You are here

Tech/Science News

Tokyo To Build 350m Tower Made of Wood

Slashdot - 2 hours 22 min ago
A skyscraper set to be built in Tokyo will become the world's tallest to be made of wood. From a report: The Japanese wood products company Sumitomo Forestry Co is proposing to build a 350 metre (1,148ft), 70-floor tower to commemorate its 350th anniversary in 2041. Japan's government has long advertised the advantages of wooden buildings, and in 2010 passed a law requiring it be used for all public buildings of three stories or fewer. Sumitomo Forestry said the new building, known as the W350 Project, was an example of "urban development that is kind for humans," with more high-rise architecture made of wood and covered with greenery "making over cities as forests." The new building will be predominantly wooden, with just 10% steel. Its internal framework of columns, beams and braces -- made of a hybrid of the two materials -- will take account of Japan's high rate of seismic activity. The Tokyo-based architecture firm Nikken Sekkei contributed to the design.

Read more of this story at Slashdot.

Categories: Tech/Science News

Give Workers 10,000 Pound To Survive Automation, British Top Think Tank Suggests

Slashdot - 3 hours 22 min ago
Britons should be able to bid for 10,000 pound (roughly $14,000) to help them prosper amid huge changes to their working lives, a leading think tank suggests today. From a report: The Royal Society for the Arts (RSA) has released research proposing a radical new sovereign wealth fund, which would be invested to make a profit like similar public funds in Norway. The returns from the fund would be used to build a pot of money, to which working-age adults under-55 would apply to receive a grant in the coming decade. People would have to set out how they intend to put the five-figure payouts to good use, for example, by using the cash to undergo re-training, to start a new business, or to combine work with the care of elderly or sick relatives. It would be funded like the student grant system and wealthier individuals could be required to pay back more in tax as their earnings increase. Ultimately, the RSA paper suggests, the wealth fund would finance a Universal Basic Income (UBI) as the world of modern work is turned upside down by increased automation, new technology and an ageing population.

Read more of this story at Slashdot.

Categories: Tech/Science News

Contractors Pose Cyber Risk To Government Agencies

Slashdot - 4 hours 22 min ago
Ian Barker, writing for BetaNews: While US government agencies are continuing to improve their security performance over time, the contractors they employ are failing to meet the same standards according to a new report. The study by security rankings specialist BitSight sampled over 1,200 federal contractors and finds that the security rating for federal agencies was 15 or more points higher than the mean of any contractor sector. It finds more than eight percent of healthcare and wellness contractors have disclosed a data breach since January 2016. Aerospace and defense firms have the next highest breach disclosure rate at 5.6 percent. While government has made a concerted effort to fight botnets in recent months, botnet infections are still prevalent among the government contractor base, particularly for healthcare and manufacturing contractors. The study also shows many contractors are not following best practices for network encryption and email security.

Read more of this story at Slashdot.

Categories: Tech/Science News

Who Killed The Junior Developer?

Slashdot - 5 hours 22 min ago
Melissa McEwen, writing on Medium: A few months ago I attended an event for women in tech. A lot of the attendees were new developers, graduates from code schools or computer science programs. Almost everyone told me they were having trouble getting their first job. I was lucky. My first "real" job out of college was "Junior Application developer" at Columbia University in 2010. These days it's a rare day to find even a job posting for a junior developer position. People who advertise these positions say they are inundated with resumes. But on the senior level companies complain they can't find good developers. Gee, I wonder why? I'm not really sure the exact economics of this, because I don't run these companies. But I know what companies have told me: "we don't hire junior developers because we can't afford to have our senior developers mentor them." I've seen the rates for senior developers because I am one and I had project managers that had me allocate time for budgeting purposes. I know the rate is anywhere from $190-$300 an hour. That's what companies believe they are losing on junior devs.

Read more of this story at Slashdot.

Categories: Tech/Science News

US's Greatest Vulnerability is Ignoring the Cyber Threats From Our Adversaries, Foreign Policy Expert Says

Slashdot - 6 hours 22 min ago
America's greatest vulnerability is its continued inability to acknowledge the extent of its adversaries' capabilities when it comes to cyber threats, says Ian Bremmer, founder and president of leading political risk firm Eurasia Group. From a report: Speaking to CNBC from the Munich Security Conference on Saturday, the prominent American political scientist emphasized that there should be much more government-level concern and urgency over cyber risk. The adversarial states in question are what U.S. intelligence agencies call the "big four": Russia, China, North Korea, and Iran. "We're vulnerable because we continue to underestimate the capabilities in those countries. WannaCry, from North Korea -- no one in the U.S. cybersecurity services believed the North Koreans could actually do that," Bremmer described, naming the ransomware virus that crippled more than 200,000 computer systems across 150 countries in May of 2017. Borge Brende, president of the World Economic Forum, weighed in, stressing the economic cost of cyber crimes. "It is very hard to attribute cyberattacks to different actors or countries, but the cost is just unbelievable. Annually more than a thousand billion U.S. dollars are lost for companies or countries due to these attacks and our economy is more and more based on internet and data."

Read more of this story at Slashdot.

Categories: Tech/Science News

New AI Model Fills in Blank Spots in Photos

Slashdot - 7 hours 19 min ago
A new technology uses artificial intelligence to generate synthetic images that can pass as real. From a report, shared by a reader (the link may be paywalled): The technology was developed by a team led by Hiroshi Ishikawa, a professor at Japan's Waseda University. It uses convolutional neural networks, a type of deep learning, to predict missing parts of images. The technology could be used in photo-editing apps. It can also be used to generate 3-D images from real 2-D images. The team at first prepared some 8 million images of real landscapes, human faces and other subjects. Using special software, the team generated numerous versions for each image, randomly adding artificial blanks of various shapes, sizes and positions. With all the data, the model took three months to learn how to predict the blanks so that it could fill them in and make the resultant images look identical to the originals. The model's learning algorithm first predicts and fills in blanks. It then evaluates how consistent the added part is with its surroundings.

Read more of this story at Slashdot.

Categories: Tech/Science News

We've Reached Peak Smartphone

Slashdot - 8 hours 47 min ago
You don't really need a new smartphone. From a column on the Washington Post (may be paywalled): Sure, some of them squeeze more screen into a smaller form. The cameras keep getting better, if you look very close. And you had to live under a rock to miss the hoopla for Apple's 10th-anniversary iPhone X or the Samsung Galaxy S8. Many in the smartphone business were sure this latest crop would bring a "super cycle" of upgrades. But here's the reality: More and more of Americans have decided we don't need to upgrade every year. Or every other year. We're no longer locked into two-year contracts and phones are way sturdier than they used to be. And the new stuff just isn't that tantalizing even to me, a professional gadget guy. Holding onto our phones is better for our budgets, not to mention the environment. This just means we -- and phone makers -- need to start thinking of them more like cars. We may have reached peak smartphone. Global shipments slipped 0.1 percent in 2017 -- the first ever decline, according to research firm IDC. In the United States, smartphone shipments grew just 1.6 percent, the smallest increase ever. Back in 2015, Americans replaced their phones after 23.6 months, on average, according to research firm Kantar Worldpanel. By the end of 2017, we were holding onto them for 25.3 months.

Read more of this story at Slashdot.

Categories: Tech/Science News

Facebook Plans To Use US Mail To Verify IDs of Election Ad Buyers

Slashdot - 12 hours 2 min ago
Facebook will start using postcards sent by U.S. mail later this year to verify the identities and location of people who want to purchase U.S. election-related advertising on its site, a senior company executive said on Saturday. From a report: The postcard verification is Facebook's latest effort to respond to criticism from lawmakers, security experts and election integrity watchdog groups that it and other social media companies failed to detect and later responded slowly to Russia's use of their platforms to spread divisive political content, including disinformation, during the 2016 U.S. presidential election.

Read more of this story at Slashdot.

Categories: Tech/Science News

Google is Making it Easier For 911 To Find You in an Emergency

Slashdot - 15 hours 19 min ago
An anonymous reader shares a report: When you call 911 from a cellphone, your location is typically sent to the call taker by a wireless carrier. But that information isn't always so accurate. Well Google might have a better way of going about it and it tested its system across a few states in December and January, the Wall Street Journal reports. In the states where the tests took place, Google sent location data from a random selection of 911 callers using Android phones straight to the people taking those calls. The test included 50 call centers that cover around 2.4 million people in Texas, Tennessee and Florida, and early reports of the results suggest the system is promising. One company involved in the test told the Wall Street Journal that for over 80 percent of the 911 calls where Googl's system was used, the tech giant's location data were more accurate than what wireless carriers provided. The company, RapidSOS, also said that while carrier data location estimates had, on average, a radius of around 522 feet, Google's data gave estimates with radii around 121 feet. Google's data also arrived more quickly than carrier data typically did.

Read more of this story at Slashdot.

Categories: Tech/Science News

Silicon Valley Singles Are Giving Up On the Algorithms of Love

Slashdot - 20 hours 32 min ago
The Washington Post: Melissa Hobley, an executive at the dating app OkCupid, hears the complaints about the apps [being unable to find good matches] regularly and thinks they get a bad rap. Silicon Valley workers "are in the business of scalable, quick solutions. And that's not what love is," Hobley said. "You can't hurry love. It's reciprocal. You're not ordering an object. You're not getting a delivery in less than seven minutes." Finding love, she added, takes commitment and energy -- and, yes, time, no matter how inefficiently it's spent. "You have a whole city obsessed with algorithms and data, and they like to say dating apps aren't solving the problem," Hobley said. "But if a city is male-dominant, if a city is known for 16-hour work days, those are issues that dating apps can't solve." One thing distinguishes the Silicon Valley dating pool: The men-to-women ratio for employed, young singles in the San Jose metro area is higher than in any other major area. There were about 150 men for every 100 women, compared with about 125 to 100 nationwide, of never-married young people between 25 and 34 in San Jose, U.S. Census Bureau data from 2016 shows. That ratio permeates the economy here, all the way to the valley's biggest employers, which have struggled for years to bring more women into their ranks. Men make up about 70% of the workforces of Apple, Facebook and Google parent Alphabet, company filings show.

Read more of this story at Slashdot.

Categories: Tech/Science News

Deep Neural Networks for Bot Detection

Slashdot - 22 hours 1 min ago
From a research paper on Arxiv: The problem of detecting bots, automated social media accounts governed by software but disguising as human users, has strong implications. For example, bots have been used to sway political elections by distorting online discourse, to manipulate the stock market, or to push anti-vaccine conspiracy theories that caused health epidemics. Most techniques proposed to date detect bots at the account level, by processing large amount of social media posts, and leveraging information from network structure, temporal dynamics, sentiment analysis, etc. In this paper [PDF], we propose a deep neural network based on contextual long short-term memory (LSTM) architecture that exploits both content and metadata to detect bots at the tweet level: contextual features are extracted from user metadata and fed as auxiliary input to LSTM deep nets processing the tweet text.

Read more of this story at Slashdot.

Categories: Tech/Science News

Facebook Admits SMS Notifications Sent Using Two-Factor Number Was Caused by Bug

Slashdot - 23 hours 2 min ago
Facebook has clarified the situation around SMS notifications sent using the company's two-factor authentication (2FA) system, admitting that the messages were indeed caused by a bug. From a report: In a blog post penned by Facebook Chief Security Officer Alex Stamos, the company says the error led it to "send non-security-related SMS notifications to these phone numbers." Facebook uses the automated number 362-65, or "FBOOK," as its two-factor authentication number, which is a secure way of confirming a user's identity by sending a numeric code to a secondary device like a mobile phone. That same number ended up sending users Facebook notifications without their consent. When users would attempt to get the SMS notifications to stop, the replies were posted to their own Facebook profiles as status updates.

Read more of this story at Slashdot.

Categories: Tech/Science News

Most Cities Would Welcome a Tech Billionaire, But Peter Thiel?

Slashdot - Sat, 02/17/2018 - 23:00
Sarah McBride, writing for Bloomberg: Tech billionaire Peter Thiel is moving to Los Angeles from San Francisco, adding another dose of legitimacy to a burgeoning startup scene in Southern California -- along with some controversy. The co-founder of PayPal and an early investor in Facebook, Thiel runs Founders Fund, one of the more-respected venture capital firms in Silicon Valley. He comes with a little baggage, though, including his staunch support for President Donald Trump, his secretive funding of the legal battle between Hulk Hogan and Gawker.com, and comments some people say have been derogatory toward women. "I'm not sure why Peter Thiel believes he'll receive a warmer reception on the L.A. tech scene than he's had in Silicon Valley," said Tracy DiNunzio, chief executive officer of Tradesy, a fashion-reselling company based in Santa Monica, California. "Our venture and startup ecosystem is fairly left-leaning."

Read more of this story at Slashdot.

Categories: Tech/Science News

How Does Chinese Tech Stack Up Against American Tech?

Slashdot - Sat, 02/17/2018 - 22:00
The Economist: China's tech leaders love visiting California, and invest there, but are no longer awed by it [Editor's note: the link may be paywalled]. By market value the Middle Kingdom's giants, Alibaba and Tencent, are in the same league as Alphabet and Facebook. New stars may float their shares in 2018-19, including Didi Chuxing (taxi rides), Ant Financial (payments) and Lufax (wealth management). China's e-commerce sales are double America's and the Chinese send 11 times more money by mobile phones than Americans, who still scribble cheques. The venture-capital (VC) industry is booming. American visitors return from Beijing, Hangzhou and Shenzhen blown away by the entrepreneurial work ethic. Last year the government decreed that China would lead globally in artificial intelligence (AI) by 2030. The plan covers a startlingly vast range of activities, including developing smart cities and autonomous cars and setting global tech standards. Like Japanese industry in the 1960s, private Chinese firms take this "administrative guidance" seriously.

Read more of this story at Slashdot.

Categories: Tech/Science News

LinkedIn Users Will Soon Know What Jobs Pay Before Applying for Them

Slashdot - Sat, 02/17/2018 - 21:00
LinkedIn just introduced a way to help its members avoid going through the interview process for jobs with salaries that do not meet their expectations. From a report: The professional network announced the rollout of Salary Insights, which will add estimated or expected salary ranges to open roles, getting the numbers either through salary ranges provided by employers or estimated ranges from data submitted by members. The feature will launch "in the coming weeks." Salary Insights marks the next step after LinkedIn Salary, which the professional network launched in November 2016 to provide its users with information on salaries, bonuses and equity data for specific job titles, as well as factors that impact those salaries, including experience, industry, company size, location and education level.

Read more of this story at Slashdot.

Categories: Tech/Science News

YouTube Red is Having an Identity Crisis

Slashdot - Sat, 02/17/2018 - 20:00
During an onstage conversation at Recode's Code Media this week, YouTube CEO Susan Wojcicki called YouTube Red a music streaming service -- first time any executive from the company has referred to YouTube Red as foremost a music service. From a report: This differs from comments that other YouTube executives have made in the past, including YouTube's head of global content Susanne Daniels, who last year described YouTube Red as a premium subscription streaming service that offers Hollywood-quality shows and movies. Launched in October 2015, YouTube Red has always been positioned by YouTube as three services in one: It offers ad-free access to all of YouTube; it's a music streaming service that also gives access to Google Play Music; and it's consistently releasing original movies and TV shows, starring Hollywood talent and homegrown stars that users already subscribe to. Two years later, this has created somewhat of an identity crisis for the streaming service. As Wojcicki said in her interview, she sees YouTube Red as a music service. And she does not expect to spend billions of dollars on content to effectively compete with Netflix, Hulu, Amazon and others.

Read more of this story at Slashdot.

Categories: Tech/Science News

Learning To Program Is Getting Harder

Slashdot - Sat, 02/17/2018 - 19:00
theodp writes: While Google suggests that parents and educators are to blame for why kids can't code, Allen Downey, Professor at Olin College argues that learning to program is getting harder . Downey writes: The fundamental problem is that the barrier between using a computer and programming a computer is getting higher. When I got a Commodore 64 (in 1982, I think) this barrier was non-existent. When you turned on the computer, it loaded and ran a software development environment (SDE). In order to do anything, you had to type at least one line of code, even if all it did was another program (like Archon). Since then, three changes have made it incrementally harder for users to become programmers: 1. Computer retailers stopped installing development environments by default. As a result, anyone learning to program has to start by installing an SDE -- and that's a bigger barrier than you might expect. Many users have never installed anything, don't know how to, or might not be allowed to. Installing software is easier now than it used to be, but it is still error prone and can be frustrating. If someone just wants to learn to program, they shouldn't have to learn system administration first. 2. User interfaces shifted from command-line interfaces (CLIs) to graphical user interfaces (GUIs). GUIs are generally easier to use, but they hide information from users about what's really happening. When users really don't need to know, hiding information can be a good thing. The problem is that GUIs hide a lot of information programmers need to know. So when a user decides to become a programmer, they are suddenly confronted with all the information that's been hidden from them. If someone just wants to learn to program, they shouldn't have to learn operating system concepts first. 3. Cloud computing has taken information hiding to a whole new level. People using web applications often have only a vague idea of where their data is stored and what applications they can use to access it. Many users, especially on mobile devices, don't distinguish between operating systems, applications, web browsers, and web applications. When they upload and download data, they are often confused about where is it coming from and where it is going. When they install something, they are often confused about what is being installed where. For someone who grew up with a Commodore 64, learning to program was hard enough. For someone growing up with a cloud-connected mobile device, it is much harder. theodp continues: So, with the Feds budgeting $200 million a year for K-12 CS at the behest of U.S. tech leaders, can't the tech giants at least put a BASIC on every phone/tablet/laptop for kids?

Read more of this story at Slashdot.

Categories: Tech/Science News

New Scanning Technique Reveals Secrets Behind Great Paintings

Slashdot - Sat, 02/17/2018 - 18:00
Researchers in the US have used a new scanning technique to discover a painting underneath one of Pablo Picasso's great works of art, the Crouching Woman (La Misereuse Accroupie). From a report: Underneath the oil painting is a landscape of Barcelona which, it turns out, Picasso used as the basis of his masterpiece. The new x-ray fluorescence system is cheaper than alternative art scanning systems -- and it is portable, making it available to any gallery that wants it. Details were revealed at the American Association for the Advancement for Science in Austin, Texas. The Crouching Woman is a painting from Picasso's blue period. What is remarkable is that the landscape painting beneath -- probably by a student artist -- is turned 90 degrees. The contour of the hills in the background becomes the crouching woman's back. She takes on the shape and form of the Catalan countryside. Kenneth Brummel, a curator at the Art Gallery of Ontario in Toronto, said that he was "excited" when he first learned what lay underneath the Crouching Woman. "It helps to date the painting and it also helps to determine where the painting was made," he told BBC News. "But it also gives a sense of the artists with whom the painter was engaging. And these insights help us ask new, more interesting and scientifically more accurate questions regarding an artist, their process and how they arrived at the forms that we see on the surface of a painting."

Read more of this story at Slashdot.

Categories: Tech/Science News

Pirates Crack Microsoft's UWP Protection, Five Layers of DRM Defeated

Slashdot - Sat, 02/17/2018 - 17:00
A piracy scene group has managed to get past the five layers of DRM in Microsoft's Unified Windows Platform UWP -- which enables software developers to create applications that can run across many devices. From a report: This week it became clear that the UWP system, previously believed to be uncrackable, had fallen to pirates. After being released on October 31, 2017, the somewhat underwhelming Zoo Tycoon Ultimate Animal Collection became the first victim at the hands of popular scene group, CODEX. "This is the first scene release of a UWP (Universal Windows Platform) game. Therefore we would like to point out that it will of course only work on Windows 10. This particular game requires Windows 10 version 1607 or newer," the group said in its release notes. CODEX says it's important that the game isn't allowed to communicate with the Internet so the group advises users to block the game's executable in their firewall.

Read more of this story at Slashdot.

Categories: Tech/Science News

FreeBSD's New Code of Conduct

Slashdot - Sat, 02/17/2018 - 16:00
FreeBSD has a new code of conduct, which is making several people angry. From the blog post: This code of conduct applies to all spaces used by the FreeBSD Project, including our mailing lists, IRC channels, and social media, both online and off. Anyone who is found to violate this code of conduct may be sanctioned or expelled from FreeBSD Project controlled spaces at the discretion of the FreeBSD Code of Conduct Committee. Participants are responsible for knowing and abiding by these rules. Harassment includes but is not limited to: Comments that reinforce systemic oppression related to gender, gender identity and expression, sexual orientation, disability, mental illness, neurodiversity, physical appearance, body size, age, race, or religion. Unwelcome comments regarding a person's lifestyle choices and practices, including those related to food, health, parenting, drugs, and employment. Deliberate misgendering. Deliberate use of "dead" or rejected names. Gratuitous or off-topic sexual images or behaviour in spaces where they're not appropriate. Physical contact and simulated physical contact (e.g., textual descriptions like "hug" or "backrub") without consent or after a request to stop. Threats of violence. Incitement of violence towards any individual, including encouraging a person to commit suicide or to engage in self-harm. Deliberate intimidation. Stalking or following. Harassing photography or recording, including logging online activity for harassment purposes. Sustained disruption of discussion. Unwelcome sexual attention. Pattern of inappropriate social contact, such as requesting/assuming inappropriate levels of intimacy with others. Continued one-on-one communication after requests to cease. Deliberate "outing" of any private aspect of a person's identity without their consent except as necessary to protect vulnerable people from intentional abuse. Publication of non-harassing private communication without consent. Publication of non-harassing private communication with consent but in a way that intentionally misrepresents the communication (e.g., removes context that changes the meaning). Knowingly making harmful false claims about a person.

Read more of this story at Slashdot.

Categories: Tech/Science News

Pages

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer