Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Irrelevant organisation now even more irrelevan (Score 4, Informative) 12

The people openly supporting this are the current Board of Directors. They are attempting to consolidate their power by implementing a system in which the outgoing Board picks the incoming Board. The Board does not post any of the minutes of their Board meetings. They do not post copies of any of the policies. When folks have asked for copies of the minutes, they were told it is the policy of the organization not to post those. When asked to see a copy of that policy, they have responded that it is policy of the organization not to share copies of the policies. In other words, "we the Board will do whatever the heck we feel like doing, and you petty members can go sit in a corner and color." (How's that for a polite phrasing of what I was really thinking?)

All ISC2 members need to vote against this proposal, and also sign the petition at https://jsweb.net/isc2

Submission + - ISC2 proposes to take away membership oversight (portswigger.net)

mencik writes: The International Information Systems Security Certification Consortium (ISC2) is the body that issues the CISSP among other certifications to people in the Information Security business. The Board has proposed changes to the by-laws which remove the ability of the membership to elect new members to the Board, and restricts their ability to provide any meaningful oversight. "The Daily Swig" reports on the group's defense of these undemocratic proposals.

Another group is campaigning to get members to vote "no" on the adoption of these changes, the vote for which opened on 10/19/22. They are also proposing their changes which would increase transparency, and those can be found at http://jsweb.net/isc2. Only ISC2 members can vote.

Comment Re:The results? (Score 1) 64

Surprised removing the statemate rule made such a difference to white's winning chances (30% more wins) considering it's so rare to see stalemate in practise.

Well, in real games, a the person attacking will attempt to avoid creating a stalemate since that is just a draw, and they would rather win. With this change a rule giving the attacker a win for a stalemate, there is no longer a reason to avoid that situation.

Comment Good News / Bad News (Score 1) 121

From the article - "The bad news is that the research team also analyzed 34 fast-charging chips, around which the fast charger models had been built. Researchers said that 18 chip vendors did not ship chips with a firmware update option, meaning there was no way to update the firmware on some fast charger chips." I'm confused. Why is this bad news? If you can't update the firmware, the attack doesn't work. To me, that is good news.

Submission + - Interview with Desktop Engineering Director Will Cooke on future of Ubuntu (techrepublic.com)

intensivevocoder writes: Following Canonical's pivot away from its internally-developed Unity user interface and Mir display server, Ubuntu has enjoyed two relatively low-drama years, as the Linux Desktop market homogenized during its transition back to a customized GNOME desktop. In a review of the most recent release, TechRepublic's Jack Wallen declared that "Ubuntu 19.04 should seriously impress anyone looking for a fast and reliable Linux desktop platform."

Largely, it's been a slow-and-steady pace for Ubuntu since the pivot from Unity to GNOME, though the distribution made headlines for plans to end support for 32-bit support. This prompted Valve, operators of games marketplace Steam, to re-think its approach toward Ubuntu, which it previously characterized as "as the best-supported path for desktop users."

TechRepublic's James Sanders interviewed Will Cooke, director of engineering for Ubuntu Desktop at Canonical, about the distribution's long-term plans for legacy 32-bit support, shipping a desktop in a post-Unity-era Ubuntu, and why Linux should be the first choice for users migrating from Windows 7 prior to the end of support.

Submission + - Ex-NSA Contractor pleads guilty to theft of classified material (usatoday.com)

mencik writes: A former National Security Agency contractor on Thursday pleaded guilty to stealing secret defense information over two decades in what legal experts have described as the biggest breach of classified information in U.S. history. He could be sentenced to nine years in prison.

Comment Re:I'm tell'n ya! (Score 1) 370

I got out of implementation when OOP became the in thing. So much extra crap in the libraries that you don't even know is there. It's no wonder you need 16GB of RAM these days. I wonder how many of today's programmers could implement an interrupt handler if they had to? I wonder if they even know that's what their OnEvent calls use?

Comment Deja Vu - all over again (Score 1) 57

The National Communications System, which was part of DISA in the late 1990's, along with the President's National Security Telecommunications Advisory Committee (NSTAC), proposed this way back then. The NCS is now part of DHS. Whatever happened to that 20 year old proposal and similar ones since that this has still not been established?

Comment I've Been Moved (Score 1) 322

Forty years ago IBM solved the problem of getting rid of people it didn't want anymore by moving them to another office, sometimes far from where they were currently located. Some people accepted this and ended up being moved to a new office every 2 or 3 years like a military brat. Many people refused and then were laid off for refusing the new assignment. In many circles working for IBM meant "I've Been Moved." I wonder why they forgot about that strategy?

Slashdot Top Deals

Real Programs don't use shared text. Otherwise, how can they use functions for scratch space after they are finished calling them?

Working...