Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - SPAM: Automate Hiring for Easier Tax Credits

An anonymous reader writes: As the name implies, the Work Opportunity Tax Credit is an incentive for employers to hire certain targeted groups identified as those who have more difficulty acquiring gainful employment. Examples of such groups would be food stamp recipients, ex-convicts, veterans and people with disabilities. It is the objective of the federal government to help such people become productive members of society and actual tax payers and thus reduce the burden on social welfare costs.

The benefit to the employer is apparently in the form of tax credits. The amount varies depending on which category a particular employee belongs to. For a company to avail of this incentive, it is necessary that a WOTC screening/processing is put in place, preferably integrated into the hiring process. One can see this as either an additional load to what may be an already costly process or as a savings opportunity. This largely depends how it is executed and web-based automated employee hiring solutions can actually make the latter perspective a reality.

To get an idea of the potential savings this incentive can offer, here is a rundown of some of the basic mechanics of WOTC:

For most groups, the tax credit amounts to about 40% of the income of a qualified employee. This applies to the first year of employment and the person should have worked a minimum of 400 hours in that period. If the WOTC qualified employee worked a minimum of 120 but less than 400 hours, the amount is 25%. The credit also only applies to the first 6,000 USD of income. One notable exception to this basic rule is the case for veterans, whose wage limit is the first 12,000 USD of income. Remember that this incentive is for every WOTC qualified employee. Thus the more people from any of the targeted groups a company hires, the more tax credits it receives.

Beyond savings, a more social benefit a company can receive from this incentive plan is an enhancement of their reputation. Pursuing WOTC means that a company does not discriminate in its hiring and is actually helping improve the quality of life of the individuals who belong to these targeted groups.

Despite these advantages, some companies still seem to miss out on this opportunity. The common understanding is that the procedures can be quite complex as human resource managers would need to screen every candidate for these particular requirements. Then they would have to submit for certification the properly filled out Form 8850 and 9061 of each candidate. This has to be done within the short time frame of 28 days since the employee started working. As it turns out, this also happens to be the usual employee on-boarding period for new hires.

This is why an automated hiring system is better suited to handle this particular aspect of recruitment. It doesn’t just make things move along faster but it also reduces the amount of human error which in terms of the WOTC can certainly result in opportunity costs.

Link to Original Source

Submission + - NASA paralysed by US shutdown (

An anonymous reader writes: The partial shutdown of the US government has forced the furlough of more than 800,000 federal workers, including 97 percent of NASA staff, but two space agency employees are finding ways to keep busy in their orbital office.

Submission + - Google Fiber partially reverses server ban

Lirodon writes: After being called out by the Electronic Frontier Foundation for banning the loosely-defined use of "servers" on its Fiber service, Google appears to have changed its tune, and now allows "personal, non-commercial use of servers that complies with this AUP is acceptable, including using virtual private networks (VPN) to access services in your home and using hardware or applications that include server capabilities for uses like multi-player gaming, video-conferencing, and home security"

Submission + - China's State Press Calls for 'Building a de-Americanized World'

Hugh Pickens DOT Com writes: Businessweek reports that as nations around the world fret over the US budget impasse according to a not-so-subtle commentary published by China’s official Xinhua News Agency "it is perhaps a good time for the befuddled world to start considering building a de-Americanized world". Key among its proposals: the creation of a new international reserve currency to replace the present reliance on US dollars, a necessary step to prevent American bumbling from further afflicting the world. “The cyclical stagnation in Washington for a viable bipartisan solution over a federal budget and an approval for raising the debt ceiling has again left many nations’ tremendous dollar assets in jeopardy and the international community highly agonized,” says Xinhua. “The world is still crawling its way out of an economic disaster thanks to the voracious Wall Street elites." The commentary calls for a greater role for developing-market economies in both the World Bank and International Monetary Fund and adds that “the authority of the United Nations in handling global hot-spot issues has to be recognized. That means no one has the right to wage any form of military action against others without a UN mandate." The commentary concludes that "the purpose of promoting these changes is not to completely toss the United States aside, which is also impossible. Rather, it is to encourage Washington to play a much more constructive role in addressing global affairs."

Comment Retitle "The UNtruth" (Score 1) 28

"According to Yahoo, the information that was stolen didn't have passwords or any other information that would allow unauthorized users to carry out user identity verification." So yahoo is forced to disclose a data breach by law. But they add to it the nothing important was taken. I would like you to think for your self for a minute. Does a burglar go around robbing homeless peoples shopping carts? People go after what has value, and they stole something. This story should read Yahoo Japan tries desperately to cover their data breach but has to admit to loosing user ID's.

Submission + - SPAM: Extract text from image files online absolutely free

deohill writes: OCR software means optical character recognition software which can recognize characters from a scanned document or a handwritten scanned paper or even a PDF file. So let’s take a look at some free online websites or tools to extract text from image files.
Link to Original Source

Submission + - SPAM: How cyberspace does play its vital role in interactive learning?

John williamsonn writes: Cyberspace has supplemented a naval aspect to the whole learning extravaganza. The richness of facts, knowledge as well as the other learning source materials has compiled every kind of facts and figures available in front of you, a mouse click away. The Cyberspace as well as the World Wide Web has added a navel aspect towards the whole interactive learning procedure to accomplish.
Link to Original Source

Submission + - Honeywords (

CowboyRobot writes: Businesses should seed their password databases with fake passwords and then monitor all login attempts for use of those credentials to detect if hackers have stolen stored user information. That's the thinking behind the "honeywords" concept first proposed this month in "Honeywords: Making Password-Cracking Detectable," a paper written by Ari Juels, chief scientist at security firm RSA, and MIT professor Ronald L. Rivest (the "R" in "RSA"). Honeywords aren't meant to serve as a replacement for good password security practices. But as numerous breaches continue to demonstrate, regardless of the security that businesses have put in place, they often fail to detect when users' passwords have been compromised.

Submission + - Dissecting RSA's "Watering Hole" Traffic Snippet (

rye writes: Even the tiniest snippets of network traffic reveal a lot-- not just about viruses and botnets, but also about the malware research lab setup inside corporations like RSA. Watch as Sherri Davidoff of LMG Security tears apart a teeny tiny snippet of gh0st RAT traffic released by RSA during their investigation of the VOHO "watering hole" attack.

Slashdot Top Deals

There's no sense in being precise when you don't even know what you're talking about. -- John von Neumann