Jumat, 06 Juni 2014

Apple: Many Users Bought Android 'By Mistake'; U.S. Tech Worker Groups Boycott IBM, Infosys, Manpower



Where's the Most Unusual Place You've Written a Program From? |
Do 4G World Phones Exist?

To view a web version of this message, click here

Slashback - The Best of Slashdot

Send this message to a friend



Apple: Many Users Bought Android 'By Mistake'

U.S. Tech Worker Groups Boycott IBM, Infosys, Manpower

Where's the Most Unusual Place You've Written a Program From?

Beware the Coming Nightmare of Unpatchable Systems

Do 4G World Phones Exist?

Hot Comment: "I don't understand what the programmers of all these crypto..."

From the Vault: C++ Is the Winner in Google's Language Performance Tests

Watch It: Open Source Laptop Made By and For Hackers

Poll Booth: In the year since Snowden's revelations ...

Sponsored Resource: The Ten Commandments of BYOD


Top Stories

Apple: Many Users Bought Android 'By Mistake'
Apple CEO Tim Cook, during his keynote at the company's Worldwide Developer Conference, said that around 130 million customers bought their first Apple device in the last 12 months. He also noted that many of the new customers had switched from Android, adding that "They had bought an Android phone by mistake, and then had sought a better experience and a better life."
Sound Off>>

U.S. Tech Worker Groups Boycott IBM, Infosys, Manpower
Accusations of employment discrimination has prompted three Americans tech advocacy groups to launch a labor boycott of IBM, Infosys and Manpower. The groups say that the companies targeted in the boycott engaged in a pattern that discourages U.S. workers from applying for U.S. IT jobs by tailoring employment ads toward overseas workers.
Sound Off>>

Where's the Most Unusual Place You've Written a Program From?
Michael Raithel was polling the SAS crowd, but it'd be interesting to hear the answers to the programming questions he posed from a broader audience: 1. What is the most unusual location you have written a program from? 2. What is the most unusual circumstance under which you have written a program? 3. What is the most unusual computing platform that you wrote a program from? 4. What is the most unusual application program that you wrote?
Sound Off>>

Beware the Coming Nightmare of Unpatchable Systems
The end of support for Windows XP is just the tip of the iceberg when it comes to software and hardware that is unpatchable and unsupportable. Infoworld reports that "the trend toward systems and devices that, once deployed, stubbornly 'keep on ticking' regardless of the wishes of those who deploy them is fast becoming an IT security nightmare made real, affecting everything from mom-and-pop shops to power stations."
Sound Off>>

Do 4G World Phones Exist?
Viv Savage, who lives in the U.S. and has a daughter who will be attending college overseas next year, needs to buy a new phone for her and asked what Slashdot community members would recommend: "There doesn't appear to be a solution for getting high-speed data (i.e., 4G) here and abroad with one phone. Have any worldly Slashdotters figured this out?"
Sound Off>> 

Hot Comment

Basic programming principles what?
"I don't understand what the programmers of all these crypto libraries were thinking here. Even for the most basic and unimportant program, the rule is 'if the data comes from outside, verify!' This is vastly more important when cryptography is involved, so why is it that all these crypto libraries seem to blindly trust whatever the Internet is sending them?!" --by maugle
Read More>>

 

From the Vault

C++ Is the Winner in Google's Language Performance Tests
Three years ago, Google released a research paper that suggested C++ was the best-performing language on the market. But the researchers also noted that of the languages tested (C++, Java, Scala and Google's own programming language Go), C++ required the most extensive tuning efforts, "many of which were done at a level of sophistication that would not be available to the average programmer."
Read More>>

Watch It

Open Source Laptop Made By and For Hackers
Bunnie Huang, author of the freely available book, "Hacking the Xbox: An Introduction to Reverse Engineering," talks about his latest long-term project-- an open source laptop computer that goes much farther than some other open-source hardware projects. He also discusses some of the design decisions that goes into making a computer that is by and for hackers.
Watch the Video>>

 

Poll Booth

In the year since Snowden's revelations ...
  • I have changed my security practices not a bit
  • I have mildly upgraded my security practices
  • I've seriously upgraded my security practices
  • I've radically upgraded my security practices
  • I've gone plain-text only, just because.
  • Snowden who?
Cast Your Vote>>
 

Sponsored Resource

The Ten Commandments of BYOD
End users are bringing their personal devices into your company's network, with or without IT's permission. So, how will you support workforce desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? Find out rules on implementing an effective BYOD program in your organization.
Learn More>>
 

Follow Slashdot on Twitter and Facebook.

To unsubscribe, click here or send an email to: unsubscribe-213087@elabs10.com
To ensure delivery of this newsletter to your inbox and to enable images, please add slashdot@newsletters.slashdot.org to your e-mail address book or safe senders list.
Slashdot | 594 Howard Street, Suite 300 | San Francisco, CA 94105
To view our Privacy Policy click
here.

 

Tidak ada komentar:

Posting Komentar