News Feed Search

Results for search query: 'computing and information technology'

Page 1

Andrew Ng says Deep learning is the "New Electricity"; what this means to your organization

There’s a lot of benefits to starting to use the infrastructure you already have to start creating value now: Deep learning is particularly effective at handling noise in data, and in handling unstructured data - so if your data infrastructure is not in a good state, it’s even more important that you invest in deep learning.

Deep learning models provide deeper insight and greater accuracy, make existing products better, improve operations (e.g. Google used deep learning to reduce data center cooling requirements by 40%!)

This month’s Fortune magazine has Deep Learning as their cover story, and in it they quote Ng as saying: “In the past a lot of S&P 500 CEOs wished they had started thinking sooner than they did about their Internet strategy.

This view is shared by the always insightful Andrew Ng (Chief Scientist at Baidu, former CEO of Coursera, and head of Google Brain–and perhaps the only person I’m aware of who understands both business strategy and deep learning).

Looking externally for deep learning experts, rather than developing deep learning expertise within your existing staff, means that you will be creating a gap between your domain experts and your new data experts.

Practical Microservices Development Patterns: Sync vs. Async - DZone Microservices

Introduction When deciding to develop a microservice architecture, one of the main questions that come to mind is if we should follow a synchronous or an asynchronous approach for our service communication.

Synchronous Better for read-heavy service operations Generally provides immediate data consistency Potential for moderate scaling Tight coupling between services Simpler to design Requires special constructs such as circuit breakers to avoid cascading failures due to high load Asynchronous Better for write-heavy service operations Generally provide eventual data consistency Potential for higher scaling Loose coupling between services Comparatively more complicated to design Naturally resilient to traffic bursts and failures As we can see from the above properties, there is no single approach that is suitable for all scenarios.

Microservices that operate synchronously are more susceptible to issues such as losing data in a temporary outage of a service or the system failing in high load scenarios.

Figure 3: Microservice Architecture with HTTP and gRPC Communication As shown in Figure 3, the outermost service which interacts with the client (website) is the Admin service.

The website to the Admin service communication is done using HTTP, whereas the Admin service to internal microservices is done using gRPC in order to optimize their communication.

Huawei EMUI 11 (Android 11) to arrive in Q3 2020

Furthermore, he said that the EMUI 11 system will be an advancement of the EMUI 10.

According to reports, Hongmeng OS 2.0 system will arrive at the same time as EMUI 11.

Huawei will also further develop the “Distributed Technology” on the EMUI 11.

With EMUI 10, this technology allows the system to support HD video calls among multiple devices.

However, there are reports that with EMUI 11, it may be able to connect Huawei watches, tablets, notebooks, TVs, and other devices with different screens.

Image of article 'Train to be your most productive self with the help of these five apps'

Train to be your most productive self with the help of these five apps

And because you can't be productive if you're not physically and mentally healthy, you'll also get a lifetime subscription to MindFi, an app that helps you decompress and boost your focus, as well as a lifetime subscription to Fitterclub, a fitness program that will help you whip yourself back into shape.

You'll get a lifetime subscription to Utalk which lets you master any two languages of your choice in a way that no other language learning app can, and lifetime pass to 7 Speed Reading, a tool that can help you to read up to 3.471 with 100% comprehension.

Available on sale for only $79, this bundle nets you access to five highly-rated apps that can turn you into something akin to a superhuman — a total productivity machine.

But the key to preventing this from happening repeatedly is to work smarter and not harder, and the Superhuman Lifetime Subscription Bundle contains all the secrets to enhanced productivity and efficiency.

This is where a good CPU cooler comes into play and we've rounded up some of our favorites.

Image of article 'New Mac ransomware is even more sinister than it appears'

New Mac ransomware is even more sinister than it appears

In addition to ransomware, ThiefQuest has a whole other set of spyware capabilities that allow it to exfiltrate files from an infected computer, search the system for passwords and cryptocurrency wallet data, and run a robust keylogger to grab passwords, credit card numbers, or other financial information as a user types it in.

Wardle theorizes that the malware may have been intended to quietly run its spyware module first, collect valuable data, and only launch the noisy ransomware as a last-ditch effort to gather some funds from a victim before moving on.

Additionally, the note doesn't list an email address that victims can use to correspond with the attackers about receiving a decryption key—another sign that the malware may not actually be intended as ransomware.

So when Dinesh Devadoss, a malware researcher at the firm K7 Lab, published findings on Tuesday about a new example of Mac ransomware, that fact alone was significant.

In testing, some researchers found it harder than others to induce the malware to start encrypting files as part of its ransomware functionality, which may support Wardle's theory.

There's a debate raging in video games over whether loot boxes should be classified as gambling

Przybylski also said that blanket regulation of video games with loot box mechanics as gambling would be "apocalyptically stupid," as this would essentially mean slapping an 18+ label on a wide range of games aimed at children, such as "Fortnite" and "FIFA."

Dr Zendle's research has shown there is a correlation between spending money on loot boxes and problem gambling.

Included in the report's findings on problem gambling was the recommendation that so-called "loot boxes" in video games be immediately reclassified by the government to fall under the remit of 2005 Gambling Act.

In the UK, the House of Lords this week recommended the legal reclassification of loot boxes in video games as gambling.

Although the evidence on whether there's a causal link between loot boxes and gambling is equivocal, Dr Zendle told Business Insider that the video game industry brought this on itself.

11 of the Best Video Editing Apps for Your iPad

Filmmaker Pro is free to download, but if you want to remove watermarks from your videos, and use more tools like chroma-keying, you’ll need the “All Access” subscription, which costs $5.99 a month, $35.99 a year, or a one-time payment of $69.99.

That’s what Filmmaker Pro offers, with plenty of built-in effects and easy-to-use tools for stuff like text-creation and graphics, you can quickly throw together great looking videos in a relatively short amount of time.

PowerDirector is free to download, but if you want even more built-in effects and transitions, 4K editing, and to get rid of the watermark on your videos, then you’ll need the Premium subscription which costs $4.99 a month or $34.99 a year.

The feature set is deep, including complex video tools like keyframing, chroma-keying, effects, and masking, while also offering tools for media organization and audio editing.

Obviously, this is a tool you’d in conjunction with a dedicated video editor, but it’s still a great app to have around.

Want To Earn Purchases From First-Time Buyers? Check Out Your Data

Without data collection, you’d also miss out on a wealth of information you could use to improve your customers’ online shopping experience.

And with customers seeking smooth and reliable buying experiences, that data is truly critical.

Customer journey data also includes touchpoints on your website that can help paint a picture of the pages customers visit right before they make a purchase.

If your data shows that customers tend to check out your “About” page or access information about how you source your products during purchase visits to your site, ensure those pages are thorough and updated.

An AI-based tool can help you tap into the data you have from a consumer’s search history on your site — however brief it might be — as well as the information you’ve collected over time from similar existing customers to provide those relevant suggestions and recommendations.

Xiaomi Will Soon Offer OLED TVs: Should Samsung and LG Worry

The world’s biggest TV maker has committed $11 billion over the next five years to a new factory in Asan, South Chungcheong Province, that will focus chiefly on QD-OLED hybrids, which aim to cull the best qualities of the two high-end panel technologies.

This next-gen tech utilizes self-emissive pixels, jettisoning the need for backlighting that’s seen on LCD-based TVs, including Samsung’s highly regarded QLED lineup.

For reference, the 55-inch B9 Series from LG is currently retailing for $1,300, and Vizio’s new OLED panel is also in that similar range.

The Beijing-based tech company’s OLED panel will feature a much-coveted 120Hz refresh rate, Dolby Vision, Dolby Atmos, HDMI 2.1 support, AMD FreeSync, Nvidia G-Sync and Automatic Low Latency Mode—meaning that this OLED TV will be perfect for gamers waiting patiently for the next-gen gaming consoles from PlayStation and Xbox to hit the market.

On the heels of Vizio revealing its OLED set this week, Xiaomi has now joined the party, with the Chinese electronics giant primed to unveil a new 65-inch ultra-high-end OLED TV that’s part of the TV Master Series.

Apple @ Work: What's the impact of changing default apps on iOS for enterprise customers

Support for changing default apps is a long-requested feature, as iOS 13 and prior versions of the operating system will always direct taps on links to Safari instead of Chrome, and new emails start in Apple Mail over an app like Spike.

As part of iOS 14 and iPadOS 14’s new features, users will be able to change their default app preferences for the first time.

Through his experience deploying and managing firewalls, switches, a mobile device management system, enterprise-grade Wi-Fi, 100s of Macs, and 100s of iPads, Bradley will highlight ways in which Apple IT managers deploy Apple devices, build networks to support them, train users, stories from the trenches of IT management, and ways Apple could improve its products for IT departments.

This year, one of the key things I noticed for enterprise and K–12 customers was the ability to set default email and browsers on iPad and iPhone.

On the email side, I could see organizations that use Microsoft 365 will want to set Microsoft Outlook as the default email app on corporate devices.

Image of article 'Remote factories: The next frontier of remote work'

Remote factories: The next frontier of remote work

Image: d1sk, Getty Images/iStockphoto COVID-19 dramatically accelerated what was a slow and inconsistent deployment of remote working policies and technologies at most companies, and in a couple of months cemented remote working as a viable option for office workers.

SEE: Return to work: What the new normal will look like post-pandemic (free PDF) (TechRepublic) With the COVID-19 impact still uncertain, technology leaders are likely going to be asked to continue to leverage technology to keep workers safe, and an obvious area of benefit is the factory.

Remote inspection could be easier than you think When technologies consider factory automation, we often jump to solutions involving dozens of Internet of Things (IoT) sensors, real-time analytics, and predictive models, and quickly build the perfect solution that, while feature-rich, has the major detractor of being costly and time-consuming to implement.

In simple cases, a junior developer might be able to whip up a tool that checks the status of a couple of lights on a piece of equipment in an afternoon, and longer-term image analytics can do everything from identifying potential quality problems to ensuring production workers maintain social distancing.

Use technology to help your factory team One of the struggles of COVID-19 is the disparate impact it has had on workers, which has generally broken down along economic lines.

Apple Photos: What can you do if you crop out details and later want them back

Fortunately, both the long-discontinued iPhoto (which no longer works starting with macOS 10.15 Catalina) and the modern Photos app both support non-destructive cropping.

You can revert backwards simply to re-crop an image or reset it to its full bounds.

In both iPhoto and Photos (the steps are shockingly identical): There are a few provisos: If you have cropped the image on your iPhone or iPad with iCloud Photos enabled, you have to go back to the original device to revert cropping.

If you exported the modified image from iPhoto or Photos and deleted the original in your library, the exported copy only contains the cropped data and can’t be restored.

This Mac 911 article is in response to a question submitted by Macworld reader Nico.

Image of article 'V Shred data leak exposes PII, sensitive photos of fitness customers and trainers'

V Shred data leak exposes PII, sensitive photos of fitness customers and trainers

CSV file containing substantial PII was removed, but the rest of the bucket is still public and accessible.

TechRepublic: How to protect your remote desktop environment from brute force attacks At first, the team member said that the bucket was only used to store web assets, CSS, and media files, adding that if the resources were made non-public, members would not be able to download their meal or training plans.

ZDNet verified the open bucket and at the time of writing, many resources remain open and accessible, ranging from company materials to diet guides, workout plans, and user photos.

Combined, the files contained names, home addresses, email addresses, dates of birth, some Social Security numbers, social media accounts details, usernames and passwords, age ranges, genders, and citizenship status, among other data points.

CSV files of particular note; one that appeared to be a lead generation list, another a client email list, and a trainer list.

New analysis of one billion leaked credentials reveals that most people reuse weak passwords

Security experts recommend longer passwords as opposed to short, random ones that are difficult to remember.

Image: Randal Munroe | XKCD.com Despite the efforts of security researchers and online services to encourage the use of more complex passwords throughout the years, only 40,000 of the one billion that were analyzed were of the "high entropy" type -- meaning they're more difficult to guess thanks to their length and the use of digits, uppercase characters, and special characters.

Every year we find that more and more people are picking the worst possible passwords to secure their devices and online accounts.

In the meantime, passwords remain the most used tool for securing online accounts, and people aren't getting any better at choosing adequate ones that would make life more difficult for hackers.

Companies like Google are on a mission to stop people from reusing passwords through things like the Security Checkup Dashboard, going as far as to integrate it in Chrome.

Image of article 'Push Technology Announces Service API for its Real-Time Messaging Platform'

Push Technology Announces Service API for its Real-Time Messaging Platform

Push Technology, a provider of real-time data streaming and messaging solutions, today announced the launch of a new Service API capability for Diffusion Cloud, Push’s Real-Time API Management Cloud Platform.

The new Service API provides a REST interface for publishing and requesting data, making Diffusion available to any programming language that can make an HTTP request – there’s no longer a need to install an SDK and developers can immediately start publishing from a command line.

Push’s new Service API is a fast way to create, update, and remove topics in Diffusion Cloud services via simple HTTP requests.

While existing client SDKs remain the preferred mechanism for high-performance integrations, with the new Service API developers can quickly interact, prototype, and extend services via Diffusion Cloud to scale to serve 10’s of thousands of users in minutes.

The Service API sits on top of Push’s existing Diffusion Cloud Real-Time platform, enabling developers to mix and match application and data types; publish real-time events using existing SDKs, and query from a REST client; or have thousands of IoT sensors sending updates via HTTP by using a Topic View to dynamically transform and ingest that data into a back-end service.

API Security Weekly: Issue #90 - DZone Security

Book: API Security in Action Neil Madden has just finished his book “API Security in Action”, published by Manning.

All attackers need to do to get that stolen data from the skimmer is to just call Google Analytics APIs and ship the data to their Google Analytics account.

Unfortunately, as Amir Shaked from PerimeterX demonstrates, CSP is not really compatible with Google Analytics APIs.

Plus, there is a live demo of API hacking, as well as a new book on API security.

This week, we take a look at how Twitter API erroneously allowed browsers to cache sensitive data, and how skimmers have found a way to use Google Analytics APIs to get their hands on credit card data.

API Security Weekly: Issue #90

All attackers need to do to get that stolen data from the skimmer is to just call Google Analytics APIs and ship the data to their Google Analytics account.

Unfortunately, as Amir Shaked from PerimeterX demonstrates, CSP is not really compatible with Google Analytics APIs.

Plus, there is a live demo of API hacking, as well as a new book on API security.

This week, we take a look at how Twitter API erroneously allowed browsers to cache sensitive data, and how skimmers have found a way to use Google Analytics APIs to get their hands on credit card data.

Book: API Security in Action Neil Madden has just finished his book “API Security in Action”, published by Manning.

Image of article 'Facebook Knows a Ton About Your Health. Now It Wants to Profit From That.'

Facebook Knows a Ton About Your Health. Now It Wants to Profit From That.

The project was reportedly put on hold in the wake of the current scandal, but the stated plan was to match hospitals' patient data on diagnoses and prescription information with Facebook so the company could combine that data with its own to construct digital profiles of patients.

But in the current data economy, Facebook and other big tech companies operate as black boxes that are impossible for outside users to fully understand.

In contrast to the personal data users might post on Facebook, patient records at hospitals and other covered entities are protected by privacy laws such as the Health Insurance Portability and Accountability Act (HIPAA).

Considering the large number of patient support groups on Facebook that use the site for peer-to-peer health care and social support, there is plenty of medically-relevant data to be mined.

In 2016, Facebook was sued by a metastatic cancer patient who accused the company of violating his privacy by collecting data about his participation on cancer websites outside of Facebook.

Image of article 'How to Disable Ads, Spam Notifications in MIUI 11 on Xiaomi Phones'

How to Disable Ads, Spam Notifications in MIUI 11 on Xiaomi Phones

MIUI's stock apps are notorious spammers but thankfully, most can be put under control Now that we've taken all the steps to get rid or at least minimise ads and unwanted notifications from the native apps, it's time to deal with the excess apps that come pre-installed.

These steps alone should take care of any ads you might see within the native apps but this won't stop those same apps from flooding your notification shade with spammy alerts.

Turning off MSA in MIUI 11 should help stop ads popping up in the stock apps That's about all you need to know, but we do have some bonus steps you can follow to fully ensure all ads are gone.

However, if there's one longstanding issue we've had with its phones, it's that the software can be very annoying to use due to the pre-installed bloatware and ads in the native apps.

If you want to proactively do this for other apps too, then: After doing these steps, we haven't noticed any unwanted ads or spammy alerts clogging up our notification shade in MIUI 11, which is a refreshing change.

Image of article 'Microsoft Releases Emergency Security Updates for Windows 10, Server'

Microsoft Releases Emergency Security Updates for Windows 10, Server

Both flaws can be exploited if users of affected systems open corrupted media files within applications that use the native Windows Codecs Library.

Both vulnerabilities allow for remote code execution “in the way that Microsoft Windows Codecs Library handles objects in memory,” according to the updates.

The out-of-band updates, addressing a critical-severity flaw (CVE-2020-1425) and important-severity vulnerability (CVE-2020-1457), were sent out via Windows Update Tuesday night and affect several versions of Windows 10 and Windows Server 2019.

Microsoft has quietly pushed out two emergency security updates to fix remote code execution bugs in Microsoft Windows Codecs Library.

Microsoft said it has not detected either Windows Codecs Library flaw being exploited in the wild.

Facebook’s newest proof-of-concept VR headset looks like a pair of sunglasses

Yet Facebook is billing this new device as not a pair of augmented reality glasses, as common conceptions of AR devices go, but a legitimate VR product.

I’ll let Facebook’s research team explain one of those techniques, called “holographic optics:” Most VR displays share a common viewing optic: a simple refractive lens composed of a thick, curved piece or glass or plastic.

Here’s a top-down view: Image: Facebook The proof-of-concept glasses aren’t just thin for looks, though — they also apparently beam images to your eyes in a way that’s different than standard VR headsets on the market today.

Facebook has shown off a new proof-of-concept virtual reality headset, and it has a completely different design than most other VR devices on the market today.

The proof-of-concept headset also uses a technique Facebook calls “polarization-based optical folding” to help reduce the amount of space between the actual display and the lens that focuses the image.

Google rolls out Connected Sheets to G Suite Enterprise customers

At Google's Cloud Next ‘19 event in San Francisco last year, the search giant launched in beta the ability to analyze huge volumes of BigQuery data with Connected Sheets.

With this tool, you can connect Sheets with up to 10 billion rows of BigQuery data for analysis without SQL scripts.

This lets you extract insights in Sheets and understand that data using existing tools such as formulas, pivot tables, and charts.

Connected Sheets is intended as a replacement for Sheets data collector and it will retain all of the latter's features.

On top of those capabilities, the new release allows you to "analyze and visualize data in Sheets without needing to first extract the data."

Tell candidates what to expect from your job interviews

In my last job, I helped with a few projects (like brag documents and the engineering levels) to help make the engineering culture a little more inclusive, and I want to talk about one of them today: making the interview process a little easier to understand for candidates.

Different tech companies run their interviews in very different ways, and I think it’s silly to expect candidates to magically intuit how your company’s interview process works.

At that job we didn’t care if people used Stack Overflow during their interviews and didn’t interview for algorithms expertise, but lots of companies do interview for algorithms expertise.

My awesome coworker Kiran had a simple idea to help solve this problem: write a document explaining what to expect from the interview process!

A lot of things changed about the interview process over time, and so it needed to be kept updated.

Image of article 'Niantic announces partnership with Punchdrunk to create AR experiences'

Niantic announces partnership with Punchdrunk to create AR experiences

There are hopes that this new collaboration will lead to new advances for an augmented reality experience that will change mobile gaming, pushing it towards more of a live experience.

Niantic, known for the hit AR game Pokémon GO, has seen great success with its AR formats.

Punchdrunk is the brains behind immersive theatre experiences like Sleep No More, which focus on audiences wandering through sets as the play essentially happens around you, with the idea that it involves the viewer much more.

Pokémon's Niantic is partnering up with London-based theatre company Punchdrunk to deliver interactive augmented reality gaming experiences.

Shadow play: Scenes from Punchdrunk’s Sleep No More at the McKinnon Hotel in Shanghai (Punchdrunk) Currently, Niantic has more than 10 new games in development including prototypes working on AR wearables centred around outdoor exploration, movement and social interaction.