Welcome to the “Slashdot Science-Technology News” update from Hawaii Science Digest.
Views expressed in this science and technology news summary are those of the reporters and correspondents.
Content provided by https://slashdot.com.
Accessed on 12 July 2019, 1500 UTC.
Please scroll down to read your selections.
But webcast attendees were largely there for one reason: To dispute Microsoft’s plan to eliminate internal use rights. Yet Microsoft officials held fast to their stance, saying the company had to make some trade-offs in order to deliver on other priorities, such as making it easier for partners to connect with more users, partners and sellers. […] For what it’s worth, someone I know at Microsoft said Microsoft is currently incurring about $200 million in costs annually (and growing) resulting from its services being used by partners via IUR products.
As ETH Zurich explains, some of the advantages of this type of image capture is “a very high dynamic range, no motion blur, and a latency in the order of microseconds.” The downside is that there’s no easy way to process the resulting “footage” into something you can display using current algorithms because they all expect to receive a set of discrete frames. Well, there was no easy way. This is what the folks at ETH Zurich just improved upon, developing a reconstruction model that can interpret the footage to the tune of 5,000+ frames per second. The results are astounding: a 20% increase in the reconstructed image quality over any model that existed before, and the ability to output “high frame rate videos (more than 5,000 frames per second) of high-speed phenomena (e.g. a bullet hitting an object),” even in high dynamic range “challenging lighting conditions.”Their findings have been published in a research paper titled High Speed and High Dynamic Range Video with an Event Camera.
Network�Configuration�Manager�(NCM)�is�designed�to�deliver�powerful�network�configuration�and compliance�management.�Automate�config�backups�so�you�can�quickly�roll�back�a�blown�configuration�or�provision�a replacement�device.�Continuously�audit�configs�and�get�alerted�if�a�device�is�out�of�compliance,�then�be�able�to�remediate vulnerabilities�rapidly�through�bulk�config�deployment.�Help�prevent�unauthorized�network�changes�through�change delegation,�monitoring,�and�alerting.
Download Free Trial
According to the U.S. Department of Justice, Steele deserved a significant prison term. However, his cooperation and genuine remorse should be taken into account. Based on the sentencing guidelines Steele faced a potential prison sentence of more than 12 years, but Assistant U.S. Attorney Benjamin Langner recommended five years in prison instead. Judge Ericksen went along with this recommendation. The Judge noted that courts “are not a tool in the box for anybody’s hustle,” adding that the five-year sentence was “imminently fair,” as the Star Tribune report. “I condemn the actions that you took in committing this crime. I congratulate you, however, on the actions you took” in responding to the charges, Judge Ericksen said.
And it’s leaking radiation, according to a press release issued by Norway’s Institute of Marine Research (IMR). The amount of cesium radiation leaking from the wreck is significant, at about 800,000 times the typical reading for the Norwegian Sea, but it “poses no risk to people or fish,” according to a collaborative research team involving IMR and the Norwegian Radiation and Nuclear Safety Authority (DSA). A leaking radioactive sub certainly sounds scary, but this research suggests the wreck is not currently endangering the Norwegian Sea and outlying areas. Normally, radiation levels in the Norwegian Sea are at 0.001 Becquerel (Bq) per liter. Around the wreck, however, they are as high as 100 Bq per liter. For reference, the acceptable amount of radiation in food is 600 Bq per kilogram, as established by the Norwegian government in the wake of the Chernobyl disaster.
“It’s a complete waste of resources because what we can do is have cars that are also batteries and those cars are parked most of the time,” Thomas said.
[I]n Philadelphia, Parks & Recreation defends its use of the Mosquito, saying the devices are operational from 10 p.m. to 6 a.m. only, and they’re just one part of an overall anti-vandalism strategy that includes fences and gates, security cameras and night watch staff. For now, the city is moving forward with installation. Despite the backlash, two new Mosquito devices are being installed at other city playgrounds as part of major renovation projects.
Among the fierce corps of Windows Update skeptics, the Compatibility Appraiser tool is to be shunned aggressively. The concern is that these components are being used to prepare for another round of forced updates or to spy on individual PCs. The word telemetry appears in at least one file, and for some observers it’s a short step from seemingly innocuous data collection to outright spyware. […] I strongly suspect that some part of the Appraiser component on Windows 7 SP1 had a security issue of its own. If that’s the case, then the updates indisputably belong in a Security-only update. And if they happen to get installed on systems where administrators had taken special precautions not to install those components, Microsoft’s reaction seems to be, “Well … tough.”“The Appraiser tool was offered via Windows Update, both separately and as part of a monthly rollup update two years ago; as a result, most of the declining population of Windows 7 PCs already has it installed,” the report notes.
Co-author Tuomas Sandholm of Carnegie Mellon University has been grappling with the unique challenges poker poses for AI for the last 16 years. No-Limit Texas Hold ’em is a so-called “imperfect information” game, since there are hidden cards (held by one’s opponents in the hand) and no restrictions on the size of the bet one can make. By contrast, with chess and Go, the status of the playing board and all the pieces are known by all the players. Poker players can (and do) bluff on occasion, so it’s also a game of misleading information.
The malware was able to copy popular apps on the phone, including WhatsApp and the web browser Opera, inject its own malicious code and replace the original app with the weaponized version, using a vulnerability in the way Google apps are updated. The hijacked apps would still work just fine, which hid the malware from users. Armed with all the permissions users had granted to the real apps, “Agent Smith” was able to hijack other apps on the phone to display unwanted ads to users. That might not seem like a significant problem, but the same security flaws could be used to hijack banking, shopping and other sensitive apps, according to Aviran Hazum, head of Check Point’s analysis and response team for mobile devices.There was also a “dormant” version of “Agent Smith” in 11 apps on the Play Store, which could have been triggered into action by a banner ad containing the keyword “infect.” The apps have since been removed from the Play Store, but had over 10 million downloads.
I’ve been trying to monitor apps that have these characteristics: 1. They have In-App purchases for their subscriptions. 2. They have bad reviews, specially with words like “scam” or “fraud”. 3. Their “good” reviews are generic, potentially bot-generated. This weekend I focused on 5 apps from 2 different developers and to my surprise they are very similar, not only their UI/UX but also their code is shared and their patterns are absolutely the same. A side from being classic subscription scam apps, I wanted to examine how they work internally and how they communicate with their servers and what type of information are they sending.
Further reading: Microsoft Might Crush Slack Like Facebook Crushed Snapchat.
Even as many companies strengthen their policies to close the gender pay gap and end sexual harassment, mental wellbeing often remains an afterthought. “This is not about buying Fitbits for employees and teaching them deep breathing so we can pile on more work,” says Donna Hardaker, a workplace mental health specialist at Sutter Health, a not-for-profit healthcare network. “You must address the micro and the macro. There is a deeply entrenched cultural idea that workplaces are fine; it’s the employees who are the problem. But employers have a social responsibility to not be harming the people who are working within their walls.”
A failure to support employees is also costing companies a fortune: an estimated 615 million people suffer from depression and anxiety and, according to a recent World Health Organisation study, this costs an estimated $1tn in lost productivity every year. Companies that do not have systems in place to support the wellbeing of their employees have higher turnover, lower productivity and higher healthcare costs, according to the American Psychological Association. They also face significant legal risks.