adv

solidot此次改版内容包括服务器更新、编程语言、网站后台管理的优化、页面和操作流程的优化等。

信息流

  • Spectrum internet is getting kicked out of New York

    发表评论 查看更多 翻译此文

    收起

  • Popular movie-ticked subscription service MoviePass experienced an outage on Thursday, still ongoing for some, which the company attributed to "technical issues with our card-based check-in process," on its Twitter feed. But its SEC filing Thursday indicated that the problem was really cash flow. From a report: The filing by its parent company, Helios and Matheson Analytics, explained an emergency loan the company had taken out: The $5.0 million cash proceeds received from the Demand Note will be used by the Company to pay the Company's merchant and fulfillment processors. If the Company is unable to make required payments to its merchant and fulfillment processors, the merchant and fulfillment processors may cease processing payments for MoviePass. ("MoviePass"), which would cause a MoviePass service interruption. Such a service interruption occurred on July 26, 2018. Such service interruptions could have a material adverse effect on MoviePass' ability to retain its subscribers.

    发表评论 查看更多 翻译此文

    收起

  • Mea culpa: there is a crisis in the humanities

    发表评论 查看更多 翻译此文

    收起

  • After broadband failures, NY gives Charter 60 days to plan for exit from state.

    发表评论 查看更多 翻译此文

    收起

  • In this paper, we consider the relation between the spectrum and the number of short cycles in large graphs. Suppose $G_1, G_2, G_3, \ldots$ is a sequence of finite and connected graphs that share a common universal cover $T$ and such that the proportion of eigenvalues of $G_n$ that lie within the support of the spectrum of $T$ tends to 1 in the large $n$ limit. We prove such a sequence of graphs is asymptotically locally tree-like. This is deduced by way of an analogous spectral rigidity theorem proved for certain infinite sophic graphs. We present additional results and questions in this spirit.

    发表评论 查看更多 翻译此文

    收起

  • Senator Claire McCaskill was one of three candidates targeted in spear-phishing campaign.

    发表评论 查看更多 翻译此文

    收起

  • The new MacBook Pro now behaves as expected, but there are still limitations.

    发表评论 查看更多 翻译此文

    收起

  • Intel is going to be building 14nm chips for a long time yet.

    发表评论 查看更多 翻译此文

    收起

  • Scientists published a paper Friday detailing a new Spectre-class CPU attack that can be carried out via network connections and does not require the attacker to host code on a targeted machine. From a report: This new attack --codenamed NetSpectre -- is a major evolution for Spectre attacks, which until now have required the attacker to trick a victim into downloading and running malicious code on his machine, or at least accessing a website that runs malicious JavaScript in the user's browser. But with NetSpectre, an attacker can simply bombard a computer's network ports and achieve the same results. Although the attack is innovative, NetSpectre also has its downsides (or positive side, depending on what part of the academics/users barricade you are). The biggest is the attack's woefully slow exfiltration speed, which is 15 bits/hour for attacks carried out via a network connection and targeting data stored in the CPU's cache.

    发表评论 查看更多 翻译此文

    收起

  • The kernel's out-of-memory (OOM) killer is summoned when the system runs short of free memory and is unable to proceed without killing one or more processes. As might be expected, the policy decisions around which processes should be targeted have engendered controversy for as long as the OOM killer has existed. The 4.19 development cycle is likely to include a new OOM-killer implementation that targets control groups rather than individual processes, but it turns out that there is significant disagreement over how the OOM killer and control groups should interact.

    发表评论 查看更多 翻译此文

    收起

  • xanthos writes: A fascinating article in Quanta magazine introduces us to Cohl Furey and the eight dimensional mathematics called octonions that she is using to model the interactions of strong and electromagnetic forces. "Proof surfaced in 1898 that the reals, complex numbers, quaternions and octonions are the only kinds of numbers that can be added, subtracted, multiplied and divided. The first three of these "division algebras" would soon lay the mathematical foundation for 20th-century physics, with real numbers appearing ubiquitously, complex numbers providing the math of quantum mechanics, and quaternions underlying Albert Einstein's special theory of relativity. This has led many researchers to wonder about the last and least-understood division algebra. Might the octonions hold secrets of the universe?" "In her most recent published paper she consolidated several findings to construct the full Standard Model symmetry group for a single generation of particles, with the math pro

    发表评论 查看更多 翻译此文

    收起

  • In this paper, we consider the relation between the spectrum and the number of short cycles in large graphs. Suppose $G_1, G_2, G_3, \ldots$ is a sequence of finite and connected graphs that share a common universal cover $T$ and such that the proportion of eigenvalues of $G_n$ that lie within the support of the spectrum of $T$ tends to 1 in the large $n$ limit. We prove such a sequence of graphs is asymptotically locally tree-like. This is deduced by way of an analogous spectral rigidity theorem proved for certain infinite sophic graphs. We present additional results and questions in this spirit.

    发表评论 查看更多 翻译此文

    收起

  • Facebook is reportedly rolling out its "downvote" button to a wider group of users in the United States. "The feature began appearing on the service's mobile app without a formal company announcement -- and we only found out about it by browsing on our phones," reports Ars Technica. From the report: The feature appears to currently be limited to "public" posts. Should your account be flagged for this week's test, every comment in a thread will include a numeric value and small up- and down-arrows connected to that number. Upon the first display of this Reddit-like change, the Facebook app will offer guidance: "Support comments that are thoughtful, and demote ones that are uncivil or irrelevant." This is in addition to the site's long-running "emotion" interface, which lets users tap "like" or emoji-styled buttons. These icons and numbers still attach to posts as they've done for years. Now an additional value based on up- and down-votes, appears as well, and these values are separate.

    发表评论 查看更多 翻译此文

    收起

  • It really is down to things like ignoring critical blood pressure levels—for hours.

    发表评论 查看更多 翻译此文

    收起

  • Intel delays 10nm Cannon Lake processors, again, until late 2019

    发表评论 查看更多 翻译此文

    收起

  • Adobe Flash’s Gaming Legacy and My Efforts To Save It

    发表评论 查看更多 翻译此文

    收起

  • J.J. Abrams: "We were never going to recast, or use a CG character."

    发表评论 查看更多 翻译此文

    收起

  • Security reporter Brian Krebs writes: Several U.S. state and local government agencies have reported receiving strange letters via snail mail that include malware-laden compact discs (CDs) apparently sent from China, KrebsOnSecurity has learned. This particular ruse, while crude and simplistic, preys on the curiosity of recipients who may be enticed into popping the CD into a computer. According to a non-public alert shared with state and local government agencies by the Multi-State Information Sharing and Analysis Center (MS-ISAC), the scam arrives in a Chinese postmarked envelope and includes a "confusingly worded typed letter with occasional Chinese characters."

    发表评论 查看更多 翻译此文

    收起

  • A 17-year-old has been accused of breaking into a couple's home in Northern California and asking for their WiFi password, hours after he had asked nearby neighbors for theirs, authorities said. From a report: Police in Palo Alto said the teen, whose name has not been released, went to a home in Silicon Valley late Saturday and asked to use the residents' WiFi network "because he was out of data," before stealing their bicycle. Then just after midnight Sunday, police said, he broke into a nearby home, woke up a sleeping couple and asked them for their password. The male resident "pushed him down the hallway and out the front door of the house before calling police," police said in a statement. Palo Alto Police Sgt. Dan Pojanamat told The Washington Post on Friday that it's unclear whether the juvenile suspect was really seeking WiFi access or whether it was simply an excuse, saying that "the real issue is the fact that he entered a house that was occupied."

    发表评论 查看更多 翻译此文

    收起

  • Intel has set a concrete deadline for when it'll finally have processors built on a 10nm process in the mainstream market: holiday season 2019. While the company's 14nm manufacturing process is working well, with multiple revisions to improve performance or reduce power consumption, Intel has struggled to develop an effective 10nm process. Originally mass production was planned for as far back as 2015. In April, the company revised that to some time in 2019. The latest announcement is the most specific yet: PC systems with 10nm processors will be in the holiday season, with Xeon parts for servers following soon after. This puts mainstream, mass production still a year away. A seemingly endless string of delays. Things are not looking good for Intel.

    发表评论 查看更多 翻译此文

    收起

  • The hidden costs in a “no-cost” tablet contract

    发表评论 查看更多 翻译此文

    收起

  • According to local Idaho media, 364 inmates across at least five institutions exploited a vulnerability in their prison-issued tablets to assign nearly $225,000 worth of digital credits to their accounts. They were then able to use these credits to buy music and games. Bleeping Computer reports: The hacked tablets have been used at low-security level prisons across the U.S. for a few years now. They've been offered through a partnership between CenturyLink and JPay. Spokespersons for both companies said the vulnerability inmates exploited was identified and fixed. Officials from the Idaho Department of Correction (IDC) said there was no loss of state funds as a result of the hack, as inmates transferred only JPay-managed (fictitious) digital credits to their accounts. Most inmates transferred small amounts of credits to their tablet accounts. JPay said it recovered more than $65,000 worth of digital credits from the 364 inmate accounts. The company has suspended the ability to buy game

    发表评论 查看更多 翻译此文

    收起

  •  

    The Four Thieves Vinegar Collective

    07-28 Hacker News 17

    The Four Thieves Vinegar Collective

    发表评论 查看更多 翻译此文

    收起

  • "BuzzFeed has this story about proposals to make social media bots identify themselves as fake people," writes an anonymous Slashdot reader. "[It's] based on a paper by a law professor and a fellow researcher." From the report: General concerns about the ethical implications of misleading people with convincingly humanlike bots, as well as specific concerns about the extensive use of bots in the 2016 election, have led many to call for rules regulating the manner in which bots interact with the world. "An AI system must clearly disclose that it is not human," the president of the Allen Institute on Artificial Intelligence, hardly a Luddite, argued in the New York Times. Legislators in California and elsewhere have taken up such calls. SB-1001, a bill that comfortably passed the California Senate, would effectively require bots to disclose that they are not people in many settings. Sen. Dianne Feinstein has introduced a similar bill for consideration in the United States Senate. In our

    发表评论 查看更多 翻译此文

    收起

  • Declining costs have helped some of the country's smallest electricity providers expand their use of solar in highly innovative ways

    发表评论 查看更多 翻译此文

    收起

  • After Comcast broke a city's rules, cable lobby asked FCC to preempt them.

    发表评论 查看更多 翻译此文

    收起

  • Richard Brody recommends movies to stream like the “Mission: Impossible” series, including “The Flame and the Arrow” and “Haywire.”

    发表评论 查看更多 翻译此文

    收起

  •  

    What OpenStreetMap can be

    07-28 OSnews 16

    Over the past two years, the biggest buzz among the geo chatterati has been Justin O'Beirne's meticulously argued (albeit bizarrely formatted) feature-by-feature comparisons of Google and Apple Maps: their design choices, their data, their production processes. What fascinates me is how the comparison is implicitly phrased. Apple Maps is fighting on Google Maps' turf, and Justin O'Beirne never questions that. He asks "How far ahead of Apple Maps is Google Maps?". It implies the same direction of travel. They're going the same place, but Google is getting there quicker. Meanwhile, OpenStreetMap goes its own way. I've never actively used OpenStreetMap, but I feel like I should give it a far shot at some point. Are there people in the OSNews audience who use it? What are your experiences?

    发表评论 查看更多 翻译此文

    收起

  • Yesterday, it was reported that Charter Communications could lose its license in New York because of its failure to meet merger-related broadband deployment commitments. Today, according to Ars Technica, the New York State Public Service Commission (PSC) voted to revoke its approval of Charter Communications' 2016 purchase of Time Warner Cable (TWC). "The PSC said it is ordering Charter to sell the former TWC system that it purchased in New York, and it's 'bring[ing] an enforcement action in State Supreme Court to seek additional penalties for Charter's past failures and ongoing non-compliance," reports Ars. From the report: Charter has repeatedly failed to meet deadlines for broadband expansions that were required in exchange for merger approval, state officials said. The PSC has steadily increased the pressure on Charter with fines and threats, but Charter never agreed to changes demanded by state officials. As a result of today's vote, "Charter is ordered to file within 60 days a pl

    发表评论 查看更多 翻译此文

    收起

  •  

    Nicole Sealey Reads Ellen Bass

    07-28 THE NEW YORKER 15

    Nicole Sealey joins Kevin Young to read and discuss Ellen Bass’s poem “Indigo,” and her own poem “A Violence.”

    发表评论 查看更多 翻译此文

    收起

  •  

    What OpenStreetMap Can Be

    07-28 Slashdot 16

    An anonymous reader shares a blog post on OpenSourceMap: Most OSM commentary focuses on unimportant minutiae (layers, for goodness' sake, as if it's still 2004) without seeking to examine what makes OSM unique -- and whether that's still relevant in a rapidly changing market. Could OSM become a dead-end curio while Google, Apple, and an increasingly self-sufficient Mapbox hare off in another, common direction? OSM's continuing differentiation from Google/Apple boils down to two points. First, a non-commercial imperative. Google and Apple (and Mapbox, TomTom, HERE) are beholden to their shareholders and investors. They do what makes them money, which means car navigation. (Once human-controlled, now, increasingly, self-guided. When people ask "How far ahead of Apple is Google Maps?", what they usually mean is "Who will get to self-driving cars first?") OSM, however, isn't ruled by shareholder value, but by the preoccupations of its contributor base. (We'll come onto that demographic lat

    发表评论 查看更多 翻译此文

    收起

  • Twitter shares fell 21% on Friday as the company reported that user growth had turned negative, even as its quarterly results beat Wall Street expectations. The decline was even greater than Facebook's almost 19 percent plunge in shares after the social media giant reported disappointing results. MarketWatch reports: Twitter posted a profit for the third consecutive quarter, with its $134 million in net income equating to 13 cents a share. Adjusted per-share earnings came to 17 cents. The FactSet consensus estimate had been 16 cents. Twitter's revenue climbed 24% to $710.5 million to beat the FactSet consensus estimate by about $2 million. Even as executives talked about Twitter's bright future on the earnings calls, investors appeared to react to Twitter's slowing user growth, as its monthly user count went south, falling by 1 million to 355 million, as compared with the year's first quarter. The decline was expected after recent reports had the company purging about a million fake ac

    发表评论 查看更多 翻译此文

    收起

  •  

    Good Neighbors

    07-28 THE NEW YORKER 16

    Good Neighbors

    发表评论 查看更多 翻译此文

    收起

  • Behemoth, bully, thief: how the English language is taking over the planet

    发表评论 查看更多 翻译此文

    收起

  • Rescale Is Hiring Senior Front End Engineers in San Francisco

    发表评论 查看更多 翻译此文

    收起

  •  

    A response about dep and vgo

    07-28 Hacker News 15

    A response about dep and vgo

    发表评论 查看更多 翻译此文

    收起

  • This 4-bit arithmetic logic unit looks great and teaches important lessons about computing

    发表评论 查看更多 翻译此文

    收起

  •  

    Thoughts On Machine Learning Accuracy

    07-28 Hacker News 17

    Thoughts On Machine Learning Accuracy

    发表评论 查看更多 翻译此文

    收起

  • In a press briefing just two weeks ago, Deputy Attorney General Rod Rosenstein announced that the grand jury assembled by Special Counsel Robert Mueller had returned an indictment against 12 officers of Russia's Main Intelligence Directorate of the Russian General Staff (better known as Glavnoye razvedyvatel'noye upravleniye, or GRU). The indictment was for conducting "active cyber operations with the intent of interfering in the 2016 presidential election." [...] The allegations are backed up by data collected from service provider logs, Bitcoin transaction tracing, and additional forensics. The DOJ also relied on information collected by US (and likely foreign) intelligence and law enforcement agencies. Reading between the lines, the indictment reveals that the Mueller team and other US investigators likely gained access to things like Twitter direct messages and hosting company business records and logs, and they obtained or directly monitored email messages associated with

    发表评论 查看更多 翻译此文

    收起

  • New York City may become the first major U.S. city to cap the number of Uber and other ride-sharing vehicles on the road. According to Engadget, "The City Council is looking at proposed legislation that would largely freeze the issuance of ridesharing vehicle licenses while officials work on a year-long study of the cars' effects." Wheelchair-accessible vehicles would be exempt from any cap. From the report: This wouldn't be the first time the city tried a cap -- it abandoned an attempt in 2015. There's greater pressure to consider a limit this time, though. NYC now has over 100,000 ride-hailing cars (up from 63,000 back in 2015), and a string of suicides by both ridesharing and taxi drivers has raised questions about working conditions that can include low pay, long hours and poor compensation for time off. On top of the cap, the Council is looking at raising minimum pay and otherwise regulating on-demand transportation services. NYC is concerned that the growth of ridesharing is comi

    发表评论 查看更多 翻译此文

    收起

  • Quantum computing is still as much science as engineering; progress could destroy cryptocurrencies

    发表评论 查看更多 翻译此文

    收起

  • Includes clear dictate to "demote" comments that are "uncivil or irrelevant."

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a report from Bloomberg: A U.S. jury awarded International Business Machines Corp. $83.5 million after finding that Groupon Inc. infringed four of its e-commerce patents. Friday's verdict cements the prowess of IBM's portfolio of more than 45,000 patents and is a boon to its intellectual-property licensing revenue, which brought in $1.19 billion in 2017. The jury in Wilmington, Delaware, sided with the argument of IBM's lawyers, who had said Groupon was trying to portray IBM as claiming to have patented the Internet and had called that effort "a smoke screen." As they began the trial, IBM's lawyers said Groupon built its online coupon business on the back of IBM's e-commerce inventions without permission. [T]he patents at issue don't protect IBM's products or services, said David Hadden, Groupon's lawyer. IBM never used the patents and instead relies on its huge portfolio to extract money from other companies, he said. Two of the patents, one of which expired

    发表评论 查看更多 翻译此文

    收起

  • The Trump administration is crafting a proposal to protect Web users' privacy, aiming to blunt global criticism that the absence of strict federal rules in the United States has enabled data mishaps at Facebook and others in Silicon Valley. From a report: Over the past month, the Commerce Department has been huddling with representatives of tech giants such as Facebook and Google, Internet providers including AT&T and Comcast, and consumer advocates [Editor's note: the link may be paywalled; alternative source], according to four people familiar with the matter but not authorized to speak on the record. The government's goal is to release an initial set of ideas this fall that outlines Web users' rights, including general principles for how companies should collect and handle consumers' private information, the people said. The forthcoming blueprint could then become the basis for Congress to write the country's first wide-ranging online-privacy law, an idea the White House recentl

    发表评论 查看更多 翻译此文

    收起

  • Over on the Freedom to Tinker blog, Vitaly Shmatikov reports on some research he and others have been doing on machine-learning models—and what can be hidden inside them. "Federated learning, where models are crowd-sourced from hundreds or even millions of users, is an even juicier target. In a recent paper [PDF], we show that a single malicious participant in federated learning can completely replace the joint model with another one that has the same accuracy but also incorporates backdoor functionality. For example, it can intentionally misclassify images with certain features or suggest adversary-chosen words to complete certain sentences. When training ML [machine learning] models, it is not enough to ask if the model has learned its task well. Creators of ML models must ask what else their models have learned. Are they memorizing and leaking their training data? Are they discovering privacy-violating features that have nothing to do with their learning tasks? Are they hid

    发表评论 查看更多 翻译此文

    收起

  •  

    Restaurant noise levels are climbing

    07-28 Hacker News 15

    Restaurant noise levels are climbing

    发表评论 查看更多 翻译此文

    收起

  • Ronan Farrow reports: Six women accuse the C.E.O. of harassment and intimidation, and dozens more describe abuse at his company.

    发表评论 查看更多 翻译此文

    收起

  • Nanowire networks produce all-optical logic gates

    发表评论 查看更多 翻译此文

    收起

  • Transparent SLIs: See Google Cloud the way your application experiences it

    发表评论 查看更多 翻译此文

    收起

  • Color or Fruit? The Unlikely Etymology of “Orange”

    发表评论 查看更多 翻译此文

    收起

  • Skywatchers are being treated to the longest "blood moon" eclipse of the 21st Century. From a report: As it rises, during this total eclipse, Earth's natural satellite turns a striking shade of red or ruddy brown. The "totality" period, when light from the Moon is totally obscured, will last for one hour, 43 minutes. At least part of the eclipse is visible from Europe, the Middle East, Africa, Australia, most of Asia and South America. On the same night and over the coming days, Mars will be at its closest point to Earth since 2003 - visible as a "bright red star" where skies are clear. Here's a live feed, provided by NASA.

    发表评论 查看更多 翻译此文

    收起

  •  

    DJ rig with two Amiga 1200 PCs

    07-28 Hacker News 15

    DJ rig with two Amiga 1200 PCs

    发表评论 查看更多 翻译此文

    收起

  • Microsoft, Apple and Google are three of the world's most influential tech companies. Billions of people use personal computing platforms, tools, or devices they supply or inspire. From cloud, AI, smartphones, PCs, apps and more they've created a multi-ecosystem personal computing world that supports an increasingly-interconnected, and overlapping range of computing scenarios. Personal computing is no longer restricted to desks as a sedentary experience. Nor are users completely liberated from that setting and capable of existing fully in the mobile space. They regularly transition from desktop to mobile and across ecosystems and devices because no single platform and device moves seamlessly with them across contexts. Microsoft, through Windows 10 and Surface, has embraced a platform and hardware philosophy that drives devices that conform to users' contexts. Despite the smartphones success as mobile computing's focus, Microsoft's rivals may be missing an important industry sh

    发表评论 查看更多 翻译此文

    收起

  • John Cassidy writes about the trade deal announced between the United States and the European Union.

    发表评论 查看更多 翻译此文

    收起

  • After widespread coral bleaching in 2016, progress depends on where you look.

    发表评论 查看更多 翻译此文

    收起

  • Termgraph: Python CLI Tool to Draw Graphs

    发表评论 查看更多 翻译此文

    收起

  • Facial recognition technology does not yet have "the diversity it needs" and has "inherent biases," a top Google executive has warned. From a report: The remarks, from the firm's director of cloud computing, Diane Greene, came after rival Amazon's software wrongly identified 28 members of Congress, disproportionately people of colour, as police suspects. Google, which has not opened its facial recognition technology to public use, was working on gathering vast sums of data to improve reliability, Ms Greene said. However, she refused to discuss the company's controversial work with the military. "Bad things happen when I talk about Maven," Ms Greene said, referring to a soon-to-be abandoned project with the US military to develop artificial intelligence technology for drones. After considerable employee pressure, including resignations, Google said it would not renew its contract with the Pentagon after it lapses some time in 2019. The firm has not commented on the deal since, only to r

    发表评论 查看更多 翻译此文

    收起

  • Both companies have won contracts from NASA to develop their own versions of a space shuttle

    发表评论 查看更多 翻译此文

    收起

  • Leti’s Turbo FSK is a low-power, long-range solution for IoT

    发表评论 查看更多 翻译此文

    收起

  • A wave of opt-outs highlights distrust in the government’s security and privacy promises

    发表评论 查看更多 翻译此文

    收起

  •  

    Daily Cartoon: Friday, July 27th

    07-27 THE NEW YORKER 20

    Joe Dator’s Daily Cartoon is relieved to get out of 2018.

    发表评论 查看更多 翻译此文

    收起

  • Film's lens is aimed less at high tech, more at practical effects, amazing scenery.

    发表评论 查看更多 翻译此文

    收起

  • This is a big boon for SpaceX after more than a decade of fighting.

    发表评论 查看更多 翻译此文

    收起

  •  

    Security updates for Friday

    07-27 LWN 19

    Security updates have been issued by CentOS (java-1.8.0-openjdk and thunderbird), Debian (busybox, chromium-browser, intel-microcode, mailman, and vim-syntastic), Fedora (NetworkManager-vpnc), SUSE (exempi, java-1_8_0-ibm, libofx, libsndfile, microcode_ctl, ntfs-3g, ovmf, rpm, util-linux, webkit2gtk3, and xen), and Ubuntu (clamav and evolution-data-server).

    发表评论 查看更多 翻译此文

    收起

  • The last thing libraries need is Silicon Valley “disruption.”

    发表评论 查看更多 翻译此文

    收起

  • Twitter shares drop 14 percent after reporting declining monthly active users

    发表评论 查看更多 翻译此文

    收起

  • But you'll probably see new content posted to Jones' and InfoWars' pages.

    发表评论 查看更多 翻译此文

    收起

  • LinkedIn has been trying to make its business networking platform more like Facebook of late, with features like presence, and Google-like smart replies. Now, it's introducing voice messages just like Facebook and Facebook-owned WhatsApp. From a report: "Whether you're responding while walking or multitasking, or need to give an in-depth explanation, voice messages let you more easily and quickly communicate in your own voice with your connections," LinkedIn said in a blog. Personally, I loathe having to open voice messages on WhatsApp and have never received one on Facebook Messenger, but for the sender, at least, such services can be helpful if they're on the go and can't stop to type a message. And that's LinkedIn's justification for releasing the feature. LinkedIn thinks its new option will be a time-saver for users who find typing laborious in some situations. On the downside, this feature could rapidly become a real pain for those who already get bombarded with written messages f

    发表评论 查看更多 翻译此文

    收起

  • New submitter pgralla writes from a report via HPE: Many devices, designed for both long-term and short-term use, were shortsighted when it came to flexibility. How do you handle the hardware that never gets software updates, such as embedded systems and task-dedicated equipment? The article that pgralla shared provides the example of medical devices running Windows 7. "Many of the current generation, when they were first released, used Windows 7, and the devices still work well enough that they remain in service today," reports HPE. "But Microsoft ended mainstream support for Windows 7 back in January 2015, so the operating system gets updated only with an occasional security patch as part of Microsoft's extended support. In January 2020, that extended support will end as well." Many IoT devices are in a similar boat as they're powered by embedded Linux and are not designed to be updated after they enter service." Of course, these outdated devices create all sorts of security concerns

    发表评论 查看更多 翻译此文

    收起

  • Show HN: Kontext – Learn new words by watching movies in a foreign language

    发表评论 查看更多 翻译此文

    收起

  • This paper from four Graz University of Technology researchers [PDF] describes a mechanism they have developed to exploit the Spectre V1 vulnerability over the net, with no local code execution required. "We show that memory access latency, in general, can be reflected in the latency of network requests. Hence, we demonstrate that it is possible for an attacker to distinguish cache hits and misses on specific cache lines remotely, by measuring and averaging over a larger number of measurements. Based on this, we implemented the first access-driven remote cache attack, a remote variant of Evict+ Reload called Thrash+Reload. Our remote Thrash+Reload attack is a significant leap forward from previous remote cache timing attacks on cryptographic algorithms. We facilitate this technique to retrofit existing Spectre attacks to our network-based scenario. This NetSpectre variant is able to leak 15 bits per hour from a vulnerable target system." Other attacks described in the paper are able

    发表评论 查看更多 翻译此文

    收起

  • Bay Area cities are cracking down on free food at tech companies

    发表评论 查看更多 翻译此文

    收起

  • The Untold Story of Otto Warmbier, American Hostage

    发表评论 查看更多 翻译此文

    收起

  • Best Buy's take on Prime Day is live today; we scoured the site for what's good.

    发表评论 查看更多 翻译此文

    收起

  •  

    Understanding JavaScript Objects

    07-27 Hacker News 20

    Understanding JavaScript Objects

    发表评论 查看更多 翻译此文

    收起

  • Ask HN: How to raise a seed round for people with no elite connections?

    发表评论 查看更多 翻译此文

    收起

  •  

    Trump Family Flees to Moscow

    07-27 THE NEW YORKER 17

    Andy Borowitz jokes that Donald Trump used his Helsinki summit with Vladimir Putin to arrange for his family to defect to Russia.

    发表评论 查看更多 翻译此文

    收起

  • The study highlights the risk of Ebola “flare-ups” well after outbreaks declared over.

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a report from Science Magazine: For more than 20 years, a team of astronomers has tracked a single star whipping around the supermassive black hole at the center of our galaxy at up to 25 million kilometers per hour, or 3% of the speed of light. Now, the team says the close encounter has put Albert Einstein's theory of gravity to its most rigorous test yet for massive objects, with the light from the star stretched in a way not prescribed by Newtonian gravity. In a study announced today, the team says it has detected a distinctive indicator of Einstein's general theory of relativity called "gravitational redshift," in which the star's light loses energy because of the black hole's intense gravity. The star, called S2, is unremarkable apart from a highly elliptical orbit that takes it within 20 billion kilometers, or 17 light-hours, of the Milky Way's central black hole -- closer than any other known star. A team led by Reinhard Genzel at the Max Planck Instit

    发表评论 查看更多 翻译此文

    收起

  • MoviePass couldn’t afford to pay for movie tickets on Thursday

    发表评论 查看更多 翻译此文

    收起

  • 长安街知事:中央督查组对党政一把手动真格 2018-12-16
  • 2018“一带一路”与澳门发展国际研讨会圆满闭幕 2018-12-15
  • 一语惊坛(6月13日):中华复兴梦,有中国海洋强国梦。 2018-12-15
  • 31岁男子玩手游花费40多万 同好者:正常 2018-12-14
  • 评论:学位授权自主审核推动高校内涵发展 2018-12-14
  • 端午小长假 歌舞飞扬“剧”精彩 2018-12-14
  • 广州市越秀区人民法院公告专栏 2018-12-13
  • 世界文化遗产旅行地中国国家地理网 2018-12-13
  • 网售私房粽游走法律边缘 打养生旗号难以说清依据 2018-12-13
  • 曹建明:坚持有腐必反,坚定不移“打虎”、“拍蝇”、“猎狐” 2018-12-12
  • 文化山西:晋中是“和”文化的发祥地 2018-12-12
  • 塔里木油田:沙漠深处谱写科技生态篇章 2018-12-12
  • 买来的棕子,何来的计划经济? 2018-12-11
  • 西安培华学院招生与就业指导主任 鲍伟 2018-12-11
  • 充分发挥重要平台和有效载体作用 以特色小镇建设促进乡村振兴 2018-12-11
  • 419| 722| 215| 412| 306| 913| 530| 857| 715| 335|