By msmash from Slashdot's things-to-come department
Last week, the Wall Street Journal reported that Apple is working to bring in veteran producers to help create original content, including TV series and movies. Apple Music head Jimmy Iovine has all but confirmed the report and company's intentions to expand. From a report: "We're going to do whatever hits popular cultural smack on the nose," Iovine said when asked about Apple's reported expansion. Days after The Wall Street Journal's report that Apple plans to expand into original TV series and movies, Apple executive Jimmy Iovine hinted at what that might look like. "At Apple Music, what we're trying to create is an entire cultural, pop cultural experience, and that happens to include audio and video," he told reporters at the Television Critics Association's winter press tour. "If South Park walks into my office, I am not going to say you're not musicians, you know?" Iovine continued when pressed about the report. "We're going to do whatever hits popular culture smack on the nose. We're going to try."Read Replies (0)
By msmash from Slashdot's how-they-work department
Google has published an Infrastructure Security Design Overview that explains how it secures the cloud it uses for its own operations and for public cloud services. From a report on The Register: The document outlines six layers of security and reveals some interesting factoids about the Alphabet subsidiary's operations, none more so than the disclosure that: "We also design custom chips, including a hardware security chip that is currently being deployed on both servers and peripherals. These chips allow us to securely identify and authenticate legitimate Google devices at the hardware level." That silicon works alongside cryptographic signatures employed "over low-level components like the BIOS, bootloader, kernel, and base operating system image." "These signatures can be validated during each boot or update," the document says, adding that "the components are all Google-controlled, built, and hardened. With each new generation of hardware we strive to continually improve security: for example, depending on the generation of server design, we root the trust of the boot chain in either a lockable firmware chip, a microcontroller running Google-written security code, or the above mentioned Google-designed security chip."Read Replies (0)
By msmash from Slashdot's steering-clear department
An anonymous reader shares a report on CNET: Don't call the new Nintendo Switch a tablet. And don't assume the shape-shifting device for gamers will replace the company's popular 3DS handheld, Nintendo of America President Reggie Fils-Aime said in an interview with CNET. With its latest gadget, Nintendo is playing to win the same game it has for decades: the one that takes place in your living room. "The form factor may be that it looks like [a tablet]," he said. "But...it's a home console that you can take with you and play anywhere with anyone." [...] "With Zelda, with Kart, with Xenoblade, I think the initial consumer for Switch will be more young adults with disposable incomes, given the price points and the large library," Fils-Aime said. That doesn't mean Nintendo is ditching its core audience. The company will continue to skew toward a younger crowd with the 3DS. "In the end, we want people of all ages engaging with Mario and Zelda and the content that's available across both platforms," Fils-Aime said.Read Replies (0)
By msmash from Slashdot's shape-of-things-to-come department
Microsoft and its competitors should eschew artificial intelligence systems that replace people instead of maximizing their time, CEO Satya Nadella said in an interview on Monday. From the report: "The fundamental need of every person is to be able to use their time more effectively, not to say, 'let us replace you'," Nadella said in an interview at the DLD conference in Munich. "This year and the next will be the key to democratizing AI. The most exciting thing to me is not just our own promise of AI as exhibited by these products, but to take that capability and put it in the hands of every developer and every organization. [...] There's a thin line between hubris and confidence," Nadella said. "Always there is risk of hubris coming back, missing trends. The only long-term indicator of success is, âhow good is your internal culture?'" "What I've learned if anything in three years as CEO is, it's not about celebrating one product," he said. "That, to me, is the sign of a company that's built to last. In tech it's even more harsh."Read Replies (0)
By EditorDavid from Slashdot's cumulative-casualties department
Remember how Microsoft switched to cumulative updates? Now Computerworld points out that that's bringing another change. An anonymous reader quotes their report:
Microsoft next month will stop issuing detailed security bulletins, which for nearly 20 years have provided individual users and IT professionals information about vulnerabilities and their patches... A searchable database of support documents will replace the bulletins; that database has been available, albeit in preview, since November on the portal Microsoft dubbed the "Security Updates Guide," or SUG. The documents stored in the database are specific to a vulnerability on an edition of Windows, or a version of another Microsoft product. They can be sorted and filtered by the affected software, the patch's release date, its CVE identifier, and the numerical label of the KB, or "knowledge base" support document.
Redmond Magazine reports that Microsoft still plans to continue to issue its security advisories, and to issue "out-of-band" security update releases as necessary.Read Replies (0)
By EditorDavid from Slashdot's marking-the-cards department
Phil Ivey is a professional poker player who's won ten World Series of Poker bracelets -- but he's also got a new game. An anonymous reader write:
In 2012, Ivey requested that the Borgata casino let him play baccarat with an assistant named Cheng Yin Sun while using a specific brand of playing cards -- purple Gemaco Borgata playing cards -- and an automatic shuffler. He then proceeded to win $9.6 million over four visits. The pair would rotate certain cards 180 degrees, which allowed them to recognize those cards the next time they passed through the deck. (They were exploiting a minute lack of a symmetry in the pattern on the backs of the cards...)
But last month a U.S. district judge ruled that Ivey and his partner had a "mutual obligation" to the casino, in which their "primary obligation" was to not use cards whose values would be known to them -- and ordered them to return the $9.6 million [PDF]. "What this ruling says is a player is prohibited from combining his skill and intellect and visual acuity to beat the casino at its own game," Ivey's attorney told the AP, adding that the judge's ruling will be appealed.
The judge also ruled Ivey had to return the money he later won playing craps with his winnings from the baccarat game -- though the judge denied the casino's request for restitution over the additional $250,000 worth of goods and services they'd "comped" Ivey during his stay.Read Replies (0)
By EditorDavid from Slashdot's overdue department
"We're excited to double down on the findings of Ready to Code 1," says one Google program manager, "by equipping librarians with the knowledge and skills to cultivate computational thinking and coding skills in our youth."
Citing the need to fill "500,000 current job openings in the field of computer science," the American Library Association argues in a new whitepaper that "all 115,000 of the nation's school and public libraries are crucial community partners to guarantee youth have skills essential to future employment and civic participation"... The ALA's Google-funded "Libraries Ready to Code" project has entered Phase II, which aims to "equip Master's in Library Science students to deliver coding programs through public and school libraries and foster computational thinking skills among the nation's youth."
"Libraries play a vital role in our communities, and Google is proud to build on our partnership with ALA," added Hai Hong, who leads US outreach on Google's K-12 Education team... "Given the ubiquity of technology and the half-a-million unfilled tech jobs in the country, we need to ensure that all youth understand the world around them and have the opportunity to develop the essential skills that employers -- and our nation's economy -- require."Read Replies (0)
By EditorDavid from Slashdot's AI-roller department
schwit1 quotes the Associated Press: There's a new thrill on the streets of downtown Las Vegas, where high- and low-rollers alike are climbing aboard what officials call the first driverless electric shuttle operating on a public U.S. street. The oval-shaped shuttle began running Tuesday as part of a 10-day pilot program, carrying up to 12 passengers for free along a short stretch of the Fremont Street East entertainment district. The vehicle has a human attendant and computer monitor, but no steering wheel and no brake pedals. Passengers push a button at a marked stop to board it. The shuttle uses GPS, electronic curb sensors and other technology, and doesn't require lane lines to make its way. The shuttle -- which they've named Arma -- is traveling at 15 miles per hour, and the ride is smooth, according to the mayor of Las Vegas. ("It's clean and quiet and seats comfortably.") They've blocked all the side streets, so the shuttle doesn't have to deal with traffic signals yet, though eventually they'll install special transmitters at every intersection to communicate whether the lights are red or green, and the city plans to deploy more of the vehicles by the end of the year.Read Replies (0)
By EditorDavid from Slashdot's parenthetically-speaking department
Drawing on Haskell, Clojure, and ML, the new Lux language first targeted the Java Virtual Machine, but will be a universal, cross-platform language. An anonymous reader quotes JavaWorld:
Currently in an 0.5 beta release, Lux claims that while it implements features common to Lisp-like languages, such as macros, they're more flexible and powerful in Lux... [W]hereas Clojure is dynamically typed, as many Lisp-like languages have been, Lux is statically typed to reduce bugs and enhance performance. Lux also lets programmers create new types programmatically, which provides some of the flexibility found in dynamically typed languages. The functional language Haskell has type classes, but Lux is intended to be less constraining. Getting around any constraints can be done natively to the language, not via hacks in the type system.
There's a a 16-chapter book about the language on GitHub.Read Replies (0)
By EditorDavid from Slashdot's sensitive-data-breach department
Long-time Slashdot reader t0qer writes:
I'm the IT director at a medical marijuana dispensary. Last week the point of sales system we were using was hacked... What scares me about this breach is, I have about 30,000 patients in my database alone. If this company has 1,000 more customers like me, even half of that is still 15 million people on a list of people that "Smoke pot"...
" No patient, consumer, or client data was ever extracted or viewed," the company's data directory has said. "The forensic analysis proves that. The data was encrypted -- so it couldn't have been viewed -- and it was never extracted, so nobody has it and could attempt decryption." They're saying it was a "targeted" attack meant to corrupt the data rather than retrieve it, and they're "reconstructing historical data" from backups, though their web site adds that their backup sites were also targeted.
"In response to this attack, all client sites have been migrated to a new, more secure environment," the company's CEO announced on YouTube Saturday, adding that "Keeping our client's data secure has always been our top priority." Last week one industry publication had reported that the outage "has sent 1,000 marijuana retailers in 23 states scrambling to handle everything from sales and inventory management to regulatory compliance issues."Read Replies (0)
By EditorDavid from Slashdot's bienvenido-amigos department
There's been a dramatic change in one of the world's least-connected countries. An anonymous reader quotes the AP:
Since the summer of 2015, the Cuban government has opened 240 public Wi-Fi spots in parks and on street corners across the country... The government estimates that 100,000 Cubans connect to the internet daily. A new feature of urban life in Cuba is the sight of people sitting at all hours on street corners or park benches, their faces illuminated by the screen of smartphones connected by applications such as Facebook Messenger to relatives in Miami, Ecuador or other outposts of the Cuban diaspora...
Cuban ingenuity has spread internet far beyond those public places: thousands of people grab the public signals through commercially available repeaters, imported illegally into Cuba and often sold for about $100 -- double the original price. Mounted on rooftops, the repeaters grab the public signals and create a form of home internet increasingly available in private rentals for tourists and cafes and restaurants for Cubans and visitors alike.
The article also points out that last month, for the first time ever, 2,000 Cubans began receiving home internet access.Read Replies (0)