Submission + - In the UK, sometimes you need a TV licence to use Twitter

Andy Smith writes: I had the opportunity to speak to the UK's TV Licensing authority and get some clarification about when people without licences are (or aren't) breaking the law. Notable points are that, although it's illegal to watch any live broadcast, there are exclusions for things such as product launches and video game streaming. It's illegal for someone to watch live TV coverage of a terrorist attack that a relative has been caught up in, and that person may well get a visit from an inspector, but they won't get prosecuted unless it's "in the public interest to do so". What you may find surprising is that you need a TV licence to use Twitter, or any social media platform, if there's a live TV stream embedded in your feed. Currently, many people's Twitter feed includes an unsolicited live stream from Wimbledon, and the TV Licensing authority is clear: If you want to use Twitter while that Wimbledon stream is there then you need a TV licence or you're breaking the law.

Submission + - Plants Can Turn Caterpillars Into Cannibals To Avoid Getting Eaten (nationalgeographic.com.au)

An anonymous reader writes: A new study published in the Nature Ecology and Evolution journal found that when some plants are under attack from hungry herbivores, they emit defenses that make themselves incredibly foul-tasting to caterpillars, which spurs the caterpillars to eat each other. “Plants can defend themselves so much that they food-stress the herbivore, and then the herbivores determine that rather than have plants on their menu, they should have caterpillars at the top of their menu,” said John Orrock, the author of the study and a researcher in the Department of Zoology at the University of Wisconsin, Madison. Orrock and his research team sprayed tomato plants with methyl jasmonate—a substance plants produce in response to environmental stresses—to trigger the plants’ defense mechanisms. This chemical allowed the plant to change its chemistry, which made it less appetizing to the beet armyworm caterpillars that were placed on a treated plant. This phenomenon has been documented in a variety of plants, and research has suggested that plants can sense when surrounding plants are under attack, which can spur the production of methyl jasmonate in entire communities of plants.

Submission + - We Need to Reboot the Culture of View Source

theodp writes: "Back in ye olde days of the information superhighway," begins Clive Thompson in It's Time to Make Code More Tinker-Friendly "curious newbies had an easy way to see how websites worked: View Source." But no more. "Websites have evolved into complex, full-featured apps," laments Thompson. "Click View Source on Google.com and behold the slurry of incomprehensible Javascript. This increasingly worries old-guard coders. If the web no longer has a simple on-ramp, it could easily discourage curious amateurs." What the world needs now, Thompson argues, are "new tools that let everyone see, understand, and remix today’s web. We need, in other words, to reboot the culture of View Source." Thompson cites Fog Creek Software's Glitch, Chris Coyier's CodePen, and Google's TensorFlow Playground as examples of efforts that embrace the spirit of View Source and help people recombine code in useful ways. Any other suggestions?

Submission + - Dark Web Hosting Service Hacked, Some Data Stolen (bleepingcomputer.com)

An anonymous reader writes: Deep Hosting — a Dark Web hosting service — admitted on Sunday to suffering a major security incident during which "some sites have been exported." According to a wiki page published by the Deep Hosting team, the hack took place after the hacker registered a shared hosting account on their service, and used it to upload two shells on their servers, one written in PHP and one in Perl. A Deep Hosting investigation into the events that preceded the hack showed that the attacker was not able to execute the Perl shell, but the PHP version worked just fine, allowing him to dump SQL DBs from sites hosted on Deep Hosting, many of which were dark web marketplaces and carder forums. While proving his claims to a reporter, the hacker, named Dhostpwned, accidentally wiped the MBR of a server hosting a Dark Web drugs marketplace.

Submission + - Intel Launches Xeon Scalable CPUs: Dual Xeon Platinum 8176, 112 Threads Tested (hothardware.com)

MojoKid writes: Intel announced its new Xeon Scalable processor family based on the 14nm Skylake-SP microarchitecture a few weeks back, though today marks the official launch of the platform. Not only do these processors feature a new microarchitecture, but Intel has also revamped the naming convention and arrangement of the Xeon product stack, branding them with Platinum, Gold, Silver, and Bronze model families. Intel Xeon Scalable series processors feature core counts ranging from 4 to 28, with varied frequencies and cache configurations. Workstation processors and lower-core count server chips top out in the 3.2GHz – 3.6GHz range, while the higher-core count products typically fall in the 2GHz – 2.7GHz range. Six memory channels are supported and the chips have 48 lanes of integrated PCIe 3.0 connectivity. Power envelopes range all the way from 70W on up to 205W. The Xeon Scalable series also introduces new security, virtualization, and storage-related features, more memory bandwidth, support for AVX-512 extensions, a mesh interconnect, and enhanced hardware controlled power management, among a host of other architectural improvements. Testing of a 2P Xeon Platinum 8176 system, sporting 56 physical cores / 112 threads shows significantly increased performance and bandwidth, with only moderately higher power consumption versus a previous-gen 2P Xeon E5-2679 v4-based system.

Submission + - NATO Providing Cybersecurity Equipment to Ukraine (securityweek.com)

wiredmikey writes: Ukraine is an area of great geopolitical significance — a sort of buffer zone between NATO and Russia — that both sides seek to influence. Crimea aside, neither side wishes to be too overt with military intervention, and the result is tailor-made for modern cyber warfare. NATO's official policy towards Ukraine is to bolster its independence.

As a result, NATO is providing Ukraine with cybersecurity equipment for some government institutions and authorities, which NATO secretary general Jens Stoltenberg says will enable Ukraine to "investigate who is behind certain cyber-attacks, because the response to them is extremely important."

In December 2014, NATO established a Trust Fund designed "to provide Ukraine with the necessary support to develop its strictly defensive, CSIRT-type technical capabilities, including laboratories to investigate cyber security incidents."

Submission + - Kaspersky Lab Has Been Working With Russian Intelligence (bloomberg.com)

An anonymous reader writes: Internal company emails obtained by Bloomberg Businessweek show that Kaspersky Lab has maintained a much closer working relationship with Russia’s main intelligence agency, the FSB, than it has publicly admitted. It has developed security technology at the spy agency’s behest and worked on joint projects the CEO knew would be embarrassing if made public.

The previously unreported emails, from October 2009, are from a thread between Eugene Kaspersky and senior staff. In Russian, Kaspersky outlines a project undertaken in secret a year earlier “per a big request on the Lubyanka side,” a reference to the FSB offices. Kaspersky Lab confirmed the emails are authentic.

Submission + - Fedora 26 Linux distro available for download (betanews.com)

BrianFagioli writes: Today, Fedora 26 sheds its pre-release status and becomes available for download as a stable release. GNOME fans are in for a big treat, as version 3.24 is default. If you stick to stable Fedora releases, this will be your first time experiencing that version of the desktop environment since it was released in March. Also new is LibreOffice 5.3, which is an indispensable suite for productivity. If you still use mp3 music files (Iâ(TM)ve moved onto streaming), support should be baked in for both encoding and decoding.

âoeThe latest version of Fedoraâ(TM)s desktop-focused edition provides new tools and features for general users as well as developers. GNOME 3.24 is offered with Fedora 26 Workstation, which includes a host of updated functionality including Night Light, an application that subtly changes screen color based on time of day to reduce effect on sleep patterns, and LibreOffice 5.3, the latest update to the popular open source office productivity suite. For developers, GNOME 3.24 provides matured versions of Builder and Flatpak to make application development for a variety of systems, including Rust and Meson, easier across the board,â says the Fedora Project.

Submission + - Microsoft's Calibri font at the center of Panama papers case in Pakistan (ibtimes.co.uk)

arnott writes: From the article: Microsoft's default font, Calibri, is currently at the centre of a hot legal and political debate in Pakistan and it could very well end up sealing the fate of the country's first family. The font is playing a pivotal role as investigators continue to ask questions to the family members of embattled Prime Minister Nawaz Sharif over their illegal offshore properties flagged in the Panama Papers.

Submission + - 24 Cores and The Mouse Won't Move: Engineer Diagnoses Win10 Bug

ewhac writes: Bruce Dawson recently posted a deep-dive into an annoyance that Windows 10 was inflicting on him — namely, every time he built Chrome, his extremely beefy 24-core (48-thread) rig would begin stuttering, with the mouse frequently becoming stuck for a little over one second. This would be unsurprising if all cores were pegged at 100%, but overall CPU usage was barely hitting 50%. So he started digging out the debugging tools and doing performance traces on Windows itself. He eventually discovered that the function NtGdiCloseProcess(), responsible for Windows process exit and teardown, appears to serialize through a single lock, each pass through taking about 200S each. So if you have a job that creates and destroys a lot of processes very quickly (like building a large application such as Chrome), you're going to get hit in the face with this. Moreover, the problem gets worse the more cores you have. The issue apparently doesn't exist in Windows 7. Microsoft has been informed of the issue and they are allegedly investigating.

Slashdot Top Deals