By BeauHD from Slashdot's everything-is-connected department
An anonymous reader quotes a report from InfoWorld: Sometimes the relationships between the data you've gathered are more important than the data itself. That's when a graph processing system comes in handy. It's an important but often poorly understood method for exploring how items in a data set are interrelated. Microsoft's been exploring this area since at least 2013, when it published a paper describing the Trinity project, a cloud-based, in-memory graph engine. The fruits of the effort, known as the Microsoft Graph Engine, are now available as an MIT-licensed open source project as an alternative to the likes of Neo4j or the Linux Foundation's recently announced JanusGraph. Microsoft calls Graph Engine (GE) as "both a RAM store and a computation engine." Data can be inserted into GE and retrieved at high speed since it's kept in-memory and only written back to disk as needed. It can work as a simple key-value store like Memcached, but Redis may be the better comparison, since GE stores data in strongly typed schemas (string, integer, and so on). How does all this shape up against the leading open source graph database, Neo4j? For one, Neo4j has been in the market longer and has an existing user base. It's also available in both an open source community edition and a commercial product, whereas GE is only an open source project right now.Read Replies (0)
Ransomware Insurance Is Coming
Posted by News Fetcher on February 13 '17 at 04:02 PM
By BeauHD from Slashdot's times-are-changing department
Trailrunner7 quotes a report from On the Wire: As bad as the ransomware problem is right now -- and it's plenty bad -- we're likely only at the beginning of what could become a crisis, experts say. "Lots of people are being infected and lots of people are paying. The bottom line its it's getting worse and it's going to continue to do so," Jeremiah Grossman, chief of security strategy at SentinelOne, said during a talk on the ransomware epidemic at the RSA Conference here Monday. "Seven-figure ransoms have already been paid. When you're out of business, you'll pay whatever you have to in order to stay in business. You're dealing with an active, sentient adversary." The ransomware market seems to be headed in the same direction as real-world kidnapping, where high-profile targets take out insurance policies to pay ransoms. Grossman said it probably won't be long before the insurance companies latch onto the ransomware game, too. "The insurance companies are going to see a large profit potential in this. Kidnapping and ransom insurance is still very boutique. This economic model will probably apply equally well to ransomware," he said. According to The FindLaw Corporate Counsel Blog, "Ransomware attacks fall under your cyber insurance policy's 'cyber extortion' coverage and can generally be considered "first-party" or "third-party" coverage, according to Christine Marciano, president of Cyber Data Risk Managers. Third-party coverage would likely leave a company uninsured when they are the victims of a ransomware attack. Even if your insurance policy covers ransomware attacks made against your company, the deductible may be so high that the company will be stuck paying any ransomware demands out of pocket (should the company decide to pay to decrypt its data). And your coverage may be sub-limited to relatively small amounts, according Kevin Kalinich, the global cyber risk practice leader for Aon Risk Solutions. A $10 million policy may only provide $500,000 for cyber extortion claims, he explains."Read Replies (0)
By BeauHD from Slashdot's pay-the-piper department
An anonymous reader writes: After five years of litigation at various levels of the U.S. legal system, today, following the conclusion of a jury trial, Google was ordered to pay $20 million to two developers after a jury ruled that Google had infringed on three patents when it designed Chrome's sandboxing feature. Litigation had been going on since 2012, with Google winning the original verdict, but then losing the appeal. After the Supreme Court refused to listen to Google's petition, they sent the case back for a retrial in the U.S. District Court in Eastern Texas, the home of all patent trolls. As expected, Google lost the case and must now pay $20 million in damages, in the form of rolling royalties, which means the company stands to pay more money as Chrome becomes more popular in the future.Read Replies (0)
By msmash from Slashdot's taking-a-step-back department
Roger Fingas, writing for AppleInsider: Apple has temporarily stopped sales of LG's UltraFine 5K monitor, due to technical problems associated with a lack of proper shielding from wireless interference. Over the weekend, Apple retail staff were told to keep the product on display yet not sell any units if people asked, according to a Business Insider source. The site added that it heard the same from a representative at a New York Apple store. Separately, AppleInsider has confirmed the organized removal from sale of the Thunderbolt 3 display. Sources inside Apple not authorized to speak on behalf of the company indicated that retail locations are retaining demonstration displays, but not selling any stock on-hand that it may receive that may actually have the shielding fix, nor filling any pending orders until otherwise informed. Big blow to Apple, which has given up on external monitors business. But at least, it's comforting to know people who wish to purchase a new display for their MacBook or MacBook Pro have several company-approved alternatives. Oh wait, they don't.Read Replies (0)
By BeauHD from Slashdot's high-ground department
Mr D from 63 quotes a report from The Washington Post: About 188,000 residents near Oroville, Calif., were ordered to evacuate Sunday after a hole in an emergency spillway in the Oroville Dam threatened to flood the surrounding area. Thousands clogged highways leading out of the area headed south, north and west, and arteries major and minor remained jammed as midnight approached on the West Coast -- though by early Monday, Lake Oroville's water level had dropped to a point at which water was no longer spilling over. The lake level reached its peak of 902.59 feet at about 3 a.m. Sunday and dropped to 898 feet by 4 a.m. Monday, according to the Sacramento Bee. Water flows over the emergency spillway at 901 feet. "The drop in the lake level was early evidence that the Department of Water Resources' desperate attempt to prevent a catastrophic failure of the dam's emergency spillway appeared to be paying dividends," the Bee reported Monday. Officials doubled the flow of water out of the nearly mile-long primary spillway to 100,000 cubic feet per second. The normal flow is about half as much, but increased flows are common at this time of year, during peak rain season, officials said. But water officials warned that damaged infrastructure could create further dangers as storms approach in the week ahead, and it remained unclear when residents might be able to return to their homes.Read Replies (0)
By msmash from Slashdot's analogies department
In a wide-ranging interview, Mike McCue, CEO of news curator app Flipboard, talked about how -- and from where -- people get their news nowadays and how it shapes their worldview. From a report: McCue said getting all your news from either friends or algorithms is "challenging and semi-dangerous" because today's social platforms, like Twitter and Facebook, favor content that people engage with, driving "extremist" content to the top. Hence, he argues, the "fake news" epidemic, which McCue believes had an effect on the 2016 election. "Sometimes I think of news feeds as the 'mystery meat' of your information diet," he said. "It's not like you finish reading your Facebook feed, after half an hour, and feel like, 'That was a great use of time!' It's like if you ate potato chips all day long."Read Replies (0)
By msmash from Slashdot's how-we-live department
For a fun new entry into millennials are lazy, consider this: According to new data tracked down by Richard Fry for Pew Research, just 20 percent of 25- to 35-year-olds (Old Millennials, if you will) reported having lived at a different address the previous year. From a report on NYMag: In 2000, a full 26 percent of Gen-Xers -- then at the same age range -- had reported making a move in the previous year. In 1963, members of the Silent Generation moved at a 26 percent rate, too. The census data being used here doesn't include college-dorm moves prevalent with 18- to 24-year-olds, so those young'uns are left out of the analysis. The 20 percent rate is the lowest level of young adult mobility in half a century, Fry reports, and all this with millennials getting married, owning homes, and having kids less than previous generations. Student debt and less favorable lending rates may be driving down homeownership -- imagine that -- which further reduces movement. Psychologically, this also means that young adults are more stuck with their personalities and faded of memory compared with their more mobile peers.Read Replies (0)
By msmash from Slashdot's encrypted-emails department
Bristol-based software developer James Stanley, who used to work at Netcraft, shares how encrypted emails, something which was first introduced over 25 years ago, is still difficult to setup and use for even reasonably tech savvy people. He says he recently tried to install Enigmail, a Thunderbird add-on, but not only things like GPG, PGP, OpenPGP were -- for no reason -- confusing, Enigmail continues to suffer from a bug that takes forever in generating keys. From his blog post: Encrypted email is nothing new (PGP was initially released in 1991 -- 26 years ago!), but it still has a huge barrier to entry for anyone who isn't already familiar with how to use it. I think my experience would have been better if Enigmail had generated keys out-of-the-box, or if (a.) gpg agreed with Enigmail on nomenclature (is it a secring or a private key?) and (b.) output the paths of the files it had generated. My experience would have been a lot worse had I not been able to call on the help of somebody who already knows how to use it.Read Replies (0)
By msmash from Slashdot's shape-of-things-to-come department
Billionaire Elon Musk is known for his futuristic ideas. So it didn't come as a surprise when on Monday at the World Government Summit in Dubai, he predicted that over time we will see a "closer merger of biological intelligence and digital intelligence." He added, via a CNBC report: "It's mostly about the bandwidth, the speed of the connection between your brain and the digital version of yourself, particularly output." Musk explained what he meant by saying that computers can communicate at "a trillion bits per second", while humans, whose main communication method is typing with their fingers via a mobile device, can do about 10 bits per second. In an age when AI threatens to become widespread, humans would be useless, so there's a need to merge with machines, according to Musk. "Some high bandwidth interface to the brain will be something that helps achieve a symbiosis between human and machine intelligence and maybe solves the control problem and the usefulness problem," Musk explained.Read Replies (0)
By msmash from Slashdot's fewer-to-come-by department
An anonymous reader shares a MercuryNews report: Job growth in the tech industry used to zoom like a race car, but these days, hiring by this principal driver of the Bay Area's economy chugs along more like a family SUV. The technology industry's job growth in the nine-county region has dramatically decelerated, according to this newspaper's analysis of figures released by state labor officials and Beacon Economics. Tech's annual job growth throttled back to 3.5 percent, or 26,700 new jobs, in 2016. That's much slower than the 6 percent annual gain of 42,300 jobs in 2015, or the 6.4 percent gain in 2014. And while the industry's 3.5 percent growth last year is still a sturdy annual pace, Bay Area technology companies have already disclosed plans to slash about 2,000 jobs in the first three months of 2017.Read Replies (0)
By msmash from Slashdot's anti-productivity department
Barb Darrow, writing for Fortune: Corporate IT pros face the unenviable task of trying to protect valuable data from threats that change all the time. One vector of attack is clearly smartphones and tablets that employees use both for work and pleasure. To that end, mobile device management firm MobileIron just came out with its latest tally of the ten most blacklisted apps, based on a survey of 7,800 companies worldwide. Angry Birds tops the list of most-banned apps at companies worldwide, as well as in Australia, the U.S., and government sectors tracked by MobileIron in its twice-yearly Mobile Security and Risk Review. The survey covers the use of Android, iOS, and Windows devices from Oct. 1, 2016 and Dec. 31, 2016.Read Replies (0)
By EditorDavid from Slashdot's and-ESR-still-does department
Open source guru Eric Raymond turns 60 this year, prompting this question from an anonymous reader:
Eric Raymond's newest writing project is "Things Every Hacker Once Knew," inspired by the day he learned that not every programmer today's knows the bit structure of ASCII. "I didn't write it as a nostalgia trip -- I don't miss underpowered computers, primitive tools, and tiny low-resolution displays... In any kind of craft or profession, I think knowing the way things used to be done, and the issues those who came before you struggled with, is quite properly a source of pride and wisdom. It gives you a useful kind of perspective on today's challenges."
He writes later that it's to "assist retrospective understanding by younger hackers so they can make sense of the fossils and survivals still embedded in current technology." It's focusing on ASCII and "related technologies" like hardware terminals, modems and RS-232. ("This is lore that was at one time near-universal and is no longer.") Sections include "UUCP and BBSes, the forgotten pre-Internets" and "The strange afterlife of the Hayes smartmodem" (which points out some AT commands survived to this day in smartphones). He requests any would-be contributors to remember that "I'm trying to describe common knowledge at the time." This got my thinking -- what are some that every programmer once knew that have since been forgotten by newer generations of programmers?
Eric Raymond is still hard at work today on the NTPsec project -- a secure, hardened, and improved implementation of Network Time Protocol -- and he promises donations to his Patreon page will help fund it. But what things do you remember that were commonplace knowledge "back in the day" that have now become largely forgotten? Leave your best answers in the comments. What are some things that every hacker once knew?Read Replies (0)
By EditorDavid from Slashdot's 24-years-young department
ZDNet summarizes some of the surprises in this year's poll on LinuxQuestions, "one of the largest Linux groups with 550,000 member". An anonymous reader quotes their report:
The winner for the most popular desktop distribution? Slackware...! Yes, one of the oldest of Linux distributions won with just over 16% of the vote. If that sounds a little odd, it is. On DistroWatch, a site that covers Linux distributions like paint, the top Linux desktop distros are Mint, Debian, Ubuntu, openSUSE, and Manjaro. Slackware comes in 28th place... With more than double the votes for any category, it appears there was vote-stuffing by Slackware fans... The mobile operating system race was a runaway for Android, with over 68% of the vote. Second place went to CyanogenMod, an Android clone, which recently went out of business...
Linux users love to debate about desktop environments. KDE Plasma Desktop took first by a hair's breadth over the popular lightweight Xfce desktop. Other well-regarded desktop environments, such as Cinnamon and MATE, got surprisingly few votes. The once popular GNOME still hasn't recovered from the blowback from its disliked design change from GNOME 2 to GNOME 3.
Firefox may struggle as a web browser in the larger world, but on Linux it's still popular. Firefox took first place with 51.7 percent of the vote. Chrome came in a distant second place, with the rest of the vote being divided between a multitude of obscure browsers.
LibreOffice won a whopping 89.6% of the vote for "best office suite" -- and Vim beat Emacs.Read Replies (0)
By EditorDavid from Slashdot's yearning-to-breathe-free department
Sidd Bikkannavar works at NASA's Jet Propulsion Laboratory. After racing solar-powered cars in Chile, he had trouble returning to America.
mspohr quote The Verge:
Bikkannavar says he was detained by U.S. Customs and Border Patrol and pressured to give the Customs and Border Protection agents his phone and access PIN. Since the phone was issued by NASA, it may have contained sensitive material that wasn't supposed to be shared. Bikkannavar's phone was returned to him after it was searched by CBP, but he doesn't know exactly what information officials might have taken from the device...
The officer also presented Bikkannavar with a document titled "Inspection of Electronic Devices" and explained that CBP had authority to search his phone. Bikkannavar did not want to hand over the device, because it was given to him by JPL and is technically NASA property. He even showed the officer the JPL barcode on the back of phone. Nonetheless, CBP asked for the phone and the access PIN. "I was cautiously telling him I wasn't allowed to give it out, because I didn't want to seem like I was not cooperating," says Bikkannavar. "I told him I'm not really allowed to give the passcode; I have to protect access. But he insisted they had the authority to search it."
While border agents have the right to search devices, The Verge reports that travelers aren't legally required to unlock their phones, "although agents can detain them for significant periods of time if they do not." They also report that Bikkannavar "was not allowed to leave until he gave CBP his PIN," adding that the cybersecurity team at JPL "was not happy about the breach."Read Replies (0)