Forgot your password?
typodupeerror
The Almighty Buck

A Look at the Koch Brothers Dark-Money Network 406

An anonymous reader writes "The California attorney general and the state's top election watchdog named the 'Koch brothers network' of donors and dark-money nonprofits as the true source of $15 million in secret donations made last year to influence two bitterly fought ballot propositions in California. State officials unmasked the Kochs' network as part of a settlement deal that ends a nearly year-long investigation into the source of the secret donations that flowed in California last fall."
Programming

How To Develop Unmaintainable Software 211

jones_supa writes "Greg Jorgensen specializes in debugging, fixing, maintaining, and extending legacy software systems. His typical client has a web site or internal application that works, more or less, but the original developer isn't available. Greg lists some things you can do in your own software projects to keep him in business. In summary, the list goes as follows: Customize your development environment a lot, don't make it easy for the next programmer to start working on the code. Create an elaborate build and deployment environment and remember to leave out the documentation. Don't bother with a testing/staging server but instead have secret logins and backdoor URLs to test new features, and mix test data with real data in your database. Don't bother with a well-understood framework, write everything from scratch instead. Add dependencies to specific versions of libraries and resources, but don't protect or document those dependencies. For the icing of the cake, use the coolest mix of cutting-edge programming languages."
Businesses

In Praise of Micromanagement 136

Hugh Pickens DOT Com writes "Sydney Finkelstein writes at BBC that Steve Jobs, Mickey Drexler, and Jeff Bezos all have something in common. They are all builders of giant brands, very successful, and each is (or was) 'an unmitigated, unapologetic, micromanager!' The modern executive is taught — in business schools and in many jobs — that to manage people effectively is to delegate, and then get out of the way. But it's not delegate and forget says Finkelstein; it must be delegate and be intimately involved with what happens next. Micromanagers must be selective. You can't delve into the details of everything, and in fact superstar micromanagers don't. 'Steve Jobs was intimately involved with each product the company designed, and was even famously involved in designing the glass stairs at the Apple stores. But financial and operational issues were delegated to second-in-command and current Apple chief executive officer Tim Cook.' One key is that micromanagers must be experts. What could be worse than a manager immersed in the details who really doesn't know his stuff? Finally, it takes a strong, trusted team to be a micromanager. Could Steve Jobs have spent weeks with the iPhone design team if there was no one else to mind the store? If not for Tim Cook, perhaps the legend of Steve Jobs would not have turned out quite so well. 'The good news is that the best micromanagers are often the best talent developers,' writes Finkelstein. 'Their attention to detail, their intimate knowledge of the business and their deep involvement in what's going on actually enables more, not less, delegation.'"
United States

US Entertainment Industry To Congress: Make It Legal For Us To Deploy Rootkits 443

An anonymous reader writes "The hilariously named 'Commission on the Theft of American Intellectual Property' has finally released its report, an 84-page tome that's pretty bonkers. But there's a bit that stands out as particularly crazy: a proposal to legalize the use of malware in order to punish people believed to be copying illegally. The report proposes that software would be loaded on computers that would somehow figure out if you were a pirate, and if you were, it would lock your computer up and take all your files hostage until you call the police and confess your crime. This is the mechanism that crooks use when they deploy ransomware."
Government

CIA To Hand Over Drone Program To Pentagon? 142

An anonymous reader writes "According to a report at The Daily Beast, the Obama administration has decided to give the drone program to the Pentagon, taking it away from the CIA. This could lead to increased transparency for the program and stricter requirements for drone strikes. From the article: 'Officials anticipate a phased-in transition in which the CIA’s drone operations would be gradually shifted over to the military, a process that could take as little as a year. Others say it might take longer but would occur during President Obama’s second term. “You can’t just flip a switch, but it’s on a reasonably fast track,” says one U.S. official. During that time, CIA and DOD operators would begin to work more closely together to ensure a smooth hand-off. The CIA would remain involved in lethal targeting, at least on the intelligence side, but would not actually control the unmanned aerial vehicles. Officials told The Daily Beast that a potential downside of the agency’s relinquishing control of the program was the loss of a decade of expertise that the CIA has developed since it has been prosecuting its war in Pakistan and beyond. At least for a period of transition, CIA operators would likely work alongside their military counterparts to target suspected terrorists.'"
Government

Cyber War Manual Proposes Online Geneva Convention 90

judgecorp writes "A new manual for cyber war has been compiled by international legal experts and published by NATO. The manual proposes that hospitals and dams should be off-limits for online warfare, and says that a conventional response is justified if an attack causes death or serious damage to property. The manual might get its first practical application today — South Korea's TV stations and banks have come under an attack which may well originate from North Korea."

Comment Re:TLDR version (Score 2) 252

TL;DR - she's writing a book and wants us all to know, and Wired is cooperating. It's a fluff piece. Apparently we should buy it when it comes out.

As the sibling posts also say, you wrote a really bad summary. I think you just wanted to be cynical, or troll.

Aside from the fact that she'll apparently release the book copyleft, there's also the fact that it's a scholarly work - a good way to lose money.

A better summary would be something like "Anthropologist studies nerds, finds that they have an interesting culture and a clear interest in civil liberties issues."

But of course that isn't relevant to Slashdot. There are no nerds here, and no one cares about civil liberties here, right? We just discuss computer parts endlessly, right? I hope some smarter moderators show up soon.

I just want to thank you for your post, sadly have no mod points to give

Idle

Anthropologist Spends Three Years Living With Hackers 252

concealment writes "Coleman, an anthropologist who teaches at McGill University, spent three years studying the community that builds the Debian GNU/Linux open source operating system and hackers in the Bay Area. More recently, she's been peeling away the onion that is the Anonymous movement, a group that hacks as a means of protest — and mischief. When she moved to San Francisco, she volunteered with the Electronic Frontier Foundation — she believed, correctly, that having an eff.org address would make people more willing to talk to her — and started making the scene. She talked free software over Chinese food at the Bay Area Linux User Group's monthly meetings upstairs at San Francisco's Four Seas Restaurant. She marched with geeks demanding the release of Adobe eBooks hacker Dmitry Sklyarov. She learned the culture inside-out."
China

Housewives On Trial In China For Smuggling In iPhones 150

Quillem writes "Last year, Hong Kong residents were finding it hard to get their hands on the latest Apple iGadget even though supply was plentiful. An investigation revealed that most of the iPhones and iPads that made it into HK were being smuggled sans import duties into mainland China—where the devices were yet to be released—by housewives who were paid around USD 6 per smuggled gadget. Earlier this week, 25 of the suspected smugglers went on trial in Shenzhen city."
Privacy

The Privacy Illusion 198

LoLobey writes "Scott Adams has an entertaining entry on his Dilbert Blog about the perception of privacy. He writes, 'It has come to my attention that many of my readers in the United States believe they have the right to privacy because of something in the Constitution. That is an unsupportable view. A more accurate view is that the government divides the details of your life into two categories: 1. Stuff they don't care about. 2. Stuff they can find out if they have a reason.' His post is written in response to some reader comments on another entry about privacy guardians and how swell life would be if we voluntarily gave up certain personal info."
The Almighty Buck

WikiLeaks Losing Support From Anonymous 140

Hugh Pickens writes "The Guardian reports that members of computer hacker collective Anonymous have distanced themselves from WikiLeaks, claiming the whistleblowers' site has become too focused on the personal tribulations of its founder, Julian Assange. A statement linked from the Anonymous Twitter account, AnonymousIRC, described WikiLeaks as 'the one man Julian Assange show,' and complained that the website implemented a paywall seeking donations from users who wanted access to millions of leaked documents. 'The idea behind WikiLeaks was to provide the public with information that would otherwise be kept secret by industries and governments. Information we strongly believe the public has a right to know,' said the statement on behalf of Anonymous. The dispute could starve WikiLeaks of potentially newsworthy leaks in the future, as some of Wikileaks' recent disclosures – including the Stratfor emails – are alleged to have come from Anonymous."
Facebook

Facebook Tests 'Want' Button To Hoard User Data, Save Its Stock Price 98

colinneagle writes with news that Facebook is beginning to roll out tests of "want" and "collect" buttons in an attempt to bring users and retailers closer together. "The company is working with Victoria's Secret, Pottery Barn, Michael Kors, Wayfair, Neiman Marcus, Fab.com and Smith Optics. The difference between 'liking' and 'wanting' would be like discovering the holy grail of datamining. Inside Facebook said that although the 'Want' button is different than the Want plugin that developer Tom Waddington noticed in June, the company may eventually offer it as a plugin. Unsurprisingly, Facebook wants to keep people on the site as opposed to leaving to visit Pinterest. Collections will offer retailers a Pinterest-like option to engage buyers, offer users a way to collect images, while also collecting even more data about users. For example, Facebook asks, 'Why are you collecting this?' Regardless of a user's answer, the wants and collects will surely be used to deliver targeted ads. Eventually, the Collections feature could help Facebook generate more revenue."
Image

PETA Condemns Pokemon For Promoting Animal Abuse 418

SchrodingerZ writes "PETA, the same group that last November protested Mario for 'wearing fur,' has condemned the Pokémon media franchise and video game series. In light of the recent release of Pokemon Black and White Versions 2, the activist group is protesting that the Pokemon game series 'paints a rosy picture of what amounts to thinly veiled animal abuse.' As many of us know Pokemon is about young children who capture wild animals for the sole purpose of having them battle in non-fatal sparing matches. 'Much like animals in the real world, Pokémon are treated as unfeeling objects and used for such things as human entertainment and as subjects in experiments. The way that Pokémon are stuffed into pokéballs is similar to how circuses chain elephants inside railroad cars and let them out only to perform confusing and often painful tricks that were taught using sharp steel-tipped bullhooks and electric shock prods,' says a statement from the group. Ironically within Pokemon B/W 2 there an organization known as Team Plasma , which deals with taking Pokemon and retuning them to the wild. PETA is so up in arms that they have even created an anti-pokemon parody game in which you play as an escaped Pokemon battling your trainer. I recommend trying it, just for the laughs."
Science

Super Bacteria Create Gold 180

SchrodingerZ writes "With the price of gold skyrocketing in today's market, Michigan State University researchers have discovered a bacterium that can withstand high toxicity levels that are necessary to create natural gold. '"Microbial alchemy is what we're doing — transforming gold from something that has no value into a solid, precious metal that's valuable," said Kazem Kashefi, assistant professor of microbiology and molecular genetics.' The bacteria is Cupriavidus metallidurans, which is conditioned to be tolerant to heavy, toxic metals and to be 25 times stronger than most bacteria. When put into gold-chloride (a natural forming toxic liquid), the bacteria reproduces and converts the liquid into a gold nugget. The complete process takes about a week to perform. This experiment is currently on tour as an art exhibit called 'The Great Work of the Metal Lover.'"

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...