Push into the premium smartphone market is a 'life or death' battle for budget brand. From a report: In February, Xiaomi founder and chief executive Lei Jun threw down the gauntlet to Apple and Samsung, vowing to make his company China's top-selling premium brand in three years. "[It's] a war of life and death," Lei said in a post on Chinese social media site Weibo. Xiaomi, the world's second-largest smartphone vendor, is a master of reinvention, making everything from rice cookers to e-scooters. If all goes to plan, the company will roll out its electric vehicle in 2024, ahead of arch-rival Apple. But as Beijing's tech crackdown takes hold, Lei is facing the potential for greater regulation at a time companies around the world are suffering from a global chip shortage. As China works to bring Big Tech to heel, Xiaomi's Hong Kong-listed shares have fallen more than 50 per cent from a year ago to about HK$12 (US$1.50). Its growth momentum also hinges on whether it can fend off its domestic and international rivals, said analysts. [...] According to former and current employees and industry analysts, Xiaomi's biggest hurdle to realising its goals of overtaking Apple and Samsung is convincing consumers of its high-end pedigree. Xiaomi, launched in 2010, made a name for itself building a loyal community of "mi fen," Xiaomi fans who bought products for the specifications, such as more advanced processors, at a cheaper price. While it ranks third in overall sales in China, it only holds five per cent of the global premium market, in which phones are priced at more than $400. "It will be difficult to defeat Samsung and Apple," said a former executive. "It does not play to Xiaomi's strengths, it doesn't have the brand power Apple and Samsung have, and they are not good at selling to people who don't care about specs." The company's phones have evolved. Xiaomi's 12 series phones, released in March and costing $749 for the most basic version, are designed to compete with Apple's $799 iPhone 13. As part of the launch, Xiaomi has pledged to open 20,000 more stores on top of the 10,000 they already have in China, and has changed the branding on its 12 series so they are no longer known by the "Mi" prefix that was the calling card of their previous hardware. But former company executives said the phones needed more than a name change. Xiaomi's previous attempts to break free of its budget image have ended in disappointment.Read more of this story at Slashdot.
Arqit says its encryption system can't be broken by quantum computers, but former employees and people outside the company question the relevance of its technology. The Wall Street Journal: A U.K. cybersecurity startup rocketed to a multibillion-dollar valuation when it listed publicly last fall on the promise of making encryption technology that would protect the defense industry, corporations and consumers alike from the prying eyes of next-generation computer systems. Founder and Chief Executive David Williams told investors at the time that his company, Arqit Quantum had an "impressive backlog" of revenue and was ready "for hyperscale growth." But Arqit has given investors an overly optimistic view of its future revenue and the readiness and workability of its signature encryption system, according to former employees and other people familiar with the company, and documents viewed by The Wall Street Journal. While the company says it has a solution to a quantum-computing security challenge that U.S. intelligence last year said "could be devastating to national security systems and the nation," government cybersecurity experts in the U.S. and the U.K. have cast doubt on the utility of Arqit's system. Arqit's stock price reached its highest level to date of $38.06 on Nov. 30 and has since fallen, to $15.06 on April 14, amid a broad pullback of young tech stocks. When the company secured its Nasdaq listing last autumn, its revenue consisted of a handful of government grants and small research contracts, and its signature product was an early-stage prototype unable to encrypt anything in practical use, according to the people. The encryption technology the company hinges on -- a system to protect against next-generation quantum computers -- might never apply beyond niche uses, numerous people inside and outside the company warned, unless there were a major overhaul of internet protocols. Arqit disputed that its encryption system was only a prototype at the company's market debut. "This was a live production software release and not a demonstration or trial," said a company representative. "It was being used by enterprise customers on that day and subsequently for testing and integration purposes, because they need to build Arqit's software into their products."Read more of this story at Slashdot.
Catalonia's regional leader accused the Spanish government on Monday of spying on its citizens after a rights group said his phone and dozens more belonging to Catalan pro-independence figures had been infected with spyware used by sovereign states. From a report: The Citizen Lab digital rights group found more than 60 people linked to the Catalan separatist movement, including several members of the European Parliament, other politicians, lawyers and activists, had been targeted with "Pegasus" spyware made by Israel's NSO Group after a failed independence bid. NSO, which markets the software as a law-enforcement tool, said Citizen Lab and Amnesty International, which was not involved in this investigation but has published previous studies about Pegasus, had produced inaccurate and unsubstantiated reports to target the company.Read more of this story at Slashdot.
Decentralized finance project Beanstalk Farms suffered one of the largest-ever flash-loan exploits on Sunday, sending its price tumbling. From a report: The credit-focused, Ethereum-based stablecoin protocol suffered a total loss of around $182 million and the attacker got away with around $80 million of crypto tokens, according to blockchain security firm PeckShield, which had flagged the incident on Twitter. The project's native token BEAN fell about 75% from its $1 peg against the dollar, pricing from CoinGecko showed. The protocol's creators disclosed their identities on Beanstalk's Discord server, and said that they were not involved in the attack. "We are not aware of the identity of the individuals who were involved. Like all other investors in Beanstalk, we lost all of our deposited assets in the Silo, which was substantial," the founders wrote. It isn't yet clear whether investors who lost funds will be reimbursed -- or if so, how and to what extent. Unlike traditional lending, which requires a loan to be secured with a collateral or credit checks, DeFi smart contracts allow users to borrow huge sums of stablecoins in what are known as flash loans, without any form of security. Flash loans, where the entire process of borrowing and returning the loan happens in a single transaction on the blockchain, are fairly popular among arbitrage traders.Read more of this story at Slashdot.
An anonymous reader shares a report: When college instructor Angela Dancey wants to decipher whether her first-year English students comprehend what she's trying to get across in class, their facial expressions and body language don't reveal much. "Even in an in-person class, students can be difficult to read. Typically, undergraduates don't communicate much through their faces, especially a lack of understanding," said Dancey, a senior lecturer at the University of Illinois Chicago. Dancey uses tried-and-true methods such as asking students to identify their "muddiest point" -- a concept or idea she said students still struggle with -- following a lecture or discussion. "I ask them to write it down, share it and we address it as a class for everyone's benefit," she said. But Intel and Classroom Technologies, which sells virtual school software called Class, think there might be a better way. The companies have partnered to integrate an AI-based technology developed by Intel with Class, which runs on top of Zoom. Intel claims its system can detect whether students are bored, distracted or confused by assessing their facial expressions and how they're interacting with educational content. "We can give the teacher additional insights to allow them to better communicate," said Michael Chasen, co-founder and CEO of Classroom Technologies, who said teachers have had trouble engaging with students in virtual classroom environments throughout the pandemic. His company plans to test Intel's student engagement analytics technology, which captures images of students' faces with a computer camera and computer vision technology and combines it with contextual information about what a student is working on at that moment to assess a student's state of understanding. Intel hopes to transform the technology into a product it can distribute more broadly, said Sinem Aslan, a research scientist at Intel, who helped develop the technology. "We are trying to enable one-on-one tutoring at scale," said Aslan, adding that the system is intended to help teachers recognize when students need help and to inform how they might alter educational materials based on how students interact with the educational content. "High levels of boredom will lead [students to] completely zone out of educational content," said Aslan. But critics argue that it is not possible to accurately determine whether someone is feeling bored, confused, happy or sad based on their facial expressions or other external signals.Read more of this story at Slashdot.
During a 92-minute presentation Wednesday on the state of the free software movement, Richard Stallman spoke at length on a wide variety of topics, including the need for freedom-respecting package systems. But Stallman also shared his deepest thoughts on a topic dear to the hearts of Slashdot readers: privacy and currency: I won't order from online stores, because I can't pay them . For one thing, the payment services require running non-free JavaScript... [And] to pay remotely you've got to do it by credit card, and that's tracking people, and I want to resist tracking too.... This is a really serious problem for society, that you can't order things remotely anonymously. But GNU Taler is part of the path to fixing that. You'll be able to get a Taler token from your bank, or a whole bunch of Taler tokens, and then you'll be able to use those to pay anonymously. Then if the store can send the thing you bought to a delivery box in your neighborhood, the store doesn't ever have to know who you are. But there's another issue Stallman touched on earlier in his talk: There is a proposed U.S. law called KOSA which would require mandatory age-verification of users -- which means mandatory identification of users, which is likely to mean via face recognition. And it would be in every commercial software application or electronic service that connects to the internet.... [It's] supposedly for protecting children. That's one of the favorite excuses for surveillance and repression: to protect the children. Whether it would actually protect anyone is dubious, but they hope that won't actually be checked.... You can always propose a completely useless method that will repress everyone.... So instead, Stallman suggests that age verification could be handled by.... GNU Taler: Suppose there's some sort of service which charges money, or even a tiny amount of money, and is only for people over 16, or people over 18 or whatever it is. Well, you could get from your bank a Taler token that says the person using this token is over 16. This bank has verified that.... So then the site only needs to insist on a 16-or-over Taler token, and your age is verified, but the site has no idea who you are. Unfortunately that won't help if user-identifying age-tracking systems are legislated now. The code of Taler works, but it's still being integrated with a bank so that people could actually start to use it with real businesses. Read on for Slashdot's report on Stallman's remarks on cryptocurrencies and encryption, or jump ahead to... Can GNU Taler accounts be frozen? Why cryptocurrency shouldn't replace banking The problem with VPN apps - and how interoperable encryption could protect your freedomRead more of this story at Slashdot.
What happened when college admissions offices started ignoring the standardized test scores? NBC News asked college administrators like Jon Burdick, Cornell's vice provost for enrollment:When the health crisis closed testing sites in 2020, four of Cornell's undergraduate colleges decided to go test optional, meaning students could submit a test score if they thought it would help them, but didn't have to. Three of Cornell's colleges adopted test-blind policies, meaning admissions officers wouldn't look at any student's scores. The effects were immediate, Burdick said. Like many other colleges and universities, Cornell was inundated with applications — roughly 71,000 compared to 50,000 in a typical year. And the new applications — particularly those that arrived without test scores attached — were far more likely to come from "students that have felt historically excluded," Burdick said. The university had always looked at many factors in making admissions decisions, and low test scores were never singularly disqualifying, Burdick said. But it became clear that students had been self-rejecting, deciding not to apply to places like Cornell because they thought their lower SAT scores meant they couldn't get in, he said. Other colleges also saw a similar surge in applications.... At Cornell, managing the surge in applications wasn't easy, Burdick said. The university hired several admissions officers and about a dozen part-time application readers — paid for in part by the additional application fees.... In the end, Cornell enrolled a more diverse class, including a nearly 50 percent increase in the share of first-generation college students. "It showed me that these students, given the opportunity, can show really impressive competitive credentials and get admitted with the test barrier reduced or eliminated," Burdick said. Research on colleges that went test optional years ago shows that students admitted without test scores come from more diverse backgrounds and do about as well in their classes once they arrive as peers who did submit test scores.Read more of this story at Slashdot.
"Astronomers have discovered a dusty, red object 13 billion light-years from Earth that may be the earliest known ancestor of a supermassive black hole," reports Live Science:The ancient object shows characteristics that fall between dusty, star-forming galaxies and brightly glowing black holes known as quasars, according to the authors of a new study, published April 13 in the journal Nature. Born just 750 million years after the Big Bang, during an epoch called the "cosmic dawn," the object appears to be the first direct evidence of an early galaxy weaving stardust into the foundations of a supermassive black hole. Objects like these, known as transitioning red quasars, have been theorized to exist in the early universe, but they have never been observed — until now.... Prior research has shown that quasars existed within the first 700 million years of the universe, the study authors wrote; however, it's unclear exactly how these supermassive objects formed so quickly after the Big Bang. Simulations suggest that some sort of fast-growing transition phase occurs in dusty, star-dense galaxies. "Theorists have predicted that these black holes undergo an early phase of rapid growth: a dust-reddened compact object emerges from a heavily dust-obscured starburst galaxy," study co-author Gabriel Brammer, an associate professor at the Niels Bohr Institute, said in the statement. In their new paper, the researchers claim to have detected one of these rare transitional objects — officially named GNz7q — while studying an ancient, star-forming galaxy with the Hubble Space Telescope. The team caught the early galaxy in the midst of a stellar baby boom, with the galaxy seemingly churning out new stars 1,600 times faster than the Milky Way does today. All those newborn stars produced an immense amount of heat, which warmed the galaxy's ambient gas and caused it to glow brightly in infrared wavelengths. The galaxy became so hot, in fact, that its dust shines brighter than any other known object from the cosmic dawn period, the researchers said. Amid that brightly glowing dust, the researchers detected a single red point of light — a large, compact object tinged by the enormous fog of dust around it. According to the researchers, this red dot's luminosity and color perfectly match the predicted characteristics of a transitioning red quasar.... [T]here are likely many, many others like it just waiting to be discovered by telescopes that can peer even further back, into the earliest eras of the universe. NASA's James Webb Space Telescope, which launched on Dec. 25, 2021, will be able to hunt for these elusive objects with much greater clarity than Hubble, the researchers wrote, hopefully shedding a bit more light onto the dusty cosmic dawn.Read more of this story at Slashdot.
"Russian software developers are reporting that their GitHub accounts are being suspended without warning if they work for or previously worked for companies under U.S. sanctions, writes Bleeping Computer:According to Russian media outlets, the ban wave began on April 13 and didn't discriminate between companies and individuals. For example, the GitHub accounts of Sberbank Technology, Sberbank AI Lab, and the Alfa Bank Laboratory had their code repositories initially disabled and are now removed from the platform.... Personal accounts suspended on GitHub have their content wiped while all repositories become immediately out of reach, and the same applies to issues and pull requests. Habr.com [a Russian collaborative blog about IT] reports that some Russian developers contacted GitHub about the suspension and received an email titled 'GitHub and Trade Controls' that explained their account was disabled due to US sanctions. This email contains a link to a GitHub page explaining the company's policies regarding sanctions and trade controls, which explains how a user can appeal their suspension. This appeal form requires the individual to certify that they do not use their GitHub account on behalf of a sanctioned entity. A developer posted to Twitter saying that he could remove the suspension after filling out the form and that it was due to his previous employer being sanctioned. A GitHub blog post in March had promised to ensure the availability of open source services "to all, including developers in Russia." So Bleeping Computer contacted a GitHub spokesperson, who explained this weekend that while GitHub may be required to restrict some users to comply with U.S. laws, "We examine government sanctions thoroughly to be certain that users and customers are not impacted beyond what is required by law."According to this, the suspended private accounts are either affiliated, collaborating, or working with/for sanctioned entities. However, even those who previously worked for a sanctioned company appear to be suspended by mistake. This means that Russian users, in general, can suddenly find their projects wiped and accounts suspended, even if those projects have nothing to do with the sanctioned entities.Read more of this story at Slashdot.
A writer for The Drive reports that "Recently, I noticed a part that I made for my Honda Accord was removed from Printables, the newly rebranded 3D printing repository offered by Prusa. "There seemed to be no rhyme or reason for it, but I didn't think anything else about it...until reports of a mass deletion started popping up on Reddit."All models referencing the word "Honda" posted prior to March 30, 2022, were seemingly removed from Printables without warning. These included speaker brackets, key housings, hood latches, shifter bushings, washer fluid caps, roof latch handles, and my trunk lid handle — a part not offered on 10th generation Accords sold in the U.S. at all. In fact, many of the removed parts had no Honda branding but were just compatible with Honda vehicles. As it turns out, Prusa says it was issued a takedown notice from Honda and removed all 3D models that referenced the brand. "I can confirm to you that we have received a letter from a lawyer representing Honda, informing us that we were required to remove any model which used 'Honda' in the listing, the model itself, or one of several trademarks/logos also associated with Honda," a Prusa spokesperson told The Drive in an email. "This will also be related to the naming of the files it self (sic), as for Honda this would be considered as a violation of their trademark/patents." A Prusa employee responded to a post on the company's forums, noting that Honda sent a "huge legal document" that covered every model that the company wished to have deleted. The document reportedly included items that did not have Honda logos, but also specific items with certain shapes and dimensions — like a washer fluid reservoir cap, for example. A response from another employee was posted suggesting other sites that host 3D models were also sent a similar takedown notice.Read more of this story at Slashdot.
CNN reports on "an ironic effect" of efforts to remove books from libraries in America. "The more certain books are singled out, the more people want to read them." And for some U.S. teenagers, "banned book clubs, recent book banning attempts have been a springboard for wider discussions around censorship."The Banned Book Club at Firefly Bookstore [started by 8th grader Joslyn Diffenbaugh] read George Orwell's "Animal Farm" as its first pick. While the satirical novella, which makes a pointed critique of totalitarianism, isn't one of the books currently being challenged in the US, it was banned in the Soviet Union until its fall and was rejected for publication in the UK during its wartime alliance with the USSR. And it faced challenges in Florida in the '80s for being "pro-communist." That history made for some thought-provoking conversations. "It taught a lot because it had references to different forms of government that maybe some adults didn't like their kids reading about, even though it was run by pigs," Diffenbaugh said. "I really thought it shouldn't have been banned for those reasons, or at all." Teenagers at the Common Ground Teen Center in Washington, Pennsylvania, formed a banned book club soon after a Tennessee school district voted to remove "Maus" from an eighth grade curriculum. But while the graphic novel about the Holocaust was the catalyst for the club, says director Mary Jo Podgurski, the first title they chose to read was, fittingly, "Fahrenheit 451" — the 1953 dystopian novel about government censorship that itself has been challenged over the years. "Obviously this whole idea of taking away books that they wanted to read or that they thought they should read sparked a nerve in them," said Podgurski, an educator and counselor who oversees the Common Ground Teen Center.... Since reading "Fahrenheit 451," the club has also discussed "Animal Farm" and "1984," which has been challenged for its political themes and sexual content. So far, the young readers at the Common Ground Teen Center have been puzzled as to why those books were once deemed inappropriate. "I often wonder, do adults understand what kids have in their phones?" Podgurski said. "They have access to everything. Saying 'don't read this book' shows that you're not understanding teen culture. Young people have access to much information. What they need is an adult to help them process it."Read more of this story at Slashdot.
"What can scientists learn by teaching two monkeys to play Pac-Man?" asks the South China Morning Post. "Quite a lot it seems, according to researchers at the Chinese Academy of Sciences."A team of neuroscientists from the academy said they used the classic video game to look at the way the primates made decisions. The result was the first study of its kind to show that monkeys were capable of formulating strategies to simplify a sophisticated task, they said. "To our knowledge, this is the first quantitative study that shows animals develop and use strategies for problem solving," Yang Tianming, corresponding author of the study, said on Twitter. The results were published in the peer-reviewed scientific journal eLife last month. The scientists used artificial intelligence to come up with a statistical model to find out whether the monkey's behaviour could be broken down into a set of strategies.... The monkeys were then trained to use a joystick to manoeuvre Pac-Man around a maze to collect snack pellets and avoid ghosts. The monkeys received fruit juice as a reward instead of earning points. Yang and his colleagues found the monkeys understood the basic elements of the game because they tended to choose the direction with the largest local reward and knew how to react to ghosts in different modes.... More importantly, the researchers found that the monkeys adopted a hierarchical solution for the Pac-Man game by using one dominant strategy and only focusing on a subset of game aspects at a time. The researchers said the study was significant because it was quantitative and examined complex tasks.... The study said the findings paved the way for further understanding of the neural mechanisms underlying sophisticated cognitive functions. Plus, teaching monkeys to play Pac-Man sounds like fun. Though I wonder how they feel about Donkey Kong....Read more of this story at Slashdot.
"In the dusty California desert, U.S. Army trainers are already using lessons learned from Russia's war against Ukraine as they prepare soldiers for future fights against a major adversary such as Russia or China," reports the Associated Press. And their training scenarios include more than just a enemy willing to destroy a city with missiles and rockets. "The enemy force that controls the fictional town of Ujen is using a steady stream of social media posts to make false accusations against the American brigade preparing to attack." "I think right now the whole Army is really looking at what's happening in Ukraine and trying to learn lessons," said Army Secretary Christine Wormuth. Those lessons, she said, range from Russia's equipment and logistics troubles to communications and use of the internet. "The Russia-Ukraine experience is a very powerful illustration for our Army of how important the information domain is going to be," said Wormuth, who spent two days at the training center in the Mojave Desert watching an Army brigade wage war against the fictional "Denovian" forces. "We've been talking about that for about five years. But really seeing it and seeing the way Zelenskyy has been incredibly powerful.... This is a world war that the actual world can see and watch in real time.... " Army Col. Ian Palmer said the exercise is using more drones by the friendly and enemy forces, both for surveillance and attacks. So his forces are trying to use camouflage and tuck into the terrain to stay out of sight. "You know if you can be seen, you can be shot, where ever you are," he said. Down in the makeshift town, the opposition forces are confident they can hold off Palmer's brigade despite the size difference. The Denovians only have about 1,350 forces, but they are throwing everything they have at the brigade, from jamming and other electronic warfare to insurgency attacks and propaganda. The role-players have their phones ready to film and post quickly to social media. The Denovian forces want to portray the unit in the worst possible light, said Taylor, and constantly twist the narrative on social media so Palmer's troops realize they are in a battle for the truth. That's a challenge, he said, because "when I've got a bunch of casualties and I'm getting overrun on my left flank and my supply trains aren't where they need to be and I can't find the bulldozers, it's hard to think about something that someone said about me on Twitter."Read more of this story at Slashdot.
"It was one of the most eagerly awaited scientific announcements of all time, and it pitted the world of faith against the world of rational thought, under the glare of the media," remembers the Guardian.So when cutting-edge carbon-14 tests found that the Shroud of Turin was a forgery, it seemed like the final chapter for a relic that had been revered for centuries as the cloth in which Christ's body had been wrapped when he supposedly rose from the dead at the first Easter almost 2,000 years ago. But one man — David Rolfe, a film-maker whose documentary The Silent Witness had brought the shroud into the public eye in modern times, and who had converted to Christianity as a result of his research — wasn't prepared to give up on it. He was convinced the carbon dating, carried out in 1988 under the direction of the British Museum and Oxford University, had been flawed. And now he claims he has the evidence to prove it. This week sees the release of a new film, Who Can He Be?, in which Rolfe argues that, far from the shroud being a definite dud, new discoveries in the past few years have again opened the question of its authenticity. So convinced is Rolfe that he's issuing a challenge worth $1m to the British Museum. "If ... they believe the shroud is a medieval forgery, I call on them to repeat the exercise, and create something similar today," he says.... The sample used for the tests, Rolfe argues in his new film, was too small and taken from a corner where the shroud was likely to have been repaired over the centuries.... When it comes to the carbon dating, he's certainly not alone in his scepticism. Barrie M Schwortz, a photographer who documented the shroud in 1978, says "murky" would be a good word to describe the events of 1988. "Today there are at least six peer-reviewed scientific articles that challenge the results of the carbon dating," he says. In his view, the players involved were in a hurry to get the job done, because they wanted to get carbon dating on the map. "Those tests made it a household name, and today it's used widely in archaeology," he says.... The British Museum is less willing to get involved this time around. "Any current questions about the shroud would be best put to those who currently care for it in the royal chapel of the cathedral of Turin," a spokesperson said.Read more of this story at Slashdot.
"After three attempts to complete a critical fueling test of the Space Launch System rocket, NASA has decided to take a break," reports Ars Technica:On Saturday night the space agency announced plans to roll the large SLS rocket from the launch pad at Kennedy Space Center to the Vehicle Assembly Building in the coming days. This marks a notable step back for the program, which has tried since April 1 to complete a "wet dress rehearsal" test, during which the rocket is fueled and brought to within 10 seconds of launch. The decision comes after three tries during the last two weeks. Each fueling attempt was scuttled by one or more technical issues with the rocket, its mobile launch tower, or ground systems that supply propellants and gases. During the most recent attempt, on Thursday April 14, NASA succeeded in loading 49 percent of the core-stage liquid oxygen fuel tank and 5 percent of the liquid hydrogen tank. [NASA reports that the team ended the test after "observing a liquid hydrogen leak on the tail service mast umbilical."] While this represents progress, it did not include the most dynamic portion of the test, during which the rocket is fully fueled and pressurized; and it, the ground systems, and computer systems are put into a terminal countdown when every variable is closely monitored. NASA had hoped to complete this wet dress rehearsal test to work out the kinks in the complicated launch system so that, when the rocket is rolled out later this year for its actual launch, the countdown will proceed fairly smoothly. NASA said that its contractors, as well as its agency's, will use the next several weeks to address problems that cropped up during the fueling tests when the SLS rocket returns to the large Vehicle Assembly Building. For example, gaseous nitrogen system supplier Air Liquide will upgrade its capabilities. NASA will also replace a faulty check valve on the upper stage of the rocket, as well as fix a leak on the mobile launch tower's "tail service mast umbilical," a 10-meter-tall structure that provides propellant and electricity lines to the rocket on the pad.... Still, NASA seems confident that it will get through this painful teething process for the SLS rocket: a program that is now 11 years old and in which NASA has invested more than $30 billion in the rocket and ground systems now being tested. "There's no doubt in my mind that we will finish this test campaign, and we will listen to the hardware, and the data will lead us to the next step," Blackwell-Thompson said Friday. "And we will take the appropriate steps, and we will launch this vehicle. I don't know exactly what that date is, but there's no doubt in my mind that we'll finish the test campaign, and we will be ready to go fly."Read more of this story at Slashdot.
An anonymous reader quotes Reuters: Activision Blizzard is cooperating with federal investigations into trading by friends of its chief executive shortly before the gaming company disclosed its sale to Microsoft Corp, it said in a securities filing on Friday. It received requests for information from the U.S. Securities and Exchange Commission and received a subpoena from a Department of Justice grand jury, the maker of "Call of Duty" said in an amended proxy filing. The requests "appear to relate to their respective investigations into trading by third parties – including persons known to Activision Blizzard's CEO – in securities prior to the announcement of the proposed transaction," it said.Read more of this story at Slashdot.
Last week 69-year-old Richard Stallman gave a 92-minute presentation on the state of the free software movement. Stallman covered numerous topics, but also added as an aside at one point: Ubuntu of course is a non-free distro, and I wouldn't recommend that anyone use it. Some important packages are now distributed only through their non-freedom-respecting package system, and not as Debian packages. So it's even harder than before to get any freedom out of an Ubuntu installation. But Stallman also sees a larger issue: Another area where we have problems is there are several languages which come with a package library -- basically people post packages in them. And that might be fine if they had a good criterion for the licensing of the libraries people upload into those sites -- but they're not developed by free software activists, and they don't have such a criterion. There are non-free packages in those libraries too. Now, some of them make it possible to find out whether a library is free. Some of them, it's difficult. Sometimes -- yeah, you could probably look at the source code and see what licenses are in it, and then you could look up those licenses in GNU.org/licenses/license-list.html and see if all those licenses are free... The problem is, they don't help you. At the very least they should make it easy to say, "Show me only the free packages." And then, "Show me only the GPL-compatible packages, because I'm writing a GPL-covered program, and I can't use the libraries that are not GPL compatible. And I certainly won't ever think of using a non-free library." They're not interested in helping people move forward in freedom. And so we need people to write front-ends for those package archives, which will show only the freely-licensed packages, and which can be asked to show which ones are GPL-compatible, or show only those. This way they will be usable easily by the free software community. If you like one of the languages that has this problem, please show your appreciation for that language by reconciling its use with maintaining freedom. And this leads Stallman to a related setback for the free software movement: the containers themselves that are packaging some programs with the libraries they need: The old way of doing this was you would make sure that your program said which versions of libraries it was compiled to work with, and in the source code you'd use something like Autoconf so that it could work with the various library versions. And this way you could build the program for a wide variety of free operating systems and versions of them. Well, that's some work, so some developers, they release a free program -- not all of them release free programs, but some of them do release free programs -- using containers. And the container has one set of libraries in it. And how do you really know what's in there? It's not straightforward to verify that all the libraries in the container are free, and a lot of people won't realize that they should even think about it. So the use of containers, as they are implemented nowadays by people who are not free software activists and are not particularly concerned with this question, is an obstacle to verifying that you're installing free software. Well, maybe some of these container systems could be improved, or maybe another one could be designed to solve these problems. If a container packaging system were designed by people who care about freedom, they might find good ways to satisfy this goal, as well as others. So it's something you could possibly work on.Read more of this story at Slashdot.
A headline at Hot Hardware calls it "a sexy Linux laptop with deep learning chops... being pitched as the world's most powerful laptop for machine learning workloads." And here's how Ars Technica describes the Razer x Lambda Tensorbook (announced Tuesday):Made in collaboration with Lambda, the Linux-based clamshell focuses on deep-learning development. Lambda, which has been around since 2012, is a deep-learning infrastructure provider used by the US Department of Defense and "97 percent of the top research universities in the US," according to the company's announcement. Lambda's offerings include GPU clusters, servers, workstations, and cloud instances that train neural networks for various use cases, including self-driving cars, cancer detection, and drug discovery. Dubbed "The Deep Learning Laptop," the Tensorbook has an Nvidia RTX 3080 Max-Q (16GB) and targets machine-learning engineers, especially those who lack a laptop with a discrete GPU and thus have to share a remote machine's resources, which negatively affects development.... "When you're stuck SSHing into a remote server, you don't have any of your local data or code and even have a hard time demoing your model to colleagues," Lambda co-founder and CEO Stephen Balaban said in a statement, noting that the laptop comes with PyTorch and TensorFlow for quickly training and demoing models from a local GUI interface without SSH. Lambda isn't a laptop maker, so it recruited Razer to build the machine.... While there are more powerful laptops available, the Tensorbook stands out because of its software package and Ubuntu Linux 20.04 LTS. The Verge writes:While Razer currently offers faster CPU, GPU and screens in today's Blade lineup, it's not necessarily a bad deal if you love the design, considering how pricey Razer's laptops can be. But we've generally found that Razer's thin machines run quite hot in our reviews, and the Blade in question was no exception even with a quarter of the memory and a less powerful RTX 3060 GPU. Lambda's FAQ page does not address heat as of today. Lambda is clearly aiming this one at prospective MacBook Pro buyers, and I don't just say that because of the silver tones. The primary hardware comparison the company touts is a 4x speedup over Apple's M1 Max in a 16-inch MacBook Pro when running TensorFlow. Specifically, Lambda's web site claims the new laptop "delivers model training performance up to 4x faster than Apple's M1 Max, and up to 10x faster than Google Colab instances." And it credits this to the laptop's use of NVIDIA's GeForce RTX 3080 Max-Q 16GB GPU, adding that NVIDIA GPUs "are the industry standard for parallel processing, ensuring leading performance and compatibility with all machine learning frameworks and tools." "It looks like a fine package and machine, but pricing starts at $3,499," notes Hot Hardware, adding "There's a $500 up-charge to have it configured to dual-boot Windows 10." The Verge speculates on what this might portend for the future. "Perhaps the recently renewed interest in Linux gaming, driven by the Steam Deck, will push Razer to consider Linux for its own core products as well."Read more of this story at Slashdot.
Long-time Slashdot reader wired_parrot writes:After the Ukrainian army captured one of Russia's Orlan-10 unmanned aerial vehicles, they decided to do a teardown of it. Their findings show a remarkable amount of jerry-rigged installations using off the shelf components, including the use of a Canon DSLR camera as the main image capturing sensor. Petapixel notes it's a camera first launched in 2015 "with a retail price of $750 but which is currently worth about $300 to $400 on the used market... The camera is mounted to a board with a hook-and-loop fastener strip (commonly referred to as Velcro)." The Ukranian Ministry of Defense posted a video showing one of one of its soldiers exploring the alleged Russian drone, and Petapixel shares more details and some screen grabs:The soldier notes how surprisingly low-tech the military drone is — observers quickly pointed out that certain aspects of it are more reminiscent of a hobbyist RC airplane project than a high-tech piece of military spying technology.... On the top of the drone, the fuel tank's cap suggests that it may have been made from some kind of plastic water bottle. Various parts of the drone are also fixed together with some kind of duct tape.Read more of this story at Slashdot.
"A new survey claims Windows 11 adoption is so low it's actually less popular than the 20-year-old Windows XP," reports PC Magazine:The survey comes from an IT management provider called Lansweeper. Through its own software products, the company scanned 10 million Windows devices this month to determine which OS they were using. The results found that only 1.44% of the devices had Windows 11 installed, which is lower than the 1.71% for Windows XP. In contrast, Windows 10 maintains a dominant share at 80.34%. Although Windows 11's adoption is low at 1.44%, the number actually went up almost three times from 0.52% back in January. It's also important to note that other surveys have found much higher Windows 11 adoption numbers. Last month, the app advertising platform AdDuplex found Windows 11 usage was at 19.4%, although this represented a mere 0.1% growth from the previous month. Meanwhile, the Steam hardware survey from Valve estimates Windows 11 usage has reached 16.8%.Read more of this story at Slashdot.
"The U.S. Space Command announced this week that it determined a 2014 meteor hit that hit Earth was from outside the solar system," reports CBS News. "The meteor streaked across the sky off the coast of Manus Island, Papua New Guinea three years earlier than what was believed to be the first confirmed interstellar object detected entering our solar system." After Oumuamua was spotted in 2017, the interstellar comet Borisov appeared in 2019 — discovered in Crimea, Ukraine at a "personal observatory" built by amateur astronomer Gennadiy Borisov" But CBS notes that despite their theory about a first interstellar meteor in 2014, the two Harvard astronomers — Dr. Amir Siraj and Dr. Abraham Loeb — "had trouble getting their paper published, because they used classified information from the government." Specifically, data from a classified U.S. government satellite designed to detect foreign missiles...The meteor was unusual because of its very high speed and unusual direction — which suggested it came from interstellar space.... Any space object traveling more than about 42 kilometers per second may come from interstellar space. The data showed the 2014 Manus Island fireball hit the Earth's atmosphere at about 45 kilometers per second, which was "very promising" in identifying it as interstellar, Siraj said.... After more research and help from other scientists, including classified information from the government about the accuracy or level of precision of the data, Siraj and Loeb determined with 99.999% certainty the object was interstellar. But their paper on the finding was being turned down, because the pair only had a private conversation with an anonymous U.S. government employee to confirm the accuracy of the data. "We had thought this was a lost cause," Dr. Siraj told the New York Times — which couldn't resist adding that "it turned out, the truth was out there."Last month, the U.S. Space Command released a memo to NASA scientists that stated the data from the missile warning satellites' sensors "was sufficiently accurate to indicate an interstellar trajectory" for the meteor. The publication of the memo was the culmination of a three-year effort by Siraj and a well-known Harvard astronomer, Avi Loeb. Many scientists, including those at NASA, say that the military still has not released enough data to confirm the interstellar origins of the space rock, and a spokesperson said Space Command would defer to other authorities on the question. But it wasn't the only information about meteors to be released. The military also handed NASA decades of secret military data on the brightness of hundreds of other fireballs, or bolides. "It's an unusual degree of visibility of a set of data coming from that world," said Matt Daniels, assistant director for space security at the White House's Office of Science and Technology Policy, who worked on the data release. "We're in this renewed period of excitement and activity in space programs generally, and in the midst of that, I think thoughtful leaders in multiple places said, 'you know, now is a good time to do this.'" The Times notes that data from classified military satellites "could also aid NASA in its federally assigned role as defender of planet Earth from killer asteroids. And that is the goal of a new agreement with the U.S. Space Force that aims to help NASA's Planetary Defense Coordination Office better understand what happens when space rocks reach the atmosphere."Sharing sensitive military satellite data with astronomers has led to significant scientific discoveries in the past. A group of satellites deployed in the 1960s by the United States to detect covert detonations of nuclear weapons on Earth accidentally became the key instruments used to make the first detection of extraterrestrial gamma ray bursts. The bursts showed up on the satellites, code-named Vela, as single bursts of energy, confusing analysts at Los Alamos who later declassified the data in a 1973 paper that spurred academic debate about the bursts' origins.... A core reason for Space Force's increasing ties with NASA has centered on the agency's congressional mandate to detect nearly all asteroids that could threaten the Earth. When NASA signed an agreement in 2020 to strengthen ties with Space Force, the agency acknowledged it had fallen behind in its asteroid-tracking efforts and would need Pentagon resources to carry out its planetary defense mission.Read more of this story at Slashdot.
GitHub issued a security alert Friday. GitHub's chief security officer wrote that on Tuesday, "GitHub Security began an investigation that uncovered evidence that an attacker abused stolen OAuth user tokens issued to two third-party OAuth integrators, Heroku and Travis-CI, to download data from dozens of organizations, including npm..." We do not believe the attacker obtained these tokens via a compromise of GitHub or its systems, because the tokens in question are not stored by GitHub in their original, usable formats. Following immediate investigation, we disclosed our findings to Heroku and Travis-CI on April 13 and 14... Looking across the entire GitHub platform, we have high confidence that compromised OAuth user tokens from Heroku and Travis-CI-maintained OAuth applications were stolen and abused to download private repositories belonging to dozens of victim organizations that were using these apps. Our analysis of other behavior by the threat actor suggests that the actors may be mining the downloaded private repository contents, to which the stolen OAuth token had access, for secrets that could be used to pivot into other infrastructure. We are sharing this today as we believe the attacks may be ongoing and action is required for customers to protect themselves. The initial detection related to this campaign occurred on April 12 when GitHub Security identified unauthorized access to our npm production infrastructure using a compromised AWS API key. Based on subsequent analysis, we believe this API key was obtained by the attacker when they downloaded a set of private npm repositories using a stolen OAuth token from one of the two affected third-party OAuth applications described above. Upon discovering the broader theft of third-party OAuth tokens not stored by GitHub or npm on the evening of April 13, we immediately took action to protect GitHub and npm by revoking tokens associated with GitHub and npm's internal use of these compromised applications. We believe that the two impacts to npm are unauthorized access to, and downloading of, the private repositories in the npm organization on GitHub.com and potential access to the npm packages as they exist in AWS S3 storage. At this point, we assess that the attacker did not modify any packages or gain access to any user account data or credentials. We are still working to understand whether the attacker viewed or downloaded private packages. npm uses completely separate infrastructure from GitHub.com; GitHub was not affected in this original attack. Though investigation continues, we have found no evidence that other GitHub-owned private repos were cloned by the attacker using stolen third-party OAuth tokens. Once GitHub identified stolen third-party OAuth tokens affecting GitHub users, GitHub took immediate steps to respond and protect users. GitHub contacted Heroku and Travis-CI to request that they initiate their own security investigations, revoke all OAuth user tokens associated with the affected applications, and begin work to notify their own users.... GitHub is currently working to identify and notify all of the known-affected victim users and organizations that we discovered through our analysis across GitHub.com. These customers will receive a notification email from GitHub with additional details and next steps to assist in their own response within the next 72 hours.If you do not receive a notification, you and/or your organization have not been identified as affected. You should, however, periodically review what OAuth applications you've authorized or are authorized to access your organization and prune anything that's no longer needed.You can also review your organization audit logs and user account security logs for unexpected or anomalous activity.... The security and trustworthiness of GitHub, npm, and the broader developer ecosystem is our highest priority. Our investigation is ongoing, and we will update this blog, and our communications with affected customers, as we learn more.Read more of this story at Slashdot.
Jonathan Haidt, a social psychologist at the New York University's School of Business, argues in the Atlantic that social-media platforms "trained users to spend more time performing and less time connecting." But that was just the beginning. He now believes this ultimately fueled a viral dynamic leading to "the continual chipping-away of trust" in a democracy which "depends on widely internalized acceptance of the legitimacy of rules, norms, and institutions."The most recent Edelman Trust Barometer (an international measure of citizens' trust in government, business, media, and nongovernmental organizations) showed stable and competent autocracies (China and the United Arab Emirates) at the top of the list, while contentious democracies such as the United States, the United Kingdom, Spain, and South Korea scored near the bottom (albeit above Russia).... Mark Zuckerberg may not have wished for any of that. But by rewiring everything in a headlong rush for growth — with a naive conception of human psychology, little understanding of the intricacy of institutions, and no concern for external costs imposed on society — Facebook, Twitter, YouTube, and a few other large platforms unwittingly dissolved the mortar of trust, belief in institutions, and shared stories that had held a large and diverse secular democracy together. In the last 10 years, the article argues, the general public — at least in America — became "uniquely stupid." And he's not just speaking about the political right and left, but within both factions, "as well as within universities, companies, professional associations, museums, and even families." The article quotes former CIA analyst Martin Gurri's comment in 2019 that the digital revolution has highly fragmented the public into hostile shards that are "mostly people yelling at each other and living in bubbles of one sort or another." The article concludes that by now U.S. politics has entered a phase where truth "cannot achieve widespread adherence" and thus "nothing really means anything anymore--at least not in a way that is durable and on which people widely agree." It even contemplates the idea of "highly believable" disinformation generated by AI, possibly by geopolitical adversaries, ultimately evolving into what the research manager at the Stanford Internet Observatory has described as "an Information World War in which state actors, terrorists, and ideological extremists leverage the social infrastructure underpinning everyday life to sow discord and erode shared reality." But then the article also suggests possible reforms:The Facebook whistleblower Frances Haugen advocates for simple changes to the architecture of the platforms, rather than for massive and ultimately futile efforts to police all content. For example, she has suggested modifying the "Share" function on Facebook so that after any content has been shared twice, the third person in the chain must take the time to copy and paste the content into a new post. Reforms like this...don't stop anyone from saying anything; they just slow the spread of content that is, on average, less likely to be true. Perhaps the biggest single change that would reduce the toxicity of existing platforms would be user verification as a precondition for gaining the algorithmic amplification that social media offers. Banks and other industries have "know your customer" rules so that they can't do business with anonymous clients laundering money from criminal enterprises. Large social-media platforms should be required to do the same.... This one change would wipe out most of the hundreds of millions of bots and fake accounts that currently pollute the major platforms.... Research shows that antisocial behavior becomes more common online when people feel that their identity is unknown and untraceable. In any case, the growing evidence that social media is damaging democracy is sufficient to warrant greater oversight by a regulatory body, such as the Federal Communications Commission or the Federal Trade Commission. One of the first orders of business should be compelling the platforms to share their data and their algorithms with academic researchers. The members of Gen Z--those born in and after 1997--bear none of the blame for the mess we are in, but they are going to inherit it, and the preliminary signs are that older generations have prevented them from learning how to handle it.... Congress should update the Children's Online Privacy Protection Act, which unwisely set the age of so-called internet adulthood (the age at which companies can collect personal information from children without parental consent) at 13 back in 1998, while making little provision for effective enforcement. The age should be raised to at least 16, and companies should be held responsible for enforcing it. More generally, to prepare the members of the next generation for post-Babel democracy, perhaps the most important thing we can do is let them out to play. Stop starving children of the experiences they most need to become good citizens: free play in mixed-age groups of children with minimal adult supervision... The article closes with its own note of hope — and a call to action:In recent years, Americans have started hundreds of groups and organizations dedicated to building trust and friendship across the political divide, including BridgeUSA, Braver Angels (on whose board I serve), and many others listed at BridgeAlliance.us. We cannot expect Congress and the tech companies to save us. We must change ourselves and our communities.Read more of this story at Slashdot.
Richard Stallman celebrated his 69th birthday last month. And Wednesday, he gave a 92-minute presentation called "The State of the Free Software Movement." Stallman began by thanking everyone who's contributed to free software, and encouraged others who want to help to visit gnu.org/help. "The Free Software movement is universal, and morally should not exclude anyone. Because even though there are crimes that should be punished, cutting off someone from contributing to free software punishes the world. Not that person." And then he began by noting some things that have gotten better in the free software movement, including big improvements in projects like GNU Emacs when displaying external packages. (And in addition, "GNU Health now has a hospital management facility, which should make it applicable to a lot more medical organizations so they can switch to free software. And [Skype alternative] GNU Jami got a big upgrade.") What's getting worse? Well, the libre-booted machines that we have are getting older and scarcer. Finding a way to support something new is difficult, because Intel and AMD are both designing their hardware to subjugate people. If they were basically haters of the public, it would be hard for them to do it much worse than they're doing. And Macintoshes are moving towards being jails, like the iMonsters. It's getting harder for users to install even their own programs to run them. And this of course should be illegal. It should be illegal to sell a computer that doesn't let users install software of their own from source code. And probably shouldn't allow the computer to stop you from installing binaries that you get from others either, even though it's true in cases like that, you're doing it at your own risk. But tying people down, strapping them into their chairs so that they can't do anything that hurts themselves -- makes things worse, not better. There are other systems where you can find ways to trust people, that don't depend on being under the power of a giant company. We've seen problems sometimes where supported old hardware gets de-supported because somebody doesn't think it's important any more — it's so old, how could that matter? But there are reasons...why old hardware sometimes remains very important, and people who aren't thinking about this issue might not realize that... Stallman also had some advice for students required by their schools to use non-free software like Zoom for their remote learning. "If you have to use a non-free program, there's one last thing... which is to say in each class session, 'I am bitterly ashamed of the fact that I'm using Zoom for this class.' Just that. It's a few seconds. But say it each time.... And over time, the fact that this is really important to you will sink in." And then halfway through, Stallman began taking questions from the audience... Read on for Slashdot's report on Stallman's remarks, or jump ahead to... How far should copyright law go? That NPM package that deleted files in Russia Does the free software world need more videogames? Stallman's upcoming manual for 'GNU C' Free Software's role in protecting our planet's environmentRead more of this story at Slashdot.
The Verge reports that "Editing a tweet using Twitter's upcoming edit button could leave a digital trace of your tweet's history, according to reverse engineer Jane Manchun Wong."In a tweet, Manchun Wong explains that the edit function appears to have an "immutable" quality, which means Twitter may create an entirely new tweet when one is edited, all while preserving the previous versions of that tweet. "Looks like Twitter's approach to Edit Tweet is immutable, as in, instead of mutating the Tweet text within the same Tweet (same ID), it re-creates a new Tweet with the amended content, along with the list of the old Tweets prior of that edit," Manchun Wong says. As Manchun Wong notes, it's unclear how a tweet's edit history will appear to users, or if it will at all. But if Twitter does decide to make tweet history public, it could be a way to address concerns over potential abuse of the feature, as some critics believe it could be used to alter the public record and mislead users. But in the end, it's two entirely separate questions. Will Twitter's edit functionality preserve a tweet's history online? And should it?Read more of this story at Slashdot.
Earlier this week the Voice of America news service shared a story that begins with exclusive photos from a nuclear lab "from which a Ukrainian official says Russian troops stole radioactive material that could be harmful if mishandled...."It is housed in a building run by a state agency managing the exclusion zone around Chernobyl's nearby decommissioned nuclear power plant, where a 1986 explosion caused the world's worst nuclear accident. The director of the agency, Evgen Kramarenko, provided the laboratory photos to VOA, saying he took them on an April 5 visit, five days after Russian troops withdrew from Chernobyl.... "We have a laboratory that had a big quantity of radioactive instruments that are used to calibrate our radiation dosimeters," Kramarenko told VOA. A dosimeter is a safety device, typically worn by individuals as a badge, that measures exposure to ionizing radiation, including nuclear radiation. The agency's dosimeters are calibrated using small metallic containers of radioactive material made by Ukrainian state enterprise USIE Izotop, which displays a photo of them on its website. "Most of those calibration instruments were stolen. They look like coins. If the Russian soldiers carry them around, it's very dangerous for them," Kramarenko said.... In a Saturday Facebook post, Kramarenko's agency said occupying Russian troops stole samples of fuel-containing materials from the lab in addition to the radioactive calibration instruments. The agency said it was possible that the Russians threw away the items elsewhere in Chernobyl's exclusion zone, but that a likelier scenario is that they kept items as "souvenirs."Read more of this story at Slashdot.
The nonprofit online news site Virginia Mercury investigated their state police departments' "real-time location warrants," which are "addressed to telephone companies, ordering them to regularly ping a customers' phone for its GPS location and share the results with police."Public records requests submitted to a sampling of 18 police departments around the state found officers used the technique to conduct more than 7,000 days worth of surveillance in 2020. Court records show the tracking efforts spanned cases ranging from high-profile murders to minor larcenies.... Seven departments responded that they did not have any relevant billing records, indicating they don't use the technique. Only one of the departments surveyed, Alexandria, indicated it had an internal policy governing how their officers use cellphone tracking, but a copy of the document provided by the city was entirely redacted.... Drug investigations accounted for more than 60 percent of the search warrants taken out in the two jurisdictions. Larcenies were the second most frequent category. Major crimes like murders, rapes and abductions made up a fraction of the tracking requests, accounting for just under 25 of the nearly 400 warrants filed in the jurisdictions that year. America's Supreme Court "ruled that warrantless cellphone tracking is unconstitutional back in 2012," the article points out — but in practice those warrants aren't hard to get. "Officers simply have to attest in an affidavit that they have probable cause that the tracking data is 'relevant to a crime that is being committed or has been committed'.... There's been limited public discussion or awareness of the kinds of tracking warrants the judiciary is approving.""I don't think people know that their cell phones can be converted to tracking devices by police with no notice," said Steve Benjamin, a criminal defense lawyer in Richmond who said he's recently noticed an uptick in cases in which officers employed the technique. "And the reality of modern life is everyone has their phone on them during the day and on their nightstand at night. ... It's as if the police tagged them with a chip under their skin, and people have no idea how easily this is accomplished." The case for these phone-tracking warrants? The executive director of the Virginia Association of Chiefs of Police tells the site that physical surveillance ofen requires too many resources — and that cellphone tracking is safer. "It may be considered an intrusive way of gathering data on someone, but it's certainly less dangerous than physical tracking."A spokesperson for the Chesterfield County police department [responsible for 64% of the state's tracking] argued that "We exist to preserve human life and protect the vulnerable, and we will use all lawful tools at our disposal to do so." And they added that such "continued robust enforcement efforts" were a part of the reason that the county's still-rising number of fatal drug overdoses had not risen more.The site also obtained bills from four major US cellphone carriers, and reported how much they were charging police for providing their cellphone-tracking services:"T-Mobile charged $30 per day, which comes to $900 per month of tracking.""AT&T charged a monthly service fee of $100 and an additional $25 per day the service is utilized, which comes to $850 per 30 days of tracking...""Verizon calls the service 'periodic location updates,' charging $5 per day on top of a monthly service fee of $100, which comes to $200 per 30 days of tracking.""Sprint offered the cheapest prices to report locations back to law enforcement, charging a flat fee of $100 per month." Thanks to Slashdot reader Beerismydad for sharing the article!Read more of this story at Slashdot.
The Covid-19 pandemic "would look very different if scientists had been able to develop a treatment sooner," writes Bill Gates, in a guest essay Friday in the New York Times. This ultimately would've reduced fatalities — "and it may have been harder for myths and misinformation to spread the way they did." But note that Gates said "treatment" — not vaccine. Gates believes most people in the public health community had expected an effective treatment would appear before vaccines became available.Unfortunately, that's not what happened. Safe, effective Covid vaccines were available within a year — a historic feat — but treatments that could keep large numbers of people out of the hospital were surprisingly slow out of the gate.... In late 2021, a few of their efforts paid off — not as soon as would have been ideal, but still in time to have a big impact. Merck and its partners developed an antiviral called molnupiravir, which was shown to significantly reduce the risk of hospitalization or death for people at high risk. Soon after, another oral antiviral, Paxlovid, made by Pfizer, also proved to be very effective, reducing the risk of severe illness or death by nearly 90 percent among high-risk, unvaccinated adults. These drugs are useful tools for combating the pandemic, but they arrived much later than they should have and, for many, they are still difficult to access.... It's a mistake to think of vaccines as the star of the show and therapeutics as the opening act you would just as soon skip. We're lucky that scientists made Covid vaccines as quickly as they did — if they hadn't, the death toll would be far worse. But in the event of another pandemic, even if the world is able to develop a vaccine for a new pathogen in 100 days, it will still take a long time to get the vaccine to most of the population.... With good therapeutics, the risk of severe illness and death could drop significantly, and countries could decide to loosen restrictions on schools and businesses, reducing the disruption to education and the economy. What's more, imagine how people's lives would change if we're able to take the next step by linking testing and treatment. Anyone with early symptoms that might indicate Covid (or any other viral disease) could walk into a pharmacy or clinic anywhere in the world, get tested and, if positive for the virus, walk out with antivirals to take at home.... In short, although therapeutics didn't rescue us from Covid, they hold a lot of promise for saving lives and preventing future outbreaks from crippling health systems. But to make the most of that promise, the world needs to invest in the research and systems we'll need to find treatments much faster. That's why my foundation has supported a therapeutics accelerator at Duke University, but broader initiatives will be necessary to make lasting change. This will require substantial investment to bring together academia, industry and the latest software tools. But if we succeed, the next time the world faces an outbreak, we'll save millions more lives. Gates offers several specific recommendations — including "investing in large libraries of drug compounds that researchers can quickly scan to see whether existing therapies work against new pathogens." And...With advances in artificial intelligence and machine learning, it's now possible to use computers to identify weak spots on pathogens that we already know about, and we'll be able to do the same when new pathogens arise. These technologies are also speeding up the search for new compounds that will attack those weak spots.With adequate funding, various groups could take the most promising new compounds through Phase 1 studies even before there's an epidemic, or at least have several leads that can be turned into a product quickly once we know what the target looks like.Read more of this story at Slashdot.
Ukrainian officials "have run more than 8,600 facial recognition searches on dead or captured Russian soldiers in the 50 days since Moscow's invasion began, using the scans to identify bodies and contact hundreds of their families," reports the Washington Post. Ukraine's IT Army (taking direction from Ukraine's government) "says it has used those identifications to inform the families of the deaths of 582 Russians, including by sending them photos of the abandoned corpses."The Ukrainians champion the use of face-scanning software from the U.S. tech firm Clearview AI as a brutal but effective way to stir up dissent inside Russia, discourage other fighters and hasten an end to a devastating war. But some military and technology analysts worry that the strategy could backfire, inflaming anger over a shock campaign directed at mothers who may be thousands of miles from the drivers of the Kremlin's war machine. The West's solidarity with Ukraine makes it tempting to support such a radical act designed to capitalize on family grief, said Stephanie Hare, a surveillance researcher in London. But contacting soldiers' parents, she said, is "classic psychological warfare" and could set a dangerous new standard for future conflicts. "If it were Russian soldiers doing this with Ukrainian mothers, we might say, 'Oh, my God, that's barbaric,' " she said. "And is it actually working? Or is it making them say: 'Look at these lawless, cruel Ukrainians, doing this to our boys?' " Clearview AI's chief executive, Hoan Ton-That, told The Washington Post that more than 340 officials across five Ukrainian government agencies now can use its tool to run facial recognition searches whenever they want, free of charge. Clearview employees now hold weekly, sometimes daily, training calls over Zoom with new police and military officials looking to gain access. Ton-That recounted several "'oh, wow' moments" as the Ukrainians witnessed how much data — including family photos, social media posts and relationship details — they could gather from a single cadaver scan. Some of them are using Clearview's mobile app to scan faces while on the battlefield, he said. Others have logged in for training while stationed at a checkpoint or out on patrol, the night sky visible behind their faces. "They're so enthusiastic," Ton-That said. "Their energy is really high. They say they're going to win, every call...." About 10% of Clearview's database came from Russia's biggest social network, the Post learns from Clearview's chief executive, ""making it a potentially useful tool for battlefield scans."Ukrainian agencies, Ton-That said, have used the app to confirm the identities of people at military checkpoints and to check whether a Ukrainian is a possible Russian infiltrator or saboteur. He argued that the system could deter Russian soldiers from committing war crimes, for fear of being identified, and said the Ukrainians are considering using the tool to verify the identities of Ukrainian refugees and their hosts as they flee for safety.... Beyond scanning corpses, Ukraine also is using facial recognition to identify Russian soldiers caught on camera looting Ukrainian homes and storefronts, an official with Ukraine's Digital Transformation Ministry told The Post. Mykhailo Fedorov, the head of that ministry, this month shared on Twitter and Instagram the name, hometown and personal photo of a man he said was recorded shipping hundreds of pounds of looted clothes from a Belarus post office to his home in eastern Russia. "Our technology will find all of them," he wrote. The article asks what happens if software makes a mistake in its identification — but Clearview's chief executive argues their tool is accurateTon-That said the company's sole ambition is to help defend a besieged country. But he also acknowledged the war has helped provide a "good example for other parts of the U.S. government to see how these use cases work." "This is a new war," he said. And the Ukrainians are "very creative with what they've been able to do." Thanks to Slashdot readers fbobraga and schwit1 for submitting the article.Read more of this story at Slashdot.
"Cryptocurrency has changed the game of cybercrime," argues Vice's Christian Devolu, in a new episode of their video series CRYPTOLAND. "Hackers and cybergangs have been locking down the data of large corporations, police departments, and even hospitals, and demanding ransom — and guess what they're asking for? Cryptocurrency!" In short, argues an article accompanying the episode, cryptocurrency "gave birth to the ransomware epidemic." Slashdot reader em1ly shares one highlight from the video: The team visits a school district in Missouri ["just one of around 1,000 U.S. schools hacked last year with ransomware"] that was the victim of a ransomware attack. ["Luckily, the school's backups were not impacted...."] Another interesting observation from the article:When ransom payments do happen, companies like Chainalysis can track the Bitcoin through the blockchain, identifying the hackers' wallets and collaborating with law enforcement in an attempt to recover the funds or identify the hackers themselves.Read more of this story at Slashdot.
An anonymous reader quotes a report from Yahoo Finance: A single mom who signed up for a $30,000 income-share agreement at a for-profit coding bootcamp has filed a lawsuit in California, alleging she entered the agreement under "false pretenses." Redmond, Washington-based Emily Bruner is suing Bloom Institute of Technology, formerly known as Lambda School, and its head Austen Allred, alleging they misrepresented job placement rates, operated without a license during her course of study, and hid the "true nature" of the school's financial interest in students' success. "I feel like Lambda misled me at every turn -- about their job placement rates and about how they would prepare us for jobs in the field. I was even more shocked when I found out they were operating illegally," Bruner said in a press release. "I took time away from my young son and other career opportunities to participate in a program based on lies," added Bruner, who's seeking a refund from the school as well as monetary damages. "While I'm thankful I opted out of arbitration so I can have my day in court, I wish my classmates who were also misled could be here with me." Income-share agreements, known as ISAs, are an alternative type of student loan financing where a borrower receives a loan, then pays a percentage of their income after graduation. The terms of an ISA depends on various factors, such as their major topic of study and projected future earnings. [...] Bruner, the plaintiff, signed her ISA on June 29, 2019 when she was living in New Mexico because she could not pay the full tuition amount to attend Lambda full-time, according to the lawsuit. She says she moved back home to North Carolina to live with her parents, who would help her take care of her baby. She took out $30,000 for its six- and 12-month computer science programs offered by San Francisco-based Lambda, according to the complaint. Bruner started school in September 2019 and finished the following August. Students at Lambda agree to pay 17% of their post-Lambda salary for 24 months once they make more than $50,000 a year, according to the lawsuit. After graduating, she couldn't find a job as a web developer or a software engineer, and was, according to the lawsuit, told by employers that "she did not have the technical skills for the job, and that her education had not prepared her to be a web developer." Bruner ended up going back to program management, a field she was working in prior to attending Lambda. In the lawsuit, she alleged that Lambda misrepresented the fact that it did not have necessary approval from the state regulator, the California Bureau for Postsecondary Education. She also alleged that the school falsified and misrepresented the school's job placement rates. Finally she also alleged that the school hid the true nature of its financial interest in students' success -- specifically by "falsely representing" that Lambda only was compensated when students found jobs and earned income.Read more of this story at Slashdot.
"Headline says it all," writes Slashdot reader segaboy81. "Lots of people have been looking forward to this Kickstarter for the Unihertz Titan Slim, but it is easily the thickest phone of 2022." Neowin's Dean Howell reacts to an unboxing video of Unihertz's Titan Slim, the successor to last year's Titan Pocket physical keyboard-equipped BlackBerry clone, writing: While Blackberry refugees have been clamoring for new PKB devices, they've been asking for them to be thin and sleek like the Blackberry of yesterday. We thought that's what we were getting with the announcement of the Titan Slim, but after yesterday's unboxing video by Adam over at TechOdyssey we know that's not the case at all. [...] Normally he would show how it compares to other devices, and I think this go 'round he was reticent to compare it directly to the Titan Pocket because if he did it would confirm what I think is true; the Titan Slim is not slim at all and it's every bit as think as the Titan Pocket. The drama doesn't end there I'm afraid. There is a review embargo on this device, so there are a lot of details Adam didn't talk about, like performance characteristics. [...] New year, new phone, new CPU right? Wrong. I wondered what CPU the Titan Slim would ship with and it took less than a minute to figure out. I went over to Geekbench and found it had already been tested. Unfortunately, the Titan Slim will ship with the same CPU as last year's Titan Pocket. What's worse is the Helio P70 in the Titan Slim is comparable at best to the then-mid-range Snapdragon 660 of the 2018 Key2.Read more of this story at Slashdot.
Sometimes making a brand-new type of box requires outside-the-box thinking, which is exactly what Spartan chemists used to create an eight-atom, magnetic cube. Phys.Org reports: Part of what made the researchers' idea so wild was their choice to work with starting ingredients that are notoriously finicky in the chemistry community. One ingredient is a group of elements referred to as lanthanides, which occupy a special row toward the bottom of the periodic table of elements. The other is the metallic element bismuth, which doesn't typically get too much attention (although some may recognize it from its role in bright pink antacids such as Pepto Bismol). By finding a way to combine the bismuth with a lanthanide element -- notably terbium or dysprosium -- they created a molecule with permanent magnetic features. It's the same magnetism found in bar magnets and hard disk drives, but at a much smaller scale. The small scale of molecular magnets offers technological opportunities, such as improving the storage capacity of magnetic hard drives. There are also emerging applications where conventional magnets may simply be too large to contribute, such as in processors for quantum computers. The first single-molecule magnet was discovered about 30 years ago and, since then, researchers have been seeking new varieties with different physical and chemical attributes. They've also been working to develop more creative chemical approaches to make the magnets. The molecule itself, though, looks simple, belying the complexity of the process required to make it. The top and bottom of the molecule are capped with rings of carbon and hydrogen atoms. Each ring is linked to a lanthanide that forms a cube with the bismuth atoms. The researchers published their findings in the journal Chem.Read more of this story at Slashdot.
An anonymous reader quotes a report from Bloomberg: California, which aims to have a carbon-free power grid within 25 years, got a short glimpse of that possibility earlier this month. The state's main grid ran on more than 97% renewable energy at 3:39 p.m. on Sunday April 3, breaking a previous record of 96.4% that was set just a week earlier, the California Independent System Operator said Thursday in a statement. While these all-time highs are for a brief time, they solidly demonstrate the advances being made to reliably achieve California's clean energy goals," said California ISO CEO Elliot Mainzer said in the statement. Power production from the sun and wind typically peak in the spring, due to mild temperatures and the angle of the sun allowing for an extended period of strong solar production, the grid operator said. While hitting the new renewable record is remarkable, the state has found itself scrambling for power supplies during the past two summers as it has added more intermittent sources and retired natural-gas plants for environmental reasons. California has set a target to have a zero-carbon power system by 2045.Read more of this story at Slashdot.
Apple's controversial App Tracking Transparency feature available in iOS 14.5 is expected to have a significant impact on Facebook, Twitter, Snap, and YouTube in 2022. According to a report by Lotame, big tech platforms' revenue could drop by almost $16 billion. 9to5Mac reports: For those who don't remember, ATT requires that applications ask permission from users before tracking them across other apps and websites. For example, when you open the Facebook app, you'll see a prompt that says the app would like to track you across other apps and services. There will be two options from which to choose: "Ask App not to Track" or "Allow." Talking about Facebook, Lotame's report shows that Zuckerberg's company will take the biggest hit as the privacy changes will cost it $12.8 billion in revenue: "The effects of these changes on these companies are hard to isolate because all four players are still growing extremely strongly, still taking share from the last bastions of traditional media and gaining share in digital media as privacy regulations make it harder and harder for independent publishers and technologies to execute,' said Mike Woosley, Chief Operating Officer at Lotame. 'To add to the complexity, the pandemic has introduced volatile and unpredictable gyrations in the pacing of media spend.'"Read more of this story at Slashdot.
Boffins at two US universities have found that muting popular native video-conferencing apps fails to disable device microphones -- and that these apps have the ability to access audio data when muted, or actually do so. The research is described in a paper titled, "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing App." The Register reports: Among the apps studied -- Zoom (Enterprise), Slack, Microsoft Teams/Skype, Cisco Webex, Google Meet, BlueJeans, WhereBy, GoToMeeting, Jitsi Meet, and Discord -- most presented only limited or theoretical privacy concerns. The researchers found that all of these apps had the ability to capture audio when the mic is muted but most did not take advantage of this capability. One, however, was found to be taking measurements from audio signals even when the mic was supposedly off. "We discovered that all of the apps in our study could actively query (i.e., retrieve raw audio) the microphone when the user is muted," the paper says. "Interestingly, in both Windows and macOS, we found that Cisco Webex queries the microphone regardless of the status of the mute button." They found that Webex, every minute or so, sends network packets "containing audio-derived telemetry data to its servers, even when the microphone was muted." This telemetry data is not recorded sound but an audio-derived value that corresponds with the volume level of background activities. Nonetheless, the data proved sufficient for the researchers to construct an 82 per cent accurate background activity classifier to analyze the transmission and infer the likely activity among six possibilities -- e.g. cooking, cleaning, typing, etc. -- in the room where the app is active. Worse still from a security standpoint, while other apps encrypted their outgoing data stream before sending it to the operating system's socket interface, Webex did not. "Only in Webex were we able to intercept plaintext immediately before it is passed to the Windows network socket API," the paper says, noting that the app's monitoring behavior is inconsistent with the Webex privacy policy. The app's privacy policy states Cisco Webex Meetings does not "monitor or interfere with you your [sic] meeting traffic or content." After the researchers reached out about their findings, Cisco altered Webex so it no longer transmits microphone telemetry data. "Cisco is aware of this report, and thanks the researchers for notifying us about their research," said a Cisco spokesperson. "Webex uses microphone telemetry data to tell a user they are muted, referred to as the 'mute notification' feature. Cisco takes the security of its products very seriously, and this is not a vulnerability in Webex."Read more of this story at Slashdot.
Buyout firm Thoma Bravo has contacted Twitter to express interest in putting together an acquisition offer that would rival Tesla CEO Elon Musk's $43 billion bid. Reuters reports: Thoma Bravo, a private equity firm that had more than $103 billion in assets under management as of the end of December, has informed Twitter that it is exploring the possibility of putting together a bid, the sources said. It is not clear how much Thoma Bravo would be prepared to offer and there is no certainty that such a rival bid will materialize, the sources cautioned, asking not to be identified because the matter is confidential.Read more of this story at Slashdot.
An anonymous reader quotes a report from Motherboard: A new class-action lawsuit filed in California targets Otonomo, a data broker that harvests location data from tens of millions of vehicles around the world and then sells access to that information. Otonomo says it has systems in place that protect peoples' privacy. But in June last year, Motherboard published an investigation based on a set of Otonomo data and used the information to find where people likely lived, worked, and where else they drove. At the time, experts said that Otonomo could face legal consequences because of how it handles consent and its data. The new lawsuit focuses specifically on those issues. "Defendant Otonomo Inc. is a data broker that secretly collects and sells real-time GPS location information from more than 50 million cars throughout the world, including from tens of thousands in California. This data allows Otonomo -- and its paying clients -- to easily pinpoint consumers' precise locations at all times of day and gain specific insight about where they live, work, and worship, and who they associate with," the lawsuit, filed by lawyers from Edelson PC, reads. Courthouse News first reported on the lawsuit. The plaintiff in the case is Saman Mollaei, a citizen of California. The lawsuit does not explain how it came to the conclusion that Otonomo is tracking tens of thousands of people in California. Otonomo originally started in Israel and has an office in California. Mollaei drives a 2020 BMW X3, and when the vehicle was delivered to him, it contained an electronic device that allowed Otonomo to track its real-time location, according to the lawsuit. Importantly, the lawsuit alleges that Mollaei did not provide consent for this tracking, adding that "At no time did Otonomo receive -- or even seek -- Plaintiff's consent to track his vehicle's locations or movements using an electronic tracking device." More broadly, the lawsuit claims that Otonomo "never requests (or receives) consent from drivers before tracking them and selling their highly private and valuable GPS location information to its clients." The lawsuit says that because Otonomo is "secretly" tracking vehicle locations, it has violated the California Invasion of Privacy Act (CIPA), which bans the use of an "electronic tracking device to determine the location or movement of a person" without consent. In a previous report, Motherboard discovered that Otonomo established agreements with 16 OEM car manufacturers to source location data from their vehicles, which total over 40 million. They also source data from navigation apps and satnavs. The data, which is "relatively easy to deanonymize," is then sold to thousands of different organizations.Read more of this story at Slashdot.
Microsoft wants to let advertisers place ads inside free-to-play Xbox games. According to Insider, the company "is currently identifying adtech companies who can create the in-game inventory and work with ad agencies to place the ads." From the report: This new program will boost Xbox's limited ad inventory by adding more games that brands can advertise in and by allowing more developers to sell ad space. Those sources said those ads would show up as, for instance, digitally rendered billboards in a car racing game. Insider was unable to learn if Xbox will also offer other types of in-game ad units, like avatar skins or video ads that play in gaming lobbies. Insider was also unable to determine if Microsoft has pitched the Xbox offering to advertisers yet. Insider's sources expect this capability to be live by the third quarter. The two sources said the tech giant did not seem intent on taking a cut of ad revenue, and that it seemed more interested in building out the Xbox ad network. Ad revenue will be shared by the game developer and the adtech company that places the ad, those sources believe. One of the sources speculated Microsoft isn't currently interested in collecting a cut of ad revenue because it wants to provide more money-making opportunities to developers who make free-to-play games. Microsoft started talks to build an Xbox in-game ad network around 2018 or 2019, but that process accelerated thanks to the 2020 release of the latest Xbox, and the boom in free-to-play titles, the two sources said. Microsoft is worried inserting ads into Xbox games could irritate people who don't expect to see ads when playing on consoles, so it's moving cautiously and intends to create a "private marketplace," where only select brands can insert ads into games in a way that doesn't disrupt the gameplay experience, the two sources said. They also said Microsoft is concerned about securing its customers' data, so other companies can't use it.Read more of this story at Slashdot.
Oracle has begun making a new version of Solaris 11.4 available for free/open-source developers and for non-production personal use. Phoronix reports: Solaris 11.4 CBE is the "Common Build Environment" and intended for open-source developers and strictly non-production personal use... That is if you want Solaris for new installs in 2022. The new Solaris 11.4 "CBE" spin is effectively a rolling release and from Oracle's perspective hopes to ease the integration of the open-source software relied upon by Solaris rather than being bound to the dated 11.4.0 GA release. Downloading the new Solaris 11.4 CBE does require an Oracle account. The CBE builds are also described as "similar to a beta, they are pre-release builds of a particular SRU." The non-production use license is put out under the Oracle Technology Network Early Adopter License Agreement for Oracle Solaris. Oracle will allow upgrading from these free CBE releases to paid SRU releases under Oracle support contracts. More details for those interested in Oracle Solaris 11.4 CBE via the Oracle Solaris blog.Read more of this story at Slashdot.
An anonymous reader quotes a report from TorrentFreak: Privacy-centered search engine DuckDuckGo has completely removed the search results for many popular pirates sites including The Pirate Bay, 1337x, and Fmovies. Several YouTube ripping services have disappeared, too and even the homepage of the open-source software youtube-mp3 is unfindable. [...] The lack of results is not tied to a specific country and manually fiddling with the region settings didn't change anything either. Apparently, DuckDuckgo has simply removed all thepiratebay.org URLs from its index. This whole-site removal isn't limited to The Pirate Bay either. When we do similar searches for 1337x.to, NYAA.se, Fmovies.to, Lookmovie.io, and 123moviesfree.net, no results appear. For RarBG.to and Fitgirl-repacks we only get one result, instead of the hundreds of thousands we see on other search engines. The absence of results doesn't only apply to pirate sites themselves. For example, there are no results for the streaming portals Flixtor and Primewire. In addition, the associated status pages, which merely include links to the official domains, are not indexed either. Even several popular stream-rippers have been completely wiped from the search results. That includes 2conv.com, Flvto.bid, and several others. The most surprising omission, by far, is that the official site for the open-source software youtube-dl is not indexed by DuckDuckGo. This site certainly doesn't host or link to any copyright-infringing material. We don't know why the official youtube-dl.org website is not in DuckDuckGo's search results, but at least the official GitHub repository is still findable. DuckDuckGo has yet to explain why these domain names aren't showing up in its search results. "It wouldn't be a surprise if the move is copyright-related," says TorrentFreak.Read more of this story at Slashdot.
DC Attorney General Karl Racine has filed a motion asking the court to reconsider its decision to dismiss the antitrust lawsuit he filed against Amazon in 2021. From a report: In the original lawsuit, Racine accused the e-commerce giant of "illegally abusing and maintaining its monopoly power by controlling prices across the online retail market." Third-party sellers that use Amazon's Marketplace have to abide by the company's agreement, which includes a fair pricing policy. If they sell their goods for lower prices elsewhere, Amazon could remove their items' buy box, suspend their shipment option and even terminate their selling privileges for "serious or repeated cases." The company stopped telling sellers back in 2019 in the midst of antitrust scrutiny that they couldn't sell their products for cheaper prices elsewhere. However, the company later added back a clause under its fair pricing policy that's nearly identical. Racine argued that since sellers price their goods with Amazon's cut in mind, the policy artificially raises prices even on sellers' own websites and on competing e-commerce platforms.Read more of this story at Slashdot.
92% of executives at medium to large firms think workers who turn cameras off during meetings don't have long-term futures at the company, according to a new survey from Vyopta, a software company. From a report: The data adds grist to the worry that hybrid and remote employees have expressed about the post-pandemic world -- that those who choose to work from home some, most or all of the time will be out-of-sight, out-of-mind for bosses. In a separate finding from Vyopta, 93% of execs said that people who frequently turn off their cameras probably aren't paying attention. Those employees are perceived as less engaged with their work overall. The majority of companies around the world are moving to a hybrid working model, which means more video meetings in the future. But the casual, camera-off and microphone-muted way of taking a meeting might be harming employees' career prospects.Read more of this story at Slashdot.
Developer burnout is helping to drive an exodus of software developer talent from organizations, as part of a larger trend known as the Great Resignation, according to a report released on April 13 by MuleSoft, which is a division of Salesforce. From a report: The MuleSoft report was based on research conducted by Vanson Bourne in February 2022 across the U.S., U.K., France, Germany, and Australia. Eighty-six percent of respondents indicated that in the last two years it has become increasingly difficult to recruit software developers. One of the reasons why is the larger macroeconomic trend of the Great Resignation, where employees are leaving their employers en masse during the COVID-19 pandemic as they seek a better work-life balance. Burnout is also a large challenge for developers, according to the report. The top causes of developer burnout are increasing workloads and the challenges of learning new skills to adapt to emerging technologies. "The pandemic was a massive accelerator for the need of digital tools," Matt McLarty, global field CTO and vice president of the Digital Transformation Office (DTO) at MuleSoft, told ITPro Today. "Non-technology companies were ultimately forced to become technology companies overnight, and we saw nearly every organization require developers to help them achieve these new goals on high-pressure deadlines, all at once."Read more of this story at Slashdot.
A new social engineering scam is making the rounds, and this one is particularly insidious: It tricks users into sending money to what they think is their own account to reverse a fraudulent charge. From a report: The FBI's Internet Crime Complaint Center issued the warning, which it said involves cybercriminals who have definitely done their homework. "In addition to knowing the victim's financial institution, the actors often had further information such as the victim's past addresses, social security number, and the last four digits of their bank accounts," the IC3 said. The con starts off as many that target individuals do nowadays: With a text message. In this case it's not a phishing attempt, it's an attempt to ascertain whether the person receiving the message is susceptible to further manipulation. Posing as the target's bank, the message asks whether a large charge ($5,000 in the example the FBI gives) was legitimate and asks for a reply of YES or NO. Replying no leads to a follow-up text: "Our fraud specialist will be contacting you shortly. This is where social engineering comes in, and the FBI is painting a picture of a sophisticated operation. The "fraud specialists" contacting users reportedly "speak English without a discernible accent," and once they establish credibility with the victim they move on to "helping" them "reverse" the fake transaction. It gets even more insidious here: The charges that are being refuted aren't bank charges directly: they are payments being made through an instant payment app like Venmo or CashApp. The fraudster never asks for a password or any information that might clue someone in that they're being strung along. Instead, the caller asks the victim to use their bank website or app to remove their email address from the digital payment app (thereby unlinking the app and bank account), which the fraudster then asks for. Next, the victim is asked to send the same amount as the fake payment to themselves using their own email address, which has already been added to an account the criminal controls.Read more of this story at Slashdot.
Google is issuing fixes for two vulnerabilities in its Chrome web browser, including one flaw that is already being exploited in the wild. From a report: The emergency updates the company issued this week impact the almost 3 billion users of its Chrome browser as well as those using other Chromium-based browsers, such as Microsoft Edge, Brave and Vivaldi. It is the third such emergency update Google has had to issue for Chrome this year. One of the flaws is a type confusion vulnerability tracked as CVE-2022-1364, a high-severity, zero-day bug that is actively being used by attackers. With a type confusion flaw, a program will allocate a resource like a pointer or object using one type but later will access the resource using another, incompatible type. In some languages, like C and C++, the vulnerability can result in out-of-bounds memory access. This incompatibility can cause a browser to crash or trigger logical errors. However, if exploited, it could enable a hacker to execute arbitrary code.Read more of this story at Slashdot.
Apple has started widespread internal testing of several new Mac models with next-generation M2 chips, according to developer logs, part of its push to make more powerful computers using homegrown processors. Bloomberg: The company is testing at least nine new Macs with four different M2-based chips -- the successors to the current M1 line -- with third-party apps in its App Store, according to the logs, which were corroborated by people familiar with the matter. The move is a key step in the development process, suggesting that the new machines may be nearing release in the coming months. The M2 chip is Apple's latest attempt to push the boundaries of computer processing after a split with Intel in recent years. Apple has gradually replaced Intel chips with its own silicon, and now looks to make further gains with a more advanced line. After years of slow growth, the Mac computer division enjoyed a resurgence the past two years, helped in part by home office workers buying new equipment. The business generated $35.2 billion in sales the past fiscal year, about 10% of Apple's total.Read more of this story at Slashdot.
The Internal Revenue Service is investigating American Express over a questionable tax break that it pitched to clients, WSJ reported Friday, citing people familiar with the matter. From the report: The civil investigation has been under way for a few months, these people said. The Wall Street Journal reported in November that AmEx salespeople touted a tax break based on a shaky interpretation of tax law. The pitch was part of a strategy to persuade business owners to sign up for costly payment services. AmEx previously acknowledged, in response to the November story, that some members of its U.S. sales organization "failed to uphold our values and had positioned certain products inappropriately, specifically with respect to tax benefits." An AmEx spokesman said this week that "we have already taken a number of actions to change products, policies and personnel and are continuing to cooperate with our regulators and government agencies. "As we said in November, we engaged an external law firm to conduct an investigation of our small business sales practices in the U.S.," he added. AmEx "will take further steps as appropriate." AmEx previously said that it discontinued wire services associated with the pitch. These had been available to a wide range of companies, according to people familiar with the matter.Read more of this story at Slashdot.
Twitter's board on Friday enacted a defensive measure meant to deter Elon Musk's $43 billion hostile takeover bid. From a report: The "poison pill," as it's called in corporate terms, gives Twitter's existing shareholders time to purchase additional shares at a discount, thus diluting Musk's ownership stake. Musk disclosed a 9.2% stake in Twitter earlier this month. He then announced he was joining the company's board of directors and began proposing several changes to the platform, including turning the company's headquarters into a homeless shelter. [...] He later backed out of joining the board and offered to purchase the company for $54.20 a share, though he did specify how he planned to pay for it. Twitter said in a statement that "its Board of Directors has unanimously adopted a limited duration shareholder rights plan. ... The Board adopted the Rights Plan following an unsolicited, non-binding proposal to acquire Twitter."Read more of this story at Slashdot.
An anonymous reader shares a report: A federal class-action lawsuit involving Maple Heights and 2,000 other U.S. communities against Netflix and Hulu took a detour Wednesday through the Ohio Supreme Court, with Maple Heights officials asking state justices to define the streaming giants as "video service providers." If the Supreme Court agrees, the streaming services would be subject to the same video service provider fees paid by cable companies. Those fees in Ohio are 5% of the companies' gross revenues they earn in the city and go directly into city coffers. The streaming companies argued they are instead "specified digital products" under state law. Therefore, they pay state sales taxes, and Ohio would lose money if the court determines they owe the local franchise fees since they would be exempt from state sales tax under Ohio law. The Ohio Supreme Court will determine whether Netflix and Hulu are video service providers, among other legal questions, in the coming months. After the Ohio Supreme Court issues an opinion, the case in federal court in Cleveland can resume. That case involves around 2,000 cities, but U.S. District Judge James Gwin directed the Ohio Supreme Court to answer legal questions first.Read more of this story at Slashdot.