Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Just plain extortion (Score 3, Insightful) 109

My guess is that Brazilian authorities want personal information on a citizen from Facebook and Facebook will not comply. I hope the judge is ready for the repercussions of his decision. If this goes through I look for mass protests and the call for the removal of the judge. There is almost no way Facebook can't come out this smelling like a rose.

Submission + - Wine now running on Intel ChromeBooks

grungy writes: The first Intel ChromeBooks have access to the Play Store now, and the Android version of Wine apparently runs on them. Phoronix reports that CodeWeavers CrossOver is running on Intel ChromeBooks. Pictures show the Steam client running, and a clip of a D3D game. Of course, the Play Store is only available on the ChromeOS developer channel so far, but that should change later this year.

Submission + - NY Man Sentenced for SWATting, Carding, Doxing, Threats

ScentCone writes: 22-year-old NY man Mir Islam has been sentenced to 24 months behind bars for participation in an extensive campaign under the "UG Nazi" brand of SWATting the homes of celebrities and public figures, posting private financial information, making bomb threats, and DDoS-ing web sites. No, he's not a Nazi, but "I thought we were going to get more media because everyone hates Nazis." Four co-conspirators, both domestic and overseas, have been identified.

Submission + - Why The Vivaldi Browser Wants You To Control Everything (helpnetsecurity.com)

Orome1 writes: A long time has passed since the IT industry was abuzz with browser wars, and when Jón S. von Tetzchner, co-founder and former CEO of Opera Software, announced he’s building a new browser, many were skeptical whether he can start one again. Because – let’s be realistic – making a dent in the browser market is exceedingly hard. Chrome, Firefox, Opera, Safari and IE have plenty of users and features. Undeterred by the skepticism, the Vivaldi team worked hard, and after more than a year of public development, Vivaldi 1.0 was released in April 2016. In an interview with Help Net Security, von Tetzchner, now CEO of Vivaldi, talks about building a new browser, its unique features, privacy and security.

Submission + - Clinton: It's 'heartbreaking' when IT workers must train H-1B replacements (computerworld.com)

dcblogs writes: Hillary Clinton, the presumptive Democratic presidential nominee, on Monday criticized the replacement of U.S. IT workers with foreign labor but stopped short of offering a plan to fix it. In a videotaped interview with Vox, Clinton appears empathetic and sympathetic to IT workers who have trained their foreign replacements as a condition of severance. She mentioned IT layoffs at Disney, specifically. "The many stories of people training their replacements from some foreign country are heartbreaking, and it is obviously a cost-cutting measure to be able to pay people less than what you would pay an American worker," said Clinton in the interview. Keith Barrett, a former IT worker Disney who was among those replaced by contractors, was not happy with Clinton's comments."She starts off as if she understands the problem, but then dismisses it as collateral damage not of significant volume to address, and blends in the problem of illegal immigrant labor, which is mostly working in unskilled labor," said Barrett.

Submission + - NHK to begin 8k test broadcasts in August

AmiMoJo writes: NHK, Japan's national broadcaster, has decided to skip over 4k entirely and go straight to 8k broadcasts, starting on the 1st of August. (Japanese site, English site with some details). 8k "Super Hi-Vision" delivers 7680x4320 pixels, 16x that of standard HD, at 120Hz progressive scan and 12 bit colour. Sound is 22 channel surround. Initial broadcasts are on satellite channels, with a full service due in time for the 2020 Tokyo Olympics.

Submission + - SPAM: Adobe Brings VR Video Editing Tools to Premiere Pro

An anonymous reader writes: Adobe Premiere Pro, one of the world's most popular video editing programs, has been updated with new tools to support editing VR video. Equirectangular footage of varying field of view (up to 360 degrees) can be imported and edited just like regular footage, including a new window which allows the editor to preview what the footage will look like through a given VR headset. Monoscopic and stereoscopic (side-by-side & over-under) footage is supported. A new option present when exporting video embeds meta-data to identify VR footage as such for appropriate identification and playback through services like YouTube's VR video player.
Link to Original Source

Submission + - Pentagon's first bug bounty leads to new responsible disclosure policy (windowsitpro.com)

v3rgEz writes: Between April 18 and May 12, over 1,400 attackers set their sights on the Pentagon, finding 138 security holes ranging from Cross-Site Scripting attacks to SQL injections. The attacks, part of the Department of Defense's first bug bounty program, were so successful the DOD decided to invite the hackers back and make it a regular event. It's also lead the DOD to decide on setting up a "responsible disclosure" policy, which a DOD official said would allow attackers to report flaws "without fear of prosecution" in the future.

Submission + - Tech Companies Consider Storing Data in DNA Strands (ieee.org)

the_newsbeagle writes: Technologists from IBM, Intel, and Microsoft recently joined academics at a meeting hosted by IARPA (the intelligence community's R&D wing), where they discussed the feasibility of storing data in the form of twisting strands of DNA. The tech companies are interested because DNA is the densest information storage medium we know: "By converting digital files into biological material, warehouse-size storage facilities could theoretically be replaced by diminutive test tubes." And the intelligence community is interested because all their surveillance is generating a lot of data that has to be stashed somewhere.

Submission + - Supreme Court Gives Police More Leeway on Illegal Searches

HughPickens.com writes: NBC reports that Justice Sonia Sotomayor let loose a scorching dissent in a case involving the Fourth Amendment and police conduct. The case concerns Edward Strieff, who was stopped while leaving a house a police officer was watching on suspicion of drug activity. When the officer discovered Strieff had an outstanding warrant for a minor traffic violation, he searched Strieff and found methamphetamine. The court had to decide whether the drugs found on Strieff could be used as evidence or whether such evidence was disqualified by the Fourth Amendment's prohibition on "unreasonable searches and seizures." Clarence Thomas wrote for the majority, saying the evidence was "admissible because the officer's discovery of the arrest warrant attenuated the connection between the unlawful stop and the evidence seized incident to arrest."

Sotomayor refused to let the majority get away with this Fourth Amendment diminution without a fight. In a stunning dissent, Sotomayor explains the startling breadth of the court’s decision. “This case allows the police to stop you on the street, demand your identification, and check it for outstanding traffic warrants—even if you are doing nothing wrong,” Sotomayor writes. “If the officer discovers a warrant for a fine you forgot to pay, courts will now excuse his illegal stop and will admit into evidence anything he happens to find by searching you after arresting you on the warrant.” The Department of Justice, Sotomayor writes, “recently reported that in the town of Ferguson, Missouri, with a population of 21,000, 16,000 people had outstanding warrants against them.” That means 76 percent of Ferguson residents have, under the court’s decision, effectively surrendered their Fourth Amendment right against unreasonable seizure. “In the St. Louis metropolitan area,” moreover, “officers ‘routinely’ stop people—on the street, at bus stops, or even in court—for no reason other than ‘an officer’s desire to check whether the subject had a municipal arrest warrant pending.’ ”

Submission + - Chinese Hacking Slows After Public Scrutiny, US Pressure (csoonline.com)

itwbennett writes: Security firm FireEye's iSIGHT Intelligence on Monday released a report based on a review of the activity of 72 groups that it suspects to be operating in China or supporting Chinese state interests. The researchers found a notable decline in successful network compromises by those groups starting in mid-2014, after the U.S. Government took punitive measures against China and raised the possibility of sanctions. Other security firms have also commented previously on the possible decline of hacks by China-based groups after strong measures by the U.S. But in April, Admiral Michael Rogers, Commander of the U.S. Cyber Command, told a Senate committee that cyber operations from China are still "targeting and exploiting" U.S. government, defense industry, academic and private computer networks."

Submission + - Fujitsu picks 64-bit ARM for Post-K supercomputer (theregister.co.uk)

An anonymous reader writes: Today, at the International Supercomputing Conference 2016 in Frankfurt, Germany, Fujitsu revealed its Post-K machine will run on ARMv8 architecture. The Post-K machine is supposed to have 100 times more application performance than the K Supercomputer – which would make it a 1,000 PFLOPS beast – and is due to go live in 2020. The K machine is the fifth fastest known super in the world, it crunches 10.5 PFLOPS, needs 12MW of power, and is built out of 705,000 Sparc64 VIIIfx cores.

Submission + - SPAM: Google Instant Apps – The Rise of Mobile App Deep Linking

An anonymous reader writes: Android/Google Instant Apps – In shorts, a tap on URL can open in an Android app, even if that person doesn’t have the app installed. Now Developers can use source code from Google that permits them to open specific page within their App via links. It’s basically a deep-linking technology where developers won’t require building new apps.

A user can try the app without installing it & also it will benefit the app developers as after completing few tasks, a percentage of users will decide to install the app & ultimately become the frequent user of the App. It will increase the user engagement & can change the journey of certain brands & products.

  What is Deep Link -

A deep link is a URL that opens & directs a user to specific location within an App. For example open safari & type twitter:// into the search field and press Go. If Twitter is installed on your phone, the app will launch, otherwise safari will try to load the address.

Why Deep Linking is important -

If you wanted your user to go from a view in your app straight to your company’s Twitter Page. You have two options

Put a display button to launch Twitter within your App. Once they arrived they need to authenticate with Twitter if they are not signed in.
Direct your user to exit your app, open the twitter app & then search for your company’s page.
  With the use of Deep Link user can tap on a button & directly launch their Twitter to your company’s profile page. With the use of Deep Link you can direct your user to any specific screen in your App.

Deep linking is an important tool for app creator who is looking to enhance user engagement & improve on-boarding process by identifying which campaigns drive user to your App.

Cons-

Cookies are the main source of getting user identity on Web & also provide details regarding user activities. But Cookies doesn’t exist within App. However it is still unclear how Google Instant App interacts with analytic tool & how that engagement information can be matched.

Submission + - Intel Ships 72-Core Knight's Landing Xeon Phi Processors (hothardware.com)

MojoKid writes: It has been nearly two years since we first heard about Intel's next generation Xeon Phi "Knights Landing" processors, which are designed for High Performance Computing (HPC) applications. The processors are a big part of Intel's Scalable System Framework (SSF) and are built on using general-purpose x86 architecture and open standards. Today, Intel announced that its Xeon Phi processors are finally available to customers, nearly a year after the company's originally-quoted launch date. Intel Xeon Phi processors feature double-precision performance in excess of 3 teraflops along with 8+ teraflops of single-precision performance. All Xeon Phi processors incorporate 16GB of on-package MCDRAM memory, which Intel says is five times more power efficient as GDDR5 and offers 500GB/s of sustained memory bandwidth. MCDRAM can effectively be used as a high-speed cache or as a complimentary addition to the system DDR4 memory. Intel is targeting its Xeon Phi as a more competitive solution versus NVIDIA's dedicated Tesla GPU accelerators, citing up to a 5.2x performance advantage in visualization, up to a 2.7x in mathematical modeling, and up to a 5x increase in life sciences apps. The Xeon Phi is available in four basic configurations with 64 to 72 cores, and with processor frequencies ranging from 1.3GHz to 1.5GHz. All four support up to 384GB of DDR4 memory, but the base Xeon Phi 7210 is limited to the 2133MHz variety. Intel notes these are the company's first bootable host processors specifically designed for highly parallel workloads.

Slashdot Top Deals

Garbage In -- Gospel Out.

Working...