Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Next steps... (Score 2) 54

German law allows non-compete agreements but puts some serious restrictions on them. They are limited to a maximum of two years, can be expensive for the former employer because the former employer is required to pay compensation to the former employer while the non-compete agreement is in place. These compensations can often be between 50-100% of the former salary and do not get the former employer anything other than the non-compete. And these non-compete clauses can be hard to add to existing contracts. So it is not unlikely that non-compete clauses wouldn't apply to all the German engineers that were part of Grohman engineering when Tesla purchased them.

Submission + - EU funding tools for Low Power GPUs (LPGPU2) (lpgpu.org)

SRUK_lpgpu2 writes: From the project press release:

  Graphics researchers at Samsung Electronics UK have teamed up with mobile graphics specialists Codeplay, Think Silicon and TU Berlin to develop a tool for enabling smartphone batteries to last longer while running advanced video games and using the camera.
  The EU Commission has awarded a European GPU consortium a grant of 2.97 million Euros to research and develop a novel tool chain for analysing, visualizing, and improving the power efficiency of applications on mobile Graphics Processor Units (GPUs).
  The consortium includes three European technology companies: Codeplay, the Edinburgh based GPU technology company, Think Silicon (a Greek low gate-count Graphics Semiconductor IP Core company) and Samsung Electronics UK Ltd. TU-Berlin (Germany), a European University, completes the group.
  The key objectives of the 2 and a half years research project are:
– Define new industry standards for resource and performance monitoring to be widely adopted by embedded hardware GPU vendors (Khronos group)
– Define a methodology for accurate power estimations for embedded GPU.
– Enhance existing Dynamic Voltage and Frequency Scaling (DVFS) mechanism for optimum power management with sustained performance.
– To improve the power efficiency of compute and graphics applications running on mobile GPUs
– Build a unique power and performance visualization tool which informs application and GPU device driver developers of potential power and performance improvements.
Andrew Richards, Codeplay CEO said: “Working within this expert team across business and academia to analyse power consumption of videogames and camera processing is a fabulous opportunity for us at Codeplay. It will enable us to solve a very challenging problem: lengthening battery life of smartphones while running the most advanced graphics processing.”
Ben Juurlink, project coordinator and professor at TU Berlin, adds: “Searching for the performance and energy bottlenecks in applications running on embedded GPUs is like searching for a needle in a haystack. It is absolutely crucial that application developers are supported in this challenging task by smart analysis and visualization tools. Current embedded GPUs are powerful enough to execute immersive applications that we could only dream of a few years ago. However, all this compute power is good-for-nothing if the battery lasts for a few minutes only.”
Philip Harmer, of Samsung commented: “Consumers have become used to powerful, responsive graphics in mobile phones. They now rightly expect long battery life too. The LPGPU2 project will provide an advanced analytic tool for developers to improve the power usage and performance of their applications.”
Dr Iakovos Stamoulis, Think Silicon CTO adds: “The severely constrained power budget of new mobile and IoT/wearable devices with rich immersive multimedia capabilities shifts the design focus from performance to power in order to meet the toughest specifications. It is of absolute importance to holistically optimize systems at all levels: hardware, algorithmic and application software to minimize power consumption. LPGPU2 Project will provide the means to measure, explore and identify energy usage, which is of utmost importance to achieve the required efficiency.”

Submission + - Investigation Finds Inmates Built Computers, Hid Them In Prison Ceiling (cbs6albany.com)

An anonymous reader writes: The discovery of two working computers hidden in a ceiling at the Marion Correctional Institution prompted an investigation by the state into how inmates got access. In late July, 2015 staff at the prison discovered the computers hidden on a plywood board in the ceiling above a training room closet. The computers were also connected to the Ohio Department of Rehabilitation and Correction's network. Authorities say they were first tipped off to a possible problem in July, when their computer network support team got an alert that a computer "exceeded a daily internet usage threshold." When they checked the login being used, they discovered an employee's credentials were being used on days he wasn't scheduled to work. That's when they tracked down where the connection was coming from and alerted Marion Correctional Institution of a possible problem. Investigators say there was lax supervision at the prison, which gave inmates the ability to build computers from parts, get them through security checks, and hide them in the ceiling. The inmates were also able to run cabling, connecting the computers to the prison's network.

Submission + - Google Ruins the Assistant's Shopping List, Turns It Into a Google Express Ad (arstechnica.com)

An anonymous reader writes: The Google Assistant, Google's voice assistant that powers the Google app on Android phones, tablets, and Google Home, has just gotten a major downgrade. In a move reminiscent of all the forced and user-hostile Google+ integrations, Google has gutted the Google Assistant's shopping list functionality in order to turn it into a big advertisement for Google's shopping site, Google Express. The shopping list has been a major feature of the Google Assistant. You can say "Add milk to my shopping list," and the Google Assistant would dutifully store this information somewhere. The shopping list used to live in Google Keep. Keep is Google's primary note-taking app, making it a natural home for the shopping list with lots of useful tools and management options. Now the shopping list lives in Google Express. Express is an online shopping site, and it has no business becoming a dedicated place to store a shopping list that probably has nothing to do with Google's online marketplace. Since Google Express is an online shopping site (and, again, has no business having a note-taking app grafted onto it), the move from Keep to Google Express means the Assistant's shopping list functionality loses the following features: Being able to reorder items with drag and drop.
Reminders; Adding images to the shopping list; Adding voice recordings to the shopping list; Real time collaboration with other users (Express has sharing, but you can't see other people as they type—you have to refresh.); Android Wear integration; Desktop keyboard shortcuts; Checkbox management: deleting all checked items, unchecking all items, hiding checkboxes. Alternatively, the move from Keep to Google Express means the Assistant shopping list gains the following features: Google Express advertising next to every list item; Google Express advertising at the bottom of the page.

Submission + - The Kodi development team wants to be legitimate and bring DRM to the platform. (torrentfreak.com)

pecosdave writes: The XBMC/ Kodi development team has taken a lot of heat over the years, mostly due to third party developers introducing piracy plugins to the platform, then in many cases cheap Android computers are often sold with these plugins pre-installed with the Kodi or XBMC name attached to them. The Kodi team is not happy about this, and has taken the fight to the sellers. The Kodi team is now trying to work with rights holders to introduce DRM and legitimate plugins to the platform. Is this the first step towards creating a true one-stop do it yourself Linux entertainment system?

Submission + - How Google Book Search Got Lost (backchannel.com)

mirandakatz writes: When Google started its Book Search project nearly 15 years ago, it seemed impossibly ambitious: An upstart tech company that had just tamed and organized the vast informational jungle of the web would now extend the reach of its search box into the offline world. It was the company's first real moonshot, aspiring to make all the world's books digitally accessible—and in doing so, somehow produce a phase-shift in human awareness. But between legal battles and a slowly dwindling sense of ambition, Google Books never achieved those great heights, and today, it's settled into a quiet middle age of sourcing quotes and serving up snippets of text from the 25 million-plus tomes in its database. At Backchannel, Scott Rosenberg chronicles the project's rise and fall, writing that "Google employees maintain this is all they ever intended to achieve. Maybe so. But they sure got everyone else’s hopes up."

Submission + - SPAM: Exploit Revealed For Remote Root Access Vulnerability Affecting Many Routers

Orome1 writes: Back in January 2013, researchers from application security services firm DefenseCode unearthed a remote root access vulnerability in the default installation of some Cisco Linksys (now Belkin) routers. The flaw was actually found in Broadcom’s UPnP implementation used in popular routers, and ultimately the researchers extended the list of vulnerable routers to encompass devices manufactured by the likes of ASUS, D-Link, Zyxel, US Robotics, TP-Link, Netgear, and others. Since there were millions of vulnerable devices out there, the researchers refrained from publishing the exploit they created for the flaw, but now, four years later, they’ve released their full research again, and this time they’ve also revealed the exploit.
Link to Original Source

Submission + - Symantec says CIA hacking tools were used in 40 'Longhorn' cyberattacks (betanews.com)

Mark Wilson writes: The CIA's range of hacking tools revealed as part of WikiLeaks' Vault 7 series of leaks have been used to conduct 40 cyberattacks in 16 countries, says Symantec. The security firm alleges that a group known as Longhorn has been using tools that appear to be the very same ones used by the CIA.

While it would be obvious to jump to the conclusion that the CIA was itself responsible for the attacks — and that Longhorn is just a branch of the CIA — Symantec opts for a rather more conservative evaluation of things: "there can be little doubt that Longhorn's activities and the Vault 7 documents are the work of the same group."

In a post on the Symantec Security Response blog, the company provides what it says is the first evidence that the Vault 7 tools have actually been used in cyberattacks or cyberespionage.

Comment Re:A better question to ask (Score 1) 75

"Chad Rigetti, the startup's founder and CEO -- who declined to say whether the company is actually earning any revenue yet." who would also decline to say whether the company is doing proper quantum computing yet.

If he knew how much revenue he was getting, he wouldn't know whether the revenue growth rate was growing or shrinking. How the fark is he supposed to get Series A funding at a good valuation like that? Naw, man, he did it right - assume a given momentum sufficient to get the next round of funding, and who cares about the company's actual market position?

Comment Re:"Labor Shortage" (Score 2) 477

You're not talking about a people shortage, you're talking about a training shortage.

Nope. Training can help people to learn about a new language, a new operating system, etc. But if people lack the talent for abstract thought, can't write something as simple as FizzBuzz in any language of their choice, then no amount of training is going to enable them to write complex software. The issue is that Universities do not want to tell people early that they lack talent and should switch to a different profession. Then they somehow finish their CS degree and cannot find a job.

Comment Re:"Labor Shortage" (Score 1) 477

And you believe that H1B IT workers brought in from India will satisfy this requirement? If so your experiences must have been vastly different from mine.

A very small number of them will, but most won't. H1Bs are abused, this needs to stop. H1Bs are not needed to bring in people with bad to mediocre skills. There is no shortage of those people. But not every usage of H1Bs is abusive and training can only help people that have the required talent.

Comment Re:"Labor Shortage" (Score 5, Insightful) 477

This is a myth

There is no shortage of people with an CS degree. But there is certainly a shortage of people that can actually write good code for non-trivial tasks. Proper CS is hard, you need to know tons of things about very different topics from algorithms and maths, to hardware details and interfaces. In addition problem solving and abstract thinking skills are required. Only a small fraction of people is able to do that and even if people have the talent, but are only into CS for the money, they will likely never learn enough.

The issue with H1B is that they are justified with the real shortage of really good people, but are used to keep wages down for people doing routine, trivial tasks that can be done even by people with only so-so education and skills.

Comment In principle, that would apply sometimes (Score 2) 350

So what I'm hearing is public execution of CEO's. Seems a bit barbaric

If the CEO effectively or directly orders an action that a reasonable person could foresee would lead to the death of their workers or members of the general public, then it most certainly could apply. In fact, a civilized society would not only punish the CEO harshly, but hold the CEO to the strongest standard under noblesse oblige which might merit not only an execution in some cases, but the state liquidating their estate and putting the assets to work for the community and victims (in particular).

Comment You're misapplying Sun Tzu (Score 3, Insightful) 350

Sun Tsu's art of war dictates that a general must publicly execute one of his men so the others fall in line.

Going after the company is not an application of that idea, an application of Roman decimation or any equivalent concept of punishing someone pour encourager les autres. You want to make sphincters pucker here? Real simple. Hold the executive(s) responsible personally. Pierce the corporate veil and go after them directly for ordering non-compliance.

Slashdot Top Deals

No amount of genius can overcome a preoccupation with detail.