By EditorDavid from Slashdot's popularity-contests department
A funny thing happened when Net Applications' statistics began excluding fake traffic from ad-defrauding bots. Computerworld reports:
Microsoft's Edge browser is less popular with Windows 10 users than earlier thought, if revised data from a U.S. analytics vendor can be believed. According to Net Applications of Aliso Viejo, Calif., Edge has been designated the primary browser by fewer than one in six Windows 10 users for more than a year and a half. That's a significant downgrading of Edge's user share statistics from the browser's portrayal before this month...
By comparing Edge's old and new shares, it was evident that as much as half of the earlier Edge traffic had been faked by bots. The portion of Edge's share credited to bots fluctuated month to month, but fell below 30% in only 4 of the 19 months for which Net Applications provided data... Microsoft's legacy browser, Internet Explorer (IE) also was revealed as a Potemkin village. Under the old data regime, which included bots, IE's user share was overblown, at times more than double the no-bots reality. Take May 2016 as an example. With bots, Net Applications pegged IE at 33.7%; without bots, IE's user share dwindled to just 14.9%. Together, IE and Edge - in other words, Microsoft's browsers - accounted for only 16.3% of the global user share last month using Net Applications' new calculations... In fact, the combined IE and Edge now face a once unthinkable fate: falling beneath Mozilla's Firefox.
StatCounter's stats on browser usage already show more people have already been using Firefox than both of Microsoft's browsers combined -- in 12 of the last 13 months.Read Replies (0)
By EditorDavid from Slashdot's throwing-exceptions department
Slashdot reader Grady Martin writes:
I disrespect people who describe their work in highfalutin terms... However, describing my own work as "programming solutions to problems" is little more than codifying what just about anyone can perceive through intuition. Case in point: Home for the holidays, I was asked about recent accomplishments and attempted to explain the process of producing compact visualizations of branched undo/redo histories.
Responses ranged from, "Well, duh," to, "I can already do that in Word"...
It's the "duh" that I want to address, because of course an elegant solution seem obvious after the fact: Such is the nature of elegance itself. Does anyone have advice on making elegance sound impressive?
An anonymous Slashdot reader left this suggestion for explaining your work to non-programmers. "Don't. I get sick when I hear the bullshit artists spew crap out of their mouth when they have no idea wtf they're talking about. Especially managers..."
But how about the rest of you? How can programmers explain their work to non-programmers?Read Replies (0)
By EditorDavid from Slashdot's magic-internet-money department
An anonymous reader quotes Ars Technica:
Bitcoin's price set a new record on Saturday as the virtual currency rose above $19,000 for the first time on the Bitstamp exchange. The gains came just hours after the currency crossed the $18,000 mark. Bitcoin's value has doubled over the last three weeks, and it's up more than 20-fold over the last year.
Bitcoin's value keeps rising despite a growing chorus of experts who say the currency value is an unsustainable bubble. One CNBC survey this week found that 80 percent of Wall Street economists and market strategists saw bitcoin's rise as a bubble, compared to just two percent who said the currency's value was justified. Another survey reported by The Wall Street Journal this week found that 51 out of 53 economists surveyed thought bitcoin's price was an unsustainable bubble.
Less than a month ago, Bitcoin was selling for $8,000.Read Replies (0)
By EditorDavid from Slashdot's framing-the-framework-debate department
On the front end, React remains the dominant framework. However, the survey found interest in Vue is steadily increasing, while Angular is losing steam. Developers are at a 3.8 [on a scale up to 5] when it comes to their overall happiness with front-end tools. On the back end, Express is by far the most popular contender with Koa, Meteor and Hapi slowly making their way behind Express. For testing, Jest and Enzyme stand out with high satisfaction ratings.
By EditorDavid from Slashdot's unidentifiably-funded-objects department
Long-time Slashdot reader Joosy writes, "Until 2012 the Pentagon had a program, the 'Advanced Aerospace Threat Identification Program', that tracked unidentified flying objects." An anonymous reader writes:
The Pentagon finally acknowledged the existence of the $22 million program today to the New York Times, while also claiming that they closed the program five years ago. "But its backers say that, while the Pentagon ended funding for the effort at that time, the program remains in existence. For the past five years, they say, officials with the program have continued to investigate episodes brought to them by service members, while also carrying out their other Defense Department duties."
Over the years the program "produced documents that describe sightings of aircraft that seemed to move at very high velocities with no visible signs of propulsion, or that hovered with no apparent means of lift. Officials with the program have also studied videos of encounters between unknown objects and U.S. military aircraft." But ultimately, a Pentagon spokesman said, "It was determined that there were other, higher priority issues that merited funding, and it was in the best interest of the DoD to make a change."Read Replies (0)
By EditorDavid from Slashdot's local-newspapers department
An anonymous reader quotes Bloomberg:
Google moved to strip from its news search results publications that mask their country of origin or intentionally mislead readers, a further step to curb the spread of fake news that has plagued internet companies this year. To appear in Google News results, websites must meet broad criteria set out by the company, including accurately representing their owners or primary purposes. In an update to its guidelines released Friday, the search giant added language stipulating that publications not "engage in coordinated activity to mislead users."
Additionally the new rules read: "This includes, but isn't limited to, sites that misrepresent or conceal their country of origin or are directed at users in another country under false premises." A popular tactic for misinformation campaigns is to pose as a credible U.S. news outlet. Russian Internet Research Agency, a Kremlin-backed organization, used that technique to reach an audience of nearly 500,000 people, spread primarily through Twitter accounts, Bloomberg reported earlier.Read Replies (0)
By EditorDavid from Slashdot's face-the-music department
"Our machines can very easily recognise you among at least 2 billion people in a matter of seconds," says the chief executive and co-founder of Yitu. The South China Morning Post reports:
Yitu's Dragonfly Eye generic portrait platform already has 1.8 billion photographs to work with: those logged in the national database and you, if you have visited China recently... 320 million of the photos have come from China's borders, including ports and airports, where pictures are taken of everyone who enters and leaves the country. According to Yitu, its platform is also in service with more than 20 provincial public security departments, and is used as part of more than 150 municipal public security systems across the country, and Dragonfly Eye has already proved its worth. On its very first day of operation on the Shanghai Metro, in January, the system identified a wanted man when he entered a station. After matching his face against the database, Dragonfly Eye sent his photo to a policeman, who made an arrest. In the following three months, 567 suspected lawbreakers were caught on the city's underground network. The system has also been hooked up to security cameras at various events; at the Qingdao International Beer Festival, for example, 22 wanted people were apprehended.
Whole cities in which the algorithms are working say they have seen a decrease in crime. According to Yitu, which says it gets its figures directly from the local authorities, since the system has been implemented, pickpocketing on Xiamen's city buses has fallen by 30 per cent; 500 criminal cases have been resolved by AI in Suzhou since June 2015; and police arrested nine suspects identified by algorithms during the 2016 G20 summit in Hangzhou. Dragonfly Eye has even identified the skull of a victim five years after his murder, in Zhejiang province.
The company's CEO says it's impossible for police to patrol large cities like Shanghai (population: 24,000,000) without using technology.
< article continued at Slashdot's face-the-music department
>Read Replies (0)
By EditorDavid from Slashdot's dubious-about-DRM department
"There is no reason for the open-source community to worry..." writes Daniel Stone, who heads the graphics team at open-source consultancy Collabora. mfilion quotes Collabora.com:
Recently, Sean Paul from Google's ChromeOS team, submitted a patch series to enable HDCP support for the Intel display driver. HDCP is used to encrypt content over HDMI and DisplayPort links, which can only be decoded by trusted devices... However, if you already run your own code on a free device, HDCP is an irrelevance and does not reduce freedom in any way....
HDCP support is implemented almost entirely in the hardware. Rather than adding a mandatory encryption layer for content, the HDCP kernel support is dormant unless userspace explicitly requests an encrypted link. It then attempts to enable encryption in the hardware and informs userspace of the result. So there's the first out: if you don't want to use HDCP, then don't enable it! The kernel doesn't force anything on an unwilling userspace.... HDCP is only downstream facing: it allows your computer to trust that the device it has been plugged into is trusted by the HDCP certification authority, and nothing more. It does not reduce user freedom, or impose any additional limitations on device usage.Read Replies (0)
By EditorDavid from Slashdot's spicing-things-up department
Long-time Slashdot reader WindBourne tipped us off to some news from The South China Morning Post:
China is to spend 22 billion yuan (US$3.3 billion) trying to perfect a form of technology largely discarded in the cold war which could produce a safer but more powerful form of nuclear energy. The cash is to develop two "molten salt" reactors in the Gobi Desert in northern China. Researchers hope that if they can solve a number of technical problems the reactors will lead to a range of applications, including nuclear-powered warships and drones. The technology, in theory, can create more heat and power than existing forms of nuclear reactors that use uranium, while producing only one thousandth of the radioactive waste. It also has the advantage for China of using thorium as its main fuel. China has some of the world's largest reserves of the metal...
The reactors use molten salt rather than water as a coolant, allowing them to create temperatures of over 800 degrees Celsius, nearly three times the heat produced by a commercial nuclear plant fuelled with uranium. The superhot air has the potential to drive turbines and jet engines and in theory keep a bomber flying at supersonic speed for days.
One Beijing researcher says these drones "would serve as a platform for surveillance, communication or weapon delivery to deter nuclear and other threats from hostile countries." He asked not to be named, but provided one more advantage for a nuclear-powered drone flying at high-altitudes over the ocean.
"It will also have more public acceptance. If an accident happens, it crashes into the sea."Read Replies (0)
By EditorDavid from Slashdot's a-new-hope department
An anonymous reader quotes the New York Post:
SpaceX racked up another first on Friday, launching a recycled rocket with a recycled capsule on a grocery run for NASA. The unmanned Falcon rocket blasted off with a just-in-time-for-Christmas delivery for the International Space Station, taking flight again after a six-month turnaround. On board was a Dragon supply ship, also a second-time flier. It was NASA's first use of a reused Falcon rocket and only the second of a previously flown Dragon.
Within 10 minutes of liftoff, the first-stage booster was back at Cape Canaveral Air Force Station, standing upright on the giant X at SpaceX's landing zone. That's where it landed back in June following its first launch. Double sonic booms thundered across the area. At SpaceX headquarters in Hawthorne, California, cheers erupted outside the company's glassed-in Mission Control, where chief executive Elon Musk joined his employees.
The Dragon reaches the space station Sunday. The capsule last visited the 250-mile-high outpost in 2015. This time, the capsule is hauling nearly 5,000 pounds of goods, including 40 mice for a muscle-wasting study, a first-of-its-kind impact sensor for measuring space debris as minuscule as a grain of sand and barley seeds for a germination experiment by Budweiser, already angling to serve the first beer on Mars.
Also onboard were several hundred Star Wars mission patches created by a partnership between Lucasfilm and the Center for the Advancement of Science in Space (the non-profit organization managing the ISS National Lab). Space.com reports that Elon Musk named the Falcon X after the original Millennium Falcon in Star Wars.Read Replies (0)
By EditorDavid from Slashdot's rabble-rouser-resurrections department
"Gawker may soon return from the dead," reports TechCrunch.
While Univision acquired most of Gawker Media's sites last year (and renamed them as the Gizmodo Media Group), the deal didn't include Gawker itself. In fact, BuzzFeed reported last month that a bankruptcy administrator has not been able to find a buyer for the Gawker site, and that lawyers for Peter Thiel (the billionaire venture capitalist who helped fund the lawsuit that led to Gawker's bankruptcy) were arguing that he'd been unfairly excluded from the process. Now a group of former Gawker employees calling themselves the Gawker Foundation has launched a Kickstarter campaign to buy the old domain and relaunch with a nonprofit, membership-funded model.
"The truth is often inconvenient, and Gawker's work isn't done," explains a mirror of their campaign site at SaveGawker.com. "We want to dig deeper." $10 pledges get you a laptop sticker, $250 pledges earn you an invite to their glorious re-launch party, and to solicit $10,000 pledges they're even asking wealthy backers to "Give us half of one bitcoin."
"By setting ourselves up as an ownerless, advertiser-less, non-profit media organization, the editorial team will be able to do what they do best. More than a dozen Gawker Media alumni are involved in this project..."Read Replies (0)
By msmash from Slashdot's digging-to-the-new-bottom department
The judge in the $1.9 billion civil suit between Google-parent company Alphabet's self-driving car unit Waymo and Uber released the letter of a disgruntled former employee -- former Uber security officer Richard Jacobs -- on Friday, laying bare a number of explosive allegations against the ride-hailing company that include corporate espionage, unlawful surveillance, illegal wiretapping, bribery of foreign officials, and illicit hacking. From a report: The letter read: "This program, formerly known as the Strategic Services Group, under Nick Gicinto, collected intelligence and conducted unauthorized surveillance, including unauthorized recording of private conversations against executives from competitor firms, such as DiDi Chuxing and against its own employees and contractors at the Autonomous Technologies Group in Pittsburgh." Jacobs testified in court and walked back some of the allegations made in the letter, which was written by his attorney, Clayton Halunen. Days later, Uberâ(TM)s new chief legal officer Tony West issued a directive to employees to stop surveilling individuals, which Recode first reported. In a separate note to staff Khosrowshahi (current CEO of Uber) said the letter detailed enough to "merit serious concern." While Jacobs, Padilla (Uber's general counsel) and other employees addressed some of the claims made within the letter -- confirming the use of Wickr for business-related communications -- the letter itself had not been made public before Friday evening. The document prepared by Jacobs' attorney also claimed Uber was using some of these surveillance tactics on Alphabet's self-driving arm, Waymo. However, during his testimony, Jacobs walked that allegation back.Read Replies (0)
By BeauHD from Slashdot's consider-yourself-warned department
The California Department of Public Health (CDPH) issued a warning against the hazards of cellphone radiation this week. They are asking people to decrease their use of these devices and suggest keeping your distance when possible. TechCrunch reports: The warning comes after findings were offered up this week from a 2009 department document, which was published after an order from the Sacramento Superior Court. A year ago, UC Berkeley professor Joel Moskowitz initiated a lawsuit to get the department to release the findings after he started looking into whether mobile phone use increased the risk of tumors. A draft of the document was released in March, but the final release is more extensive.
According to the Federal Communication Commission's website, there is no national standard developed for safety limits. However, the agency requires cell phone manufacturers to ensure all phones comply with "objective limits for safe exposure." The CDPH recommends not keeping your phone in your pocket, not putting it up to your ear for a prolonged amount of time, keeping use low if there are two bars or less, not sleeping near it at night and to be aware that if you are in a fast-moving car, bus or train, your phone will emit more RF energy to maintain the connection.Read Replies (0)
By BeauHD from Slashdot's new-and-improved department
Chrome 64 is now in beta and it has several new features over version 63. In addition to a stronger pop-up blocker and support for HDR video playback when Windows 10 is in HDR mode, Chrome 64 features sitewide audio muting to block sound when navigating to other pages within a site. 9to5Google reports: An improved pop-up blocker in Chrome 64 prevents sites with abusive experiences -- like disguising links as play buttons and site controls, or transparent overlays -- from opening new tabs or windows. Meanwhile, as announced in November, other security measures in Chrome will prevent malicious auto-redirects. Beginning in version 64, the browser will counter surprise redirects from third-party content embedded into pages. The browser now blocks third-party iframes unless a user has directly interacted with it. When a redirect attempt occurs, users will remain on their current page with an infobar popping up to detail the block. This version also adds a new sitewide audio muting setting. It will be accessible from the permissions dropdown by tapping the info icon or green lock in the URL bar. This version also brings support for HDR video playback when Windows 10 is in HDR mode. It requires the Windows 10 Fall Creator Update, HDR-compatible graphics card, and display. Meanwhile, on Windows, Google is currently prototyping support for an operating system's native notification center. Other features include a new "Split view" feature available on Chrome OS. Developers will also be able to take advantage of the Resize Observer API to build responsive sites with "finger control to observe changes to sizes of elements on a page."Read Replies (0)
By BeauHD from Slashdot's make-believe department
An anonymous reader quotes a report from Nature: One widely repeated estimate, reported in a controversial article in Science in 1990, suggests that more than half of all academic articles remain uncited five years after their publication. Scientists genuinely fret about this issue, says Jevin West, an information scientist at the University of Washington in Seattle who studies large-scale patterns in research literature. After all, citations are widely recognized as a standard measure of academic influence: a marker that work not only has been read, but also has proved useful to later studies. Researchers worry that high rates of uncitedness point to a heap of useless or irrelevant research. In reality, uncited research isn't always useless. What's more, there isn't really that much of it, says Vincent Lariviere, an information scientist at the University of Montreal in Canada.
< article continued at Slashdot's make-believe department
>Read Replies (0)