather than driving the rotors directly, the Sherpa's engine instead powers a compressor with an air intake at the rear of the helicopter." There's no tail rotor. This approach is supposed to be more efficient, more reliable and more affordable than the traditional. A one-fifth scale model was shown to fly. Sagita, the 2008 startup behind the project, has yet to build a full scale prototype. They plan to sell a Sherpa two-seater for around US$ 200k in 3 years.

Submission + - Source Code for Carberp Trojan Up for Sale (

wiredmikey writes: Researchers have found the source code for the Carberp Trojan for sale in underground forums and allegedly includes the full source code of Carberp with comments, Web injects, all the modules used by Carberp, the source code of RDPxTerm and Gazavar (the worm module), the admin panel for the command-and-control server, the bootkit module, among others.

Interestingly, a seller going by the name of "madeinrm" had the price set at $5,000, while researchers from Trusteer came across what appears to be a different seller offering Carberp source code, but with a hefty $50,000 price tag, and said to be sold in coordination with the Carberp author.

Researchers from Trusteer suggest that a "breach of contract by a Carberp seller could have caused a buyer to take revenge and sell the source code.

Earlier this year, Russian authorities claimed to have captured the mastermind behind the Carberp banking Trojan and other members of the criminal gang. The cybercrime ring, led by a 28-year old Russian national, allegedly has been in operation since 2009 and has stolen approximately $250 million. In March 2012, authorities arrested and broke up a gang that used Carberp to steal $2 million from over 90 individual bank accounts.

It's very likely that once the code is sold, the new buyers would add on new features and distribute those variants to create newer versions of sophisticated malware.

Submission + - Self-Hosted Gmail Alternatives for the PRISM Age (

reifman writes: Revisiting this post on Gmail alternatives for the post-Snowden-NSA era, I've written up a detailed tutorial for migrating from gmail to open source iRedMail in the cloud. One key takeaway is that securing the bulk of your email from government snooping beyond the per-message level is a task whose complexity far exceeds the capacity of the average person. Conversely, it remains quite easy for really bad people to encrypt their most private communications.

Submission + - PDP-11 still working in Nuclear Plants - for 37 more years ( 1

Taco Cowboy writes: Most of the younger /. readers never heard of PDP-11, while we geezers have to retrieve bits and pieces of our affairs with PDP-11 from the vast warehouse inside our memory lanes

PDP-11, the old work horse, are still proving their worth in GE nuclear plants, and they will be working there for 37 more years, until year 2,050

Which means, they are still trying to look for people who can work PDP-11

If you are out of a job, a knowledge of PDP-11 assembly language may land you a very comfy living

Slashdot Top Deals