Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Dell's Hot Air Video: Parody or Lapse in Judgment?

itwbennett Dell confirms it's not their video (1 comments)

Gizmodo is calling shenanigans and the Dell Twitter account confirmed it's not their video. But Dell also seems to be OK with it, which I suppose just means they believe there is no bad press.

more than 2 years ago
top

FoxConn Faces Mass Suicide Prrotest

itwbennett In related news... (1 comments)

A Microsoft investigation of the protest has found that workers aren't complaining about working conditions, but about 'staffing assignments and transfer policies'.

more than 2 years ago
top

E-Mail Can Reveal Your Friend Hierarchy

itwbennett Re:Is this an article from 2005? (85 comments)

My thoughts exactly. Email is so 5-10 years ago. If I'm communicating only with people who are in their 40s, then maybe this study has some merit. But anyone in their 20s is using facebook (incl facebook chat) or texting. And folks on the other end of the age spectrum are probably using the phone.

more than 2 years ago
top

Microsoft Now Collects Royalties From Over Half of All Android Devices

itwbennett ChromeOS also implicated as infringing patents (241 comments)

What's notable this time around is that ChromeOS is also implicated as an infringing technology. Compal is now the third ODM company to enter into a Microsoft agreement over ChromeOS and Android. Brian Proffitt goes into more detail in this blog post: http://www.itworld.com/mobile-wireless/215897/microsoft-why-innovate-when-you-can-litigate

more than 2 years ago
top

Paywalled NYT Now Has 300,000 Online Subscribers

itwbennett Need more numbers (179 comments)

Is 300k subscribers good? What percentage of total online readers is that? Also, sure, a 6% increase in digital advertising revenue is good, in that any increase is good. But what sort of increase did comparable websites see?

about 2 years ago
top

Lack of Technology Puts Star Wars Series On Hold

itwbennett Define cost effective (309 comments)

How 'cost effective' does it need to be when it's got a guaranteed audience of male tweens, teens, 20s ... plus all the geek girls. And the nostalgia audience too (that's my demographic, btw.).

more than 3 years ago
top

Using Flywheels to Meet Peak Power Grid Demands

itwbennett taking stock (325 comments)

Hoping the attention of the slashdot community will do good things for the Beacon stock I bought.

more than 3 years ago
top

35% Use Mobile Apps Before Getting Out of Bed

itwbennett Numbers are higher for nighttime checkins (180 comments)

Also, not surprisingly, 72% check Facebook from bed before going to sleep and 20% check Twitter. That's what happens when you keep your smartphone on your nightstand and/or work on your laptop into the wee hours.

more than 3 years ago
top

Detained MS Employee Freed By Libyan Gov't?

itwbennett Microsoft confirms release (1 comments)

The blog post linked to above has been updated. Microsoft has confirmed that Khalid Elhasumi was indeed freed on Tuesday.

more than 3 years ago
top

SlashTweaks Let YOU Micro-Edit Slashdot

itwbennett madlibs live! (257 comments)

Only snarkier

more than 3 years ago
top

Firing Phraseology: 'Pursure Other Interests'?

itwbennett headline typo (2 comments)

'Pursure' should be 'Pursue'.

more than 3 years ago
top

Why Dumbphones Still Dominate, For Now

itwbennett Re:Price (618 comments)

I agree. It's all about the "ridiculous pricing model". I may reconsider when smartphone data plans are bundled in with Internet, phone, cable TV. Until then, I'll do my Internet-enabling on my laptop and calling on my dumb phone (which, btw, is prepaid and hardly ever used). Sorry, AT&T, Verizon.

more than 3 years ago

Submissions

top

iPhone 6 Expected To Fetch Over $3,000 In China's Grey Market

itwbennett itwbennett writes  |  yesterday

itwbennett (1594911) writes "Apple has yet to say when the new iPhones might arrive in China, but grey market dealers in Beijing expect unofficial shipments of the iPhone 6 from Hong Kong and Australia to start arriving in China this weekend. Saying 'Chinese people will buy anything,' Beijing electronics dealer Wang Qingyun said he expects initial prices will reach over 20,000 yuan ($3,251) and perhaps up to 25,000 yuan, depending on how many iPhone 6 units actually make it to Beijing."
Link to Original Source
top

Scary Video Highlights Danger of Damaged Lithium Ion Batteries

itwbennett itwbennett writes  |  2 days ago

itwbennett (1594911) writes "As part of its work testing electronic components, the Japanese National Institute for Technology and Evaluation (NITE) tested batteries about the size of those used in cellphones. They were struck with a hammer then left on a work bench, unconnected from any apparatus. Later — the period of time is unclear from the edited footage — one of the batteries ruptures with a bang, flying across the laboratory. A second clip shows a similar battery erupting in a shower of sparks."
Link to Original Source
top

US Military Unaware of Chinese Attacks Against Transport Contractors

itwbennett itwbennett writes  |  2 days ago

itwbennett (1594911) writes "The Senate Armed Service Committee released on Wednesday an unclassified version of a report (PDF) commissioned last year to investigate cyberattacks against contractors for the U.S. Transportation Command (TRANSCOM). The report alleges that the Chinese military successfully stole emails, documents, login credentials and more from contractors, but few of those incidents were ever reported to TRANSCOM. During a one-year period starting in June 2012, TRANSCOM contractors endured more than 50 intrusions, 20 of which were successful in planting malware. TRANSCOM learned of only two of the incidents. The FBI, however, was aware of 10 of the attacks."
Link to Original Source
top

Use of Forced Labor 'Systemic' in Malaysian IT Manufacturing

itwbennett itwbennett writes  |  2 days ago

itwbennett (1594911) writes "The use of forced labor is so prevalent in the Malaysian electronics manufacturing industry that there is hardly a major brand name that isn't touched by the illegal practice, according to a report funded by the U.S. Department of Labor and undertaken by Verité, a nonprofit organization focused on labor issues. The two-year study surveyed more than 500 migrant workers at around 200 companies in Malaysia's IT manufacturing sector and found one in three were working under conditions of forced labor."
Link to Original Source
top

FCC Gets Record Number of Net Neutrality Comments. What Now?

itwbennett itwbennett writes  |  3 days ago

itwbennett (1594911) writes "The deadline for the public to comment on the FCC's proposed net neutrality rules passed Monday with more than 3 million comments filed, a record number for an FCC proceeding — and by far eclipsing the 1.4 million complaints the FCC received over Janet Jackson's wardrobe malfunction. The agency will now focus on reading and analyzing comments, said agency spokeswoman Kim Hart. Employees from across the FCC will be called on to read comments and technology tools will also be used to analyze comments, she said. But the record-breaking number of comments may slow the process and there's no set timeline for the FCC to act on net neutrality rules, Hart said."
Link to Original Source
top

How can programmers move up professionally?

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "Climb the ladder; make more money. Sounds good, right? But if you're a developer, you've first got to choose your ladder. In a recent blog post, Eric Bloom, an IT leadership development consultant and former CIO, tackles the question of developer career advancement. His advice sends readers down one of two (very broad) possible paths: 1) get deeply technical or 2) use your tech cred to open doors, but start pivoting into management. Are those really the only two options available to developers who want to advance in their careers?"
Link to Original Source
top

How China's E-waste Capital Is Trying to Clean Itself Up

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "If you want to see where your old electronics go to die, take a trip to Guiyu. For two decades, PCs, phones and other electronics have been shipped to this town on the southeast coast of China, where locals in thousands of small workshops pull them apart with buzz saws and pliers to extract the valuable components inside. But things may finally be changing. A sign posted by a small stream in the town declares that Guiyu will crack down on any 'acid cleaning, and burning activities.' And residents said it's rare now to see 'board burning' in the town itself, with that and other dangerous activities having been moved to an industrial park to the north."
Link to Original Source
top

Just Five Gangs in Nigeria Are Behind Most Craigslist Buyer Scams

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "Five Nigerian criminal gangs are behind most scams targeting sellers on Craigslist, and they've taken new measures to make their swindles appear legitimate, according to a study by George Mason University researchers Damon McCoy and Jackie Jones. In a new innovation, they're using professional check-writing equipment plus U.S.-based accomplices to not raise suspicions among their victims. McCoy and Jones will present their paper on Sept. 24 at the IEEE eCrime Research Summit in Birmingham, Alabama."
Link to Original Source
top

What Are the Most Confounding Features of Various Programming Languages?

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "Every programming language has its own unique quirks, such as weird syntax, unusual functionality or non-standard implementations, things that can cause developers new to the language, or even seasoned pros, to scratch their heads in wonder (or throw their hands up in despair). ITworld's Phil Johnson has rounded up some of the WTFiest — from the + operator in JavaScript to the trigraphs in C and C++ and indentation level in Python. What programming language oddities cause you the most grief?"
Link to Original Source
top

White House Names Google's Megan Smith As CTO

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "The White House has named long-time Google executive Megan Smith as the government's new CTO, in charge of improving technology and the use of data across agencies. Smith most recently served as vice president at Google's tech lab, Google[x]. She previously served as CEO of PlanetOut, helped design early smartphone technologies at General Magic and worked on multimedia products at Apple Japan in Tokyo. She holds bachelor's and master's degrees in mechanical engineering from MIT, and just might be, as noted in a previous Slashdot post, the first US CTO worthy of the title. Also on Thursday, the White House named Alexander Macgillivray, a former general counsel and head of public policy at Twitter, as deputy U.S. CTO."
Link to Original Source
top

The Forensic Tool That Grabs Nude Selfies From iCloud Accounts

itwbennett itwbennett writes  |  about two weeks ago

itwbennett (1594911) writes "There's a seedy trade in compromising photos stored in Apple iCloud accounts, and it is in part aided by a software program that cleanly collects the data. The software tool they're using is Moscow-based Elcomsoft's Phone Password Breaker (EPPB), one of many forensic tools the company develops for law enforcement and other clients. Elcomsoft CEO Vladimir Katalov said via email on Wednesday that there are legitimate uses for his company's software and that it doesn't exploit flaws in Apple services, but at the same time, Elcomsoft doesn’t restrict who it sells EPPB to and over time the software has been sold and then leaked to underground websites, like Anon-IB where some of the nude celebrity photos are believed to have first been circulated."
Link to Original Source
top

This is Tim: How Tim Cook is Becoming the Un-Jobs

itwbennett itwbennett writes  |  about a month ago

itwbennett (1594911) writes "Back in June, the New York Times ran an article (which was picked up by Slashdot) about how Tim Cook is putting his own stamp on Apple. That article, though, focused mainly on personality and style, and ITworld's Andy Patrizio has followed up with a collection of some of the technical, business, and product decisions Cook has made — from embracing the enterprise to dumping Objective C — that let us know we're firmly in the Tim Cook Era."
Link to Original Source
top

FCC Allowed To Question AT&T, Verizon On Business Broadband Pricing

itwbennett itwbennett writes  |  about 1 month ago

itwbennett (1594911) writes "The White House Office of Management and Budget (OMB) has given the FCC permission to collect new data in the long-running dispute over special access pricing. AT&T and Verizon Communications control an estimated 80 percent of the special access market, and competitors have complained for years that the two dominant telecom carriers are charging excessive prices for special access services. The FCC circulated a proposed order on special access in mid-2012, but late that year, also asked for comments on the special access market. Those comments aren't due until late this year."
Link to Original Source
top

Why Chinese Hackers Would Want US Hospital Patient Data

itwbennett itwbennett writes  |  about 1 month ago

itwbennett (1594911) writes "In a follow-up to yesterday's story about the Chinese hackers who stole hospital data of 4.5 million patients, IDG News Service's Martyn Williams set out to learn why the data, which didn't include credit card information was so valuable. The answer is depressingly simple: people without health insurance can potentially get treatment by using medical data of one of the hacking victims. John Halamka, chief information officer of the Beth Israel Deaconess Medical Center and chairman of the New England Healthcare Exchange Network, said a medical record can be worth between $50 and $250 to the right customer — many times more than the amount typically paid for a credit card number, or the cents paid for a user name and password. 'If I am one of the 50 million Americans who are uninsured ... and I need a million-dollar heart transplant, for $250 I can get a complete medical record including insurance company details,' he said."
Link to Original Source
top

Hackers Steal Data On 4.5 Million US Hospital Patients

itwbennett itwbennett writes  |  about a month ago

itwbennett (1594911) writes "Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical or clinical information."
Link to Original Source
top

Vehicle-To-Vehicle Networks Could Save Over 1,000 Lives a Year

itwbennett itwbennett writes  |  about a month ago

itwbennett (1594911) writes "On Monday, the National Highway Traffic Safety Administration (NHTSA) published a research report on vehicle-to-vehicle (V2V) technology and is seeking input from the public and industry. In the report, it estimated the safety benefits of just two possible applications of V2V, called Left Turn Assist and Intersection Movement Assist. Together, they could prevent as many as 592,000 crashes and save 1,083 lives per year, the agency said."
Link to Original Source
top

Baidu Partners With U.N. To Tackle E-waste In China

itwbennett itwbennett writes  |  about a month ago

itwbennett (1594911) writes "A Web-based app called "Baidu Recycle Station" launched Monday as part a new joint lab established by Baidu and the United Nations Development Program that will use Baidu's Internet services and data analytics to develop programs targeted at helping the environment, health care, education and more. The app is meant to help streamline the recycling of e-waste in China by helping users easily sell their old electronics to legitimate recycling factories. And none too soon: The country is the second largest producer of electronic trash, creating over 3.6 million tons of it each year, according to a U.N. study."
Link to Original Source
top

Groundwork Layed For Superfast Broadband Over Copper

itwbennett itwbennett writes  |  about a month ago

itwbennett (1594911) writes "Telecom equipment vendor Adtran has developed a technology that will make it easier for operators to roll out broadband speeds close to 500Mbps over copper lines. Adtran's FDV (Frequency Division Vectoring), enhances the capabilities of two technologies — VDSL2 with vectoring and G.fast — by enabling them to better coexist over a single subscriber line, the company said. VDSL2 with vectoring, which improves speeds by reducing noise and can deliver up to 150Mbps, is currently being rolled out by operators, while G.fast, which is capable of 500Mbps, is still under development, with the first deployments coming in mid-2015. FDV will make it easier for operators to roll out G.fast once it's ready and expand where it can be used, according to Adtran."
Link to Original Source
top

I'll Have What She's Having: Top Technologies Startups Are Using

itwbennett itwbennett writes  |  about a month ago

itwbennett (1594911) writes "Leo Polovets, a former LinkedIn and Google engineer turned VC, recently examined data from AngelList, an online community for startups, looking at the self-reported use of technologies by startups. Here's a sampling of what came out on top: JavaScript is by far the dominant programming language choice, followed by Ruby and Python. MongoDB is tops in databases, followed by MySQL. And AWS was the clear top choice for infrastructure and hosting."
Link to Original Source

Journals

itwbennett has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>