Slashdot

Ask Slashdot: Career Advice For an Aging Perl Developer?

New submitter ukrifleman writes: I've been doing UK based perl, JS, light PHP and JQUERY dev plus Centos/Debian sys admin on a freelance basis for over a decade now. Mostly maintaining older stuff but I also undertook a big, 3 year bespoke project (all written in legacy non OO perl). The trouble is, that contract has now finished and all the legacy work has dried out and I've only got about 2 months of income left! I need to get a full time job. To most dev firms I'm going to look like a bit of a dinosaur, 40 odd years old, knows little of OO coding OR modern languages and aproaches to projects. I can write other languages and, with a bit of practice I'll pick them up pretty quickly. I really don't know where to start. What's hot, what's worth learning, I'm self-taught so have no CS degree, just 15 years of dev and sys admin experience. I've got a bit of team and project management experience too it's quite a worry going up against young whipper snappers that know all the buzz words and modern tech! Am I better off trying to get a junior job to start so I can catch up with some tech? Would I be better off trawling the thousands of job sites or finding a bonafide IT specialist recruitment firm? Should I take the brutally honest approach to my CV/interviews or just wing it and hope I don't bite off more than I can chew? What kind of learning curve could I expect if I took on a new language I have no experience with? Are there any qualififcations that I NEED to have before firms would be willing to take me on? I've been sitting here at this desk for 10 years typing away and only now do I realise that I've stagnated to the point where I may well be obsolete!

Read more of this story at Slashdot.

GM's Exec. Chief Engineer For Electric Vehicles Pam Fletcher Answers Your Question

Pam Fletcher was propulsion system chief engineer on the first Chevrolet Volt plug-in hybrid and is now executive chief engineer for electrified vehicles at GM, overseeing electrified vehicles company-wide. A while ago you had a chance to ask about her work and the future of electric cars. Below you'll find her answers to your questions.

Read more of this story at Slashdot.

Stanford Researcher Finds Little To Love In Would-Be Hacker Marketplace

An anonymous reader writes: What if there were an Uber for hackers? Well, there is. It's called Hacker's List, and it made the front page of the New York Times this year. Anyone can post or bid on an 'ethical' hacking project. According to new Stanford research, however, the site is a wreck. 'Most requests are unsophisticated and unlawful, very few deals are actually struck, and most completed projects appear to be criminal.' And it gets worse. 'Many users on Hacker's List are trivially identifiable,' with an email address or Facebook account. The research dataset includes thousands of individuals soliciting federal crimes.

Read more of this story at Slashdot.

CareFirst Admits More Than a Million Customer Accounts Were Exposed In Security Breach

An anonymous reader writes with news, as reported by The Stack, that regional health insurer CareFirst BlueCross BlueShield, has confirmed a breach which took place last summer, and may have leaked personal details of as many as 1.1 million of the company's customers: "The Washington D.C.-based firm announced yesterday that the hack had taken place in June last year. CareFirst said that the breach had been a 'sophisticated cyberattack' and that those behind the crime had accessed and potentially stolen sensitive customer data including names, dates of birth, email addresses and ID numbers. All affected members will receive letters of apology, offering two years of free credit monitoring and identity threat protection as compensation, CareFirst said in a statement posted on its website." Free credit monitoring is pretty weak sauce for anyone who actually ends up faced with identity fraud.

Read more of this story at Slashdot.

Take Two Sues BBC Over Drama About GTA Development

An anonymous reader writes: Take Two Interactive, the parent company of Rockstar Games, is suing the BBC for trademark infringement over its planned "making of GTA" drama, Game Changers. The 90-minute movie was created without the involvement of the studio, which rarely comments on the GTA series' development outside of organised press events. (It is expected that it will draw upon the public conflict between Sam Houser and notorious anti-gaming crank Jack Thompson, via the expose "Jacked" by David Kushner.) After direct negotiations with the BBC failed, Take Two brought suit to "ensure that [their] trademarks are not misused." The details of the suit, Rockstar's objections, and the penalties sought, are not yet known.

Read more of this story at Slashdot.

Asus ZenFone 2 Performance Sneak Peek With Intel Z3580 Inside

MojoKid writes: Asus just finally made their ZenFone 2 available for sale in the US. It's an Intel-powered smartphone running Android Lollipop that's compatible with AT&T and T-Mobile, and other cellular networks that utilize GSM technology, like Straight Talk, MetroPCS, and Cricket Wireless among others.The device is packing a quad-core Intel Atom Z3580 (2.3GHz) with PowerVR G6430 graphics and 4GB of RAM, along with Intel 7262 and Intel 2230 modem tech, a 5.5" Full HD screen, a 13MP rear camera, dual-SIM support and 802.11ac Wi-Fi. The high-end model can be had for only $299, unlocked. A $199 version with 2GB of RAM and a slightly slower Intel Atom Z3560 is also available. In the benchmarks, the Zenfone 2 offers competent though middling performance but considering Asus has priced the ZenFone 2 so aggressively, it's sure to grab some attention at retail with consumers looking for a contract-free commitment.

Read more of this story at Slashdot.

In 1984, Jobs and Wozniak Talk About Apple's Earliest Days

harrymcc writes: In 1984, Apple launched the Apple IIc computer. As part of its promotion, it produced a video with Steve Jobs, Steve Wozniak, and other employees talking about company's founding and the creation of the Apple I and Apple II computers. Over at Fast Company, I've shared this remarkable, little-seen bit of history. It's full of goodies, from images of Jobs and Wozniak wearing remarkably Apple Watch-like timepieces to evocative photos of early computer stores.

Read more of this story at Slashdot.

Pre-Orders Start For Neo900 Open Source Phone

New submitter JoSch1337 writes: After a year and a half of development, the Neo900 project now opened its web shop for the down payments of binding pre-orders for either a full Neo900 phone or the bare circuit board to upgrade an existing Nokia N900. The up-front down payment is necessary to now secure expensive "risk parts" like the modem, 1GB RAM and N900 cases. Thus, without pre-ordering now, there might not be enough parts left after the first batch. The Neo900 is the spritual successor of the Nokia N900. The new circuit board can be placed into an existing N900 for better specs (faster CPU, more RAM, LTE modem) than the original device while still maintaining fremantle (maemo 5) backwards compatibility. Alternatively, a fully assembled phone can be purchased as well. The Neo900 will be fully operational without any binary blob running on the main CPU. While the modem still requires a non-free firmware, it is completely decoupled from the rest of the device (think of a LTE usb stick you put in your laptop) and can reliably be monitored or switched off by the operating system. You can follow the development of the project in the maemo forum, read about the specs of the device or consult the FAQ

Read more of this story at Slashdot.

US Proposes Tighter Export Rules For Computer Security Tools

itwbennett writes: The U.S. Commerce Department has proposed tighter export rules for computer security tools and could prohibit the export of penetration testing tools without a license. The proposal would modify rules added to the Wassenaar Arrangement in 2013 that limit the export of technologies related to intrusion and traffic inspection. The definition of intrusion software would also encompass 'proprietary research on the vulnerabilities and exploitation of computers and network-capable devices,' the proposal said.

Read more of this story at Slashdot.

Linux 4.0 Has a File-System Corruption Problem, RAID Users Warned

An anonymous reader writes: For the past few days kernel developers and Linux users have been investigating an EXT4 file-system corruption issue affecting the latest stable kernel series (Linux 4.0) and the current development code (Linux 4.1). It turns out that Linux users running the EXT4 file-system on a RAID0 configuration can easily destroy their file-system with this newest "stable" kernel. The cause and fix have materialized but it hasn't yet worked its way out into the mainline kernel, thus users should be warned before quickly upgrading to the new kernel on systems with EXT4 and RAID0.

Read more of this story at Slashdot.

The Reason For Java's Staying Power: It's Easy To Read

jfruh writes: Java made its public debut twenty years ago today, and despite a sometimes bumpy history that features its parent company being absorbed by Oracle, it's still widely used. Mark Reinhold, chief architect for the Oracle's Java platform group, offers one explanation for its continuing popularity: it's easy for humans to understand it at a glance. "It is pretty easy to read Java code and figure out what it means. There aren't a lot of obscure gotchas in the language ... Most of the cost of maintaining any body of code over time is in maintenance, not in initial creation."

Read more of this story at Slashdot.

Oldest Stone Tools Predate Previous Record Holder By 700,000 Years

derekmead writes: The oldest stone tools ever found have been discovered by scientists in Kenya who say they are 3.3m years old, making them by far the oldest such artifacts discovered. Predating the rise of humans' first ancestors in the Homo genus, the artifacts were found near Lake Turkana, Kenya. More than 100 primitive hammers, anvils and other stone tools have been found at the site. An in-depth analysis of the site, its contents, and its significance as a new benchmark in evolutionary history will be published in the May 21 issue of Nature.

Read more of this story at Slashdot.

Telstra Says Newly Acquired Pacnet Hacked, Customer Data Exposed

An anonymous reader writes: Telstra’s Asian-based data center and undersea cable operator Pacnet has been hacked exposing many of the telco’s customers to a massive security breach. The company said it could not determine whether personal details of customers had been stolen, but it acknowledged the possibility. The Stack reports: "Telstra said that an unauthorized third party had been able to gain access to the Pacnet business management systems through a malicious software installed via a vulnerability on an SQL server. The hack had taken place just weeks before Telstra acquired the Asian internet service provider for $550mn on 16 April this year. The telecom company confirmed that it had not been aware of the hack when it signed the deal in December 2014."

Read more of this story at Slashdot.

Secret Files Reveal UK Police Feared That Trekkies Could Turn On Society

An anonymous reader writes: Scotland Yard was worried that fans of shows like the X Files and Star Trek might run amok during the Millennium according to secret files. The file, called UFO New Religious Movements (NRMs) And The Millennium, reveals that anti-terrorism experts were also concerned about the brain-washing effect of Dark Skies, Roswell, Millennium and The Lawnmower Man on viewers. According to the Telegraph: "The secret briefing note was obtained from the Met under the Freedom of Information Act by Sheffield-based British X-Files expert Dr Dave Clarke while researching a new book, How UFOs Conquered the World. Dr Clarke, who teaches investigative journalism at Sheffield Hallam University, said: 'The documents show the police and security services were concerned about the export of some new religious movements concerning UFOs and aliens from the USA in the aftermath of the mass suicide by followers of the Heaven's Gate.'"

Read more of this story at Slashdot.

Rate These 53 Sub-$200 Hacker SBCs, Win 1 of 20

DeviceGuru writes: LinuxGizmos and Linux.com have just launched their annual 2-minute survey asking folks to rate their favorite hacker SBCs from a list of 53 single board computers that are priced below $200, supported by open documentation and Linux or Android OSes, and will ship before July. As usual, the survey's data will be made available publicly, but one big change this year is that participants can register for a random drawing that will give away 20 hacker SBCs, split equally among the BeagleBone Black, Imagination Creator CI20, Intel Edison Kit for Arduino, and Qualcomm DragonBoard 410c. (Emails submitted will only be used for selecting and notifying SBC drawing winners, say the sites.)

Read more of this story at Slashdot.

FBI: Social Media, Virtual Currency Fraud Becoming a Huge Problem

coondoggie writes: Criminals taking advantage of personal data found on social media and vulnerabilities of the digital currency system are two of the emerging Internet law-breaking trends identified by the FBI's Internet Crime Complaint Center (IC3) in its annual look at online crime. The IC3 said 12% of the complaints submitted in 2014 contained a social media trait. Complaints involving social media have quadrupled over the last five years. In most cases, victim’s personal information was exploited through compromised accounts or social engineering.

Read more of this story at Slashdot.

Simple Flaw Exposed Data On Millions of Charter Internet Customers

Daniel_Stuckey writes: A security flaw discovered in the website of Charter Communications, a cable and Internet provider active in 28 states, may have exposed the personal account details of millions of its customers. Security researcher Eric Taylor discovered the internet service provider's vulnerability as part of his research, and demonstrated how a simple header modification performed with a browser plug-in could reveal details of Charter subscriber accounts. After Fast Company notified Charter of the issue, the company said it had installed a fix within hours.

Read more of this story at Slashdot.

Hydrogen-Powered Drone Can Fly For 4 Hours at a Time

stowie writes: The Hycopter uses its frame to store energy in the form of hydrogen instead of air. With less lift power required, it's fuel cell turns the hydrogen in its frame into electricity to power its rotors. The drone can fly for four hours at a time and 2.5 hours when carrying a 2.2-pound payload. “By removing the design silos that typically separate the energy storage component from UAV frame development - we opened up a whole new category in the drone market, in-between battery and combustion engine systems,” says CEO Taras Wankewycz.

Read more of this story at Slashdot.

New Chrome Extension Uses Sound To Share URLs Between Devices

itwbennett writes: Google Tone is an experimental feature that could be used to easily and instantly share browser pages, search results, videos and other pages among devices, according to Google Research. "The initial prototype used an efficient audio transmission scheme that sounded terrible, so we played it beyond the range of human hearing," researcher Alex Kauffmann and software engineer Boris Smus wrote in a post on the Google Research blog.

Read more of this story at Slashdot.

Huawei's LiteOS Internet of Things Operating System Is a Minuscule 10KB

Mark Wilson writes: Chinese firm Huawei today announces its IoT OS at an event in Beijing. The company predicts that within a decade there will be 100 billion connected devices and it is keen for its ultra-lightweight operating system to be at the heart of the infrastructure. Based on Linux, LiteOS weighs in at a mere 10KB — smaller than a Word document — but manages to pack in support for zero configuration, auto-discovery, and auto-networking. The operating system will be open for developers to tinker with, and is destined for use in smart homes, wearables, and connected vehicles. LiteOS will run on Huawei's newly announced Agile Network 3.0 Architecture and the company hopes that by promoting a standard infrastructure, it will be able to push the development of internet and IoT applications

Read more of this story at Slashdot.

Pages