Amazon may have a slight lead in the world of Android-based TV-centric mini-boxes with its Amazon Fire TV, but according to this story, Google is getting set to release just such a box itself.
"According to documents obtained exclusively by The Verge, Google is about to launch a renewed assault on your television set called Android TV. Major video app providers are building for the platform right now. Android TV may sound like a semantic difference — after all, Google TV was based on Android — but it’s something very different. Android TV is no longer a crazy attempt to turn your TV into a bigger, more powerful smartphone. "Android TV is an entertainment interface, not a computing platform," writes Google. "It’s all about finding and enjoying content with the least amount of friction." It will be "cinematic, fun, fluid, and fast." ...
What does that all mean? It means that Android TV will look and feel a lot more like the rest of the set top boxes on the market, including Apple TV, Amazon’s Fire TV, and Roku."
An anonymous reader writes "As if the automated take downs on Youtube weren't already bad enough, today fans of the popular open source 3D software Blender were greeted by a copyright take down notice for their third open movie, Sintel, despite it being released under a Creative Commons license: 'This video contains content from Sony Pictures Movies & Shows, who has blocked it on copyright grounds.' It is believed that the takedown was a result of Sony Electronics adding Sintel to their official 4k demo pool."
An anonymous reader writes "Linux kernel developers are currently evaluating the possibility of using QR codes to display kernel oops/panic messages. Right now a lot of text is dumped to the screen when a kernel oops occurs, most of which isn't easily archivable by normal Linux end-users. With QR codes as Linux oops messages, a smart-phone could capture the display and either report the error string or redirect them to an error page on Kernel.org. The idea of using QR codes within the Linux kernel is still being discussed by upstream developers."
mdsolar (1045926) writes "Owners of at least two dozen nuclear reactors across the United States, including the operator of Indian Point 2, in Buchanan, N.Y., have told the Nuclear Regulatory Commission that they cannot show that their reactors would withstand the most severe earthquake that revised estimates say they might face, according to industry experts. As a result, the reactors' owners will be required to undertake extensive analyses of their structures and components. Those are generally sturdier than assumed in licensing documents, but owners of some plants may be forced to make physical changes, and are likely to spend about $5 million each just for the analysis."
A few months back, we posted a video interview with some of the folks behind the Linux-friendly, x86-based MinnowBoard. TechCrunch reports the release of a more powerful version of the same all-in-one computer, now with a 1.91GHz Atom E3845 processor. According to the linked article, "The board's schematics are also available for download and the Intel graphics chipset has open-source drivers so hackers can have their way with the board. While it doesn’t compete directly with the Raspberry Pi – the Pi is more an educational tool and already has a robust ecosystem – it is a way for DIYers to mess around in x86 architected systems as well as save a bit of cash. The system uses break-out boards called Lures to expand functionality."
We mentioned a few days ago the USAID-funded SMS social network that was connecting Cubans against the wishes of the Cuban government. Now Glen Greenwald's The Intercept has more on this kind of back-channel government intervention via what he characterizes as "the Internet propaganda bucket." Advocatus Diaboli (1627651) writes with an excerpt: "These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to "discrediting" the agency's enemies with false information spread online.
The documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual "SIGDEV" gathering of the "Five Eyes" surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda."
redletterdave (2493036) writes "Facebook owns virtually all the aspects of the social experience—photos (Instagram), status updates (Facebook), location services (Places)—but now, Facebook is transitioning from a simple social network to a full-fledged technology company that rivals Google, moonshot for moonshot. Yet, it's Facebook's corporate control of traffic that leads many to distrust the company. In a sense, people are stuck. When the time comes for someone to abandon Facebook, whether over privacy concerns or frustration with the company, Facebook intentionally makes it hard to leave. Even if you delete your account, your ghost remains—even when you die, Facebook can still make money off you. And that's not behavior fit for a company that's poised to take over the future."
An anonymous reader writes "I am a new Linux user; I'm on 2nd day now. Currently I am trying out Ubuntu, but that could change. I am looking for a user friendly firewall that I can set up that lets me do these things:1) set up a default deny rule 2) carve out exceptions for these programs: browser, email client, chat client, yum and/or apt. 3) carve out exceptions to the exceptions in requirement 2 — i.e. I want to be able to then block off IPs and IP ranges known to be used by malware, marketers, etc., and all protocols which aren't needed for requirement 2. It also needs to have good enough documentation that a beginner like me can figure it out. Previously, I had done all of the above in AVG Firewall on Windows, and it was very easy to do. So far, I have tried these things:1) IPTABLES — it looked really easy to screw it up and then not notice that it's screwed up and/or not be able to fix it even if I did notice, so I tried other things at that point... 2) searched the internet and found various free firewalls such as Firestarter, GUFW, etc., which I weren't able to make meet my requirements. Can someone either point me to a firewall that meets my needs or else give me some hints on how to make firestarter or GUFW do what I need?"
An anonymous reader writes "Since Edward Snowden started making NSA files public last year, GSMK has seen a jump in sales. There are more than 100,000 CryptoPhones in use today. How secure they really are will be determined in the future. But I'm sure that some government agencies, not just in the U.S., are very interested in getting a list of users."
For the price the company's charging for a modified Galaxy S3, it had better be as secure as they claim; otherwise, the free and open source RedPhone from Moxie Marlinspike's Whisper Systems seems like something to think about first.
New submitter arsheive (609065) writes with a link to this interesting RPS brainteaser: "How do you play against an opponent who _must_ throw Rock 50% of the time, and how much would you be willing to pay to play against them?"
First time accepted submitter RealSurreal (620564) writes "British web host 123-reg, which previously advertised 'no hidden transfer fees' has angered customers by introducing a £12 fee per domain for transfers out. Best of all, they didn't bother to tell anyone they were doing it relying instead on terms and conditions which say : '123-reg reserves the right to change, add, subtract or in way alter these Conditions without the prior consent of the Client.'"
An anonymous reader writes "Microsoft [Thursday] announced a change to how it handles adware, a form of malware that pushes unwanted advertisements to the user. As of July 1, the company's security products will immediately stop any adware they detect and notify the user, who can then restore the program if they wish. Currently, when any of Microsoft's security products (including Microsoft Security Essentials and Microsoft Forefront) detects a program as adware, it will alert the user and offer them a recommended action. If the user doesn't do anything, the security product will let the program continue to run until the user makes a decision." If adware is malware, why wait until July?
theodp (442580) writes "Over the years, Mozilla's reliance on Google has continued to grow. Indeed, in its report on Brendan Eich's promotion to CEO of Mozilla, the WSJ noted that "Google accounted for nearly 90% of Mozilla's $311 million in revenue." So, with its Sugar Daddy having also gone on record as being virulently opposed to Proposition 8, to think that that Google's support didn't enter into discussions of whether Prop 8 backer Eich should stay or go seems, well, pretty much unthinkable. "It is the chilling and discriminatory effect of the proposition on many of our employees that brings Google to publicly oppose Proposition 8," explained Google co-founder Sergey Brin in 2008. "We should not eliminate anyone's fundamental rights, whatever their sexuality, to marry the person they love." Interestingly, breaking the news of Eich's resignation was journalist Kara Swisher, whose right to marry a top Google exec in 2008 was nearly eliminated by Prop 8. "In an interview this morning," wrote Swisher, "Mozilla Executive Chairwoman Mitchell Baker said that Eich's ability to lead the company that makes the Firefox Web browser had been badly damaged by the continued scrutiny over the hot-button issue, which had actually been known since 2012 inside the Mozilla community." Swisher, whose article was cited by the NY Times in The Campaign Against Mozilla's Brendan Eich, added that "it was not hard to get the sense that Eich really wanted to stick strongly by his views about gay marriage, which run counter to much of the tech industry and, increasingly, the general population in the U.S. For example, he repeatedly declined to answer when asked if he would donate to a similar initiative today." So, was keeping Eich aboard viewed by Mozilla — perhaps even by Eich himself — as a possible threat to the reported $1 billion minimum revenue guarantee the organization enjoys for delivering search queries for Google?"
jones_supa (887896) writes "Japan has ordered a destroyer in the Sea of Japan to strike any ballistic missiles that may be launched by North Korea in the coming weeks after Pyongyang fired a Rodong medium-range missile over the sea. Japanese Defense Minister Itsunori Onodera issued the order on Thursday, but did not make it public in order to avoid putting a chill on renewed talks between Tokyo and Pyongyang. The Rodong missile fell into the sea after flying 650 km, short of a maximum range thought to be some 1,300 km, which means it could reach Japan. Japanese Aegis destroyers in the Sea of Japan are equipped with advanced radar equipment able to track multiple targets and carry missiles designed to take out targets at the edge of space."
According to reader sciencehabit (1205606), Kenneth Ka-Ho Lee, the embryologist who has been live-blogging his attempt to reproduce a new kind of stem cells, has given up, writing on this Research Gate page, "I don't think STAP cells exist and it will be a waste of manpower and research funding to carry on with this experiment any further." From the linked article: "Though he is giving up, he hopes others will continue to investigate whether the new approach – which has dogged by controversy and claims of research misconduct — can really lead to stem cells."
An anonymous reader writes "A mystery [Major League Baseball] team has made a sizable investment in Cray's latest effort at bringing graph analytics at extreme scale to bat. Nicole Hemsoth writes that what the team is looking for is a "hypothesis machine" that will allow them to integrate multiple, deep data wells and pose several questions against the same data. They are looking for platforms that allow users to look at facets of a given dataset, adding new cuts to see how certain conditions affect the reflection of a hypothesized reality."
mspohr (589790) writes with this news from the BBC: "The discovery of bugs in software used to run oil rigs, refineries and power plants has prompted a global push to patch the widely used control system. The bugs were found by security researchers and, if exploited, could give attackers remote access to control systems for the installations. The U.S. Department of Homeland Security said an attacker with 'low skill' would be able to exploit the bugs. About 7,600 plants around the world are using the vulnerable software. 'We went from zero to total compromise,' said Juan Vazquez, a researcher at security firm Rapid7 who, with colleague Julian Diaz, found several holes in Yokogawa's Centum CS 3000 software which was first released to run on Windows 98 to monitor and control machinery in many large industrial installations. The researchers also explored other SCADA software: 'We ended up finding over 1,000 bugs in 100 days.'" The vulnerabilities reported are in Yokogawa's Centum CS 300 industrial control software.