Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Submission + - 15 Signs You're Doing Agile Wrong

snydeq writes: Misconceptions and 'best practices' may have your team spinning wheels rather than continuously churning out productive code, writes InfoWorld's Steven Lowe in a round-up of agile practices gone wrong. 'The problem with most approaches to agile is not a problem with agile; it's a problem with Agile, the Capitalized Methodology. Agile isn't a methodology. Treating it as one confuses process with philosophy and culture, and that’s a one-way ticket back into waterfall — or worse.'

Submission + - Licensing Code Fragments in Your Blog - It Really Does Matter (perens.com)

Bruce Perens writes: I help some big companies stay on top of Open Source compliance. Last week, a customer found a code fragment that had originated in a blog, in the documentation-writing product of a very big software company that is concerned with documents and graphics. The file was meant to be re-distributed with documents my customer produced. The entirety of the blog was licensed under Creative Commons Attribution Share-Alike. The big software company's code wasn't under any sort of share-alike license, and thus they were probably infringing on the blog author, and my customer was at risk of being a contributory infringer when it re-distributed this file.

We contacted the help desk of the big software company, and they might get back to us someday. Before getting louder with them, I contacted the blogger.

Bloggers have placed their work under Attribution Share-Alike and other restrictive licenses to prevent their work from being cloned improperly by unscrupulous people on the net, mostly search-engine-optimization scams. The Attribution Share-Alike license requires proper attribution of the author, and sharing of modifications under the same terms as the original. But like many of us, this blogger put code fragments in his writing, and intended for his readers to use them. CC Attribution Share-Alike isn't the right license for that purpose. It's not compatible with proprietary code, nor is it compatible with other share-alike licenses like the GPL.

The blogger admitted that it was tempting to get the big software company to take a look at its own compliance issues, but then graciously agreed to change his blog's licensing. Now, it's CC Attribution Share-Alike for the text, and the MIT license for the code fragments. And his readers can use the code fragments he publishes without worry, as the MIT license is compatible with pretty much everything.

Public domain or the BSD license would have worked as well. Remember that the default in copyright law is All Rights Reserved. If you don't put a public domain declaration or some sort of license on your code, other folks don't really have the legal right to use it at all.

Hopefully, other bloggers will see this and make sure their code fragments are licensed appropriately. Also, programmers should be careful to make sure that they have the right to use code, even if they're just pulling a dozen lines off of someone's blog. It's not at all clear that the fair use doctrine always applies to such use, make sure you have a license and attribute your copy properly.

Submission + - New HTTPS Bicycle Attack Reveals Details About Passwords From Encrypted Traffic (softpedia.com)

campuscodi writes: Dutch security researcher Guido Vranken has published a paper [PDF] in which he details a new attack on TLS/SSL-encrypted traffic, one that can potentially allow attackers to extract some information from HTTPS data streams. Attackers could extract the length of a password from TLS packets, and then use this information to simplify brute-force attacks. The new HTTPS Bicycle Attack can also be used retroactively on HTTPS traffic logged several years ago. Hello NSA!

Submission + - /.Deals is a scam (bbb.org)

slashdeal_sucker writes: Slash deals appears to have great geeky gadgets. Don't fall for it. They took my money, fedex says the tracking number they sent to me was for stuff sent to an address and and addressee that is not me. There customer support is non-responsive.

Submission + - New heights of Republican Idiocy: Blame Mark-1 the Plumber (nytimes.com)

hydrodog writes: A Texas plumber traded in his truck, which ends up in ISIS videos showing his logo and phone number. So he is getting hundreds of harrassing phone calls for "supporting ISIS" when what he did was give it to a dealer who didn't bother taking off his labels.

I would love to say this is out of character, but that wouldn't be true. I'm waiting for the Donald to declare him public enemy number 1.

Submission + - Programmer creates online library with every book that has/could be written (relativelyinteresting.com)

An anonymous reader writes: The digital Library of Babel contains all possible permutations that can exist in 3,200 characters in the English language. Because of that, it contains all possible conversations you could have, have had, or will have, all possible scenarios of your death, and even this entire article.

The digital “The Library of Babel” is based on the short story by Jorge Borges. The library houses all the possible combinations of the letters of the alphabet, plus some punctuation, in 410 page long novels. The librarians are incredibly excited about the endless possibilities the library presents to them. The tomes essentially contain every one’s death, birth, all written books, and all yet un-written books. The problem with all of this, however, is the enormity of the library.

Article: http://www.relativelyinteresti... and the library itself https://libraryofbabel.info/

Comment How about (Score 2) 3

A standard reply to any request for assistance:

I'm sorry but I did not work directly on the matter no did I obtain any knowledge regarding said matter while I was working at SunTrust.

With Love, former employee who you are trying to screw over.

PS. If the code monkeys you are now paying peanuts cannot work the system, perhaps you should employ better people - oh wait, you had that.

Comment Re:Is that a misstatement? (Score 1) 2

What is worse is when the company puts on extra middle managers to handle the extra projects without putting on extra developers (because they are an expense that needs to be kept to a minimum), then introduce agile development and declare everyone is a developer so they don't need to employ more devs.

I hate my job

Submission + - How Steve Jobs Outsmarted Carly Fiorino

HughPickens.com writes: Carly Fiorina likes to boast about her friendship with Apple founder Steve Jobs but Fortune Magazine reports that it turns out Carly may have outfoxed of by Apple's late leader. In January 2004, Steve Jobs and Carly Fiorina cut a deal where HP could slap its name on Apple’s wildly successful iPod and sell it through HP retail channels but HP still managed to botch things up. The MP3 player worked just like a regular iPod, but it had HP's logo on the back and in return HP agreed to continue pre-loading iTunes onto its PCs. According to Steven Levy soon after the deal with HP was inked, Apple upgraded the iPod, making HP’s version outdated and because of Fiorina’s deal HP was banned from selling its own music player until August 2006. "This was a highly strategic move to block HP/Compaq from installing Windows Media Store on their PCs," says one Apple source. "We wanted iTunes Music store to be a definitive winner. Steve only did this deal because of that."

In short, Fiorina’s “good friend” Steve Jobs blithely mugged her and HP’s shareholders. By getting Fiorina to adopt the iPod as HP’s music player, Jobs had effectively gotten his software installed on millions of computers for free, stifled his main competitor, and gotten a company that prided itself on invention to declare that Apple was a superior inventor. And he lost nothing, except the few minutes it took him to call Carly Fiorina and say he was sorry she got canned. Levy concludes that Carly's experience with her "good friend" Steve Jobs is not an encouraging precedent for a person who wants to deal with Vladimir Putin. "It could not have been otherwise, really, because Steve Jobs totally outsmarted the woman who now claims she can run the United States of America."

Submission + - This is What a Real Bomb Looks Like (hackaday.com) 2

szczys writes: You see them all the time in movies and TV shows, but is that what an actual bomb looks like? Probably not... here's what a real bomb looks like.

This story stems from a millionaire gone bust from gambling addiction who decided to extort riches back from the casino. He built a bomb and got it into the building, then ransomed the organization for $3 million. The FBI documented the mechanisms in great detail — including the 8 independent trigger systems that made it impossible for them to disarm the thing. The design was so nefarious it's still used today as a training tool.

Comment Way to go (Score 1) 1

So, who are the people that are causing the terror? Is is the smart kid who can make a digital clock in his spare time? Or is it the uneducated (or mainstream media educated) teachers who scream 9/11 and terrorist and bomb whenever they are presented with something they don't understand. This kid should be given a merit award, and the teacher should be given some lessons in how not to be a fear mongerer.

Submission + - 9th grader detained after police mistake clock for fake bomb (dallasnews.com) 1

An anonymous reader writes: 14-year-old Ahmed Mohamed, a freshman at MacArthur High School in Irving, was taken in handcuffs to juvenile detention by police for creating clock. Police say they may charge him with making a hoax bomb though they acknowledge he told everyone who would listen that it’s a clock.

Submission + - Firefox's Secret Requests 1

An anonymous reader writes: Unlike older versions of Firefox, more recent versions will make a request to a destination server just by hovering over a link. No CSS and no javascript needed. Try it for yourself. Disable CSS and javascript in Firefox and fire up iftop, hover over some links and watch the fun begin. There once was a time when you hovered over a link to check the "real link" before you clicked on it. Well no more. Just looking at it makes a 'secret request'.

Slashdot Top Deals

Nothing will ever be attempted if all possible objections must be first overcome. -- Dr. Johnson

Working...