Feed aggregator

A Third Of the Planet's Population Is Exposed To Deadly Heatwaves

Slashdot -

An anonymous reader shares a report: Nearly a third of the world's population is now exposed to climatic conditions that produce deadly heatwaves, as the accumulation of greenhouse gases in the atmosphere makes it "almost inevitable" that vast areas of the planet will face rising fatalities from high temperatures, new research has found. Climate change has escalated the heatwave risk across the globe, the study states, with nearly half of the world's population set to suffer periods of deadly heat by the end of the century even if greenhouse gases are radically cut. "For heatwaves, our options are now between bad or terrible," said Camilo Mora, an academic at the University of Hawaii and lead author of the study. High temperatures are currently baking large swaths of the south-western US, with the National Weather Service (NWS) issuing an excessive heat warning for Phoenix, Arizona, which is set to reach 119F (48.3C) on Monday. The heat warning extends across much of Arizona and up through the heart of California, with Palm Springs forecast a toasty 116F (46.6C) on Monday and Sacramento set to reach 107F (41.6C).

Read more of this story at Slashdot.

Leaked Recording: Inside Apple's Global War On Leakers

Slashdot -

Reader citadrianne writes: A recording of an internal briefing at Apple earlier this month obtained by The Outline sheds new light on how far the most valuable company in the world will go to prevent leaks about new products. The briefing, titled 'Stopping Leakers -- Keeping Confidential at Apple,' was led by Director of Global Security David Rice, Director of Worldwide Investigations Lee Freedman, and Jenny Hubbert, who works on the Global Security communications and training team. According to the hour-long presentation, Apple's Global Security team employs an undisclosed number of investigators around the world to prevent information from reaching competitors, counterfeiters, and the press, as well as hunt down the source when leaks do occur. Some of these investigators have previously worked at U.S. intelligence agencies like the National Security Administration (NSA), law enforcement agencies like the FBI and the U.S. Secret Service, and in the U.S. military. Top-notch reporting from The Outline, consider reading the full report. During the briefing, a company executive said they have been able to find two employees who leaked information to media.

Read more of this story at Slashdot.

Time Warner Will Spend $100 Million On Snapchat Original Shows, Ads

Slashdot -

An anonymous reader quotes a report from TechCrunch: Time Warner and Snap Inc. have announced a new deal that will bring increased ad spending and the development of new made-for-Snapchat shows. People familiar with the deal tell TechCrunch that it is valued at about $100 million spent over the next two years. The newly created shows will span a variety of genres, including scripted drama, daily news shows, documentaries and comedy. The shows will be similar to those already released by other networks on Snapchat, and run 3-5 minutes in a vertical format. Right now there is about one new show airing per day -- this deal will push that to about three news shows per day, varying between the different genres outlined above. Snap will take 50 percent of the ad revenue generated by these shows and the content partners will keep the other half, according to the WSJ.

Read more of this story at Slashdot.

Amazee Labs: Submit your Site Building Session to DrupalCon Vienna

Drupal Planet -

Submit your Site Building Session to DrupalCon Vienna

DrupalCon Vienna will be taking place end of September this year. The site building track is about letting Drupal do the hard work without needing to write code. By assembling the right modules and configurations we can create rich and complex features, without worrying about reinventing the wheel and write complex logic and code.

Josef Dabernig Tue, 06/20/2017 - 14:19

Sounds great, right? As excited as I am for helping to put together the program for the site building track, I would like to share a few session ideas, which might be worth submitting. If you have never submitted a session for DrupalCon, this might be a good opportunity to give it a try:  

Showcases will let others learn from how you built your last exciting Drupal 8 project. Talking points can include which approaches you took, lessons you learnt from working on the project, and what fellow site builders should know when tackling similar problems.

Module presentations are a great way to explain and highlight best practice solutions. How do you choose from the various competing site building tools available to address problems like layout management, workflows or content modelling? Are the same solutions from Drupal 7 still valid, or what are the latest experiences you've had whilst building Drupal 8 sites and how could this be further developed and enhanced in the future?

Process descriptions are welcome to help us figure out how site building can best fill the gap between end users, content editors, developers, UX designers and anyone else involved in Drupal web projects. How do you involve your customers and explain site building to them? What does a developer need from a site builder and where do those practices blend? 

Outside perspectives are also welcomed to learn how problems can be solved the site builder’s way in related web technologies.

Together with Hernâni Borges de Freitas and Dustin Boeger, we are looking forward to reviewing your exciting and interesting applications. If you aren’t sure what to present, feel free to get in touch via the contact form on my Drupal.org profile or Twitter.

Thanks for submitting your session by June 28, 23:59 CEST.

ComputerMinds.co.uk: Help Drupal help your configuration

Drupal Planet -

Define a schema for any bespoke configuration, it's not too hard. It's needed to make it translatable, but Drupal 8 will also validate your config against it so it's still handy on non-translatable sites. As a schema ensures your configuration is valid, your code, or Drupal itself, can trip up without one. Set up a schema and you avoid those problems, and get robust validation for free. Hopefully my example YAML shows how it can be quite simple to do.

Cheppers blog: On Being Human at DrupalCon Vienna - Call for Papers closes in a week

Drupal Planet -

Around two years ago, when the launch of Drupal 8 was just around the corner and the main topic of concern was the status of the issue queue, the Drupal community slowly started murmuring about a topic outside of technical solutions and patches. As a result, a brand new DrupalCon track was introduced - Being Human. Our COO, Zsófi is the Being Human local track chair at DrupalCon Vienna - this is her Call for Papers.

Appnovation Technologies: PHP Speakers Wanted For DrupalCon Vienna 2017

Drupal Planet -

PHP Speakers Wanted For DrupalCon Vienna 2017 On 28th June (23:59 Vienna local time (GMT +2)) session submissions will close for DrupalCon Vienna 2017 and we're looking for more great speakers. After volunteering on the Core Conversation track team last year, I am now helping the PHP track team find and select sessions for this year's European conference. As PHP the foundation for...

The CMS From Hell

The Daily WTF -

Contracting can be really hit or miss. Sometimes, you're given a desk and equipment and treated just like an employee, except better paid and exempt from team-building exercises. Sometimes, however, you're isolated in your home office, never speaking to anyone, working on tedious, boring crap they can't convince their normal staff to do.

Eric was contracted to perform basic website updating tasks for a government agency. Most of the work consisted of receiving documents, uploading them to the server, and adding them to a page. There were 4 document categories, each one organized by year. Dull as dishwater, but easy.

The site was hosted by a third party in a shared hosting environment. It ran on a CMS produced by another party. WTFCMS was used in many high-profile sites, so the agency figured it had to be good. Eric was given login credentials and—in the way of techies given boring tasks everywhere—immediately began automating the task at hand.

Step 1 of this automation was to get a list of articles with their IDs. Eric was pleased to discover that the browser-based interface for the CMS used a JSON request to get the list of pages. With the help of good old jq, he soon had that running in a BASH shell script. To get the list of children for an article, he passed the article's ID to the getChildren endpoint.

Usually, in a heirarchy like this, there's some magic number that means "root element." Eric tried sending a series of likely candidates, like 0, -1, MAX_INT, and MIN_INT. It turned out to be -1 ... but he also got a valid list when he passed in 0.

Curious, he thought to himself. This appears to be a list of articles ... and hey, here's the ones I got for this site. These others ...? No way.

Sure enough, passing in a parent ID of 0 had gotten Eric some sort of super-root: every article across every site in the entire CMS system. Vulnerability number 1.

Step 2 was to take the ID list and get the article data so he could associate the new file with it. This wasn't nearly as simple. There was no good way to get the text of the article from the JSON interface; the CMS populated the articles server-side.

Eric was in too deep to stop now, though. He wrote a scraper for the edit page, using an XML parser to handle the HTML form that held the article text. Once he had the text, he compared it by hand to the POST request sent from his Firefox instance to ensure he had the right data.

And he did ... mostly. Turns out, the form was manipulated by on-page Javascript before being submitted: fields were disabled or enabled, date/time formats were tweaked, and the like. Eric threw together some more scripting to get the job done, but now he wasn't sure if he would hit an edge case or somehow break the database if he ran it. Still, he soldiered on.

Step 3 was to upload the files so they could be linked to the article. With Firebug open, Eric went about adding an upload.

Now, WTFCMS seemed to offer the usual flow: enter a name, select a file, and click Upload to both upload the file and save it as the given name. When he got to step 2, however, the file was uploaded immediately—but he still had to click the Upload button to "save" it.

What happens if I click Cancel? Eric wondered. No, never mind, I don't want to know. What does the POST look like?

It was a mess of garbage. Eric was able to find the file he uploaded, and the name he'd given it ... and also a bunch of server-side information the user shouldn't be privvy to, let alone be able to tamper with. Things like, say, the directory on the server where the file should be saved. Vulnerability number 2.

The response to the POST contained, unexpectedly, HTML. That HTML contained an iframe. The iframe contained an iframe. iframe2 contained iframe3; iframe3 contained a form. In that form were two fields: a submit button, reading "Upload", and a hidden form field containing the path of the uploaded file. In theory, he could change that to read anything on the server. Now he had both read and write access to any arbitrary destination in the CMS, maybe even on the server itself. Vulnerability number 3.

It was at this point that Eric gave up on his script altogether. This is the kind of task that Selenium IDE is perfect for. He just kept his head down, hoped that the server had some kind of validation to prevent curious techies like himself from actually exploiting any of these potential vulnerabilities, and served out the rest of his contract.

code { font-family: Consolas, monospace; } sup { font-size: .83em; vertical-align: super; } [Advertisement] Release! is a light card game about software and the people who make it. Play with 2-5 people, or up to 10 with two copies - only $9.95 shipped!

Cats May Have Been Domesticated Twice

Slashdot -

sciencehabit writes: Cats may have been domesticated twice, once in Turkey around 10,000 years ago, and again in Egypt, thousands of years later. That's the conclusion of a new genetic analysis of more than 200 ancient cats, including DNA extracted from Egyptian mummies. The scientists found evidence for an exodus of cats into the wider world from both ancient Turkey and ancient Egypt, but that these two waves of cats sported different genetic signatures. Whether or not the ancient Egyptians independently domesticated cats, their massive breeding programs appear to have further tamed the feline, turning cats from territorial and antisocial creatures into the lovable furballs we know today.

Read more of this story at Slashdot.

Agiledrop.com Blog: AGILEDROP: DrupalCon sessions about DevOps

Drupal Planet -

Last time, we gathered together DrupalCon Baltimore sessions about Front End. Before that, we explored the area of Site Building, Drupal Showcase, Coding and Development, Project Management and Case Studies. And that was not our last stop. This time, we looked at sessions that were presented in the area of DevOps. 100% Observability by Jason Yee from Datadog In this session, the author broke down the expansive monitoring landscape into 5 categories and provided a framework to help users ensure full coverage. He also touched why these categories are important to users business and shared the… READ MORE

Scientists Declare End to Global Coral Reef Bleaching Event

Slashdot -

Scientists in the U.S. have announced Monday that a mass bleaching of coral reefs worldwide has finally ended after three years. "About three-quarters of the world's delicate coral reefs were damaged or killed by hot water in what scientists say was the largest coral catastrophe," reports Phys.Org. From the report: The National Oceanic and Atmospheric Administration announced a global bleaching event in May 2014. It was worse than previous global bleaching events in 1998 and 2010. The forecast damage doesn't look widespread in the Indian Ocean, so the event loses its global scope. Bleaching will still be bad in the Caribbean and Pacific, but it'll be less severe than recent years, said NOAA coral reef watch coordinator C. Mark Eakin. Places like Australia's Great Barrier Reef, northwest Hawaii, Guam and parts of the Caribbean have been hit with back-to-back-to-back destruction, Eakin said. University of Victoria, British Columbia, coral reef scientist Julia Baum plans to travel to Christmas Island in the Pacific where the coral reefs have looked like ghost towns in recent years. While conditions are improving, it's too early to celebrate, said Eakin, adding that the world may be at a new normal where reefs are barely able to survive during good conditions.

Read more of this story at Slashdot.

The Behind-the-Scenes Changes Found In MacOS High Sierra

Slashdot -

Apple officially announced macOS High Sierra at WWDC 2017 earlier this month. While the new OS doesn't feature a ton of user-visible improvements and is ultimately shaping up to be a low-key release, it does feature several behind-the-scenes changes that could help make it the most stable macOS update in years. Andrew Cunningham from Ars Technica has "browsed the dev docs and talked with Apple to get some more details of the update's foundational changes." Here are some excerpts from three key areas of the report: APFS Like iOS 10.3, High Sierra will convert your boot drive to APFS when you first install it -- this will be true for all Macs that run High Sierra, regardless of whether they're equipped with an SSD, a spinning HDD, or a Fusion Drive setup. In the current beta installer, you're given an option to uncheck the APFS box (checked by default) before you start the install process, though that doesn't necessarily guarantee that it will survive in the final version. It's also not clear at this point if there are edge cases -- third-party SSDs, for instance -- that won't automatically be converted. But assuming that most people stick with the defaults and that most people don't crack their Macs open, most Mac users who do the upgrade are going to get the new filesystem. HEVC and HEIF All High Sierra Macs will pick up support for HEVC, but only very recent models will support any kind of hardware acceleration. This is important because playing HEVC streams, especially at high resolutions and bitrates, is a pretty hardware-intensive operation. HEVC playback can consume most of a CPU's processor cycles, and especially on slower dual-core laptop processors, smooth playback may be impossible altogether. Dedicated HEVC encode and decode blocks in CPUs and GPUs can handle the heavy lifting more efficiently, freeing up your CPU and greatly reducing power consumption, but HEVC's newness means that dedicated hardware isn't especially prevalent yet. Metal 2 While both macOS and iOS still nominally support open, third-party APIs like OpenGL and OpenCL, it's clear that the company sees Metal as the way forward for graphics and GPU compute on its platforms. Apple's OpenGL support in macOS and iOS hasn't changed at all in years, and there are absolutely no signs that Apple plans to support Vulkan. But the API will enable some improvements for end users, too. People with newer GPUs should expect to benefit from some performance improvements, not just in games but in macOS itself; Apple says the entire WindowServer is now using Metal, which should improve the fluidity and consistency of transitions and animations within macOS; this can be a problem on Macs when you're pushing multiple monitors or using higher Retina scaling modes on, especially if you're using integrated graphics. Metal 2 is also the go-to API for supporting VR on macOS, something Apple is pushing in a big way with its newer iMacs and its native support for external Thunderbolt 3 GPU enclosures. Apple says that every device that supports Metal should support at least some of Metal 2's new features, but the implication there is that some older GPUs won't be able to do everything the newer ones can do.

Read more of this story at Slashdot.

Ethiopia's Coffee Is the Latest Victim of Climate Change

Slashdot -

According to a study published today in Nature Plants, by the end of this century, increasing temperatures could make it impossible to grow coffee in about half of Ethiopia's coffee-growing regions. "That's because Arabica coffee trees (which are grown in Ethiopia) require pretty mild temperatures to survive, ideally between 59 to 75 degree Fahrenheit," reports The Verge. "Climate projections show that Ethiopia will generally become warmer and drier, and that means that 40 to 60 percent of areas where coffee is currently grown won't be suitable to grow the beans, the study says." From the report: In fact, climate change is already hurting Ethiopia's coffee growers: days and nights are already warmer, and the weather is more unpredictable and extreme. Hot days are hotter and rainy days are rainier. That leads to more unpredictable harvests and it hurts the local economy. Ethiopia is Africa's biggest coffee producer and the world's fifth largest coffee exporter, with 15 million Ethiopians living off coffee farming. Climate change risks disrupting the country's future. But there is a way Ethiopia can brace for its brewing troubles. The study found that rising temperatures will turn swaths of land at higher elevation into just the right places to grow coffee in the future. In fact, coffee farming could increase four fold if plantations are moved uphill, the study says. But to do that, the country needs to prepare: millions of farmers can't just take their crops and move to land they don't own. You need careful planning.

Read more of this story at Slashdot.

Microsoft Now Lets Surface Laptop Owners Revert Back To Windows 10 S

Slashdot -

Microsoft is kind enough to offer Surface Laptop users the option to upgrade to Windows 10 Pro for free until later this year if they don't like Windows 10 S, which is installed by default and is only able to run apps or games that are in the Windows Store. The company is taking that generosity one step further by letting users revert back to Windows 10 S if they installed Windows 10 Pro and aren't happy with the performance and battery life. The option to revert back to the default OS wasn't available until now. MSPoweruser reports: Microsoft recently released the official recovery image for the Surface Laptop which will technically let you go back to Windows 10 S on your device but you'll be required to remove all of your files which is a bit frustrating. The recovery image wasn't available a few days after the Surface Laptop started shipping, but it is now available and you can download it to effectively reset your Surface Laptop. The recovery image is 9GB, so make sure you have a good internet connection before downloading the file. It is quite interesting how Microsoft isn't letting users go back to Windows 10 S from Windows 10 Pro without having to completely reset their devices, as the company would want more users to use its new version of Windows 10 for many reasons. Maybe this is something Microsoft will be adding in the future, but for now, we'll just have to do with the recovery image. If you own a Surface Laptop, you can find the recovery image here.

Read more of this story at Slashdot.

Cable Lobby Tries To Stop State Investigations Into Slow Broadband

Slashdot -

An anonymous reader quotes a report from Ars Technica: Broadband industry lobby groups want to stop individual states from investigating the speed claims made by Internet service providers, and they are citing the Federal Communications Commission's net neutrality rules in their effort to hinder the state-level actions. The industry attempt to undercut state investigations comes a few months after New York Attorney General Eric Schneiderman filed a lawsuit against Charter and its Time Warner Cable (TWC) subsidiary that claims the ISP defrauded and misled New Yorkers by promising Internet speeds the company knew it could not deliver. NCTA-The Internet & Television Association and USTelecom, lobby groups for the cable and telecom industries, last month petitioned the Federal Communications Commission for a declaratory ruling that would help ISPs defend themselves against state-level investigations. The FCC should declare that advertisements of speeds "up to" a certain level of megabits per second are consistent with federal law as long as ISPs meet their disclosure obligations under the net neutrality rules, the groups said. There should be a national standard enforced by the FCC instead of a state-by-state "patchwork of inconsistent requirements," they argue. Another cable lobby group, the American Cable Association (ACA), asked the FCC to approve the petition in a filing on Friday. An FCC ruling in favor of the petition wouldn't completely prevent states from filing lawsuits, but such a ruling would make it far more difficult for the states to protect consumers from false speed claims.

Read more of this story at Slashdot.

Steve Jobs Wanted the First iPhone To Have a Permanent Back Button Like Android

Slashdot -

anderzole shares a report from BGR: Brian Merchant's new book, The One Device: The Secret History of the iPhone, provides a captivating and intriguing look at how the most revolutionary product of our time was designed and developed. Through a series of interviews with Apple engineers and designers who played an integral role in the iPhone's creation and development, Merchant maps out how the iPhone came to be after more than two years of non-stop work at breakneck speed. One of the more interesting revelations from the book is that the iPhone design Apple unveiled in January of 2007 might have looked vastly different if Steve Jobs had his way. According to Imran Chaudhri, a veteran Apple designer who spent 19 years working on Apple's elite Human Interface Team, Steve Jobs wanted the original iPhone to have a back button in addition to a home button. Believe it or not, the original iPhone could have very well looked like a modern-day Android device. "The touch-based phone, which was originally supposed to be nothing but screen, was going to need at least one button," Merchant writes. "We all know it well today -- the Home button. But Steve Jobs wanted it to have two; he felt they'd need a back button for navigation. Chaudhri argued that it was all about generating trust and predictability. One button that does the same thing every time you press it: it shows you your stuff. 'Again, that came down to a trust issue,' Chaudhri says, 'that people could trust the device to do what they wanted it to do. Part of the problem with other phones was the features were buried in menus, they were too complex.' A back button could complicate matters too, he told Jobs. 'I won that argument,' Chaudhri says."

Read more of this story at Slashdot.

Swiss Supercomputer Edges US Out of Top Spot

Slashdot -

There have only been two times in the last 24 years where the U.S. has been edged out of the top spot of the world's most powerful supercomputers. Now is one of those times. "An upgrade to a Swiss supercomputer has bumped the U.S. Department of Energy's Cray XK7 to number four on the list rating these machines," reports the BBC. "The only other time the U.S. fell out of the top three was in 1996." The top two slots are occupied by Chinese supercomputers. From the report. The U.S. machine has been supplanted by Switzerland's Piz Daint system, which is installed at the country's national supercomputer center. The upgrade boosted its performance from 9.8 petaflops to 19.6. The machine is named after a peak in the Grison region of Switzerland. One petaflop is equal to one thousand trillion operations per second. A "flop" (floating point operation) can be thought of as a step in a calculation. The performance improvement meant it surpassed the 17.6 petaflop capacity of the DoE machine, located at the Oak Ridge National Laboratory in Tennessee. The U.S. is well represented lower down in the list, as currently half of all the machines in the top 10 of the list are based in North America. And the Oak Ridge National Laboratory looks set to return to the top three later this year, when its Summit supercomputer comes online. This is expected to have a peak performance of more than 100 petaflops.

Read more of this story at Slashdot.

Equipment Already In Space Can Be Adapted For Extremely Secure Data Encryption

Slashdot -

Orome1 quotes a report from Help Net Security: In a new study, researchers from the Max Planck Institute in Erlangen, demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 kilometers above Earth. This is the first time that quantum states have been measured so carefully from so far away. A satellite-based quantum-based encryption network would provide an extremely secure way to encrypt data sent over long distances. Developing such a system in just five years is an extremely fast timeline since most satellites require around 10 years of development. For the experiments, the researchers worked closely with satellite telecommunications company Tesat-Spacecom GmbH and the German Space Administration. The German Space Administration previously contracted with Tesat-Spacecom on behalf of the German Ministry of Economics and Energy to develop an optical communications technology for satellites. This technology is now being used commercially in space by laser communication terminals onboard Copernicus -- the European Union's Earth Observation Program -- and by SpaceDataHighway, the European data relay satellite system. It turned out that this satellite optical communications technology works much like the quantum key distribution method developed at the Max Planck Institute. Thus, the researchers decided to see if it was possible to measure quantum states encoded in a laser beam sent from one of the satellites already in space. In 2015 and the beginning of 2016, the team made these measurements from a ground-based station at the Teide Observatory in Tenerife, Spain. They created quantum states in a range where the satellite normally does not operate and were able to make quantum-limited measurements from the ground. The findings have been published in the journal Optica.

Read more of this story at Slashdot.

Supreme Court Rules Sex Offenders Can't Be Barred From Social Media

Slashdot -

An anonymous reader quotes a report from Gizmodo: In a unanimous decision today, the Supreme Court struck down a North Carolina law that prevents sex offenders from posting on social media where children might be present, saying it "impermissibly restricts lawful speech." In doing so, the Supreme Court asserted what we all know to be true: Posting is essential to the survival of the republic. The court ruled that to "foreclose access to social media altogether is to prevent the user from engaging in the legitimate exercise of First Amendment rights." The court correctly noted that "one of the most important places to exchange views is cyberspace." The North Carolina law was ruled to be overly broad, barring "access to what for many are the principal sources for knowing current events, checking ads for employment, speaking and listening in the modern public square, and otherwise exploring the vast realms of human thought and knowledge."

Read more of this story at Slashdot.

Fidget Spinners Are Over

Slashdot -

Walt Hickey, writing for Five Thirty Eight: The toy craze that has swept the nation -- cheaply manufactured fidget spinners of dubious metallic constitution -- is probably on the way out, with the high-water mark of fidget obsession appearing to be about a month behind us and the interest in the glorified ball bearings plateauing or declining. [...] Even if there's a long tail on this trend, it's very likely that peak fidget spinner is behind us. The kind of content now doing well on YouTube is either fidget-adjacent stunt videos or videos that have taken a particularly weird turn. This doesn't mean the ball-bearing business is doomed, just maybe don't go long on the spinner industrial complex or quit your job to live off a fidget-related Kickstarter idea at this point.

Read more of this story at Slashdot.

Pages

Subscribe to Heydon Consulting aggregator