Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - Why One of Kubernetes' Creators Moved From Google to Microsoft (listennotes.com)

destinyland writes: One of the three Google employees who created Kubernetes — the open source container-orchestration platform now maintained by the Cloud Native Computing Foundation — was software engineer Brendan Burns. But in 2016 Burns became an engineer at Microsoft (where since March he's been a corporate vice president at Microsoft).

This week in a new podcast interview [video here], Burns explained why he went from Google to Microsoft, which was "all-in on cloud":

Obviously growing up in Seattle, Microsoft is sort of like the home-town team — so that was a big plus also. And it's been great to be able to come in and really help them figure out — I think one of the really amazing things about being there is it's a company in transition. Certainly four years ago when I joined, it's a company in transition. And getting a chance to help continue that transition, and help continue and shift its focus from closed-source and Windows to a really renewed focus on open source and Linux and cloud native application development — that ability to influence and help shape direction has been really awesome also.

But it was more than just their commitment to the cloud...

"There's just such a great developer history there, of developer tooling and developer productivity. Just such a focus on empowering people to build stuff. That's really compelling to me too, because I think one of the things we really haven't done a good job of in Kubernetes is make it easier to build these programs. Right? We do a lot to make it easier to operate the stuff, but it's still really hard to build these systems, and Kubernetes isn't helping you at all. So I'm really excited and interested and thinking a lot about how can we make it easier for developers to build systems. And I think the DNA and history and experience of Microsoft to build things, the hugely successful platform that is Windows, means there's just a great — a really strong amount of DNA about what it takes to build a platform that doesn't just succeed for elite devs but can really succeed for people all the way from no-code solutions all the way through to advance systems solutions. And so that opportunity is really exciting.

Power

Submission + - Giant Plumes of Oil Forming Under the Gulf (nytimes.com)

An anonymous reader writes: The New York Times reported that "scientists are finding enormous oil plumes in the deep waters of the Gulf of Mexico, including one as large as 10 miles long, 3 miles wide and 300 feet thick in spots. There’s a tremendous amount of oil in multiple layers, three or four or five layers deep in the water column. The discovery is fresh evidence that the leak from the broken undersea well could be substantially worse than estimates that the government and BP have given. Scientists studying video of the gushing oil well have tentatively calculated that it could be flowing at a rate of 25,000 to 80,000 barrels of oil a day. The latter figure would be 3.4 million gallons a day." This information corroborates what Paul Noel postulated regarding the oil rising through 5000 feet of salt water at great pressure serves as a quasi fractionating column, and what is seen on the surface is mabye 20% of what has been spewed out. /.ers will be plaesed to know that Noel apologized for his 5' diameter figure for the pipe opening, which is actually only 21 inches.

Submission + - Virgin Media to trial filesharing monitoring (theregister.co.uk) 1

Shokaster writes: The Register reports that Virgin Media are to begin monitoring file sharing using a deep packet inspection system, CView, provided by Deltica, a BAE subsidiary. The trial will cover about 40% of customers, although those involved will not be informed. CView's deep packet inspection is the same technology that powered Phorm's advertising system.
Initially Virgin Media's implementation will focus on music sharing and will inspect packets to determine whether the content is licensed or unlicensed, based on data provided by the record industry. Virgin Media emphasised that records will not be kept on individual customers and that data on the level of copyright infringement will be aggregated and anonymised.

Editorial

The Player Is and Is Not the Character 152

Jill Duffy writes "GameCareerGuide has posted an intellectual article about video games which argues there is no such thing as 'breaking the fourth wall' in games. Written by Matthew Weise, a lead game designer for the Singapore-MIT GAMBIT Game Lab, the article considers the complex relationship between video game players and characters. Weise says that, unlike in theater and film, video games don't ever really break the fourth wall, as it were, because in games, there is no wall. Players are always tethered to the technology, and the player is always just as much the main character as not the main character. Weise looks at both modern experimental games, like Mirror's Edge, as well as old classics, like Sonic the Hedgehog, to defend his point. He writes, 'Both avatars and the technological devices we use to control them are never simply in one reality. They are inherently liminal entities, contributing to a mindset that we, as players, exist in two realities at once. It's just as natural for a player to say, "I defeated that boss," as it is to say, "Snake defeated that boss," since Snake is and is not the player at the same time. It is likewise natural for a player to say, "I punched an enemy soldier," when in reality, she punched no one. All she did was press a button.'"
Security

Alarm Raised On Teenage Hackers 213

Arno Igne writes to tell us that the number of underage participants in "high-tech" crimes has risen steeply in recent history. Reporting children as young as 11 swapping credit card details and asking for hacks, many are largely unskilled and thus more likely to get caught and arrested. "Communities and forums spring up where people start to swap malicious programs, knowledge and sometimes stolen data. Some also look for exploits and virus code that can be run against the social networking sites popular with many young people. Some then try to peddle or use the details or accounts they net in this way. Mr Boyd said he spent a lot of time tracking down the creators of many of the nuisance programs written to exploit users of social networking sites and the culprit was often a teenager."
Portables

World First Review of Dell's 12.1in Netbook 133

An anonymous reader points to what's claimed to be "the world's first look at Dell's 12.1" netbook," running at Australian Personal Computer Magazine. There's a bit of gushing at the beginning, but this is followed by some informative pictures, informal battery-life tests, and interesting background about the machine's components. Upshot: it's a well-made, decent-performing small laptop with a better keyboard than smaller netbooks and more wireless options than most. However, it's shorter on battery life (bigger screen, smaller battery) than Dell's smaller Mini 9, and less easily upgraded.
Space

Submission + - Dark energy lurks in hidden spatial dimensions? (newscientist.com) 1

Magdalene writes: "According to Stephen Battersby of the NewScientist.com news service; The mysterious cosmic presence called dark energy, which is accelerating the expansion of the universe, might be lurking in hidden dimensions of space. This idea would explain how the dimensions of space remain stable — one of the biggest problems for the unified scheme of physics called 'string theory'. In the NewScientist.com article, Brian Greene and Janna Levin of Columbia University liken the extra dimensions, including our our own 3d universe to membranes in higher dimensional space, they suggest that a "sterile neutrino" could exist in the extra dimensions, making its presence felt only as the source of dark energy.

There is no word yet on whether or not Sphere or Square are available for comment.

-m"

Businesses

Submission + - Music industry demanding money from coffee shops (floridatoday.com)

realjd writes: The music industry has started demanding "protection money" from coffee shops with live music. One was even fined for having the TV on while the Monday Night Football theme played. And the owners pay up to one licensing company, all of the others start harassing them demanding payment too. What's a small business to do? It sounds like they don't even check whether any copyright violations occurred, they're just sending bills to any business that may or may not have live music.
Patents

A Simple Plan To Defeat Dumb Patents 234

Steve Jones writes "With the EU being rumored to look at software patents again I thought I'd have a look at the root of the problem — the US Patent Office — and work out if there is a simple way to defeat dumb patents. The big thing that defeats a patent is prior art. At the Patent Office they have the definition of Prior Art that includes the phrase: 'known or used by others in this country, or was patented or described in a printed publication in this or a foreign country.' Now suppose that every time we have an idea that we think is 'obvious' but that hasn't been done before, or something we think would be interesting but don't have the money to create — that we blogged about that idea, tagging it as 'prior art' via Technorati. This would give people an RSS feed of prior art." Read on for more details of Steve's proposal.

Slashdot Top Deals

Recursion is the root of computation since it trades description for time.

Working...