Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Gearing up for recession (Score 4, Informative) 180

I dont think this has anything to do with recession planning.

Been in that company nearly 22 years and I've gone through (/survived) *many* restructuring operation (more than 10). It's never been about "surviving the next quarter". It's usually about optimisation of teams or product direction.

I know people in the Montreal group that have been affected. Don't ask numbers, I dont have em. But I do know other people in that group that didn't get axed. One VP there has had his manager teams' constituents affected. Dont know where—we're spread out globally. (I work in a different group and my teams mates spread from California to London plus a couple more in India.)

I'm not sure if there's a better way to handle things. I'm not even sure how they handled it in this case. But when our startup was acquired, they did the "everyone in this room still has a job" thing.

THAT, was by far, the worse I have witnessed. And it was before the acquisition so it's not on Oracle.

Obligatory "this is my opinion" thing and "I dont speak for Oracle".

Comment Re:Amazon's name is worth way more than their fees (Score 1) 134

As an insider, from my chair, I can tell you Oracle is usually not into boasting it's survival / existence based on one high profile client.

We sometime see customers lists in internal memos but these generally dont end up as high-profile web site / PR announcements. Rather, key points get floated about during quarter numbers filing. I'm suspecting many of our higher-profile clients dont need (/want) their infrastructure details out in the open, or that any divulgation remains vague.

In my division, we see governments, pharma, entertainment and aerospace big names as well as smaller clients and collabs with 3rd party. It's the defence clients you usually never hear about.

So, I'd say, Oracle doesn't _need_ to make anything free to any one big client just to please them. It's also not a PR benefit. We already have plenty free or otherwise open offerings (our cloud products are both hosted or On Premise, support federated SSO, have plug-in or SDKs to be extended).

The "Oracle is evil" arguments is kinda funny when, from the inside, you see nothing inherently evil about what we do. How it's perceived by some customers, though, I can understand and it probably the result of bureaucracy, business processes or internal competition that leads to certain views about the company. I suppose this explains why I hate MicroSoft with a passion, yet, rare hear MS employees ever go out in masses, irate about a company they "should" hate, from our point of view.

Security

Pentagon's New Next-Gen Weapons Systems Are Laughably Easy To Hack (zdnet.com) 93

An anonymous reader quotes a report from ZDNet: New computerized weapons systems currently under development by the U.S. Department of Defense (DOD) can be easily hacked, according to a new report published today. The report was put together by the U.S. Government Accountability Office (GAO), an agency that provides auditing, evaluation, and investigative services for Congress. The report detailed some of the most eye-catching hacks GAO testers performed during their analysis: "In one case, it took a two-person test team just one hour to gain initial access to a weapon system and one day to gain full control of the system they were testing. Some programs fared better than others. For example, one assessment found that the weapon system satisfactorily prevented unauthorized access by remote users, but not insiders and near-siders. Once they gained initial access, test teams were often able to move throughout a system, escalating their privileges until they had taken full or partial control of a system. In one case, the test team took control of the operators' terminals. They could see, in real-time, what the operators were seeing on their screens and could manipulate the system. They were able to disrupt the system and observe how the operators responded. Another test team reported that they caused a pop-up message to appear on users' terminals instructing them to insert two quarters to continue operating. Multiple test teams reported that they were able to copy, change, or delete system data including one team that downloaded 100 gigabytes, approximately 142 compact discs, of data."

The report claims the DOD documented many of these "mission-critical cyber vulnerabilities," but Pentagon officials who met with GAO testers claimed their systems were secure, and "discounted some test results as unrealistic." GAO said all tests were performed on computerized weapons systems that are still under development. GAO officials highlighted that hackers can't yet take control over current weapons systems and turn them against the U.S. But if these new weapons systems go live, the threat is more than real, GAO said.

Mozilla

Mozilla Is Rebranding Firefox and Wants Your Feedback (venturebeat.com) 269

An anonymous reader writes: Mozilla is rebranding Firefox. The company is asking for feedback on the new look, which will try to cover the various Firefox offerings. For most people, Firefox refers to a browser, but the company wants the brand to encompass all the various apps and services that the Firefox family of internet products cover, "from easy screenshotting and file sharing to innovative ways to access the internet using voice and virtual reality." The fox with a flaming tail "doesn't offer enough design tools to represent this entire product family," Mozilla believes.
The Courts

TSA Screeners Win Immunity From Abuse Claims, Court Rules (reuters.com) 317

Mr.Intel writes from a report via Reuters: "Fliers may have a tough time recovering damages for invasive screenings at U.S. airport security checkpoints, after a federal appeals court on Wednesday said screeners are immune from claims under a federal law governing assaults, false arrests and other abuses," reports Reuters. In a 2-1 vote, the 3rd U.S. Circuit Court of Appeals in Philadelphia said Transportation Security Administration (TSA) screeners are shielded from liability under the Federal Tort Claims Act (FTCA) because they do not function as "investigative or law enforcement officers."

The decision, the first on the issue by a federal appeals court, was a defeat for Nadine Pellegrino, a business consultant from Boca Raton, Florida. "She and her husband had sued for false arrest, false imprisonment and malicious prosecution over a July 2006 altercation at Philadelphia International Airport," reports Reuters. According to court papers, Pellegrino had been randomly selected for additional screening at the Philadelphia airport before boarding a U.S. Airways flight to Fort Lauderdale, Florida. Pellegrino, then 57, objected to the invasiveness of the search, but conditions deteriorated and she was later jailed for about 18 hours, the papers show. Criminal charges were filed, and Pellegrino was acquitted at a March 2008 trial.

Comment Re:Very legitimate reason for this (Score 1) 96

Well, that's what we do in our group (info withheld—not here to pander our things).

We use a file name validator object we pass around to a multitude or places in the app that enforces format of such things as file names.
But MITM attacks wouldn't be prevented by this and the first line of defence is server side: it will not accept unvalidated inputs.

Ease of use is enhanced by having client side verification telling the user exactly what's wrong with their input.

Comment Re:"average 257 components per application." (Score 1) 60

Memories. My first commercial product on Mac was in Modula-2 which was kinda big in the late 80s early 90s, until Metcom succumbed to the dark side of C and IDEs to become Metrowerks.

Back on topic;

Today, I work for a larger company (celebrated my 20th year there this past October) and it's become progressively harder for our group to include OpenSource products. There are more than one reason why but the biggest hurdle comes from Legal, that has to approve the licenses individually and research the background of the sources to some degree.

Only a couple of months ago did our iOS group decided to use in-house logging system rather than Apple's Unified Logging APIs and one reason we did this was to be able to control the granularity of the generated logs: Apple's Unified logging requires end-users to Vulcan-Nerve-Pinch their devices to trigger a "sysdiagnostic" core dump, generating 250megs archive that includes not only the current app but the entire loggs, including other software; totally impractical for sending to support and engineering.

As it turns out, this was the right decision due to the Zuckerberg effect. We now have to have way more scrutiny in what goes in the logs and this is way easier than if we were to deal with a number of open-source code that we would have to merge with our changes.

Sometimes, we'd love to use open source. But most of the times, it's impractical; at least at the client level, when you have to deal with a large Legal department that oversees what you can/should and can't/shan't do.

Slashdot Top Deals

Programmers used to batch environments may find it hard to live without giant listings; we would find it hard to use them. -- D.M. Ritchie

Working...