Send this message to a friend
Apple: Many Users Bought Android 'By Mistake'
U.S. Tech Worker Groups Boycott IBM, Infosys, Manpower
Where's the Most Unusual Place You've Written a Program From?
Beware the Coming Nightmare of Unpatchable Systems
Do 4G World Phones Exist?
Hot Comment: "I don't understand what the programmers of all these crypto..."
From the Vault: C++ Is the Winner in Google's Language Performance Tests
Watch It: Open Source Laptop Made By and For Hackers
Poll Booth: In the year since Snowden's revelations ...
Sponsored Resource: The Ten Commandments of BYOD
Apple: Many Users Bought Android 'By Mistake'
Apple CEO Tim Cook, during his keynote at the company's Worldwide Developer Conference, said that around 130 million customers bought their first Apple device in the last 12 months. He also noted that many of the new customers had switched from Android, adding that "They had bought an Android phone by mistake, and then had sought a better experience and a better life."
Sound Off>>
U.S. Tech Worker Groups Boycott IBM, Infosys, Manpower
Accusations of employment discrimination has prompted three Americans tech advocacy groups to launch a labor boycott of IBM, Infosys and Manpower. The groups say that the companies targeted in the boycott engaged in a pattern that discourages U.S. workers from applying for U.S. IT jobs by tailoring employment ads toward overseas workers.
Sound Off>>
Where's the Most Unusual Place You've Written a Program From?
Michael Raithel was polling the SAS crowd, but it'd be interesting to hear the answers to the programming questions he posed from a broader audience: 1. What is the most unusual location you have written a program from? 2. What is the most unusual circumstance under which you have written a program? 3. What is the most unusual computing platform that you wrote a program from? 4. What is the most unusual application program that you wrote?
Sound Off>>
Beware the Coming Nightmare of Unpatchable Systems
The end of support for Windows XP is just the tip of the iceberg when it comes to software and hardware that is unpatchable and unsupportable. Infoworld reports that "the trend toward systems and devices that, once deployed, stubbornly 'keep on ticking' regardless of the wishes of those who deploy them is fast becoming an IT security nightmare made real, affecting everything from mom-and-pop shops to power stations."
Sound Off>>
Do 4G World Phones Exist?
Viv Savage, who lives in the U.S. and has a daughter who will be attending college overseas next year, needs to buy a new phone for her and asked what Slashdot community members would recommend: "There doesn't appear to be a solution for getting high-speed data (i.e., 4G) here and abroad with one phone. Have any worldly Slashdotters figured this out?"
Sound Off>>
Basic programming principles what?
"I don't understand what the programmers of all these crypto libraries were thinking here. Even for the most basic and unimportant program, the rule is 'if the data comes from outside, verify!' This is vastly more important when cryptography is involved, so why is it that all these crypto libraries seem to blindly trust whatever the Internet is sending them?!" --by maugle
Read More>>
C++ Is the Winner in Google's Language Performance Tests
Three years ago, Google released a research paper that suggested C++ was the best-performing language on the market. But the researchers also noted that of the languages tested (C++, Java, Scala and Google's own programming language Go), C++ required the most extensive tuning efforts, "many of which were done at a level of sophistication that would not be available to the average programmer."
Read More>>
Open Source Laptop Made By and For Hackers
Bunnie Huang, author of the freely available book, "Hacking the Xbox: An Introduction to Reverse Engineering," talks about his latest long-term project-- an open source laptop computer that goes much farther than some other open-source hardware projects. He also discusses some of the design decisions that goes into making a computer that is by and for hackers.
Watch the Video>>
In the year since Snowden's revelations ...- I have changed my security practices not a bit
- I have mildly upgraded my security practices
- I've seriously upgraded my security practices
- I've radically upgraded my security practices
- I've gone plain-text only, just because.
- Snowden who?
Cast Your Vote>>
The Ten Commandments of BYOD
End users are bringing their personal devices into your company's network, with or without IT's permission. So, how will you support workforce desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? Find out rules on implementing an effective BYOD program in your organization.
Learn More>>
Follow Slashdot on Twitter and Facebook.
Tidak ada komentar:
Posting Komentar