Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:EPA MPG != CAGE MPG (Score 1) 136

I was curious, and looked it up on the Bureau of Labor and Statistics website. If I'm reading that right, Civilian Labor Force, Employed, Percent of Population peaked in 2000 at 64.4%, which is 5% higher than 2000 levels.

Looking at the wikipedia definitions (especially that third image), I think the interesting metric is the employment-to-population ratio (i.e. all employed people over all people, eligible to work or not). That default view does show a 5% drop since about mid-2008 that never recovered. It was previously around 60% in the early eighties (if you adjust the graph to start from the earliest available year, 1948).

Also interesting is part time workers as a percentage of all workers, which was a sharp (3%) increase in 2009 and slowly dropping off at 0.2% per year (eyeballing it).

Other interesting stuff can be found in this PDF of charts. For example, on page 17 it shows that most of the layoffs in 2008/2009 were permanent, not temporary.

Thanks for leading me to look at this stuff; it's rather interesting.

Comment Re:Can we see the actual notices? (Score 3, Informative) 116

For the DMCA takedowns, yes we can - they are at https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fgithub.com%2Fgithub%2Fdmca (it's in the second-to-last paragraph). I don't think they're allowed to for the NSLs. I didn't spot any listings for other forms of takedowns.

It appears that the massive majority (>5000, according to https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fgithub.com%2Fgithub%2Fdmca... ) is one project; judging by Google results of the repo name, it's some Chinese e-commerce site's source code. Not sure why people would be so interested in forking it that there's that many copies floating around...

Comment Re:Add-ons? (Score 1) 471

They have release channels that don't require the signed code.

That's the alpha version ("aurora"); the release version (and the beta) enforces signing, last I heard. They said something about having an unbranded version that doesn't require signing, but as far as I can tell from browsing around ftp.mozilla.org it doesn't actually exist.

They don't have anything that is actually expected to work for everyday browsing that doesn't enforce signing.

Comment Re:Ironicly, some older OSes are easy to "patch li (Score 1) 117

That sounds more like kexec, where the running kernel is replaced (which also means existing processes are all killed). This newfangled thing is for live patching, where everything (including userland) stays up.

The DOS part you are talking about works because it isn't doing multitasking; effectively, each app is the kernel as it runs. For later examples of this, any 386 or higher version of Windows (3.11 WFW, 95, ...) did basically the same thing.

Comment Re:Fuck Me (Score 2) 553

FWIW, that third-party comment is actually first-party (Lennart Poettering goes by mezcalero on LWN).

As for systemd... I rather like it as a process/services/cgroups manager. I just wish they didn't cram everything else into the same project; I feel (without their extensive implementation experience) that having separated components with stable interfaces between them leads to a better user experience since people can try newer versions of various bits and switch back while bugs get fixed. The important part here being the stable interfaces... and well, Linux userland people, beyond a few notable exceptions like glibc, don't seem to believe in that.

Comment Re:Go back in time 5 years (Score 1) 581

Systemd as an init system / process spawning thing is kinda nice, actually. (I'm using it on OpenSUSE; tried Arch very briefly. Used it on Debian/Jessie for a bit because gdm3 needed it to let me login.)

Part of the systemd hate is from things that probably shouldn't live in the same project. People would probably be okay with it as a separate resolverd or something, but... having that coupled to systemd is just strange. One of the strong points of systemd is the ability to start services from a variety of triggers (socket activation, etc.); why can't it be an external project (with the same authors) that gets triggered at the right times? udev, maybe... not sure.

Comment Re:False. (Score 2) 140

Is there a particular reason to block reading (search) instead of writing, given a highly suspect origin? That is, they can enable search and disable mail/plus/whatever, right?

I guess my question boils down to, what advantage does SEO pieces of shit get from searching Google? The only thing I can think of off the top of my head is to check if their SEOing was successful. That doesn't seem overly useful to me (but then, I've never tried to look at that).

Comment Re:They KNEW about this vulnerability? (Score 1) 202

There are two groups of developers here.

Ruby on Rails, the framework, had developers that knew about this general class of vulnerabilities - it's easy to write code that ends up being buggy.

GitHub, the web site (that runs on Rails, and hosts the Rails source repository), knew about the general class of vulnerabilities but not that they had these particular instances of them.

It appears that Homakov tried to get Rails to change the defaults so that these things can't happen unless you ask for them, and was rejected as making the framework more difficult for prototyping use; the opinion on the bug was something along the lines of "the developer using the framework should be protecting against this". He then demonstrated in frustration that this was a bad default, since GitHub is one of the leading sites using the framework and is developed by people generally thought of as knowing what they are doing.

It appears that this has worked and the opinion of the framework developers have changed, and no real damage was done, other than possibly reputation.

GitHub, overall, seemed to be collateral damage.

P.S. I don't think GitHub is open source; Ruby on Rails is.

Comment Re:Tethered jailbreak (Score 1) 121

Do you happen to know how the drive-by PDF exploit manages to keep root, then? I'm curious as I don't see how arbitrary code execution via a PDF vulnerability differs from arbitrary code execution via a cable - what sort of magic allows the former case to bypass the security checks that the latter can't duplicate?

Comment Re:From TFS (Score 1) 260

That particular comparison keeps getting reposted as the proof that Theora is feasible.

Theora may or may not be comparable in quality to H.264, but that comparison doesn't tell me either way. It completely ignores the H.264 encoding process, which means that Theora has the advantage of taking however long it needs to compress things. Lots of things involve a time/space (memory or disk) trade off, that needs to be taken into account too.

I don't particularly like the licensing issues around H.264 / MPEG*, but that doesn't mean I am willing to take an unfair comparison either.

Slashdot Top Deals

"The chain which can be yanked is not the eternal chain." -- G. Fitch

Working...