Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Every company should have a procedure for this (Score 1) 279

The most important thing is to actually have a written procedure and follow it. Depending on your level of formality, it needs to cover:
  • Who provides the notification (might be HR, might be the manager to whom the employee reports,...)
  • Disabling logins
  • Archiving emails, home directories, project repositories
  • Establishing exit interviews
  • Defining last-minute deliverables (typically just knowledge transfer)

It's worth pointing out that you can't know that this isn't a "disgruntled employee scenario" unless you have learned to read minds. They wouldn't be leaving if they were 100% happy.

Submission + - Recycling plastic bottles into paper -- sort of

ahadsell writes: A team in Mexico has found a way to convert PET bottles into a mineral paper-like substance. It has its limits, though. For instance, you can't write on it with gel inks, because they contain alcohol.

The article says "We manufacture ecological paper created with recycled plastic bottles, calcium carbonate and stone. We don't use water or chemicals, such as chlorine. " I guess calcium carbonate and PET aren't chemicals any more.

Comment Re:Seriously? GOOD NEWS? (Score 2, Informative) 255

Be careful what you ask for.

Most /.ers probably are not old enough to remember the days when all telecommunications were regulated under title II. Let's just say that costs were higher, innovation was essentially prohibited, and service was even worse than you can get from Comcast today.

"So, the next time you complain about your phone service, why don't you try using two Dixie cups with a string? We don't care. We don't have to. We're the Phone Company."

Comment Re:Distributed Mail (Score 3, Insightful) 470

The issue that Silent Circle points out is that SMTP is inherently unable to provide security against traffic analysis. Even if the body of the email is encrypted, the headers cannot be.

So yes, you can run your own email server, and require that only gpg traffic pass through it. But that won't keep you secure against traffic analysis (aka "metadata collection") with collection performed at your ISP.

Education

Submission + - Kentucky Lawmakers Shocked to Find Evolution in Biology Tests (arstechnica.com) 1

ahadsell writes: A report surfaced this week that suggests Kentucky legislators may be experiencing a sort of cognitive dissonance that is likely to be a preview of things we can expect elsewhere. After dictating that schools in the state include tests based on national standards, the state lawmakers were shocked to find that evolution made a prominent appearance on the science tests. Considering that the same legislative body was considering undercutting evolution less than two years ago, this may have come as a bit of a surprise.

It really shouldn't have.

Nationally, the No Child Left Behind Act has dictated that there need to be standards for educational performance, and standardized tests will be used to make sure those standards are met. Although that push started with basics like math and language, national science standards were also called for, and many states have since implemented them; the Kentucky legislature apparently adopted the national standards in 2009. ACT, a company that creates and manages standardized testing, was contracted to handle the science tests.

Given that evolution is extremely well supported and provides the central organizing idea of biology, ACT's tests featured it heavily. That made a number of the state legislators rather unhappy, and gave them the chance to demonstrate that they should not be setting education policy.

Data Storage

Submission + - BBC delivered petabytes of content in a single Olympics day (computerworlduk.com)

DerekduPreez writes: "The BBC has revealed that on the busiest day of its London 2012 Olympics coverage it delivered 2.8 petabytes worth of content, peaking when Bradley Wiggins won gold, where it shifted 700Gb/s.

It has also said that over a 24-hour period on the busiest Olympic days it had more traffic to bbc.co.uk than it did for the entire BBC coverage of the FIFA World Cup 2010 games.

“We wanted to offer the whole breadth of the Games to audiences. It’s been hugely gratifying to see from our data that they embraced our comprehensive coverage: we saw over 106 million requests for BBC Olympic video content across all online platforms,” said Cait O’Riordan, head of product at BBC Sport and London 2012.

BBC Sport Online’s most requested live video stream was of the tennis single finals, where Serena Williams and Andy Murray won golds, which saw 820,000 requests."

IOS

Submission + - Apple's iPhone is so secure, the Justice Department can't crack it (bgr.com)

zacharye writes: In the five years since Apple launched the iPhone, the popular device has gone from a malicious hacker’s dream to law enforcement’s worst nightmare. As recounted by the Massachusetts Institute of Technology’s Technology Review blog, a Justice Department official recently took the stage at the DFRWS computer forensics conference in Washington, D.C. and told attendees that the beefed up security in iOS is now so good that it has become a nightmare for law enforcement...

Comment Re:Another nail in the Coffin of the Hard Drive (Score 4, Interesting) 82

Also *raises hand*.

On one system we stored programs by wiring them into a ROM. By hand. One wire per word, wrapped around the center pole of the E-cores clockwise for a 1, or counterclockwise for a 0. Then solder one end of the wire to the correct X address, and the other end to the correct Y address. Total, 256 16-bit words per board (Z was decoded to board-select).

Yes, I am old.

Slashdot Top Deals

Once it hits the fan, the only rational choice is to sweep it up, package it, and sell it as fertilizer.

Working...