Toshiba’s latest flagship ultrabook offers light weight, convertible laptop/tablet functionality, 7th-generation Intel Core processors and all-day battery life, but it’s not without drawbacks.
Apple could bring augmented reality to the next iPhone, believed to launch this fall. An Apple AR headset is also reportedly in the works.
The IT vendor landscape is constantly in flux, with mergers, acquisitions, new technology developments and the growth of the cloud having a huge impact on which companies might be the most strategic partners for organizations looking to enhance their technology infrastructure.
A local privilege esclation flaw has been fixed in the Linux kernel, but several upstream distributions have yet to release updates. Administrators should plan on mitigating the vulnerability on Linux servers and workstations themselves and monitor the distributions for their update plans.
The race condition flaw in the
n_hdlc driver (drivers/tty/n_hdlc.c) in the Linux kernel through 4.10.1 (CVE-2017-2636) can lead to a double-free error in
n_hdlc_release() when accessing the
n_hdlc.tbuf list, said Alexander Popov, a researcher at Russia-based Positive Technologies who found and reported the flaw. A local, unprivileged user able to set the HDLC line discipline on the tty device could exploit this flaw and gain increased privileges over the affected system or cause a denial-of-service condition.
The more cores you can use, the better — especially with big data. But the easier a big data framework is to work with, the harder it is for the resulting pipelines, such as TensorFlow plus Apache Spark, to run in parallel as a single unit.
Researchers from MIT CSAIL, the home of envelope-pushing big data acceleration projects like Milk and Tapir, have paired with the Stanford InfoLab to create a possible solution. Written in the Rust language, Weld generates code for an entire data analysis workflow that runs efficiently in parallel using the LLVM compiler framework.
Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel’s smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics’ Knox platform later this year.
That means that organizations looking for smartphones offering government-grade security will be able to buy the Samsung Galaxy S7 or, soon, the S8 rather than the now-discontinued BlackBerry OS smartphones like the one Merkel uses.
In addition to encrypting communications and data stored on the device, the new SecuSuite also secures voice calls using the SNS standard set by Germany’s Federal Office for Information Security (BSI). Organizational app traffic is passed through an IPsec VPN, while data from personal apps can go straight to the internet. Encrypted voice calls go through a different gateway, not the VPN.
Intel’s first Optane storage modules came out in early January, but were only 32GB. Larger Optane drives with up to 1.5TB of storage capacity are on their way, and we now have a better understanding of how they’re going to perform.
The first large-capacity Optane SSD drive is the DC P4800X, which has 375GB of storage and started shipping on Sunday. The $1,520 SSD is targeted at servers. (Intel didn’t provide regional availability information.)
Intel says an enterprise Optane SSD with 750GB will ship in the second quarter, and that a 1.5TB SSD will ship in the second half of this year.
These SSDs will fit as add-in cards in the PCI-Express/NVMe and U.2 slots. That means they could work in some workstations and servers based on AMD’s 32-core Naples processors.
This piece by artist Refik Anadol takes it to infinity.
A hoax hit Facebook this week. Fake news about a fake app called Facezam claimed that the app could track down anyone by simply scanning their Facebook photos.
Thousands or millions of Facebook users fell for the hoax and freaked out. (A U.K. marketing agency created the hoax as a publicity stunt.)
The public reaction illustrates how confused people are about face recognition. In fact, everything the fake Facezam was said to do is easily done with real apps and sites.
The public is understandably hazy about the privacy and security risks of biometrics. Everybody knows biological features can be used to identify people. Police have been using fingerprints for decades, for example.