69890121
submission
itwbennett writes:
Researchers at the Massachusetts Institute of Technology have created a data structure that they claim can help large multicore processors churn through their workloads more effectively. Their trick? Do away with the traditional first-come, first-served work queue and assign tasks more randomly. The SprayList algorithm allows processors with many cores to spread out their work so they don't stumble over one another, creating bottlenecks that hamper performance.
69830439
submission
jfruh writes:
Once you've built humanoid-shaped robots, how do you get them to move and act like humans? Well, one way to teach them how to do it is to have them watch one of the greatest repository of recorded human experience ever: YouTube. Robots in a Maryland lab have learned how to prepare meals by watching and processing a slew of cooking videos, one of YouTube's most popular genres.
69830243
submission
jfruh writes:
Most of us know at this point that looking for a job means sending a resume into the teeth of a computerized filtering system. There are ways to hack around the filters blocks, of course — but there are also ways to hack your way through the social networking that often provides a better means to get your resume into the right hands.
69823587
submission
itwbennett writes:
Yves-Alexandre de Montjoye, an MIT graduate student, and his colleagues analyzed credit card transactions provided by an unnamed major bank from 1.1 million people over a three-month period in some 10,000 stores to see how much (or little) data they needed to identify an individual’s transactions from a larger set of transaction records. Ninety percent of the time, they could identify an individual using just four pieces of data, such the locations where four purchases were made. Adding price information to the location data — for example, purchase receipts — allowed the researchers to identify a person with just three transactions.
69748133
submission
itwbennett writes:
Researchers from Drexel University, the University of Maryland, the University of Goettingen, and Princeton have developed a 'code stylometry' that uses natural language processing and machine learning to determine the authors of source code based on coding style. To test how well their code stylometry works, the researchers gathered publicly available data from Google’s Code Jam, an annual programming competition that attracts a wide range of programmers, from students to professionals to hobbyists. Looking at data from 250 coders over multiple years, averaging 630 lines of code per author their code stylometry achieved 95% accuracy in identifying the author of anonymous code. Using a dataset with fewer programmers (30) but more lines of code per person (1,900), the identification accuracy rate reached 97%.
69747141
submission
jfruh writes:
Largely under the radar of most consumers, Qualcomm has emerged with a domination of the mobile market that's almost as strong as Intel's in PCs and laptops. But an unlikely challenger has emerged from Taiwan in the form of Mediatek. Mostly supplying chips to Chinese companies so far, Mediatek is willing to do more handholding for smaller phone manufacturers, providing instructions to an OEM/ODM on how to build a phone and the software architecture to run it and offering dedicated consultants to advise them through the production process.
69746861
submission
jfruh writes:
Alibaba may be the darling of China's Internet industry, but Chinese regulators are beginning to take a hard look at the company's sales practices. It's Tmail.com and Taobao online marketplaces together control three-quarters of the Chinese online retail market — and are rife with counterfeit goods, including fake smartphones and even fake alcohol.
69706547
submission
jfruh writes:
Code from the "QWERTY" keylogger used by the NSA has been made public as part of Edward Snowden's whistle-blowing. Now security researchers are saying that QWERTY is designed as to be part of Regin, a well-known and widespread malware package that was almost certainly built by the NSA as well.
69676041
submission
itwbennett writes:
As the first step in investigating Silk Road, IRS agent Gary Alford, who was part of an agency task force investigating organized crime, simply entered 'Silk Road' into Google and looked for the oldest mention on the site. The details he found would ultimately lead to the arrest of Ross Ulbricht in October 2013, as well as to the forfeiture of all the assets of Silk Road itself.
69663247
submission
itwbennett writes:
IBM is expected to go through a massive reorg next month that will see 26% of its 430,000-strong work force let go, or 111,800 people, according to a report by long-time Silicon Valley journalist Robert X. Cringely. If that figure holds true, that would make it far and away the largest corporate layoff event in history, breaking the record previously held by IBM, when it cut 60,000 in 1993.
69576921
submission
jfruh writes:
A new factory producing smart cards opened in Lagos this week, promising to open up access to financial services to many poor Africans and other inhabitants of the Global South. The cards can be used by people without traditional bank accounts to access the worldwide credit card and smart phone infrastructure.
69567733
submission
itwbennett writes:
They of the square jaws and famous dispute with Mark Zuckerberg over the origins of Facebook, are also believed to be among the largest holders of Bitcoin in the world. Now they want to launch a regulated Bitcoin exchange—named Gemini, of course. To bolster confidence, they said they have formed a relationship with a chartered bank in the state of New York. 'This means that your money will never leave the country,' the twins wrote in a blog post. 'It also means that U.S. dollars on Gemini will be eligible for FDIC insurance and held by a U.S.-regulated bank.'
69567365
submission
itwbennett writes:
Automated tank gauges (ATGs), which are used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated over the Internet by malicious attackers, according to security firm Rapid7. 'An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system,' said HD Moore, the chief research officer at Rapid7.
69535777
submission
itwbennett writes:
According to a story in the Beijing News, Apple CEO Tim Cook has agreed to let China’s State Internet Information Office to run security audits on products the company sells in China in an effort to counter concerns that other governments are using its devices for surveillance.
69523273
submission
itwbennett writes:
Fujitsu Laboratories is developing an enterprise tool that can identify and advise people who are more vulnerable to cyberattacks, based on certain traits. For example, the researchers found that users who are more comfortable taking risks are also more susceptible to virus infections, while those who are confident of their computer knowledge were at greater risk for data leaks. Rather than being like an antivirus program, the software is more like 'an action log analysis than looks into the potential risks of a user,' said a spokesman for the lab. 'It judges risk based on human behavior and then assigns a security countermeasure for a given user.'