By BeauHD from Slashdot's helping-those-in-need department
mmoorebz writes: Guiding Eyes for the Blind, a nonprofit organization, announced that it is adopting the IBM Cloud to improve access and analysis of canine data. Some people rely on their service dogs to help them with everyday life, and as a way to continue its mission to serving the blind, Guiding Eyes migrated more than half a million health records and more than 65,000 temperament records on thousands of dogs to the IBM Cloud. President and CEO of Guiding Eyes, Thomas Panek, said, "People don't typically think about an organization like ours as a Big Data company but we cannot succeed or grow without it."
"Guiding Eyes is a great example of how IBM Cloud can help organizations innovate new business models and processes that were heretofore unthinkable," said William Karpovich, General Manager, IBM Cloud Platform. "Through the IBM Cloud, Guiding Eyes is now able to advance even further its critical work in breeding, raising and training service dogs for those in need."Read Replies (0)
By BeauHD from Slashdot's restrictive-ethics-policy department
A new "ethics" policy from NPR details new rules to stop promoting NPR One and its podcasts on the air, to ultimately please local station managers who pay the largest share of NPR's bills.
Chris Turpin, V.P. for news programming and operations, writes: As podcasts grow in number and popularity we are talking about them more often in our news programs. We are also fielding more and more questions from news staff and Member stations about our policies for referring to podcasts on air. To that end, we want to establish some common standards, especially for language in back announces. Our hope is to establish basic principles that are easy to understand and allow plenty of flexibility for creativity. These guidelines apply to all podcasts, whether produced by NPR or by other entities. No Call to Action: We won't tell people to actively download a podcast or where to find them. No mentions of npr.org, iTunes, Stitcher, NPR One, etc.
Basically, NPR won't promote "the lauded, loved app that is basically the future of NPR" to listeners who would be most interested in it. How do you feel about NPR's new policy?Read Replies (0)
By BeauHD from Slashdot's time-to-get-physical department
An anonymous reader quotes a report from Reuters: Activist hedge fund Starboard Value LP moved on Thursday to overthrow the entire board of Yahoo Inc, including Chief Executive Marissa Mayer, who has struggled to turn around the company in her nearly four years at the helm. Starboard, which has been pushing for changes at Yahoo since 2014 and owns about 1.7 percent of the company, said it would nominate nine candidates for the board. The proxy fight comes as Yahoo is pressing ahead with an auction of its core Internet business, which includes search, mail and news sites. Yahoo and Starboard could still come to an agreement before the company's annual meeting, expected to be in late June. If they cannot avoid a proxy fight and the Yahoo board election is taken to a shareholder vote, attention will swing to the large mutual and index funds that own the stock and will carry heavy weight in the final tally. Yahoo and Starboard representatives met on March 10 to discuss ways the two sides could avoid a proxy fight, according to people familiar with the matter. But those talks broke down, in part because Starboard was upset by Yahoo's announcement that same day that it appointed two new board directors, these people say.Read Replies (0)
By BeauHD from Slashdot's give-me-your-money department
An anonymous reader quotes a report from CNBC: A Kentucky hospital is operating in an internal state of emergency following an attack by cybercriminals on its computer network, Krebs on Security reported. Methodist Hospital, based in Henderson, Kentucky, is the victim of a ransomware attack in which hackers infiltrated its computer network, encrypted files and are now holding the data hostage, Krebs reported Tuesday. The criminals reportedly used new strain of malware known as Locky to encrypt important files. The malware spread from the initial infected machine to the entire internal network and several other systems, the hospital's information systems director, Jamie Reid, told Krebs. The hospital is reportedly considering paying hackers the ransom money of four bitcoins, about $1,600 at the current exchange rate, for the key to unlock the files.Read Replies (0)
By manishs from Slashdot's security-woes department
Reader itwbennett writes: A Trojan program, dubbed USB Thief by researchers at security firm ESET, infects USB drives that contain portable installations of popular applications such as Firefox, NotePad++, or TrueCrypt, and it also seems to be designed to steal information from so-called air-gapped computers. "In the case we analyzed, it was configured to steal all data files such as images or documents, the whole windows registry tree (HKCU), file lists from all of the drives, and information gathered using an imported open-source application called 'WinAudit'," the ESET researchers said. The stolen data was saved back to the USB drive and was encrypted using elliptic curve cryptography. Once the USB drive was removed, there was no evidence left on the computer, the ESET researchers added.Read Replies (0)
By manishs from Slashdot's we-made-ai-corrupt department
Reader Penguinisto writes: Recently, Microsoft put an AI experiment onto Twitter, naming it "Tay". The bot was built to be fully aware of the latest adolescent fixations (e.g. celebrities and similar), and to interact like a typical teen girl. In less than 24 hours, it inexplicably became a neo-nazi sex robot with daddy issues. Sample tweets from it proclaimed that "Hitler did nothing wrong!", then went on to blame former President Bush for 9/11, stated that "donald trump is the only hope we've got", and other similar instances. As the hours passed, it all went downhill from there, eventually spewing racial slurs and profanity, demanding sex, and calling everyone "daddy". The bot was quickly removed once Microsoft discovered the trouble, but the hashtag is still around for those who want to see it in its ugly raw splendor.Read Replies (0)
By manishs from Slashdot's you-gotta-reward-people department
On Wednesday, it was reported that FBI has contracted Cellebrite, an Israeli software provider specializing in mobile phone forensics, for $15,000 to break into the iPhone. It is believed that Cellebrite knows of a flaw in the iPhone which could allow circumvention of iOS' built-in security layers. Cellebrite could have worked with Apple on this flaw, but it chose to help FBI instead. It doesn't take rocket science to understand why Cellebrite chose to take the other route. The New York Times says that many security firms and hackers would love to work with Apple to further improve its products, but they don't because of a lack of incentive. There's little to no monetary incentive in helping the company with finding loopholes in its products. Apple -- unlike a number of Silicon Valley giants including Facebook, Microsoft, Google, Mozilla, and recently added to the list, Uber -- doesn't maintain a Bug Bounty program. Nicole Perlroth and Katie Benner report for the Times: When hackers do find flaws in Apple's code, they have little incentive to turn them over to the company for fixing. [...] Apple, which has had relatively strong security over the years, has been open about how security is a never-ending cat-and-mouse game and how it is unwilling to engage in a financial arms race to pay for code exploits. The company has yet to give hackers anything more than a gold star. When hackers do turn over serious flaws in its products, they may see their name listed on the company's website -- but that is it. That is a far cry from what hackers can expect if they sell an Apple flaw on the thriving underground market where a growing number of companies and government agencies are willing to pay hackers handsomely.Read Replies (0)