The Almighty Buck

DoorDash Warns No Tipping May Result In Slower Delivery (cnn.com) 400

quonset shares a report from CNN: If you try to place an order through the DoorDash app without leaving a tip, you may get this pop-up: "Orders with no tip might take longer to get delivered -- are you sure you want to continue?" The note goes on: "Dashers can pick and choose which orders they want to do. Orders that take longer to be accepted by Dashers tend to result in a slower delivery." In other words, tip your drivers, or prepare to wait a long time for a cold meal. Customers are then given the option to add a tip, or continue without one.

The message is just a test, DoorDash spokesperson Jenn Rosenberg told CNN in an email. "This reminder screen is something that we're currently testing to help create the best possible experience for all members of our community," she said. "As with anything we pilot, we look forward to closely analyzing the results and feedback." Rosenberg noted that Dashers, the people who deliver orders, are "independent contractors" who "have full freedom to accept or reject offers based on what they view as valuable and rewarding." Tips go directly to Dashers, according to the company. So if an order comes in without a tip, they're more likely to let it linger.

Security

Russian Ransomware Gangs Start Collaborating With Chinese Hackers (bleepingcomputer.com) 11

There's some unusual activity brewing on Russian-speaking cybercrime forums, where hackers appear to be reaching out to Chinese counterparts for collaboration. BleepingComputer reports: These attempts to enlist Chinese threat actors are mainly seen on the RAMP hacking forum, which is encouraging Mandarin-speaking actors to participate in conversations, share tips, and collaborate on attacks. The forum has reportedly had at least thirty new user registrations that appear to come from China, so this could be the beginning of something notable. The researchers suggest that the most probable cause is that Russian ransomware gangs seek to build alliances with Chinese actors to launch cyber-attacks against U.S. targets, trade vulnerabilities, or even recruit new talent for their Ransomware-as-a-Service (RaaS) operations.

A threat analyst told BleepingComputer earlier this month that this initiative was started by a RAMP admin known as Kajit, who claims to have recently spent some time in China and can speak the language. In the prior version of RAMP, he had intimated that he would be inviting Chinese threat actors to the forum, which appears to now be taking place. However, Russian hackers attempting to collaborate with Chinese threat actors is not limited to the RAMP hacking forum as Flashpoint has also seen similar collaboration on the XSS hacking forum. [...] RAMP was set up last summer by a core member of the original Babuk ransomware gang, aiming to serve as a new place to leak valuable data stolen from cyberattacks and recruit ransomware affiliates.
Further reading: US Says Iran-backed Hackers Are Now Targeting Organizations With Ransomware
Facebook

Facebook Turned Off Search Features Used To Catch War Criminals, Child Predators, And Other Bad Actors (buzzfeednews.com) 84

The human rights and war crimes community is up in arms over Facebook's decision to turn off a set of advanced features in its graph search product, which is "a way to receive an answer to a specific query on Facebook, such as 'people in Nebraska who like Metallica,'" reports BuzzFeed News. "Using graph search, it's possible to find public -- and only public -- content that's not easily accessed via keyword search." The decision, which was not announced publicly, was likely made in an effort to limit data scandals and improve privacy. From the report: When Mark Zuckerberg personally introduced graph search in early 2013, he billed it as equal in importance to Facebook's News Feed and profile timeline. On launch day, the company also published a post offering journalists tips on how to use graph search. Over the years, graph search became a valuable tool for investigators, police officers, and journalists. At the same time, social media became a key source for uncovering war crimes, disinformation campaigns, child exploitation, and other crimes and abuses.

The move raised even more concern in the human rights and investigative journalism communities because Facebook appeared to thwart attempts to find workarounds. Henk van Ess, an investigator and trainer who works with Bellingcat, operates a tool that uses graph search to enable powerful searches of public content. After Facebook turned off some searches, he was able to find workarounds -- until the company blocked them. "I patched my tools 5 times and each time, after 2 hrs, the tools were crippled by FB," he wrote in a Twitter direct message. "Other toolmakers experienced the same." Van Ess now requires people to request permission from him to use his tool; he says he's been flooded with requests from people pursuing investigations "involving human rights abuses, war crimes, terrorism, extremism, white collar crime ... corruption, disinformation campaigns, environmental crimes, cybercrime -- the list just keeps on going."
A Facebook spokesperson said in a statement to BuzzFeed News: "The vast majority of people on Facebook search using keywords, a factor which led us to pause some aspects of graph search and focus more on improving keyword search. We are working closely with researchers to make sure they have the tools they need to use our platform."
Businesses

Are Software Developers Really More Valuable To Companies Than Money? (cnbc.com) 96

Recently the CFO of Stripe revealed a surprising statistic: As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- this threat was even ranked above capital constraints.

And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software... When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part.

His article even ends with tips for managers about how to get the most out of their developers.
  • Consider very carefully the current and potential allocation of developer time.
  • Embrace the cloud, saving in-house developers to work on higher-impact projects.
  • Hire leaders who have technical backgrounds, so they can make better hiring and strategic decisions, and offer better management of developers.

But first managers have to decide if they agree with his initial premise.

Are software developers more valuable to companies than money?


Earth

An Ancient, Brutal Massacre May Be the Earliest Evidence of War 151

HughPickens.com writes: Violence has always been part of human behavior, but the origins of war are hotly debated. Some experts see it as deeply rooted in evolution, pointing to violent confrontations among groups of chimpanzees as clues to an ancestral predilection while others emphasize the influence of complex and hierarchical human societies, and agricultural surpluses to be raided. Now James Gorman writes in the NY Times that scientists have discovered a site in Africa dated about 10,000 years ago where a group of hunter-gatherers attacked and slaughtered another, leaving the dead with crushed skulls, embedded arrow or spear points, and other devastating wound. It's not clear that anyone was spared at the Nataruk massacre. Of the 27 individuals found, eight were male and eight female, with five adults of unknown gender. The site also contained the partial remains of six children. Twelve of the skeletons were in a relatively complete state, and ten of those showed very clear evidence that they had met a violent end. In the paper, the researchers describe "extreme blunt-force trauma to crania and cheekbones, broken hands, knees and ribs, arrow lesions to the neck, and stone projectile tips lodged in the skull and thorax of two men." Four of them, including a late-term pregnant woman, appear to have had their hands bound. "These human remains record the intentional killing of a small band of foragers with no deliberate burial, and provide unique evidence that warfare was part of the repertoire of inter-group relations among some prehistoric hunter-gatherers," says Dr Marta Mirazon.

The killers carried weapons they wouldn't have used for hunting and fishing, including clubs of various sizes and a combination of close-proximity weapons like knives and distance weapons, including the arrow projectiles she calls a hallmark of inter-group conflict. " This suggests premeditation and planning," says Mirazon Lahr. Other, isolated examples of period violence have previously been found in the area, and those featured projectiles crafted of obsidian, which is rare in the area but also seen in the Nataruk wounds. This suggests that the attackers may have been from another area, and that multiple attacks were likely a feature of life at the time. "This implies that the resources the people of Nataruk had at the time were valuable and worth fighting for, whether it was water, dried meat or fish, gathered nuts or indeed women and children. This shows that two of the conditions associated with warfare among settled societies—control of territory and resources—were probably the same for these hunter-gatherers, and that we have underestimated their role in prehistory."
Books

Ask Slashdot: State-of-the-Art In Amateur Book Scanning? 122

An anonymous reader writes: I have a shelf full of books and other book-like things ranging from old to very old that I would like to turn into PDFs (or other similarly portable format), and have been on a slow-burn quest for the right hardware and method to do so on a budget. These are mostly sentimental — things handed down over generations, and they include family bibles, notebooks, and photo albums, as well as some conventional — published, bound — books from the late 19th and early 20th Century. None of them are especially valuable as antiques, as far as I know; my goals in preserving them are a) to make them available to other people in my family who are into genealogy or just nostalgia, and b) so I can read some of those old, interesting books (et cetera) without endangering them any more than it takes to scan them once. I was intrigued by the (funded, but not yet available) scanner mentioned earlier this year on Slashdot; it seems to do a lot of things right, but like any crowdfunded project, the proof is in the pudding, and the pudding hasn't yet arrived. It's also cheap, and that fits my household budget. What methods and hardware are you using to scan old documents? Any tips you have from a similar project, with regard to hardware, treatment of the materials being scanned, light sources, file formats, clean-up and editing tools, file-size-vs-resolution tradeoffs? In the end, I'm likely to err toward high-resolution scans, since they can be knocked down to size later if need be, but I'd be interested in hearing about what tradeoffs you've found to work for you.

One big question that I'd like to have answered: Is there stand-alone Free / Open Source software, or even just cheap software (I am mostly on Linux, by choice, but won't leap onto a sword to keep my Free Software purity) that makes for easy correction of the distortion introduced by camera-based imaging? If I could easily uncurl and keystone-correct pages, then a lot of input methods (even my phone) are suddenly much more attractive. My old Casio camera could do this 10 years ago, but I haven't found a free software desktop utility that lets me turn photos into nicely squared-up pages.
Book Reviews

Book Review: Mobile HTML5 37

Michael Ross (599789) writes "Web designers and developers nowadays are familiar with the critical decision they face each time before building an application intended for mobile devices: whether to target a particular device operating system (e.g., iOS) and create the app using the language dictated by the OS (e.g., Objective-C), or try to build an operating system-agnostic app that runs on any device equipped with a modern web browser (primarily using HTML5, CSS3, and JavaScript), or try to do a combination of both (using a library such as PhoneGap). The second option offers many advantages, and is the approach explored in the book Mobile HTML5, authored by Estelle Weyl, an experienced front-end developer." Keep reading for the rest of Michael's review.
The Courts

US Federal Judge Rules NSA Data Collection Legal 511

New submitter CheezburgerBrown . tips this AP report: "A federal judge on Friday found that the National Security Agency's bulk collection of millions of Americans' telephone records is legal and a valuable part of the nation's arsenal to counter the threat of terrorism. U.S. District Judge William Pauley said in a written opinion (PDF) that the program 'represents the government's counter-punch' to eliminate al-Qaeda's terror network by connecting fragmented and fleeting communications. In ruling, the judge noted the Sept. 11 terrorist attacks and how the phone data-collection system could have helped investigators connect the dots before the attacks occurred. 'The government learned from its mistake and adapted to confront a new enemy: a terror network capable of orchestrating attacks across the world. It launched a number of counter-measures, including a bulk telephony metadata collection program — a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data,' he said."
Open Source

The New Yorker Launches 'Strongbox' For Secure Anonymous Leaks 94

Today The New Yorker unveiled a project called Strongbox, which aims to let sources share tips and leaks with the news organization in a secure manner. It makes use of the TOR network and encrypts file uploads with PGP. Once the files are uploaded, they're transferred via thumb-drive to a laptop that isn't connected to the internet, which is erased every time it is powered on and booted with a live CD. The publication won't record any details about your visit, so even a government request to look at their records will fail to find any useful information. "There’s a growing technology gap: phone records, e-mail, computer forensics, and outright hacking are valuable weapons for anyone looking to identify a journalist’s source. With some exceptions, the press has done little to keep pace: our information-security efforts tend to gravitate toward the parts of our infrastructure that accept credit cards." Strongbox is actually just The New Yorker's version of a secure information-sharing platform called DeadDrop, built by Aaron Swartz shortly before his death. DeadDrop is free software.
Image

Book Review: To Save Everything, Click Here Screenshot-sm 115

Bennett Haselton writes "Evgeny Morozov's forthcoming book To Save Everything, Click Here describes how an overly helpful 'kitchen of the future' might stifle the learning process and threaten culinary innovation. True, but we could certainly do better than the current state of how-to directions (in cooking and most other subjects) that you can find today on Google. I suggest that the answer lies not in intelligent kitchen technology, but in designing an algorithm that would produce the best possible how-to directions -- where the 'best' directions are judged according to the results that are achieved by genuine beginners who attempt to follow the directions without help." Read below for the rest of Bennett's review.
Editor's Note: This article was not intended as a full review, but rather a commentary on one point in the book. The author's actual review of the book will appear in March.
AMD

AMD Hires Bank To Explore Sale Options 226

Dainsanefh tips this report from Reuters: "Advanced Micro Devices has hired JPMorgan Chase & Co to explore options, which could include a potential sale, as the chipmaker struggles to find a role in an industry increasingly focused on mobile and away from traditional PCs, according to three sources familiar with the situation. ... Some investors believe part or all of AMD could be bought by a technology company that might want to emulate Apple Inc's tight control of software and components, a strategy credited in part for the success of the iPad and iPhone. Microsoft Corp, Google Inc, Samsung Electronics, Intel Corp and even Facebook Inc have been suggested by Wall Street analysts as potential suitors that could benefit from some of AMD's chip business, including its graphics division, PC processors and server chips. Others say AMD's most valuable asset may be its deep bench of engineers or its patents." Update: 11/14 01:44 GMT by S : In an emailed statement, an AMD representative said the company "is not actively pursuing a sale of the company or significant assets at this time."
Image

Book Review: Drupal For Designers Screenshot-sm 77

Michael Ross writes "Of all the open source content management systems used for building websites, Drupal has a reputation for being one of the most flexible and powerful available, but not the easiest for web designers to use. Drupal version 7 has made some strides in alleviating those flaws, but there is still much progress to be made. During the past few years, a number of books have been published that explain how Drupal designers can do custom theming, but they tend to focus on the technical details of the theme layer, and not the practice of web design when using Drupal as a foundation. That rich yet neglected subject area is the focus of a new book, Drupal for Designers: The Context You Need Without the Jargon You Don't." Keep reading to see what Michael has to say about the book.
Books

Book Review: How Google Tests Software 44

MassDosage writes "Having developed software for nearly fifteen years, I remember the dark days before testing was all the rage and the large number of bugs that had to be arduously found and fixed manually. The next step was nervously releasing the code without the safety net of a test bed and having no idea if one had introduced regressions or new bugs. When I first came across unit testing I ardently embraced it and am a huge fan of testing of various forms — from automated to smoke tests to performance and load tests to end user and exploratory testing. So it was with much enthusiasm that I picked up How Google Tests Software — written by some of the big names in testing at Google. I was hoping it would give me fresh insights into testing software at "Google Scale" as promised on the back cover, hopefully coupled with some innovative new techniques and tips. While partially succeeding on these fronts, the book as a whole didn't quite live up to my expectations and feels like a missed opportunity." Read below for the rest of MassDosage's review.
Book Reviews

Book Review: Drupal Intranets With Open Atrium 25

New submitter nuvoleweb writes "Drupal Intranets with Open Atrium, by Tracy Charles Smith is a comprehensive guide to Open Atrium, the popular open source Intranet system. Open Atrium is a derivative (distribution) of Drupal specifically meant for group collaboration, and the author works in the Open Atrium core team at Phase2 Technology." Read below for the rest of Andrea's review.
Image

Book Review: Drupal 7 Themes Screenshot-sm 28

Michael J. Ross writes "If you need a theme for a web site based on Drupal 7, then you have a few options for obtaining one. You could go with an existing theme, but the current crop of prebuilt themes is even more limited for Drupal 7 than its predecessor. You could hire a dedicated Drupal themer to create one for you. Or, to avoid the expense, you could try to build your own. In that case, you will need to get up to speed on the changes in the Drupal presentation layer. Unfortunately, most of the Drupal 7 books devote only one or two chapters to the topic. Several Drupal training firms offer video instruction, but the bulk of their material is still geared to version 6, or even 5. The online documentation is of little help. Yet there is a book that is wholly dedicated to the topic: Drupal 7 Themes, authored by Ric Shreves." Read on for the rest of Michael's review.
Image

Book Review: Digital Evidence and Computer Crime Screenshot-sm 49

brothke writes "When it comes to a physical crime scene and the resulting forensics, investigators can ascertain that a crime took place and gather the necessary evidence. When it comes to digital crime, the evidence is often at the byte level, deep in the magnetics of digital media, initially invisible from the human eye. That is just one of the challenges of digital forensics, where it is easy to destroy crucial evidence, and often difficult to preserve correctly." Read on for the rest of Ben's review.
Image

Drupal 7 Module Development Screenshot-sm 31

Michael J. Ross writes "While it is possible to create a simple website using a base installation of Drupal, the real power of this content management system is achieved through the use of modules, which can be thought of as add-ons that extend the capabilities of Drupal in specific ways — oftentimes in conjunction with other modules. These modules are developed and contributed by PHP programmers who understand how to use one or more of the Drupal application programming interfaces (APIs) to access information stored in a Drupal database, such as content, user profiles, and theme settings. These APIs have changed with Drupal version 7, and thus Drupal coders could benefit from a book that explains how to create Drupal 7 contrib modules." Read on for the rest of Michael's review.
Image

Jboss AS 5 Performance Tuning Screenshot-sm 45

RickJWagner writes "20 percent inert ingredients, 80 percent nitro glycerin. That's how I'd describe JBoss AS 5 Performance Tuning from Packt. The first 50 pages are nothing to get excited about. This first chapter and a half describes the author's performance tuning life cycle methodology and introduces us to a handful of open source tools that can assist us in our tuning efforts. The tools section seems especially weak-- there are plenty of screenshots showing the tool's menu screens, something you'd normally pick up in about a minute from the tool's distribution website. Honestly, at this point I was beginning to wonder if this book was going to live up to my expectations. Luckily I pressed on for a few more pages, and hit the rich paydirt that makes up the rest of the book. From that point on, every section yielded valuable tuning advice." Keep reading for the rest of Rick's review.
Image

The Laidoff Ninja Screenshot-sm 237

walmass writes "My first reaction on seeing the book was, 'Oh no, another book with "Ninja" in the title.' But in this case, the authors have established a case for that: they explained that the first ninjas were peasants who could not take the abuse from the samurai anymore and how they used everyday objects as weapons." Keep reading to see what walmass has to say.
Image

Metaprogramming Ruby Screenshot-sm 84

scottl writes "Metaprogramming Ruby is the first book to give an in-depth and readable explanation of how dynamic programming works in Ruby. It is both readable and accurate and will be a valuable resource to intermediate and probably advanced Ruby programmers for some time to come." Keep reading for the rest of scottl's review.

Slashdot Top Deals