Sorry, you need to enable JavaScript to visit this website.

Feed aggregator

Hollywood, Apple Said To Mull Rental Plan, Defying Theaters

Slashdot - Fri, 18/08/2017 - 7:20pm
An anonymous reader shares a report: Movie studios are considering whether to ignore the objections of cinema chains and forge ahead with a plan to offer digital rentals of films mere weeks after they appear in theaters, according to people familiar with the matter. Some of the biggest proponents, including Warner Bros and Universal Pictures, are pressing on in talks with Apple and Comcast on ways to push ahead with the project even without theater chains, the people said. After months of negotiations, the two sides have been unable to arrive at a mutually beneficial way to create a $30 to $50 premium movie-download product. The leading Hollywood studios, except for Walt Disney, are eager to introduce a new product to make up for declining sales of DVDs and other home entertainment in the age of Netflix. They have discussed sharing a split of the revenue from premium video on demand, or PVOD, with the cinema chains if they give their blessing to the concept. But the exhibitors have sought a long-term commitment of as much as 10 years for that revenue split, which the studios have rejected, the people said. Deals with potential distributors such as Apple and Comcast could be reached as soon as early next year to sell digital downloads of major films as soon as two weeks after they debut in theaters, the people said.

Read more of this story at Slashdot.

Ubuntu Dock Now Present By Default In Ubuntu 17.10's GNOME Session

Phoronix - Fri, 18/08/2017 - 7:06pm
Making their GNOME Shell session more like the Unity 7 experience, Ubuntu 17.10 as of today is installing its new Ubuntu Dock by default...

Developer Accidentally Deletes Three-Month of Work With Visual Studio Code

Slashdot - Fri, 18/08/2017 - 6:40pm
New submitter joshtops writes: A developer accidentally three-month of his work. In a post, he described his experience, "I had just downloaded VScode as an alternative and I was just playing with the source control option, seeing how it wanted to stage -- five thousand files -- I clicked discard... AND IT DELETED ALL MY FILES, ALL OF THEM, PERMANENTLY! How the f*uk is this s*it possible, who the hell is the d******* who made the option to permanently delete all the files on a project by accident even possible? Cannot even find them in the Recycle Bin!!!! I didn't even thought that was possible on Windows!!! F*ck this f*cking editor and f*ck whoever implemented this option. I wish you the worst.'

Read more of this story at Slashdot.

How Hackers Are Targeting the Shipping Industry

Slashdot - Fri, 18/08/2017 - 6:00pm
An anonymous reader shares a report: When staff at CyberKeel investigated email activity at a medium-sized shipping firm, they made a shocking discovery. "Someone had hacked into the systems of the company and planted a small virus," explains co-founder Lars Jensen. "They would then monitor all emails to and from people in the finance department." Whenever one of the firm's fuel suppliers would send an email asking for payment, the virus simply changed the text of the message before it was read, adding a different bank account number. "Several million dollars," says Mr Jensen, were transferred to the hackers before the company cottoned on. After the NotPetya cyber-attack in June, major firms including shipping giant Maersk were badly affected. In fact, Maersk revealed this week that the incident could cost it as much as $300 million in profits. But Mr Jensen has long believed that that the shipping industry needs to protect itself better against hackers -- the fraud case dealt with by CyberKeel was just another example. The firm was launched more than three years ago after Mr Jensen teamed up with business partner Morten Schenk, a former lieutenant in the Danish military who Jensen describes as "one of those guys who could hack almost anything." They wanted to offer penetration testing -- investigative tests of security -- to shipping companies. The initial response they got, however, was far from rosy.

Read more of this story at Slashdot.

Microsoft president exits US govt's digital advisory board as tech leaders quit over Trump

El Reg - Fri, 18/08/2017 - 5:49pm
Plus: Steve Bannon fired from White House

Updated  Tech leaders today resigned from the US government's digital economy advisory board over President Trump's inability to unequivocally condemn racists.…

Vega 10 Huge Page Support, Lower CS Overhead For AMDGPU In Linux 4.14

Phoronix - Fri, 18/08/2017 - 5:35pm
With this weekend marking the ending of David Airlie accepting new feature material for DRM-Next to in turn land in the Linux 4.14 cycle in a few weeks, there's a rush by Direct Rendering Manager driver maintainers to submit the last of their new feature work of changes they want in this next kernel release...

Trump Adviser Steve Bannon is Leaving White House Post

Slashdot - Fri, 18/08/2017 - 5:13pm
President Donald Trump's chief strategist Steve Bannon left his position on Friday (alternative source) as the newly minted chief of staff John Kelly sought to bring order to a White House riven by infighting and power struggles, more than a dozen news outlets report. Maggie Haberman, reporting for The New York Times: The president and senior White House officials were debating when and how to dismiss Mr. Bannon. The two administration officials cautioned that Mr. Trump is known to be averse to confrontation within his inner circle, and could decide to keep on Mr. Bannon for some time. As of Friday morning, the two men were still discussing Mr. Bannon's future, the officials said. A person close to Mr. Bannon insisted the parting of ways was his idea, and that he had submitted his resignation to the president on Aug. 7, to be announced at the start of this week, but the move was delayed after the racial unrest in Charlottesville, Va.

Read more of this story at Slashdot.

Bing is 'Bigger Than You Think', Says Microsoft

Slashdot - Fri, 18/08/2017 - 4:40pm
Microsoft said this week that Bing is "bigger than you think" and provided some numbers that could be a surprise to many. The company claims that fully one-third of searches in the US are powered by Bing, either directly or through Yahoo or AOL (both of which provide results generated by Microsoft). From a report: With 9% market share worldwide and 12 billion monthly searches, almost half of that (5 billion) comes from the United States where Bing has 33% market share.

Read more of this story at Slashdot.

Atomic Mode-Setting Ported To The Cirrus KMS Driver

Phoronix - Fri, 18/08/2017 - 4:11pm
The Cirrus DRM/KMS driver commonly used by virtual machines with QEMU emulating the vintage graphics processor now has support for atomic mode-setting...

E-Commerce To Evolve Next Month As Amazon Loses the 1-Click Patent

Slashdot - Fri, 18/08/2017 - 4:00pm
An anonymous reader shares an article: Next month e-commerce will change forever thanks to Amazon. September 12 marks 20 years since Amazon filed for their 1-Click patent. This means that the patent will expire and the technology behind it will be free to be used by any e-commerce site. Starting next month more and more sites will be offering a one click checkout experience. Most major sites have already started development with plans to launch soon after the patent expires. Amazon applied for the 1-Click patent in September of 1997, the actual patent was granted in 1999. The whole idea behind the patent is when you store a user's credit card and address you only need a single click to order a product. For the last 20 years Amazon has kept a tight hold on this technology, they have only licensed it to one company: Apple. No one knows what Apple paid to license the technology, but the value of the patent has been assessed at 2.4 billion dollars by sources. Over the last 20 years Amazon has defended the validity of the patent in several cases, even having to revise the patent at one point. But, now the wait is almost over and this technology is about to make it into the open market.

Read more of this story at Slashdot.

Oracle caves, promises to crack open Java EE as v8 crawls ever closer

El Reg - Fri, 18/08/2017 - 3:47pm
Big Red seeks open-source foundation to host platform

Oracle has revealed plans to shift Java Enterprise Edition to an open-source foundation as it promises delivery of version 8 is "approaching".…

Kit Kat Accused of Copying Atari Game Breakout

Slashdot - Fri, 18/08/2017 - 3:20pm
An anonymous reader shares a report: Kit Kat's maker Nestle has been accused of copying Breakout, the 1970s computer game, in a marketing campaign. Atari, the company behind some of the most popular early video games, has filed a suit alleging Nestle knowingly exploited the game's look and feel. The advert showed a game similar to Breakout but where the bricks were replaced with single Kit Kat bars. Nestle said it was aware of the lawsuit and would defend itself "strongly" against the allegations. Breakout was created as a successor to "Pong" by Apple founders, Steve Wozniak and Steve Jobs. In the advert, which is titled "Kit Kat: Breakout", a row of people, of varying ages and appearance, share a sofa and play a video game during their work break. In the game depicted, a primitive paddle moves side-to-side to bounce a ball into a collision with the horizontal bars ranged across the top of the screen.

Read more of this story at Slashdot.

NetApp swallows Icelandic cloud management software biz

El Reg - Fri, 18/08/2017 - 2:50pm
Greenqloud’s QStack becomes gets NetApp-ed

NetApp has made one of its relatively rare acquisitions – this time an Icelandic cloud management software house called Greenqloud with its Qstack product.…

Secret Chips in Replacement Parts Can Completely Hijack Your Phone's Security

Slashdot - Fri, 18/08/2017 - 2:45pm
Dan Goodin, writing for ArsTechnica: People with cracked touch screens or similar smartphone maladies have a new headache to consider: the possibility the replacement parts installed by repair shops contain secret hardware that completely hijacks the security of the device. The concern arises from research that shows how replacement screens -- one put into a Huawei Nexus 6P and the other into an LG G Pad 7.0 -- can be used to surreptitiously log keyboard input and patterns, install malicious apps, and take pictures and e-mail them to the attacker. The booby-trapped screens also exploited operating system vulnerabilities that bypassed key security protections built into the phones. The malicious parts cost less than $10 and could easily be mass-produced. Most chilling of all, to most people, the booby-trapped parts could be indistinguishable from legitimate ones, a trait that could leave many service technicians unaware of the maliciousness. There would be no sign of tampering unless someone with a background in hardware disassembled the repaired phone and inspected it. The research, in a paper presented this week (PDF) at the 2017 Usenix Workshop on Offensive Technologies, highlights an often overlooked disparity in smartphone security. The software drivers included in both the iOS and Android operating systems are closely guarded by the device manufacturers, and therefore exist within a "trust boundary."

Read more of this story at Slashdot.

OpenGL vs. Vulkan On The AMD Ryzen 3

Phoronix - Fri, 18/08/2017 - 2:08pm
We have previously looked at Vulkan vs. OpenGL Linux game CPU core scaling and Linux game scaling across multiple CPUs but at the time did not have a Ryzen 3 system. Now having Ryzen 3 Linux box, here is a look at how the Vulkan versus OpenGL performance compares on the low-end processor. As well, it's a fresh look at the NVIDIA vs. RadeonSI/RADV performance.

So long and thanks for all the phish: Red teams need to be smarter now

El Reg - Fri, 18/08/2017 - 2:06pm
Pen-testers face new challenges as defences evolve

BSides  The opening talk at BSides Manchester on Thursday examined how red team tactics are evolving beyond phishing to include a wider variety of methods.…

How Security Pros Look at Encryption Backdoors

Slashdot - Fri, 18/08/2017 - 2:05pm
An anonymous reader shares a report: The majority of IT security professionals believe encryption backdoors are ineffective and potentially dangerous, with 91 percent saying cybercriminals could take advantage of government-mandated encryption backdoors. 72 percent of the respondents do not believe encryption backdoors would make their nations safer from terrorists, according to a Venafi survey of 296 IT security pros, conducted at Black Hat USA 2017. Only 19 percent believe the technology industry is doing enough to protect the public from the dangers of encryption backdoors. 81 percent feel governments should not be able to force technology companies to give them access to encrypted user data. 86 percent believe consumers don't understand issues around encryption backdoors.

Read more of this story at Slashdot.

Q: How many drones are we bombing ISIS with? A: That's secret, mmkay

El Reg - Fri, 18/08/2017 - 1:23pm
But the MoD will happily tell you how many manned jets we're using to do that exact thing

The UK's Information Tribunal has rejected an appeal by campaigners trying to find out how many British Reaper drones are being used for warlike missions in the Middle East.…

Oracle Is Looking To Offload Java EE To A New Steward

Phoronix - Fri, 18/08/2017 - 1:23pm
Oracle is looking to move Java EE off into an open foundation for future development...

Google Researchers Made An Algorithm To Delete Watermarks From Photos

Slashdot - Fri, 18/08/2017 - 1:00pm
"Researchers at Google have found a vulnerability in the way watermarks are used by stock imagery sites like Adobe Stock that makes it possible to remove the opaque stamp used to protect copyright," writes Khari Johnson via VentureBeat. "The consistent nature in which the watermarks are placed on photos can be exploited using an algorithm trained to recognize and automatically remove watermarks." From the report: Changing the position or opacity of a watermark do not impact the algorithm's ability to remove watermarks from images with copyright protection. Randomization, the researchers say, is required to keep images from being stolen. In results presented at the Computer Vision and Pattern Recognition conference last month, subtle modifications to each watermark can make it harder to remove watermarks. With these warped watermarks, attempts to get rid of watermarks with an algorithm or photo editing software leaves noticeable marks, rendering an image useless. "As often done with vulnerabilities discovered in operating systems, applications or protocols, we want to disclose this vulnerability and propose solutions in order to help the photography and stock image communities adapt and better protect its copyrighted content and creations," research scientists Tali Dekel and Michael Rubenstein wrote in a blog post today. "From our experiments much of the world's stock imagery is currently susceptible to this circumvention." You can learn more about the different types of randomization that can be done to combat watermark removal and see more example images in Google's blog post. The full report and research is available via the project's GitHub page.

Read more of this story at Slashdot.

Syndicate content