alphadogg writes: The team behind the Apache Zeppelin open-source notebook for big data analytics visualization has renamed itself ZEPL and announced $4.1M in Series A funding. ZEPL, which swears a certain professional football organization had nothing to do with it ditching its former name (NFLabs), is one of numerous companies smelling blood in the water around Tableau, the $3.5 billion business intelligence and analytics software vendor that has stumbled financially in recent quarters and seen its stock price plummet accordingly.
alphadogg writes: Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that captured its own share of national headlines. Here's what industry watchers say has changed since, in terms of phone privacy, and what could change under the new US administration.
alphadogg writes: A vulnerability in a multimedia framework present on Version 12.04.5 of Ubuntu can be exploited by sound files meant to be played on the venerable Nintendo Entertainment System, according to security researcher Chris Evans. https://scarybeastsecurity.blo... vulnerability is the result of a flaw in an audio decoder called libgstnsf.so, which allows gstreamer Version 0.10 to play the NSF files that the NES uses for music.
alphadogg writes: The twice-annual Top500 list of the most powerful supercomputers in the world (adjudged by their performance on the Linpack benchmark) is out this morning, and there are a pair of newcomers on the list. The list's release coincides with this week's Supercomputing 16 conference in Utah.
alphadogg writes: Acquia Labs has no illusions of making self-driving cars or shooting things into space like Google X, but the budding applied research arm of enterprise open-source Drupal provider Acquia does have designs on a slew of new applications for what it anticipates will be an increasingly browserless world.
alphadogg writes: Google’s latest foray into open-source software is a cloud-based top-level-domain registrar platform called Nomulus, bringing a substantial chunk of the company’s gigantic internet infrastructure into the public eye. What Nomulus does, in essence, is manage the domain names under a top-level domain.
alphadogg writes: It wasn’t long ago that the big spectator sport in IaaS cloud computing was to watch a leading provider such as Microsoft or Amazon Web Services announce price cuts and then ready for its rivals to follow suit. The new game in town plays out in a similar way, except now the vendors are matching or one-upping each other with new data centers and cloud computing regions.
alphadogg writes: Wyoming’s 250-person Enterprise Technology Services group knew it had a good thing in its open-source Enterprise Extensible Code Library, but it chose to keep things under wraps outside of the state until last week when members of that team attended an annual confab for state government CIOs. The library of reusable code is designed to slash the time and cost it takes to build apps, and provide a platform for others to build upon, possibly resulting in a consolidated app dev system nationwide in the US.
alphadogg writes: The Annals of Improbable Research doles out its annual awards for unusual scientific research, including for studying the effects of wearing polyester, cotton or wool trousers on the sex life of rats, and, later, on humans.
alphadogg writes: U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you’re doing” to secure the internet of things. As the Assistant Secretary for Cyber Policy at DHS says, IoT security is a public safety issue that involves protecting both the nation’s physical and cyber infrastructures. More specifically, DHS is formulating a series of unifying principles – and best practices — relating to IoT security, including how to patch stuff that’s already in the field and not relying on an unsustainable physical recall process. Building security into the cloud will also be an option.
alphadogg writes: The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is. The FBI does not encourage people paying ransom, but encourages victims to reach out to their local FBI office and/or file a complaint with the Internet Crime Complaint Center regardless of whether they did pay.
alphadogg writes: Carnegie Mellon University is boasting that nearly half (48%) of incoming School of Computer Science undergraduates are women, a new diversity record for the institution. This echoes results at another top-notch computer science school, the University of Illinois Urbana-Champaign's College of Engineering, which says 46% of its 190 incoming freshmen CompSci students are women. That's up from 24% the year before. These and other schools say the results stem from stepping up STEM outreach to women in middle and high school.
alphadogg writes: Having seen all sorts of makeshift fixes – from post-it notes to bandages to condom wrappers – used to block wireless access point LEDs from beaming and sometimes blinking, some IT shops have begun turning off the lights altogether even though it can make their jobs a little tougher.
alphadogg writes: It’s become increasingly common over the past decade or so to see laws being passed to either mandate the use of open-source software or, at the very least, encourage people in government who make procurement decisions to do so. Here’s a map of the status of open-source laws around the world.
alphadogg writes: Cyber-reasoning platform Mayhem pulled down the $2 million first prize in a DARPA-sponsored Cyber Grand Challenge competition that pitted entrants against each other in the classic hacking game Capture the Flag, never before played by programs running on supercomputers. A team from Carnegie Mellon University spin-out All Secure entered Mayhem in the competition against six other programs played in front of thousands in the ballroom of the Paris hotel in Las Vegas. Most of the spectators were in town for the DEF CON hacker conference starting Friday at the same site.