The SharePoint mobile app brings the key features from the popular enterprise collaboration software to users smartphones, so they have an easier time of accessing things like company bulletins, SharePoint applications and shared workspaces while on the go.That s important for Microsoft, since launching a mobile app makes SharePoint more relevant for a workforce that is increasingly trying to access work data on their smartphones.They can see recent activity, files and posts from a site, and then open a menu to access all of the content stored in it from their phone.Of course, the app s success is incumbent on organizations buying into SharePoint for their internal collaboration.But, it s an important step for Microsoft to compete with a host of other enterprise collaboration companies, including Google, which recently announced a pair of services that compete with SharePoint.The SharePoint mobile app will work for Office 365 users at organizations using SharePoint Online, as well as companies using SharePoint Server 2013 and 2016.
Once again, the Fedora Project has done a lot of work behind the scenes to integrate the latest and greatest versions of software, including the spiffy new GNOME 3.20 desktop environment .What s new on the desktopThe latest version of GNOME brings a lot of polish and improvements across the main Fedora Workstation desktop, including media-player controls in the notification panel and better search in the Files application.When you upgrade from Fedora 24 to Fedora 25 in the future, you ll be able to do it right from GNOME s Software application.Fedora 24 boasts better font-rendering thanks to the GNOME project s focus on improving its included font, named Cantarell.All Fedora packages have been rebuilt with GCC 6, which should result in more optimized code with fewer bugs.As usual, there are also Fedora spins, if you d like to try the latest version of the KDE Plasma, Xfce, LXDE, MATE, or Cinnamon desktops on a Fedora base system.
Along with its Knights Landing chips landing, Intel has unveiled its first implementation of the Open HPC environment.It wraps up the Open HPC software core and APIs with Intel-specific components for example, OmniPath support .Intel also hopes third parties and ISVs will come along for the ride, and to make their lives easier, Intel will handle update distribution so the partners don't have to.First on board with Chipzilla is SUSE, which is going to distributed its Linux Enterprise Server for High Performance Computing as part of the orchestrator.The Intel/SUSE collaboration will land as code in the fourth quarter, when HPC Orchestrator is unleashed on the waiting world.Intel cites a supporting IDC study that says system software is the most expensive piece of putting together an HPC system, at nearly 30 per cent compared to the 20 per cent of cost in the hardware.
That's according to the vice president of network strategy and architecture for Netflix, David Temkin, who created a stir at a meeting of network operators in Chicago last week when he gave a presentation PDF titled "The real cost of Public IXPs."RuckusUnsurprisingly, the presentation caused somewhat of a reaction.And despite the internet's culture of openness, the inner functioning and finances of many of these organizations, which often put claim to a broader public interest remit, remain stubbornly opaque.For example, LINX runs a global public policy arm that lets much of the rest of the industry know about important policy changes that may impact it in political centers across the world.And in addition to supplying a network exchange, Netnod also manages one of the 13 critical root server operations on which the internet rests.That the industry's continued lack of transparency is at odds with its claimed open nature and makes it harder to make good financial decisions on who to sign up with.
A new Intel desktop roadmap obtained by Chinese tech site Benchlife reportedly shows that the company s upcoming desktop processors based on the Kaby Lake architecture will make their debut during the CES trade show taking place in January 2017.This seemingly confirms previous reports that Intel and AMD would duke it out in the processor ring with their new Zen and Kaby Lake processor lineups, respectively, during January s show.According to the roadmap, the 4 2 core Kaby Lake S desktop processors will go into quality sampling during week 35, which is in the beginning of September, followed by mass production in week 42 October and ready-to-ship status during week 50 mid-December .These will supposedly be Core i5 and Core i7 chips packed with four CPU cores and GT2 graphics.As previously reported, AMD is expected to reveal processors based on its Zen core technology during CES 2017 as well.Zen cores will first appear in desktop processors followed by server chips, laptop chips, and then finally the embedded market.
Oh, terabytes or even petabytes.It provides the FormationOne Dynamic Storage Platform which is a software-defined storage product.The product is claimed to be hyper-scale and fault-tolerant.Virtual Storage Recapture VSR is the feature it has developed to locate and use stranded storage.VSR runs as a VM to create new storage from existing unused storage devices in hypervisors, extra capacity in VM-attached arrays and extra capacity on hyper-converged systems.His co-founder was Andy Jenks, who was then an executive-in-residence at both Khosla Ventures and EMC Ventures.
Citrix's GoToMyPC has warned of 'a sophisticated password attack,' and is requiring all users to choose new passwords for its eponymous remote access service.GoToMyPC allows anyone to take control of any PC with the server system installed, much like Microsoft's own Remote Desktop Protocol RDP or the cross-platform Virtual Network Computing VNC , providing they know the password for access.Naturally, the ability to control a host PC as though you're sitting right in front of it - including accessing local files, passwords saved in the browser, and installing any additional software of your choice - is of great interest to digital ne'er-do-wells, which is why keeping the service secure is of key importance.GoToMyPC emailed its users this weekend warning of what it described as 'a very sophisticated password attack,' automatically resetting all passwords and requiring that everybody picks a new and strong password as well as activating two-step verification - a weaker form of two-factor authentication which nevertheless improves the security of a given account over a simple password alone.The company has not yet announced the precise nature of the attack on its network, nor whether user passwords were directly breached from its servers.All users are advised to use the forgotten password form to choose a new password, without which they will be unable to log in to their account.
Students at the University of California, Davis, have created whan they claim to be the first ever microprocessor to boast 1,000 independently programmable cores, complete with independent clocks and pooled memory.The most successful highly-parallel many-core processors are, of course, GPUs, but these were developed specifically for graphics processing and even in their server-centric accelerator board formats are not suited to all forms of processing.Built on a 32nm CMOS process by IBM, the chip was designed by a team at the University of California, Davis, and comes with impressive specifications: 1,000 independent processing cores, capable of running in parallel or entirely independently and clocked at an impressive 1.78GHz average maximum, along with a pooled memory system which does away with the write-then-read bottleneck of typical many-core systems.According to Brent Bohnenstiehl, the graduate student behind the core architecture, the KiloCore processor is a hundred times more efficient in terms of performance-per-watt than a modern laptop processor - despite being built on an antiquated process node.The team has already developed numerous applications to run on the cores, including wireless codecs, video processing tools, encryption utilities, and datacentre record processing software - anything, in other words, which benefits from a many-core highly-parallel approach.The team presented its KiloCore research at the VLSI Technology and Circuits Symposium in Honolulu this month, but has not yet announced plans to commercialise the KiloCore nor any partnerships with companies to bring it to market.
In the same way, the web browsers of the future might not be able to open today s webpages and images–if future historians are lucky enough to have copies of today s websites at all.But if Internet Archive founder Brewster Kahle, Cerf, and their allies who recently came together at what they called the Decentralized Web Summit have their way, the world will one day have a web that archives itself and backs itself up automatically.The IPFS team is already hard at work on a feature that would allow a web app to keep trucking along even if the original server disappears, and it s already built a chat app to demonstrate the concept.Today s web isn t just a collection of static HTML files; it s dynamic apps like Facebook, Twitter, and Slack.Does anyone in the future really need to see old drunken college photos or inadvisable Facebook rants?Still, those blacklists themselves become a reminder of the things we re trying to forget.
Top researcher pockets £52,000 as Google uses Android vulnerabilities to secure Android NGoogle has paid out £376,000 $550,000 in bug bounties to 82 different people over the last 12 months, as the search giants continues to reward those who find security vulnerabilities on its Android platform.Nexus devices While the program is focused on Nexus devices and has a primary goal of improving Android security, more than a quarter of the issues were reported in code that is developed and used outside of the Android Open Source Project, Google wrote in a blog post.Fixing these kernel and device driver bugs helps improve security of the broader mobile industry and even some non-mobile platforms .Google will now pay 33 percent more for a high-quality vulnerability report with proof of concept.Thank you to everyone who helped us make Android safer.Take our Android quiz here!
The move extends Apple s aggressive stance on encryption, which in recent months has seen it face off against the FBI in US court and publicly criticise draft UK legislation that would weaken such tools.With iOS 9, released in March, Apple introduced a feature called App Transport Security ATS that, when in use, causes all unencrypted communications to fail.Encryption moveGoogle recently acknowledged this in providing code to developers that would switch ATS off in cases where advertisements using non-HTTPS networks would have failed to display.While Google remains committed to industry-wide adoption of HTTPS, there isn t always full compliance on third party ad networks and custom creative code served via our systems, Google stated at the time.A year from now, it seems highly likely that most modern mainstream iOS apps will be HTTPS-only, wrote Sophos Bill Camarda in an advisory.Try our quiz!
Persistent storage technology solves problem of Docker volume management SEATTLE– BUSINESS WIRE –June 20, 2016– Virtuozzo, powering more than five million virtual environments as the leading virtualization platform for service providers, announced the availability of Virtuozzo Storage for Docker.Once, however, a Docker application goes into production, you need a more robust solution to manage and protect such data – it is not just about test records anymore said Rob Lovell, CEO of Virtuozzo.A major management problem arises in highly dynamic multi-server environments-it becomes nearly impossible to efficiently manage application data using Docker alone.Instead of relying on external storage or risking data loss, when developers need stateful storage for their Docker containers and container-based applications they can use Virtuozzo Storage for Docker driver, a software-defined storage solution that can leverage the same hardware already used for Docker deployments.Docker is fantastic for building and testing, but doesn t include a good storage solution for production environments, said Lovell.We are big fans of Virtuozzo Storage and are currently using it to give our customers a highly available, secure storage solution, said Camiel Cornelissen, senior product manager, Hostnet.
Some of the world s fastest computers employ Nvidia s graphics processor for computer vision, deep learning and scientific calculations, and a new GPU will supercharge these applications.The Tesla P100 that plugs into the PCI-Express slots of supercomputers will speed up tasks like economic forecasting and weather modeling.The GPU is also targeted at servers, and will play a big role in helping self-driving cars, robots and drones identify objects.Further reading: Nvidia's beastly Pascal GPU is packed with cutting-edge tech and 15 billion transistorsDeep-learning systems with the GPUs in data centers will improve cloud-based image recognition, classification, natural language processing and speech recognition.Nvidia said server makers like Cray, Dell and Hewlett-Packard Enterprise will start taking orders and delivering systems with the GPU starting in the fourth quarter this year.The GPU will also appear in multiple supercomputers in the future, said Roy Kim, Tesla product manager at Nvidia.
Each P100 features four 40GB/s Nvidia NVLink ports to connect together clusters of GPUs, NVLink being Nvidia's high-speed interconnect.The rest of us, in the real world, are using x86 processors for backend workloads.While the NVLink P100 will consume 300W, its 16GB PCIe cousin will use 250W, and the 12GB option just below that."The PCIe P100 will be for workhorse systems – the bulk of machines," Roy Kim, a senior product manager at Nvidia, told The Register.For what it's worth, Nvidia told us the P100 PCIe cards will later this year feature in an upgraded build of Europe's fastest supercomputer: the Piz Daint machine at the Swiss National Supercomputing Center in Lugano, Switzerland.Meanwhile, Nv's GPU Interference Engine GIE will finally make a public appearance this week: this is code designed to run on hardware from data center-grade accelerators down to system-on-chips in cars and drones, given applications the ability to perform inference using trained models.
At the time, Mr. Levick recalls, Spotify was viewed externally and internally as a company focused on its on-demand, ad-free music streaming product—with some perceiving its free, ad-supported business as existing simply to herd people toward signing up for subscriptions.Last month, for example, Mr. Levick brought on Liberty Carras Kelly, a former Fox and CNN executive, as Spotify s new head of Americas sales, as well as former Vevo vice president of commercial marketing, Danielle Lee, as Spotify s vice president of global partner solutions.In other words, there are a lot of Spotify users to make money from that don t subscribe.In March, Spotify raised $1 billion in convertible debt.The money-losing company was valued at $8.5 billion in June 2015.Since then, the Swedish company has built its own ad server and proprietary ads products.
Seven months earlier, on October 2, 2003, Valve Corporation director Gabe Newell awoke in Seattle to find that the source code for the game his company had been working on for almost five years had leaked onto the Internet.Half-Life 2 , one of the most anticipated games of the year, was going to be late, and Newell had yet to admit to the public how late it would be.After he had spent a few moments pondering these immediate concerns, an avalanche of questions tumbled through Newell's mind.The young German soon realised what he had installed on his PC.AXFR stands for Asynchronous Full Zone Transfer, a tool used to synchronise servers."You cannot stop the Internet"There's something about the secrets and codes that video-game developers leave in their games that allows players a kind of glimpse behind the curtain.
Google has paid out over $550,000 to researchers finding vulnerabilities in Android, Nexus phones and tablets since June 2015Google has awarded more than $550,000 £383,035 in total to 82 researchers for finding security flaws within the Android mobile operating system, the company announced on 16 June."A year ago, we added Android Security Rewards to the long standing Google Vulnerability Rewards Program," Google's Android Security programme manager Quan To wrote in a blog post.According to the post, the top bug hunter in 2015 was Peter Pi who received $75,750 in total for 26 vulnerability reports.From 1 June, Google will pay 33% more for a high-quality bug report with proof of concept and throw in a 50% bonus if you can provide a patch for the issue as well.Google's Android Security Rewards programme was launched in June 2015, just a month before the first StageFright bugs attacked Android devices and prompted the tech giant to beef up its security efforts.The company says that although its programme does focus on Nexus devices, it is benefiting the mobile industry as a whole as well.
His app consists of a free multiplayer game that gives users control of snakelike creatures to fight for food.Competition in this space is fierce, and success at the level Slither.io found is comparatively rare.Recent reports show the app pulls in a cool $100,000 a day, and developers are struggling to keep up with the demand.He could easily use large companies like Amazon to provide server space and save time, but would quickly lose profitability paying the exorbitant rates charged for the amount of bandwidth that his app requires.Coordinating multi-level play with anything more complex would be difficult at best, but Slither.io sticks with simple concepts, which obviously works.Keeping users happy appears to be a high priority for Howse.
Apple launched App Transport Security a year ago, a service that enforces secure connections between apps and servers.Today, I m proud to say that at the end of 2016, App Transport Security is becoming a requirement for App Store apps, said Apple s head of security, Ivan Krstic, during a presentation at WWDC.ATS first showed up in iOS 9, and when it s enabled it basically forces apps to connect to the web using HTTPS connections, which are more secure than the standard HTTP connections.What that means is that when data is being transferred from an app to a server and back, it s encrypted.Of course, plenty of apps already use ATS — it was enabled by default in iOS 9, however developers were able to switch it off if they so chose.Ever since the Edward Snowden revelations there has been a movement to secure data, something that Apple has taken very seriously, as demonstrated by its battle against the FBI over access to user iPhones — Apple encrypts all of the data on an iPhone, meaning that agencies like the FBI are unable to access that data.