By BeauHD from Slashdot's do-you-believe-in-magic department
An anonymous reader writes: Following news that Twitter would invest around $70 million in music streaming service SoundCloud, the company is reportedly acquiring Magic Pony Technology, a company out of London that has developed technologies of using neural networks and machine learning to provide expanded data for images. For example, they can be used to enhance a picture or video taken on a mobile phone or to help develop graphics for virtual reality or augmented reality applications. "Machine learning is increasingly at the core of everything we build at Twitter," said Jack Dorsey, Twitter CEO and co-founder, in a statement. "Magic Pony's machine learning technology will hep us build strength into our deep learning teams with world-class talent, so Twitter can continue to be the best place to see what's happening and why it matters, first. We value deep learning to help make our world better, and we will keep doing our part to share our work and learnings with the community." "[Magic Pony Technology] made a few further waves this year, as it further revealed the way that its technology worked to help enhance visuals with information that may not be in the picture itself, but essentially be created from composites of similar pictures, much like how the human eye works," writes TechCrunch. The company has remained under the radar for the most part. They have filed a number of patents -- around 20, which now belong to Twitter.Read Replies (0)
By manishs from Slashdot's don't-spoil-the-fun department
An anonymous reader writes: If you failed to get tickets for your favorite band, even though your finger was poised on the "buy" link the instant they went on sale, don't worry -- you never stood a chance. They were probably snapped up by bots that, in one case, bought 1,012 Madison Square Garden U2 tickets in less than a minute. The state of New York has declared that scalpers who use them could get fines and even jail time. "New Yorkers have been dealing with this frustrating ticket buying experience for too long," says state assembly member Marcos Crespie. Using such bots was illegal before, but only brought civil, not criminal sanctions. However, a three-year investigation by NY attorney general Eric. T. Schneiderman found that the practice was so widespread that the state had to take harsher measures. Ticketing outlets and credit card companies revealed that bots scoop up the best seats in seconds, which scalpers then resell at prices many times over face value. Scalpers who exploit such software could now face criminal, class A misdemeanor charges.Read Replies (0)
By manishs from Slashdot's another-day,-another-hack department
Reader itwbennett writes: A person nicknamed AppleJ4ck, who has been previously been linked to Lizard Squad, a group notorious for DDoS attacks against gaming platforms, including the PlayStation Network and Xbox Live, has taken credit for server outages affecting gaming giant Blizzard (Alternate source: ZDNet) Monday morning. The outages led to authentication lockouts for gamers attempting to access Overwatch, Hearth Stone, World of Warcraft, Diablo, Heroes of the Stone, and others. During the outage, AppleJ4ck said Monday's problems were just a test, promising more outages in the future.Read Replies (0)
By manishs from Slashdot's saving-power department
An anonymous reader writes: It's no secret that Google's Chrome browser eats up a considerable amount of memory (and by extension, battery). On Monday, Microsoft announced that its Edge browser has succeeded on that front. Citing several tests, Microsoft claims Edge browser is a better choice for portable device owners. The company took four identical laptops running Windows 10 to see which of the four most popular browsers would be most efficient when it comes to battery life. Interestingly, Chrome was the first to kill the laptop in the video streaming test at 4 hours and 19 minutes. Firefox closely followed its rival at 5 hours and 9 minutes, while Opera (running on the same tech as Chrome) managed to hit 6 hours and 18 minutes. In Microsoft's tests, it was found that Edge was best of the bunch when it came to enjoying a video online, lasting for 7 hours and 22 minutes. That's worked out to be 70% longer than Chrome.In a blog post, Microsoft wrote: "We designed Microsoft Edge from the ground up to prioritize power efficiency and deliver more battery life, without any special battery saving mode or changes to the default settings. Our testing and data show that you can simply browse longer with Microsoft Edge than with Chrome, Firefox, or Opera on Windows 10 devices."Read Replies (0)
By manishs from Slashdot's supercomputer department
Reader dcblogs writes: China on Monday revealed its latest supercomputer, a monolithic system with 10.65 million compute cores built entirely with Chinese microprocessors. This follows a U.S. government decision last year to deny China access to Intel's fastest microprocessors. There is no U.S.-made system that comes close to the performance of China's new system, the Sunway TaihuLight. Its theoretical peak performance is 124.5 petaflops (Linpack is 93 petaflops), according to the latest biannual release today of the world's Top500 supercomputers. It has been long known that China was developing a 100-plus petaflop system, and it was believed that China would turn to U.S. chip technology to reach this performance level. But just over a year ago, in a surprising move, the U.S. banned Intel from supplying Xeon chips to four of China's top supercomputing research centers. The U.S. initiated this ban because China, it claimed, was using its Tianhe-2 system for nuclear explosive testing activities. The U.S. stopped live nuclear testing in 1992 and now relies on computer simulations. Critics in China suspected the U.S. was acting to slow that nation's supercomputing development efforts. There has been nothing secretive about China's intentions. Researchers and analysts have been warning all along that U.S. exascale (an exascale is 1,000 petaflops) development, supercomputing's next big milestone, was lagging.Read Replies (0)
By EditorDavid from Slashdot's believing-the-unbelievable department
An anonymous Slashdot reader asks whether it's possible to manage a "distributed" team of software developers in different locations who are all assigned to different projects, each with their own independent project managers:
All embedded software engineers from multiple offices in different countries are now being reorganized into this new distributed team [with] better control of its own development practices, processes and tools, since everyone is working in embedded software...
While there's extensive material throughout the Internet on best practices for managing distributed teams, it seems to either take an agile perspective, the project manager's perspective or be otherwise based on the assumption that everyone in the team are working in the same project. In my case, I'd be managing a distributed team of developers all assigned to different projects. How can I build cohesion, alignment and trust for my team of embedded software developers in this new three-dimensional distributed matrix organization?
Anyone have any relevant experiences to share with distributed teams or "matrix" organizations? Leave your answers in the comments. How can you manage developers who are all distributed across multiple projects?Read Replies (0)
By EditorDavid from Slashdot's Rise-and-shine,-Mr.-Freeman department
"Can you love a game so much you must take its sequel?" asks Ars Technica, posting an excerpt from the new book "Death By Video Game: Danger, Pleasure, and Obsession on the Virtual Frontline."
At 6am on May 7, 2004, Axel Gembe awoke in the small German town of Schonau im Schwarzwald to find his bed surrounded by police officers bearing automatic weapons... "You are being charged with hacking into Valve Corporation's network, stealing the video game Half-Life 2, leaking it onto the Internet, and causing damages in excess of $250 million... Get dressed..." The corridors were lined by police, squeezed into his father's house...
Gembe had tried creating homegrown keystroke-recorders specifically targeted at Valve, according to the book, but then poking around their servers he'd discovered one which wasn't firewalled from the internal network. Gembe spent several weeks discovering notes and design documents, until eventually he stumbled onto the latest version of the unreleased game's source code. He'd never meant for the code to be leaked onto the internet -- but he did share it with another person who did. ("I didn't think it through. The person I shared the source with assured me he would keep it to himself. He didn't...")
Eventually Game contacted Valve, apologized, and asked them for a job -- which led to a fake 40-minute job interview designed to gather enough evidence to arrest him. But ultimately a judge sentenced him to two years probation -- and Half-Life 2 went on to sell 8.6 million copies.Read Replies (0)
By EditorDavid from Slashdot's lived-long-and-prospered department
On Sunday morning 27-year-old actor Anton Yelchin, who plays Chekov in the new Star Trek movies, was killed in a freak accident with his own car in the driveway of his home in Studio City. "It appears he momentarily exited his car and it rolled backward, causing trauma that led to his death," a police spokesperson told the Hollywood Reporter. This afternoon J. J. Abrams tweeted a picture of a handwritten eulogy addressed to Anton. "You were brilliant. You were kind. You were funny as hell, and supremely talented. And you weren't here nearly long enough. Missing you..." Zachary Quinto, who plays Mr. Spock, also tweeted a link to a picture posted in memorial on Instagram, where he called Yelchin "one of the most open and intellectually curious people I have ever had the pleasure to know... wise beyond his years, and gone before his time..."
Stephen King called him a "crazily talented actor gone too soon," remembering Yelchin from one of his last roles in a 10-episode adaptation of King's "Mr. Mercedes". Yelchin will play a mentally deranged ice cream truck driver who's also an IT worker for a Geek Squad-like company named "Cyber Patrol".Read Replies (0)
By EditorDavid from Slashdot's million-IP-march department
Cisco says in just one week in February they detected 1,127,818 different IP addresses being used to launch 744,361,093 login attempts on 220,758,340 different email addresses -- and that 93% of those attacks were directed at two financial institutions in a massive Account Takeover (ATO) campaign. An anonymous reader writes: Crooks used 993,547 distinct IPs to check login credentials for 427,444,261 accounts. For most of these attacks, the crooks used proxy servers, but also two botnets, one of compromised Arris cable modems, and one of ZyXel routers/modems. Most of these credentials have been acquired from public breaches or underground hacking forums. This happened before the recent huge data breaches such as MySpace, LinkedIn, Tumblr, and VK.com.
It's apparently similar to the stolen-credentials-from-other-sites attack that was launched against GitHub earlier this week.Read Replies (0)