Android

Google's Android N OS Will Support Pressure-Sensitive Screens (theverge.com) 68

An anonymous reader writes: In the latest Developer Preview 2 of Android N, Google introduced new "Launcher shortcuts" to the beta OS. It allows developers to "define shortcuts which users can expose in the launcher to help them perform actions quicker." It's reminiscent of Apple's "3D Touch" feature found in the iPhone 6s and iPhone 6s Plus, which can allow for specific parts of an app to be displayed in a pop-up menu when users forcefully press on an icon or other miscellaneous piece of information developed with the feature.

As mentioned in Phandroid's report testing the "setDynamicShortcuts(List)" feature, Google offered four different scenarios where Launcher Shortcuts make sense: Navigating users to a particular location in a mapping app, sending messages to a friend in a communication app, playing the next episode of a TV show in a media app, or loading the last save point in a gaming app.

"Google says that the manufacturers who build Android devices wanted this use case addressed by the OS itself," according to The Verge, so that developers "can code for all Android devices instead of reinventing the pressure-sensitive wheel for each OEM."
Communications

New Full Duplex Radio Chip Transmits and Receives Wireless Signals At Once (ieee.org) 33

Wave723 writes: A new chip by Columbia University researchers uses a circulator made of silicon transistors to reroute signals and avoid interference from a transmitter and receiver that share the same antenna. This technology instantly doubles data capacity and could eventually be built into smartphones and tablets. The chip enables them to work around the principle of Lorentz Reciprocity, in which electromagnetic waves are thought to always travel along the same path both forward and backward. Traditionally, electronic devices required two antennas -- a transmitter and receiver -- that took turns or operated on different frequencies in order to exchange signals.
Bug

MIT Bug Finder Uncovers Flaws In Web Apps In 64 Seconds (csoonline.com) 24

itwbennett quotes a report from CSO: A new tool from MIT exploits some of the idiosyncrasies in the Ruby on Rails programming framework to quickly uncover new ones, writes Katherine Noyes. In tests on 50 popular web applications written using Ruby on Rails, the system found 23 previously undiagnosed security flaws, and it took no more than 64 seconds to analyze any given program. Ruby on Rails is distinguished from other frameworks because it defines even its most basic operations in libraries. MIT's researchers took advantage of that fact by rewriting those libraries so that the operations defined in them describe their own behavior in a logical language.
Cloud

Ubuntu Linux Continues To Dominate OpenStack and Other Clouds (zdnet.com) 23

An anonymous reader quotes a report from ZDNet: One reason Ubuntu is increasing its lead is that Jujo, Canonical's application modeling and deployment DevOps tool, has been gaining in popularity. In the latest OpenStack user survey, we see that OpenStack is finally gaining real momentum in private clouds. We also see that Ubuntu Linux is continuing to dominate OpenStack. As Canonical cloud marketing manager Bill Bauman said, "Ubuntu OpenStack continues to dominate the majority of deployments with 55 percent of production OpenStack clouds. The previous survey showed Ubuntu OpenStack at 33 percent of production clouds. Ubuntu has seen almost 67 percent growth in an area where Ubuntu was already the market leader. These numbers are a huge testament to the community support Ubuntu OpenStack receives every day." The Cloud Market's latest analysis of operating systems on the Amazon Elastic Compute Cloud (EC2) shows Ubuntu with just over 215,000 instances. Ubuntu is followed by Amazon's own Amazon Linux Amazon Machine Image (AMI), with 86,000 instances. Further back, you'll find Windows with 26,000 instances. In fourth and fifth place, respectively, you'll find Red Hat Enterprise Linux (RHEL) with 16,500 instances and then CentOS with 12,500 instances.
Android

Google Launches Customizable 'Live Cases' For Nexus Devices (techcrunch.com) 44

An anonymous reader quotes a report from TechCrunch: Google is launching a new service today that allows you to create $35 custom cases for its Nexus 5X, 6 and 6P phones. There are two variations of the Live Cases: one that allows you to pick any photo and print it onto your case, and one that lets you design and print a stylized map with the help of Google Maps. Both variations allow you to select a couple of filters and other styling options to personalize your case even more. Google says there is a programmable shortcut button on the back of the case that will allow you to launch your favorite app with a single click using NFC. Once you've created and ordered your case, Google will also let you download a wallpaper with the same design.
Media

GoPro Announces Third-Party Developer Program With Over 100 Partners (zdnet.com) 15

An anonymous reader quotes a report from ZDNet: GoPro quietly announced its Developer Program on Thursday as it looks to incorporate its action sports cameras into third-party products. The GoPro Developer Program provides toolkits, technical information and support to enable companies to add GoPro camera connectivity into their products. There is a camera toolkit for iOS and Android apps to control a GoPro camera and manage media, along with a mechanical toolkit to attach GoPro cameras to third-party products. It announced there are more than 100 companies partnering with GoPro, including brands from BMW, Fisher-Price, and Polar. GoPro showed off potential third-party integration ideas in a video showing a gesture-based camera control system.
Chrome

Chrome 50 Updates Push Notifications, Drops Support For Old Windows and OS X Versions (venturebeat.com) 168

An anonymous reader quotes a report from VentureBeat: Google today launched Chrome 50 for Windows, Mac, and Linux, adding the usual slew of developer features. You can update to the latest version now using the browser's built-in silent updater, or download it directly from google.com/chrome. As announced in November 2015, Chrome now no longer supports Windows XP, Windows Vista, OS X 10.6 Snow Leopard, OS X 10.7 Lion, nor OS X 10.8 Mountain Lion. Chrome 50 allows sites to include notification data payloads with their push messages. This eliminates the final server check -- the initial version relied on service workers to proactively fetch the information for a notification from the server, leading to problems when there were multiple messages in flight or when the device was on a poor network connection. Push notification payloads must be encrypted. Sites can now detect when a notification is closed by the user, resulting in better analytics and allowing for cross-device notification dismissal. The look of notifications can now be customized with timestamps and icons. Chrome 50 also brings support for declarative preload.
Medicine

'Neural Bypass' Links Brain To Hand To Get Around Paralysis (ieee.org) 37

An anonymous reader writes: People who are paralyzed from a spinal cord injury still generate movement commands in their brains, but those commands can't travel down their spinal cords and peripheral nerves to reach their muscles. So biomedical engineers came up with a "neural bypass" to route brain signals around the roadblock. The system has just been demonstrated by a human patient for the first time. The patient has a brain implant to record signals from his motor cortex which are sent to a computer, where a decoder algorithm figures out which signals correspond to which specific imagined movements. It then sends a command to a sleeve of electrodes the patient wears on his forearm, which stimulates his muscles in precise patterns to produce the desired hand movement. The patient has already poured from a bottle, stirred with a swizzle stick, swiped a credit card, and played Guitar Hero.
AI

Google Calendar Celebrates 10th Birthday With New Goals Feature (venturebeat.com) 19

An anonymous reader writes: Google Calendar is now 10 years old. What better way to celebrate than by adding a new goals feature to the service? The new feature lets you set a personal goal in Google Calendar, which will then find time in your schedule so you can achieve your goal. The feature is available for mobile-only users in all countries and languages where Google Calendar works. The goal is dependent on two main questions: "how often?" and "best time?" [Once you answer those questions], it will then find the best time slot in your schedule to pencil in your new goal. Goals will automatically adjust their timing throughout the week. Google Calendar will automatically reschedule if you add another event that's a direct conflict with a given goal. You can even defer a goal at any time, in which case Google Calendar will make time for it later. Using machine learning algorithms, Google Calendar gets better at scheduling the more you use it.
Facebook

Facebook's Account Kit Login System Works Via Phone Numbers, No Passwords Needed (softpedia.com) 116

An anonymous reader writes: At this year's F8 developer conference, Facebook announced a new tool called Account Kit, which can be used by app developers to support phone number-based login systems. Every time the user wants to login, they have to enter their phone number. Facebook will then send them a verification code via SMS, which they have to enter on the site. The system was already tested live, and Facebook expects it to be widely adopted, allowing sites to offer users accounts that don't require them to memorize a new password. Each developer has a 100,000 free confirmation SMS messages per month quota. Facebook claims to support SMS login operations for over 230 countries and regions, and in 40 different languages.
Encryption

Jigsaw Ransomware Deletes Your Files If You Don't Pay Or When You Reboot Your PC (bleepingcomputer.com) 108

An anonymous reader writes: Researchers found a new ransomware yesterday called Jigsaw which will first lock your files and ask for a 0.4 Bitcoin ($150 USD) payment. If users don't pay, every hour the ransomware deletes your files. If the user restarts their PC, the ransomware also deletes 1,000 more files. The good news is there's a free Decrypter available to unlock the ransomware. The Decrypter was built by Michael Gillespie, who announced yesterday on Softpedia the ID Ransomware service, which tells infected victims what kind of ransomware infection they have by allowing them to upload an encrypted file and the ransom note.
Microsoft

Badlock Vulnerability Falls Flat Against Hype (threatpost.com) 21

msm1267 quotes a report from Threatpost: Weeks of anxiety and concern over the Badlock vulnerability ended today with an anticlimactic thud. Badlock was the security boogeyman since the appearance three weeks ago of a website and logo branding the bug as something serious in Samba, an open source implementation of the server message block (SMB) protocol that provides file and print services for Windows clients. As it turns out, Badlock was hardly the remote code execution monster many anticipated. Instead, it's a man-in-the-middle and denial-of-service bug, allowing an attacker to elevate privileges or crash a Windows machine running Samba services. SerNet, a German consultancy behind the discovery of Badlock, fueled the hype at the outset with a number of since-deleted tweets that said any marketing boost as a result of its branding and private disclosure of the bug to Microsoft was a bonus for its business. For its part, Microsoft refused to join the hype machine and today in MS16-047 issued a security update it rated 'Important' for the Windows Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD). The bulletin patches one vulnerability (CVE-2016-0128), an elevation of privilege bug in both SAM and LSAD that could be exploited in a man-in-the-middle attack, forcing a downgrade of the authentication level of both channels, Microsoft said. An attacker could then impersonate an authenticated user.
Programming

Slashdot Asks: What Are Some Insults No Developer Wants To Hear? (infoworld.com) 523

snydeq writes: Flame wars in the bug tracker might be exactly the right (harsh) feedback your code needs, writes Peter Wayner in his run-down of the insults no programmer wants to hear about their code or coding skills. "The technology world is a bit different than the pretty, coiffed world of suits and salesdroids where everyone is polite, even when they hate your guts and think you're an idiot. Suit-clad managers may smile and hide their real message by the way they say you're doing "great, real great pal," but programmers often speak their minds, and when that mind has something unpleasant to say, look-out, feelings." Instead of posting this story in a click-bait fashion as presented from InfoWorld, we thought we'd ask the developers of Slashdot: What are some insults no developer wants to hear? Some of the classic insults include: N00b, /dev/null, Eye Candy, Fanboi, and [Nothing]. Are there any insults you are familiar with that aren't mentioned in the list?
Microsoft

Microsoft's BSOD Is Getting More Descriptive With QR Codes (cio.com) 156

itwbennett writes: Reddit user javelinnl posted a picture last week showing a new dreaded Blue Screen of Death (BSOD) featuring a QR code and a link that may appear in a future version of Windows 10. "Right now, the code and the link take users to a webpage that discusses generic fixes for errors that might cause a crash," writes Blair Frank from CIO. "In the future, though, Microsoft could provide a QR code that leads to more specific information about what caused the computer freeze up." As of this writing, Microsoft had not responded to Frank's request for comment, but when he forced a Blue Screen of Death on his Surface Pro 3, he was unable to get a QR code to appear, though a link to the help page did. The QR code shown in the image simply points to a generic resource page for "troubleshooting blue screen errors."
Power

Tesla Recalls 2,700 Model X Cars, Highlighting Risk of Massive Model 3 Rollout (bgr.com) 157

An anonymous reader writes: Tesla has recalled 2,700 Model X cars due to a design flaw affecting the vehicle's third row of seats. Specifically, a faulty locking hinge on the last row of seats could potentially cause the seats to collapse forward during a crash. "Despite [15] prior successful tests and no reports of a third row seat slipping in any customer vehicles," Tesla said in an email to affected owners, "we have decided to conduct a voluntary recall as a precautionary measure and will be replacing all affected third row seat backs." Even though the Model X recall is small, it brings to mind the Model 3 and what possible manufacturing issues will pertain to it. BGR writes, "The current number of Model 3 reservations is absolutely staggering and Tesla will have no choice but to get as many Model 3s manufactured and out on the road as soon as humanly possible. So even in a best-case scenario where the rollout of the Model 3 goes swimmingly, Tesla will need to do all it can to ensure that the Model 3s rolling off the line in late 2018 and early 2019 are flawless." Recalling 2,700 vehicles is one thing, but a recall affecting the Model 3 could be a logistical and publicity nightmare.
Desktops (Apple)

Apple Patent Filing Points To a Keyboard With No Keys (digitaltrends.com) 107

An anonymous reader quotes a report from Digital Trends: Apple's patent, titled "Configurable Force-Sensitive Input Structure for Electronic Devices," was filed in September 2015 and was recently made available to the public on April 7th. It states that this all-in-one input interface consists of a metal contact layer, and a sense layer combined with a drive layer mounted underneath. According to the patent, the sense and drive layers detect a force exerted on the metal contact layer. This is accomplished by using an array of pixels on the sense and drive layers that determine an input location when active pixels are aligned on both layers. The user then gets a response to his or her action thanks to a haptic feedback module and a light guide layer that lights up the "keys" through extremely tiny holes in the metal surface. The components of the force-input sensitive "structure" are enclosed within the device's chassis; thus the only exposed portion is the contact surface itself. In a provided drawing, the illustrated notebook shows four distinct input areas on the surface. However, the patent states that the device can have any number of input areas defined on the contact portion.
Bitcoin

Experts Crack Petya Ransomware, Enable Hard Drive Decryption For Free 49

Reader itwbennett writes: Petya appeared on researchers' radar last month when criminals distributed it to companies through spam emails that masqueraded as job applications. It stood out from other file-encrypting ransomware programs because it overwrites a hard drive's master boot record (MBR), leaving infected computers unable to boot into the operating system. Now, security experts have devised a method that, while not exactly straightforward, allows users to recover data from computers infected with the ransomware without paying money to cyber criminals. Folks over at BleepingComputer have confirmed that the aforementioned technique works.
Android

Academics Claim Google Android 2FA Is Breakable (theregister.co.uk) 48

totalcaos writes: Attackers who control the [browser on the] PC of a user consuming Google services (Gmail, Google+ etc) can surreptitiously push and activate apps on the user's mobile device, bypassing SMS-based two-factor authentication (2FA) via the phone. How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication is a paper that explains the wider issues of phone-based 2FA. Herbert Boss, professor of systems and security at Vrije Unversiteit Amsterdam, who co-authored the mobile security paper with the two PhD students, disclosed the vulnerability to Google but they "still [refuse] to fix it."
Operating Systems

UbuntuBSD Is Looking To Become An Official Ubuntu Flavor (softpedia.com) 117

prisoninmate quotes a report from Softpedia: UbuntuBSD maintainer and lead developer Jon Boden is now looking for a way for his operating system to contribute to the Ubuntu community and, eventually, become an official Ubuntu flavor. Just two weeks ago, [Softpedia] introduced the ubuntuBSD project, whose main design goal is to bring users an operating system powered by the FreeBSD kernel while offering them the familiarity of the Ubuntu Linux OS. Right now, ubuntuBSD is in heavy development, with a fourth Beta build out the door, and it looks like the developer already seeks official status and wants to contribute all of his work to the main Ubuntu channels. [Canonical has yet to respond.]
Open Source

Infographic: Ubuntu Linux Is Everywhere 185

prisoninmate writes: To celebrate the launch of Ubuntu 16.04 LTS, due for release later this month, on April 21, Canonical put together an interesting infographic, showing the world how popular Ubuntu is. From the infographic, it looks like there are over 60 million Ubuntu images launched by Docker users, 14 million Vagrant images of Ubuntu 14.04 LTS from HashiCorp, 20 million launches of Ubuntu instances during 2015 in public and private clouds, as well as bare metal, and 2 million new Ubuntu Cloud instances launched in November 2015. Ubuntu is used on the International Space Station, on the servers of popular online services like Netflix, Snapchat, Pinterest, Reddit, Dropbox, PayPal, Wikipedia, and Instagram, in Google, Tesla, George Hotz, and Uber cars. It is also employed at Bloomberg, Weta Digital and Walmart, at the Brigham Young University to control the Mars Rover, and it is even behind the largest supercomputer in the world.

Slashdot Top Deals