Google

Google Has a Big AI Advantage: It Already Knows Everything About You (theverge.com) 37

Google's expansion of Gemini's data access through "personal context" represents a fundamental shift in how AI assistants operate. Unlike competitors that start from scratch with each new user, Gemini can immediately tap into years of accumulated user data across Google's ecosystem. The Verge adds: Google first started letting users opt in to its "Gemini with personalization" feature earlier this year, which lets the AI model tap into your search history "to provide responses that are uniquely insightful and directly address your needs." But now, Google is taking things a step further by unlocking access to even more of your information -- all in the name of providing you with more personalized, AI-generated responses.

During Google I/O on Tuesday, Google introduced something called "personal context," which will allow Gemini models to pull relevant information from across Google's apps, as long as it has your permission. One way Google is doing this is through Gmail's personalized smart replies -- the AI-generated messages that you can use to quickly reply to emails.

To make these AI responses sound "authentically like you," Gemini will pore over your previous emails and even your Google Drive files to craft a reply tailored to your conversation. The response will even incorporate your tone, the greeting you use the most, and even "favorite word choices," according to Google.

Digital

Gordon Bell, an Architect of Our Digital Age, Dies At Age 89 (arstechnica.com) 6

An anonymous reader quotes a report from Ars Technica: Computer pioneer Gordon Bell, who as an early employee of Digital Equipment Corporation (DEC) played a key role in the development of several influential minicomputer systems and also co-founded the first major computer museum, passed away on Friday, according to Bell Labs veteran John Mashey. Mashey announced Bell's passing in a social media post on Tuesday morning. "I am very sad to report [the] death May 17 at age 89 of Gordon Bell, famous computer pioneer, a founder of Computer Museum in Boston, and a force behind the @ComputerHistory here in Silicon Valley, and good friend since the 1980s," wrote Mashey in his announcement. "He succumbed to aspiration pneumonia in Coronado, CA."

Bell was a pivotal figure in the history of computing and a notable champion of tech history, having founded Boston's Computer Museum in 1979, which later became the heart of the Computer History Museum in Mountain View, with his wife Gwen Bell. He was also the namesake of the ACM's prestigious Gordon Bell Prize, created to spur innovations in parallel processing.
Bell also mentored at Microsoft in 1995, where he "studied telepresence technologies and served as the subject of the MyLifeBits life-logging project," reports Ars. "The initiative aimed to realize Vannevar Bush's vision of a system that could store all the documents, photos, and audio a person experienced in their lifetime."

Former Windows VP Steven Sinofsky said Bell "was immeasurably helpful at Microsoft where he was a founding advisor and later full time leader in Microsoft Research. He advised and supported countless researchers, projects, and product teams. He was always supportive and insightful beyond words. He never hesitated to provide insights and a few sparks at so many of the offsites that were so important to the evolution of Microsoft."

"His memory is a blessing to so many," added Sinofsky in a post memorializing Bell. "His impact on all of us in technology will be felt for generations. May he rest in peace."
Google

Reducing the Computational Cost of Deep Reinforcement Learning Research (googleblog.com) 5

Pablo Samuel Castro, Staff Software Engineer at Google Research, writes on Google AI blog: It is widely accepted that the enormous growth of deep reinforcement learning research, which combines traditional reinforcement learning with deep neural networks, began with the publication of the seminal DQN algorithm. This paper demonstrated the potential of this combination, showing that it could produce agents that could play a number of Atari 2600 games very effectively. Since then, there have been several approaches that have built on and improved the original DQN. The popular Rainbow algorithm combined a number of these recent advances to achieve state-of-the-art performance on the ALE benchmark. This advance, however, came at a very high computational cost, which has the unfortunate side effect of widening the gap between those with ample access to computational resources and those without.

In "Revisiting Rainbow: Promoting more Insightful and Inclusive Deep Reinforcement Learning Research," to be presented at ICML 2021, we revisit this algorithm on a set of small- and medium-sized tasks. We first discuss the computational cost associated with the Rainbow algorithm. We explore how the same conclusions regarding the benefits of combining the various algorithmic components can be reached with smaller-scale experiments, and further generalize that idea to how research done on a smaller computational budget can provide valuable scientific insights.

Microsoft

Microsoft Recommends Using a Separate Device For Administrative Tasks (zdnet.com) 177

In a rare article detailing insights about its staff's efforts in securing its own internal infrastructure, Microsoft has shared some very insightful advice on how companies could reduce the risk of having a security breach. From a report: The central piece of this article is Microsoft's recommendation in regards to how companies should deal with administrator accounts. Per Microsoft's Security Team, employees with administrative access should be using a separate device, dedicated only for administrative operations. This device should always be kept up to date with all the most recent software and operating system patches, Microsoft said. "Provide zero rights by default to administration accounts," the Microsoft Security Team also recommended. "Require that they request just-in-time (JIT) privileges that gives them access for a finite amount of time and logs it in a system." Furthermore, the OS vendor also recommends that administrator accounts should be created on a separate user namespace/forest that cannot access the internet, and should be different from the employee's normal work identity.
Slashdot.org

20 Years of Stuff That Matters 726

Today we're marking Slashdot's 20th birthday. 20 years is a long time on the internet. Many websites have come and gone over that time, and many that stuck around haven't had any interest in preserving their older content. Fortunately, as Slashdot approaches its 163,000th story, we've managed to keep track of almost all our old postings - all but the first 2^10, or so. In addition to that, we've held onto user comments, the lifeblood of the site, from 1999 onward. As we celebrate Slashdot's 20th anniversary this month, we thought we'd take a moment to highlight a few of the notable or interesting stories and discussions that have happened here in the past decade and a half. This is part of our 20-year anniversary celebration, and we've set up a page to coordinate user meet-ups. We'll be continuing to run some special pieces throughout the month, so keep an eye out for those.

Read on for a trip down memory lane.

Update: Slashdot founder CmdrTaco has taken to Medium with some of his own Slashdot nostalgia.
Books

Book Review: Bulletproof SSL and TLS 92

benrothke writes If SSL is the emperor's new clothes, then Ivan Ristic in Bulletproof SSL and TLS has shown that perhaps the emperor isn't wearing anything at all. There is a perception that if a web site is SSL secured, then it's indeed secure. Read a few pages in this important book, and the SSL = security myth is dispelled. For the first 8 of the 16 chapters, Ristic, one of the greatest practical SSL./TLS experts around, spends 230 pages showing countless weaknesses, vulnerabilities, attacks and other SSL weaknesses. He then spends the next 8 chapters showing how SSL can, if done correctly, be deployed to provide adequate security. Keep reading for the rest of Ben's review.
Books

J.K. Rowling Should Try the Voting Algorithm 128

Frequent contributor Bennett Haselton proposes a new use for online, anonymous voting: helping sort skill from luck in the cheek-by-jowl world of best-selling (and would-be best-selling) authors: "J.K. Rowling recently confirmed that she was the author of a book she had published under a pseudonym, which spiked in sales after she was outed as the true author. Perhaps she was doing an experiment to see how much luck had played a role in propelling her to worldwide success, and whether she could recreate anything close to that success when starting from scratch. But a better way to answer that question would be to strike a deal with an amateur-fiction-hosting site and use the random-sample-voting algorithm that I've written so much about, to test how her writing stacks up against other writers in the same genre." Read on for more. Update: 07/20 01:23 GMT by T : Note: An editorial goof (mine) swapped out the word "confirmed" for "revealed" (above) in an earlier rendering of this story.
Image

Book Review: A Practical Guide To Linux Commands, Editors, and Shell Programming Screenshot-sm 81

Rambo Tribble writes "This new, third edition of Sobell's book brings enhancements that add to the text's value as both a learning tool and a reference. This has always been a foundation book for those wanting a professional level of familiarity with Linux. The addition of chapters to introduce the Python language and MySQL database serves to offer the reader practical insights into additional Linux-related technologies." Read below for the rest of Rambo's review.
Image

Book Review: A Gift of Fire Screenshot-sm 52

benrothke writes "In the 4th edition of A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology, author Sara Baase takes a broad look at the social, legal and ethical issues around technology and their implications. Baase notes that her primary goal in writing the book is for computer professionals to understand the implications of what they create and how it fits into society. The book is an interesting analysis of a broad set of topics. Combined with Baase's superb writing skills, the book is both an excellent reference and a fascinating read." Read below for the rest of Ben's review.
Slashdot.org

15 Years of Stuff That Matters 145

15 years is a long time on the internet. Many websites have come and gone over that time, and many that stuck around haven't had any interest in preserving their older content. Fortunately, as Slashdot approaches its 2^17th story, we've managed to keep track of almost all our old postings — all but the first 2^10, or so. In addition to that, we've held onto user comments, the lifeblood of the site, from 1999 onward. As we celebrate Slashdot's 15th anniversary this month, we thought we'd take a moment to highlight a few of the notable or interesting stories and discussions that have happened here in the past decade and a half. Read on for a trip down memory lane.
Image

Book Review: UP and To the RIGHT Screenshot-sm 77

benrothke writes "Anyone who has worked in information technology knows of Gartner. They are one of the leading information technology research and advisory firms. Most of their clients are CIOs and senior IT leaders in corporations and government agencies, high-tech and telecom enterprises. Gartner is huge with over 5,000 associates, over 1, 200 research analysts and consultants and clients in 85 countries. Their revenue in 2011 was nearly $1.5 billion. While Gartner is the world's largest, there are over 650 independent analyst firms worldwide. Barbara French's Directory of Analysts provides a comprehensive list. With all that, very few people understand how Gartner works and what makes them tick. In UP and to the RIGHT: Strategy and Tactics of Analyst Influence: A complete guide to analyst influence, ex-Gartner analyst Richard Stiennon takes the mystery out of Gartner. In particular, a good part of the book deals with Gartner's vaunted Magic Quadrant." Read below for the rest of Ben's review.
Image

Book Review: Digital Evidence and Computer Crime Screenshot-sm 49

brothke writes "When it comes to a physical crime scene and the resulting forensics, investigators can ascertain that a crime took place and gather the necessary evidence. When it comes to digital crime, the evidence is often at the byte level, deep in the magnetics of digital media, initially invisible from the human eye. That is just one of the challenges of digital forensics, where it is easy to destroy crucial evidence, and often difficult to preserve correctly." Read on for the rest of Ben's review.
Image

Hello, Android Third Edition Screenshot-sm 74

eldavojohn writes "The third edition of Hello, Android brings the book up to date on Android versions from 1.5 to 2.2 (FroYo). The book is predominantly tied to the Eclipse editing environment with several pages devoted to screen shots of the IDE. As the title suggests, this book aims to give the user the equivalent of a "Hello, world!" application in Android and succeeds in doing that but doesn't take the reader much further. From creating a sudoku application with increasing support to dabbling in OpenGL ES, the book's prime audience are people who know a little Java (with no aversion to Eclipse) and XML but absolutely no Android. You can find the source for all the examples." Keep reading for the rest of eldavojohn's review.
Image

Confessions of a Public Speaker Screenshot-sm 111

brothke writes "While there is a plethora of books such as Public Speaking for Dummies, and many similar titles, Confessions of a Public Speaker is unique in that it takes a holistic approach to the art and science of public speaking. The book doesn't just provide helpful hints, it attempts to make the speaker, and his associated presentation, compelling and necessary. Confessions is Scott Berkun's first-hand account of his many years of public speaking, teaching and television appearances. In the book, he shares his successes, failures, and many frustrating experiences, in the hope that the reader will be a better speaker for it." Keep reading for the rest of Ben's review.

Censorship By Glut 391

Frequent Slashdot contributor Bennett Haselton writes "A 2006 paper by Matthew Salganik, Peter Dodds and Duncan Watts, about the patterns that users follow in choosing and recommending songs to each other on a music download site, may be the key to understanding the most effective form of "censorship" that still exists in mostly-free countries like the US It also explains why your great ideas haven't made you famous, while lower-wattage bulbs always seem to find a platform to spout off their ideas (and you can keep your smart remarks to yourself)." Read on for the rest of Bennett's take on why the effects of peer ratings on a music download site go a long way towards explaining how good ideas can effectively be "censored" even in a country with no formal political censorship.
Media

Skewz.com Founder Vipul Vyas Answers Your Questions About Media Bias 75

You asked questions about Skewz.com on April 2nd and April 3rd. Here are your answers. This media bias stuff is tricky to deal with. Both Skewz and Microsoft's Blewz are trying, anyway. Skewz people say they want to jump into the conversation attached to this post, so if you have any follow-up questions please feel free to ask them.

Oregon Senate Candidate Steve Novick Answers Your Questions 393

Wow. More politicians (of all parties) need to be as open and thorough as Steve Novick is here. We selected 10 of the questions you submitted and sent them to him by email, and his responses... let's just say that if every candidate spoke out like Steve, we'd have a much clearer view of our choices and would be able to cast our votes a lot more rationally.

The Military

Air Force Cyber Command General Answers Slashdot Questions 543

Here are the answers to your questions for Major General William T. Lord, who runs the just-getting-off-the ground Air Force Cyber Command. Before you ask: yes, his answers were checked by both PR and security people. Also, please note that this interview is a "first," in that Generals don't typically take questions from random people on forums like Slashdot, and that it is being watched all the way up the chain of command into the Pentagon. Many big-wigs will read what you post here -- and a lot of them are interested in what you say and may even use your suggestions to help set future recruiting and operational policies. A special "thank you" goes to Maj. Gen. Lord for participating in this experiment, along with kudos to the (necessarily anonymous) people who helped us arrange this interview.
Slashdot.org

Introducing the Slashdot Firehose 320

Logged in users have noticed for some time the request to drink from the Slashdot Firehose. Well now we're ready to start having everybody test it out. It's partially a collaborative news system, partially a redesigned & dynamic next-generation Slashdot index. It's got a lot of really cool features, and a lot of equally annoying new problems for us to find and fix for the next few weeks. I've attached a rough draft of the FAQ to the end of this article. A quick read of it will probably answer most questions from how it works, what all the color codes mean, to what we intend to do with it.
Book Reviews

Project Arcade 158

Craig Maloney writes "Growing up, I found myself more than once in an arcade, be it in the mall, Meijer, or a free-standing building. The atmosphere was unmistakable: loud, with lots of activity, and people getting fully immersed and "in the zone" between them and their pixellated avatar. While playing an arcade game at home has been possible for many years now, the true arcade experience has been a little more elusive. There's something about having an upright video game cabinet, and playing on arcade hardware that gives the game that extra sense of being right in the arcades of my youth. There are many sites out there that have different plans for building a MAME arcade cabinet from scratch, but most read like a post-mortem for how the author pieced together their particular setup. What if you just want to convert an old (non-working, I hope) cabinet into a MAME arcade cabinet? Lots of information is out there, but where do you start? Project Arcade is an excellent introduction for building your own MAME arcade cabinet from scratch, and compiles lots of material into one comprehensive book." Read below for the rest of Craig's review.

Slashdot Top Deals