Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Education

How Do Universities Prepare Graduates For Jobs That Don't Yet Exist? (theguardian.com) 164

Technological changes such as automation and artificial intelligence are expected to transform the employment landscape. The question is: will our education system keep up? From a report: The answer matters because an estimated 65% of children entering primary schools today will work in jobs and functions that don't currently exist, according to a recent Universities UK report. The research, which explores the "rapid pace of change and increasing complexity of work", also warns that the UK isn't even creating the workers that will be needed for the jobs that can be anticipated. By 2030, it will have a talent deficit of between 600,000 and 1.2 million workers in the financial and business sector, and technology, media and telecommunications sector.

University leaders would be "foolish" not to pay attention, says Lancaster University vice-chancellor Mark E Smith. "We look at the trends in the job market and the skills employers are looking for, and we listen to what employers are saying. We don't want to be talking about yesterday's problem." This is one of the reasons the university is a partner in the National Institute of Coding. The programme, led by the University of Bath, is bringing 25 universities together with small and medium-sized enterprises (SMEs) and global companies including IBM, Cisco, BT and Microsoft to create "the next generation of digital specialists".

Jordan Morrow, chair of the Data Literacy Project advisory board and global head of data literacy at US-based analytics firm Qlik, thinks that in a climate of uncertainty, universities should focus on developing the thing they have specialised in for centuries: critical thinking. "We need people who can give insight, not just observations," he says. Likewise, he says, the "softer" skills of communication and storytelling are vital. "The reality is that data scientists are trained to do very complex and complicated things with data, but their training is not necessarily in people skills or leadership. It becomes an issue when you have, say, a very intelligent data scientist who has put together an analysis, but doesn't know how to communicate it."

Government

White House Says Anonymous 'Coward' Behind New York Times Op-Ed Should Resign (freerepublic.com) 898

Earlier today, The New York Times published an op-ed from an anonymous staffer in the Trump administration, who has "vowed to thwart parts of [President Trump's] agenda and his worst inclinations," citing the president's amorality. The staffer writes: "We want the administration to succeed and think that many of its policies have already made America safer and more prosperous. But we believe our first duty is to this country, and the president continues to act in a manner that is detrimental to the health of our republic. That is why many Trump appointees have vowed to do what we can to preserve our democratic institutions while thwarting Mr. Trump's more misguided impulses until he is out of office." An anonymous [coward] shares the response from the White House: White House Press Secretary Sarah Sanders ripped the anonymous senior White House staffer who wrote an op-ed for The New York Times slamming President Trump's conduct. "The individual behind this piece has chosen to deceive, rather than support, the duly elected President of the United States," she said in a statement. "He is not putting country first, but putting himself and his ego ahead of the will of the American people. This coward should do the right thing and resign," she added. Trump himself called the op-ed's author "gutless." He tweeted: "Does the so-called 'Senior Administration Official' really exist, or is it just the Failing New York Times with another phony source? If the GUTLESS anonymous person does indeed exist, the Times must, for National Security purposes, turn him/her over to government at once!"

The New York Times op-ed page editor Jim Dao described the process behind publishing the op-ed, telling CNN that the official contacted him "through an intermediary." He said that the New York Times also spoke with the anonymous individual but there are only a "very small number of people within the Times who know this person's identity." Dao didn't provide a gender for the person, but the author was described in a New York Times tweet as a "he" earlier Wednesday. [The Times later said that the tweet was a mistake and that it "was drafted by someone who is not aware of the author's identity."] Furthermore, Dao "said there was no special effort to disguise the person's writing style, for example by rewriting the piece in some fashion," reports CNN. "'There's editing in everything we do,' he said, but it's based on making the person's views 'clearer' and adhering to style standards."

A separate CNN article highlights 12 senior Trump administration officials who may be behind the op-ed.
Networking

M0n0wall Fork SmallWall Has First Official Release 34

New submitter houstonbofh writes: When the m0n0wall project ended back in February, many people just did not want to lose their small and lean firewall. And now, one of the forks, SmallWall, has released it's first non-beta release. It has some small improvements to the GUI, and now has added L2TP support. The announcement with the changes can be found here. Also, a partnership with MIXTPC was announced, allowing firewalls with SmallWall preloaded to be purchased. Their web store is here.
Robotics

Florida Hospital Shows Normal Internet Lag Time Won't Affect Remote Robotic Surgeries 125

Lucas123 writes: Remote robotic surgery performed hundreds or even thousands of miles away from the physician at the controls is possible and safe, according to the Florida Hospital that recently tested Internet lag times for the technology. Roger Smith, CTO at the Florida Hospital Nicholson Center in Celebration, Fla., said the hospital tested the lag time to a partner facility in Ft. Worth, Texas and found it ranged from 30 to 150 milliseconds, which surgeons could not detect as they moved remote robotic laparoscopic instruments. The tests, performed using a surgical simulator called a Mimic, will now be performed as if operating remotely in Denver and then Loma Linda, Calif. The Mimic Simulator system enables virtual procedures performed by a da Vinci robotic surgical system, the most common equipment in use today; it's used for hundreds of thousands of surgeries every year around the world. With a da Vinci system, surgeons today can perform operations yards away from a patient, even in separate but adjoining rooms to the OR. By stretching that distance to tens, hundreds or thousands of miles, the technology could enable patients to receive operations from top surgeons that would otherwise not be possible, including wounded soldiers near a battlefield. The Mimic Simulator was able to first artificially dial up lag times, starting with 200 milliseconds all the way up to 600 milliseconds.
Encryption

Ask Slashdot: Is SHA-512 the Way To Go? 223

crutchy writes "When I was setting up my secure website I got really paranoid about SSL encryption, so I created a certificate using OpenSSL for SHA-512 encryption. I don't know much about SHA (except bits that I can remember from Wikipedia), but I figure that if you're going to go to the trouble (or expense) of setting up SSL, you may as well go for the best you can get, right? Also, what would be the minimum level of encryption required for, say, online banking? I've read about how SHA-1 was 'broken', but from what I can tell it still takes many hours. What is the practical risk to the real internet from this capability? Would a sort of rolling key be a possible next step, where each SSL-encrypted stream has its own private/public key pair generated on the fly, and things like passwords and bank account numbers were broken up and sent in multiple streams with different private/public key pairs? This would of course require more server grunt to generate these keys (or we could take a leaf from Google's book and just have separate server clusters designed solely for that job), but then if computing performance was a limiting factor, the threat to security of these hashes wouldn't be a problem in the first place." (Continued below.)
Announcements

Obama Sets End of Iraq Combat For August 31st 659

eldavojohn writes "President Barack Obama has announced that on August 31st the United States will cease all combat operations in Iraq, although 50,000 troops will remain until the end of 2011. It's been a long seven-and-a-half years, with no guarantee of this announcement actually signifying the end of violence. Pundits are already speculating on whether or not this withdrawal speech is 'Mission Accomplished 2.' It's possibly the most significant confirmation of and commitment to a withdrawal the world will hear from the United States in Iraq."
Image

Oil Leak Could Be Stopped With a Nuke 799

An anonymous reader writes "The oil leak in the Gulf of Mexico could be stopped with an underground nuclear blast, a Russian newspaper reports. Komsomoloskaya Pravda, the best-selling Russian daily, reports that in Soviet times such leaks were plugged with controlled nuclear blasts underground. The idea is simple, KP writes: 'The underground explosion moves the rock, presses on it, and, in essence, squeezes the well's channel.' It's so simple, in fact, that the Soviet Union used this method five times to deal with petrocalamities, and it only didn't work once."
Government

Will Your Answers To the Census Stay Private? 902

Hugh Pickens writes "James Bovard writes in the Christian Science Monitor that Americans are told that information gathered in the census will never be used against them and the House of Representatives, in a Census Awareness Month resolution passed March 3, proclaimed that 'the data obtained from the census are protected under United States privacy laws.' Unfortunately, thousands of Americans who trusted the Census Bureau in the past lost their freedom as a result. In the 1940 Census, the Census Bureau loudly assured people that their responses would be kept confidential. Within four days of the attack on Pearl Harbor, the Census Bureau had produced a report listing the Japanese-American population in each county on the West Coast. The Census Bureau's report helped the US Army round up more than 100,000 Japanese-Americans for concentration camps (later renamed 'internment centers'). In 2003-04, the Census Bureau provided the Department of Homeland Security with a massive cache of information on how many Arab Americans lived in each ZIP Code around the nation, and which country they originated from — information that could have made it far easier to carry out the type of mass roundup that some conservatives advocated. 'Instead of viewing census critics as conspiracy theorists, the nation's political leaders should recognize how their policies have undermined public faith in government,' writes Bovard. 'All the census really needs to know is how many people live at each address. Citizens should refuse to answer any census question except for the number of residents.'"
Image

California Legislature Declares "Cuss-Free" Week 262

shewfig writes "The California legislature, which previously tried to ban incandescent light bulbs, just added to the list of banned things ... swear words! Fortunately, the measure only applies for the first week of March, and compliance is voluntary — although, apparently, there will be a 'swear jar' in the Assembly and the Governor's mansion. No word yet on whether the Governator intends to comply."

Comment Re:Qt (Score 1) 310

OP didn't say anything about UI, as you'd surely know if you had bothered to read the summary:

What I actually need is a platform independent lib covering Windows and Linux variants to handle sockets, IPC and threads abstractions

*ahem*

And if you bothered to read what Qt was about, then you'd realize that Qt is in fact a platform independent lib covering Windows and Linux variants to handle sockets, IPC and threads abstractions (as well as a whole lotta other things.)

Classes that Qt offers:
http://qt.nokia.com/doc/4.5/classes.html

News

FOSS Sexism Claims Met With Ire and Denial 1255

Last Friday Bryce Byfield gave us a little insight into the fallout surrounding his article on sexism in the FOSS world. Unfortunately it seems that FOSS junkies did little better than the rest of the world with respect to sexism, displaying similar levels of denial, abuse, and ignorance. "But the real flood of emotion comes from the anti-feminists and the average men who would like to deny the importance of feminist issues in FOSS. Raise the subject of sexism, and you are met with illogic that I can only compare to that of the tobacco companies trying to deny the link between their products and cancer. Because I took a feminist stance in public, I have been abused in every way possible — being called irrelevant, a saboteur, coward, homosexual, and even a betrayer of the community. I know that many women in the community have been attacked much more savagely than I have, so I'm not complaining. Nor am I a stranger to readers who disagree with me, but the depth of reaction has taken me back more than once. I think the reaction is an expression of denial more than anything else."
The Media

Fake News Scam Sites Advertising On Real News Sites 128

Virtual_Raider writes "Wired is running a story about a new twist in the never-ending quest to prove P. T. Barnum's adage. Old: Scammers are creating fake news sites that look almost like the real thing. New: They are advertising on real news sites, making it difficult for unwary readers to catch on they are being duped with fake coverage of get-rich-quick scams. Among those running the scam 'news' ads are the Huffington Post and Salon. From the article: 'The story has art, it has a sidebar, there's weather, supposed reader comments — even ads. Steadman is described as "a mother from San Francisco" — at least, when I read the article. Thanks to cutting-edge reporting techniques perfected by News 5, she will automatically move to the geolocation of your internet IP address when you read it. Look, she lives right in your neighborhood!'" Forbes also wrote about the scam news sites a couple of weeks back.

Comment Re:Stop overselling (Score 1) 213

Then why is it that I can get service that is not capped and is not shaped from TekSavvy? They are already paying almost all of the cost as fees to Bell (their profit margin is extremely low, they have to work with volume of subscriptions) and they are $20+ cheaper in order to compete in the market. On top of that their support isn't a fucking joke.

Oh, right, it's because Bell and Rogers are making a fortune overselling their shitty service and not spending anything to increase capacity or to have useful tech support.

I've been with Tekksavvy for a few years as well. Great ISP. But notice how they changed the pricing scheme? What was before unlimited had a bandwidth cap put on it. If you did want to go the unlimited route, you now had to pay more. Even though they were getting more customers.

I'm not going to deny that Rogers and Bell charge prices that don't seem all that competitive. What I am trying to do is explain their logic, and that of most ISPs.

Comment Re:Stop overselling (Score 4, Informative) 213

I think this illustrates how few people understand how consumer broadband works.

The reason consumer broadband is so cheap is that bandwidth is actually shared in pools of people. It's not like having a business-class connection where you have dedicated lines, a guaranteed speed (ie. 1.5MB/s per person), and the price to reflect it.

Consumer broadband is different. Allocate 50MBs to a pool of people, and cap each person at 5MB/s. With casual net usage, that's not a problem. Games are low in bandwidth, and web surfing produces sporadic spikes of intense bandwidth usage. At 50MB/s, you could get maybe a thousand simultaneous users. They all download their pages at blazing speeds, and have low latency on their games. Because its shared, the price is cheap too.

But if you introduce something like bittorrent into that consumer broadband usage model, then we have a problem. Because now, it only takes a relative few to clog up the entire allocated 50MB/s.

ISPs like Rogers who used pool resources are now faced with a dilemma: how you maintain speeds for everyone, while keeping the price low - for everyone? They've chosen to throttle connections. Is it right? Perhaps not.

But it's important to understand that the issue is just not as black and white as some would like it to be. I'm for net neutrality, in terms of being blind to who the end IP is. I don't want Site X to be slower because they didn't pay Rogers a premium. However, I'm not against traffic shaping high-bandwidth services. If you want the bandwidth so bad, then pay for a line with guaranteed speeds.

The Military

40 Years Ago, the US Lost a Nuclear Bomb 470

Hugh Pickens writes "A BBC investigation has found that in 1968 the US abandoned a nuclear weapon beneath the ice in northern Greenland after a nuclear-armed B52 crashed on the ice a few miles from Thule Air Base. The Stratofortress disintegrated on impact with the sea ice and parts of it began to melt through to the fjord below. The high explosives surrounding the four nuclear weapons on board detonated without setting off the nuclear devices, which had not been armed by the crew. The Pentagon maintained that all four weapons had been 'destroyed' and while technically true, investigators piecing together fragments from the crash could only account for three of the weapons. Investigators found that 'something melted through ice such as burning primary or secondary.' A subsequent search by a US submarine was beset by technical problems and, as winter encroached and the ice began to freeze over, the search was abandoned. 'There was disappointment in what you might call a failure to return all of the components,' said a former nuclear weapons designer at the Los Alamos nuclear laboratory. 'It would be very difficult for anyone else to recover classified pieces if we couldn't find them.'"

Slashdot Top Deals

Administration: An ingenious abstraction in politics, designed to receive the kicks and cuffs due to the premier or president. -- Ambrose Bierce

Working...