New Deepfake Algorithm Allows You To Text-Edit the Words of a Speaker In a Video
technology - Posted On:2019-06-17 21:29:59 Source: slashdot
It is now possible to take a talking-head style video, and add, delete or edit the speaker's words as simply as you'd edit text in a word processor. A new deepfake algorithm can process the audio and video into a new file in which the speaker says more or less whatever you want them to. New Atlas reports: It's the work of a collaborative team from Stanford University, Max Planck Institute for Informatics, Princeton University and Adobe Research, who say that in a perfect world the technology would be used to cut down on expensive re-shoots when an actor gets something wrong, or a script needs to be changed. In order to learn the face movements of a speaker, the algorithm requires about 40 minutes of training video, and a transcript of what's being said, so it's not something that can be thrown onto a short video snippet and run if you want good results. That 40 minutes of video gives the algorithm the chance to work out exactly what face shapes the subject is making for each phonetic syllable in the original script. From there, once you edit the script, the algorithm can then create a 3D model of the face making the new shapes required. And from there, a machine learning technique called Neural Rendering can paint the 3D model over with photo-realistic textures to make it look basically indistinguishable from the real thing. Other software such as VoCo can be used if you wish to generate the speaker's audio as well as video, and it takes the same approach, by breaking down a heap of training audio into phonemes and then using that dataset to generate new words in a familiar voice. Read more of this story at Slashdot.
AT&T Cuts Another 1,800 Jobs As It Finishes Fiber-Internet Buildout
technology - Posted On:2019-06-17 20:59:58 Source: slashdot
AT&T is planning to cut another 1,800 jobs from its wireline division. "Last week, AT&T declared more than 1,800 jobs nationwide as 'surplus,' meaning they are slated to be eliminated in August or September," reports Ars Technica, citing the Communications Workers of America (CWA). From the report: "They've been cutting their employment massively in the past year and a half or so," with cuts affecting both union and non-union jobs, CWA Communications Director Beth Allen told Ars. Under union contracts, AT&T can declare a surplus of jobs each quarter, she said. But even by AT&T standards, last week's surplus declaration "was a very large number," Allen said. Jobs that are declared "surplus" are taken off the payroll, CWA says. AT&T told Ars that most affected union workers will be able to stay at the company in other positions. But letters from AT&T to the CWA say that only 27 of about 550 employees declared "surplus" in the Southwest division will be given so-called "follow-the-work" opportunities in which they can take nearly identical jobs in other locations. Follow-the-work offers are given when an employee's specific job is consolidated with another position or moved to another geographic location, AT&T said. This is different from the job-offer guarantee that ensures "surplus" employees will be offered a different type of job in the company; AT&T didn't say exactly how many surplus employees will get those offers. The 1,800 newly announced AT&T job cuts affect wireline technicians who fix customer problems, install new service, and who work on AT&T's fiber expansion, Allen said. Over the past four years, AT&T expanded its fiber-to-the-home network to 12.5 million customer locations to meet a government mandate imposed on its purchase of DirecTV. But AT&T is apparently slowing its fiber deployments now that it has finished the government-mandated buildout. Read more of this story at Slashdot.
Microsoft's Plan To Split OS From Shell Takes Shape
technology - Posted On:2019-06-17 20:14:58 Source: slashdot
An anonymous reader quotes a report from ZDNet: The latest Windows preview from the 20H1 branch, build 18917, has some hidden components that signal a future where the Windows Shell UI parts, such as Action Center, will be separate from the rest of Windows and can be updated with shell packages. A developer who uses the Twitter handle Albacore gave a breakdown of a new component in Build 18917 called 'Shell Update Agent,' which he notes is "capable of obtaining and updating the shell on demand." That capability may mean nothing to most Windows 10 users. However, for Windows watchers it could be an interesting development of Microsoft's unannounced plans for Windows Core OS, in which Windows is modularized and calls on a range of shells that target different form factors, from HoloLens to Surface and dual-screen devices like the recently revealed Centaurus laptop, whose shell is called Santorini. Albacore goes on to explain that the Shell Update Agent references 'Package Family Names,' which suggests that the "shell will indeed be a separate, packaged component." Those shell packages can be acquired from both external and internal sources, which could mean shell components like the Start Menu, Action Center and Taskbar could be selectively built, based on these acquired packages. Finally, one more shell-related change noted relates to a new method for syncing settings. "The new one should support syncing more advanced and previously 'legacy' options such as File Explorer configuration," Albacore notes. Read more of this story at Slashdot.
Adobe's Experimental AI Tool Can Tell If Something's Been Photoshopped
technology - Posted On:2019-06-17 19:29:59 Source: slashdot
Adobe and UC Berkeley researchers are working on tool that can tell if a photo has been manipulated in Adobe Photoshop. The goal is to cut down on fake content and "to increase trust and authority in digital media." TheINQUIRER reports: A bunch of images were created using Photoshop's "Face Aware Liquify" tool, and mixed with a set of expertly human-doctored photographs. When humans were shown the original image and the doctored version, they spotted the fakes 53 percent of the time, but the artificial intelligence hit 99 percent. That's pretty good -- changing a coin toss guess into near certainty, but the AI isn't quite done showboating. As well as being able to point out what areas might have been changed, the AI can also predict what methods have been used to change the image. Better still, it'll have a stab at undoing the vandalism, and returning the image to its former untampered glory. Not perfectly, but well enough to impress the researchers all the same: it's like having an undo button on someone else's work, and who hasn't always wanted one of those? "It might sound impossible because there are so many variations of facial geometry possible," said Professor Alexei A. Efros of UC Berkeley. "But, in this case, because deep learning can look at a combination of low-level image data, such as warping artifacts, as well as higher level cues such as layout, it seems to work." Read more of this story at Slashdot.
Robocalls Are Overwhelming Hospitals and Patients, Threatening a New Kind of Health Crisis
technology - Posted On:2019-06-17 16:14:59 Source: slashdot
An anonymous reader shares a report: In the heart of Boston, Tufts Medical Center treats scores of health conditions, from administering measles vaccines for children to pioneering next-generation tools that can eradicate the rarest of cancers. But doctors, administrators and other hospital staff struggled to contain a much different kind of epidemic one April morning last year: a wave of thousands of robocalls that spread, like a virus, from one phone line to the next, disrupting communications for hours to come. For most Americans, such robocalls represent an unavoidable digital-age nuisance, resulting in constant interruptions targeting their phones each month. For hospitals, though, the spam calls amount to a literal life-or-death challenge, one that increasingly is threatening doctors and patients in a setting where every second can count. At Tufts Medical Center, administrators registered more than 4,500 calls between about 9:30 and 11:30 a.m. on April 30, 2018, said Taylor Lehmann, the center's chief information security officer. Many of the messages seemed to be the same: Speaking in Mandarin, an unknown voice threatened deportation unless the person who picked up the phone provided their personal information. Such calls are common, widely documented scams that seek to swindle vulnerable foreigners, who may surrender their private data out of fear their families and homes are at risk. But it proved especially troubling at Tufts, which is situated amid Boston's Chinatown neighborhood, Lehmann said. Officials there couldn't block the calls through their telecom carrier, Windstream, which provides phone and web services to consumers and businesses. "There's nothing we could do," Lehmann said Windstream told them. Read more of this story at Slashdot.
Microsoft's To-Do App Comes To Mac
technology - Posted On:2019-06-17 15:00:00 Source: slashdot
Microsoft has released To-Do for Mac, finally giving Apple users access to the task management tool on their desktops. The Mac app will allow users to work offline, view their upcoming tasks under "My Day," share to-do lists with friends and colleagues and see flagged emails. From a report: "Today, we'd like to announce the arrival of a new family member -- that's right, the moment many of you have been waiting for is here -- say hello to the Mac app. If you've already been using our app on Android, iOS, Windows, or web, then the Mac app will feel very familiar. Sign in and all your tasks will be waiting for you, ready to be checked off. You can work offline, add tasks to My Day, see your flagged email in your Flagged email list, and share your lists with colleagues or friends and family. The Planner integration isn't available yet, but we're already working on bringing the Assigned to Me list to you," says Polly Davidson, Social Media Strategist, Microsoft. Read more of this story at Slashdot.
A Quarter of Major CMSs Use Outdated MD5 as the Default Password Hashing Scheme
it - Posted On:2019-06-17 14:15:00 Source: slashdot
Over a quarter of all the major content management systems (CMSs) use the old and outdated MD5 hashing scheme as the default for securing and storing user passwords. From a report: Some of the projects that use MD5 as the default method for storing user passwords include WordPress, osCommerce, SuiteCRM, Simple Machines Forum, miniBB, MyBB, SugarCRM, CMS Made Simple, MantisBT, Phorum, Observium, X3cms, and Composr. The MD5 algorithm has been cracked for years now, meaning all passwords stored in this format can be reversed back to their plaintext version. This means that unless website owners changed these default settings by modifying the CMS source code, most websites built on top of these CMSs puts user passwords at risk in the case a hacker steals the site's database. This revelation is just one of the many observations that came out of an extensive academic research project at the University of Piraeus, in Greece. Academics examined 49 commonly used CMSs and 47 popular web application frameworks and looked at their default password storage mechanism, namely their password hashing schemes. Read more of this story at Slashdot.
A 53-Year-Old Network Coloring Conjecture Is Disproved
technology - Posted On:2019-06-17 13:30:00 Source: slashdot
In just three pages, a Russian mathematician has presented a better way to color certain types of networks than many experts thought possible. From a report: A paper posted online last month has disproved a 53-year-old conjecture about the best way to assign colors to the nodes of a network. The paper shows, in a mere three pages, that there are better ways to color certain networks than many mathematicians had supposed possible. Network coloring problems, which were inspired by the question of how to color maps so that adjoining countries are different colors, have been a focus of study among mathematicians for nearly 200 years. The goal is to figure out how to color the nodes of some network (or graph, as mathematicians call them) so that no two connected nodes share the same color. Depending on the context, such a coloring can provide an effective way to seat guests at a wedding, schedule factory tasks for different time slots, or even solve a sudoku puzzle. Graph coloring problems tend to be simple to state, but they are often enormously hard to solve. Even the question that launched the field -- Do four colors suffice to color any map? -- took more than a century to answer (the answer is yes, in case you were wondering). The problem tackled in the new paper seemed, until now, to be no exception to this rule. Unsolved for more than 50 years, it concerns tensor products -- graphs made by combining two different graphs (call them G and H) in a specific way. The tensor product of G and H is a new, larger graph in which each node represents a pair of nodes from the original graphs -- one from G and one from H -- and two nodes in the tensor product are connected if both their corresponding nodes in G and their corresponding nodes in H are connected. Read more of this story at Slashdot.
Samsung Recommends Scanning QLED TVs For Viruses
technology - Posted On:2019-06-17 10:59:57 Source: slashdot
Samsung has reminded owners of its smart TVs that they should be regularly scanning for malware using its built-in virus scanning software. From a report: In a tweet, Samsung US support account shared a video Sunday outlining how users can scan their smart TVs for viruses. It is unclear what prompted the tweet or why the process seems to be opt-in as opposed to the operating system automatically scanning for viruses in the background. "Scanning your computer for malware viruses is important to keep it running smoothly. This also is true for your QLED TV if it's connected to Wi-Fi! Prevent malicious software attacks on your TV by scanning for viruses on your TV every few weeks," the company said in the tweet. It has since deleted the tweet. Read more of this story at Slashdot.
Yahoo Japan Is Under Fire for Its China-Like Rating System
technology - Posted On:2019-06-17 10:14:56 Source: slashdot
Some users of Yahoo Japan are rising up against Japan's biggest web portal after the rollout of a new rating system that's being compared with a social-scoring initiative in China. From a report: The 48 million people with a Yahoo! Japan ID will have to opt-out within a privacy settings webpage if they don't want to be rated. The score is based on a variety of factors and is calculated based on inputs such as payment history, shopping reviews, whether a user canceled bookings and the amount of identifiable personal information. Unless users opt out, their ratings may be accessible to freelance jobs site Crowdworks, Yahoo's bike-sharing service and other businesses. Makoto Niida, a longtime Yahoo user, opted out of the rating system when he learned about it. "It's a big deal that the service was enabled by default," Niida said. "The way they created services that benefit businesses without clear explanations to their users reminds me of China‚(TM)s surveillance society." Yahoo's new credit-score program follows efforts by Mizuho Financial Group, NTT Docomo and other companies to use algorithms to assign ratings to consumers. Japan doesn't have a system similar to FICO in the U.S., so businesses in the world's third-largest economy have come up with their own solutions to determine financial trustworthiness. Read more of this story at Slashdot.
'Genius' Site Said It Used Morse Code To Catch Google Stealing Song Lyrics
technology - Posted On:2019-06-16 16:59:59 Source: slashdot
"Genius.com says its traffic is dropping because, for the past several years, Google has been publishing lyrics on its own platform, with some of them lifted directly from the music site," reports the Wall Street Journal: Google denies doing anything nefarious. Still, Genius's complaints offer a window into the challenges small tech companies can face when the unit of Alphabet Inc. starts offering competing services on its platform... Genius said it notified Google as far back as 2017, and again in an April letter, that copied transcriptions appear on Google's website. The April letter, a copy of which was viewed by the Journal, warned that reuse of Genius's transcriptions breaks the Genius.com terms of service and violates antitrust law. "Over the last two years, we've shown Google irrefutable evidence again and again that they are displaying lyrics copied from Genius," said Ben Gross, Genius's chief strategy officer, in an email message.... Genius said it found more than 100 examples of songs on Google that came from its site. Starting around 2016, Genius made a subtle change to some of the songs on its website, alternating the lyrics' apostrophes between straight and curly single-quote marks in exactly the same sequence for every song. When the two types of apostrophes were converted to the dots and dashes used in Morse code, they spelled out the words "Red Handed." Genius is a privately held company, and its investors include Andreessen Horowitz, Emagen Investment Group and the rapper Nas... Genius clients include the music streaming website Spotify Technology SA and Apple Inc. The article also notes March study from web-analytics firm Jumpshot Inc. which found 62% of mobile searches on Google now don't result in the user clicking through to a non-Google web site. Read more of this story at Slashdot.
Google's Login Chief: Apple's Sign-In Button Is Better Than Using Passwords
technology - Posted On:2019-06-16 15:45:00 Source: slashdot
After Apple announced a single sign-on tool last week, The Verge interviewed Google product management director Mark Risher. Though Google offers its own single sign-on tool, The Verge found him "surprisingly sunny about having a new button to compete with. While the login buttons are relatively simple, they're much more resistant to common attacks like phishing, making them much stronger than the average password -- provided you trust the network offering them." RISHER: I honestly do think this technology will be better for the internet and will make people much, much safer. Even if they're clicking our competitor's button when they're logging into sites, that's still way better than typing in a bespoke username and password, or more commonly, a recycled username and password... Usually with passwords they recommend the capital letters and symbols and all of that, which the majority of the planet believes is the best thing that they should do to improve their security. But it actually has no bearing on phishing, no bearing on password breaches, no bearing on password reuse. We think that it's much more important to reduce the total number of passwords out there... People often push back against the federated model, saying we're putting all our eggs into one basket. It sort of rolls off the tongue, but I think it's the wrong metaphor. A better metaphor might be a bank. There are two ways to store your hundred dollars: you could spread it around the house, putting one dollar in each drawer, and some under your mattress and all of that. Or you could put it in a bank, which is one basket, but it's a basket that is protected by 12-inch thick steel doors. That seems like the better option! Read more of this story at Slashdot.
Facebook's Photorealistic Simulator For AI Runs At 10,000 FPS
technology - Posted On:2019-06-16 10:44:57 Source: slashdot
malachiorion writes: Facebook just open sourced a simulator for testing and training embodied AI systems -- like virtual robots. They worked with AR/VR researchers to release the simulator along with what they say are the most photorealistic 3D reconstructions of real world places available. [Facebook Reality Labs have named this "the Replica data set".] The crazy part: Because more frames are always better for training computer vision in simulators, it can run at 10,000 FPS! The simulator's ability to hit 10K frames per second prompted an interesting follow-up on the original submission. "It's a totally useless framerate for humans -- just absolute overkill for our brains/eyeballs -- but it's apparently a benefit for AI systems." "As more researchers adopt the platform, we can collectively develop embodied AI techniques more quickly," explains Facebook's blog post, "as well as realize the larger benefits of replacing yesterday's training data sets with active environments that better reflect the world we're preparing machine assistants to operate in." And if you're worried about privacy, Facebook assures readers that "The data used to generate Replica scans was anonymized to remove any personal details (such as family photos) that could identify an individual. The overall reconstruction process was meticulous, with researchers manually filling in the small holes that are inevitably missed during scanning and using a 3D paint tool to apply annotations directly onto meshes." Read more of this story at Slashdot.
Uber's Plan To Deliver McDonald's Hamburgers By Drone
technology - Posted On:2019-06-16 09:44:57 Source: slashdot
An anonymous reader quotes the Washington Post: The company's new initiative -- a collaborative effort between its Uber Eats and Uber Elevate divisions -- began with tests in San Diego using fast food meals from McDonald's, but could expand to include a local fine-dining restaurant called Juniper and Ivy, the company said. Uber intends to roll out commercial food delivery using drones in the same city this summer, with a fee structure that mimics Uber Eats current pricing, according to Bloomberg Businessweek, which first reported the company's plan... "We've been working closely with the FAA to ensure that we're meeting requirements and prioritizing safety," Uber Elevate's Luke Fischer, the company's head of flight operations, said in a statement. "From there, our goal is to expand Uber Eats drone delivery so we can provide more options to more people at the tap of a button. We believe that Uber is uniquely positioned to take on this challenge as we're able to leverage the Uber Eats network of restaurant partners and delivery partners as well as the aviation experience and technology of Uber Elevate." How will Uber's drone delivery service work? After a restaurant loads a meal into a drone and the robot takes to the air, the company's technology will notify a nearby Uber Eats driver at a designated drop-off location, the company said. The driver will pick up and hand deliver the meal to the customer the same way the service currently operates. But in the future, Uber said, the company would like to land drones atop parked vehicles near delivery locations "through QR code correspondence." Once that happens, the last-mile leg of delivery would be completed by the Uber Eats driver who would hand-deliver the order. Read more of this story at Slashdot.
Do Google and Facebook Threaten Our 'Ambient Privacy'?
technology - Posted On:2019-06-16 07:44:57 Source: slashdot
This week Pinboard founder Maciej Ceglowski (also a web developer and social critic) asked readers of his blog to consider an emerging threat to ambient privacy. He defines it as "the understanding that there is value in having our everyday interactions with one another remain outside the reach of monitoring, and that the small details of our daily lives should pass by unremembered." Until recently, ambient privacy was a simple fact of life. Recording something for posterity required making special arrangements, and most of our shared experience of the past was filtered through the attenuating haze of human memory. Even police states like East Germany, where one in seven citizens was an informer, were not able to keep tabs on their entire population. Today computers have given us that power. Authoritarian states like China and Saudi Arabia are using this newfound capacity as a tool of social control. Here in the United States, we're using it to show ads. But the infrastructure of total surveillance is everywhere the same, and everywhere being deployed at scale.... Because our laws frame privacy as an individual right, we don't have a mechanism for deciding whether we want to live in a surveillance society. Congress has remained silent on the matter, with both parties content to watch Silicon Valley make up its own rules. The large tech companies point to our willing use of their services as proof that people don't really care about their privacy. But this is like arguing that inmates are happy to be in jail because they use the prison library. Confronted with the reality of a monitored world, people make the rational decision to make the best of it. That is not consent... Our discourse around privacy needs to expand to address foundational questions about the role of automation: To what extent is living in a surveillance-saturated world compatible with pluralism and democracy? What are the consequences of raising a generation of children whose every action feeds into a corporate database? What does it mean to be manipulated from an early age by machine learning algorithms that adaptively learn to shape our behavior? That is not the conversation Facebook or Google want us to have. Their totalizing vision is of a world with no ambient privacy and strong data protections, dominated by the few companies that can manage to hoard information at a planetary scale. They correctly see the new round of privacy laws as a weapon to deploy against smaller rivals, further consolidating their control over the algorithmic panopticon. Read more of this story at Slashdot.
'How Close Are We to Self-Driving Cars, Really?'
technology - Posted On:2019-06-16 03:44:57 Source: slashdot
Chris Urmson helped pioneer self-driving car technology at Google before founding Aurora (which sells self-driving car software to automakers, and this week announced a new partnership with Chrysler and a new round of investment by Hyundai). In a new interview, Urmson "says he expects that in about five to 10 years, Americans will start seeing robots cruising down the road in a handful of cities and towns across the country," reports Slate. "It will be about 30 to 50 years, he says, until they're everywhere. " I think within the next five years we'll see small-scale deployment. That'll be a few hundred or a few thousand vehicles. Really this is the, it's Silicon Valley speak, this is the zero-to-one moment of proving that the technology actually works, understanding how customers want to use it, convincing ourselves that -- and when I say ourselves, I mean as a society -- that these are sufficiently safe, that we trust them on the roadway, and that's that first phase... [W]hen the technology actually starts to become scaled, then we can ask the question what have we learned, what are the ways that we can make this a little bit safer, a little bit incrementally more efficient, and that's what I think local and state governments and federal government would invest in infrastructure... The statistic I heard was 30 percent of traffic in San Francisco is people looking for parking. I heard a more alarming statistic that was 80 percent of traffic in Paris was people looking for parking. So imagine you have automated vehicles that take you to a location, you hop out, then it just drives down the block and picks up the next person and takes them where they're going. Suddenly, you've alleviated a massive chunk of the congestion in a city. Similarly, if you look at the floor plan of a city today, somewhere between 30‚"40 percent of cities is dedicated to parking and roads. And so again, if you have automated vehicles operating as a transportation service, whether it's private or public transportation networks in the city, you don't need that real estate to be dedicated for parking. That real estate now can be recaptured, and it can be used for park space, it can be used for residential space, yeah, it can be used for mixed residential-commercial office space... Certainly for urban centers, I think it's much more likely that this technology is a shared platform that people get on and get off. It's an even more convenient version of a bus or of a taxi service. Read more of this story at Slashdot.
These Are the Internet of Things Devices That Are Most Targeted By Hackers
it - Posted On:2019-06-15 18:44:59 Source: slashdot
ZDNet reports: Internet-connected security cameras account for almost half of the Internet of Things devices that are compromised by hackers even as homes and businesses continue to add these and other connected devices to their networks. Research from cybersecurity company SAM Seamless Network found that security cameras represent 47 percent of vulnerable devices installed on home networks. According to the data, the average U.S. household contains 17 smart devices while European homes have an average of 14 devices connected to the network... Figures from the security firm suggest that the average device is the target of an average of five attacks per day, with midnight the most common time for attacks to be executed -- it's likely that at this time of the night, the users will be asleep and not paying attention to devices, so won't be witness to a burst of strange behavior. The anonymous reader who submitted this story suggests a possible solution: government inspectors should examine every imported IoT device at the border. "The device gets rejected if it has non-essential ports open, hard-coded or generic passwords, no automated patching for at least four years, etc." Read more of this story at Slashdot.
KDE Plasma 5.16 Released
technology - Posted On:2019-06-15 14:15:00 Source: slashdot
Long-time Slashdot reader jrepin writes: The KDE community has released Plasma 5.16, the newest iteration of the popular desktop environment. It features an improved notification system, Not only can you mute notifications altogether with the Do Not Disturb mode, but the system also groups notifications by app. Developers also focused on user's privacy. When any application accesses the microphone, an icon will pop up in your system tray, showing that something is listening. Vaults, a built-in utility to encrypt folders, are easier and more convenient to use. Dolphin file and folder manager now opens folders you click on in new tabs instead of new windows. Discover software manager is cleaner and clearer as it now has two distinct areas for downloading and installing software. The Wallpaper Slideshow settings window displays the images in the folders you selected, and lets you select only the graphics you want to display in the slideshow. For a more comprehensive overview of what to expect in Plasma 5.16, check out the official announcement or the changelog for the complete list of changes. Read more of this story at Slashdot.
Study Finds That a GPS Outage Would Cost $1 Billion Per Day
technology - Posted On:2019-06-14 18:59:59 Source: slashdot
A new comprehensive study on Global Positioning System technology has examined what effect a 30-day outage would have on the U.S. economy -- whether it's due to a severe space weather event or "nefarious activity by a bad actor." If a widespread outage were to occur, the study estimates it would have a $1 billion per-day impact. "It would likely be higher during the planting season of April and May, when farmers are highly reliant on GPS technology for information about their fields," adds Ars Technica. From the report: To assess the effect of an outage, the study looked at several different variables. Among them was "precision timing" that enables a number of wireless services, including the synchronization of traffic between carrier networks, wireless handoff between base stations, and billing management. Moreover, higher levels of precision timing enable higher bandwidth and provide access to more devices. (For example, the implementation of 4G LTE technology would have been impossible without GPS technology). In the case of an outage, there would be relatively minimal impacts over the first two days, but after that time, the wireless network would begin to degrade significantly. After 30 days, the study estimates that functionality would lie somewhere between 0 percent and 60 percent of normal operating levels. Landline phones would be largely unaffected. Read more of this story at Slashdot.
'The New Dropbox Sucks'
technology - Posted On:2019-06-14 12:15:00 Source: slashdot
Earlier this week, Dropbox introduced a new desktop application that brings a new look to the file-sharing service as well as new capabilities. With this release, Dropbox has changed the underlying structure of its desktop application to operate just like any other desktop application, rather than its previous incarnation, which was tied very closely to desktop file systems like Windows File Explorer or Apple's Finder. Dropbox adds: It's a single workspace to organize your content, connect your tools, and bring everyone together, wherever you are. The first thing you'll notice is an all-new Dropbox desktop app that we're introducing today through our early access program. It's more than an app, though‚--‚it's a completely new experience. That all sounds great, until you attempt to use it. John Gruber, writing for DaringFireball: I don't want any of this. All I want from Dropbox is a folder that syncs perfectly across my devices and allows sharing with friends and colleagues. That's it: a folder that syncs with sharing. And that's what Dropbox was. Now it's a monstrosity that embeds its own incredibly resource-heavy web browser engine. In a sense Steve Jobs was right‚--‚the old Dropbox was a feature not a product. But it was a feature well-worth paying for, and which made millions of people very happy. Read more of this story at Slashdot.