Sales of traditional PCs continue to decline, although the overall PC market is likely to grow slightly next year. From a report: Traditional PC shipments are forecast to drop by nearly eight percent this year, and another 4.4 percent in 2018, predicts analyst firm Gartner. Which means that, by 2019, 16 million fewer traditional PCs and notebooks will be sold than were shipped this year. However, much of this will be offset by the rise in spending on high-end notebooks like Microsoft's Surface and Apple's MacBook, so that the overall PC market will by 2019 be at pretty much the same level it was last year. Tablets -- defined by Gartner as basic and utility ultramobile devices -- will also decline over the period to 2019.
Attend or create a Slashdot 20th anniversary party! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×
Sidewalk Labs, the smart city subsidiary of Alphabet (the parent company of Google) with the stated goal of "reimagining cities from the Internet up," now has a very big sandbox in which to conduct its high-tech experiments. From a report: That's obviously an ambitious project, but some of the groundwork is already being laid: Alphabet's Google will be the flagship tenant for the new neighbourhood, anchoring the easter waterfront, to be called "Quayside," and Sidewalk Labs has committed $50 million to kick off pilot testing and planning in partnership with the City of Toronto. Sidewalk Labs won the contract through its response to a Request for Proposals issues by Waterfront Toronto, and organization created by the Canadian federal government, the Ontario provincial government and the City of Toronto together to foster development of Toronto's lakefront areas in ways that address urban sprawl while respecting the realities of climate change and taking into account the ability of the city's residents to get around efficiently. The area involved in the RFP that Sidewalk Labs will work with the government coalition to develop spans around 800 acres (though 12 acres are specified for the initial project), and is one of the largest underdeveloped urban areas in any North American city, making it a good target for Sidewalk's ambitious vision, which involves building smart cities holistically from the very start. Ultimately, the partners hope to turn the area into a "place for tens of thousands of people to live, work, learn and play -- and to create and advance new ideas that improve city life," according to a release from Sidewalk.
An anonymous reader shares a report: Open source code helps software suppliers to be nimble and build products faster, but a new report reveals hidden software supply chain risks of open source that all software suppliers and IoT manufacturers should know about. The recent Equifax breach for example exploited a vulnerability in a widely used open source web framework, Apache Struts, and the study by software monetization specialist Flexera points out that as much as 50 percent of code in commercial and IoT software products is open source. "We can't lose sight that open source is indeed a clear win. Ready-to-go code gets products out the door faster, which is important given the lightning pace of the software space," says Jeff Luszcz, vice president of product management at Flexera. "However, most software engineers don't track open source use, and most software executives don't realize there's a gap and a security/compliance risk." Flexera surveyed 400 software suppliers, Internet of Things manufacturers and in-house development teams. It finds only 37 percent of respondents to the survey have an open source acquisition or usage policy, while 63 percent say either their companies either don't have a policy, or they don't know if one exists. Worryingly, of the 63 percent who say their companies don't have an open source acquisition or usage policy, 43 percent say they contribute to open source projects. There is an issue over who takes charge of open source software too. No one within their company is responsible for open source compliance, or they don't know who is, according to 39 percent of respondents.
New submitter joshtops shares a CNBC report: Tesla is trying to disguise layoffs by calling the widespread terminations performance related, allege several current and former employees. On Friday, the San Jose Mercury News first reported that Tesla had dismissed an estimated 400 to 700 employees. That number represents between 1 and 2 percent of its entire workforce. But one former employee, citing internal information shared by a manager, said the total number fired is higher than 700 at this point. Most of the people let go from Tesla so far have been from its motors business, said people familiar with the matter. They were not from other initiatives like Tesla Powerwall, which is helping restore electricity to the residents of Puerto Rico now. The mass firings, which affected Tesla employees across the U.S., had begun by the weekend of Oct. 7 and continued even after the initial news report, sources said. Among those whose jobs were terminated in this phase, some were given severance packages quickly while others are still waiting on separation agreements. Some terminated employees told CNBC they were informed via email or a phone call "without warning," and told not to come into work the next day. The company also dismissed other employees without specifying a given performance issue, according to these people. "Seems like performance has nothing to do with it," one Tesla employee told CNBC under the condition of anonymity. "Those terminated were generally the highest paid in their position," this person said, suggesting that the firings were driven by cost-cutting. That assessment was echoed by several others, including three employees fired from Tesla during this latest wave.
Microsoft has started to roll out Windows 10 Fall Creators Update, aka, "Redstone 3" to the general public. The company has been testing this new major update to its desktop operating system for over six months. Much like the previous major updates to Windows 10, the Fall Creators Update is also free to Windows 10 users. Some of the remarkable new features the company is shipping with Fall Creators Update include a major design tweak called Fluent Design System. The design changes, CNET writes, are "subtle, like motion and blur effects, along with the changes to the way windows appear." Also in the offering are support for mixed reality, improvements to Photos app, and OneDrive on-demand files -- a feature that many users have long requested. You can read more about these new features and improvements here.
Google announced on Tuesday that it would offer stronger online security for "high risk" users who may be frequent targets of online attacks. The company said anyone with a personal Google account can enroll in the new "advanced protection," while noting that it will require users to "trade off a bit of convenience" for extra security. Motherboard reports: The main advantage in terms of security is the need for a key or token to log in as the second factor, instead of a code sent via SMS or via app. This is much better because there's no way for hackers to steal or phish this key from afar (there have been isolated incidents of hackers using social engineering to gain access to someone's cell phone number by getting the provider to issue a new SIM card, for instance). Thanks to these new features, Gmail is now the most secure email provider available on the internet if you are worried about hackers breaking into your private correspondence. "This is a major step in the right direction in offering the same kind of protection available to high-profile figures to everyday people," Kenneth White, a Washington D.C. based security consultant to federal agencies, told Motherboard. "They have really thought this through, and while it may not make sense for everyone, for those that need it, it's a much needed option."
An anonymous reader shares a Bloomberg report: Over the past two years, after decades of declining deaths on the road, U.S. traffic fatalities surged by 14.4 percent. In 2016 alone, more than 100 people died every day in or near vehicles in America, the first time the country has passed that grim toll in a decade. Regulators, meanwhile, still have no good idea why crash-related deaths are spiking: People are driving longer distances but not tremendously so; total miles were up just 2.2 percent last year. Collectively, we seemed to be speeding and drinking a little more, but not much more than usual. Together, experts say these upticks don't explain the surge in road deaths. There are however three big clues, and they don't rest along the highway. One, as you may have guessed, is the substantial increase in smartphone use by U.S. drivers as they drive. From 2014 to 2016, the share of Americans who owned an iPhone, Android phone, or something comparable rose from 75 percent to 81 percent. The second is the changing way in which Americans use their phones while they drive. These days, we're pretty much done talking. Texting, Twitter, Facebook, and Instagram are the order of the day -- all activities that require far more attention than simply holding a gadget to your ear or responding to a disembodied voice. By 2015, almost 70 percent of Americans were using their phones to share photos and follow news events via social media. In just two additional years, that figure has jumped to 80 percent.
Citing five former employees, Reuters reported on Tuesday that Microsoft's secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group more than four years ago. From the report: The company did not disclose the extent of the attack to the public or its customers after its discovery in 2013, but the five former employees described it to Reuters in separate interviews. Microsoft declined to discuss the incident. The database contained descriptions of critical and unfixed vulnerabilities in some of the most widely used software in the world, including the Windows operating system. Spies for governments around the globe and other hackers covet such information because it shows them how to create tools for electronic break-ins. The Microsoft flaws were fixed likely within months of the hack, according to the former employees. Yet speaking out for the first time, these former employees as well as U.S. officials informed of the breach by Reuters said it alarmed them because the hackers could have used the data at the time to mount attacks elsewhere, spreading their reach into government and corporate networks. "Bad guys with inside access to that information would literally have a 'skeleton key' for hundreds of millions of computers around the world," said Eric Rosenbach, who was U.S. deputy assistant secretary of defense for cyber at the time.
Marco Arment, a prominent developer best known for co-founding Tumblr, explains things that are still crippling USB-C, despite being around for years and being used in mainstream products. Arment writes: While a wide variety of USB-C dongles are available, most use the same handful of unreliable, mediocre chips inside. Some USB-A dongles make Wi-Fi drop on MacBook Pros. Some USB-A devices don't work properly when adapted to USB-C, or only work in certain ports. Some devices only work when plugged directly into a laptop's precious few USB-C ports, rather than any hubs or dongles. And reliable HDMI output seems nearly impossible in practice. Very few hubs exist to add more USB-C ports, so if you have more than a few peripherals, you can't just replace all of their cables with USB-C versions. You'll need a hub that provides multiple USB-A ports instead, and you'll need to keep your USB-A cables for when you're plugged into the hub -- but also keep USB-C cables or dongles around for everything you might ever need to plug directly into the computer's ports. Hubs with additional USB-C ports might pass Thunderbolt through to them, but usually don't. Sometimes, they add a USB-C port that can only be used for power passthrough. Many hubs with power passthrough have lower wattage limits than a 13-inch or 15-inch laptop needs. Fortunately, USB-C is a great charging standard. Well, it's more of a collection of standards. USB-C devices can charge via the slow old USB rates, but for higher-powered devices or faster charging, that's not enough current.
David Pierce, writing for Wired: As Microsoft went to create the Surface Book 2, the company once again tried to bust categories. The result is the most combinatory device Microsoft's made yet. It's a laptop (screens measure 13 or 15 inches; there's a keyboard and trackpad) -- and it's also a tablet (the screen detaches, you can use a pen, everything's touch-friendly), and it's also a desktop. A stupendously powerful one, at that: It runs on Intel's new eighth-generation quad-core processors, in either a Core i5 or Core i7 version. The higher-end models come with Nvidia's GeForce discrete graphics, up to 16 gigs of RAM, and as much as 1 terabyte of solid storage. All that in a fanless body that gets up to 17 hours of battery life, and weighs about 3.5 pounds for the smaller model or 4.2 pounds for the larger. What does all that mean? Microsoft claims the smaller model is three times more powerful than the last Surface Book, and the 15-inch runs five times as fast. Those are meaningless comparisons, but the point holds. This thing screams. More useful are the comparisons to Apple's latest MacBook Pros: Microsoft claims up to 70 percent more battery life, and double the performance of Apple's laptops.
An anonymous reader quotes a report from TechCrunch: You may remember that last year, Verizon (which owns Oath, which owns TechCrunch) was punished by the FCC for injecting information into its subscribers' traffic that allowed them to be tracked without their consent. That practice appears to be alive and well despite being disallowed in a ruling last March: companies appear to be able to request your number, location, and other details from your mobile provider quite easily. The possibility was discovered by Philip Neustrom, co-founder of Shotwell Labs, who documented it in a blog post earlier this week. He found a pair of websites which, if visited from a mobile data connection, report back in no time with numerous details: full name, billing zip code, current location (as inferred from cell tower data), and more. (Others found the same thing with slightly different results depending on carrier, but the demo sites were taken down before I could try it myself.)
Google has added three planets and nine moons to Google Maps. "The heavenly bodies include Saturn moons Dione, Enceladus, Iapetus, Mimas, Rhea and Titan, and Jupiter moons Europa, Ganymede and Io," reports CNET. "Google also added dwarf-planets Pluto and Ceres and full-planet Venus." From the report: Once inside Google Maps for planets, you can spin the space objects around, get more information on their place names and zoom in for a closer look. The new worlds are possible thanks to imagery from NASA and the European Space Agency. NASA's dearly departed Cassini spacecraft sent back a treasure trove of views of Saturn's moons. If you have a few moments to spare, fire up a browser, go to your current location on Google Maps, enter satellite mode and hit the zoom-out button until you've left the planet and are "floating" in space. A list of available planets and moons pops up on the side and you're off on your space adventure.
"Keyssa, a wireless technology company backed by iPod creator and Nest founder Tony Fadell, filed a lawsuit against Essential on Monday, alleging that the company stole trade secrets and breached their nondisclosure agreement," reports Gizmodo. Keyssa has proprietary technology that reportedly lets users transfer large files in a matter of seconds by holding two devices side by side. From the report: According to the lawsuit, Keyssa and Essential engaged in conversations in which the wireless tech company "divulged to Essential proprietary technology enabling every facet of Keyssa's wireless connectivity," all of which was protected under a non-disclosure agreement. More specifically, the lawsuit alleges that Keyssa "deployed a team 20 of its top engineers and scientists" to educate Essential on its proprietary tech, sending them "many thousands of confidential emails, hundreds of confidential technical documents, and dozens of confidential presentations." Essential ended this relationship after over 10 months and later told Keyssa that its engineers would use a competing chip in the Essential Phone. But Keyssa is accusing Essential of including techniques in its phone that were gleaned from their relationship, despite their confidentiality agreement. Central to this lawsuit is one of the Essential Phone's key selling points: the option to swap in modular add-ons, made possible thanks to the phone's unique cordless connector. In short, if Keyssa's claims hold water, then one of the phone's defining factors is a product of theft.
An anonymous reader quotes a report from Ars Technica: The system formerly known as Hurricane Ophelia is moving into Ireland on Monday, bringing "status red" weather throughout the day to the island. The Irish National Meteorological Service, Met Eireann, has warned that, "Violent and destructive gusts of 120 to 150km/h are forecast countrywide, and in excess of these values in some very exposed and hilly areas. There is a danger to life and property." Ophelia transitioned from a hurricane to an extra-tropical system on Sunday, but that only marginally diminished its threat to Ireland and the United Kingdom on Monday, before it likely dissipates near Norway on Tuesday. The primary threat from the system was high winds, with heavy rains. Forecasters marveled at the intensification of Ophelia on Saturday, as it reached Category 3 status on the Saffir-Simpson scale and became a major hurricane. For a storm in the Atlantic basin, this is the farthest east that a major hurricane has been recorded during the satellite era of observations. Additionally, it was the farthest north, at 35.9 degrees north, that an Atlantic major hurricane has existed this late in the year since 1939.
Today, Google is introducing an easier way to aggregate your pet photos in its Photos app -- by allowing you to group all your pet's photos in one place, right beside the people Google Photos organized using facial recognition. TechCrunch reports: This is an improvement over typing in "dog," or another generalized term, because the app will now only group together photos of an individual pet together, instead of returning all photos you've captured with a "dog" in them. And like the face grouping feature, you can label the pet by name to more easily pull up their photos in the app, or create albums, movies or photo books using their pictures. In addition, Google Photos lets you type in an animal's breed to search for photos of pets, and it lets you search for photos using the dog and cat emojis. The company also earlier this year introduced a feature that would create a mini-movie starring your pet, but you can opt to make one yourself by manually selecting photos then choosing from a half-dozen tracks to accompany the movie, says Google.