Contents may not display properly in a sub-frame. If no content is displayed please click here to proceed. ส่วนเนื้อหาอาจแสดงผลไม่สมบูรณ์ในเฟรมย่อย หากเนื้อหาไม่แสดงผลกรุณาคลิ๊กที่นี่เพื่อดำเนินการต่อ
An anonymous reader writes with news about the effort to unionize shuttle drivers in Silicon Valley. "Shuttle bus drivers for five prominent tech companies will decide whether to unionize on Friday in a vote that has the potential to dramatically expand organized labor"s territory in Silicon Valley and embolden others in the tech industry"s burgeoning class of service workers to demand better working conditions. Drivers who ferry Yahoo, Apple, Genentech, eBay and Zynga workers -- all employed by contractor Compass Transportation -- will decide whether to join the Teamsters union in an election overseen by the National Labor Relations Board. Union leaders say they want to bring the drivers into the fold so they can negotiate better pay and benefits -- as well as relief from a split shift that has the drivers working morning and evening shifts with no pay in between. A contract the Teamsters struck over the weekend for Facebook"s shuttle bus drivers, who work for Loop Transportation, offers a glimpse of what may be possible: paid sick and vacation time, full health care coverage and wages of up to $27.50 an hour."
snydeq writes Strong legislation that will weaken the ability of the trolls to shake down innovators is likely to pass Congress, but more should be done, writes InfoWorld"s Bill Snyder. "The Innovation Act isn"t an ideal fix for the program patent system. But provisions in the proposed law, like one that will make trolls pay legal costs if their claims are rejected, will remove a good deal of the risk that smaller companies face when they decide to resist a spurious lawsuit," Snyder writes. That said, "You"d have to be wildly optimistic to think that software patents will be abolished. Although the EFF"s proposals call for the idea to be studied, [EFF attorney Daniel] Nazer doesn"t expect it to happen; he instead advocates several reforms not contained in the Innovation Act."
Mark Wilson writes A few months ago Twitter was criticized for teaming up with suicide prevention charity Samaritans to automatically monitor for key words and phrases that could indicate that someone was struggling to cope with life. Despite the privacy concerns that surrounded Samaritans Radar, Facebook has decided that it is going to launch a similar program in a bid to prevent suicides. Working with mental health organizations including Forefront, Now Matters Now, the National Suicide Prevention Lifeline, and Save.org, Facebook aims to provide greater help and support for anyone considering suicide or self-harm.
An anonymous reader writes I have an old Compaq Contura Aero laptop from the nineties (20 Mhz, 12 Mb RAM, Windows 3.11, 16-bit, PCMCIA, COM, LPT, floppy) with 160 Mb drive that I would want to copy in full to a newer machine. The floppies are so unreliable — between Aero"s PCMCIA floppy drive and USB floppy disk drive — that it is a total nightmare to try and do it; it just doesn"t work. If that option is excluded, what else can I do? I have another old laptop with Windows XP (32-bit, PCMCIA, COM, LPT) that could be used; all other machines are too new and lack ports. Will be grateful for any ideas.
sciencehabit writes Last week, researchers expanded the size of the mouse brain by giving rodents a piece of human DNA. Now another team has topped that feat, pinpointing a human gene that not only grows the mouse brain but also gives it the distinctive folds found in primate brains. The work suggests that scientists are finally beginning to unravel some of the evolutionary steps that boosted the cognitive powers of our species. "This study represents a major milestone in our understanding of the developmental emergence of human uniqueness," says Victor Borrell Franco, a neurobiologist at the Institute of Neurosciences in Alicante, Spain, who was not involved with the work.
Nicola Hahn writes: "In the wake of the Snowden revelations strong encryption has been promoted by organizations like The Intercept and Freedom of the Press Foundation as a solution for safeguarding privacy against the encroachment of Big Brother. Even President Obama acknowledges that "there"s no scenario in which we don"t want really strong encryption." Yet the public record shows that over the years the NSA has honed its ability to steal encryption keys. Recent reports about the compromise of Gemalto"s network and sophisticated firmware manipulation programs by the Office of Tailored Access Operations underscore this reality. The inconvenient truth is that the current cyber self-defense formulas being presented are conspicuously incomplete. Security tools can and will fail. And when they do, what then? It"s called Operational Security (OPSEC), a topic that hasn"t received much coverage — but it should.
mpicpp sends an article from Fortune about the tiny industry springing up around food-related 3D printing. While such devices are still too expensive and too special-purpose for home kitchens, professionals in restaurants and large cafeterias are figuring out ways they can automate certain time-intensive tasks. For example, pasta: "If the user is making a recipe for ravioli, for instance, the [device] prints the bottom layer of dough, the filling and the top dough layer in subsequent steps. It reduces a lengthy recipe to two minutes construction time and ensures that no one has to clean a countertop caked with leftover dough and flour." The companies developing these 3D printers hope they"ll be this generation"s version of the microwave, gradually finding a use in almost every kitchen.
An anonymous reader writes: Microsoft has put up a post about explaining what they wanted to accomplish when they started working on Project Spartan, the new web browser that will ship with Windows 10. They say some things you wouldn"t expect to hear from Microsoft: "We needed a plan to make it easy for Web developers to build compatible sites regardless of which browser they develop first for. We needed a plan which ensured that our customers have a good experience regardless of whether they browse the head or tail of the Web. We needed a plan which gave enterprise customers a highly backward compatible browser regardless of how quickly we pushed forward with modern HTML5 features." They also explain how they decided against using WebKit so they wouldn"t contribute to "a monoculture on the Web."
An anonymous reader writes: This article has a look inside the #NoEstimates movement, which wants to rid the software world of time estimates for projects. Programmers argue that estimates are wrong too often and a waste of time. Other stakeholders believe they need those estimates to plan and to keep programmers accountable. Is there a middle ground? Quoting: "Software project estimates are too often wrong, and the more time we throw at making them, the more we steal from the real work of building software. Also: Managers have a habit of treating developers" back-of-the-envelope estimates as contractual deadlines, then freaking out when they"re missed. And wait, there"s more: Developers, terrified by that prospect, put more and more energy into obsessive trips down estimation rabbit-holes. Estimation becomes a form of "yak-shaving" — a ritual enacted to put off actual work."
sarahnaomi writes: Facebook this week released a major report on global internet access, as part of the company"s Internet.org campaign, which aims to bring cheap internet to new markets in partnership with seven mobile companies. Facebook says 1.39 billion people used its product in December 2014, and it"s natural for the company to try to corral the other four-fifths of the planet. But aside from ideals and growth markets, the report highlights a tension inherent to the question of access: When Facebook sets sail to disconnected markets, what version of the internet will it bring? In its report, Facebook advocates for closing the digital divide as quickly as we can, which is a good thing. But when Facebook argues that, "as use of the internet continues to expand, it will exert a powerful effect on the global economy, particularly in the developing world," it"s arguing that any increase in access is inherently good, which isn"t necessarily the case.
Nerval"s Lobster writes: The dreaded term "fragmentation" has been applied to Android more times than anyone can count over the past half-decade. That"s part of the reason why game developers often build for iOS before Android, even though Android offers a bigger potential customer base worldwide, and more types of gaming experiences. Fortunately, new sets of tools allow game developers to build for one platform and port their work (fairly) easily to another. "We"ve done simultaneously because it is such a simple case of swapping out the textures and also hooking up different APIs for scores and achievements," London-based indie developer Tom Vian told Dice. "I"ve heard that iOS is a better platform to launch on first, but there"s no sense for us in waiting when we can spend half a day and get it up and running." So is fragmentation an overhyped roadblock, or is it a genuine problem for developers who work in mobile?
muggs sends word that the U.S. Federal Communications Commission has voted 3-2 to approve an expansion of their ability to regulate ISPs by treating them as a public utility. Under the rules, it will be illegal for companies such as Verizon or Cox Communications to slow down streaming videos, games and other online content traveling over their networks. They also will be prohibited from establishing "fast lanes" that speed up access to Web sites that pay an extra fee. And in an unprecedented move, the FCC could apply the rules to wireless carriers such as T-Mobile and Sprint -- a nod to the rapid rise of smartphones and the mobile Internet. ... The FCC opted to regulate the industry with the most aggressive rules possible: Title II of the Communications Act, which was written to regulate phone companies. The rules waive a number of provisions in the act, including parts of the law that empower the FCC to set retail prices — something Internet providers feared above all. However, the rules gives the FCC a variety of new powers, including the ability to: enforce consumer privacy rules; extract money from Internet providers to help subsidize services for rural Americans, educators and the poor; and make sure services such as Google Fiber can build new broadband pipes more easily.
An anonymous reader writes: Bruce Schneier has written another insightful piece about the how modern tech companies treat security. He points out that most organizations will tell you to secure your data while at the same time asking to be exempt from that security. Google and Facebook want your data to be safe — on their servers so they can analyze it. The government wants you to encrypt your communications — as long as they have the keys. Schneier says, "... we give lots of companies access to our data because it makes our lives easier. ... The reason the Internet is a worldwide mass-market phenomenon is that all the technological details are hidden from view. Someone else is taking care of it. We want strong security, but we also want companies to have access to our computers, smart devices, and data. We want someone else to manage our computers and smart phones, organize our e-mail and photos, and help us move data between our various devices. ... We want our data to be secure, but we want someone to be able to recover it all when we forget our password. We"ll never solve these security problems as long as we"re our own worst enemy.
itwbennett writes: Earlier this month Reverend Dr. Christopher J. Benek raised eyebrows on the Internet by stating his belief that Christians should seek to convert Artificial Intelligences to Christianity if and when they become autonomous. Of course that"s assuming that robots are born atheists, not to mention that there"s still a vast difference between what it means to be autonomous and what it means to be human. On the other hand, suppose someone did endow a strong AI with emotion – encoded, say, as a strong preference for one type of experience over another, coupled with the option to subordinate reasoning to that preference upon occasion or according to pattern. what ramifications could that have for algorithmic decision making?