Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Target Passes Walmart As Top US Corporate Installer of Solar Power ( 9

An anonymous reader quotes a report from Electrek: Target is the top corporate installer of solar power in the USA with 147MW installed on 300 stores. Walmart is close behind with 140MW, while Ikea has installed solar on 90% of its retail locations. The Solar Energy Institute of America (SEIA) report shows over 1,000MW of solar installed in almost 2,000 unique installations by the largest corporate entities in the country. Additionally these groups have more than doubled their installation volume year on year, with 2015 seeing a total of 130MW, while 2016 is projected to be closer to 280MW. Big box retail locations offer some of the best potential spaces for solar power to be installed -- on top of square, flat structures and in previously built parking lots. The average size of an installation by a company in this group is about 500kW -- 75X the size of an average residential solar installation. The RE100 organization has signed up 81 global corporations (many on the SEIA list) who have pledged 100% renewable energy. "We're incredibly proud of the progress we've made in improving building efficiencies and reducing environmental impact. Our commitment to installing solar panels on 500 stores and distribution centers by 2020 is evidence of that progress" -- said John Leisen, vice president of property management at Target. The geographic breakdown of solar installations is based upon three main drivers -- good sunlight, expensive electricity and state level renewable mandates, with Southern California having all three. The northeast USA, with its expensive electricity and aggressive clean energy push, has been on par with California (50% of total solar) for commercial installations. A report put together by the World Wildlife Fund (WWF) and the World Resources Institute (WRI) breaks down the various state level laws that support corporations going green -- and, without surprise, it becomes clear that the legal support of renewable energy is a definite driver.
PlayStation (Games)

Mark Cerny, Chief PlayStation Architect, Explains the PS4 Pro ( 21

Sony's PlayStation 4 Pro, which launches next month on November 10th, is the company's most powerful console that will be capable of outputting 4K and HDR content, including movies, TV shows and games. In an effort to find out how developers will make use of the console and whether or not the PS4 Pro will in any way undermine the audience of the current PS4, The Verge sat down with Mark Cerny, Sony's chief PlayStation architect, and asked him some questions. The Verge reports: The PS4 Pro is 2.28 times more powerful than its predecessor, but not everything will run in native 4K
Instead of using an entirely new GPU, Cerny said the PS4 Pro is using a "double-sauced one." In effect, the new console has a second, identical GPU configured next to the original, more than doubling the processing power of the Pro. While the standard PS4 produces 1.8 teraflops, the PS4 Pro achieves 4.2 teraflops. This is how the device can achieve native 4K and, in some cases, what Cerny said are results "extremely close to 4K." For select software, including games like adventure title Horizon Zero Dawn and Call of Duty: Infinite Warfare, the PS4 Pro will use a crafty technique called checkerboard rendering to achieve 2160p resolution. Checkboard rendering changes the formation of pixels to achieve higher-fidelity graphics.

Standard PS4 games will play just the same unless devs patch them
For the more than 700 or so existing PS4 games, Cerny said the goal was to ensure those titles played smoothly no matter what. That's why the Pro incorporates an identical GPU. Because the new console has "the old GPU next to a mirror version of itself," Sony can support existing games with a simple trick: "We just turn off the second GPU," he said. Developers can patch these titles to boost graphics and performance in very subtle ways. But unless you have a 4K television, the difference will not be substantial.

Sony says it doesn't want games released solely for the PS4 Pro
When asked whether Sony would ever let a game run exclusively on the PS4 Pro, Cerny was blunt. "We're putting a very high premium on not splitting the user base in that fashion," he said. That doesn't rule out the possibility that, two or even three years down the line, a game comes out that relies so heavily on the hardware improvements of the Pro that it becomes unplayable on the standard PS4. Cerny wouldn't really speak much to that scenario, saying that Sony is asking developers to take advantage of the new console without leaving older hardware behind.
You can also watch Mark Cerny chat with PlayStation Blog's Sid Shuman about the creation of the PS4 Pro here on YouTube.

KickassTorrents Lawyer: 'Torrent Sites Do Not Violate Criminal Copyright Laws' ( 23

An anonymous reader quotes a report from Ars Technica: Lawyers representing Artem Vaulin have filed their formal legal response to prosecutors' allegations of conspiracy to commit criminal copyright infringement, among other charges. Vaulin is the alleged head of KickassTorrents (KAT). KAT was the world's largest BitTorrent distribution site before it was shuttered by authorities earlier this year. Vaulin was arrested in Poland, where he now awaits extradition to the United States. "Vaulin is charged with running today's most visited illegal file-sharing website, responsible for unlawfully distributing well over $1 billion of copyrighted materials," Assistant Attorney General Leslie Caldwell said in a July 2016 statement. The defense's new 22-page court filing largely relies on the argument that there is no such thing as secondary criminal copyright infringement. While secondary copyright infringement as a matter of civil liability was upheld by the Supreme Court in MGM v. Grokster in 2005, Vaulin and his associates have been charged criminally. "The fundamental flaw in the government's untenable theory of prosecution is that there is no copyright protection for such torrent file instructions and addresses," [the brief's author, Ira Rothken,] argued in his Monday motion to dismiss the charges against Vaulin. "Therefore, given the lack of direct willful copyright infringement, torrent sites do not violate criminal copyright laws." "The extradition procedures have formally been started by the US in Poland," Rothken told Ars. "We are in a submissions or briefing period, and our Polish team is opposing extradition." Rothken also said that he has yet to be allowed to meet or speak directly with his client. For now, Rothken has been required to communicate via his Polish counterpart, Alek Kowzan. "Maybe they are afraid that Artem's extradition defense will be enhanced if American lawyers can assist in defending against the US extradition," Rothken added. No hearings before US District Judge John Z. Lee have been set.

Hotspot Vigilantes Are Trying to Beam the Internet To Julian Assange ( 91

Ecuadorian government said earlier this week that it did cut off Julian Assange's internet connection. They noted that Assange's continued interference in the U.S. election campaign was the reason why they decided to disconnect Assange from the internet. But it appears some people are going to great lengths to beam internet connectivity to Mr. Assange. This week 4chan urged people to head to the embassy to set up mobile Wi-Fi hotspots, and many are doing just that. From a Motherboard report:"We are now calling all BRITS to get their ass down to the embassy and stand around in mass, taking shifts with wifi-hotspots on hand!" reads the post. "Give Assange constant network and morale support all while streaming it live for the world to see." Are people actually going to try this? Motherboard UK visited the Ecuadorian embassy in London, where WikiLeaks founder Julian Assange has claimed political asylum since August 2012, today to find out. Admittedly, on a late October afternoon, things were rather quiet on the street outside the embassy. Nevertheless, I found my guy. "Marco" was loitering outside the embassy, turning on and off his mobile hotspot. I approached him, and while tentative at first, Marco finally started explaining how he was hoping to aid Assange.
The Military

US Army 'Will Have More Robot Soldiers Than Humans' By 2025, Says Former British Spy ( 60

John Bassett, a British spy who worked for the agency GCHQ for nearly two decades, has told Daily Express that the U.S. was considering plans to employ thousands of robots by 2025. At a meeting with police and counter-terrorism officials in London, he said: "At some point around 2025 or thereabouts the U.S. army will actually have more combat robots than it will have human soldiers. Many of those combat robots are trucks that can drive themselves, and they will get better at not falling off cliffs. But some of them are rather more exciting than trucks. So we will see in the West combat robots outnumber human soldiers." Daily Express reports: Robotic military equipment is already being used by the U.S Navy and Air Force, in the shape of drones and autonomous ships. In April robotic warfare took a major leap forward after the U.S. Navy launched its very first self-piloting ship designed to hunt enemy submarines. Drones have been a feature of U.S. operations in the Middle East to disrupt terrorist groups. However, those aircrafts are still controlled by humans operating from bases in the U.S. Mr. Bassett also said artificial intelligence and robots technology would combine to create powerful fighting machines. The cyber security expert said: "Artificial intelligence, robotics in general, those will begin to mesh together."

How Hackers Broke Into John Podesta and Colin Powell's Gmail Accounts ( 69

An anonymous reader quotes a report from Motherboard: On March 19 of this year, Hillary Clinton's campaign chairman John Podesta received an alarming email that appeared to come from Google. The email, however, didn't come from the internet giant. It was actually an attempt to hack into his personal account. In fact, the message came from a group of hackers that security researchers, as well as the U.S. government, believe are spies working for the Russian government. At the time, however, Podesta didn't know any of this, and he clicked on the malicious link contained in the email, giving hackers access to his account. The data linking a group of Russian hackers -- known as Fancy Bear, APT28, or Sofacy -- to the hack on Podesta is also yet another piece in a growing heap of evidence pointing toward the Kremlin. And it also shows a clear thread between apparently separate and independent leaks that have appeared on a website called DC Leaks, such as that of Colin Powell's emails; and the Podesta leak, which was publicized on WikiLeaks. All these hacks were done using the same tool: malicious short URLs hidden in fake Gmail messages. And those URLs, according to a security firm that's tracked them for a year, were created with Bitly account linked to a domain under the control of Fancy Bear. The phishing email that Podesta received on March 19 contained a URL, created with the popular Bitly shortening service, pointing to a longer URL that, to an untrained eye, looked like a Google link. Inside that long URL, there's a 30-character string that looks like gibberish but is actually the encoded Gmail address of John Podesta. According to Bitly's own statistics, that link, which has never been published, was clicked two times in March. That's the link that opened Podesta's account to the hackers, a source close to the investigation into the hack confirmed to Motherboard. That link is only one of almost 9,000 links Fancy Bear used to target almost 4,000 individuals from October 2015 to May 2016. Each one of these URLs contained the email and name of the actual target. The hackers created them with with two Bitly accounts in their control, but forgot to set those accounts to private, according to SecureWorks, a security firm that's been tracking Fancy Bear for the last year. Bitly allowed "third parties to see their entire campaign including all their targets -- something you'd want to keep secret," Tom Finney, a researcher at SecureWorks, told Motherboard. Thomas Rid, a professor at King's College who studied the case extensively, wrote a new piece about it in Esquire.

Television Needs To Be Reinvented, Says Apple SVP ( 134

Eddy Cue, Senior Vice President of Internet Software and Service at Apple, isn't happy with the current state of how people watch TV. He said we currently live with a "glorified VCR," the interface of our current TV is the problem and we need to reinvent it. Cue pointed out a number of other issues he has with today's TV:"It's really hard to use [a cable box or satellite TV]. Setting something to record, if you didn't watch something last night, if you didn't set it to record, it's hard to find, it may not be available. There may be some rights issues," Cue said. "It's great to be able to tell your device, 'I wanna watch the Duke basketball game, I don't care what channel it's on.' I just want to watch the Duke basketball game. Today you got to bring in the TV, go through the guide, find which sports programs or whatever -- it's just hard to do."
United States

Prosecutors Say Contractor Stole 50 Terabytes of NSA Data ( 72

An NSA contractor siphoned off dozens of hard drives' worth of data from government computers over two decades, prosecutors will allege on Friday. From a ZDNet report: The contractor, Harold T. Martin III, is also accused of stealing thousands of highly classified documents, computers, and other storage devices during his tenure at the agency. It's not known exactly what Martin allegedly stole, but a report from The New York Times on Wednesday suggests that the recently-leaked hacking tools used by the agency to conduct surveillance were among the stolen cache of files. Prosecutors will on Friday charge Martin with violating the Espionage Act. If convicted, he could face ten years in prison on each count. The charges, news of which was first reported by The Washington Post, outline a far deeper case than first thought, compared to the felony theft and a lesser misdemeanor charge of removal and retention of classified information revealed in an unsealed indictment last month.

Elon Musk: Negative Media Coverage of Autonomous Vehicles Could be 'Killing people' ( 190

On the sidelines of the Tesla announcements, CEO Elon Musk accused media of "killing people" by dissuading consumers from using an autonomous vehicle. Musk said that media is aggressively reporting on autopilot crashes, but does "virtually none" reporting of hundreds of thousands of actual accidents that involve non-self driving cars. He said, via a report on The Verge:Once you view autonomous cars sort of like an elevator in a building, does Otis take responsibility for all elevators around the world? No, they don't. What really matters here at the end of the day is "what is the absolute safety." One of the things I should mention that frankly has been quite disturbing to me is the degree of media coverage of Autopilot crashes, which are basically almost none relative to the paucity of media coverage of the 1.2 million people that die every year in manual crashes. [It is] something that I think does not reflect well upon the media. It really doesn't. Because, and really you need to think carefully about this, because if, in writing some article that's negative, you effectively dissuade people from using an autonomous vehicle, you're killing people.
Open Source

Blockchain Platform Developed by Banks To Be Open-Source ( 29

A blockchain platform developed by a group that includes more than 70 of the world's biggest financial institutions is making its code publicly available, in what could become the industry standard for the nascent technology, reports Reuters. From the article: The Corda platform has been developed by a consortium brought together by New-York-based financial technology company R3. It represents the biggest shared effort among banks, insurers, fund managers and other players to work on using blockchain technology in the financial markets. Blockchain, which originated in the digital currency bitcoin, works as a web-based transaction-processing and settlement system. It creates a "golden record" of any given set of data that is automatically replicated for all parties in a secure network, eliminating any need for third-party verification. Banks reckon the technology could save them money by making their operations faster, more efficient and more transparent. They are racing to build products using the technology that will generate new revenue, with dozens of patent applications filed for blockchain-based products by Wall Street's top lenders. R3 says it hopes its platform will become the industry standard, although its intention is indeed for firms to build products on top of it.

All the Good Netflix Movies Are in Canada and Brazil ( 80

Netflix's movie library has declined over the last two years when cross referenced with IMDB's 250 movies list. Earlier this month, we learned that if you were in the United States, Netflix only had 31 of the 250 movies listed on the holy-grail of all movie databases. Gizmodo today reports that if you were in Brazil or Canada, that same library looks a lot better. From the report: According to analysis by both The Streaming Observer and AddonHQ, Canada and Brazil have the best content ecosystems, when it comes to movies on Netflix. But when it comes to good movies, Brazil is tops. The Streaming Observer found that Brazil had 85 movies from IMDb's Top 250 in its library. The site also put together a ridiculously huge chart if you want to see exactly which movies are available on each service. It's worth checking out. Brazil has movies that those of us in America could only dream of streaming, like The Godfather Part II, Fight Club, and The Empire Strikes Back. Mexico and Sweden have solid showings too, with 73 and 70 movies from the IMDb's Top 250 in their respective libraries.

Tesla Bans Customers From Using Autonomous Cars To Earn Money Ride-Sharing ( 235

Late Wednesday, Tesla announced the Model X and Model S electric vehicles, boasting that they will come with the necessary hardware to drive completely autonomously at some point in the future. Naturally, one of the frequent questions that followed the event was: "Can I use my Tesla car as a Uber driver?" Well, Tesla was anticipating this question and even buried the answer on its website. From an ArsTechnica report: On Tesla's website, the section that describes the new "Full Self-Driving Capability" (A $3,000 option at the time of purchase, $4,000 after the fact) states "Please note also that using a self-driving Tesla for car sharing and ride hailing for friends and family is fine, but doing so for revenue purposes will only be permissible on the Tesla Network, details of which will be released next year."

China Overtakes the US in iOS App Store Revenue ( 50

Sarah Perez, writing for TechCrunch: China has now overtaken the U.S. to become the largest market in the world for App Store revenue, according to a new report out this morning from app intelligence firm App Annie. The country earned over $1.7 billion in Q3 2016, which puts it ahead of the U.S. by over 15 percent. The U.S. had been the number one iOS market since 2010, the report notes. Today, Chinese consumers spend more than 5 times the amount they were spending compared with just two years prior. In addition, the report predicts that China will drive the largest absolute revenue growth for any country by 2020. The estimations are likely accurate -- App Annie had said at the beginning of the year that if China's rapid App Store revenue growth continued at the same pace, it would overtake the U.S. by year's end. And that has now occurred. This growth is largely being driven by games, and here, China's lead has also widened over the U.S. during the past quarter. Games drive 75 percent of App Store revenue, even though non-game apps make up the majority (75%) of those distributed in Apple's mobile marketplace.

India's Biggest ATM Breach? 3.2 Million Debit Cards Across 19 Banks May Have Been Compromised ( 33

A total of 32 lakh (3.2 million) debit cards across 19 banks could have been compromised on account of a purported fraud, the National Payment Corporation of India said in a statement. BloombergQuint adds: "The genesis of the problem was receipt of complaints from few banks that their customer's cards were used fraudulently mainly in China and USA while customers were in India," the NPCI said. "The complaints of fraudulent withdrawal are limited to cards of 19 banks and 641 customers. The total amount involved is Rs 1.3 crore as reported by various affected banks to NPCI." SISA Security, a Bengaluru-based company is currently undertaking a forensic study to identify the extent of the problem and will submit a final report in November. Initial reports had suggested that ATMs operated by Hitachi Payment Services had been attacked by malware and were the source of the breach. However, the company has said in a statement that an interim report by the audit agency does not suggest any breach or compromise in its systems.

Yahoo Wants To Know If FBI Ordered Yahoo To Scan Emails ( 82

Reader Trailrunner7 writes: In an odd twist to an already odd story, Yahoo officials have asked the Director of National Intelligence to confirm whether the federal government ordered the company to scan users' emails for specific terms last year and if so, to declassify the order. The letter is the result of news reports earlier this month that detailed an order that the FBI allegedly served on Yahoo in 2015 in an apparent effort to find messages with a specific set of terms. The stories allege that Yahoo complied with the order and installed custom software to accomplish the task. Yahoo officials said at the time the Reuters story came out that there is no such scanning system on its network, but did not say that the scanning software never existed on the network at all. "Yahoo was mentioned specifically in these reports and we find ourselves unable to respond in detail. Your office, however, is well positioned to clarify this matter of public interest. Accordingly, we urge your office to consider the following actions to provide clarity on the matter: (i) confirm whether an order, as described in these media reports, was issued; (ii) declassify in whole or in part such order, if it exists; and (iii) make a sufficiently detailed public and contextual comment to clarify the alleged facts and circumstances," the letter says.

Slashdot Top Deals