builder.append(" <div class='content' style='text-align: justify'>\n");
if (resume) {
- builder.append(" " + StringUtils.xmlEscape(story.getContent())
- + "\n");
+ builder.append(" "
+ + StringUtils.xmlEscape(story.getContent()).replace("\n",
+ "<br/>") + "\n");
} else {
builder.append(" "
+ StringUtils.xmlEscape(story.getFullContent())
Document doc = DataUtil.load(in, "UTF-8", url.toString());
Element article = getFullArticle(doc);
if (article != null) {
- StringBuilder builder = new StringBuilder();
- ElementProcessor eProc = getElementProcessorFullArticle();
- if (eProc != null) {
- for (String line : toLines(article, eProc)) {
- builder.append(line + "\n");
- }
- } else {
- builder.append(article.text());
- }
-
- // Content is too tight with a single break per line:
- fullContent = builder.toString().replace("\n", "\n\n") //
- .replace("\n\n\n\n", "\n\n") //
- .replace("\n\n\n\n", "\n\n") //
- .trim();
+ fullContent = getArticleText(article);
}
if (fullContent.isEmpty()) {
}
}
+ /**
+ * Return the text from this {@link Element}, using the
+ * {@link BasicSupport#getElementProcessorFullArticle()} processor logic.
+ *
+ * @param article
+ * the element to extract the text from
+ *
+ * @return the text
+ */
+ protected String getArticleText(Element article) {
+ StringBuilder builder = new StringBuilder();
+ ElementProcessor eProc = getElementProcessorFullArticle();
+ if (eProc != null) {
+ for (String line : toLines(article, eProc)) {
+ builder.append(line + "\n");
+ }
+ } else {
+ builder.append(article.text());
+ }
+
+ // Content is too tight with a single break per line:
+ return builder.toString().replace("\n", "\n\n") //
+ .replace("\n\n\n\n", "\n\n") //
+ .replace("\n\n\n\n", "\n\n") //
+ .trim();
+ }
+
/**
* Return the full article if available (this is the article to retrieve
* from the newly downloaded page at {@link Story#getUrlInternal()}).
Element contentElement = article.getElementsByClass("td-excerpt")
.first();
if (contentElement != null) {
- return contentElement.text();
+ return getArticleText(contentElement);
}
return "";
// All but the first and two last children
for (int i = 1; i < listing.children().size() - 2; i++) {
Element e = listing.children().get(i);
- content = content.trim() + " " + e.text().trim();
+ content = content.trim() + " " + getArticleText(e);
}
return content;
protected String getArticleContent(Document doc, Element article) {
Element contentElement = article.getElementsByClass("txt3").first();
if (contentElement != null) {
- return contentElement.text();
+ return getArticleText(contentElement);
}
return "";
protected String getArticleContent(Document doc, Element article) {
Element p = article.getElementsByTag("p").first();
if (p != null) {
- return p.text();
+ return getArticleText(p);
}
return "";
for (Element elem : article.children()) {
String tag = elem.tagName();
if (!tag.equals("header") && !tag.equals("footer")) {
- return elem.text();
+ return getArticleText(elem);
}
}
@Override
protected ElementProcessor getElementProcessorComment() {
- return null;
+ return new BasicElementProcessor();
}
}
Element contentElement = doc //
.getElementById("text-" + getArticleId(doc, article));
if (contentElement != null) {
- return contentElement.text();
+ return getArticleText(contentElement);
}
return "";
@Override
protected ElementProcessor getElementProcessorFullArticle() {
- return null;
+ return new BasicElementProcessor() {
+ @Override
+ public boolean detectQuote(Node node) {
+ if (node instanceof Element) {
+ Element element = (Element) node;
+ if (element.tagName().equals("i")) {
+ return true;
+ }
+ }
+ return false;
+ }
+ };
}
@Override
Element detailsElement = article.getElementsByClass("standfirst")
.first();
if (detailsElement != null) {
- return detailsElement.text();
+ return getArticleText(detailsElement);
}
return "";
protected String getArticleContent(Document doc, Element article) {
Element content = article.getElementsByClass("introduction").first();
if (content != null) {
- return content.text();
+ return getArticleText(content);
}
return "";
i latency requirements. These mechanisms work, but they come at\r
i a cost: a loss of as much as 80% of total available I/O\r
i bandwidth. I have run some tests to demonstrate this problem;\r
-i some upcoming improvements to the bfq I/O scheduler promise to\r
-i improve the situation considerably.\r
+i some upcoming improvements to the [1]bfq I/O scheduler promise\r
+i to improve the situation considerably.\r
+i \r
+i \r
+i \r
+i [1] https://lwn.net/Articles/601799/\r
i\r
<div class='details'>([Kernel] Aug 29, 2018 21:20 UTC (Wed) (corbet))</div>
<br/>
<div class='content' style='text-align: justify'>
- Many services, from web hosting and video streaming to cloud storage, need to move data to and from storage. They also often require that each per-client I/O flow be guaranteed a non-zero amount of bandwidth and a bounded latency. An expensive way to provide these guarantees is to over-provision storage resources, keeping each resource underutilized, and thus have plenty of bandwidth available for the few I/O flows dispatched to each medium. Alternatively one can use an I/O controller. Linux provides two mechanisms designed to throttle some I/O streams to allow others to meet their bandwidth and latency requirements. These mechanisms work, but they come at a cost: a loss of as much as 80% of total available I/O bandwidth. I have run some tests to demonstrate this problem; some upcoming improvements to the bfq I/O scheduler promise to improve the situation considerably.
+ Many services, from web hosting and video streaming to cloud storage, need to move data to and from storage. They also often require that each per-client I/O flow be guaranteed a non-zero amount of bandwidth and a bounded latency. An expensive way to provide these guarantees is to over-provision storage resources, keeping each resource underutilized, and thus have plenty of bandwidth available for the few I/O flows dispatched to each medium. Alternatively one can use an I/O controller. Linux provides two mechanisms designed to throttle some I/O streams to allow others to meet their bandwidth and latency requirements. These mechanisms work, but they come at a cost: a loss of as much as 80% of total available I/O bandwidth. I have run some tests to demonstrate this problem; some upcoming improvements to the [1]bfq I/O scheduler promise to improve the situation considerably.<br/><br/><br/><br/>[1] https://lwn.net/Articles/601799/
</div>
<hr/>
</div>
i reboot. Numerous mechanisms for ensuring the integrity of\r
i installed system files have been proposed and implemented over\r
i the years. But it seems there is always room for one more; to\r
-i fill that space, the fs-verity mechanism is being proposed as\r
-i a way to protect individual files from malicious modification.\r
+i fill that space, the [1]fs-verity mechanism is being proposed\r
+i as a way to protect individual files from malicious\r
+i modification.\r
+i \r
+i \r
+i \r
+i [1] https://lwn.net/ml/linux-fsdevel/20180824161642.1144-1-ebi-\r
+i ggers@kernel.org/\r
i\r
<div class='details'>([Kernel] Aug 30, 2018 18:50 UTC (Thu) (corbet))</div>
<br/>
<div class='content' style='text-align: justify'>
- The developers of the Android system have, among their many goals, the wish to better protect Android devices against persistent compromise. It is bad if a device is taken over by an attacker; it's worse if it remains compromised even after a reboot. Numerous mechanisms for ensuring the integrity of installed system files have been proposed and implemented over the years. But it seems there is always room for one more; to fill that space, the fs-verity mechanism is being proposed as a way to protect individual files from malicious modification.
+ The developers of the Android system have, among their many goals, the wish to better protect Android devices against persistent compromise. It is bad if a device is taken over by an attacker; it's worse if it remains compromised even after a reboot. Numerous mechanisms for ensuring the integrity of installed system files have been proposed and implemented over the years. But it seems there is always room for one more; to fill that space, the [1]fs-verity mechanism is being proposed as a way to protect individual files from malicious modification.<br/><br/><br/><br/>[1] https://lwn.net/ml/linux-fsdevel/20180824161642.1144-1-ebiggers@kernel.org/
</div>
<hr/>
</div>
0Kernel prepatch 4.19-rc2 null/LWN/0000763987 70\r
i [Kernel] Sep 2, 2018 22:29 UTC (Sun) (corbet)\r
i\r
-i The 4.19-rc2 kernel prepatch is out for testing. "As usual,\r
-i the rc2 release is pretty small. People are taking a breather\r
-i after the merge window, and it takes a bit of time for bug\r
-i reports to start coming in and get identified."\r
+i The [1]4.19-rc2 kernel prepatch is out for testing. " As\r
+i usual, the rc2 release is pretty small. People are taking a\r
+i breather after the merge window, and it takes a bit of time\r
+i for bug reports to start coming in and get identified. "\r
+i \r
+i \r
+i \r
+i [1] https://lwn.net/Articles/763988/\r
i\r
<div class='details'>([Kernel] Sep 2, 2018 22:29 UTC (Sun) (corbet))</div>
<br/>
<div class='content' style='text-align: justify'>
- The 4.19-rc2 kernel prepatch is out for testing. "As usual, the rc2 release is pretty small. People are taking a breather after the merge window, and it takes a bit of time for bug reports to start coming in and get identified."
+ The [1]4.19-rc2 kernel prepatch is out for testing. " As usual, the rc2 release is pretty small. People are taking a breather after the merge window, and it takes a bit of time for bug reports to start coming in and get identified. "<br/><br/><br/><br/>[1] https://lwn.net/Articles/763988/
</div>
<hr/>
</div>
0[$] An introduction to the Julia language, part 2 null/LWN/0000764001 70\r
i [Development] Sep 4, 2018 15:57 UTC (Tue) (jake)\r
i\r
-i Part 1 of this series introduced the Julia project's goals and\r
-i development process, along with the language syntax, including\r
-i the basics of control flow, data types, and, in more detail,\r
-i how to work with arrays. In this part, user-defined functions\r
-i and the central concept of multiple dispatch are described. It\r
-i will also survey Julia's module and package system, cover some\r
-i syntax features, show how to make plots, and briefly dip into\r
-i macros and distributed computing.\r
+i [1]Part 1 of this series introduced the [2]Julia project's\r
+i goals and development process, along with the language syntax,\r
+i including the basics of control flow, data types, and, in more\r
+i detail, how to work with arrays. In this part, user-defined\r
+i functions and the central concept of multiple dispatch are\r
+i described. It will also survey Julia's module and package\r
+i system, cover some syntax features, show how to make plots,\r
+i and briefly dip into macros and distributed computing.\r
+i \r
+i \r
+i \r
+i [1] https://lwn.net/Articles/763626/\r
+i \r
+i [2] http://julialang.org/\r
i\r
<div class='details'>([Development] Sep 4, 2018 15:57 UTC (Tue) (jake))</div>
<br/>
<div class='content' style='text-align: justify'>
- Part 1 of this series introduced the Julia project's goals and development process, along with the language syntax, including the basics of control flow, data types, and, in more detail, how to work with arrays. In this part, user-defined functions and the central concept of multiple dispatch are described. It will also survey Julia's module and package system, cover some syntax features, show how to make plots, and briefly dip into macros and distributed computing.
+ [1]Part 1 of this series introduced the [2]Julia project's goals and development process, along with the language syntax, including the basics of control flow, data types, and, in more detail, how to work with arrays. In this part, user-defined functions and the central concept of multiple dispatch are described. It will also survey Julia's module and package system, cover some syntax features, show how to make plots, and briefly dip into macros and distributed computing.<br/><br/><br/><br/>[1] https://lwn.net/Articles/763626/<br/><br/>[2] http://julialang.org/
</div>
<hr/>
</div>
i Security and convenience rarely go hand-in-hand, but if your\r
i job (or life) requires extraordinary care against potentially\r
i targeted attacks, the security side of that tradeoff may win\r
-i out. If so, running a system like Qubes OS on your desktop or\r
-i CopperheadOS on your phone might make sense, which is just\r
-i what Konstantin Ryabitsev, Linux Foundation (LF) director of\r
-i IT security, has done. He reported on the experience in a talk\r
-i [YouTube video] entitled "Life Behind the Tinfoil Curtain" at\r
-i the 2018 Linux Security Summit North America.\r
+i out. If so, running a system like [1]Qubes OS on your desktop\r
+i or [2]CopperheadOS on your phone might make sense, which is\r
+i just what Konstantin Ryabitsev, Linux Foundation (LF) director\r
+i of IT security, has done. He reported on the experience in a\r
+i [3]talk [YouTube video] entitled "Life Behind the Tinfoil\r
+i Curtain" at the 2018 [4]Linux Security Summit North America .\r
+i \r
+i \r
+i \r
+i [1] https://www.qubes-os.org/\r
+i \r
+i [2] https://copperhead.co/\r
+i \r
+i [3] https://www.youtube.com/watch?v=8cU4hQg6GvU&index=6&list=P-\r
+i LbzoR-pLrL6rOT6m50HdJFYUHyvA9lurI&t=0s\r
+i \r
+i [4] https://events.linuxfoundation.org/events/linux-security-s-\r
+i ummit-north-america-2018/\r
i\r
<div class='details'>([Security] Sep 5, 2018 22:11 UTC (Wed) (jake))</div>
<br/>
<div class='content' style='text-align: justify'>
- Security and convenience rarely go hand-in-hand, but if your job (or life) requires extraordinary care against potentially targeted attacks, the security side of that tradeoff may win out. If so, running a system like Qubes OS on your desktop or CopperheadOS on your phone might make sense, which is just what Konstantin Ryabitsev, Linux Foundation (LF) director of IT security, has done. He reported on the experience in a talk [YouTube video] entitled "Life Behind the Tinfoil Curtain" at the 2018 Linux Security Summit North America.
+ Security and convenience rarely go hand-in-hand, but if your job (or life) requires extraordinary care against potentially targeted attacks, the security side of that tradeoff may win out. If so, running a system like [1]Qubes OS on your desktop or [2]CopperheadOS on your phone might make sense, which is just what Konstantin Ryabitsev, Linux Foundation (LF) director of IT security, has done. He reported on the experience in a [3]talk [YouTube video] entitled "Life Behind the Tinfoil Curtain" at the 2018 [4]Linux Security Summit North America .<br/><br/><br/><br/>[1] https://www.qubes-os.org/<br/><br/>[2] https://copperhead.co/<br/><br/>[3] https://www.youtube.com/watch?v=8cU4hQg6GvU&index=6&list=PLbzoR-pLrL6rOT6m50HdJFYUHyvA9lurI&t=0s<br/><br/>[4] https://events.linuxfoundation.org/events/linux-security-summit-north-america-2018/
</div>
<hr/>
</div>
i [Kernel] Sep 3, 2018 19:07 UTC (Mon) (corbet)\r
i\r
i The annual Maintainer and Kernel Summits will be held in\r
-i Vancouver, BC on November 12 to 15, in conjunction with the\r
+i Vancouver, BC on November 12 to 15, in conjunction with the\r
i Linux Plumbers Conference. The program committee is looking\r
i for topics for both summits; read on for details on how to\r
i submit ideas and, perhaps, get an invitation to the Maintainer\r
<div class='details'>([Kernel] Sep 3, 2018 19:07 UTC (Mon) (corbet))</div>
<br/>
<div class='content' style='text-align: justify'>
- The annual Maintainer and Kernel Summits will be held in Vancouver, BC on November 12 to 15, in conjunction with the Linux Plumbers Conference. The program committee is looking for topics for both summits; read on for details on how to submit ideas and, perhaps, get an invitation to the Maintainer Summit.
+ The annual Maintainer and Kernel Summits will be held in Vancouver, BC on November 12 to 15, in conjunction with the Linux Plumbers Conference. The program committee is looking for topics for both summits; read on for details on how to submit ideas and, perhaps, get an invitation to the Maintainer Summit.
</div>
<hr/>
</div>
i\r
i It is common for kernel code to generate unique integers for\r
i identifiers. When one plugs in a flash drive, it will show up\r
-i as /dev/sdN; that N (a letter derived from a number) must be\r
+i as /dev/sdN ; that N (a letter derived from a number) must be\r
i generated in the kernel, and it should not already be in use\r
i for another drive or unpleasant things will happen. One might\r
i think that generating such numbers would not be a difficult\r
<div class='details'>([Kernel] Sep 4, 2018 0:15 UTC (Tue) (corbet))</div>
<br/>
<div class='content' style='text-align: justify'>
- It is common for kernel code to generate unique integers for identifiers. When one plugs in a flash drive, it will show up as /dev/sdN; that N (a letter derived from a number) must be generated in the kernel, and it should not already be in use for another drive or unpleasant things will happen. One might think that generating such numbers would not be a difficult task, but that turns out not to be the case, especially in situations where many numbers must be tracked. The IDA (for "ID allocator", perhaps) API exists to handle this specialized task. In past kernels, it has managed to make the process of getting an unused number surprisingly complex; the 4.19 kernel has a new IDA API that simplifies things considerably.
+ It is common for kernel code to generate unique integers for identifiers. When one plugs in a flash drive, it will show up as /dev/sdN ; that N (a letter derived from a number) must be generated in the kernel, and it should not already be in use for another drive or unpleasant things will happen. One might think that generating such numbers would not be a difficult task, but that turns out not to be the case, especially in situations where many numbers must be tracked. The IDA (for "ID allocator", perhaps) API exists to handle this specialized task. In past kernels, it has managed to make the process of getting an unused number surprisingly complex; the 4.19 kernel has a new IDA API that simplifies things considerably.
</div>
<hr/>
</div>
0[$] Learning about Go internals at GopherCon null/LWN/0000764131 70\r
i [Front] Sep 5, 2018 19:20 UTC (Wed) (jake)\r
i\r
-i GopherCon is the major conference for the Go language,\r
+i [1]GopherCon is the major conference for the [2]Go language ,\r
i attended by 1600 dedicated "gophers", as the members of its\r
i community like to call themselves. Held for the last five\r
i years in Denver, it attracts programmers, open-source\r
i contributors, and technical managers from all over North\r
i America and the world. GopherCon's highly-technical program is\r
i an intense mix of Go internals and programming tutorials, a\r
-i few of which we will explore in this article. Subscribers can\r
-i read on for a report from GopherCon by guest author Josh\r
-i Berkus.\r
+i few of which we will explore in this article.\r
+i \r
+i \r
+i \r
+i [1] https://www.gophercon.com/\r
+i \r
+i [2] https://golang.org/ Subscribers can read on for a report\r
+i from GopherCon by guest author Josh Berkus.\r
i\r
<div class='details'>([Front] Sep 5, 2018 19:20 UTC (Wed) (jake))</div>
<br/>
<div class='content' style='text-align: justify'>
- GopherCon is the major conference for the Go language, attended by 1600 dedicated "gophers", as the members of its community like to call themselves. Held for the last five years in Denver, it attracts programmers, open-source contributors, and technical managers from all over North America and the world. GopherCon's highly-technical program is an intense mix of Go internals and programming tutorials, a few of which we will explore in this article. Subscribers can read on for a report from GopherCon by guest author Josh Berkus.
+ [1]GopherCon is the major conference for the [2]Go language , attended by 1600 dedicated "gophers", as the members of its community like to call themselves. Held for the last five years in Denver, it attracts programmers, open-source contributors, and technical managers from all over North America and the world. GopherCon's highly-technical program is an intense mix of Go internals and programming tutorials, a few of which we will explore in this article.<br/><br/><br/><br/>[1] https://www.gophercon.com/<br/><br/>[2] https://golang.org/ Subscribers can read on for a report from GopherCon by guest author Josh Berkus.
</div>
<hr/>
</div>
0A set of stable kernels null/LWN/0000764184 70\r
i [Kernel] Sep 5, 2018 15:15 UTC (Wed) (ris)\r
i\r
-i Greg Kroah-Hartman has released stable kernels 4.18.6,\r
-i 4.14.68, 4.9.125, 4.4.154, and 3.18.121. They all contain\r
-i important fixes and users should upgrade.\r
+i Greg Kroah-Hartman has released stable kernels [1]4.18.6 ,\r
+i [2]4.14.68 , [3]4.9.125 , [4]4.4.154 , and [5]3.18.121 . They\r
+i all contain important fixes and users should upgrade.\r
+i \r
+i \r
+i \r
+i [1] https://lwn.net/Articles/764185/\r
+i \r
+i [2] https://lwn.net/Articles/764186/\r
+i \r
+i [3] https://lwn.net/Articles/764187/\r
+i \r
+i [4] https://lwn.net/Articles/764188/\r
+i \r
+i [5] https://lwn.net/Articles/764189/\r
i\r
<div class='details'>([Kernel] Sep 5, 2018 15:15 UTC (Wed) (ris))</div>
<br/>
<div class='content' style='text-align: justify'>
- Greg Kroah-Hartman has released stable kernels 4.18.6, 4.14.68, 4.9.125, 4.4.154, and 3.18.121. They all contain important fixes and users should upgrade.
+ Greg Kroah-Hartman has released stable kernels [1]4.18.6 , [2]4.14.68 , [3]4.9.125 , [4]4.4.154 , and [5]3.18.121 . They all contain important fixes and users should upgrade.<br/><br/><br/><br/>[1] https://lwn.net/Articles/764185/<br/><br/>[2] https://lwn.net/Articles/764186/<br/><br/>[3] https://lwn.net/Articles/764187/<br/><br/>[4] https://lwn.net/Articles/764188/<br/><br/>[5] https://lwn.net/Articles/764189/
</div>
<hr/>
</div>
i to be able to perform filtering or associate any given packet\r
i with a flow. The piece of code that follows the different\r
i layers of packet encapsulation to find the important data is\r
-i called a flow dissector. In current Linux kernels, the flow\r
-i dissector is written in C. A patch set has been proposed\r
+i called a flow dissector. In current Linux kernels, the [1]flow\r
+i dissector is written in C. A [2]patch set has been proposed\r
i recently to implement it in BPF with the clear goal of\r
i improving security, flexibility, and maybe even performance.\r
+i \r
+i \r
+i \r
+i [1] https://elixir.bootlin.com/linux/v4.18.6/source/net/core/f-\r
+i low_dissector.c\r
+i \r
+i [2] https://lwn.net/Articles/763938/\r
i\r
<div class='details'>([Kernel] Sep 6, 2018 15:59 UTC (Thu) (corbet))</div>
<br/>
<div class='content' style='text-align: justify'>
- Network packet headers contain a great deal of information, but the kernel often only needs a subset of that information to be able to perform filtering or associate any given packet with a flow. The piece of code that follows the different layers of packet encapsulation to find the important data is called a flow dissector. In current Linux kernels, the flow dissector is written in C. A patch set has been proposed recently to implement it in BPF with the clear goal of improving security, flexibility, and maybe even performance.
+ Network packet headers contain a great deal of information, but the kernel often only needs a subset of that information to be able to perform filtering or associate any given packet with a flow. The piece of code that follows the different layers of packet encapsulation to find the important data is called a flow dissector. In current Linux kernels, the [1]flow dissector is written in C. A [2]patch set has been proposed recently to implement it in BPF with the clear goal of improving security, flexibility, and maybe even performance.<br/><br/><br/><br/>[1] https://elixir.bootlin.com/linux/v4.18.6/source/net/core/flow_dissector.c<br/><br/>[2] https://lwn.net/Articles/763938/
</div>
<hr/>
</div>
i a different container; Firefox 63 will remove all trust for\r
i Symantec-issued certificates, and it is optional in Firefox\r
i 62; FreeBSD support for WebAuthn was added; and more. See the\r
-i release notes for details.\r
+i [1]release notes for details.\r
+i \r
+i \r
+i \r
+i [1] https://www.mozilla.org/en-US/firefox/62.0/releasenotes/\r
i\r
<div class='details'>([Development] Sep 5, 2018 17:31 UTC (Wed) (ris))</div>
<br/>
<div class='content' style='text-align: justify'>
- Mozilla has released Firefox 62.0, with several new features. The Firefox Home (default New Tab) allows users to display up to 4 rows of top sites, Pocket stories, and highlights; for those using containers there is menu option to reopen a tab in a different container; Firefox 63 will remove all trust for Symantec-issued certificates, and it is optional in Firefox 62; FreeBSD support for WebAuthn was added; and more. See the release notes for details.
+ Mozilla has released Firefox 62.0, with several new features. The Firefox Home (default New Tab) allows users to display up to 4 rows of top sites, Pocket stories, and highlights; for those using containers there is menu option to reopen a tab in a different container; Firefox 63 will remove all trust for Symantec-issued certificates, and it is optional in Firefox 62; FreeBSD support for WebAuthn was added; and more. See the [1]release notes for details.<br/><br/><br/><br/>[1] https://www.mozilla.org/en-US/firefox/62.0/releasenotes/
</div>
<hr/>
</div>
i after its disclosure in January. It is, however, possible for\r
i user-space processes to use Spectre v2 to attack each other;\r
i thus far, the mainline kernel has offered relatively little\r
-i protection against such attacks. A recent proposal from Jiri\r
-i Kosina may change that situation, but there are still some\r
-i disagreements around the details.\r
+i protection against such attacks. A recent [1]proposal from\r
+i Jiri Kosina may change that situation, but there are still\r
+i some disagreements around the details.\r
+i \r
+i \r
+i \r
+i [1] https://lwn.net/ml/linux-kernel/nycvar.YFH.7.76.1809041619-\r
+i 510.15880@cbobk.fhfr.pm/\r
i\r
<div class='details'>([Kernel] Sep 5, 2018 21:47 UTC (Wed) (corbet))</div>
<br/>
<div class='content' style='text-align: justify'>
- The Spectre variant 2 vulnerability allows the speculative execution of incorrect (in an attacker-controllable way) indirect branch predictions, resulting in the ability to exfiltrate information via side channels. The kernel has been reasonably well protected against this variant since shortly after its disclosure in January. It is, however, possible for user-space processes to use Spectre v2 to attack each other; thus far, the mainline kernel has offered relatively little protection against such attacks. A recent proposal from Jiri Kosina may change that situation, but there are still some disagreements around the details.
+ The Spectre variant 2 vulnerability allows the speculative execution of incorrect (in an attacker-controllable way) indirect branch predictions, resulting in the ability to exfiltrate information via side channels. The kernel has been reasonably well protected against this variant since shortly after its disclosure in January. It is, however, possible for user-space processes to use Spectre v2 to attack each other; thus far, the mainline kernel has offered relatively little protection against such attacks. A recent [1]proposal from Jiri Kosina may change that situation, but there are still some disagreements around the details.<br/><br/><br/><br/>[1] https://lwn.net/ml/linux-kernel/nycvar.YFH.7.76.1809041619510.15880@cbobk.fhfr.pm/
</div>
<hr/>
</div>
i [Development] Sep 5, 2018 21:17 UTC (Wed) (ris)\r
i\r
i The GNOME Project has announced the release of GNOME 3.30\r
-i "Almería". "This release brings automatic updates in Software,\r
-i more games, and a new Podcasts application. Improvements to\r
-i core GNOME applications include a refined location and search\r
-i bar in Files, a [Thunderbolt] panel in Settings, support for\r
-i remoting using RDP in Boxes, and many more." The release notes\r
-i contain more information.\r
+i "Almería". " This release brings automatic updates in\r
+i Software, more games, and a new Podcasts application.\r
+i Improvements to core GNOME applications include a refined\r
+i location and search bar in Files, a [Thunderbolt] panel in\r
+i Settings, support for remoting using RDP in Boxes, and many\r
+i more. " The [1]release notes contain more information.\r
+i \r
+i \r
+i \r
+i [1] https://help.gnome.org/misc/release-notes/3.30/\r
i\r
<div class='details'>([Development] Sep 5, 2018 21:17 UTC (Wed) (ris))</div>
<br/>
<div class='content' style='text-align: justify'>
- The GNOME Project has announced the release of GNOME 3.30 "Almería". "This release brings automatic updates in Software, more games, and a new Podcasts application. Improvements to core GNOME applications include a refined location and search bar in Files, a [Thunderbolt] panel in Settings, support for remoting using RDP in Boxes, and many more." The release notes contain more information.
+ The GNOME Project has announced the release of GNOME 3.30 "Almería". " This release brings automatic updates in Software, more games, and a new Podcasts application. Improvements to core GNOME applications include a refined location and search bar in Files, a [Thunderbolt] panel in Settings, support for remoting using RDP in Boxes, and many more. " The [1]release notes contain more information.<br/><br/><br/><br/>[1] https://help.gnome.org/misc/release-notes/3.30/
</div>
<hr/>
</div>
0The Hidden Benefit of Giving Back to Open Source Software (Working Knowledge) null/LWN/0000764321 70\r
i [Briefs] Sep 6, 2018 16:56 UTC (Thu) (corbet)\r
i\r
-i The Harvard Business School's "Working Knowledge" site has an\r
-i article arguing that it can pay for companies to allow their\r
-i developers to contribute back to the projects whose software\r
-i they use. "And that presents an interesting dilemma for firms\r
-i that rely heavily on open source. Should they allow employees\r
-i on company time to make updates and edits to the software for\r
-i community use that could be used by competitors? New research\r
-i by Assistant Professor Frank Nagle, a member of the Strategy\r
-i Unit at Harvard Business School, shows that paying employees\r
-i to contribute to such software boosts the company’s\r
-i productivity from using the software by as much as 100\r
-i percent, when compared with free-riding competitors."\r
+i The Harvard Business School's "Working Knowledge" site has\r
+i [1]an article arguing that it can pay for companies to allow\r
+i their developers to contribute back to the projects whose\r
+i software they use. " And that presents an interesting dilemma\r
+i for firms that rely heavily on open source. Should they allow\r
+i employees on company time to make updates and edits to the\r
+i software for community use that could be used by competitors?\r
+i New research by Assistant Professor Frank Nagle, a member of\r
+i the Strategy Unit at Harvard Business School, shows that\r
+i paying employees to contribute to such software boosts the\r
+i company’s productivity from using the software by as much as\r
+i 100 percent, when compared with free-riding competitors. "\r
+i \r
+i \r
+i \r
+i [1] https://hbswk.hbs.edu/item/the-hidden-benefit-of-giving-ba-\r
+i ck-to-open-source-software\r
i\r
<div class='details'>([Briefs] Sep 6, 2018 16:56 UTC (Thu) (corbet))</div>
<br/>
<div class='content' style='text-align: justify'>
- The Harvard Business School's "Working Knowledge" site has an article arguing that it can pay for companies to allow their developers to contribute back to the projects whose software they use. "And that presents an interesting dilemma for firms that rely heavily on open source. Should they allow employees on company time to make updates and edits to the software for community use that could be used by competitors? New research by Assistant Professor Frank Nagle, a member of the Strategy Unit at Harvard Business School, shows that paying employees to contribute to such software boosts the company’s productivity from using the software by as much as 100 percent, when compared with free-riding competitors."
+ The Harvard Business School's "Working Knowledge" site has [1]an article arguing that it can pay for companies to allow their developers to contribute back to the projects whose software they use. " And that presents an interesting dilemma for firms that rely heavily on open source. Should they allow employees on company time to make updates and edits to the software for community use that could be used by competitors? New research by Assistant Professor Frank Nagle, a member of the Strategy Unit at Harvard Business School, shows that paying employees to contribute to such software boosts the company’s productivity from using the software by as much as 100 percent, when compared with free-riding competitors. "<br/><br/><br/><br/>[1] https://hbswk.hbs.edu/item/the-hidden-benefit-of-giving-back-to-open-source-software
</div>
<hr/>
</div>
\r
\r
For all the wishful thinking about manufacturing more laptops\r
- and iPhones in the U.S., there is one sector of tech\r
- manufacturing where America remains a leader: computer chips.\r
- From a report: Some $44 billion worth of semiconductors are\r
- exported from the U.S. each year, making them America's fourth\r
- leading manufacturing export after cars, airplanes and refined\r
- oil. There are roughly 80 wafer fabrication plants (aka fabs)\r
- in the U.S., spread across 19 states. [...] An even greater\r
- share of the world's computer chips are designed domestically\r
- and made overseas by companies including Qualcomm, Apple,\r
- Broadcom and Nvidia. A bunch of the high-tech gear needed to\r
- produce chips is also designed and/or made in the U.S.\r
+ and iPhones in the U.S., there is [1]one sector of tech\r
+ manufacturing where America remains a leader: computer chips .\r
+ From a report:\r
+ \r
+ > Some $44 billion worth of semiconductors are exported from\r
+ the U.S. each year, making them America's fourth leading\r
+ manufacturing export after cars, airplanes and refined oil.\r
+ There are roughly 80 wafer fabrication plants (aka fabs) in\r
+ the U.S., spread across 19 states. [...] An even greater share\r
+ of the world's computer chips are designed domestically and\r
+ made overseas by companies including Qualcomm, Apple, Broadcom\r
+ and Nvidia. A bunch of the high-tech gear needed to produce\r
+ chips is also designed and/or made in the U.S.\r
+ \r
+ \r
+ \r
+ [1] https://www.axios.com/computer-chips-manufacturing-america-\r
+ -10dcfe13-64f3-4ea9-ad4a-cb189a00429a.html\r
\r
\r
** \r
i from the how-about-that dept.\r
i\r
i For all the wishful thinking about manufacturing more laptops\r
-i and iPhones in the U.S., there is one sector of tech\r
-i manufacturing where America remains a leader: computer chips.\r
-i From a report: Some $44 billion worth of semiconductors are\r
-i exported from the U.S. each year, making them America's fourth\r
-i leading manufacturing export after cars, airplanes and refined\r
-i oil. There are roughly 80 wafer fabrication plants (aka fabs)\r
-i in the U.S., spread across 19 states. [...] An even greater\r
-i share of the world's computer chips are designed domestically\r
-i and made overseas by companies including Qualcomm, Apple,\r
-i Broadcom and Nvidia. A bunch of the high-tech gear needed to\r
-i produce chips is also designed and/or made in the U.S.\r
+i and iPhones in the U.S., there is [1]one sector of tech\r
+i manufacturing where America remains a leader: computer chips .\r
+i From a report:\r
+i \r
+i > Some $44 billion worth of semiconductors are exported from\r
+i the U.S. each year, making them America's fourth leading\r
+i manufacturing export after cars, airplanes and refined oil.\r
+i There are roughly 80 wafer fabrication plants (aka fabs) in\r
+i the U.S., spread across 19 states. [...] An even greater share\r
+i of the world's computer chips are designed domestically and\r
+i made overseas by companies including Qualcomm, Apple, Broadcom\r
+i and Nvidia. A bunch of the high-tech gear needed to produce\r
+i chips is also designed and/or made in the U.S.\r
+i \r
+i \r
+i \r
+i [1] https://www.axios.com/computer-chips-manufacturing-america-\r
+i -10dcfe13-64f3-4ea9-ad4a-cb189a00429a.html\r
i\r
from the how-about-that dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- For all the wishful thinking about manufacturing more laptops and iPhones in the U.S., there is one sector of tech manufacturing where America remains a leader: computer chips. From a report: Some $44 billion worth of semiconductors are exported from the U.S. each year, making them America's fourth leading manufacturing export after cars, airplanes and refined oil. There are roughly 80 wafer fabrication plants (aka fabs) in the U.S., spread across 19 states. [...] An even greater share of the world's computer chips are designed domestically and made overseas by companies including Qualcomm, Apple, Broadcom and Nvidia. A bunch of the high-tech gear needed to produce chips is also designed and/or made in the U.S.
+ For all the wishful thinking about manufacturing more laptops and iPhones in the U.S., there is [1]one sector of tech manufacturing where America remains a leader: computer chips . From a report:<br/><br/>> Some $44 billion worth of semiconductors are exported from the U.S. each year, making them America's fourth leading manufacturing export after cars, airplanes and refined oil. There are roughly 80 wafer fabrication plants (aka fabs) in the U.S., spread across 19 states. [...] An even greater share of the world's computer chips are designed domestically and made overseas by companies including Qualcomm, Apple, Broadcom and Nvidia. A bunch of the high-tech gear needed to produce chips is also designed and/or made in the U.S.<br/><br/><br/><br/>[1] https://www.axios.com/computer-chips-manufacturing-america--10dcfe13-64f3-4ea9-ad4a-cb189a00429a.html
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- For all the wishful thinking about manufacturing more laptops and iPhones in the U.S., there is one sector of tech manufacturing where America remains a leader: computer chips. From a report: Some $44 billion worth of semiconductors are exported from the U.S. each year, making them America's fourth leading manufacturing export after cars, airplanes and refined oil. There are roughly 80 wafer fabrication plants (aka fabs) in the U.S., spread across 19 states. [...] An even greater share of the world's computer chips are designed domestically and made overseas by companies including Qualcomm, Apple, Broadcom and Nvidia. A bunch of the high-tech gear needed to produce chips is also designed and/or made in the U.S.
+ For all the wishful thinking about manufacturing more laptops and iPhones in the U.S., there is [1]one sector of tech manufacturing where America remains a leader: computer chips . From a report:<br/><br/>> Some $44 billion worth of semiconductors are exported from the U.S. each year, making them America's fourth leading manufacturing export after cars, airplanes and refined oil. There are roughly 80 wafer fabrication plants (aka fabs) in the U.S., spread across 19 states. [...] An even greater share of the world's computer chips are designed domestically and made overseas by companies including Qualcomm, Apple, Broadcom and Nvidia. A bunch of the high-tech gear needed to produce chips is also designed and/or made in the U.S.<br/><br/><br/><br/>[1] https://www.axios.com/computer-chips-manufacturing-america--10dcfe13-64f3-4ea9-ad4a-cb189a00429a.html
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/\r
\r
\r
- The Tor Browser has rolled out a new interface with the\r
- release of v8. From a report: The Tor Browser has always been\r
- based on the Firefox codebase, but it lagged behind a few\r
- releases. Mozilla rolled out a major overhaul of the Firefox\r
- codebase in November 2017, with the release of Firefox 57, the\r
- first release in the Firefox Quantum series. Firefox Quantum\r
- came with a new page rendering engine, a new add-ons API, and\r
- a new user interface called the Photon UI. Because these were\r
- major, code-breaking changes, it took the smaller Tor team\r
- some time to integrate all of them into the Tor Browser\r
- codebase and make sure everything worked as intended. The new\r
- Tor Browser 8, released yesterday, is now in sync with the\r
- most recent version of Firefox, the Quantum release, and also\r
- supports all of its features. This means the Tor Browser now\r
- uses the same modern Photon UI that current Firefox versions\r
- use, it supports the same speed-optimized page rendering\r
- engine and has also dropped support for the old XUL-based\r
- add-ons system for the new WebExtensions API system used by\r
- Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium\r
- browsers.\r
+ The Tor Browser has [1]rolled out a new interface with the\r
+ release of v8 . From a report:\r
+ \r
+ > The Tor Browser has always been based on the Firefox\r
+ codebase, but it lagged behind a few releases. Mozilla rolled\r
+ out a major overhaul of the Firefox codebase in November 2017,\r
+ with the release of Firefox 57, [2]the first release in the\r
+ Firefox Quantum series . Firefox Quantum came with a new page\r
+ rendering engine, a new add-ons API, and a new user interface\r
+ called the Photon UI. Because these were major, code-breaking\r
+ changes, it took the smaller Tor team some time to integrate\r
+ all of them into the Tor Browser codebase and make sure\r
+ everything worked as intended. The new Tor Browser 8, released\r
+ yesterday, is now in sync with the most recent version of\r
+ Firefox, the Quantum release, and also supports all of its\r
+ features. This means the Tor Browser now uses the same modern\r
+ Photon UI that current Firefox versions use, it supports the\r
+ same speed-optimized page rendering engine and has also\r
+ dropped support for the old XUL-based add-ons system for the\r
+ new WebExtensions API system used by Chrome, Opera, Vivaldi,\r
+ Brave, and the rest of the Chromium browsers.\r
+ \r
+ \r
+ \r
+ [1] https://www.zdnet.com/article/tor-browser-gets-a-redesign-\r
+ switches-to-new-firefox-quantum-engine/\r
+ \r
+ [2] https://news.slashdot.org/story/17/11/25/1938225/firefox-q-\r
+ uantum-is-better-faster-smarter-than-chrome-says-wired\r
\r
\r
** \r
i Thursday September 06, 2018 @11:30PM (msmash)\r
i from the for-the-record dept.\r
i\r
-i The Tor Browser has rolled out a new interface with the\r
-i release of v8. From a report: The Tor Browser has always been\r
-i based on the Firefox codebase, but it lagged behind a few\r
-i releases. Mozilla rolled out a major overhaul of the Firefox\r
-i codebase in November 2017, with the release of Firefox 57, the\r
-i first release in the Firefox Quantum series. Firefox Quantum\r
-i came with a new page rendering engine, a new add-ons API, and\r
-i a new user interface called the Photon UI. Because these were\r
-i major, code-breaking changes, it took the smaller Tor team\r
-i some time to integrate all of them into the Tor Browser\r
-i codebase and make sure everything worked as intended. The new\r
-i Tor Browser 8, released yesterday, is now in sync with the\r
-i most recent version of Firefox, the Quantum release, and also\r
-i supports all of its features. This means the Tor Browser now\r
-i uses the same modern Photon UI that current Firefox versions\r
-i use, it supports the same speed-optimized page rendering\r
-i engine and has also dropped support for the old XUL-based\r
-i add-ons system for the new WebExtensions API system used by\r
-i Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium\r
-i browsers.\r
+i The Tor Browser has [1]rolled out a new interface with the\r
+i release of v8 . From a report:\r
+i \r
+i > The Tor Browser has always been based on the Firefox\r
+i codebase, but it lagged behind a few releases. Mozilla rolled\r
+i out a major overhaul of the Firefox codebase in November 2017,\r
+i with the release of Firefox 57, [2]the first release in the\r
+i Firefox Quantum series . Firefox Quantum came with a new page\r
+i rendering engine, a new add-ons API, and a new user interface\r
+i called the Photon UI. Because these were major, code-breaking\r
+i changes, it took the smaller Tor team some time to integrate\r
+i all of them into the Tor Browser codebase and make sure\r
+i everything worked as intended. The new Tor Browser 8, released\r
+i yesterday, is now in sync with the most recent version of\r
+i Firefox, the Quantum release, and also supports all of its\r
+i features. This means the Tor Browser now uses the same modern\r
+i Photon UI that current Firefox versions use, it supports the\r
+i same speed-optimized page rendering engine and has also\r
+i dropped support for the old XUL-based add-ons system for the\r
+i new WebExtensions API system used by Chrome, Opera, Vivaldi,\r
+i Brave, and the rest of the Chromium browsers.\r
+i \r
+i \r
+i \r
+i [1] https://www.zdnet.com/article/tor-browser-gets-a-redesign-\r
+i switches-to-new-firefox-quantum-engine/\r
+i \r
+i [2] https://news.slashdot.org/story/17/11/25/1938225/firefox-q-\r
+i uantum-is-better-faster-smarter-than-chrome-says-wired\r
i\r
from the for-the-record dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- The Tor Browser has rolled out a new interface with the release of v8. From a report: The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, the first release in the Firefox Quantum series. Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers.
+ The Tor Browser has [1]rolled out a new interface with the release of v8 . From a report:<br/><br/>> The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, [2]the first release in the Firefox Quantum series . Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers.<br/><br/><br/><br/>[1] https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/<br/><br/>[2] https://news.slashdot.org/story/17/11/25/1938225/firefox-quantum-is-better-faster-smarter-than-chrome-says-wired
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- The Tor Browser has rolled out a new interface with the release of v8. From a report: The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, the first release in the Firefox Quantum series. Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers.
+ The Tor Browser has [1]rolled out a new interface with the release of v8 . From a report:<br/><br/>> The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, [2]the first release in the Firefox Quantum series . Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers.<br/><br/><br/><br/>[1] https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/<br/><br/>[2] https://news.slashdot.org/story/17/11/25/1938225/firefox-quantum-is-better-faster-smarter-than-chrome-says-wired
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://www.apnews.com/f6d0e2a099684468873ab48966590ada\r
\r
\r
- An anonymous reader writes: For the first time an autonomous\r
- sailing robot has completed the Microtransat Challenge by\r
- crossing the Atlantic from Newfoundland, Canada to Ireland.\r
- The Microtransat has been running since 2010 and has seen 23\r
- previous entries all fail to make it across. The successful\r
- boat, SB Met was built by the Norwegian company Offshore\r
- Sensing AS and is only 2 metres (6.5 ft) long. It completed\r
- the crossing on August 26th, 79 days and 5000 km (3100 miles)\r
- of sailing after departing Newfoundland on June 7th. Further\r
- reading: A Fleet of Sailing Robots Sets Out To Quantify the\r
- Oceans.\r
+ An anonymous reader writes:\r
+ \r
+ > For the first time an autonomous sailing robot has completed\r
+ the [1]Microtransat Challenge by [2]crossing the Atlantic from\r
+ Newfoundland, Canada to Ireland . The Microtransat has been\r
+ running since 2010 and has seen 23 previous entries all fail\r
+ to make it across. The successful boat, [3]SB Met was built by\r
+ the Norwegian company [4]Offshore Sensing AS and is only 2\r
+ metres (6.5 ft) long. It completed the crossing on August\r
+ 26th, 79 days and 5000 km (3100 miles) of sailing after\r
+ departing Newfoundland on June 7th.\r
+ \r
+ Further reading: [5]A Fleet of Sailing Robots Sets Out To\r
+ Quantify the Oceans .\r
+ \r
+ \r
+ \r
+ [1] https://www.microtransat.org/\r
+ \r
+ [2] https://www.apnews.com/f6d0e2a099684468873ab48966590ada\r
+ \r
+ [3] https://www.microtransat.org/2018_sailbuoy_boat.php\r
+ \r
+ [4] http://sailbuoy.no/\r
+ \r
+ [5] https://science.slashdot.org/story/18/05/16/228245/a-fleet-\r
+ of-sailing-robots-sets-out-to-quantify-the-oceans\r
\r
\r
** \r
i Thursday September 06, 2018 @11:30PM (msmash)\r
i from the impressive-feat dept.\r
i\r
-i An anonymous reader writes: For the first time an autonomous\r
-i sailing robot has completed the Microtransat Challenge by\r
-i crossing the Atlantic from Newfoundland, Canada to Ireland.\r
-i The Microtransat has been running since 2010 and has seen 23\r
-i previous entries all fail to make it across. The successful\r
-i boat, SB Met was built by the Norwegian company Offshore\r
-i Sensing AS and is only 2 metres (6.5 ft) long. It completed\r
-i the crossing on August 26th, 79 days and 5000 km (3100 miles)\r
-i of sailing after departing Newfoundland on June 7th. Further\r
-i reading: A Fleet of Sailing Robots Sets Out To Quantify the\r
-i Oceans.\r
+i An anonymous reader writes:\r
+i \r
+i > For the first time an autonomous sailing robot has completed\r
+i the [1]Microtransat Challenge by [2]crossing the Atlantic from\r
+i Newfoundland, Canada to Ireland . The Microtransat has been\r
+i running since 2010 and has seen 23 previous entries all fail\r
+i to make it across. The successful boat, [3]SB Met was built by\r
+i the Norwegian company [4]Offshore Sensing AS and is only 2\r
+i metres (6.5 ft) long. It completed the crossing on August\r
+i 26th, 79 days and 5000 km (3100 miles) of sailing after\r
+i departing Newfoundland on June 7th.\r
+i \r
+i Further reading: [5]A Fleet of Sailing Robots Sets Out To\r
+i Quantify the Oceans .\r
+i \r
+i \r
+i \r
+i [1] https://www.microtransat.org/\r
+i \r
+i [2] https://www.apnews.com/f6d0e2a099684468873ab48966590ada\r
+i \r
+i [3] https://www.microtransat.org/2018_sailbuoy_boat.php\r
+i \r
+i [4] http://sailbuoy.no/\r
+i \r
+i [5] https://science.slashdot.org/story/18/05/16/228245/a-fleet-\r
+i of-sailing-robots-sets-out-to-quantify-the-oceans\r
i\r
from the impressive-feat dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- An anonymous reader writes: For the first time an autonomous sailing robot has completed the Microtransat Challenge by crossing the Atlantic from Newfoundland, Canada to Ireland. The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, SB Met was built by the Norwegian company Offshore Sensing AS and is only 2 metres (6.5 ft) long. It completed the crossing on August 26th, 79 days and 5000 km (3100 miles) of sailing after departing Newfoundland on June 7th. Further reading: A Fleet of Sailing Robots Sets Out To Quantify the Oceans.
+ An anonymous reader writes:<br/><br/>> For the first time an autonomous sailing robot has completed the [1]Microtransat Challenge by [2]crossing the Atlantic from Newfoundland, Canada to Ireland . The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, [3]SB Met was built by the Norwegian company [4]Offshore Sensing AS and is only 2 metres (6.5 ft) long. It completed the crossing on August 26th, 79 days and 5000 km (3100 miles) of sailing after departing Newfoundland on June 7th.<br/><br/>Further reading: [5]A Fleet of Sailing Robots Sets Out To Quantify the Oceans .<br/><br/><br/><br/>[1] https://www.microtransat.org/<br/><br/>[2] https://www.apnews.com/f6d0e2a099684468873ab48966590ada<br/><br/>[3] https://www.microtransat.org/2018_sailbuoy_boat.php<br/><br/>[4] http://sailbuoy.no/<br/><br/>[5] https://science.slashdot.org/story/18/05/16/228245/a-fleet-of-sailing-robots-sets-out-to-quantify-the-oceans
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- An anonymous reader writes: For the first time an autonomous sailing robot has completed the Microtransat Challenge by crossing the Atlantic from Newfoundland, Canada to Ireland. The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, SB Met was built by the Norwegian company Offshore Sensing AS and is only 2 metres (6.5 ft) long. It completed the crossing on August 26th, 79 days and 5000 km (3100 miles) of sailing after departing Newfoundland on June 7th. Further reading: A Fleet of Sailing Robots Sets Out To Quantify the Oceans.
+ An anonymous reader writes:<br/><br/>> For the first time an autonomous sailing robot has completed the [1]Microtransat Challenge by [2]crossing the Atlantic from Newfoundland, Canada to Ireland . The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, [3]SB Met was built by the Norwegian company [4]Offshore Sensing AS and is only 2 metres (6.5 ft) long. It completed the crossing on August 26th, 79 days and 5000 km (3100 miles) of sailing after departing Newfoundland on June 7th.<br/><br/>Further reading: [5]A Fleet of Sailing Robots Sets Out To Quantify the Oceans .<br/><br/><br/><br/>[1] https://www.microtransat.org/<br/><br/>[2] https://www.apnews.com/f6d0e2a099684468873ab48966590ada<br/><br/>[3] https://www.microtransat.org/2018_sailbuoy_boat.php<br/><br/>[4] http://sailbuoy.no/<br/><br/>[5] https://science.slashdot.org/story/18/05/16/228245/a-fleet-of-sailing-robots-sets-out-to-quantify-the-oceans
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://www.zdnet.com/article/google-investigating-issue-with-blurry-fonts-on-new-chrome-69/\r
\r
\r
- Since the release of Chrome 69 earlier this week, countless of\r
- users have gone on social media and Google Product Forums to\r
- complain about "blurry" or "fuzzy" text inside Chrome. ZDNet:\r
- The blurred font issue isn't only limited to text rendered\r
+ Since the [1]release of Chrome 69 earlier this week ,\r
+ countless of users have gone on social media and Google\r
+ Product Forums to [2]complain about "blurry" or "fuzzy" text\r
+ inside Chrome . ZDNet:\r
+ \r
+ > The blurred font issue isn't only limited to text rendered\r
inside a web page, users said, but also for the text\r
suggestions displayed inside the address bar search drop-down,\r
and Chrome's Developer Tools panel. [...] According to\r
or screen DPI settings didn't help. "Our team is investigating\r
reports of this behavior. You can find more information in\r
this public bug report," a Google spokesperson said last night\r
- after first user complaints started surfacing online. Some\r
- users have also expressed concerns over Chrome not showing\r
- "trivial subdomains" including www and secure lock sign in the\r
- address bar.\r
+ after first user complaints started surfacing online.\r
+ \r
+ Some users have also expressed concerns over Chrome not\r
+ showing [3]"trivial subdomains" including www and secure lock\r
+ sign in the address bar.\r
+ \r
+ \r
+ \r
+ [1] https://tech.slashdot.org/story/18/09/04/1711250/chrome-69-\r
+ arrives-with-revamped-design-more-powerful-omnibox-and-better-\r
+ password-manager\r
+ \r
+ [2] https://www.zdnet.com/article/google-investigating-issue-w-\r
+ ith-blurry-fonts-on-new-chrome-69/\r
+ \r
+ [3] https://bugs.chromium.org/p/chromium/issues/detail?id=8814-\r
+ 10\r
\r
\r
** Whats the deal (Score:2)\r
i Thursday September 06, 2018 @11:30PM (msmash)\r
i from the blurry-texts dept.\r
i\r
-i Since the release of Chrome 69 earlier this week, countless of\r
-i users have gone on social media and Google Product Forums to\r
-i complain about "blurry" or "fuzzy" text inside Chrome. ZDNet:\r
-i The blurred font issue isn't only limited to text rendered\r
+i Since the [1]release of Chrome 69 earlier this week ,\r
+i countless of users have gone on social media and Google\r
+i Product Forums to [2]complain about "blurry" or "fuzzy" text\r
+i inside Chrome . ZDNet:\r
+i \r
+i > The blurred font issue isn't only limited to text rendered\r
i inside a web page, users said, but also for the text\r
i suggestions displayed inside the address bar search drop-down,\r
i and Chrome's Developer Tools panel. [...] According to\r
i or screen DPI settings didn't help. "Our team is investigating\r
i reports of this behavior. You can find more information in\r
i this public bug report," a Google spokesperson said last night\r
-i after first user complaints started surfacing online. Some\r
-i users have also expressed concerns over Chrome not showing\r
-i "trivial subdomains" including www and secure lock sign in the\r
-i address bar.\r
+i after first user complaints started surfacing online.\r
+i \r
+i Some users have also expressed concerns over Chrome not\r
+i showing [3]"trivial subdomains" including www and secure lock\r
+i sign in the address bar.\r
+i \r
+i \r
+i \r
+i [1] https://tech.slashdot.org/story/18/09/04/1711250/chrome-69-\r
+i arrives-with-revamped-design-more-powerful-omnibox-and-better-\r
+i password-manager\r
+i \r
+i [2] https://www.zdnet.com/article/google-investigating-issue-w-\r
+i ith-blurry-fonts-on-new-chrome-69/\r
+i \r
+i [3] https://bugs.chromium.org/p/chromium/issues/detail?id=8814-\r
+i 10\r
i\r
from the blurry-texts dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- Since the release of Chrome 69 earlier this week, countless of users have gone on social media and Google Product Forums to complain about "blurry" or "fuzzy" text inside Chrome. ZDNet: The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to reports, the issue only manifests for Chrome 69 users on Windows. Those who rolled back to Chrome 68 stopped having problems. Users said that changing Chrome, operating system, or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night after first user complaints started surfacing online. Some users have also expressed concerns over Chrome not showing "trivial subdomains" including www and secure lock sign in the address bar.
+ Since the [1]release of Chrome 69 earlier this week , countless of users have gone on social media and Google Product Forums to [2]complain about "blurry" or "fuzzy" text inside Chrome . ZDNet:<br/><br/>> The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to reports, the issue only manifests for Chrome 69 users on Windows. Those who rolled back to Chrome 68 stopped having problems. Users said that changing Chrome, operating system, or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night after first user complaints started surfacing online.<br/><br/>Some users have also expressed concerns over Chrome not showing [3]"trivial subdomains" including www and secure lock sign in the address bar.<br/><br/><br/><br/>[1] https://tech.slashdot.org/story/18/09/04/1711250/chrome-69-arrives-with-revamped-design-more-powerful-omnibox-and-better-password-manager<br/><br/>[2] https://www.zdnet.com/article/google-investigating-issue-with-blurry-fonts-on-new-chrome-69/<br/><br/>[3] https://bugs.chromium.org/p/chromium/issues/detail?id=881410
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- Since the release of Chrome 69 earlier this week, countless of users have gone on social media and Google Product Forums to complain about "blurry" or "fuzzy" text inside Chrome. ZDNet: The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to reports, the issue only manifests for Chrome 69 users on Windows. Those who rolled back to Chrome 68 stopped having problems. Users said that changing Chrome, operating system, or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night after first user complaints started surfacing online. Some users have also expressed concerns over Chrome not showing "trivial subdomains" including www and secure lock sign in the address bar.
+ Since the [1]release of Chrome 69 earlier this week , countless of users have gone on social media and Google Product Forums to [2]complain about "blurry" or "fuzzy" text inside Chrome . ZDNet:<br/><br/>> The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to reports, the issue only manifests for Chrome 69 users on Windows. Those who rolled back to Chrome 68 stopped having problems. Users said that changing Chrome, operating system, or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night after first user complaints started surfacing online.<br/><br/>Some users have also expressed concerns over Chrome not showing [3]"trivial subdomains" including www and secure lock sign in the address bar.<br/><br/><br/><br/>[1] https://tech.slashdot.org/story/18/09/04/1711250/chrome-69-arrives-with-revamped-design-more-powerful-omnibox-and-better-password-manager<br/><br/>[2] https://www.zdnet.com/article/google-investigating-issue-with-blurry-fonts-on-new-chrome-69/<br/><br/>[3] https://bugs.chromium.org/p/chromium/issues/detail?id=881410
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://www.engadget.com/2018/09/06/eve-online-pearl-abyss-ccp-games/\r
\r
\r
- MAXOMENOS writes: EVE Online developer CCP Games has been\r
- acquired by Pearl Abyss, the South Korean studio behind the\r
- action-oriented MMORPG Black Desert Online. According to\r
- VentureBeat, the deal was worth $425 million and will close in\r
- early October. It's a surprise announcement for CCP, which has\r
- long operated as an independent developer. Eve Online isn't\r
- the biggest MMORPG on the market, but it has maintained a\r
- steady and loyal userbase through continuous updates and a\r
- well-timed switch to a hybrid premium and free-to-play model.\r
- The 15-year-old game is unique, too, with its large-scale\r
- battles and notoriously complex economic and political\r
- systems.\r
+ [1]MAXOMENOS writes:\r
+ \r
+ >\r
+ \r
+ >> EVE Online\r
+ \r
+ > developer CCP Games [2]has been acquired by Pearl Abyss ,\r
+ the South Korean studio behind the action-oriented MMORPG\r
+ Black Desert Online. According to [3]VentureBeat , the deal\r
+ was worth $425 million and will close in early October. It's a\r
+ surprise announcement for CCP, which has long operated as an\r
+ independent developer. Eve Online isn't the biggest MMORPG on\r
+ the market, but it has maintained a steady and loyal userbase\r
+ through continuous updates and a well-timed switch to a hybrid\r
+ premium and free-to-play model. The 15-year-old game is\r
+ unique, too, with its large-scale battles and notoriously\r
+ complex economic and political systems.\r
+ \r
+ \r
+ \r
+ [1] https://slashdot.org/~MAXOMENOS\r
+ \r
+ [2] https://www.ccpgames.com/news/2018/black-desert-online-cre-\r
+ ators-pearl-abyss-to-acquire-ccp-games-makers-of-eve\r
+ \r
+ [3] https://venturebeat.com/2018/09/06/black-desert-online-cre-\r
+ ator-pearl-abyss-acquires-eve-online-maker-ccp-games-for-425-m-\r
+ illion/\r
\r
\r
** RIP Eve (Score:3)\r
i Thursday September 06, 2018 @11:30PM (msmash)\r
i from the in-some-business-news dept.\r
i\r
-i MAXOMENOS writes: EVE Online developer CCP Games has been\r
-i acquired by Pearl Abyss, the South Korean studio behind the\r
-i action-oriented MMORPG Black Desert Online. According to\r
-i VentureBeat, the deal was worth $425 million and will close in\r
-i early October. It's a surprise announcement for CCP, which has\r
-i long operated as an independent developer. Eve Online isn't\r
-i the biggest MMORPG on the market, but it has maintained a\r
-i steady and loyal userbase through continuous updates and a\r
-i well-timed switch to a hybrid premium and free-to-play model.\r
-i The 15-year-old game is unique, too, with its large-scale\r
-i battles and notoriously complex economic and political\r
-i systems.\r
+i [1]MAXOMENOS writes:\r
+i \r
+i >\r
+i \r
+i >> EVE Online\r
+i \r
+i > developer CCP Games [2]has been acquired by Pearl Abyss ,\r
+i the South Korean studio behind the action-oriented MMORPG\r
+i Black Desert Online. According to [3]VentureBeat , the deal\r
+i was worth $425 million and will close in early October. It's a\r
+i surprise announcement for CCP, which has long operated as an\r
+i independent developer. Eve Online isn't the biggest MMORPG on\r
+i the market, but it has maintained a steady and loyal userbase\r
+i through continuous updates and a well-timed switch to a hybrid\r
+i premium and free-to-play model. The 15-year-old game is\r
+i unique, too, with its large-scale battles and notoriously\r
+i complex economic and political systems.\r
+i \r
+i \r
+i \r
+i [1] https://slashdot.org/~MAXOMENOS\r
+i \r
+i [2] https://www.ccpgames.com/news/2018/black-desert-online-cre-\r
+i ators-pearl-abyss-to-acquire-ccp-games-makers-of-eve\r
+i \r
+i [3] https://venturebeat.com/2018/09/06/black-desert-online-cre-\r
+i ator-pearl-abyss-acquires-eve-online-maker-ccp-games-for-425-m-\r
+i illion/\r
i\r
from the in-some-business-news dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- MAXOMENOS writes: EVE Online developer CCP Games has been acquired by Pearl Abyss, the South Korean studio behind the action-oriented MMORPG Black Desert Online. According to VentureBeat, the deal was worth $425 million and will close in early October. It's a surprise announcement for CCP, which has long operated as an independent developer. Eve Online isn't the biggest MMORPG on the market, but it has maintained a steady and loyal userbase through continuous updates and a well-timed switch to a hybrid premium and free-to-play model. The 15-year-old game is unique, too, with its large-scale battles and notoriously complex economic and political systems.
+ [1]MAXOMENOS writes:<br/><br/>><br/><br/>>> EVE Online<br/><br/>> developer CCP Games [2]has been acquired by Pearl Abyss , the South Korean studio behind the action-oriented MMORPG Black Desert Online. According to [3]VentureBeat , the deal was worth $425 million and will close in early October. It's a surprise announcement for CCP, which has long operated as an independent developer. Eve Online isn't the biggest MMORPG on the market, but it has maintained a steady and loyal userbase through continuous updates and a well-timed switch to a hybrid premium and free-to-play model. The 15-year-old game is unique, too, with its large-scale battles and notoriously complex economic and political systems.<br/><br/><br/><br/>[1] https://slashdot.org/~MAXOMENOS<br/><br/>[2] https://www.ccpgames.com/news/2018/black-desert-online-creators-pearl-abyss-to-acquire-ccp-games-makers-of-eve<br/><br/>[3] https://venturebeat.com/2018/09/06/black-desert-online-creator-pearl-abyss-acquires-eve-online-maker-ccp-games-for-425-million/
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- MAXOMENOS writes: EVE Online developer CCP Games has been acquired by Pearl Abyss, the South Korean studio behind the action-oriented MMORPG Black Desert Online. According to VentureBeat, the deal was worth $425 million and will close in early October. It's a surprise announcement for CCP, which has long operated as an independent developer. Eve Online isn't the biggest MMORPG on the market, but it has maintained a steady and loyal userbase through continuous updates and a well-timed switch to a hybrid premium and free-to-play model. The 15-year-old game is unique, too, with its large-scale battles and notoriously complex economic and political systems.
+ [1]MAXOMENOS writes:<br/><br/>><br/><br/>>> EVE Online<br/><br/>> developer CCP Games [2]has been acquired by Pearl Abyss , the South Korean studio behind the action-oriented MMORPG Black Desert Online. According to [3]VentureBeat , the deal was worth $425 million and will close in early October. It's a surprise announcement for CCP, which has long operated as an independent developer. Eve Online isn't the biggest MMORPG on the market, but it has maintained a steady and loyal userbase through continuous updates and a well-timed switch to a hybrid premium and free-to-play model. The 15-year-old game is unique, too, with its large-scale battles and notoriously complex economic and political systems.<br/><br/><br/><br/>[1] https://slashdot.org/~MAXOMENOS<br/><br/>[2] https://www.ccpgames.com/news/2018/black-desert-online-creators-pearl-abyss-to-acquire-ccp-games-makers-of-eve<br/><br/>[3] https://venturebeat.com/2018/09/06/black-desert-online-creator-pearl-abyss-acquires-eve-online-maker-ccp-games-for-425-million/
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
\r
Open .git directories are a bigger cybersecurity problem than\r
many might imagine, at least according to a Czech security\r
- researcher who discovered almost 400,000 web pages with an\r
+ researcher who [1]discovered almost 400,000 web pages with an\r
open .git directory possibly exposing a wide variety of data.\r
- From a report: Vladimir Smitka began his .git directory\r
- odyssey in July when he began looking at Czech websites to\r
- find how many were improperly configured and allow access to\r
- their .git folders within the file versions repository. Open\r
- .git directories are a particularly dangerous issue, he said,\r
- because they can contain a great deal of sensitive\r
- information. "Information about the website's structure, and\r
- sometimes you can get very sensitive data such as database\r
- passwords, API keys, development IDE settings, and so on.\r
- However, this data shouldn't be stored in the repository, but\r
- in previous scans of various security issues, I have found\r
- many developers that do not follow these best practices,"\r
- Smitka wrote. Smitka queried 230 million websites to discover\r
- the 390,000 allowing access to their .git directories. The\r
- vast majority of the websites with open directories had a .com\r
- TLD with .net, .de, .org and uk comprising most of the others.\r
+ From a report:\r
+ \r
+ > Vladimir Smitka began his .git directory odyssey in July\r
+ when he began looking at Czech websites to find how many were\r
+ improperly configured and allow access to their .git folders\r
+ within the file versions repository. Open .git directories are\r
+ a particularly dangerous issue, he said, because they can\r
+ contain a great deal of sensitive information. "Information\r
+ about the website's structure, and sometimes you can get very\r
+ sensitive data such as database passwords, API keys,\r
+ development IDE settings, and so on. However, this data\r
+ shouldn't be stored in the repository, but in previous scans\r
+ of various security issues, I have found many developers that\r
+ do not follow these best practices," Smitka wrote. Smitka\r
+ queried 230 million websites to discover the 390,000 allowing\r
+ access to their .git directories. The vast majority of the\r
+ websites with open directories had a .com TLD with .net, .de,\r
+ .org and uk comprising most of the others.\r
+ \r
+ \r
+ \r
+ [1] https://www.scmagazine.com/home/news/400000-websites-vulne-\r
+ rable-through-exposed-git-directories/\r
\r
\r
** \r
i\r
i Open .git directories are a bigger cybersecurity problem than\r
i many might imagine, at least according to a Czech security\r
-i researcher who discovered almost 400,000 web pages with an\r
+i researcher who [1]discovered almost 400,000 web pages with an\r
i open .git directory possibly exposing a wide variety of data.\r
-i From a report: Vladimir Smitka began his .git directory\r
-i odyssey in July when he began looking at Czech websites to\r
-i find how many were improperly configured and allow access to\r
-i their .git folders within the file versions repository. Open\r
-i .git directories are a particularly dangerous issue, he said,\r
-i because they can contain a great deal of sensitive\r
-i information. "Information about the website's structure, and\r
-i sometimes you can get very sensitive data such as database\r
-i passwords, API keys, development IDE settings, and so on.\r
-i However, this data shouldn't be stored in the repository, but\r
-i in previous scans of various security issues, I have found\r
-i many developers that do not follow these best practices,"\r
-i Smitka wrote. Smitka queried 230 million websites to discover\r
-i the 390,000 allowing access to their .git directories. The\r
-i vast majority of the websites with open directories had a .com\r
-i TLD with .net, .de, .org and uk comprising most of the others.\r
+i From a report:\r
+i \r
+i > Vladimir Smitka began his .git directory odyssey in July\r
+i when he began looking at Czech websites to find how many were\r
+i improperly configured and allow access to their .git folders\r
+i within the file versions repository. Open .git directories are\r
+i a particularly dangerous issue, he said, because they can\r
+i contain a great deal of sensitive information. "Information\r
+i about the website's structure, and sometimes you can get very\r
+i sensitive data such as database passwords, API keys,\r
+i development IDE settings, and so on. However, this data\r
+i shouldn't be stored in the repository, but in previous scans\r
+i of various security issues, I have found many developers that\r
+i do not follow these best practices," Smitka wrote. Smitka\r
+i queried 230 million websites to discover the 390,000 allowing\r
+i access to their .git directories. The vast majority of the\r
+i websites with open directories had a .com TLD with .net, .de,\r
+i .org and uk comprising most of the others.\r
+i \r
+i \r
+i \r
+i [1] https://www.scmagazine.com/home/news/400000-websites-vulne-\r
+i rable-through-exposed-git-directories/\r
i\r
from the security-woes dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report: Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.
+ Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who [1]discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report:<br/><br/>> Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.<br/><br/><br/><br/>[1] https://www.scmagazine.com/home/news/400000-websites-vulnerable-through-exposed-git-directories/
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report: Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.
+ Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who [1]discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report:<br/><br/>> Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.<br/><br/><br/><br/>[1] https://www.scmagazine.com/home/news/400000-websites-vulnerable-through-exposed-git-directories/
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
\r
\r
Andrew Orlowski of The Register recounts all the gadgets\r
- supercharged with AI that he came across at IFA tradeshow last\r
- week -- and wonders what value AI brought to the table. He\r
- writes: I didn't see a blockchain toothbrush at IFA in Berlin\r
- last week, but I'm sure there was one lurking about somewhere.\r
- With 30 vast halls to cover, I didn't look too hard for it.\r
- But I did see many things almost as tragic that no one could\r
- miss -- AI being squeezed into almost every conceivable bit of\r
+ [1]supercharged with AI that he came across at IFA tradeshow\r
+ last week -- and wonders what value AI brought to the table .\r
+ He writes:\r
+ \r
+ > I didn't see a blockchain toothbrush at IFA in Berlin last\r
+ week, but I'm sure there was one lurking about somewhere. With\r
+ 30 vast halls to cover, I didn't look too hard for it. But I\r
+ did see many things almost as tragic that no one could miss --\r
+ AI being squeezed into almost every conceivable bit of\r
consumer electronics. But none were convincing. If ever there\r
was a solution looking for a problem, it's ramming AI into\r
gadgets to show of a company's machine learning prowess. For\r
the consumer it adds unreliability, cost and complexity, and\r
- the annoyance of being prompted. [...] Back to LG, which takes\r
- 2018's prize for sticking AI into a superfluous gadget. The\r
- centrepiece of its AI efforts this year is a robot, ClOi. Put\r
- Google Assistant or Alexa on wheels, and you have ClOi. I\r
- asked the booth person what exactly ClOi could do to be told\r
- "it can take notes for your shopping list." Why wasn't this\r
- miracle of the Fourth Industrial Revolution let loose on the\r
- LG floor? I wondered -- a question answered by this account of\r
- ClOi's debut at CES in January. Clearly things haven't\r
- improved much -- this robot buddy was kept indoors.\r
+ the annoyance of being prompted.\r
+ \r
+ >\r
+ \r
+ > [...] Back to LG, which takes 2018's prize for sticking AI\r
+ into a superfluous gadget. The centrepiece of its AI efforts\r
+ this year is a robot, ClOi. Put Google Assistant or Alexa on\r
+ wheels, and you have ClOi. I asked the booth person what\r
+ exactly ClOi could do to be told "it can take notes for your\r
+ shopping list." Why wasn't this miracle of the Fourth\r
+ Industrial Revolution let loose on the LG floor? I wondered --\r
+ a question answered by this account of ClOi's debut at CES in\r
+ January. Clearly things haven't improved much -- this robot\r
+ buddy was kept indoors.\r
+ \r
+ \r
+ \r
+ [1] https://www.theregister.co.uk/2018/09/05/consumer_ai_ifa_2-\r
+ 018_roundup/\r
\r
\r
** Stupid industry fads (Score:5, Funny)\r
i from the there-is-no-spoon dept.\r
i\r
i Andrew Orlowski of The Register recounts all the gadgets\r
-i supercharged with AI that he came across at IFA tradeshow last\r
-i week -- and wonders what value AI brought to the table. He\r
-i writes: I didn't see a blockchain toothbrush at IFA in Berlin\r
-i last week, but I'm sure there was one lurking about somewhere.\r
-i With 30 vast halls to cover, I didn't look too hard for it.\r
-i But I did see many things almost as tragic that no one could\r
-i miss -- AI being squeezed into almost every conceivable bit of\r
+i [1]supercharged with AI that he came across at IFA tradeshow\r
+i last week -- and wonders what value AI brought to the table .\r
+i He writes:\r
+i \r
+i > I didn't see a blockchain toothbrush at IFA in Berlin last\r
+i week, but I'm sure there was one lurking about somewhere. With\r
+i 30 vast halls to cover, I didn't look too hard for it. But I\r
+i did see many things almost as tragic that no one could miss --\r
+i AI being squeezed into almost every conceivable bit of\r
i consumer electronics. But none were convincing. If ever there\r
i was a solution looking for a problem, it's ramming AI into\r
i gadgets to show of a company's machine learning prowess. For\r
i the consumer it adds unreliability, cost and complexity, and\r
-i the annoyance of being prompted. [...] Back to LG, which takes\r
-i 2018's prize for sticking AI into a superfluous gadget. The\r
-i centrepiece of its AI efforts this year is a robot, ClOi. Put\r
-i Google Assistant or Alexa on wheels, and you have ClOi. I\r
-i asked the booth person what exactly ClOi could do to be told\r
-i "it can take notes for your shopping list." Why wasn't this\r
-i miracle of the Fourth Industrial Revolution let loose on the\r
-i LG floor? I wondered -- a question answered by this account of\r
-i ClOi's debut at CES in January. Clearly things haven't\r
-i improved much -- this robot buddy was kept indoors.\r
+i the annoyance of being prompted.\r
+i \r
+i >\r
+i \r
+i > [...] Back to LG, which takes 2018's prize for sticking AI\r
+i into a superfluous gadget. The centrepiece of its AI efforts\r
+i this year is a robot, ClOi. Put Google Assistant or Alexa on\r
+i wheels, and you have ClOi. I asked the booth person what\r
+i exactly ClOi could do to be told "it can take notes for your\r
+i shopping list." Why wasn't this miracle of the Fourth\r
+i Industrial Revolution let loose on the LG floor? I wondered --\r
+i a question answered by this account of ClOi's debut at CES in\r
+i January. Clearly things haven't improved much -- this robot\r
+i buddy was kept indoors.\r
+i \r
+i \r
+i \r
+i [1] https://www.theregister.co.uk/2018/09/05/consumer_ai_ifa_2-\r
+i 018_roundup/\r
i\r
from the there-is-no-spoon dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- Andrew Orlowski of The Register recounts all the gadgets supercharged with AI that he came across at IFA tradeshow last week -- and wonders what value AI brought to the table. He writes: I didn't see a blockchain toothbrush at IFA in Berlin last week, but I'm sure there was one lurking about somewhere. With 30 vast halls to cover, I didn't look too hard for it. But I did see many things almost as tragic that no one could miss -- AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and the annoyance of being prompted. [...] Back to LG, which takes 2018's prize for sticking AI into a superfluous gadget. The centrepiece of its AI efforts this year is a robot, ClOi. Put Google Assistant or Alexa on wheels, and you have ClOi. I asked the booth person what exactly ClOi could do to be told "it can take notes for your shopping list." Why wasn't this miracle of the Fourth Industrial Revolution let loose on the LG floor? I wondered -- a question answered by this account of ClOi's debut at CES in January. Clearly things haven't improved much -- this robot buddy was kept indoors.
+ Andrew Orlowski of The Register recounts all the gadgets [1]supercharged with AI that he came across at IFA tradeshow last week -- and wonders what value AI brought to the table . He writes:<br/><br/>> I didn't see a blockchain toothbrush at IFA in Berlin last week, but I'm sure there was one lurking about somewhere. With 30 vast halls to cover, I didn't look too hard for it. But I did see many things almost as tragic that no one could miss -- AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and the annoyance of being prompted.<br/><br/>><br/><br/>> [...] Back to LG, which takes 2018's prize for sticking AI into a superfluous gadget. The centrepiece of its AI efforts this year is a robot, ClOi. Put Google Assistant or Alexa on wheels, and you have ClOi. I asked the booth person what exactly ClOi could do to be told "it can take notes for your shopping list." Why wasn't this miracle of the Fourth Industrial Revolution let loose on the LG floor? I wondered -- a question answered by this account of ClOi's debut at CES in January. Clearly things haven't improved much -- this robot buddy was kept indoors.<br/><br/><br/><br/>[1] https://www.theregister.co.uk/2018/09/05/consumer_ai_ifa_2018_roundup/
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- Andrew Orlowski of The Register recounts all the gadgets supercharged with AI that he came across at IFA tradeshow last week -- and wonders what value AI brought to the table. He writes: I didn't see a blockchain toothbrush at IFA in Berlin last week, but I'm sure there was one lurking about somewhere. With 30 vast halls to cover, I didn't look too hard for it. But I did see many things almost as tragic that no one could miss -- AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and the annoyance of being prompted. [...] Back to LG, which takes 2018's prize for sticking AI into a superfluous gadget. The centrepiece of its AI efforts this year is a robot, ClOi. Put Google Assistant or Alexa on wheels, and you have ClOi. I asked the booth person what exactly ClOi could do to be told "it can take notes for your shopping list." Why wasn't this miracle of the Fourth Industrial Revolution let loose on the LG floor? I wondered -- a question answered by this account of ClOi's debut at CES in January. Clearly things haven't improved much -- this robot buddy was kept indoors.
+ Andrew Orlowski of The Register recounts all the gadgets [1]supercharged with AI that he came across at IFA tradeshow last week -- and wonders what value AI brought to the table . He writes:<br/><br/>> I didn't see a blockchain toothbrush at IFA in Berlin last week, but I'm sure there was one lurking about somewhere. With 30 vast halls to cover, I didn't look too hard for it. But I did see many things almost as tragic that no one could miss -- AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and the annoyance of being prompted.<br/><br/>><br/><br/>> [...] Back to LG, which takes 2018's prize for sticking AI into a superfluous gadget. The centrepiece of its AI efforts this year is a robot, ClOi. Put Google Assistant or Alexa on wheels, and you have ClOi. I asked the booth person what exactly ClOi could do to be told "it can take notes for your shopping list." Why wasn't this miracle of the Fourth Industrial Revolution let loose on the LG floor? I wondered -- a question answered by this account of ClOi's debut at CES in January. Clearly things haven't improved much -- this robot buddy was kept indoors.<br/><br/><br/><br/>[1] https://www.theregister.co.uk/2018/09/05/consumer_ai_ifa_2018_roundup/
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://www.cnbc.com/2018/09/06/companies-worry-more-about-access-to-software-developers-than-capital.html\r
\r
\r
- An anonymous reader quotes a report from CNBC: As our global\r
- economy increasingly comes to run on technology-enabled rails\r
- and every company becomes a tech company, demand for\r
- high-quality software engineers is at an all-time high. A\r
- recent study from Stripe and Harris Poll found that 61 percent\r
- of C-suite executives believe access to developer talent is a\r
- threat to the success of their business. Perhaps more\r
- surprisingly -- as we mark a decade after the financial crisis\r
- -- this threat was even ranked above capital constraints. And\r
- yet, despite being many corporations' most precious resource,\r
- developer talents are all too often squandered. Collectively,\r
- companies today lose upward of $300 billion a year paying down\r
- "technical debt," as developers pour time into maintaining\r
- legacy systems or dealing with the ramifications of bad\r
- software. This is especially worrisome, given the outsized\r
- impact developers have on companies' chances of success.\r
- Software developers don't have a monopoly on good ideas, but\r
- their skill set makes them a uniquely deep source of\r
- innovation, productivity and new economic connections. When\r
- deployed correctly, developers can be economic multipliers --\r
- coefficients that dramatically ratchet up the output of the\r
- teams and companies of which they're a part.\r
+ An anonymous reader quotes a report from CNBC:\r
+ \r
+ > As our global economy increasingly comes to run on\r
+ technology-enabled rails and every company becomes a tech\r
+ company, demand for high-quality software engineers is at an\r
+ all-time high. A recent study from [1]Stripe and Harris Poll\r
+ found that 61 percent of C-suite executives believe access to\r
+ developer talent is a threat to the success of their business.\r
+ Perhaps more surprisingly -- as we mark a decade after the\r
+ financial crisis -- [2]this threat was even ranked above\r
+ capital constraints . And yet, despite being many\r
+ corporations' most precious resource, developer talents are\r
+ all too often squandered. Collectively, companies today lose\r
+ upward of $300 billion a year paying down "technical debt," as\r
+ developers pour time into maintaining legacy systems or\r
+ dealing with the ramifications of bad software. This is\r
+ especially worrisome, given the outsized impact developers\r
+ have on companies' chances of success. Software developers\r
+ don't have a monopoly on good ideas, but their skill set makes\r
+ them a uniquely deep source of innovation, productivity and\r
+ new economic connections. When deployed correctly, developers\r
+ can be economic multipliers -- coefficients that dramatically\r
+ ratchet up the output of the teams and companies of which\r
+ they're a part.\r
+ \r
+ \r
+ \r
+ [1] https://stripe.com/reports/developer-coefficient-2018\r
+ \r
+ [2] https://www.cnbc.com/2018/09/06/companies-worry-more-about-\r
+ access-to-software-developers-than-capital.html\r
\r
\r
** So why not treat them well? (Score:5, Insightful)\r
i Thursday September 06, 2018 @11:30PM (BeauHD)\r
i from the new-breed-of-corporate-leaders dept.\r
i\r
-i An anonymous reader quotes a report from CNBC: As our global\r
-i economy increasingly comes to run on technology-enabled rails\r
-i and every company becomes a tech company, demand for\r
-i high-quality software engineers is at an all-time high. A\r
-i recent study from Stripe and Harris Poll found that 61 percent\r
-i of C-suite executives believe access to developer talent is a\r
-i threat to the success of their business. Perhaps more\r
-i surprisingly -- as we mark a decade after the financial crisis\r
-i -- this threat was even ranked above capital constraints. And\r
-i yet, despite being many corporations' most precious resource,\r
-i developer talents are all too often squandered. Collectively,\r
-i companies today lose upward of $300 billion a year paying down\r
-i "technical debt," as developers pour time into maintaining\r
-i legacy systems or dealing with the ramifications of bad\r
-i software. This is especially worrisome, given the outsized\r
-i impact developers have on companies' chances of success.\r
-i Software developers don't have a monopoly on good ideas, but\r
-i their skill set makes them a uniquely deep source of\r
-i innovation, productivity and new economic connections. When\r
-i deployed correctly, developers can be economic multipliers --\r
-i coefficients that dramatically ratchet up the output of the\r
-i teams and companies of which they're a part.\r
+i An anonymous reader quotes a report from CNBC:\r
+i \r
+i > As our global economy increasingly comes to run on\r
+i technology-enabled rails and every company becomes a tech\r
+i company, demand for high-quality software engineers is at an\r
+i all-time high. A recent study from [1]Stripe and Harris Poll\r
+i found that 61 percent of C-suite executives believe access to\r
+i developer talent is a threat to the success of their business.\r
+i Perhaps more surprisingly -- as we mark a decade after the\r
+i financial crisis -- [2]this threat was even ranked above\r
+i capital constraints . And yet, despite being many\r
+i corporations' most precious resource, developer talents are\r
+i all too often squandered. Collectively, companies today lose\r
+i upward of $300 billion a year paying down "technical debt," as\r
+i developers pour time into maintaining legacy systems or\r
+i dealing with the ramifications of bad software. This is\r
+i especially worrisome, given the outsized impact developers\r
+i have on companies' chances of success. Software developers\r
+i don't have a monopoly on good ideas, but their skill set makes\r
+i them a uniquely deep source of innovation, productivity and\r
+i new economic connections. When deployed correctly, developers\r
+i can be economic multipliers -- coefficients that dramatically\r
+i ratchet up the output of the teams and companies of which\r
+i they're a part.\r
+i \r
+i \r
+i \r
+i [1] https://stripe.com/reports/developer-coefficient-2018\r
+i \r
+i [2] https://www.cnbc.com/2018/09/06/companies-worry-more-about-\r
+i access-to-software-developers-than-capital.html\r
i\r
from the new-breed-of-corporate-leaders dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- An anonymous reader quotes a report from CNBC: As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- this threat was even ranked above capital constraints. And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software. This is especially worrisome, given the outsized impact developers have on companies' chances of success. Software developers don't have a monopoly on good ideas, but their skill set makes them a uniquely deep source of innovation, productivity and new economic connections. When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part.
+ An anonymous reader quotes a report from CNBC:<br/><br/>> As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from [1]Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- [2]this threat was even ranked above capital constraints . And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software. This is especially worrisome, given the outsized impact developers have on companies' chances of success. Software developers don't have a monopoly on good ideas, but their skill set makes them a uniquely deep source of innovation, productivity and new economic connections. When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part.<br/><br/><br/><br/>[1] https://stripe.com/reports/developer-coefficient-2018<br/><br/>[2] https://www.cnbc.com/2018/09/06/companies-worry-more-about-access-to-software-developers-than-capital.html
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- An anonymous reader quotes a report from CNBC: As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- this threat was even ranked above capital constraints. And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software. This is especially worrisome, given the outsized impact developers have on companies' chances of success. Software developers don't have a monopoly on good ideas, but their skill set makes them a uniquely deep source of innovation, productivity and new economic connections. When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part.
+ An anonymous reader quotes a report from CNBC:<br/><br/>> As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from [1]Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- [2]this threat was even ranked above capital constraints . And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software. This is especially worrisome, given the outsized impact developers have on companies' chances of success. Software developers don't have a monopoly on good ideas, but their skill set makes them a uniquely deep source of innovation, productivity and new economic connections. When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part.<br/><br/><br/><br/>[1] https://stripe.com/reports/developer-coefficient-2018<br/><br/>[2] https://www.cnbc.com/2018/09/06/companies-worry-more-about-access-to-software-developers-than-capital.html
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-regulation-interview-curse-of-bigness-antitrust\r
\r
\r
- pgmrdlm shares a report from The Verge: Best known for coining\r
- the phrase "net neutrality" and his book The Master Switch:\r
- The Rise and Fall of Information Empires, Wu has a new book\r
- coming out in November called The Curse of Bigness: Antitrust\r
- in the New Gilded Age. In it, he argues compellingly for a\r
- return to aggressive antitrust enforcement in the style of\r
- Teddy Roosevelt, saying that Google, Facebook, Amazon, and\r
- other huge tech companies are a threat to democracy as they\r
- get bigger and bigger. "We live in America, which has a strong\r
- and proud tradition of breaking up companies that are too big\r
- for inefficient reasons," Wu told me on this week's Vergecast.\r
- "We need to reverse this idea that it's not an American\r
- tradition. We've broken up dozens of companies." "I think if\r
- you took a hard look at the acquisition of WhatsApp and\r
- Instagram, the argument that the effects of those acquisitions\r
- have been anticompetitive would be easy to prove for a number\r
- of reasons," says Wu. And breaking up the company wouldn't be\r
- hard, he says. "What would be the harm? You'll have three\r
- competitors. It's not 'Oh my god, if you get rid of WhatsApp\r
- and Instagram, well then the whole world's going to fall\r
- apart.' It would be like 'Okay, now you have some companies\r
- actually trying to offer you an alternative to Facebook.'"\r
- Breaking up Facebook (and other huge tech companies like\r
- Google and Amazon) could be simple under the current law,\r
- suggests Wu. But it could also lead to a major rethinking of\r
- how antitrust law should work in a world where the giant\r
- platform companies give their products away for free, and the\r
- ability for the government to restrict corporate power seems\r
- to be diminishing by the day. And it demands that we all think\r
- seriously about the conditions that create innovation. "I\r
- think everyone's steering way away from the monopolies, and I\r
- think it's hurting innovation in the tech sector," says Wu.\r
+ [1]pgmrdlm shares a report from The Verge:\r
+ \r
+ > Best known for coining the phrase "net neutrality" and his\r
+ book The Master Switch: The Rise and Fall of Information\r
+ Empires, Wu has a new book coming out in November called\r
+ [2]The Curse of Bigness: Antitrust in the New Gilded Age . In\r
+ it, he argues compellingly for a return to aggressive\r
+ antitrust enforcement in the style of Teddy Roosevelt, saying\r
+ that Google, Facebook, Amazon, and other huge tech companies\r
+ [3]are a threat to democracy as they get bigger and bigger .\r
+ "We live in America, which has a strong and proud tradition of\r
+ breaking up companies that are too big for inefficient\r
+ reasons," Wu told me on this week's Vergecast. "We need to\r
+ reverse this idea that it's not an American tradition. We've\r
+ broken up dozens of companies."\r
+ \r
+ >\r
+ \r
+ > "I think if you took a hard look at the acquisition of\r
+ WhatsApp and Instagram, the argument that the effects of those\r
+ acquisitions have been anticompetitive would be easy to prove\r
+ for a number of reasons," says Wu. And breaking up the company\r
+ wouldn't be hard, he says. "What would be the harm? You'll\r
+ have three competitors. It's not 'Oh my god, if you get rid of\r
+ WhatsApp and Instagram, well then the whole world's going to\r
+ fall apart.' It would be like 'Okay, now you have some\r
+ companies actually trying to offer you an alternative to\r
+ Facebook.'" Breaking up Facebook (and other huge tech\r
+ companies like Google and Amazon) could be simple under the\r
+ current law, suggests Wu. But it could also lead to a major\r
+ rethinking of how antitrust law should work in a world where\r
+ the giant platform companies give their products away for\r
+ free, and the ability for the government to restrict corporate\r
+ power seems to be diminishing by the day. And it demands that\r
+ we all think seriously about the conditions that create\r
+ innovation. "I think everyone's steering way away from the\r
+ monopolies, and I think it's hurting innovation in the tech\r
+ sector," says Wu.\r
+ \r
+ \r
+ \r
+ [1] https://slashdot.org/~pgmrdlm\r
+ \r
+ [2] https://www.amazon.com/Curse-Bigness-Antitrust-New-Gilded/-\r
+ dp/0999745468\r
+ \r
+ [3] https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-\r
+ regulation-interview-curse-of-bigness-antitrust\r
\r
\r
** Safe Harbor (Score:5, Interesting)\r
i Thursday September 06, 2018 @11:30PM (BeauHD)\r
i from the easier-said-than-done dept.\r
i\r
-i pgmrdlm shares a report from The Verge: Best known for coining\r
-i the phrase "net neutrality" and his book The Master Switch:\r
-i The Rise and Fall of Information Empires, Wu has a new book\r
-i coming out in November called The Curse of Bigness: Antitrust\r
-i in the New Gilded Age. In it, he argues compellingly for a\r
-i return to aggressive antitrust enforcement in the style of\r
-i Teddy Roosevelt, saying that Google, Facebook, Amazon, and\r
-i other huge tech companies are a threat to democracy as they\r
-i get bigger and bigger. "We live in America, which has a strong\r
-i and proud tradition of breaking up companies that are too big\r
-i for inefficient reasons," Wu told me on this week's Vergecast.\r
-i "We need to reverse this idea that it's not an American\r
-i tradition. We've broken up dozens of companies." "I think if\r
-i you took a hard look at the acquisition of WhatsApp and\r
-i Instagram, the argument that the effects of those acquisitions\r
-i have been anticompetitive would be easy to prove for a number\r
-i of reasons," says Wu. And breaking up the company wouldn't be\r
-i hard, he says. "What would be the harm? You'll have three\r
-i competitors. It's not 'Oh my god, if you get rid of WhatsApp\r
-i and Instagram, well then the whole world's going to fall\r
-i apart.' It would be like 'Okay, now you have some companies\r
-i actually trying to offer you an alternative to Facebook.'"\r
-i Breaking up Facebook (and other huge tech companies like\r
-i Google and Amazon) could be simple under the current law,\r
-i suggests Wu. But it could also lead to a major rethinking of\r
-i how antitrust law should work in a world where the giant\r
-i platform companies give their products away for free, and the\r
-i ability for the government to restrict corporate power seems\r
-i to be diminishing by the day. And it demands that we all think\r
-i seriously about the conditions that create innovation. "I\r
-i think everyone's steering way away from the monopolies, and I\r
-i think it's hurting innovation in the tech sector," says Wu.\r
+i [1]pgmrdlm shares a report from The Verge:\r
+i \r
+i > Best known for coining the phrase "net neutrality" and his\r
+i book The Master Switch: The Rise and Fall of Information\r
+i Empires, Wu has a new book coming out in November called\r
+i [2]The Curse of Bigness: Antitrust in the New Gilded Age . In\r
+i it, he argues compellingly for a return to aggressive\r
+i antitrust enforcement in the style of Teddy Roosevelt, saying\r
+i that Google, Facebook, Amazon, and other huge tech companies\r
+i [3]are a threat to democracy as they get bigger and bigger .\r
+i "We live in America, which has a strong and proud tradition of\r
+i breaking up companies that are too big for inefficient\r
+i reasons," Wu told me on this week's Vergecast. "We need to\r
+i reverse this idea that it's not an American tradition. We've\r
+i broken up dozens of companies."\r
+i \r
+i >\r
+i \r
+i > "I think if you took a hard look at the acquisition of\r
+i WhatsApp and Instagram, the argument that the effects of those\r
+i acquisitions have been anticompetitive would be easy to prove\r
+i for a number of reasons," says Wu. And breaking up the company\r
+i wouldn't be hard, he says. "What would be the harm? You'll\r
+i have three competitors. It's not 'Oh my god, if you get rid of\r
+i WhatsApp and Instagram, well then the whole world's going to\r
+i fall apart.' It would be like 'Okay, now you have some\r
+i companies actually trying to offer you an alternative to\r
+i Facebook.'" Breaking up Facebook (and other huge tech\r
+i companies like Google and Amazon) could be simple under the\r
+i current law, suggests Wu. But it could also lead to a major\r
+i rethinking of how antitrust law should work in a world where\r
+i the giant platform companies give their products away for\r
+i free, and the ability for the government to restrict corporate\r
+i power seems to be diminishing by the day. And it demands that\r
+i we all think seriously about the conditions that create\r
+i innovation. "I think everyone's steering way away from the\r
+i monopolies, and I think it's hurting innovation in the tech\r
+i sector," says Wu.\r
+i \r
+i \r
+i \r
+i [1] https://slashdot.org/~pgmrdlm\r
+i \r
+i [2] https://www.amazon.com/Curse-Bigness-Antitrust-New-Gilded/-\r
+i dp/0999745468\r
+i \r
+i [3] https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-\r
+i regulation-interview-curse-of-bigness-antitrust\r
i\r
from the easier-said-than-done dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- pgmrdlm shares a report from The Verge: Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called The Curse of Bigness: Antitrust in the New Gilded Age. In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies are a threat to democracy as they get bigger and bigger. "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies." "I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu.
+ [1]pgmrdlm shares a report from The Verge:<br/><br/>> Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called [2]The Curse of Bigness: Antitrust in the New Gilded Age . In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies [3]are a threat to democracy as they get bigger and bigger . "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies."<br/><br/>><br/><br/>> "I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu.<br/><br/><br/><br/>[1] https://slashdot.org/~pgmrdlm<br/><br/>[2] https://www.amazon.com/Curse-Bigness-Antitrust-New-Gilded/dp/0999745468<br/><br/>[3] https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-regulation-interview-curse-of-bigness-antitrust
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- pgmrdlm shares a report from The Verge: Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called The Curse of Bigness: Antitrust in the New Gilded Age. In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies are a threat to democracy as they get bigger and bigger. "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies." "I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu.
+ [1]pgmrdlm shares a report from The Verge:<br/><br/>> Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called [2]The Curse of Bigness: Antitrust in the New Gilded Age . In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies [3]are a threat to democracy as they get bigger and bigger . "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies."<br/><br/>><br/><br/>> "I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu.<br/><br/><br/><br/>[1] https://slashdot.org/~pgmrdlm<br/><br/>[2] https://www.amazon.com/Curse-Bigness-Antitrust-New-Gilded/dp/0999745468<br/><br/>[3] https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-regulation-interview-curse-of-bigness-antitrust
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
\r
\r
A 28-year-old MIT graduate named You Wu spent six years\r
- developing a low-cost robot designed to find leaks in pipes\r
- early, both to save water and to avoid bigger damage later\r
+ [1]developing a low-cost robot designed to find leaks in pipes\r
+ early , both to save water and to avoid bigger damage later\r
from bursting water mains. "Called Lighthouse, the robot looks\r
like a badminton birdie," reports Fast Company. "A soft\r
'skirt' on the device is covered with sensors. As it travels\r
through pipes, propelled by the flowing water, suction tugs at\r
the device when there's a leak, and it records the location,\r
- making a map of critical leaks to fix." From the report: MIT\r
- doctoral student You Wu spent six years developing the design,\r
- building on research that earlier students began under a\r
- project sponsored by a university in Saudi Arabia, where most\r
- drinking water comes from expensive desalination plants and\r
- around a third of it is lost to leaks. It took three years\r
+ making a map of critical leaks to fix." From the report:\r
+ \r
+ > MIT doctoral student You Wu spent six years developing the\r
+ design, building on research that earlier students began under\r
+ a project sponsored by a university in Saudi Arabia, where\r
+ most drinking water comes from expensive desalination plants\r
+ and around a third of it is lost to leaks. It took three years\r
before he had a working prototype. Then Wu got inspiration\r
from an unexpected source: At a party with his partner, he\r
accidentally stepped on her dress. She noticed immediately,\r
skirt-like design on a robot so that the robot could detect\r
subtle tugs from the suction at each leak. Wu graduated from\r
MIT in June, and is now launching the technology through a\r
- startup called WatchTower Robotics. The company will soon\r
+ startup called [2]WatchTower Robotics . The company will soon\r
begin pilots in Australia and in Cambridge, Massachusetts. One\r
challenge now, he says, is creating a guide so water companies\r
can use the device on their own.\r
+ \r
+ \r
+ \r
+ [1] https://www.fastcompany.com/90232363/this-leak-seeking-rob-\r
+ ot-just-won-the-u-s-james-dyson-award\r
+ \r
+ [2] http://watchtowerrobotics.com/\r
\r
\r
** What we are not told ... (Score:1)\r
i from the leak-detecting dept.\r
i\r
i A 28-year-old MIT graduate named You Wu spent six years\r
-i developing a low-cost robot designed to find leaks in pipes\r
-i early, both to save water and to avoid bigger damage later\r
+i [1]developing a low-cost robot designed to find leaks in pipes\r
+i early , both to save water and to avoid bigger damage later\r
i from bursting water mains. "Called Lighthouse, the robot looks\r
i like a badminton birdie," reports Fast Company. "A soft\r
i 'skirt' on the device is covered with sensors. As it travels\r
i through pipes, propelled by the flowing water, suction tugs at\r
i the device when there's a leak, and it records the location,\r
-i making a map of critical leaks to fix." From the report: MIT\r
-i doctoral student You Wu spent six years developing the design,\r
-i building on research that earlier students began under a\r
-i project sponsored by a university in Saudi Arabia, where most\r
-i drinking water comes from expensive desalination plants and\r
-i around a third of it is lost to leaks. It took three years\r
+i making a map of critical leaks to fix." From the report:\r
+i \r
+i > MIT doctoral student You Wu spent six years developing the\r
+i design, building on research that earlier students began under\r
+i a project sponsored by a university in Saudi Arabia, where\r
+i most drinking water comes from expensive desalination plants\r
+i and around a third of it is lost to leaks. It took three years\r
i before he had a working prototype. Then Wu got inspiration\r
i from an unexpected source: At a party with his partner, he\r
i accidentally stepped on her dress. She noticed immediately,\r
i skirt-like design on a robot so that the robot could detect\r
i subtle tugs from the suction at each leak. Wu graduated from\r
i MIT in June, and is now launching the technology through a\r
-i startup called WatchTower Robotics. The company will soon\r
+i startup called [2]WatchTower Robotics . The company will soon\r
i begin pilots in Australia and in Cambridge, Massachusetts. One\r
i challenge now, he says, is creating a guide so water companies\r
i can use the device on their own.\r
+i \r
+i \r
+i \r
+i [1] https://www.fastcompany.com/90232363/this-leak-seeking-rob-\r
+i ot-just-won-the-u-s-james-dyson-award\r
+i \r
+i [2] http://watchtowerrobotics.com/\r
i\r
from the leak-detecting dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- A 28-year-old MIT graduate named You Wu spent six years developing a low-cost robot designed to find leaks in pipes early, both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report: MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called WatchTower Robotics. The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own.
+ A 28-year-old MIT graduate named You Wu spent six years [1]developing a low-cost robot designed to find leaks in pipes early , both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report:<br/><br/>> MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called [2]WatchTower Robotics . The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own.<br/><br/><br/><br/>[1] https://www.fastcompany.com/90232363/this-leak-seeking-robot-just-won-the-u-s-james-dyson-award<br/><br/>[2] http://watchtowerrobotics.com/
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- A 28-year-old MIT graduate named You Wu spent six years developing a low-cost robot designed to find leaks in pipes early, both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report: MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called WatchTower Robotics. The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own.
+ A 28-year-old MIT graduate named You Wu spent six years [1]developing a low-cost robot designed to find leaks in pipes early , both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report:<br/><br/>> MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called [2]WatchTower Robotics . The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own.<br/><br/><br/><br/>[1] https://www.fastcompany.com/90232363/this-leak-seeking-robot-just-won-the-u-s-james-dyson-award<br/><br/>[2] http://watchtowerrobotics.com/
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
\r
\r
The National Academies Press has released a 156-page report,\r
- called "Securing the Vote: Protecting American Democracy,"\r
- concluding that blockchains are not safe for the U.S. election\r
- system. "While the notion of using a blockchain as an\r
+ called " [1]Securing the Vote: Protecting American Democracy\r
+ ," concluding that blockchains are not safe for the U.S.\r
+ election system. "While the notion of using a blockchain as an\r
immutable ballot box may seem promising, blockchain technology\r
does little to solve the fundamental security issues of\r
elections, and indeed, blockchains introduce additional\r
- security vulnerabilities," the report states. "In particular,\r
- if malware on a voter's device alters a vote before it ever\r
- reaches a blockchain, the immutability of the blockchain fails\r
- to provide the desired integrity, and the voter may never know\r
- of the alteration." The report goes on to say that\r
- "Blockchains do not provide the anonymity often ascribed to\r
- them." It continues: "In the particular context of elections,\r
- voters need to be authorized as eligible to vote and as not\r
- having cast more than one ballot in the particular election.\r
- Blockchains do not offer means for providing the necessary\r
- authorization. [...] If a blockchain is used, then cast\r
- ballots must be encrypted or otherwise anonymized to prevent\r
- coercion and vote-selling." The New York Times summarizes the\r
- findings: The cautiously worded report calls for conducting\r
- all federal, state and local elections on paper ballots by\r
- 2020. Its other top recommendation would require nationwide\r
- use of a specific form of routine postelection audit to ensure\r
- votes have been accurately counted. The panel did not offer a\r
- price tag for its recommended overhaul. New York University's\r
+ security vulnerabilities," the report [2]states . "In\r
+ particular, if malware on a voter's device alters a vote\r
+ before it ever reaches a blockchain, the immutability of the\r
+ blockchain fails to provide the desired integrity, and the\r
+ voter may never know of the alteration."\r
+ \r
+ The report goes on to say that "Blockchains do not provide the\r
+ anonymity often ascribed to them." It continues: "In the\r
+ particular context of elections, voters need to be authorized\r
+ as eligible to vote and as not having cast more than one\r
+ ballot in the particular election. Blockchains do not offer\r
+ means for providing the necessary authorization. [...] If a\r
+ blockchain is used, then cast ballots must be encrypted or\r
+ otherwise anonymized to prevent coercion and vote-selling."\r
+ The New York Times summarizes the findings:\r
+ \r
+ > The cautiously worded report [3]calls for conducting all\r
+ federal, state and local elections on paper ballots by 2020 .\r
+ Its other top recommendation would require nationwide use of a\r
+ specific form of routine postelection audit to ensure votes\r
+ have been accurately counted. The panel did not offer a price\r
+ tag for its recommended overhaul. New York University's\r
Brennan Center has estimated that replacing aging voting\r
machines over the next few years could cost well over $1\r
billion. The 156-page report [...] bemoans a rickety system\r
compromised by insecure voting equipment and software whose\r
vulnerabilities were exposed more than a decade ago and which\r
are too often managed by officials with little training in\r
- cybersecurity. Among its specific recommendations was a\r
- mainstay of election reformers: All elections should use\r
- human-readable paper ballots by 2020. Such systems are\r
- intended to assure voters that their vote was recorded\r
- accurately. They also create a lasting record of "voter\r
- intent" that can be used for reliable recounts, which may not\r
- be possible in systems that record votes electronically. [...]\r
- The panel also calls for all states to adopt a type of\r
- post-election audit that employs statistical analysis of\r
- ballots prior to results certification. Such "risk-limiting"\r
- audits are designed to uncover miscounts and vote tampering.\r
- Currently only three states mandate them.\r
+ cybersecurity.\r
+ \r
+ >\r
+ \r
+ > Among its specific recommendations was a mainstay of\r
+ election reformers: All elections should use human-readable\r
+ paper ballots by 2020. Such systems are intended to assure\r
+ voters that their vote was recorded accurately. They also\r
+ create a lasting record of "voter intent" that can be used for\r
+ reliable recounts, which may not be possible in systems that\r
+ record votes electronically. [...] The panel also calls for\r
+ all states to adopt a type of post-election audit that employs\r
+ statistical analysis of ballots prior to results\r
+ certification. Such "risk-limiting" audits are designed to\r
+ uncover miscounts and vote tampering. Currently only three\r
+ states mandate them.\r
+ \r
+ \r
+ \r
+ [1] https://www.nap.edu/catalog/25120/securing-the-vote-protec-\r
+ ting-american-democracy\r
+ \r
+ [2] https://www.nap.edu/read/25120/chapter/7#103\r
+ \r
+ [3] https://www.nytimes.com/aponline/2018/09/06/technology/ap-\r
+ us-tec-election-security-reform-report.html\r
\r
\r
** \r
i from the ensuring-the-integrity-of-elections dept.\r
i\r
i The National Academies Press has released a 156-page report,\r
-i called "Securing the Vote: Protecting American Democracy,"\r
-i concluding that blockchains are not safe for the U.S. election\r
-i system. "While the notion of using a blockchain as an\r
+i called " [1]Securing the Vote: Protecting American Democracy\r
+i ," concluding that blockchains are not safe for the U.S.\r
+i election system. "While the notion of using a blockchain as an\r
i immutable ballot box may seem promising, blockchain technology\r
i does little to solve the fundamental security issues of\r
i elections, and indeed, blockchains introduce additional\r
-i security vulnerabilities," the report states. "In particular,\r
-i if malware on a voter's device alters a vote before it ever\r
-i reaches a blockchain, the immutability of the blockchain fails\r
-i to provide the desired integrity, and the voter may never know\r
-i of the alteration." The report goes on to say that\r
-i "Blockchains do not provide the anonymity often ascribed to\r
-i them." It continues: "In the particular context of elections,\r
-i voters need to be authorized as eligible to vote and as not\r
-i having cast more than one ballot in the particular election.\r
-i Blockchains do not offer means for providing the necessary\r
-i authorization. [...] If a blockchain is used, then cast\r
-i ballots must be encrypted or otherwise anonymized to prevent\r
-i coercion and vote-selling." The New York Times summarizes the\r
-i findings: The cautiously worded report calls for conducting\r
-i all federal, state and local elections on paper ballots by\r
-i 2020. Its other top recommendation would require nationwide\r
-i use of a specific form of routine postelection audit to ensure\r
-i votes have been accurately counted. The panel did not offer a\r
-i price tag for its recommended overhaul. New York University's\r
+i security vulnerabilities," the report [2]states . "In\r
+i particular, if malware on a voter's device alters a vote\r
+i before it ever reaches a blockchain, the immutability of the\r
+i blockchain fails to provide the desired integrity, and the\r
+i voter may never know of the alteration."\r
+i \r
+i The report goes on to say that "Blockchains do not provide the\r
+i anonymity often ascribed to them." It continues: "In the\r
+i particular context of elections, voters need to be authorized\r
+i as eligible to vote and as not having cast more than one\r
+i ballot in the particular election. Blockchains do not offer\r
+i means for providing the necessary authorization. [...] If a\r
+i blockchain is used, then cast ballots must be encrypted or\r
+i otherwise anonymized to prevent coercion and vote-selling."\r
+i The New York Times summarizes the findings:\r
+i \r
+i > The cautiously worded report [3]calls for conducting all\r
+i federal, state and local elections on paper ballots by 2020 .\r
+i Its other top recommendation would require nationwide use of a\r
+i specific form of routine postelection audit to ensure votes\r
+i have been accurately counted. The panel did not offer a price\r
+i tag for its recommended overhaul. New York University's\r
i Brennan Center has estimated that replacing aging voting\r
i machines over the next few years could cost well over $1\r
i billion. The 156-page report [...] bemoans a rickety system\r
i compromised by insecure voting equipment and software whose\r
i vulnerabilities were exposed more than a decade ago and which\r
i are too often managed by officials with little training in\r
-i cybersecurity. Among its specific recommendations was a\r
-i mainstay of election reformers: All elections should use\r
-i human-readable paper ballots by 2020. Such systems are\r
-i intended to assure voters that their vote was recorded\r
-i accurately. They also create a lasting record of "voter\r
-i intent" that can be used for reliable recounts, which may not\r
-i be possible in systems that record votes electronically. [...]\r
-i The panel also calls for all states to adopt a type of\r
-i post-election audit that employs statistical analysis of\r
-i ballots prior to results certification. Such "risk-limiting"\r
-i audits are designed to uncover miscounts and vote tampering.\r
-i Currently only three states mandate them.\r
+i cybersecurity.\r
+i \r
+i >\r
+i \r
+i > Among its specific recommendations was a mainstay of\r
+i election reformers: All elections should use human-readable\r
+i paper ballots by 2020. Such systems are intended to assure\r
+i voters that their vote was recorded accurately. They also\r
+i create a lasting record of "voter intent" that can be used for\r
+i reliable recounts, which may not be possible in systems that\r
+i record votes electronically. [...] The panel also calls for\r
+i all states to adopt a type of post-election audit that employs\r
+i statistical analysis of ballots prior to results\r
+i certification. Such "risk-limiting" audits are designed to\r
+i uncover miscounts and vote tampering. Currently only three\r
+i states mandate them.\r
+i \r
+i \r
+i \r
+i [1] https://www.nap.edu/catalog/25120/securing-the-vote-protec-\r
+i ting-american-democracy\r
+i \r
+i [2] https://www.nap.edu/read/25120/chapter/7#103\r
+i \r
+i [3] https://www.nytimes.com/aponline/2018/09/06/technology/ap-\r
+i us-tec-election-security-reform-report.html\r
i\r
from the ensuring-the-integrity-of-elections dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- The National Academies Press has released a 156-page report, called "Securing the Vote: Protecting American Democracy," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report states. "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration." The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings: The cautiously worded report calls for conducting all federal, state and local elections on paper ballots by 2020. Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity. Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them.
+ The National Academies Press has released a 156-page report, called " [1]Securing the Vote: Protecting American Democracy ," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report [2]states . "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration."<br/><br/>The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings:<br/><br/>> The cautiously worded report [3]calls for conducting all federal, state and local elections on paper ballots by 2020 . Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity.<br/><br/>><br/><br/>> Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them.<br/><br/><br/><br/>[1] https://www.nap.edu/catalog/25120/securing-the-vote-protecting-american-democracy<br/><br/>[2] https://www.nap.edu/read/25120/chapter/7#103<br/><br/>[3] https://www.nytimes.com/aponline/2018/09/06/technology/ap-us-tec-election-security-reform-report.html
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- The National Academies Press has released a 156-page report, called "Securing the Vote: Protecting American Democracy," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report states. "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration." The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings: The cautiously worded report calls for conducting all federal, state and local elections on paper ballots by 2020. Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity. Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them.
+ The National Academies Press has released a 156-page report, called " [1]Securing the Vote: Protecting American Democracy ," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report [2]states . "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration."<br/><br/>The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings:<br/><br/>> The cautiously worded report [3]calls for conducting all federal, state and local elections on paper ballots by 2020 . Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity.<br/><br/>><br/><br/>> Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them.<br/><br/><br/><br/>[1] https://www.nap.edu/catalog/25120/securing-the-vote-protecting-american-democracy<br/><br/>[2] https://www.nap.edu/read/25120/chapter/7#103<br/><br/>[3] https://www.nytimes.com/aponline/2018/09/06/technology/ap-us-tec-election-security-reform-report.html
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://motherboard.vice.com/en_us/article/9kmej7/valve-it-really-does-seem-bad-games-are-made-by-bad-people\r
\r
\r
- An anonymous reader quotes a report from Motherboard:\r
- Wednesday, Valve, the company that operates the huge online\r
- video game store Steam, shared more details about how it plans\r
- to control and moderate the ever-increasing number of games\r
- published on its platform. In the post published Wednesday,\r
- Valve shared more details about how it determines what it\r
- considers "outright trolling." "It is vague and we'll tell you\r
- why," Valve wrote. "You're a denizen of the internet so you\r
- know that trolls come in all forms. On Steam, some are simply\r
- trying to rile people up with something we call 'a game shaped\r
- object' (ie: a crudely made piece of software that technically\r
- and just barely passes our bar as a functioning video game but\r
- isn't what 99.9% of folks would say is "good.") Valve goes on\r
- to explain that some trolls are trying to scam folks out of\r
- their Steam inventory items (digital items that can be traded\r
- for real money), while others are trying to generate a small\r
- amount of money through a variety of schemes that have to do\r
- with how developers use keys to unlock Steam games, while\r
- others are trying to "incite and sow discord." "Trolls are\r
- figuring out new ways to be loathsome as we write this," Valve\r
- said. "But the thing these folks have in common is that they\r
- aren't actually interested in good faith efforts to make and\r
- sell games to you or anyone. When a developer's motives aren't\r
- that, they're probably a troll." One interesting observation\r
- Valve shares in the blog post is that it rarely bans\r
- individual games from Steam, and more often bans developers\r
- and/or publishers entirely. [...] Valve said that its review\r
- process for determining that something may be a "troll game"\r
- is a "deep assessment" that involves investigating who the\r
- developer is, what they've done in the past, their behavior on\r
- Steam as a developer, as a customer, their banking\r
- information, developers they associate with, and more.\r
+ An anonymous reader quotes a report from Motherboard:\r
+ \r
+ > Wednesday, Valve, the company that operates the huge online\r
+ video game store Steam, shared more details about [1]how it\r
+ plans to control and moderate the ever-increasing number of\r
+ games published on its platform . In the post [2]published\r
+ Wednesday , Valve shared more details about how it determines\r
+ what it considers "outright trolling." "It is vague and we'll\r
+ tell you why," Valve wrote. "You're a denizen of the internet\r
+ so you know that trolls come in all forms. On Steam, some are\r
+ simply trying to rile people up with something we call 'a game\r
+ shaped object' (ie: a crudely made piece of software that\r
+ technically and just barely passes our bar as a functioning\r
+ video game but isn't what 99.9% of folks would say is "good.")\r
+ \r
+ >\r
+ \r
+ > Valve goes on to explain that some trolls are trying to scam\r
+ folks out of their Steam inventory items (digital items that\r
+ can be traded for real money), while others are trying to\r
+ generate a small amount of money through a variety of schemes\r
+ that have to do with how developers use keys to unlock Steam\r
+ games, while others are trying to "incite and sow discord."\r
+ "Trolls are figuring out new ways to be loathsome as we write\r
+ this," Valve said. "But the thing these folks have in common\r
+ is that they aren't actually interested in good faith efforts\r
+ to make and sell games to you or anyone. When a developer's\r
+ motives aren't that, they're probably a troll." One\r
+ interesting observation Valve shares in the blog post is that\r
+ it rarely bans individual games from Steam, and more often\r
+ bans developers and/or publishers entirely. [...] Valve said\r
+ that its review process for determining that something may be\r
+ a "troll game" is a "deep assessment" that involves\r
+ investigating who the developer is, what they've done in the\r
+ past, their behavior on Steam as a developer, as a customer,\r
+ their banking information, developers they associate with, and\r
+ more.\r
+ \r
+ \r
+ \r
+ [1] https://motherboard.vice.com/en_us/article/9kmej7/valve-it-\r
+ really-does-seem-bad-games-are-made-by-bad-people\r
+ \r
+ [2] https://steamcommunity.com/games/593110/announcements/deta-\r
+ il/1708442022337025126\r
\r
\r
** Just charge a $5K "listing fee" (Score:5, Interesting)\r
i Thursday September 06, 2018 @11:30PM (BeauHD)\r
i from the behind-the-scenes dept.\r
i\r
-i An anonymous reader quotes a report from Motherboard:\r
-i Wednesday, Valve, the company that operates the huge online\r
-i video game store Steam, shared more details about how it plans\r
-i to control and moderate the ever-increasing number of games\r
-i published on its platform. In the post published Wednesday,\r
-i Valve shared more details about how it determines what it\r
-i considers "outright trolling." "It is vague and we'll tell you\r
-i why," Valve wrote. "You're a denizen of the internet so you\r
-i know that trolls come in all forms. On Steam, some are simply\r
-i trying to rile people up with something we call 'a game shaped\r
-i object' (ie: a crudely made piece of software that technically\r
-i and just barely passes our bar as a functioning video game but\r
-i isn't what 99.9% of folks would say is "good.") Valve goes on\r
-i to explain that some trolls are trying to scam folks out of\r
-i their Steam inventory items (digital items that can be traded\r
-i for real money), while others are trying to generate a small\r
-i amount of money through a variety of schemes that have to do\r
-i with how developers use keys to unlock Steam games, while\r
-i others are trying to "incite and sow discord." "Trolls are\r
-i figuring out new ways to be loathsome as we write this," Valve\r
-i said. "But the thing these folks have in common is that they\r
-i aren't actually interested in good faith efforts to make and\r
-i sell games to you or anyone. When a developer's motives aren't\r
-i that, they're probably a troll." One interesting observation\r
-i Valve shares in the blog post is that it rarely bans\r
-i individual games from Steam, and more often bans developers\r
-i and/or publishers entirely. [...] Valve said that its review\r
-i process for determining that something may be a "troll game"\r
-i is a "deep assessment" that involves investigating who the\r
-i developer is, what they've done in the past, their behavior on\r
-i Steam as a developer, as a customer, their banking\r
-i information, developers they associate with, and more.\r
+i An anonymous reader quotes a report from Motherboard:\r
+i \r
+i > Wednesday, Valve, the company that operates the huge online\r
+i video game store Steam, shared more details about [1]how it\r
+i plans to control and moderate the ever-increasing number of\r
+i games published on its platform . In the post [2]published\r
+i Wednesday , Valve shared more details about how it determines\r
+i what it considers "outright trolling." "It is vague and we'll\r
+i tell you why," Valve wrote. "You're a denizen of the internet\r
+i so you know that trolls come in all forms. On Steam, some are\r
+i simply trying to rile people up with something we call 'a game\r
+i shaped object' (ie: a crudely made piece of software that\r
+i technically and just barely passes our bar as a functioning\r
+i video game but isn't what 99.9% of folks would say is "good.")\r
+i \r
+i >\r
+i \r
+i > Valve goes on to explain that some trolls are trying to scam\r
+i folks out of their Steam inventory items (digital items that\r
+i can be traded for real money), while others are trying to\r
+i generate a small amount of money through a variety of schemes\r
+i that have to do with how developers use keys to unlock Steam\r
+i games, while others are trying to "incite and sow discord."\r
+i "Trolls are figuring out new ways to be loathsome as we write\r
+i this," Valve said. "But the thing these folks have in common\r
+i is that they aren't actually interested in good faith efforts\r
+i to make and sell games to you or anyone. When a developer's\r
+i motives aren't that, they're probably a troll." One\r
+i interesting observation Valve shares in the blog post is that\r
+i it rarely bans individual games from Steam, and more often\r
+i bans developers and/or publishers entirely. [...] Valve said\r
+i that its review process for determining that something may be\r
+i a "troll game" is a "deep assessment" that involves\r
+i investigating who the developer is, what they've done in the\r
+i past, their behavior on Steam as a developer, as a customer,\r
+i their banking information, developers they associate with, and\r
+i more.\r
+i \r
+i \r
+i \r
+i [1] https://motherboard.vice.com/en_us/article/9kmej7/valve-it-\r
+i really-does-seem-bad-games-are-made-by-bad-people\r
+i \r
+i [2] https://steamcommunity.com/games/593110/announcements/deta-\r
+i il/1708442022337025126\r
i\r
from the behind-the-scenes dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- An anonymous reader quotes a report from Motherboard: Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about how it plans to control and moderate the ever-increasing number of games published on its platform. In the post published Wednesday, Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.") Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more.
+ An anonymous reader quotes a report from Motherboard:<br/><br/>> Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about [1]how it plans to control and moderate the ever-increasing number of games published on its platform . In the post [2]published Wednesday , Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.")<br/><br/>><br/><br/>> Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more.<br/><br/><br/><br/>[1] https://motherboard.vice.com/en_us/article/9kmej7/valve-it-really-does-seem-bad-games-are-made-by-bad-people<br/><br/>[2] https://steamcommunity.com/games/593110/announcements/detail/1708442022337025126
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- An anonymous reader quotes a report from Motherboard: Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about how it plans to control and moderate the ever-increasing number of games published on its platform. In the post published Wednesday, Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.") Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more.
+ An anonymous reader quotes a report from Motherboard:<br/><br/>> Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about [1]how it plans to control and moderate the ever-increasing number of games published on its platform . In the post [2]published Wednesday , Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.")<br/><br/>><br/><br/>> Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more.<br/><br/><br/><br/>[1] https://motherboard.vice.com/en_us/article/9kmej7/valve-it-really-does-seem-bad-games-are-made-by-bad-people<br/><br/>[2] https://steamcommunity.com/games/593110/announcements/detail/1708442022337025126
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://www.theguardian.com/science/2018/sep/06/probiotics-not-as-beneficial-for-gut-health-as-previously-thought\r
\r
\r
- An anonymous reader quotes a report from The Guardian: The gut\r
- microbiome is the sum total of all the micro-organisms living\r
- in a person's gut, and has been shown to play a huge role in\r
- human health. New research has found probiotics -- usually\r
- taken as supplements or in foods such as yoghurt, kimchi or\r
- kefir -- can hinder a patient's gut microbiome from returning\r
- to normal after a course of antibiotics, and that different\r
- people respond to probiotics in dramatically different ways.\r
- In the first of two papers published in the journal Cell,\r
- researchers performed endoscopies and colonoscopies to sample\r
- and study the gut microbiomes of people who took antibiotics\r
- before and after probiotic consumption. Another group were\r
- given samples of their own gut microbiomes collected before\r
- consuming antibiotics. The researchers found the microbiomes\r
- of those who had taken the probiotics had suffered a "very\r
- severe disturbance." "Once the probiotics had colonized the\r
- gut, they completely inhibited the return of the indigenous\r
- microbiome which was disrupted during antibiotic treatment,"\r
- said Eran Elinav, an immunologist at the Weizmann Institute of\r
- Science in Israel and lead author on the studies. The\r
- scientists also compared the gut microbiomes of the gut\r
+ An anonymous reader quotes a report from The Guardian:\r
+ \r
+ > The gut microbiome is the sum total of all the\r
+ micro-organisms living in a person's gut, and has been shown\r
+ to play a huge role in human health. New research has found\r
+ probiotics -- usually taken as supplements or in foods such as\r
+ yoghurt, kimchi or kefir -- [1]can hinder a patient's gut\r
+ microbiome from returning to normal after a course of\r
+ antibiotics , and that different people respond to probiotics\r
+ in dramatically different ways. In the [2]first of two papers\r
+ published in the journal Cell, researchers performed\r
+ endoscopies and colonoscopies to sample and study the gut\r
+ microbiomes of people who took antibiotics before and after\r
+ probiotic consumption. Another group were given samples of\r
+ their own gut microbiomes collected before consuming\r
+ antibiotics. The researchers found the microbiomes of those\r
+ who had taken the probiotics had suffered a "very severe\r
+ disturbance." "Once the probiotics had colonized the gut, they\r
+ completely inhibited the return of the indigenous microbiome\r
+ which was disrupted during antibiotic treatment," said Eran\r
+ Elinav, an immunologist at the Weizmann Institute of Science\r
+ in Israel and lead author on the studies.\r
+ \r
+ >\r
+ \r
+ > The scientists also compared the gut microbiomes of the gut\r
intestinal tract of 25 volunteers with that of their stools.\r
They found that stool bacteria only partially correlated with\r
the microbiomes functioning inside their bodies. "So the fact\r
that we all almost exclusively rely on stool in our microbiome\r
research may not be a reliable way of studying gut microbiome\r
- health," said Elinav. In the second paper, the researchers\r
+ health," said Elinav. In the [3]second paper , the researchers\r
examined the colonization and impact of probiotics on 15\r
people by sampling within their gastrointestinal tract. They\r
divided the individuals into two groups: one were given a\r
colonisation of the probiotics, and one in which the\r
probiotics colonized the gut and modified the composition of\r
the gut microbiome and the genes of the host individual."\r
+ \r
+ \r
+ \r
+ [1] https://www.theguardian.com/science/2018/sep/06/probiotics-\r
+ not-as-beneficial-for-gut-health-as-previously-thought\r
+ \r
+ [2] https://www.cell.com/cell/fulltext/S0092-8674(18)31102-4\r
+ \r
+ [3] https://www.cell.com/cell/fulltext/S0092-8674(18)31108-5\r
\r
\r
** \r
i Thursday September 06, 2018 @11:30PM (BeauHD)\r
i from the contrary-to-popular-belief dept.\r
i\r
-i An anonymous reader quotes a report from The Guardian: The gut\r
-i microbiome is the sum total of all the micro-organisms living\r
-i in a person's gut, and has been shown to play a huge role in\r
-i human health. New research has found probiotics -- usually\r
-i taken as supplements or in foods such as yoghurt, kimchi or\r
-i kefir -- can hinder a patient's gut microbiome from returning\r
-i to normal after a course of antibiotics, and that different\r
-i people respond to probiotics in dramatically different ways.\r
-i In the first of two papers published in the journal Cell,\r
-i researchers performed endoscopies and colonoscopies to sample\r
-i and study the gut microbiomes of people who took antibiotics\r
-i before and after probiotic consumption. Another group were\r
-i given samples of their own gut microbiomes collected before\r
-i consuming antibiotics. The researchers found the microbiomes\r
-i of those who had taken the probiotics had suffered a "very\r
-i severe disturbance." "Once the probiotics had colonized the\r
-i gut, they completely inhibited the return of the indigenous\r
-i microbiome which was disrupted during antibiotic treatment,"\r
-i said Eran Elinav, an immunologist at the Weizmann Institute of\r
-i Science in Israel and lead author on the studies. The\r
-i scientists also compared the gut microbiomes of the gut\r
+i An anonymous reader quotes a report from The Guardian:\r
+i \r
+i > The gut microbiome is the sum total of all the\r
+i micro-organisms living in a person's gut, and has been shown\r
+i to play a huge role in human health. New research has found\r
+i probiotics -- usually taken as supplements or in foods such as\r
+i yoghurt, kimchi or kefir -- [1]can hinder a patient's gut\r
+i microbiome from returning to normal after a course of\r
+i antibiotics , and that different people respond to probiotics\r
+i in dramatically different ways. In the [2]first of two papers\r
+i published in the journal Cell, researchers performed\r
+i endoscopies and colonoscopies to sample and study the gut\r
+i microbiomes of people who took antibiotics before and after\r
+i probiotic consumption. Another group were given samples of\r
+i their own gut microbiomes collected before consuming\r
+i antibiotics. The researchers found the microbiomes of those\r
+i who had taken the probiotics had suffered a "very severe\r
+i disturbance." "Once the probiotics had colonized the gut, they\r
+i completely inhibited the return of the indigenous microbiome\r
+i which was disrupted during antibiotic treatment," said Eran\r
+i Elinav, an immunologist at the Weizmann Institute of Science\r
+i in Israel and lead author on the studies.\r
+i \r
+i >\r
+i \r
+i > The scientists also compared the gut microbiomes of the gut\r
i intestinal tract of 25 volunteers with that of their stools.\r
i They found that stool bacteria only partially correlated with\r
i the microbiomes functioning inside their bodies. "So the fact\r
i that we all almost exclusively rely on stool in our microbiome\r
i research may not be a reliable way of studying gut microbiome\r
-i health," said Elinav. In the second paper, the researchers\r
+i health," said Elinav. In the [3]second paper , the researchers\r
i examined the colonization and impact of probiotics on 15\r
i people by sampling within their gastrointestinal tract. They\r
i divided the individuals into two groups: one were given a\r
i colonisation of the probiotics, and one in which the\r
i probiotics colonized the gut and modified the composition of\r
i the gut microbiome and the genes of the host individual."\r
+i \r
+i \r
+i \r
+i [1] https://www.theguardian.com/science/2018/sep/06/probiotics-\r
+i not-as-beneficial-for-gut-health-as-previously-thought\r
+i \r
+i [2] https://www.cell.com/cell/fulltext/S0092-8674(18)31102-4\r
+i \r
+i [3] https://www.cell.com/cell/fulltext/S0092-8674(18)31108-5\r
i\r
from the contrary-to-popular-belief dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- An anonymous reader quotes a report from The Guardian: The gut microbiome is the sum total of all the micro-organisms living in a person's gut, and has been shown to play a huge role in human health. New research has found probiotics -- usually taken as supplements or in foods such as yoghurt, kimchi or kefir -- can hinder a patient's gut microbiome from returning to normal after a course of antibiotics, and that different people respond to probiotics in dramatically different ways. In the first of two papers published in the journal Cell, researchers performed endoscopies and colonoscopies to sample and study the gut microbiomes of people who took antibiotics before and after probiotic consumption. Another group were given samples of their own gut microbiomes collected before consuming antibiotics. The researchers found the microbiomes of those who had taken the probiotics had suffered a "very severe disturbance." "Once the probiotics had colonized the gut, they completely inhibited the return of the indigenous microbiome which was disrupted during antibiotic treatment," said Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel and lead author on the studies. The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome health," said Elinav. In the second paper, the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a preparation made of 11 strains of very commonly used probiotics and the other were given a placebo. Of those who were given probiotics, he said, "We could group the individuals into two distinct groups: one which resisted the colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual."
+ An anonymous reader quotes a report from The Guardian:<br/><br/>> The gut microbiome is the sum total of all the micro-organisms living in a person's gut, and has been shown to play a huge role in human health. New research has found probiotics -- usually taken as supplements or in foods such as yoghurt, kimchi or kefir -- [1]can hinder a patient's gut microbiome from returning to normal after a course of antibiotics , and that different people respond to probiotics in dramatically different ways. In the [2]first of two papers published in the journal Cell, researchers performed endoscopies and colonoscopies to sample and study the gut microbiomes of people who took antibiotics before and after probiotic consumption. Another group were given samples of their own gut microbiomes collected before consuming antibiotics. The researchers found the microbiomes of those who had taken the probiotics had suffered a "very severe disturbance." "Once the probiotics had colonized the gut, they completely inhibited the return of the indigenous microbiome which was disrupted during antibiotic treatment," said Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel and lead author on the studies.<br/><br/>><br/><br/>> The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome health," said Elinav. In the [3]second paper , the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a preparation made of 11 strains of very commonly used probiotics and the other were given a placebo. Of those who were given probiotics, he said, "We could group the individuals into two distinct groups: one which resisted the colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual."<br/><br/><br/><br/>[1] https://www.theguardian.com/science/2018/sep/06/probiotics-not-as-beneficial-for-gut-health-as-previously-thought<br/><br/>[2] https://www.cell.com/cell/fulltext/S0092-8674(18)31102-4<br/><br/>[3] https://www.cell.com/cell/fulltext/S0092-8674(18)31108-5
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- An anonymous reader quotes a report from The Guardian: The gut microbiome is the sum total of all the micro-organisms living in a person's gut, and has been shown to play a huge role in human health. New research has found probiotics -- usually taken as supplements or in foods such as yoghurt, kimchi or kefir -- can hinder a patient's gut microbiome from returning to normal after a course of antibiotics, and that different people respond to probiotics in dramatically different ways. In the first of two papers published in the journal Cell, researchers performed endoscopies and colonoscopies to sample and study the gut microbiomes of people who took antibiotics before and after probiotic consumption. Another group were given samples of their own gut microbiomes collected before consuming antibiotics. The researchers found the microbiomes of those who had taken the probiotics had suffered a "very severe disturbance." "Once the probiotics had colonized the gut, they completely inhibited the return of the indigenous microbiome which was disrupted during antibiotic treatment," said Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel and lead author on the studies. The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome health," said Elinav. In the second paper, the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a preparation made of 11 strains of very commonly used probiotics and the other were given a placebo. Of those who were given probiotics, he said, "We could group the individuals into two distinct groups: one which resisted the colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual."
+ An anonymous reader quotes a report from The Guardian:<br/><br/>> The gut microbiome is the sum total of all the micro-organisms living in a person's gut, and has been shown to play a huge role in human health. New research has found probiotics -- usually taken as supplements or in foods such as yoghurt, kimchi or kefir -- [1]can hinder a patient's gut microbiome from returning to normal after a course of antibiotics , and that different people respond to probiotics in dramatically different ways. In the [2]first of two papers published in the journal Cell, researchers performed endoscopies and colonoscopies to sample and study the gut microbiomes of people who took antibiotics before and after probiotic consumption. Another group were given samples of their own gut microbiomes collected before consuming antibiotics. The researchers found the microbiomes of those who had taken the probiotics had suffered a "very severe disturbance." "Once the probiotics had colonized the gut, they completely inhibited the return of the indigenous microbiome which was disrupted during antibiotic treatment," said Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel and lead author on the studies.<br/><br/>><br/><br/>> The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome health," said Elinav. In the [3]second paper , the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a preparation made of 11 strains of very commonly used probiotics and the other were given a placebo. Of those who were given probiotics, he said, "We could group the individuals into two distinct groups: one which resisted the colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual."<br/><br/><br/><br/>[1] https://www.theguardian.com/science/2018/sep/06/probiotics-not-as-beneficial-for-gut-health-as-previously-thought<br/><br/>[2] https://www.cell.com/cell/fulltext/S0092-8674(18)31102-4<br/><br/>[3] https://www.cell.com/cell/fulltext/S0092-8674(18)31108-5
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
\r
\r
Hikers, park rangers, and summer residents of Iceland's\r
- northernmost peninsula are seeking to keep the area free from\r
- internet service, worrying that all that comes with it "will\r
- destroy a way of life that depends on the absence of [email,\r
- news, and social media]," reports the Associated Press. "The\r
- area has long resisted cell towers, but commercial initiatives\r
- could take the decision out of Icelanders' hands and push\r
- Hornstrandir across the digital divide." From the report:\r
- Despite or because of its remoteness, Iceland ranks first on a\r
- U.N. index comparing nations by information technology use,\r
+ northernmost peninsula are [1]seeking to keep the area free\r
+ from internet service , worrying that all that comes with it\r
+ "will destroy a way of life that depends on the absence of\r
+ [email, news, and social media]," reports the Associated\r
+ Press. "The area has long resisted cell towers, but commercial\r
+ initiatives could take the decision out of Icelanders' hands\r
+ and push Hornstrandir across the digital divide." From the\r
+ report:\r
+ \r
+ > Despite or because of its remoteness, Iceland ranks first on\r
+ a U.N. index comparing nations by information technology use,\r
with roughly 98 percent of the population using the internet.\r
Among adults, 93 percent report having Facebook accounts and\r
two-thirds are Snapchat users, according to pollster MMR. Many\r
it would require or prohibit hasn't been fleshed out. The last\r
full-time resident of the rugged area moved away in 1952 -- it\r
never was an easy place to farm -- but many descendants have\r
- turned family farmsteads into summer getaways. Northwest\r
- Iceland's representative, Halla Signy Kristjansdottir, is in\r
- favor of adding cell towers for the safety of sailors and\r
- travelers in the area. "I don't see anything romantic about\r
- lying on the ground with a broken thigh bone and no cellphone\r
- signal," Kristjansdottir said in an interview.\r
+ turned family farmsteads into summer getaways.\r
+ \r
+ Northwest Iceland's representative, Halla Signy\r
+ Kristjansdottir, is in favor of adding cell towers for the\r
+ safety of sailors and travelers in the area. "I don't see\r
+ anything romantic about lying on the ground with a broken\r
+ thigh bone and no cellphone signal," Kristjansdottir said in\r
+ an interview.\r
+ \r
+ \r
+ \r
+ [1] https://www.apnews.com/71cdfb7b1c2245069a6f681f8b8f906f/Wi-\r
+ red-Icelanders-seek-to-keep-remote-peninsula-digital-free\r
\r
\r
** Yeah it's real annoying (Score:3, Insightful)\r
i from the no-cellphones-allowed dept.\r
i\r
i Hikers, park rangers, and summer residents of Iceland's\r
-i northernmost peninsula are seeking to keep the area free from\r
-i internet service, worrying that all that comes with it "will\r
-i destroy a way of life that depends on the absence of [email,\r
-i news, and social media]," reports the Associated Press. "The\r
-i area has long resisted cell towers, but commercial initiatives\r
-i could take the decision out of Icelanders' hands and push\r
-i Hornstrandir across the digital divide." From the report:\r
-i Despite or because of its remoteness, Iceland ranks first on a\r
-i U.N. index comparing nations by information technology use,\r
+i northernmost peninsula are [1]seeking to keep the area free\r
+i from internet service , worrying that all that comes with it\r
+i "will destroy a way of life that depends on the absence of\r
+i [email, news, and social media]," reports the Associated\r
+i Press. "The area has long resisted cell towers, but commercial\r
+i initiatives could take the decision out of Icelanders' hands\r
+i and push Hornstrandir across the digital divide." From the\r
+i report:\r
+i \r
+i > Despite or because of its remoteness, Iceland ranks first on\r
+i a U.N. index comparing nations by information technology use,\r
i with roughly 98 percent of the population using the internet.\r
i Among adults, 93 percent report having Facebook accounts and\r
i two-thirds are Snapchat users, according to pollster MMR. Many\r
i it would require or prohibit hasn't been fleshed out. The last\r
i full-time resident of the rugged area moved away in 1952 -- it\r
i never was an easy place to farm -- but many descendants have\r
-i turned family farmsteads into summer getaways. Northwest\r
-i Iceland's representative, Halla Signy Kristjansdottir, is in\r
-i favor of adding cell towers for the safety of sailors and\r
-i travelers in the area. "I don't see anything romantic about\r
-i lying on the ground with a broken thigh bone and no cellphone\r
-i signal," Kristjansdottir said in an interview.\r
+i turned family farmsteads into summer getaways.\r
+i \r
+i Northwest Iceland's representative, Halla Signy\r
+i Kristjansdottir, is in favor of adding cell towers for the\r
+i safety of sailors and travelers in the area. "I don't see\r
+i anything romantic about lying on the ground with a broken\r
+i thigh bone and no cellphone signal," Kristjansdottir said in\r
+i an interview.\r
+i \r
+i \r
+i \r
+i [1] https://www.apnews.com/71cdfb7b1c2245069a6f681f8b8f906f/Wi-\r
+i red-Icelanders-seek-to-keep-remote-peninsula-digital-free\r
i\r
from the no-cellphones-allowed dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- Hikers, park rangers, and summer residents of Iceland's northernmost peninsula are seeking to keep the area free from internet service, worrying that all that comes with it "will destroy a way of life that depends on the absence of [email, news, and social media]," reports the Associated Press. "The area has long resisted cell towers, but commercial initiatives could take the decision out of Icelanders' hands and push Hornstrandir across the digital divide." From the report: Despite or because of its remoteness, Iceland ranks first on a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many people who live in northwestern Iceland or visit as outdoor enthusiasts want Hornstrandir's 570 square kilometers (220 square miles), which accounts for 0.6 percent of Iceland's land mass, to be declared a "digital-free zone." The idea hasn't coalesced into a petition or formal campaign, so what it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have turned family farmsteads into summer getaways. Northwest Iceland's representative, Halla Signy Kristjansdottir, is in favor of adding cell towers for the safety of sailors and travelers in the area. "I don't see anything romantic about lying on the ground with a broken thigh bone and no cellphone signal," Kristjansdottir said in an interview.
+ Hikers, park rangers, and summer residents of Iceland's northernmost peninsula are [1]seeking to keep the area free from internet service , worrying that all that comes with it "will destroy a way of life that depends on the absence of [email, news, and social media]," reports the Associated Press. "The area has long resisted cell towers, but commercial initiatives could take the decision out of Icelanders' hands and push Hornstrandir across the digital divide." From the report:<br/><br/>> Despite or because of its remoteness, Iceland ranks first on a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many people who live in northwestern Iceland or visit as outdoor enthusiasts want Hornstrandir's 570 square kilometers (220 square miles), which accounts for 0.6 percent of Iceland's land mass, to be declared a "digital-free zone." The idea hasn't coalesced into a petition or formal campaign, so what it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have turned family farmsteads into summer getaways.<br/><br/>Northwest Iceland's representative, Halla Signy Kristjansdottir, is in favor of adding cell towers for the safety of sailors and travelers in the area. "I don't see anything romantic about lying on the ground with a broken thigh bone and no cellphone signal," Kristjansdottir said in an interview.<br/><br/><br/><br/>[1] https://www.apnews.com/71cdfb7b1c2245069a6f681f8b8f906f/Wired-Icelanders-seek-to-keep-remote-peninsula-digital-free
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- Hikers, park rangers, and summer residents of Iceland's northernmost peninsula are seeking to keep the area free from internet service, worrying that all that comes with it "will destroy a way of life that depends on the absence of [email, news, and social media]," reports the Associated Press. "The area has long resisted cell towers, but commercial initiatives could take the decision out of Icelanders' hands and push Hornstrandir across the digital divide." From the report: Despite or because of its remoteness, Iceland ranks first on a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many people who live in northwestern Iceland or visit as outdoor enthusiasts want Hornstrandir's 570 square kilometers (220 square miles), which accounts for 0.6 percent of Iceland's land mass, to be declared a "digital-free zone." The idea hasn't coalesced into a petition or formal campaign, so what it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have turned family farmsteads into summer getaways. Northwest Iceland's representative, Halla Signy Kristjansdottir, is in favor of adding cell towers for the safety of sailors and travelers in the area. "I don't see anything romantic about lying on the ground with a broken thigh bone and no cellphone signal," Kristjansdottir said in an interview.
+ Hikers, park rangers, and summer residents of Iceland's northernmost peninsula are [1]seeking to keep the area free from internet service , worrying that all that comes with it "will destroy a way of life that depends on the absence of [email, news, and social media]," reports the Associated Press. "The area has long resisted cell towers, but commercial initiatives could take the decision out of Icelanders' hands and push Hornstrandir across the digital divide." From the report:<br/><br/>> Despite or because of its remoteness, Iceland ranks first on a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many people who live in northwestern Iceland or visit as outdoor enthusiasts want Hornstrandir's 570 square kilometers (220 square miles), which accounts for 0.6 percent of Iceland's land mass, to be declared a "digital-free zone." The idea hasn't coalesced into a petition or formal campaign, so what it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have turned family farmsteads into summer getaways.<br/><br/>Northwest Iceland's representative, Halla Signy Kristjansdottir, is in favor of adding cell towers for the safety of sailors and travelers in the area. "I don't see anything romantic about lying on the ground with a broken thigh bone and no cellphone signal," Kristjansdottir said in an interview.<br/><br/><br/><br/>[1] https://www.apnews.com/71cdfb7b1c2245069a6f681f8b8f906f/Wired-Icelanders-seek-to-keep-remote-peninsula-digital-free
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
o Source link: https://news.sky.com/story/ba-calls-in-police-over-customer-data-theft-from-website-11491980\r
\r
\r
- Earlier today, British Airways said credit card information of\r
- at least 380,000 customers have been "compromised" in a data\r
- breach that occurred between August 21 and September 5. The\r
- information stolen includes customer names, email addresses,\r
- home addresses and payment card information -- but not travel\r
- or passport details. Sky News reports: In an email to affected\r
- customers, BA said: "We're deeply sorry, but you may have been\r
- affected. We recommend that you contact your bank or credit\r
- card provider and follow their recommended advice. We take the\r
- protection of your personal information very seriously. Please\r
- accept our deepest apologies for the worry and inconvenience\r
- that this criminal activity has caused." The breach has been\r
- "resolved" and the website is "working normally," it said. In\r
- a statement, the airline added: "We have notified the police\r
- and relevant authorities... [and] will continue to keep our\r
- customers updated with the very latest information. We will be\r
+ Earlier today, British Airways said [1]credit card information\r
+ of at least 380,000 customers have been "compromised" in a\r
+ data breach that occurred between August 21 and September 5.\r
+ The information stolen includes customer names, email\r
+ addresses, home addresses and payment card information -- but\r
+ not travel or passport details. Sky News reports:\r
+ \r
+ > In an email to affected customers, BA said: "We're deeply\r
+ sorry, but you may have been affected. We recommend that you\r
+ contact your bank or credit card provider and follow their\r
+ recommended advice. We take the protection of your personal\r
+ information very seriously. Please accept our deepest\r
+ apologies for the worry and inconvenience that this criminal\r
+ activity has caused." The breach has been "resolved" and the\r
+ website is "working normally," it said. In a statement, the\r
+ airline added: "We have notified the police and relevant\r
+ authorities... [and] will continue to keep our customers\r
+ updated with the very latest information. We will be\r
contacting customers and will manage any claims on an\r
individual basis."\r
+ \r
+ \r
+ \r
+ [1] https://news.sky.com/story/ba-calls-in-police-over-custome-\r
+ r-data-theft-from-website-11491980\r
\r
\r
** when not if (Score:2)\r
i Thursday September 06, 2018 @11:30PM (BeauHD)\r
i from the sorry-not-sorry dept.\r
i\r
-i Earlier today, British Airways said credit card information of\r
-i at least 380,000 customers have been "compromised" in a data\r
-i breach that occurred between August 21 and September 5. The\r
-i information stolen includes customer names, email addresses,\r
-i home addresses and payment card information -- but not travel\r
-i or passport details. Sky News reports: In an email to affected\r
-i customers, BA said: "We're deeply sorry, but you may have been\r
-i affected. We recommend that you contact your bank or credit\r
-i card provider and follow their recommended advice. We take the\r
-i protection of your personal information very seriously. Please\r
-i accept our deepest apologies for the worry and inconvenience\r
-i that this criminal activity has caused." The breach has been\r
-i "resolved" and the website is "working normally," it said. In\r
-i a statement, the airline added: "We have notified the police\r
-i and relevant authorities... [and] will continue to keep our\r
-i customers updated with the very latest information. We will be\r
+i Earlier today, British Airways said [1]credit card information\r
+i of at least 380,000 customers have been "compromised" in a\r
+i data breach that occurred between August 21 and September 5.\r
+i The information stolen includes customer names, email\r
+i addresses, home addresses and payment card information -- but\r
+i not travel or passport details. Sky News reports:\r
+i \r
+i > In an email to affected customers, BA said: "We're deeply\r
+i sorry, but you may have been affected. We recommend that you\r
+i contact your bank or credit card provider and follow their\r
+i recommended advice. We take the protection of your personal\r
+i information very seriously. Please accept our deepest\r
+i apologies for the worry and inconvenience that this criminal\r
+i activity has caused." The breach has been "resolved" and the\r
+i website is "working normally," it said. In a statement, the\r
+i airline added: "We have notified the police and relevant\r
+i authorities... [and] will continue to keep our customers\r
+i updated with the very latest information. We will be\r
i contacting customers and will manage any claims on an\r
i individual basis."\r
+i \r
+i \r
+i \r
+i [1] https://news.sky.com/story/ba-calls-in-police-over-custome-\r
+i r-data-theft-from-website-11491980\r
i\r
from the sorry-not-sorry dept.)</div>
<br/>
<div class='content' style='text-align: justify'>
- Earlier today, British Airways said credit card information of at least 380,000 customers have been "compromised" in a data breach that occurred between August 21 and September 5. The information stolen includes customer names, email addresses, home addresses and payment card information -- but not travel or passport details. Sky News reports: In an email to affected customers, BA said: "We're deeply sorry, but you may have been affected. We recommend that you contact your bank or credit card provider and follow their recommended advice. We take the protection of your personal information very seriously. Please accept our deepest apologies for the worry and inconvenience that this criminal activity has caused." The breach has been "resolved" and the website is "working normally," it said. In a statement, the airline added: "We have notified the police and relevant authorities... [and] will continue to keep our customers updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis."
+ Earlier today, British Airways said [1]credit card information of at least 380,000 customers have been "compromised" in a data breach that occurred between August 21 and September 5. The information stolen includes customer names, email addresses, home addresses and payment card information -- but not travel or passport details. Sky News reports:<br/><br/>> In an email to affected customers, BA said: "We're deeply sorry, but you may have been affected. We recommend that you contact your bank or credit card provider and follow their recommended advice. We take the protection of your personal information very seriously. Please accept our deepest apologies for the worry and inconvenience that this criminal activity has caused." The breach has been "resolved" and the website is "working normally," it said. In a statement, the airline added: "We have notified the police and relevant authorities... [and] will continue to keep our customers updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis."<br/><br/><br/><br/>[1] https://news.sky.com/story/ba-calls-in-police-over-customer-data-theft-from-website-11491980
</div>
<hr/>
</div>
</ul>
<br/>
<div class='content' style='text-align: justify'>
- Earlier today, British Airways said credit card information of at least 380,000 customers have been "compromised" in a data breach that occurred between August 21 and September 5. The information stolen includes customer names, email addresses, home addresses and payment card information -- but not travel or passport details. Sky News reports: In an email to affected customers, BA said: "We're deeply sorry, but you may have been affected. We recommend that you contact your bank or credit card provider and follow their recommended advice. We take the protection of your personal information very seriously. Please accept our deepest apologies for the worry and inconvenience that this criminal activity has caused." The breach has been "resolved" and the website is "working normally," it said. In a statement, the airline added: "We have notified the police and relevant authorities... [and] will continue to keep our customers updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis."
+ Earlier today, British Airways said [1]credit card information of at least 380,000 customers have been "compromised" in a data breach that occurred between August 21 and September 5. The information stolen includes customer names, email addresses, home addresses and payment card information -- but not travel or passport details. Sky News reports:<br/><br/>> In an email to affected customers, BA said: "We're deeply sorry, but you may have been affected. We recommend that you contact your bank or credit card provider and follow their recommended advice. We take the protection of your personal information very seriously. Please accept our deepest apologies for the worry and inconvenience that this criminal activity has caused." The breach has been "resolved" and the website is "working normally," it said. In a statement, the airline added: "We have notified the police and relevant authorities... [and] will continue to keep our customers updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis."<br/><br/><br/><br/>[1] https://news.sky.com/story/ba-calls-in-police-over-customer-data-theft-from-website-11491980
</div>
<hr/>
<div class='comment' style='display: block; margin-left: 80px'>
i de travail des développeuses et développeurs PHP en France.\r
i Vous êtes invité à répondre à l’enquête dès maintenant pour\r
i l’enquête 2018 : cela prend moins de 5 minutes. Le baromètre\r
-i des salairesPHP permet aux développeuses et (...)\r
+i des salairesPHP permet aux développeuses et (...)\r
i\r
<div class='details'>(2018/09/18)</div>
<br/>
<div class='content' style='text-align: justify'>
- Cela fait maintenant 5 années que l’AFUP diffuse une campagne pour récolter des informations sur les salaires et conditions de travail des développeuses et développeurs PHP en France. Vous êtes invité à répondre à l’enquête dès maintenant pour l’enquête 2018 : cela prend moins de 5 minutes. Le baromètre des salairesPHP permet aux développeuses et (...)
+ Cela fait maintenant 5 années que l’AFUP diffuse une campagne pour récolter des informations sur les salaires et conditions de travail des développeuses et développeurs PHP en France. Vous êtes invité à répondre à l’enquête dès maintenant pour l’enquête 2018 : cela prend moins de 5 minutes. Le baromètre des salairesPHP permet aux développeuses et (...)
</div>
<hr/>
</div>
i des contenus numériques, selon une étude européenne. Dans le\r
i cadre d’un projet de recherche mené à l’échelle de l’Union par\r
i l’Office de l’Union européenne pour la propriété\r
-i intellectuelle (EUIPO), plus de . 000 fichiers contenant (...)\r
+i intellectuelle (EUIPO), plus de . 000 fichiers contenant (...)\r
i\r
<div class='details'>(2018/09/19)</div>
<br/>
<div class='content' style='text-align: justify'>
- Les internautes font face à de multiples menaces de logiciels malveillants en consultant des sites web soupçonnés de pirater des contenus numériques, selon une étude européenne. Dans le cadre d’un projet de recherche mené à l’échelle de l’Union par l’Office de l’Union européenne pour la propriété intellectuelle (EUIPO), plus de . 000 fichiers contenant (...)
+ Les internautes font face à de multiples menaces de logiciels malveillants en consultant des sites web soupçonnés de pirater des contenus numériques, selon une étude européenne. Dans le cadre d’un projet de recherche mené à l’échelle de l’Union par l’Office de l’Union européenne pour la propriété intellectuelle (EUIPO), plus de . 000 fichiers contenant (...)
</div>
<hr/>
</div>
i est désormais disponible sous abonnement. Selon l’éditeur, il\r
i s’agit du « premier service mondial dédié exclusivement au\r
i support des utilisateurs Jenkins. » L’air de rien, les\r
-i ingénieurs de CloudBees contribuent à environ 80% du (...)\r
+i ingénieurs de CloudBees contribuent à environ 80% du (...)\r
i\r
<div class='details'>(2018/09/19)</div>
<br/>
<div class='content' style='text-align: justify'>
- Dans le cadre de l’événement « DevOps World | Jenkins World », CloudBees annonce que son service CloudBees Jenkins Support est désormais disponible sous abonnement. Selon l’éditeur, il s’agit du « premier service mondial dédié exclusivement au support des utilisateurs Jenkins. » L’air de rien, les ingénieurs de CloudBees contribuent à environ 80% du (...)
+ Dans le cadre de l’événement « DevOps World | Jenkins World », CloudBees annonce que son service CloudBees Jenkins Support est désormais disponible sous abonnement. Selon l’éditeur, il s’agit du « premier service mondial dédié exclusivement au support des utilisateurs Jenkins. » L’air de rien, les ingénieurs de CloudBees contribuent à environ 80% du (...)
</div>
<hr/>
</div>
i "premier système de déploiement logiciel de bout en bout." La\r
i CloudBees Suite comprend plusieurs produits : CloudBees Core\r
i (gouvernance unifiée des opérations et processus de\r
-i déploiement continu), CloudBees DevOptics (rapports (...)\r
+i déploiement continu), CloudBees DevOptics (rapports (...)\r
i\r
<div class='details'>(2018/09/20)</div>
<br/>
<div class='content' style='text-align: justify'>
- Dans le cadre « DevOps World | Jenkins World », CloudBees a annoncé cette semaine la disponibilité de CloudBees Suite, son "premier système de déploiement logiciel de bout en bout." La CloudBees Suite comprend plusieurs produits : CloudBees Core (gouvernance unifiée des opérations et processus de déploiement continu), CloudBees DevOptics (rapports (...)
+ Dans le cadre « DevOps World | Jenkins World », CloudBees a annoncé cette semaine la disponibilité de CloudBees Suite, son "premier système de déploiement logiciel de bout en bout." La CloudBees Suite comprend plusieurs produits : CloudBees Core (gouvernance unifiée des opérations et processus de déploiement continu), CloudBees DevOptics (rapports (...)
</div>
<hr/>
</div>
i renforce en région : après Paris, place à Metz et au\r
i Luxembourg. Le rachat d’Opcoding va permettre à Adimeo de\r
i renforcer ses équipes techniques pour faire face au\r
-i développement commercial de la société. Cette acquisition\r
-i va (...)\r
+i développement commercial de la société. Cette acquisition va\r
+i (...)\r
i\r
<div class='details'>(2018/09/21)</div>
<br/>
<div class='content' style='text-align: justify'>
- OpCoding, expert PHP Javascript, entre dans le giron d’Adimeo, une entreprise fondée il y a 13 ans en France. Sa présence se renforce en région : après Paris, place à Metz et au Luxembourg. Le rachat d’Opcoding va permettre à Adimeo de renforcer ses équipes techniques pour faire face au développement commercial de la société. Cette acquisition va (...)
+ OpCoding, expert PHP Javascript, entre dans le giron d’Adimeo, une entreprise fondée il y a 13 ans en France. Sa présence se renforce en région : après Paris, place à Metz et au Luxembourg. Le rachat d’Opcoding va permettre à Adimeo de renforcer ses équipes techniques pour faire face au développement commercial de la société. Cette acquisition va (...)
</div>
<hr/>
</div>
i des conférences est publié et on y attend plus de 800\r
i personnes. Le programme est exclusivement constitué\r
i d’interventions choisies par un comité de programme, pour la\r
-i qualité de leur retour d’expérience. Les organisateurs (...)\r
+i qualité de leur retour d’expérience. Les organisateurs (...)\r
i\r
<div class='details'>(2018/09/22)</div>
<br/>
<div class='content' style='text-align: justify'>
- La conférence "devopsé revient au Grand REX à Paris, pour une troisième édition, le mardi 16 octobre prochain. Le programme des conférences est publié et on y attend plus de 800 personnes. Le programme est exclusivement constitué d’interventions choisies par un comité de programme, pour la qualité de leur retour d’expérience. Les organisateurs (...)
+ La conférence "devopsé revient au Grand REX à Paris, pour une troisième édition, le mardi 16 octobre prochain. Le programme des conférences est publié et on y attend plus de 800 personnes. Le programme est exclusivement constitué d’interventions choisies par un comité de programme, pour la qualité de leur retour d’expérience. Les organisateurs (...)
</div>
<hr/>
</div>
i 18e anniversaire a été l’occasion pour le groupe - devenu\r
i international ! - de publier une refonte de son site web\r
i autour de ses valeurs consolidées. Note aux lecteurs :\r
-i Linagora finance toolinux.com depuis mai (...)\r
+i Linagora finance toolinux.com depuis mai (...)\r
i\r
<div class='details'>(2018/09/23)</div>
<br/>
<div class='content' style='text-align: justify'>
- Cet été, tout comme Toolinux.com, LINAGORA a soufflé sa 18ème bougie. Une vidéo a été publiée pour fêter cet événement. Ce 18e anniversaire a été l’occasion pour le groupe - devenu international ! - de publier une refonte de son site web autour de ses valeurs consolidées. Note aux lecteurs : Linagora finance toolinux.com depuis mai (...)
+ Cet été, tout comme Toolinux.com, LINAGORA a soufflé sa 18ème bougie. Une vidéo a été publiée pour fêter cet événement. Ce 18e anniversaire a été l’occasion pour le groupe - devenu international ! - de publier une refonte de son site web autour de ses valeurs consolidées. Note aux lecteurs : Linagora finance toolinux.com depuis mai (...)
</div>
<hr/>
</div>
i désormais un projet bien réel. Initialement développé pour\r
i répondre aux besoins des administrations, les précédentes\r
i versions de CLIP OS n’étaient pas disponibles publiquement.\r
-i Elles le (...)\r
+i Elles le (...)\r
i\r
<div class='details'>(2018/09/24)</div>
<br/>
<div class='content' style='text-align: justify'>
- Maintenu par l’ANSSI, CLIP OS est un projet de système d’exploitation open source basé sur un noyau Linux et des logiciels libres. C’était une idée depuis dix ans, c’est désormais un projet bien réel. Initialement développé pour répondre aux besoins des administrations, les précédentes versions de CLIP OS n’étaient pas disponibles publiquement. Elles le (...)
+ Maintenu par l’ANSSI, CLIP OS est un projet de système d’exploitation open source basé sur un noyau Linux et des logiciels libres. C’était une idée depuis dix ans, c’est désormais un projet bien réel. Initialement développé pour répondre aux besoins des administrations, les précédentes versions de CLIP OS n’étaient pas disponibles publiquement. Elles le (...)
</div>
<hr/>
</div>
i sur affiche. Une trentaine de conférenciers, venus de tous les\r
i horizons, vont y partager leur savoir et vous faire profiter\r
i de leur expérience. C’est bon : après des semaines de travail,\r
-i les organisateurs du Forum PHP ont accouché (...)\r
+i les organisateurs du Forum PHP ont accouché (...)\r
i\r
<div class='details'>(2018/09/25)</div>
<br/>
<div class='content' style='text-align: justify'>
- Il se tiendra les jeudi 25 et vendredi 26 octobre dans la capitale française. L’événement n’a jamais été aussi séduisant sur affiche. Une trentaine de conférenciers, venus de tous les horizons, vont y partager leur savoir et vous faire profiter de leur expérience. C’est bon : après des semaines de travail, les organisateurs du Forum PHP ont accouché (...)
+ Il se tiendra les jeudi 25 et vendredi 26 octobre dans la capitale française. L’événement n’a jamais été aussi séduisant sur affiche. Une trentaine de conférenciers, venus de tous les horizons, vont y partager leur savoir et vous faire profiter de leur expérience. C’est bon : après des semaines de travail, les organisateurs du Forum PHP ont accouché (...)
</div>
<hr/>
</div>
i Linux sur Chromebook, mais pas encore sur tous les modèles.\r
i C’était un navigateur amélioré. C’est désormais un système\r
i d’exploitation capable de faire tourner des applications\r
-i progressives du web, les applications Android et\r
-i désormais (...)\r
+i progressives du web, les applications Android et désormais\r
+i (...)\r
i\r
<div class='details'>(2018/09/25)</div>
<br/>
<div class='content' style='text-align: justify'>
- C’était un privilège réservé aux développeurs. Désormais, avec Chrome OS 69, tout le monde peut profiter des applications Linux sur Chromebook, mais pas encore sur tous les modèles. C’était un navigateur amélioré. C’est désormais un système d’exploitation capable de faire tourner des applications progressives du web, les applications Android et désormais (...)
+ C’était un privilège réservé aux développeurs. Désormais, avec Chrome OS 69, tout le monde peut profiter des applications Linux sur Chromebook, mais pas encore sur tous les modèles. C’était un navigateur amélioré. C’est désormais un système d’exploitation capable de faire tourner des applications progressives du web, les applications Android et désormais (...)
</div>
<hr/>
</div>