Oracle

Oracle Announces Java SE 9 and Java EE 8 (oracle.com) 46

rastos1 writes: Oracle has announced the general availability of Java SE 9 (JDK 9), Java Platform Enterprise Edition 8 (Java EE 8) and the Java EE 8 Software Development Kit (SDK). JDK 9 is a production-ready implementation of the Java SE 9 Platform Specification, which was recently approved together with Java EE 8 in the Java Community Process (JCP). Java SE 9 provides more than 150 new features, including a new module system and improvements that bring more scalability, improved security, better performance management and easier development to the world's most popular programming platform.
The Internet

Move Over Connected Cows, the Internet of Bees Is Here (cityam.com) 39

A new project is aiming to bring bees online by putting them in tiny "backpacks" so that scientists can track the threatened insect's behaviour and help its survival. From a report: Bees in Manchester initially will be connected to the internet using technology from Cisco to help researchers track their migration, pollination and movement, and eventually, across the UK. Sensors in hives located at a new 70,000 sq ft tech accelerator hub in the northern city called Mi-Idea, will measure the bee environment such as temperature, while the bees themselves will be tagged with RFID chips that look like tiny backpacks. All the information will be collected and made available to track online giving insight on their habitats, with the bees even providing "status updates" (albeit automated) on their whereabouts. Cisco is working on the project with the Manchester Science Partnership (MSP) and the hub is already home to six startups: Hark, an IoT data company, video platform Wattl, location data analytics startup PlaceDashboard, Steamaco, an energy technology company, IOT platform KMS and software firm Malinko.
Red Hat Software

Red Hat Pledges Patent Protection For 99 Percent of FOSS-ware (theregister.co.uk) 62

Red Hat says it has amassed over 2,000 patents and won't enforce them if the technologies they describe are used in properly-licensed open-source software. From a report: The company has made more or less the same offer since 2002, when it first made a "Patent Promise" in order to "discourage patent aggression in free and open source software." Back then the company didn't own many patents and claimed its non-enforcement promise covered 35 per cent of open-source software. The Promise was revised in order to reflect the company's growing patent trove and to spruce up the language it uses to make it more relevant. The revised promise "applies to all software meeting the free software or open source definitions of the Free Software Foundation (FSF) or the Open Source Initiative (OSI)." [...] It's not a blank cheque. Hardware isn't covered and Red Hat is at pains to point out that "Our Promise is not an assurance that Red Hat's patents are enforceable or that practicing Red Hat's patented inventions does not infringe others' patents or other intellectual property." But the company says 99 percent of FOSS software should be covered by the Promise.
The Almighty Buck

Why You Shouldn't Imitate Bill Gates If You Want To Be Rich (bbc.com) 275

dryriver writes: BBC Capital has an article that debunks the idea of "simply doing what highly successful people have done to get rich," because many of those "outliers" got rich under special circumstances that are not possible to replicate. An excerpt: "Even if you could imitate everything Gates did, you would not be able to replicate his initial good fortune. For example, Gates's upper-class background and private education enabled him to gain extra programming experience when less than 0.01% of his generation then had access to computers. His mother's social connection with IBM's chairman enabled him to gain a contract from the then-leading PC company that was crucial for establishing his software empire. This is important because most customers who used IBM computers were forced to learn how to use Microsoft's software that came along with it. This created an inertia in Microsoft's favor. The next software these customers chose was more likely to be Microsoft's, not because their software was necessarily the best, but because most people were too busy to learn how to use anything else. Microsoft's success and marketshare may differ from the rest by several orders of magnitude but the difference was really enabled by Gate's early fortune, reinforced by a strong success-breeds-success dynamic."
AI

A New Zealand Company Built An AI Baby That Plays the Piano (bloomberg.com) 86

pacopico writes: A New Zealand company called Soul Machines has built a disturbingly lifelike virtual baby powered by artificial intelligence software. According to a Bloomberg story, the baby has learned to read books, play the piano and draw pictures. The work is built off the research of Mark Sagar, the company's CEO, who is on a quest to mimic human consciousness in a machine. Sagar used to work at Weta creating lifelike faces for films like King Kong and Avatar and is now building these very realistic looking virtual avatars and pumping them full of code that not only handles things like speech but that also replicates the nervous system and brain function. The baby, for example, has virtual dopamine receptors that fire when it feels joy from playing the piano. What could go wrong?
Games

PC Gaming Is Back in Focus at Tokyo Game Show (bloomberg.com) 148

After taking a back seat to consoles for the past few years, personal computers are enjoying a resurgence in gaming, thanks to the popularity of e-sports, customizable machines and faster software releases. From a report: This week's Tokyo Game Show will feature a main-stage tournament for PlayerUnknown's Battlegrounds, a hit online survival PC game that's been downloaded more than 10 million times since March. Sony's PlayStation 4 and Microsoft's Xbox One consoles are heading into their fifth years, while Nintendo's Switch is in a bit of a lull before new titles are released for the year-end holiday shopping season. Spending on gaming-ready PC rigs are on track to climb an average of 6.6 percent per year through 2020, while the market as a whole is projected to decline 3.8 percent annually, according to Gartner. Revenue from PC titles will grow by 3 to 4 percent over the coming years, while console-game sales are seen flat, according to DFC Intelligence. Written off years ago for being too expensive, complex and bulky for mass appeal, gaming PCs are seeing a resurgence that could even threaten consoles, according to Kazunori Takahashi, Japan gaming head at Nvidia. "The abundance of titles and the popularity of e-sports is bringing a lot of excitement to PC gaming," said Takahashi, whose employer supplies graphic chips to PC and console makers. Even in Japan, "it's not unreasonable to think that PCs can eventually become a presence that threatens console gaming."
China

John McAfee Said Top Executives From the Major Bitcoin Exchanges Weren't Allowed To Leave China (wsj.com) 94

An anonymous reader shares a report: China's widening crackdown on bitcoin trading resulted in a travel ban of sorts for two executives from the country's largest commercial bitcoin exchanges, which regulators are closing down. From a report: On Thursday, top executives of two Chinese digital currency exchanges who were scheduled to speak at an industry conference in Hong Kong didn't show up and their sessions were canceled. The event's organizer, a bitcoin-trading firm called Bitkan, didn't provide a reason. The two executives were Lin Li, chief executive of Huobi, and Justin Pan, who the event organizer listed as being the chief operating officer of OKCoin. The two-day conference was originally supposed to be held in Beijing but its organizers last week decided to shift the venue to Hong Kong after Chinese regulators earlier this month ordered digital-currency exchanges to wind down their operations. Software pioneer and former fugitive John McAfee -- a high-profile but controversial character in the bitcoin industry -- told conference attendees on Wednesday that top executives from the major bitcoin exchanges are currently not allowed to leave China.
Security

The CCleaner Malware Fiasco Targeted at Least 20 Specific Tech Firms (wired.com) 146

An anonymous reader shares a report: Hundreds of thousands of computers getting penetrated by a corrupted version of an ultra-common piece of security software was never going to end well. But now it's becoming clear exactly how bad the results of the recent CCleaner malware outbreak may be. Researchers now believe that the hackers behind it were bent not only on mass infections, but on targeted espionage that tried to gain access to the networks of at least 20 tech firms. Earlier this week, security firms Morphisec and Cisco revealed that CCleaner, a piece of security software distributed by Czech company Avast, had been hijacked by hackers and loaded with a backdoor that evaded the company's security checks. It wound up installed on more than 700,000 computers. On Wednesday, researchers at Cisco's Talos security division revealed that they've now analyzed the hackers' "command-and-control" server to which those malicious versions of CCleaner connected. On that server, they found evidence that the hackers had attempted to filter their collection of backdoored victim machines to find computers inside the networks of 20 tech firms, including Intel, Google, Microsoft, Akamai, Samsung, Sony, VMware, HTC, Linksys, D-Link and Cisco itself. In about half of those cases, says Talos research manager Craig Williams, the hackers successfully found a machine they'd compromised within the company's network, and used their backdoor to infect it with another piece of malware intended to serve as a deeper foothold, one that Cisco now believes was likely intended for industrial espionage.
AI

Tesla Is Working With AMD To Develop Its Own AI Chip For Self-Driving Cars (cnbc.com) 49

An anonymous reader quotes a report from CNBC: Tesla is getting closer to having its own chip for handling autonomous driving tasks in its cars. The carmaker has received back samples of the first implementation of its processor and is now running tests on it, said a source familiar with the matter. The effort to build its own chip is in line with Tesla's push to be vertically integrated and decrease reliance on other companies. But Tesla isn't completely going it alone in chip development, according to the source, and will build on top of AMD intellectual property. On Wednesday Sanjay Jha, CEO of AMD spin-off GlobalFoundries, said at the company's technology conference in Santa Clara, California, that the company is working directly with Tesla. GlobalFoundries, which fabricates chips, has a wafer supply agreement in place with AMD through 2020. Tesla's silicon project is bounding ahead under the leadership of longtime chip architect Jim Keller, the head of Autopilot hardware and software since the departure of Apple veteran Chris Lattner in June. Keller, 57, joined Tesla in early 2016 following two stints at AMD and one at Apple. Keller arrived at Apple in 2008 through its acquisition of Palo Alto Semiconductor and was the designer of Apple's A4 and A5 iPhone chips, among other things. More than 50 people are working on the initiative under Keller, the source said. Tesla has brought on several AMD veterans after hiring Keller, including director Ganesh Venkataramanan, principal hardware engineer Bill McGee and system circuit design lead Dan Bailey.
Businesses

Apple Admits To Apple Watch LTE Problems Just Before It Ships (theverge.com) 79

Lauren Goode, reporting for The Verge: Apple's new Series 3 smartwatch starts shipping this Friday, and the biggest feature change between last year's model and this new Watch is that it has built-in cellular capabilities. Except, that cell service isn't entirely reliable. While writing my review of the Apple Watch Series 3 with LTE capabilities, I experienced notable connectivity issues. The new Watch appeared to try to connect to unknown WiFi networks instead of connecting to cellular, when I was out and about without my phone. Within the first couple days of experiencing this, Apple replaced my first review unit with a second one, but that one proved to be problematic, too. Eventually, the company issued an official statement, acknowledging the issue. "We have discovered that when Apple Watch Series 3 joins unauthenticated Wi-Fi networks without connectivity, it may at times prevent the watch from using cellular," an Apple spokesperson said in an emailed statement. "We are investigating a fix for a future software release."
IOS

iOS 11 Released (theverge.com) 135

Today, Apple released the final version of iOS 11, its latest mobile operating system. If you have an iPhone or iPad that was released within the last few years, you should be able to download the new update if you navigate to the Settings panel and check for a software update under the General tab. The Verge reports: OS 11, first unveiled in detail back at Apple's WWDC in June, is the same incremental annual refresh we've come to expect from the company, but it hides some impressive complexity under the surface. Not only does it add some neat features to iOS for the first time, like ARKit capabilities for augmented reality and a new Files app, but it also comes with much-needed improvements to Siri; screenshot capture and editing; and the Control Center, which is now more fully featured and customizable. For iPads, iOS 11 is more of an overhaul. The software now better supports multitasking so you can more easily bring two apps into split-screen mode, or even add a third now. The new drag-and-drop features are also much more powerful on iPad, letting you manage stuff in the Files app more intuitively and even letting you drag and drop photos and text from one app to another.
Technology

What Comes After User-Friendly Design? (fastcodesign.com) 187

Kelsey Campbell-Dollaghan, writing for FastCoDesign: "User-friendly" was coined in the late 1970s, when software developers were first designing interfaces that amateurs could use. In those early days, a friendly machine might mean one you could use without having to code. Forty years later, technology is hyper-optimized to increase the amount of time you spend with it, to collect data about how you use it, and to adapt to engage you even more. [...] The discussion around privacy, security, and transparency underscores a broader transformation in the typical role of the designer, as Khoi Vinh, principal designer at Adobe and frequent design writer on his own site, Subtraction, points out. So what does it mean to be friendly to users-er, people-today? Do we need a new way to talk about design that isn't necessarily friendly, but respectful? I talked to a range of designers about how we got here, and what comes next.
Privacy

In a 'Plot Twist', Wikileaks Releases Documents It Claims Detail Russia Mass Surveillance Apparatus (techcrunch.com) 166

WikiLeaks, believed by many to be a Kremlin front, surprised some observers Tuesday morning (Snowden called it a "plot twist") when it released documents linking a Russian tech company with access to thousands of citizens' telephone and internet communications with Moscow. From a report: Writing a summary of the cache of mostly Russian-language documents, Wikileaks claims they show how a long-established Russian company which supplies software to telcos is also installing infrastructure, under state mandate, that enables Russian state agencies to tap into, search and spy on citizens' digital activity -- suggesting a similar state-funded mass surveillance program to the one utilized by the U.S.'s NSA or by GCHQ in the U.K. (both of which were detailed in the 2013 Snowden disclosures). The documents which Wikileaks has published (there are just 34 "base documents" in this leak) relate to a St. Petersburg-based company, called Peter-Service, which it claims is a contractor for Russian state surveillance. The company was set up in 1992 to provide billing solutions before going on to become a major supplier of software to the mobile telecoms industry.
Iphone

Developer Marco Arment Shares Thoughts On iPhone X's Notch (marco.org) 194

Developer Marco Arment writes about the infamous notch on the iPhone X, which Apple has told developers to embrace rather than ignore: This is the new shape of the iPhone. As long as the notch is clearly present and of approximately these proportions, it's unique, simple, and recognizable. It's probably not going to significantly change for a long time, and Apple needs to make sure that the entire world recognizes it as well as we could recognize previous iPhones. That's why Apple has made no effort to hide the notch in software, and why app developers are being told to embrace it in our designs. That's why the HomePod software leak depicted the iPhone X like this: it's the new basic, recognizable form of the iPhone. Apple just completely changed the fundamental shape of the most important, most successful, and most recognizable tech product that the world has ever seen.
Windows

'Bashware' Attacks Exploit Windows 10's Subsystem for Linux (betanews.com) 79

Mark Wilson quote BetaNews: While many people welcomed the arrival of Windows Subsystem for Linux (WSL) in Windows 10, it has been found to be a potential security issue. A new technique known as a Bashware has been discovered by security researchers that makes it possible for malware to use the Linux shell to bypass security software.

While administrator access is needed to execute a Bashware attack, this is fairly easily obtained, and the technique can be used to disguise malicious operations from antivirus software and other security tools. Researchers from Check Point Research point out that the danger stems from the fact that "existing security solutions are still not adapted to monitor processes of Linux executables running on Windows."

Java

IBM Open Sources Their Own JVM/JDK As Eclipse OpenJ9 (eclipse.org) 174

IBM has open sourced a "high performance, scalable virtual machine" with "a great pedigree... [it's] at the core of many IBM enterprise software products." Slashdot reader dxb1230 writes: IBM has open sourced their JDK/JVM implementation named J9 as OpenJ9. The community now has an alternative implementation of Java which has been well tested on enterprise workloads and hardware. This unlike, OpenJDK, has all the bells and whistles like jit.
Open Source

Ask Slashdot: What's the Best Business Model for An Open Source Developer? 84

An anonymous reader writes: I'm interested in creating really good open source software. However, unless programmers have an incentive to work on their projects for long periods, many projects are be abandoned.

There's many business models surrounding free/libre open source software: support (pay for help, or additional features), premium (pay for more advanced software), hosting (pay for using the software on someone else's servers), donation (two versions of the same app, pay because you want to be nice to the developers), etc. Not all of those business models align the interests of the developer and the customer/user in the same way: support-based models for example, benefit developers who introduce certain mistakes or delay introducing features. (In the short term. In the long run, it opens a door for competitors...) Which of those align the interests of both?

The original submission also asks if any of these models are "morally questionable" -- and if there's other business models that have proven successful for open source software. Leave your best thoughts in the comments. What's the best business model for an open source developer?
Python

Python's Official Repository Included 10 'Malicious' Typo-Squatting Modules (bleepingcomputer.com) 69

An anonymous reader quotes BleepingComputer: The Slovak National Security Office (NBU) has identified ten malicious Python libraries uploaded on PyPI -- Python Package Index -- the official third-party software repository for the Python programming language. NBU experts say attackers used a technique known as typosquatting to upload Python libraries with names similar to legitimate packages -- e.g.: "urlib" instead of "urllib." The PyPI repository does not perform any types of security checks or audits when developers upload new libraries to its index, so attackers had no difficulty in uploading the modules online.

Developers who mistyped the package name loaded the malicious libraries in their software's setup scripts. "These packages contain the exact same code as their upstream package thus their functionality is the same, but the installation script, setup.py, is modified to include a malicious (but relatively benign) code," NBU explained. Experts say the malicious code only collected information on infected hosts, such as name and version of the fake package, the username of the user who installed the package, and the user's computer hostname. Collected data, which looked like "Y:urllib-1.21.1 admin testmachine", was uploaded to a Chinese IP address. NBU officials contacted PyPI administrators last week who removed the packages before officials published a security advisory on Saturday."

The advisory lays some of the blame on Python's 'pip' tool, which executes arbitrary code during installations without requiring a cryptographic signature.

Ars Technica also reports that another team of researchers "was able to seed PyPI with more than 20 libraries that are part of the Python standard library," and that group now reports they've already received more than 7,400 pingbacks.
Facebook

WordPress Ditches ReactJS Over Facebook's Patent Clause (techcrunch.com) 72

An anonymous reader quote TechCrunch: Matt Mullenweg, the co-founder of the popular open source web publishing software WordPress, has said the community will be pulling away from using Facebook's React JavaScript library over concerns about a patent clause in Facebook's open source license. In a blog post explaining the decision yesterday, Mullenweg said he had hoped to officially adopt React for WordPress -- noting that Automattic, the company behind WordPress.com which he also founded, had already used React for the Calypso ground-up rewrite of WordPress.com a few years ago, while the WordPress community had started using it for its major Gutenberg core project.

But he said he has changed his mind after seeing Facebook dig in behind the patent clause -- which was recently added to the Apache Software Foundation's list of disallowed licenses... [H]e writes that he cannot, in good conscience, require users of the very widely used open source WordPress software to inherit the patent clause and associated legal risk. So he's made the decision to ditch React.

Facebook can revoke their license if a React user challenges Facebook's patents.
Piracy

Can The Pirate Bay Replace Ads With A Bitcoin Miner? (betanews.com) 122

Mark Wilson writes: When it comes to the Pirate Bay, it's usually movie studios, music producers and software creators that get annoyed with the site — you know, copyright and all that. But in an interesting twist it is now users who find themselves irked by and disappointed in the most famous torrent site in the world.

So what's happened? Out of the blue, the Pirate Bay has added a Javascript-powered Bitcoin miner to the site. Nestling in the code of the site is an embedded cryptocurrency miner from Coinhive. Users who have noticed an increase in resource usage on their computers as a result of this are not happy.

TorrentFreak reports the miner is being tested for about 24 hours -- as a possible way to earn enough revenue to remove advertising from the site.

Slashdot Top Deals