Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Businesses

Alcatel-Lucent Cuts Go Deeper — 7,500 Jobs Gone and Counting 78

Dawn Kawamoto writes "Alcatel-Lucent has cut 7,500 jobs since the start of the year — a couple thousand more than what employees of the embattled telecom equipment maker may have been expecting. Last summer, Alcatel-Lucent said it expected to cut over 5,000 jobs by the end of 2013. Well, cuts have gone deeper than that, and the company's newly minted CEO, Michel Combes, told Wall Street during the second quarter earnings call Tuesday to expect additional cuts and the related cost savings in the coming quarters."

Comment Serious Rethinking (Score 4, Insightful) 156

Serious rethinking is what people who think they want smart toasters need to do.

I really don't feel the need to see every device under the sun attached to the internet. And I certainly don't want my car being tracked by smart roads and bridges. It's bad enough that they're already using license plate cameras to track us all.

The Internet

Why the Internet Needs Cognitive Protocols 156

An anonymous reader writes "We keep hearing that the 'Internet of Things' is coming – that day when we'll all have not just smart phones but also smart refrigerators, smart alarm clocks, and smart roads and bridges. A new article in IEEE Spectrum magazine makes the argument that this won't happen unless engineers do some serious rethinking of how the Internet's basic routing architecture works. The author, Anthony Liotta, offers some interesting solutions based on two networks in the human body: the autonomic nervous system and the cognitive brain."

Comment Re:All the important facts are ignored. (Score 1) 127

The problem with your argument is that he did not actually ignore the law. Mr. Swartz did have access to JSTOR and was authorized to access the material he accessed. At worst, he entered an IT closet. If he damaged any part of the closet, I wouldn't know, as I consider it such a minor matter as to be negligible in this case. Especially since he did have the right to have his laptop on that network.

Comment Re:Why cell walls? (Score 1) 30

Basically, if anything makes copies of things, if it makes copies of random bit of stuff floating by you'll end up with as much random stuff as useful stuff.

I meant makes copies of itself, or at least something that can also make copies. If a "baby" can't make copies, then there will not be more of it.

Maybe it eventually "learns" to consume the other experiments such that in the end, there's nothing left in the pond but successful reproducers, which then spill into adjacent ponds.

Software

Ask Slashdot: Tags and Tagging, What Is the Best Way Forward? 142

siliconbits writes "The debate about tagging has been going for nearly a decade. Slashdot has covered it a number of times. But it seems that nobody has yet to come up with a foolproof solution to tagging. Even luminaries like Engadget, The Verge, Gizmodo and Slashdot all have different tagging schemes. Commontag, a venture launched in 2009 to tackle tagging, has proved to be all but a failure despite the backing of heavyweights like Freebase, Yahoo and Zemanta. Even Google gave up and purchased Freebase in July 2010. Somehow I remain convinced that a unified, semantically-based solution, using a mix of folksonomy and taxonomy, is the Graal of tagging. I'd like to hear from fellow Slashdotters as to how they tackle the issue of creating and maintaining a tagging solution, regardless of the platform and the technologies being used in the backend." A good time to note: there may be no pretty way to get at them, but finding stories with a particular tag on Slashdot is simple, at least one at a time: Just fill in a tag you'd like to explore after "slashdot.org/tag/", as in "slashdot.org/tag/bizarro."
Censorship

Bahrain Activists Battered By IP Tracking Attacks 48

An anonymous reader writes "Having been targeted by malware in the past, anti-government protesters in Bahrain are now being hit hard by IP tracking attacks, according to a researcher. Bill Marczak, of Bahrain Watch and Citizen Lab, who is putting together a report on the attacks, said it appeared Bahrain officials had been masquerading as fake activists, sending obfuscated URLs to targets to learn their IP address. The next step is to take the IP address and the time of the click to the relevant ISP to find out who the user is. Then all sorts of things can happen. 'People who have clicked on these links have suffered various types of consequences ranging from having their houses raided and being charged for saying insulting things about the king on Twitter, or losing their jobs,' says Marczak. 'It looks like, from our investigation so far, in one case, the government did lock up the wrong person.'"

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...