By msmash from Slashdot's google-mania department
Google will unveil its answer to Amazon's Echo at an event on Tuesday, the New York Times reports. The Google Home device, which looks like an "air freshener," is expected to go on sale later this month (Editor's note: the link could be paywalled; alternate source), the publication added. The Google Home is powered by what Google calls Assistant, which uses "artificial intelligence" to understand what users are saying and respond conversationally with the best answers. "Amazon is the accidental winner here," Scott Galloway, a professor of marketing at the Stern School of Business at New York University, told the paper. "Amazon got there first, which is superimpressive, and it has been a huge hit." From the report: Google is a leader in natural language processing -- the ability to turn spoken words into terms that computers can digest -- and its search engine is the starting point for how most people get answers on the internet. In fact, the company says 20 percent of Google searches on mobile phones are done by voice. So why didn't Google create an Echo-like device before Amazon? In part, Google was hindered by a balkanized structure that prevented different groups within the company from working together, according to four current and former employees. Google, based in Mountain View, Calif., had a large team working on voice search but its focus was on an app for smartphones. The company had a separate team working on the Android operating system, which runs on smartphones, tablets and internet-connected home devices, and they were building virtual assistant technology into mobile devices.Google is also expected to launch two new smartphones, expected to be called Pixel and Pixel XL. Earlier today, both the phones showed up on a retailer's website, revealing their specifications. The Guardian reports: The leaked images show two sizes of the phone -- a regular and "XL" version, USB-C fast charging, a new interface, video calling and the Google Assistant, which first launched within the company's Allo messaging app. Both devices will have 32GB or 128GB of storage, 4GB of RAM, Qualcomm's latest 821 processor, AMOLED screens, fingerprint scanners on the back, an eight-megapixel selfie camera and a 12-megapixel camera on the back with optical image stabilisation, according to the smartphone retailers listings which have since been removed.Read Replies (0)
By msmash from Slashdot's taking-a-stand department
Apple CEO Tim Cook has once again defended his company's hardline approach to security. At Utah Tech Tour event while taking questions from the audience, Cook said, (via BusinessInsider):"This is one of the biggest issues that we face. Encryption is what makes the public safe. As you know, there are people kept alive because the grid is up. If our grid goes down, if there was a grid attack, the public's safety is at risk" -- hence the need for encryption to protect it. "You can imagine defence systems need encryption, because there are a few bad actors in the world who might like to attack those. [...] Some people have tried to make it out to be bad," the chief executive told the audience at the Utah question-and-answer session. "Encryption is inherently great, and we would not be a safe society without it. So this is an area that is very, very important for us... as you can tell from our actions earlier this year, we throw all of ourselves into this." he added. "We're very much standing on principle here."Read Replies (0)
By msmash from Slashdot's 'good-will'-cloud-game department
Microsoft announced on Monday that it plans to build its first Azure data center in France this year as part of its $3 billion investment for building cloud services in Europe. The company today also launched a new publication dubbed, Cloud for Global Good with no fewer than 78 public policy recommendations in 15 categories such as data protection and accessibility issues. TechCrunch adds:The new expansion, investment and "trust" initiative were revealed by Microsoft CEO Satya Nadella, who was speaking at an event in Dublin, Ireland. He said that the expansion would mean that Microsoft covers "more regions than any other cloud provider... In the last year the capacity has more than doubled." As a measure of how Microsoft and Amazon are intent on levelling each other on service availability right now, the news of the French data center comes one month after Amazon announced that it would also be building a data center in France. Nadella, of course, did not mention AWS by name but that is the big elephant in the room for Microsoft. Nadella said today that Microsoft has data centers covering 30 regions across the globe, "more regions than any other cloud provider," with the European footprint including Ireland, the Netherlands, the UK and Germany.An anonymous reader writes: Satya Nadella, currently on a whirlwind tour of Europe, says that Microsoft has now invested over $3 billion in cloud infrastructure in Europe, and will extend that to governance-friendly French data centers in 2017. The company has also released a new publication calling for 78 policy reviews in 15 sectors of Cloud, including an overhaul of the verbose and opaque way that end-users are required to click legal agreements over data, some of which are specious and others of which are critical: "Because data is now collected and used in so many different ways, people can be overwhelmed if constantly presented with privacy choices and requests to consent to data collection. Requiring express consent in every situation could also make it difficult to understand which situations raise serious privacy implications and which are trivial."Read Replies (0)
By EditorDavid from Slashdot's data-dumped department
Vint Cerf "worries about the decreasing longevity of our media, and, thus, about our ability as a civilization to self-document -- to have a historical record that one day far in the future might be remarked upon and learned from." An anonymous Slashdot reader quotes Motherboard:
Magnetic films do not quite have the staying power as clay tablets. Clay tablets are more resilient than papyrus manuscripts are more resilient than parchment are more resilient than printed photographs are more resilient than digital photographs. At stake, according to Cerf, is "the possibility that the centuries well before ours will be better known than ours will be unless we are persistent about preserving digital content.
"The earlier media seem to have a kind of timeless longevity while modern media from the 1800s forward seem to have shrinking lifetimes. Just as the monks and Muslims of the Middle Ages preserved content by copying into new media, won't we need to do the same for our modern content...? Unless we face this challenge in a direct way, the truly impressive knowledge we have collectively produced in the past 100 years or so may simply evaporate with time."
He points out that much of this century's digital documents can't be viewed without software. Do we need to start carving our web pages into clay tablets?Read Replies (0)
By EditorDavid from Slashdot's kernel-of-wisdom department
Slashdot reader prisoninmate brings news from Softpedia:
Today, Linus Torvalds proudly announced the release and availability for download of the Linux 4.8 kernel branch, which is now the latest stable and most advanced one. Linux kernel 4.8 has been in development for the past two months, during which it received no less than eight Release Candidate testing versions that early adopters were able to compile and install on their GNU/Linux operating system to test various hardware components or simply report bugs...
A lot of things have been fixed since last week's RC8 milestone, among which we can mention lots of updated drivers, in particular for GPU, networking, and Non-Volatile Dual In-line Memory Module (NVDIMM), a bunch of improvements to the ARM, MIPS, SPARC, and x86 hardware architectures, updates to the networking stack, as well as to a few filesystem, and some minor changes to cgroup and vm.
The kernel now supports the Raspberry Pi 3 SoC as well as the Microsoft Surface 3 touchscreen.Read Replies (0)
By EditorDavid from Slashdot's phoning-it-in department
"Pitted against the Samsung Galaxy S7, HTC 10 and LG G5, Apple's latest handset came in last place... and by some distance," reports BetaNews. Here's the results of a new test from the U.K. consumer advocacy group, Which?:
We compared the iPhone 7's battery life, when making calls and browsing the web, to those of three top Android competitors: the Samsung Galaxy S7, HTC 10 and LG G5, and the results were staggering. While the iPhone 7's 712 minutes of call time (nearly 12 hours) may sound acceptable, the rival Samsung Galaxy S7 lasted twice as long -- and it doesn't even have the longest lasting battery. The HTC 10 lasted an incredible 1,859 minutes (that's almost 31 hours).
When it comes to internet browsing time, arguably the more important measurement, the results were a lot closer...but the iPhone 7 still came bottom. The 615 minutes of battery life offered by the iPhone 7 is 25 minutes less than its nearest rival, the LG G5, and 175 minutes less than the top performing HTC 10.
The researchers point out that the iPhone 7 has a smaller battery -- but that's leaving critics unimpressed. The Guardian newspaper is asking, "How good can a phone be if the battery doesn't last even a day?"Read Replies (0)
By EditorDavid from Slashdot's mocking-the-auction department
That group auctioning the NSA's hacking tools is "very upset" no one's bidding on them. An anonymous Slashdot reader quotes Motherboard:
"TheShadowBrokers" authored another bizarre rant expressing their annoyance at the seeming lack of interest in ponying up bitcoins to release their full set of stolen files. "Peoples is having interest in free files ... But people is no interest in #EQGRP_Auction," the mysterious hacker group complained in a ranting post on Medium, which seems to be purposely written in Borat-style broken English. "TheShadowBrokers is thinking this is information communication problem."
The message also blindly lashes out at hackers, foreign intelligence services, and basically anyone else who hasn't bid on the files... At the time of this writing, TheShadowBrokers have only received bids for a total of 1.76 bitcoins -- or about $1,082 -- far below the group's asking price of $1 million.
At least five transactions came from a prankster who was trying to Rickroll the group with bitcoin addresses containing the words "Never Gonna Give You Up."Read Replies (0)
By EditorDavid from Slashdot's telnet-botnet department
Remember that historically massive denial-of-service attack last month against security researcher Brian Krebs? The source code's just been leaked, Krebs reports, "virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices." An anonymous Slashdot reader quotes KrebsOnSecurity:
The malware, dubbed "Mirai," spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords. Infected systems can be cleaned up by simply rebooting them -- thus wiping the malicious code from memory. But experts say there is so much constant scanning going on for vulnerable systems that vulnerable IoT devices can be re-infected within minutes of a reboot. Only changing the default password protects them from rapidly being reinfected on reboot...
The user who leaked the source code says "there's lots of eyes looking at IOT now... I usually pull max 380K bots from telnet alone. However, after the Krebs DDoS, ISPs been slowly shutting down and cleaning up their act. Today, max pull is about 300K bots, and dropping"...
Now that the source code has been released online for that 620-Gbps attack, Krebs predicts "there will soon be many Internet users complaining to their ISPs about slow Internet speeds as a result of hacked IoT devices on their network hogging all the bandwidth. On the bright side, if that happens it may help to lessen the number of vulnerable systems."
He points out that 5.5 million new things get connected to the internet each day, according to Gartner. And they're also predicting that 6.4 billion things will be connected to the internet by the end of the year -- reaching 20.8 billion over the next four years.Read Replies (0)
By msmash from Slashdot's complicated-things department
The U.S. has given up its remaining control over the Internet. The formal handover, which took effect on Saturday, followed a last-ditch attempt by a group of Republicans to block the move. They had argued that the US concession would open the door for authoritarian governments get control of the network of networks, leading to greater censorship. From a BBC report:A judge in Texas has put the kibosh on a last-minute legal attempt to block the controversial decision for the US to give up control of one of the key systems that powers the internet. It's a move being breathlessly described by some as the US "giving up the internet" to the likes of China, Russia and the Middle East. For starters, while they can take the credit for inventing the underlying technology, the US never "had the internet" to begin with. Nobody did. It's a, duh, network. Decentralised. That's what makes it so powerful. But there are bits of internet infrastructure that some people and governments do have control over, and that's what this row is all about. One of them is the DNS - Domain Name System. This is the system for looking after web addresses. Thanks to the DNS, when you type bbc.com, you're taken to the correct servers for the BBC website. It saves you the grief of having to remember a string of numbers. That pairing of names and numbers is kept in one great big master file, the land registry of the web. The only organisation that can make changes is Icann, the Internet Corporation for Assigned Names and Numbers. As of Saturday 1 October 2016, Icann will no longer be under US government oversight.Read Replies (0)
By EditorDavid from Slashdot's dammed-if-you-do department
A team of researchers from Canada, Holland, China, the U.S. and Brazil "found that greenhouse gas emissions from man-made reservoirs were likely equal to the equivalent of one gigaton of carbon dioxide being released into the atmosphere every year...a little less than one-sixth of the United State's greenhouse gas emissions." An anonymous Slashdot reader quotes Popular Science:
A reservoir is usually created by damming a river, overflowing the banks and flooding the surrounding area, creating a man-made lake...the perfect conditions for microbes to generate greenhouse gases like carbon dioxide and methane (a gas that is about 25 times more potent than carbon dioxide)... "When reservoirs are first flooded there's organic matter in the soil and vegetation that can be converted by microbes into methane and carbon dioxide," John Harrison, a co-author of the paper, tells Popular Science.
"Also, reservoirs because they are in line in rivers, they receive a lot of organic matter and organic sediment from upstream that can fuel the production of methane, carbon dioxide and nitrous oxide." Harrison says that reservoirs also tend to occur in areas where fertilizers are used on the surrounding land. Runoff from those fertilizers into bodies of water can cause algal blooms that can also produce more methane and carbon dioxide.
If the world's reservoirs were a country, they'd be #8 on a list of polluters -- right behind Brazil, China, the EU and the U.S.Read Replies (0)
By EditorDavid from Slashdot's Apple-Pay(s) department
Slashdot reader chasm22 quotes Reuters:
A federal jury in Texas on Friday night ordered Apple Inc to pay more than $302 million in damages for using VirnetX Holding Corp's patented internet security technology without permission in features including its FaceTime video conferencing application. The verdict came in a new trial in Tyler, Texas that had been ordered by the judge in the case, Robert Schroeder, who last August threw out VirnetX's $625.6 million win over Apple from a previous trial because he said jurors in that case may have been confused...
A jury in 2012 awarded $368.2 million in damages, but the U.S. Court of Appeals for the Federal Circuit in Washington, D.C., partly overturned that verdict, saying there were problems with how the trial judge instructed jurors on calculating damages.
On remand, VirnetX's two suits were combined, and in February, a jury returned with an even bigger verdict, $625.6 million, one of the highest ever in a U.S. patent case... However, Schroeder later voided the result, saying that the repeated references to the earlier case could have confused jurors and were unfair to Apple... Apple will also have to contend with the trial in a second lawsuit VirnetX filed against Apple over newer versions of Apple security features, as well as its iMessage application.
The article points out that "Many patent cases are handled in the Texas court, which has a reputation for awarding favorable verdicts to plaintiffs alleging infringement."Read Replies (0)
By msmash from Slashdot's definitely,-maybe department
Microsoft may have plans to bring Windows Hello, one of the headline features of Microsoft's current operating system, to Android and iOS. Windows Hello is a feature that lets people unlock their PC with fingerprint, face, or iris. Paul Thurrott reports: With Windows 10 version 1607, Microsoft has expanded the Windows Hello authentication technologies to include support for companion devices. That we knew. But those companion devices, surprisingly, will include both Android and iPhone handsets. The question is whether those solutions will ever be made available to consumers.[...] On a Ignite 2016 session called Expand Windows Hello Family to companion devices and browser, Microsoft outlined some ideas around this. "When you think about a user and the kind of devices they carry with them," Microsoft senior program manager lead Anoosh Saboori said during the session, "they normally have the phone in their pocket, they [might] have some kind of wearable on their arm, some of them might have the security fobs given to them by their company, and many of us carry a badge with us that is used to gain access to different physical locations. We wanted to leverage these devices as a way to knowing the user."Read Replies (0)