tag:blogger.com,1999:blog-33652256290773360342024-02-20T20:12:53.866-08:00"Tap The Glass™" - They hate it when you do that..."While one person hesitates because he feels inferior, the other is busy making mistakes and becoming superior."EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.comBlogger384125tag:blogger.com,1999:blog-3365225629077336034.post-18065609889025932102016-06-23T03:36:00.000-07:002016-06-23T03:37:04.965-07:00Mark Zuckerberg masks Mac webcam and microphone - BBC News [feedly]<div><figure class="media-landscape has-caption full-width lead" style="border: 0px; margin: 32px -61px 0px; padding: 0px; vertical-align: baseline; clear: both;"><span class="image-and-copyright-container" style="border: 0px; font-style: inherit; font-variant: inherit; margin: 0px; padding: 0px; vertical-align: baseline; display: block; position: relative;"><img class="js-image-replace" alt="Mark Zuckerberg" src="http://ichef-1.bbci.co.uk/news/320/cpsprodpb/C341/production/_90058994_mediaitem90058993.jpg" width="976" height="549" style="border: 0px; font-style: inherit; font-variant: inherit; margin: 0px; padding: 0px; vertical-align: baseline; height: auto; max-width: 100%; -webkit-user-select: none; width: 736px; display: block;"><span class="off-screen" style="font-style: inherit; font-variant: inherit; margin: 0px; vertical-align: baseline; clip: rect(1px 1px 1px 1px); overflow: hidden; border: 0px !important; padding: 0px !important; position: absolute !important; height: 1px !important; width: 1px !important;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Image copyright</span></span><span class="story-image-copyright" style="border: 0px; font-style: inherit; font-variant: inherit; margin: 0px; padding: 3px 8px 1px; vertical-align: baseline; bottom: 0px; position: absolute; right: 0px;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">FACEBOOK</span></span></span><figcaption class="media-caption" style="border: 0px; font-style: inherit; font-variant: inherit; margin: 0px; padding: 16px; vertical-align: baseline; visibility: visible;"><span class="off-screen" style="font-style: inherit; font-variant: inherit; margin: 0px; vertical-align: baseline; clip: rect(1px 1px 1px 1px); overflow: hidden; border: 0px !important; padding: 0px !important; position: absolute !important; height: 1px !important; width: 1px !important;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Image caption</span></span><span class="media-caption__text" style="border: 0px; font-style: inherit; font-variant: inherit; margin: 0px; padding: 0px; vertical-align: baseline; display: block;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Eagle-eyed viewers spotted tape on the microphone and webcam of Mr Zuckerberg's computer</span></span></figcaption></figure><p class="story-body__introduction" style="border: 0px; font-weight: bold; margin: 28px 0px 0px; padding: 0px; vertical-align: baseline;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">A photograph of Facebook founder Mark Zuckerberg shows tape has been used to cover his MacBook Pro's webcam and mic.</span></p><p style="border: 0px; margin: 23px 0px 0px; padding: 0px; vertical-align: baseline;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Facebook has not responded to requests for comment about the picture, shared to celebrate Instagram reaching its 500 million monthly user milestone.</span></p><p style="border: 0px; margin: 18px 0px 0px; padding: 0px; vertical-align: baseline;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">FBI director James Comey has previously said he also covers his laptop's webcam to prevent hackers spying on him.</span></p><p style="border: 0px; margin: 18px 0px 0px; padding: 0px; vertical-align: baseline;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">And digital rights group the Electronic Frontier Foundation (EFF) said it regularly sold its webcam "stickers".</span></p><p style="border: 0px; margin: 18px 0px 0px; padding: 0px; vertical-align: baseline;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Documents leaked by former National Security Agency contractor Edward Snowden allege US and UK spy agencies intercepted webcam images from millions of Yahoo users around the world between 2008 and 2010.</span></p></div><div style="-webkit-text-size-adjust: auto;"><br></div><div style="-webkit-text-size-adjust: auto;">Please continue reading from: <br> <a href="http://www.bbc.com/news/technology-36596070">http://www.bbc.com/news/technology-36596070</a><br><br></div>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-45062724574737829672016-05-26T03:36:00.001-07:002016-05-26T03:36:25.111-07:00Some U.S. government agencies are still using Windows 3.1 and 1970s computers <p>Some U.S. government agencies are using IT systems running Windows 3.1, the decades-old COBOL and Fortran programming languages or computers from the 1970s.</p><p>A backup nuclear control messaging system at the U.S. Department of Defense runs on an IBM Series 1 computer, first introduced in 1976, and uses eight-inch floppy disks, while the Internal Revenue Service's master file of taxpayer data is written in assembly language code that's more than five decades old, according to <a target="new" href="http://www.gao.gov/products/GAO-16-696T">a new report</a> from the Government Accountability Office.</p><p>Some agencies are still running Windows 3.1, first released in 1992, as well as the newer but unsupported Windows XP, Representative Jason Chaffetz, a Utah Republican, noted during a Wednesday hearing on outdated government IT systems.</p><p><a href="http://www.computerworld.com/article/3075355/government-it/some-us-government-agencies-are-still-using-windows-31-and-1970s-computers.html#jump">To read this article in full or to leave a comment, please click here</a></p>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-84927861484703875822016-05-10T03:26:00.001-07:002016-05-10T03:26:47.539-07:00Swarm AI Correctly Predicts Kentucky Derby Superfecta, Turns $20 Into $11,000 <div><span style="background-color: rgba(255, 255, 255, 0);">New "<a href="http://unu.ai/swarm-intelligence/" style="text-decoration: none;">Swarm Intelligence</a>" platform UNU from Unanimous A.I. <a href="http://finance.yahoo.com/news/swarm-correctly-predicts-kentucky-derby-160000074.html" style="text-decoration: none;">made a bet on the Kentucky Derby this weekend and won big</a>. The bet is <a href="http://unu.ai/unu-superfecta-11k/" style="text-decoration: none;">called the Superfecta</a>and it paid 540 to 1 odds. "Swarm Intelligence" allows groups to amplify their collective IQ beyond the capacity of individuals, something that the human species hasn't been able to do because of evolutionary restraints. Silicon Valley startup Unanimous A.I. set out to answer one question: Can humans swarm, and if so can we amplify our intelligence beyond the ability of individuals? Spoiler: yes we can. According to Yahoo, "Unanimous spent the last two years building a swarm intelligence platform called UNU that enables groups to get together as online swarms -- combing their thoughts, opinions, and intuitions in real-time to answer questions, make predictions, reach decisions, and even play games as a unified collective intelligence." Already, UNU has predicted the Oscars better than experts, and predicted the NCAA college bowl games with 70% accuracy. As for the Kentucky Derby, Hope Reese, reporter for Tech Republic and the Atlantic, <a href="http://www.techrepublic.com/article/swarm-ai-predicts-the-2016-kentucky-derby/" style="text-decoration: none;">challenged Unanimous A.I. to use UNU to predict the winners</a>. The group used UNU to answer questions as a unified Swarm Intelligence, narrowing the field of 20 horses down to four winners. Then it was asked to order the winners into Win, Place, Show, and Fourth. Swarm Intelligence convened again a week later after the Derby announced the post positions of the horses -- one of the four picks was replaced by an alternate.<br></span><p></p><div><font color="#000000"><span style="background-color: rgba(255, 255, 255, 0);"><a href="http://twitter.com/home?status=Swarm+AI+Correctly+Predicts+Kentucky+Derby+Superfecta%2C+Turns+%2420+Into+%2411%2C000%3A+http%3A%2F%2Fbit.ly%2F23E4ESb"></a><a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F16%2F05%2F10%2F0130206%2Fswarm-ai-correctly-predicts-kentucky-derby-superfecta-turns-20-into-11000%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"></a><a href="http://plus.google.com/share?url=https://news.slashdot.org/story/16/05/10/0130206/swarm-ai-correctly-predicts-kentucky-derby-superfecta-turns-20-into-11000?utm_source=slashdot&utm_medium=googleplus"></a></span></font></div><p><font color="#000000"><span style="background-color: rgba(255, 255, 255, 0);"><a href="https://news.slashdot.org/story/16/05/10/0130206/swarm-ai-correctly-predicts-kentucky-derby-superfecta-turns-20-into-11000?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</span></font></p></div><div></div>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-2704370024411688562016-05-03T03:23:00.001-07:002016-05-03T03:23:12.473-07:0020-Yr-Old Compaq Laptop Is Still Crucial to Maintaining McLaren's Multi-Million Dollar Cars [feedly]<span style="margin-top: 15px; display: block;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Sometimes things should work... Our phone system and a desktop are older and run 24/7 still</span></span><span style="margin-top: 15px; display: block;"><span style="-webkit-text-size-adjust: auto;">Slashdot: </span><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">It may come as a surprise to many, but the 20-year-old Compaq LTE 5280 still plays a vital role in maintaining multi-million dollar McLaren F1s. Jalopnik recently visited McLaren's Special Operations workshop where it found <a href="http://jalopnik.com/this-ancient-laptop-is-the-only-key-to-the-most-valuabl-1773662267" style="text-decoration: none;">several of Compaq's old laptops serving their masters</a>. Why do they rely on these dated computers, you ask? A McLaren Special Operations staff explains, "The reason we need those specific Compaq laptops is that they run a bespoke CA card which is installed into them. The CA card is an interface between the laptop software (which is DOS based) and the car. We are currently working on a new interface which will be compatible with modern laptops as the old Compaqs are getting less and less reliable and harder to find."</span></span><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">For those wondering, the Compaq LTE 5280 comes with a 120MHz Intel Pentium processor, up to "80MB" of RAM, and up to 1.2GB of HDD.</span><br><p style="-webkit-text-size-adjust: auto;"></p><div style="-webkit-text-size-adjust: auto;"> <a href="http://twitter.com/home?status=20-Yr-Old+Compaq+Laptop+Is+Still+Crucial+to+Maintaining+McLaren%27s+Multi-Million+Dollar+Cars%3A+http%3A%2F%2Fbit.ly%2F1W2OCC5"><!-- incorrect visual --></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fhardware.slashdot.org%2Fstory%2F16%2F05%2F02%2F1944240%2F20-yr-old-compaq-laptop-is-still-crucial-to-maintaining-mclarens-multi-million-dollar-cars%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"><!-- incorrect visual --></a> <a href="http://plus.google.com/share?url=https://hardware.slashdot.org/story/16/05/02/1944240/20-yr-old-compaq-laptop-is-still-crucial-to-maintaining-mclarens-multi-million-dollar-cars?utm_source=slashdot&utm_medium=googleplus"><!-- incorrect visual --></a> </div><p style="-webkit-text-size-adjust: auto;"><a href="https://hardware.slashdot.org/story/16/05/02/1944240/20-yr-old-compaq-laptop-is-still-crucial-to-maintaining-mclarens-multi-million-dollar-cars?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p><!-- incorrect visual --> <br>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-2048527994350014152016-03-18T04:21:00.001-07:002016-03-18T04:21:08.596-07:00Apple Stores iCloud Data With Google <div><p><span style="background-color: rgba(255, 255, 255, 0);">Alphabet's Google has quietly scored a major coup in its campaign to become an enterprise cloud computing powerhouse, <a href="http://www.crn.com/news/cloud/300080062/cloud-makes-for-strange-bedfellows-apple-signs-on-with-google-cuts-spending-with-aws.htm" style="text-decoration: none;">landing Apple as a customer for the Google Cloud Platform</a>, multiple sources with knowledge of the matter told CRN this week. Previously, Apple had acknowledge using Amazon Web Services (AWS) and Microsoft Azure's rival cloud computing platforms in addition to its own data centers. None of the services would have access to iCloud users' records. "The iCloud information is <a href="http://www.bbc.com/news/technology-35837692" style="text-decoration: none;">not at risk of being breached or otherwise observed</a> by the ultimate owners of the platforms it resides on because of the very heavy encryption and partitioning technologies used," commended Chris Green, a tech expert at the consultancy Lewis. CRN has mentioned the agreement between the two companies was done late last year.</span></p><p><a href="https://apple.slashdot.org/story/16/03/17/1952206/apple-stores-icloud-data-with-google?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p></div><div></div>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-72524187961910841272016-02-10T03:20:00.001-08:002016-02-10T03:20:30.226-08:00U.S. Tells Google Computers Can Qualify as Drivers <p style="margin: 0px; padding: 0px 0px 1.6em;"><span style="background-color: rgba(255, 255, 255, 0);">Via: <a href="http://www.reuters.com/article/us-alphabet-autos-selfdriving-exclusive-idUSKCN0VJ00H" style="margin: 0px; padding: 0px; font-weight: bold; text-decoration: none;">Reuters</a>:</span></p><p style="margin: 0px; padding: 0px 0px 1.6em;"><em style="margin: 0px; padding: 0px; background-color: rgba(255, 255, 255, 0);">U.S. vehicle safety regulators have said the artificial intelligence system piloting a self-driving Google car could be considered the driver under federal law, a major step toward ultimately winning approval for autonomous vehicles on the roads.</em></p><em style="margin: 0px; padding: 0px; background-color: rgba(255, 255, 255, 0);"><p style="margin: 0px; padding: 0px 0px 1.6em;">The National Highway Traffic Safety Administration told Google, a unit of Alphabet Inc (GOOGL.O), of its decision in a previously unreported Feb. 4 letter to the company posted on the agency's website this week.</p><p style="margin: 0px; padding: 0px 0px 1.6em;">Google's self-driving car unit on Nov. 12 submitted a proposed design for a self-driving car that has "no need for a human driver," the letter to Google from National Highway Traffic Safety Administration Chief Counsel Paul Hemmersbaugh said.</p><p style="margin: 0px; padding: 0px 0px 1.6em;">"NHTSA will interpret 'driver' in the context of Google's described motor vehicle design as referring to the (self-driving system), and not to any of the vehicle occupants," NHTSA's letter said.</p></em><p style="margin: 0px; padding: 0px 0px 1.6em;"><em style="margin: 0px; padding: 0px; background-color: rgba(255, 255, 255, 0);">"We agree with Google its (self-driving car) will not have a 'driver' in the traditional sense that vehicles have had drivers during the last more than one hundred years."</em></p>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-17541763157291124142015-08-06T03:46:00.001-07:002015-08-06T03:46:50.515-07:00Welcome to Microsoft 1994<h1><font size="3"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Welcome to Microsoft's World Wide Web Server!</span></font></h1><h2><font size="3"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Where do you want to go today?</span></font></h2><p><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">If your browser doesn't support images, we have a <a href="http://www.microsoft.com/en-us/discover/1994/1994-links.html">text</a> menu as well.</span></p><a href="http://www.microsoft.com/en-us/discover/1994/cgi-bin/imagemap/star.map.html" style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><font color="#000000"><img src="http://www.microsoft.com/en-us/discover/1994/starmap-solidbg.gif" ismap=""></font></a><hr><p><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><a href="http://WWW.MICROSOFT.COM">WWW.MICROSOFT.COM</a> is running Microsoft's <a href="http://en.wikipedia.org/wiki/Windows_NT_3.5">Windows NT Server 3.5</a> and <a href="http://grox.net/doc/admin/ims/">EMWAC's</a> HTTPS</span></p><span style="-webkit-text-size-adjust: auto;">Please read full and follow at: </span><br> <a href="http://www.microsoft.com/en-us/discover/1994/" style="-webkit-text-size-adjust: auto;">http://www.microsoft.com/en-us/discover/1994/</a><br><br>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-71097766609702828942015-08-04T03:49:00.001-07:002015-08-04T03:49:41.491-07:00Privacy Alert: Your Laptop Or Phone Battery Could Track You Online <span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Is the battery in your smartphone being used to <a href="http://betanews.com/2015/08/03/privacy-alert-your-laptop-or-phone-battery-could-track-you-online/" style="text-decoration: none;">track your online activities</a>? It might seem unlikely, but it's not quite as farfetched as you might first think. This is not a case of malware or hacking, but <a href="http://www.theguardian.com/technology/2015/aug/03/privacy-smartphones-battery-life" style="text-decoration: none;">a built-in component of the HTML5 specification</a>. Originally designed to help reduce power consumption, the Battery Status API makes it possible for websites and apps to monitor the battery level of laptops, tablets, and phones. A paper published by a team of security researchers suggests that this represents a huge privacy risk. Using little more than the amount of power remaining in your battery, it is possible for people to be identified and tracked online. As reported by The Guardian, a paper entitled <a href="http://eprint.iacr.org/2015/616.pdf" style="text-decoration: none;">The Leaking Battery</a> by Belgian and French privacy and security experts say that the API can be used in device fingerprinting.</span><br><p style="-webkit-text-size-adjust: auto;"></p><div style="-webkit-text-size-adjust: auto;"><a href="http://twitter.com/home?status=Privacy+Alert%3A+Your+Laptop+Or+Phone+Battery+Could+Track+You+Online%3A+http%3A%2F%2Fbit.ly%2F1DlsziA"></a><a href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F15%2F08%2F03%2F1728255%2Fprivacy-alert-your-laptop-or-phone-battery-could-track-you-online%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"></a><a href="http://plus.google.com/share?url=http://it.slashdot.org/story/15/08/03/1728255/privacy-alert-your-laptop-or-phone-battery-could-track-you-online?utm_source=slashdot&utm_medium=googleplus"></a></div><p style="-webkit-text-size-adjust: auto;"><a href="http://it.slashdot.org/story/15/08/03/1728255/privacy-alert-your-laptop-or-phone-battery-could-track-you-online?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-3427963830385316252015-05-22T03:42:00.001-07:002015-05-22T03:42:14.534-07:00Coming soon to Firefox: More ads! Using future versions of Firefox as a secure... Safe browser is over<br><b><a href="http://www.computerworld.com/article/2925309/web-browsers/coming-soon-to-firefox-more-ads.html#tk.rss_all">Computerworld</a></b><br>Mozilla today announced an expansion and rebranding of its in-browser advertisements, now dubbed "Suggested Tiles," that will by default show in the new tab page of all Firefox users.<br><article><section><p>Those who don't want to see the ads can select an option to make then go away.</p><p>The change to in-Firefox ads will hit the beta of the browser "soon," said Darren Herman, Mozilla's vice president of content service, in a Thursday <a target="new" href="https://blog.mozilla.org/advancingcontent/2015/05/21/providing-a-valuable-platform-for-advertisers-content-publishers-and-users/">blog</a> post. Suggested Tiles will reach the stable branch of Firefox this summer.</p><p><a href="http://www.computerworld.com/article/2925309/web-browsers/coming-soon-to-firefox-more-ads.html#jump">To read this article in full, click here</a></p></section></article>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-59547298071653392052015-05-18T03:46:00.001-07:002015-05-18T03:46:03.700-07:00Microsoft Study Finds Technology Hurting Attention Spans <span style="margin-top: 15px; display: block;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Conducting both surveys and EEG scans, Microsoft has published a study suggesting that the <a href="http://www.engadget.com/2015/05/17/microsoft-attention-span-study/" style="text-decoration: none;">average attention span has fallen precipitously since the start of the century</a>. While people could focus on a task for 12 seconds back in 2000, that figure dropped to 8 seconds in 2013 (about one second less than a goldfish). Reportedly, a lot of that reduction stems from a combination of smartphones and an avalanche of content. <a href="http://advertising.microsoft.com/en/cl/31966/how-does-digital-affect-canadian-attention-spans" style="text-decoration: none;">The study</a> found also a sunny side: while presence of technology is hurting attention spans overall, it also appears to improve person's abilities to both multitask and concentrate in short bursts.</span></span><p style="-webkit-text-size-adjust: auto;"></p><div style="-webkit-text-size-adjust: auto;"><a href="http://twitter.com/home?status=Microsoft+Study+Finds+Technology+Hurting+Attention+Spans%3A+http%3A%2F%2Fbit.ly%2F1FmAryN"></a><a href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F05%2F17%2F2146212%2Fmicrosoft-study-finds-technology-hurting-attention-spans%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"></a><a href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/05/17/2146212/microsoft-study-finds-technology-hurting-attention-spans?utm_source=slashdot&utm_medium=googleplus"></a></div><p style="-webkit-text-size-adjust: auto;"><a href="http://tech.slashdot.org/story/15/05/17/2146212/microsoft-study-finds-technology-hurting-attention-spans?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-8372889326872379402015-05-13T03:54:00.001-07:002015-05-13T03:54:27.094-07:00Gordon Moore is still amazed at how Moore's Law shaped the tech industry <b><a href="http://www.computerworld.com/article/2921381/it-leadership/gordon-moore-is-still-amazed-at-how-moores-law-shaped-the-tech-industry.html#tk.rss_all">Computerworld</a>: </b>The man credited with creating Moore's Law can finally talk about it.<article><section><p>"For the first twenty years I couldn't utter the term 'Moore's Law'," said Gordon Moore, the chairman emeritus of Intel on Monday night. "It was embarrassing. I finally got accustomed to it enough that I can say it with a straight face."</p><p>Intel honored Moore at an event in San Francisco on Monday night for his famous axiom, which has helped guide the evolution of technology for 50 straight years. Even Moore himself appeared amazed at the implications.</p><figure><a href="https://cms-images.idgesg.net/images/article/2015/05/wp_20150511_18_59_25_pro-100584698-orig.jpg"><img height="326" alt="Gordon Moore Tom Friedman" width="580" src="http://images.techhive.com/images/article/2015/05/wp_20150511_18_59_25_pro-100584698-large.jpg"></a> <small>Mark Hachman</small><figcaption><p>Intel's Gordon Moore was interviewed by <em>The New York Times</em> columnist Thomas Friedman at an event in San Francisco on Monday night.</p><p><a href="http://www.computerworld.com/article/2921381/it-leadership/gordon-moore-is-still-amazed-at-how-moores-law-shaped-the-tech-industry.html#jump">To read this article in full or to leave a comment, please click here</a></p></figcaption></figure></section></article>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-50006928914414300702015-05-04T03:32:00.001-07:002015-05-04T03:32:12.414-07:00Bill Gates Owes His Career To Steven Spielberg's Dad; You May, Too <b style="-webkit-text-size-adjust: auto;"><a href="http://hardware.slashdot.org/story/15/05/03/024244/bill-gates-owes-his-career-to-steven-spielbergs-dad-you-may-too?utm_source=rss1.0mainlinkanon&utm_medium=feed">Slashdot</a></b><br><span style="margin-top: 15px; display: block;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">On the 51st birthday of the <a href="http://developers.slashdot.org/story/14/04/29/1534238/50-years-of-basic-the-language-that-made-computers-personal" style="text-decoration: none;">BASIC programing language</a>, GE Reports decided it was finally time to give-credit-where-credit-was-long-overdue, reporting that<a href="http://www.computer.org/web/awards/pioneer-arnold-spielberg" style="text-decoration: none;">Arnold Spielberg</a>, the 98-year-old father of Hollywood director Steven Spielberg, <a href="http://www.gereports.com/post/117791167040/its-basic-arnold-spielberg-and-the-birth-of" style="text-decoration: none;">helped revolutionize computing when he designed the GE-225 mainframe computer</a>. The machine allowed a team of Dartmouth University students and researchers to develop BASIC, which quickly spread and ushered in the era of personal computers. BASIC helped kickstart many computing careers, include those of <a href="http://en.wikipedia.org/wiki/Altair_BASIC" style="text-decoration: none;">Bill Gates and Paul Allen</a>, as well as <a href="http://en.wikipedia.org/wiki/Integer_BASIC" style="text-decoration: none;">Steve Wozniak and Steve Jobs</a>.</span></span>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-25030795222490192912015-04-22T03:26:00.001-07:002015-04-22T03:26:24.036-07:00Google, Apple and Amazon spent record amounts on lobbying in Q1 <b><a href="http://www.computerworld.com/article/2912887/it-industry/google-apple-and-amazon-spent-record-amounts-on-lobbying-in-q1.html#tk.rss_all">Computerworld</a></b><br><article><section><p>Google, Apple and <a href="http://Amazon.com">Amazon.com</a> spent record amounts in the first quarter attempting to influence U.S. politicians and policy.</p><p>Google, which was already the biggest tech lobbyist in Washington, D.C., spent $5.47 million in the first three months of the year, according to a report filed with the Senate Office of Public Records.</p><p>That made it the fifth biggest federal lobbyist across all industries during the quarter, according to an analysis by Maplight.</p><p>Google has been steadily increasing the amount it spends to influence the course of policy and law on a range of issues. Since mid-2011, it has spent on average at least a million dollars each month in areas both central to its business, such as online advertising and security, and tangential to it, such as international tax reform and drone technology.</p><p><a href="http://www.computerworld.com/article/2912887/it-industry/google-apple-and-amazon-spent-record-amounts-on-lobbying-in-q1.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-91060045488543529812015-04-15T03:44:00.000-07:002015-04-15T03:45:04.381-07:00Windows vulnerability can compromise credentials <b><a href="http://www.computerworld.com/article/2909554/windows-vulnerability-can-compromise-credentials.html#tk.rss_all">Computerworld</a>: </b>A vulnerability found in the late 1990s in Microsoft Windows can still be used to steal login credentials, according to a security advisory released Monday.<br><article><section><p>A researcher with security vendor Cylance, Brian Wallace, found a new way to exploit a flaw originally found in 1997. Wallace <a href="http://blog.cylance.com/redirect-to-smb">wrote</a> on Monday the flaw affects any PC, tablet or server running Windows and could compromise as many as 31 software programs.</p><p>He wrote the flaw was not resolved long ago, but that "we hope that our research will compel Microsoft to reconsider the vulnerabilities."</p><p>The vulnerability, called Redirect to SMB, can be exploited if an attacker can intercept communications with a Web server using a man-in-the-middle attack.</p><p><a href="http://www.computerworld.com/article/2909554/windows-vulnerability-can-compromise-credentials.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-71594847185058672932015-03-25T03:39:00.001-07:002015-03-25T03:39:02.676-07:00Steve Wozniak Now Afraid of AI Too, Just Like Elon Musk<div><b><a href="http://slashdot.org/story/15/03/24/1547221/steve-wozniak-now-afraid-of-ai-too-just-like-elon-musk?utm_source=rss1.0mainlinkanon&utm_medium=feed" style="-webkit-text-size-adjust: auto;">Slashdot</a>: </b><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Steve Wozniak maintained for a long time that true AI is relegated to the realm of science fiction. But recent advances in quantum computing have him reconsidering his stance. Just like Elon Musk, he is </span><a href="http://www.brw.com.au/p/tech-gadgets/apple_cars_founder_steve_wozniak_3qp2KuhwqGb70TZmyLtccK" style="-webkit-text-size-adjust: auto; text-decoration: none;">now worried about what this development will mean for humanity</a><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">. </span><a href="http://observationdeck.io9.com/ai-of-the-beholder-1692707545/+cherylvis" style="-webkit-text-size-adjust: auto; text-decoration: none;">Will this kind of fear actually engender the dangers that these titans of industry fear?</a><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"> Will Steve Wozniak draw the same conclusion and invest in quantum comuting to keep an eye on the development? </span><a href="https://qbnets.wordpress.com/2015/03/24/steve-wozniak-if-you-cant-beat-them-join-them/" style="-webkit-text-size-adjust: auto; text-decoration: none;">One of the bloggers in the field thinks that would be a logical step to take.</a><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"> If you can't beat'em, and the quantum AI is coming, you should at least try to steer the outcome.</span><b style="-webkit-text-size-adjust: auto;"><a href="http://slashdot.org/story/15/03/24/1547221/steve-wozniak-now-afraid-of-ai-too-just-like-elon-musk?utm_source=rss1.0mainlinkanon&utm_medium=feed"><br></a></b><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Woz actually seems more ambivalent than afraid, though: in the interview linked, he says "I hope [AI-enabling quantum computing] does come, and we should pursue it because it is about scientific exploring." "But in the end we just may have created the species that is above us."</span><br style="-webkit-text-size-adjust: none;"><p style="-webkit-text-size-adjust: auto;"></p><div style="-webkit-text-size-adjust: auto;"><a href="http://twitter.com/home?status=Steve+Wozniak+Now+Afraid+of+AI+Too%2C+Just+Like+Elon+Musk%3A+http%3A%2F%2Fbit.ly%2F1ENzdux"></a><a href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fslashdot.org%2Fstory%2F15%2F03%2F24%2F1547221%2Fsteve-wozniak-now-afraid-of-ai-too-just-like-elon-musk%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"></a><a href="http://plus.google.com/share?url=http://slashdot.org/story/15/03/24/1547221/steve-wozniak-now-afraid-of-ai-too-just-like-elon-musk?utm_source=slashdot&utm_medium=googleplus"></a></div><p style="-webkit-text-size-adjust: auto;"><a href="http://slashdot.org/story/15/03/24/1547221/steve-wozniak-now-afraid-of-ai-too-just-like-elon-musk?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p></div>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-58415166720633288222015-03-25T03:30:00.001-07:002015-03-25T03:30:29.877-07:00Dell support tool put PCs at risk of malware infection <b><a href="http://www.computerworld.com/article/2901256/dell-support-tool-put-pcs-at-risk-of-malware-infection.html#tk.rss_all">Computerworld</a>: </b>Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.<article><section><p>A security researcher discovered the flaw in November and reported it to the PC manufacturer, which patched it in January. However, it's not clear if the fix closed all avenues for abuse.</p><p>The application, called Dell System Detect, is offered for download when users click the "Detect Product" button on Dell's support site for the first time. It is meant to help the website automatically detect the user's product -- more specifically its Service Tag -- so that it can offer the corresponding drivers and resources.</p><p><a href="http://www.computerworld.com/article/2901256/dell-support-tool-put-pcs-at-risk-of-malware-infection.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-33840113432425623432015-03-24T13:00:00.001-07:002015-03-24T13:00:56.120-07:00Android Installer Hijacking Vulnerability Could Expose Android Users to Malware<div dir="ltr"><div class="gmail_default" style="font-family:georgia,serif;font-size:small">Researchers have discovered a widespread vulnerability in Google’s Android OS we are calling “Android Installer Hijacking,” estimated to impact 49.5 percent of all current Android users. In detail: <ul><li>Android Installer Hijacking allows an attacker to modify or replace a seemingly benign Android app with malware, without user knowledge. This only affects applications downloaded from third-party app stores.</li><li>The malicious application can gain full access to a compromised device, including usernames, passwords, and sensitive data.</li><li>Palo Alto Networks worked with Google and major manufacturers such as Samsung and Amazon to inform them of the vulnerability and issue patches for their devices.</li></ul><p>Please read on at:</p><p><a href="http://researchcenter.paloaltonetworks.com/2015/03/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware/">http://researchcenter.paloaltonetworks.com/2015/03/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware/</a><br></p></div></div> EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-58874295537938539072015-03-20T10:15:00.000-07:002015-03-20T10:16:33.583-07:00FTC: Google Altered Search Results For Profit<div dir="ltr"><div class="gmail_default" style="font-family:georgia,serif;font-size:small"><i>We've always suspected that Google might <a href="http://blogs.wsj.com/digits/2015/03/19/excerpts-from-ftc-staff-report-on-googles-search-practices/">tweak its search algorithms to gain an advantage</a> over its rivals — and, according to <a href="http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CCAQqQIwAA&url=http%3A%2F%2Fwww.wsj.com%2Farticles%2Finside-the-u-s-antitrust-probe-of-google-1426793274&ei=oR4MVYu9M4muggSwqIPYDQ&usg=AFQjCNFHTp--meuwOi936vK02vDrueSoVg&sig2=3qIKaYorF0TpudBnwOC1pA&bvm=bv.88528373,d.eXY">an FTC investigation inadvertently shared with the Wall Street Journal</a>, it did. Quoting: "In a lengthy investigation, staffers in the FTC's bureau of competition found evidence that Google boosted its own services for shopping, travel and local businesses by altering its ranking criteria and "scraping" content from other sites. It also deliberately demoted rivals. For example, the FTC staff noted that Google presented results from its flight-search tool ahead of other travel sites, even though Google offered fewer flight options. Google's shopping results were ranked above rival comparison-shopping engines, even though users didn't click on them at the same rate, the staff found. Many of the ways Google boosted its own results have not been previously disclosed.<br><br></i></div><div class="gmail_default" style="font-family:georgia,serif;font-size:small"><i>/. <br><a href="http://tech.slashdot.org/story/15/03/20/1639215/ftc-google-altered-search-results-for-profit">http://tech.slashdot.org/story/15/03/20/1639215/ftc-google-altered-search-results-for-profit</a><br></i></div></div> EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-44278753385952805392015-03-20T03:25:00.000-07:002015-03-20T03:26:00.845-07:00At least 700K routers given to customers by ISPs can be hacked <b><a href="http://www.computerworld.com/article/2899663/at-least-700k-routers-given-to-customers-by-isps-can-be-hacked.html#tk.rss_all">Computerworld</a>: </b>More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.<article><section><p>Most of the routers have a "directory traversal" flaw in a firmware component called webproc.cgi that allows hackers to extract sensitive configuration data, including administrative credentials. The flaw isn't new and has been reported by multiple researchers <a target="new" href="http://www.exploit-db.com/exploits/35597/">since 2011</a> in various <a target="new" href="http://www.cvedetails.com/cve/CVE-2014-2962/">router models</a>.</p><p>Security researcher Kyle Lovett came across the flaw a few months ago in some ADSL routers he was analyzing in his spare time. He investigated further and unearthed hundreds of thousands of vulnerable devices from different manufacturers that had been distributed by ISPs to Internet subscribers in a dozen countries.</p><p><a href="http://www.computerworld.com/article/2899663/at-least-700k-routers-given-to-customers-by-isps-can-be-hacked.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-8673405491387598872015-03-11T03:51:00.001-07:002015-03-11T03:51:49.820-07:00Apple secures Safari against FREAK attacks <b><a href="http://www.computerworld.com/article/2894523/apple-secures-safari-against-freak-attacks.html#tk.rss_all">Computerworld</a></b><br><article><section><p>Apple on Monday patched the FREAK flaw in both OS X and iOS, issuing updates for both operating systems to protect users of its Safari browser.</p><p>In a pair of accompanying advisories, Apple noted the FREAK fix as one of several in <a target="new" href="https://support.apple.com/en-us/HT204423">iOS 8.2</a> and OS X Yosemite, Mavericks and Mountain Lion. The OS X update was labeled <a target="new" href="https://support.apple.com/en-us/HT204413">2015-002</a> to identify it as a multi-edition fix.</p><p>"Secure Transport accepted short ephemeral RSA keys, usually used only in export-strength RSA cipher suites, on connections using full-strength RSA cipher suites," Apple stated in both advisories. "This issue, also known as FREAK, only affected connections to servers which support export-strength RSA cipher suites, and was addressed by removing support for ephemeral RSA keys."</p><p><a href="http://www.computerworld.com/article/2894523/apple-secures-safari-against-freak-attacks.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-37637286173254529372015-03-11T03:44:00.001-07:002015-03-11T03:44:52.861-07:00Tool allows account hijacking on sites that use Facebook Login [feedly]<b><a href="http://www.computerworld.com/article/2895035/tool-allows-account-hijacking-on-sites-that-use-facebook-login.html#tk.rss_all">Computerworld</a></b><div>new tool allows hackers to generate URLs that can hijack accounts on sites that use Facebook Login, potentially enabling powerful phishing attacks.<article><section><p> The tool, dubbed Reconnect, was released last week by Egor Homakov, a researcher with security firm Sakurity. It takes advantage of a cross-site request forgery (CSRF) issue in Facebook Login, the service that allows users to log in on third-party sites using their Facebook accounts.</p><p> Homakov <a target="new" href="http://homakov.blogspot.com.au/2014/01/two-severe-wontfix-vulnerabilities-in.html">disclosed the issue publicly</a> on his personal blog in January 2014, after Facebook declined to fix it because doing so would have broken compatibility with a large number of sites that used the service.</p><p><a href="http://www.computerworld.com/article/2895035/tool-allows-account-hijacking-on-sites-that-use-facebook-login.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article></div>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-86457527707390754552015-03-11T03:37:00.001-07:002015-03-11T03:37:05.911-07:00Google Ventures and the Search for Extending human lifespan to 500 years and beyond <blockquote><a target="blank" href="http://www.bloomberg.com/news/articles/2015-03-09/google-ventures-bill-maris-investing-in-idea-of-living-to-500">Bill Maris has $425 million to invest this year, and the freedom to invest it however he wants. He's looking for companies that will slow aging, reverse disease, and extend life.</a> "If you ask me today, is it possible to live to be 500? The answer is yes," Bill Maris, president and managing partner of Google Ventures, said one January afternoon in Mountain View, California. <br><br>Google Ventures has close to $2 billion in assets under management, with stakes in more than 280 startups. Each year, Google gives Maris $300 million in new capital, and this year he'll have an extra $125 million to invest in a new European fund. That puts Google Ventures on a financial par with Silicon Valley's biggest venture firms, which typically put to work $300 million to $500 million a year. According to data compiled by CB Insights, a research firm that tracks venture capital activity, Google Ventures was the fourth-most-active venture firm in the U.S. last year, participating in 87 deals.<br><br>Google has spent hundreds of millions of dollars backing a research center, called Calico, to study how to reverse aging, and Google X is working on a pill that would insert nanoparticles into our bloodstream to detect disease and cancer mutations.</blockquote><br><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXeMcAuKoybU-RmH3Urv-Vc4LgnpC5KyywppKz3_gN3-gTOZ7th4Tqn6ucJQxZC_zDQfdKoxN_7k0iIlDOpI0wevQGj1wnDMqKkobMCKw6rusXAZ9w5PKX-kakKNKPS7EogrrIZ6mMUUHl/s1600/googleventures.jpg"><img height="640" width="530" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXeMcAuKoybU-RmH3Urv-Vc4LgnpC5KyywppKz3_gN3-gTOZ7th4Tqn6ucJQxZC_zDQfdKoxN_7k0iIlDOpI0wevQGj1wnDMqKkobMCKw6rusXAZ9w5PKX-kakKNKPS7EogrrIZ6mMUUHl/s1600/googleventures.jpg" border="0"></a></div><br><a href="http://nextbigfuture.com/2015/03/google-ventures-and-search-for.html#more">Read more »</a> at <b><a href="http://nextbigfuture.com/2015/03/google-ventures-and-search-for.html">Next Big Future</a></b>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-40570932117701419152015-03-11T03:34:00.001-07:002015-03-11T03:34:34.531-07:00Incomplete Microsoft Patch Left Machines Exposed To Stuxnet LNK Vulnerability since 2010<span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">A five-year-old Microsoft patch for the .LNK vulnerability exploited by Stuxnet<a href="https://threatpost.com/patched-windows-machines-exposed-to-stuxnet-lnk-flaw-all-along/111558" style="text-decoration: none;">failed to properly protect Windows machines, leaving them exposed to exploits since 2010</a>. Microsoft today is expected to release a security bulletin, MS15-020, patching the vulnerability (CVE-2015-0096). It is unknown whether there have been public exploits of patched machines. The original LNK patch was released Aug. 2, 2010. "That patch didn't completely address the .LNK issue in the Windows shell, and there were weaknesses left behind that have been resolved in this patch," said Brian Gorenc, manager of vulnerability research with HP's Zero Day Initiative. Gorenc said the vulnerability works on Windows machines going back to Windows XP through Windows 8.1, and the proof of concept exploit developed by Heerklotz and tweaked by ZDI evades the validation checks put in place by the original Microsoft security bulletin, CVE-2010-2568.</span><br><p style="-webkit-text-size-adjust: auto;"></p><div style="-webkit-text-size-adjust: auto;"><a href="http://twitter.com/home?status=Incomplete+Microsoft+Patch+Left+Machines+Exposed+To+Stuxnet+LNK+Vulnerability%3A+http%3A%2F%2Fbit.ly%2F18yz7ex"></a><a href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Ftech.slashdot.org%2Fstory%2F15%2F03%2F10%2F1955207%2Fincomplete-microsoft-patch-left-machines-exposed-to-stuxnet-lnk-vulnerability%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"></a><a href="http://plus.google.com/share?url=http://tech.slashdot.org/story/15/03/10/1955207/incomplete-microsoft-patch-left-machines-exposed-to-stuxnet-lnk-vulnerability?utm_source=slashdot&utm_medium=googleplus"></a></div><p style="-webkit-text-size-adjust: auto;"><a href="http://tech.slashdot.org/story/15/03/10/1955207/incomplete-microsoft-patch-left-machines-exposed-to-stuxnet-lnk-vulnerability?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-21793887363880579902015-02-20T03:38:00.001-08:002015-02-20T03:38:39.179-08:00Microsoft's First Azure Hosted Service Is Powered By Linux <span style="margin-top: 15px; display: block;"><span style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">Canonical, through John Zannos, VP Cloud Alliances, has proudly announced that the first ever Microsoft Azure hosted service <a href="https://insights.ubuntu.com/2015/02/19/ubuntu-hortonworks-and-microsoft-big-data-hosted-solution/" style="text-decoration: none;">will be powered by Ubuntu Linux</a>. This piece of news comes from the <a href="http://strataconf.com/" style="text-decoration: none;">Strata + Hadoop World Conference</a>, which takes place this week in California. The fact of the matter is that the news came from Microsoft who announced the preview of <a href="http://azure.microsoft.com/en-us/services/hdinsight/" style="text-decoration: none;">Azure HDInsight</a> (an Apache Hadoop-based hosted service) on Ubuntu clusters yesterday at the said event. This is definitely great news for Canonical, as their operating system is <a href="http://news.softpedia.com/news/Microsoft-Announced-the-First-Ubuntu-Linux-Powered-Azure-Hosted-Service-473632.shtml" style="text-decoration: none;">getting recognized for being extremely reliable when handling Big Data</a>. Ubuntu is now the leading cloud and scale-out Linux-based operating system.</span></span><p style="-webkit-text-size-adjust: auto;"></p><div style="-webkit-text-size-adjust: auto;"><a href="http://twitter.com/home?status=Microsoft%27s+First+Azure+Hosted+Service+Is+Powered+By+Linux%3A+http%3A%2F%2Fbit.ly%2F1COT1tY"></a><a href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Fhardware.slashdot.org%2Fstory%2F15%2F02%2F19%2F1830232%2Fmicrosofts-first-azure-hosted-service-is-powered-by-linux%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook"></a><a href="http://plus.google.com/share?url=http://hardware.slashdot.org/story/15/02/19/1830232/microsofts-first-azure-hosted-service-is-powered-by-linux?utm_source=slashdot&utm_medium=googleplus"></a></div><p style="-webkit-text-size-adjust: auto;"><a href="http://hardware.slashdot.org/story/15/02/19/1830232/microsofts-first-azure-hosted-service-is-powered-by-linux?utm_source=rss1.0moreanon&utm_medium=feed">Read more of this story</a> at Slashdot.</p>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0tag:blogger.com,1999:blog-3365225629077336034.post-90596770123915717372015-02-03T03:50:00.001-08:002015-02-03T03:50:33.236-08:00Tech Time Warp of the Week: Return to 1974, When a Computer Ordered a Pizza for the First Time <div><img alt="Tech Time Warp of the Week: Return to 1974, When a Computer Ordered a Pizza for the First Time" src="http://www.wired.com/wp-content/uploads/2015/01/pizza-computer-660x410.jpg"></div><p>Watch John Sherman use a voice synthesizer to place the first computer-assisted pizza delivery order in history.</p><p>The post <a rel="nofollow" href="http://www.wired.com/2015/01/tech-time-warp-pizza/">Tech Time Warp of the Week: Return to 1974, When a Computer Ordered a Pizza for the First Time</a> appeared first on <a rel="nofollow" href="http://www.wired.com">WIRED</a>.</p>EHS Directorhttp://www.blogger.com/profile/11768405187596006599noreply@blogger.com0