×
Facebook

Facebook Tried To Buy Asian Snapchat Clone Snow (techcrunch.com) 10

Jon Russell, reporting for TechCrunch:Here's fuel to the fire for those who believe that Facebook will buy anything that looks, smells or moves like Snapchat. The U.S. social networking giant this summer made an unsuccessful bid to acquire Snow, a Snapchat-like service from Naver, the $25 billion-valued Korean firm behind chat app Line, a source close to the company told TechCrunch. Snow currently has around 80 million downloads, and it is adding around 10 million more each month, according to the source. That growth has also encouraged acquisition interest from Tencent -- the maker of blockbuster chat app WeChat -- Alibaba and others, TechCrunch understands. "It's true that Snow is receiving love calls from various companies," a representative from Naver told us in a statement. Despite acknowledging outside interest, Naver did not name Snow's would-be suitors.
AI

Is Microsoft Mainstreaming Machine Learning? (networkworld.com) 51

Tuesday Microsoft updated their open source Microsoft Cognitive Toolkit (CNTK), adding support for both C++ and Python. "This announcement is more than a point release..." argues Network World. "It's the recognition of AI and machine learning as the next big platform after mobile." This announcement represents a shift in Microsoft's customer focus from research to implementation... The toolkit is a supervised machine learning system in the same category of other open-source projects such as Tensorflow, Caffe and Torch. Microsoft is one of the leading investors in and contributors to the open machine learning software and research community. A glance at the Neural Information Processing Systems conference reveals that there are just four major technology companies committed to moving the field of neural networks forward: Microsoft, Google, Facebook and IBM.
A Microsoft engineer described CNTK as "democratizing AI," according to Microsoft's announcement, which also notes that their toolkit "has been optimized to best take advantage of the NVIDIA hardware and Azure networking capabilities that are part of the Azure offering."
IT

Seoul Considers Messaging Ban After Work Hours (thestack.com) 76

An anonymous reader writes: The city legislature of Seoul, South Korea, is considering implementing a law that would ban after work messaging to employees, in an effort to reduce work-related stress among employees. Members of the Seoul Metropolitan Council proposed a revision to a public ordinance that would ban after-work messaging to employees of the city's government. The new rule is an attempt to guarantee employees the right to restand states that employee privacy must not be subject to employer contact outside of work hours. If passed, it would ban managers from contacting public sector employees after work hours through phone calls, text messaging, or social networking. Kim Kwang-soo, one of the councilors who submitted the ordinance revision, said that the Seoul Metropolitan Government (SMG) must guarantee the rights of city workers by protecting them from undue stress. He said, "Of course SMG officials must always be prepared for the needs of citizens, but many of them are working under conditions that infringe on their right to rest."
Communications

A Radiologist Has the Fastest Home Internet In the US (vice.com) 135

An anonymous reader writes: Jason Koebler via Motherboard has interviewed James Busch -- a radiologist and owner of "the first 10 Gbps residential connection in the United States" -- at a coffee shop in Chattanooga, Tennessee. Motherboard reports: "For reference, the Federal Communications Commission officially classifies 'broadband' as 25 Mbps. His connection is 400 times faster than that. Busch found a way to make good use of his 1 Gbps connection, and now he's found a use for 10 Gbps, too. 'An X-ray averages around 200 megabytes, then you have PET scans and mammograms -- 3D mammograms are 10 gig files, so they're enormous,' Busch said. 'We go through terabytes a year in storage. We've calculated out that we save about 7 seconds an exam, which might seem like, 'Who cares,' but when you read 20,000 or 30,000 exams every year, it turns out to be something like 10 days of productivity you're saving just from a bandwidth upgrade.' While 10 gig connections sound excessive at the moment, Busch says his family quickly started using all of its 1 gig bandwidth. 'We ballooned into that gig within eight or nine months. With my kids watching Netflix instead of TV, with me working, we did utilize that bandwidth,' he said. 'There were situations where my daughter would be FaceTiming and the others would be streaming on the 4K TVs and they'd start screaming at each other about hogging the bandwidth. We don't see that at 10 gigs.' So why does Busch have a 10 Gbps and the rest of us don't? For one, 10 Gbps offerings are rare and scattered in mostly rural communities that have decided to build their own internet networks. Most companies that have the technology offer gigabit connections (a still cutting-edge technology only available in a handful of cities) at affordable prices and 10 Gbps connections at comparatively exorbitant ones. In Chattanooga, 1 gig connections are $69.99 per month; 10 gig connections are $299. Thus far, 10 Gbps connections are available in Chattanooga; parts of southern Vermont; Salisbury, North Carolina; and parts of Detroit and Minneapolis. But besides Busch, I couldn't find any other people in the United States who have signed up for one. EPB, the Chattanooga government-owned power utility that runs the network, confirmed that Busch is the city's only 10 Gbps residential customer. Rocket Fiber, which recently began offering 10 Gbps in Detroit, told me that it has 'no customers set in stone,' but that it's in talks with prospective ones. Representatives for U.S. Internet in Minneapolis and Fibrant in Salisbury did not respond to my requests for comment. Michel Guite, president of the Vermont Telephone Company, told me his network has no 10 Gbps customers, either."
Intel

Intel Announces Atom E3900 Series - Goldmont for the Internet of Things (anandtech.com) 68

Intel has announced the Atom E3900 series. Based upon the company's latest generation Goldmont Atom CPU core, the E3900 series will be Intel's most serious and dedicated project yet for the IoT market. AnandTech adds: So what does an IoT-centric Atom look like? By and large, it's Broxton and more. At its core we're looking at 2 or 4 Goldmont CPU cores, paired with 12 or 18 EU configurations of Intel's Gen9 iGPU. However this is where the similarities stop. Once we get past the CPU and GPU, Intel has added new features specifically for IoT in some areas, and in other areas they've gone and reworked the design entirely to meet specific physical and technical needs of the IoT market. The big changes here are focused on security, determinism, and networking. Security is self-evident: Intel's customers need to be able to build devices that will go out into the field and be hardened against attackers. Bits and pieces of this are inerieted from Intel's existing Trusted Execution Technology, while other pieces, such as boot time measuring, are new. The latter is particularly interesting, as Intel is measuring the boot time of a system as a canary for if it's been compromised. If the boot time suddenly and unexpectedly changes, then there's a good chance the firmware and/or OS has been replaced.
Communications

Study Finds Little Lies Lead To Bigger Ones (go.com) 187

An anonymous reader quotes a report from ABC News: Telling little fibs leads down a slippery slope to bigger lies -- and our brains adapt to escalating dishonesty, which makes deceit easier, a new study shows. Neuroscientists at the University College London's Affective Brain Lab put 80 people in scenarios where they could repeatedly lie and get paid more based on the magnitude of their lies. They said they were the first to demonstrate empirically that people's lies grow bolder the more they fib. The researchers then used brain scans to show that our mind's emotional hot spot -- the amygdala -- becomes desensitized or used to the growing dishonesty, according to a study published online Monday in the journal Nature Neuroscience. And during this lying, brain scans that show blood supply and activity at the amygdala decrease with increasing lies, said study co-author and lab director Tali Sharot. "The more we lie, the less likely we are to have an emotional response" -- say, shame or guilt -- "that accompanies it," Sharot said. Garrett said he suspects similar escalation factors happen in the "real world," which would include politics, infidelity and cheating, but he cautioned that this study was done in a controlled lab setting so more research would be needed to apply it to other situations. The study found that there is a segment of people who don't lie and don't escalate lies, but Sharot and Garrett weren't able to determine how rare those honest people are. It also found that people lie more when it benefits both them and someone else than when they just profit alone.
Security

Who Should We Blame For Friday's DDOS Attack? (fortune.com) 190

"Wondering which IoT device types are part of the Mirai botnet causing trouble today? Brian Krebs has the list," tweeted Trend Micro's Eric Skinner Friday, sharing an early October link which identifies Panasonic, Samsung and Xerox printers, and lesser known makers of routers and cameras. An anonymous reader quotes Fortune: Part of the responsibility should also lie with lawmakers and regulators, who have failed to create a safety system to account for the Internet-of-Things era we are now living in. Finally, it's time for consumers to acknowledge they have a role in the attack too. By failing to secure the internet-connected devices, they are endangering not just themselves but the rest of the Internet as well.
If you're worried, Motherboard is pointing people to an online scanning tool from BullGuard (a U.K. anti-virus firm) which checks whether devices on your home network are listed in the Shodan search engine for unsecured IoT devices. But earlier this month, Brian Krebs pointed out the situation is exacerbated by the failure of many ISPs to implement the BCP38 security standard to filter spoofed traffic, "allowing systems on their networks to be leveraged in large-scale DDoS attacks..."
Media

Cisco Develops System To Automatically Cut-Off Pirate Video Streams (torrentfreak.com) 112

An anonymous reader quotes a report from TorrentFreak: Pirate services obtain content by capturing and restreaming feeds obtained from official sources, often from something as humble as a regular subscriber account. These streams can then be redistributed by thousands of other sites and services, many of which are easily found using a simple search. Dedicated anti-piracy companies track down these streams and send takedown notices to the hosts carrying them. Sometimes this means that streams go down quickly but in other cases hosts can take a while to respond or may not comply at all. Networking company Cisco thinks it has found a solution to these problems. The company's claims center around its Streaming Piracy Prevention (SPP) platform, a system that aims to take down illicit streams in real-time. Perhaps most interestingly, Cisco says SPP functions without needing to send takedown notices to companies hosting illicit streams. "Traditional takedown mechanisms such as sending legal notices (commonly referred to as 'DMCA notices') are ineffective where pirate services have put in place infrastructure capable of delivering video at tens and even hundreds of gigabits per second, as in essence there is nobody to send a notice to," the company explains. "Escalation to infrastructure providers works to an extent, but the process is often slow as the pirate services will likely provide the largest revenue source for many of the platform providers in question." To overcome these problems Cisco says it has partnered with Friend MTS (FMTS), a UK-based company specializing in content-protection. Among its services, FMTS offers Distribution iD, which allows content providers to pinpoint which of their downstream distributors' platforms are a current source of content leaks. "Robust and unique watermarks are embedded into each distributor feed for identification. The code is invisible to the viewer but can be recovered by our specialist detector software," FMTS explains. "Once infringing content has been located, the service automatically extracts the watermark for accurate distributor identification." According to Cisco, FMTS feeds the SPP service with pirate video streams it finds online. These are tracked back to the source of the leak (such as a particular distributor or specific pay TV subscriber account) which can then be shut-down in real time.
Networking

'Cultlike' Devotion: Apple Once Refused To Join Open Compute Project, So Their Entire Networking Team Quit (businessinsider.com) 239

mattydread23 writes: Great story about the Open Compute Project from Business Insider's Julie Bort here, including this fun tidbit: "'OCP has a cultlike following,' one person with knowledge of the situation told Business Insider. 'The whole industry, internet companies, vendors, and enterprises are monitoring OCP.' OCP aims to do for computer hardware what the Linux operating system did for software: make it 'open source' so anyone can take the designs for free and modify them, with contract manufacturers standing by to build them. In its six years, OCP has grown into a global entity, with board members from Facebook, Goldman Sachs, Intel, and Microsoft. In fact, there's a well-known story among OCP insiders that demonstrates this cultlike phenom. It involves Apple's networking team. This team was responsible for building a network at Apple that was so reliable, it never goes down. Not rarely -- never. Building a 100% reliable network to meet Apple's exacting standards was no easy task. So, instead of going it alone under Apple's secrecy, the Apple networking team wanted to participate in the revolution, contributing and receiving help. But when the Apple team asked to join OCP, Apple said 'no.' 'The whole team quit the same week,' this person told us."
Network

Millimeter-wave 5G Modem Coming Mid-2018 With 5Gbps Peak Download (arstechnica.com) 39

Qualcomm is promising to launch its first 5G modem in 2018, even though basic standards for 5G have yet to be established, nor even which part of the radio spectrum it will use. From an ArsTechnica report: Dubbed the Snapdragon X50, the San Diego chipmaker says its new modem will be able to deliver blindingly fast peak download speeds of around 5Gbps. The X50 5G will at first operate with a bandwidth of about 800MHz on the 28GHz millimetre wave (mmWave in Qualcomm jargon) spectrum, a frequency that's also being investigated by Samsung, Nokia, and Verizon. However, the powers that be have far from settled on this area of the spectrum, with 73GHz also being mooted. In the UK, Ofcom is investigating several bands in a range between 6GHz and 100GHz. As the industry as a whole is a long way from consensus, this could be Qualcomm's bid to get the final frequency locked down well before 2020 -- the year that 5G is expected to reach any kind of consumer penetration. "The Snapdragon X50 5G modem heralds the arrival of 5G as operators and OEMs reach the cellular network and device testing phase," said Qualcomm exec veep Cristiano Amon. "Utilising our long history of LTE and Wi-Fi leadership, we are thrilled to deliver a product that will help play a critical role in bringing 5G devices and networks to reality. This shows that we're not just talking about 5G, we're truly committed to it."
Google

OpenCAPI: Google and IBM Lead Tech Consortium To Speed Data Centre Performance (thestack.com) 11

An anonymous reader writes: IBM is leading a prestigious consortium of tech players in the open development of a new framework that, the company says, can speed data centre performance by a factor of 10. Participants in the OpenCAPI group include IBM, Google, Nvidia, Mellanox, Hewlett Packard Enterprise, Micron and Xilinx. Chris Johnson, a Principal Engineer at Google commented 'Google is committed to open standards and we are excited to contribute to the cross-industry use and development of OpenCAPI'. Google's collaboration with RackSpace on the Zaius server will include IBM's forthcoming POWER9 processor technology, which is built around OpenCAPI. Tom Eby, vice president of Micron's compute and networking business said:"While memory has always been an essential building block for computing, it is quickly becoming the critical technology to unlocking next-generation performance."
AI

Google Creates AI Program That Uses Reasoning To Navigate the London Tube (theguardian.com) 76

An anonymous reader quotes a report from The Guardian: Google scientists have created a computer program that uses basic reasoning to learn to navigate the London Underground system by itself. Deep learning has recently stormed ahead of other computing strategies in tasks like language translation, image and speech recognition and even enabled a computer to beat top-ranked player, Lee Sedol, at Go. However, until now the technique has generally performed poorly on any task where an overarching strategy is needed, such as navigation or extracting the actual meaning from a text. The latest program achieved this by adding an external memory, designed to temporarily store important pieces of information and fish them out when needed. The human equivalent of this is working memory, a short-term repository in the brain that allows us to stay on task when doing something that involves several steps, like following a recipe. In the study, published in the journal Nature, the program was able to find the quickest route between underground stops and work out where it would end up if it traveled, say, two stops north from Victoria station. It was also given story snippets, such as "John is in the playground. John picked up the football." followed by the question "Where is the football?" and was able to answer correctly, hinting that in future assistants such Apple's Siri may be replaced by something more sophisticated. Alex Graves, the research scientist at Google DeepMind in London who led the work, said that while the story tasks "look so trivial to a human that they don't seem like questions at all," existing computer programs "do really badly on this." The program he developed got questions like this right 96% of the time.
Open Source

FreeBSD 11.0 Released (freebsdfoundation.org) 121

Long-time Slashdot reader basscomm writes, "After a couple of delays, FreeBSD 11 has been released. Check out the release notes here." The FreeBSD Foundation writes: The latest release continues to pioneer the field of copyfree-licensed, open source operating systems by including new architecture support, performance improvements, toolchain enhancements and support for contemporary wireless chipsets. The new features and improvements bring about an even more robust operating system that both companies and end users alike benefit greatly from using.
FreeBSD 11 supports both the ARMv8 and RISC-V architectures, and also supports the 802.11n wireless networking standard. In addition, OpenSSH has been updated to 7.2p2, and OpenSSH DSA key generation has been disabled by default, so "It is important to update OpenSSH keys prior to upgrading."
Security

MITRE Dangles $50,000 Prize For Spotting Rogue Internet of Things Devices (securityledger.com) 51

Long-time Slashdot reader chicksdaddy quotes Security Ledger: MITRE Corporation, the non-profit corporation that helps tackle some of the trickiest technical and security challenges out there, is dangling a $50,000 prize for anyone who can develop a solution for spotting rogue devices within an Internet of Things network...saying that it's looking for ground breaking new approaches to securing diverse Internet of Things networks like those in connected homes.

"Network administrators need to know exactly what is in the environment, or the network -- including when an adversary has switched out one device for another. In other words, is the smart thermostat we see today the same one that was there yesterday? We are looking for a unique identifier or fingerprint to enable administrators to enumerate the IoT devices while passively observing the network... "
Their registration form will be open through October, and the challenge will end after four weeks in November, or "whenever someone wins."
Advertising

12-Year-Old Boy Gets $100K Bill From Google After Confusing Adwords With Adsense (theregister.co.uk) 140

The names Google gives to its services can be a bit confusing at times, especially since there are so many of them. For example, Adwords and Adsense look and sound very similar but they deal with two different transaction types. While Adwords deals with spending money, Adsense deals with earning money. A 12-year-old boy in Spain managed to confused the two services and ended up with a bill of 100,000 euros ($111,490). The Register reports: Jose Javier, 12, had signed up for Google's Adwords program in order to make money from advertisements placed alongside YouTube videos of his band, the Torrevieja llamada Los Salerosos -- en ingles, the Torrevieja Fun Guys -- named after the Alicante town in which he lives. Unfortunately, for the young musician, Google's AdWords program is for those wishing to advertise at cost, rather than run advertisements for profit. According to a report from Spanish daily El Pais, Jose and a friend planned to buy instruments, play music, get rich and buy a mansion by subscribing to the service. By early September the account was being billed by Google, receiving charges which reportedly rose quickly from an initial 15 euros ($16.72) to 19,700 euros ($21,960.57) at a time until the amount owed hit six figures. Google's statement noted that AdWords has age restrictions in place and encouraged families to familiarize itself with its Safety Center, but the boy's mother complained to El Pais that it was too easy for her son to make the purchases from Google, requiring him only to provide his savings account details, which he did in mid-August. Thankfully, Google was kind enough to cancel the outstanding balance on its Adwords service.
Open Source

Linus Torvalds Officially Announces the Release of Linux Kernel 4.8 (softpedia.com) 95

Slashdot reader prisoninmate brings news from Softpedia: Today, Linus Torvalds proudly announced the release and availability for download of the Linux 4.8 kernel branch, which is now the latest stable and most advanced one. Linux kernel 4.8 has been in development for the past two months, during which it received no less than eight Release Candidate testing versions that early adopters were able to compile and install on their GNU/Linux operating system to test various hardware components or simply report bugs...

A lot of things have been fixed since last week's RC8 milestone, among which we can mention lots of updated drivers, in particular for GPU, networking, and Non-Volatile Dual In-line Memory Module (NVDIMM), a bunch of improvements to the ARM, MIPS, SPARC, and x86 hardware architectures, updates to the networking stack, as well as to a few filesystem, and some minor changes to cgroup and vm.

The kernel now supports the Raspberry Pi 3 SoC as well as the Microsoft Surface 3 touchscreen.
Security

Splunk CTO Urges Collaboration Against Cyberattacks - And 'Shapeshifting' Networks (itwire.com) 88

"The cost of cyber attacks is 1/10th to 1/100th the cost of cyber defense," says the CTO of Splunk -- because the labor is cheap, the tools are free, and the resources are stolen. "He says what's needed to bring down the cost of defense is collaboration between the public sector, academia and private industry...the space race for this generation," reports Slashdot reader davidmwilliams.

Splunk CTO Snehal Antani suggests earlier "shift left" code testing and continuous delivery, plus a wider use of security analytics. But he also suggests a moving target defense "in which a shapeshifting network can prevent reconnaissance attacks" with software defined networks using virtual IP addresses that would change every 10 seconds. "This disrupts reconnaissance attacks because a specific IP address may be a Windows box one moment, a Linux box another, a mainframe another."
Networking

Researcher Find D-Link DWR-932 Router Is 'Chock Full of Holes' (helpnetsecurity.com) 70

Reader JustAnotherOldGuy writes: Security researcher Pierre Kim has unearthed a bucketload of vulnerabilities in the LTE router/portable wireless hotspot D-Link DWR-932. Kim found the latest available firmware has these vulnerabilities: Two backdoor accounts with easy-to-guess passwords that can be used to bypass the HTTP authentication used to manage the router
-A default, hardcoded Wi-Fi Protected Setup (WPS) PIN, as well as a weak WPS PIN generation algorithm
- Multiple vulnerabilities in the HTTP daemon
- Hardcoded remote Firmware Over The Air credentials
- Lowered security in Universal Plug and Play, and more.
"At best, the vulnerabilities are due to incompetence; at worst, it is a deliberate act of security sabotage from the vendor," says Kim, and advises users to stop using the device until adequate fixes are provided.

Facebook

Facebook at Work To Report For Duty Next Month (fortune.com) 83

The debut of the long-awaited business social network is nigh. Facebook at Work is about to report for duty. The social networking company's long-awaited foray into business applications will formally debut in London on October 10, according to tech site TechCrunch. From a report:The news site further noted this would be Facebook's first major product launch to take place outside the United States. Thus far, Facebook is seen as a fun-and-games site, not something corporate employees use to converse or track each other. But Facebook at Work, a business-minded operation, could help change that image. As has been reported, it will be a separate version of the network that can be accessed only from a company's internal IT systems, and in theory, subject to stricter corporate security and access rules. Personal accounts will be cordoned off.

Slashdot Top Deals