By manishs from Slashdot's another-day,-another-hack department
Reader itwbennett writes: A person nicknamed AppleJ4ck, who has been previously been linked to Lizard Squad, a group notorious for DDoS attacks against gaming platforms, including the PlayStation Network and Xbox Live, has taken credit for server outages affecting gaming giant Blizzard (Alternate source: ZDNet) Monday morning. The outages led to authentication lockouts for gamers attempting to access Overwatch, Hearth Stone, World of Warcraft, Diablo, Heroes of the Stone, and others. During the outage, AppleJ4ck said Monday's problems were just a test, promising more outages in the future.Read Replies (0)
By manishs from Slashdot's saving-power department
An anonymous reader writes: It's no secret that Google's Chrome browser eats up a considerable amount of memory (and by extension, battery). On Monday, Microsoft announced that its Edge browser has succeeded on that front. Citing several tests, Microsoft claims Edge browser is a better choice for portable device owners. The company took four identical laptops running Windows 10 to see which of the four most popular browsers would be most efficient when it comes to battery life. Interestingly, Chrome was the first to kill the laptop in the video streaming test at 4 hours and 19 minutes. Firefox closely followed its rival at 5 hours and 9 minutes, while Opera (running on the same tech as Chrome) managed to hit 6 hours and 18 minutes. In Microsoft's tests, it was found that Edge was best of the bunch when it came to enjoying a video online, lasting for 7 hours and 22 minutes. That's worked out to be 70% longer than Chrome.In a blog post, Microsoft wrote: "We designed Microsoft Edge from the ground up to prioritize power efficiency and deliver more battery life, without any special battery saving mode or changes to the default settings. Our testing and data show that you can simply browse longer with Microsoft Edge than with Chrome, Firefox, or Opera on Windows 10 devices."Read Replies (0)
By manishs from Slashdot's supercomputer department
Reader dcblogs writes: China on Monday revealed its latest supercomputer, a monolithic system with 10.65 million compute cores built entirely with Chinese microprocessors. This follows a U.S. government decision last year to deny China access to Intel's fastest microprocessors. There is no U.S.-made system that comes close to the performance of China's new system, the Sunway TaihuLight. Its theoretical peak performance is 124.5 petaflops (Linpack is 93 petaflops), according to the latest biannual release today of the world's Top500 supercomputers. It has been long known that China was developing a 100-plus petaflop system, and it was believed that China would turn to U.S. chip technology to reach this performance level. But just over a year ago, in a surprising move, the U.S. banned Intel from supplying Xeon chips to four of China's top supercomputing research centers. The U.S. initiated this ban because China, it claimed, was using its Tianhe-2 system for nuclear explosive testing activities. The U.S. stopped live nuclear testing in 1992 and now relies on computer simulations. Critics in China suspected the U.S. was acting to slow that nation's supercomputing development efforts. There has been nothing secretive about China's intentions. Researchers and analysts have been warning all along that U.S. exascale (an exascale is 1,000 petaflops) development, supercomputing's next big milestone, was lagging.Read Replies (0)
By EditorDavid from Slashdot's believing-the-unbelievable department
An anonymous Slashdot reader asks whether it's possible to manage a "distributed" team of software developers in different locations who are all assigned to different projects, each with their own independent project managers:
All embedded software engineers from multiple offices in different countries are now being reorganized into this new distributed team [with] better control of its own development practices, processes and tools, since everyone is working in embedded software...
While there's extensive material throughout the Internet on best practices for managing distributed teams, it seems to either take an agile perspective, the project manager's perspective or be otherwise based on the assumption that everyone in the team are working in the same project. In my case, I'd be managing a distributed team of developers all assigned to different projects. How can I build cohesion, alignment and trust for my team of embedded software developers in this new three-dimensional distributed matrix organization?
Anyone have any relevant experiences to share with distributed teams or "matrix" organizations? Leave your answers in the comments. How can you manage developers who are all distributed across multiple projects?Read Replies (0)
By EditorDavid from Slashdot's Rise-and-shine,-Mr.-Freeman department
"Can you love a game so much you must take its sequel?" asks Ars Technica, posting an excerpt from the new book "Death By Video Game: Danger, Pleasure, and Obsession on the Virtual Frontline."
At 6am on May 7, 2004, Axel Gembe awoke in the small German town of Schonau im Schwarzwald to find his bed surrounded by police officers bearing automatic weapons... "You are being charged with hacking into Valve Corporation's network, stealing the video game Half-Life 2, leaking it onto the Internet, and causing damages in excess of $250 million... Get dressed..." The corridors were lined by police, squeezed into his father's house...
Gembe had tried creating homegrown keystroke-recorders specifically targeted at Valve, according to the book, but then poking around their servers he'd discovered one which wasn't firewalled from the internal network. Gembe spent several weeks discovering notes and design documents, until eventually he stumbled onto the latest version of the unreleased game's source code. He'd never meant for the code to be leaked onto the internet -- but he did share it with another person who did. ("I didn't think it through. The person I shared the source with assured me he would keep it to himself. He didn't...")
Eventually Game contacted Valve, apologized, and asked them for a job -- which led to a fake 40-minute job interview designed to gather enough evidence to arrest him. But ultimately a judge sentenced him to two years probation -- and Half-Life 2 went on to sell 8.6 million copies.Read Replies (0)
By EditorDavid from Slashdot's lived-long-and-prospered department
On Sunday morning 27-year-old actor Anton Yelchin, who plays Chekov in the new Star Trek movies, was killed in a freak accident with his own car in the driveway of his home in Studio City. "It appears he momentarily exited his car and it rolled backward, causing trauma that led to his death," a police spokesperson told the Hollywood Reporter. This afternoon J. J. Abrams tweeted a picture of a handwritten eulogy addressed to Anton. "You were brilliant. You were kind. You were funny as hell, and supremely talented. And you weren't here nearly long enough. Missing you..." Zachary Quinto, who plays Mr. Spock, also tweeted a link to a picture posted in memorial on Instagram, where he called Yelchin "one of the most open and intellectually curious people I have ever had the pleasure to know... wise beyond his years, and gone before his time..."
Stephen King called him a "crazily talented actor gone too soon," remembering Yelchin from one of his last roles in a 10-episode adaptation of King's "Mr. Mercedes". Yelchin will play a mentally deranged ice cream truck driver who's also an IT worker for a Geek Squad-like company named "Cyber Patrol".Read Replies (0)
By EditorDavid from Slashdot's million-IP-march department
Cisco says in just one week in February they detected 1,127,818 different IP addresses being used to launch 744,361,093 login attempts on 220,758,340 different email addresses -- and that 93% of those attacks were directed at two financial institutions in a massive Account Takeover (ATO) campaign. An anonymous reader writes: Crooks used 993,547 distinct IPs to check login credentials for 427,444,261 accounts. For most of these attacks, the crooks used proxy servers, but also two botnets, one of compromised Arris cable modems, and one of ZyXel routers/modems. Most of these credentials have been acquired from public breaches or underground hacking forums. This happened before the recent huge data breaches such as MySpace, LinkedIn, Tumblr, and VK.com.
It's apparently similar to the stolen-credentials-from-other-sites attack that was launched against GitHub earlier this week.Read Replies (0)
By EditorDavid from Slashdot's robot-chauffeurs department
An anonymous reader quotes an article from the Bay Area News Group:
Imagine your fully autonomous self-driving car totals a minivan. Who pays for the damages? "There wouldn't be any liability on you, because you're just like a passenger in a taxi," says Santa Clara University law professor Robert Peterson. Instead, the manufacturer of your car or its software would probably be on the hook... Virtually everything around car insurance is expected to change, from who owns the vehicles to who must carry insurance to who -- or what -- is held responsible for causing damage, injuries and death in an accident."
Ironically, if you're only driving a semi-autonomous car, "you could end up in court fighting to prove the car did wrong, not you," according to the article. Will human drivers be considered a liability -- by insurers, and even by car owners? The article notes that Google is already testing a car with no user-controlled brake pedal or steering wheel. Of course, one consumer analyst warns the newspaper that "hackers will remain a risk, necessitating insurance coverage for hostile takeover of automated systems..."Read Replies (0)
By EditorDavid from Slashdot's money-talks department
Thursday's new of a $50 million heist of digital currency at Ethereum. was followed today be reports of a second heist from the DAO, according to the Bitcoin News Service -- this one for just 22 Ether. "It appears this is just someone who wanted to test the exploit and see if they could use it to their advantage... " Slashdot reader Patrick O'Neill writes:
The currency's community is currently debating a course forward for a currency who is built on the idea that it is governed by software and not human beings. One option is to fork the code, another is to do absolutely nothing at all."
Vitalik Buterin, the co-founder of Ethereum, posted Sunday that "Over the last day with the community's help we have crowdsourced a list of all of the major bugs with smart contracts on Ethereum so far, including both the DAO as well as various smaller 100-10000 ETH thefts and losses in games and token contracts." The list begins by including "The DAO (obviously)," but is followed by a warning that "progress in smart contract safety is necessarily going to be layered, incremental, and necessarily dependent on defense-in-depth. There will be further bugs, and we will learn further lessons; there will not be a single magic technology that solves everything."
The Daily Dot wrote Friday that "Because of the way the code in question is written, Etherum's developers and community have 27 days to decide what to do before the hackers are able to move the money and cash out... What's happening now amounts to a political campaign. But the debate is far from over. The clock is ticking now, the world is watching, and the next step of the cryptocurrency experiment is unfolding under a spotlight burning hotter every day."Read Replies (0)
By manishs from Slashdot's apple-vs-right-to-repair department
Damon Beres, writing for The Huffington Post: Major tech companies like Apple have trampled legislation that would have helped consumers and small businesses fix broken gadgets. New York state legislation that would have required manufacturers to provide information about how to repair devices like the iPhone failed to get a vote, ending any chance of passage this legislative session. Similar measures have met the same fate in Minnesota, Nebraska, Massachusetts and, yes, even previously in New York. Essentially, politicians never get to vote on so-called right to repair legislation because groups petitioning on behalf of the electronics industry gum up the proceedings. "We were disappointed that it wasn't brought to the floor, but we were successful in bringing more attention to the issue," New York state Sen. Phil Boyle (R), a sponsor of the bill, told The Huffington Post.Read Replies (0)
By EditorDavid from Slashdot's resolved department
About 50 KDE developers met this week in the Swiss Alps for the annual Randa Meetings, "seven days of intense in-person work, pushing KDE technologies forward and discussing how to address the next-generation demands for software systems." Christoph Cullmann, who maintains the Kate editor, blogs that during this year's sprint, they finally fixed a 13-year-old bug. He'd filed the bug report himself -- back in 2003 -- and writes that over the next 13 years, no one ever found the time to fix it. (Even though the bug received 333 "importance" votes...) After finally being marked Resolved, the bug's tracking page at KDE.org began receiving additional comments marveling at how much time had passed.
Just think, when this bug was first reported:
-- The current Linux Kernel was 2.6.31...
-- Windows XP was the most current desktop verison. Vista was still 3 years away.
-- Top 2 Linux verions? Mandrake and Redhat (Fedora wouldn't be released for another 2 months, Ubuntu's first was more than a year away.)Read Replies (0)