Ivanka Trump, Big Tech Companies Plan Marketing Campaign Targeting Teens' Perceptions of Tech Jobs 130
In the slides, a screenshot from a "Landing Experience Prototype" for an accompanying website displays logos of some of America's biggest tech companies -- e.g. Microsoft, Google, Amazon, IBM -- and encourages visitors to: "Find an employer who understands. America's biggest employers know there's a huge skill shortage. They also know that today's top talent doesn't always come from traditional four-year universities. That's why we've asked them to sign a pledge to de-prioritize college degrees in their hiring processes."
Meeting minutes show that the Board -- pressed by IBM's Rometty -- approved her working group's proposal to "develop a private sector-led national campaign to raise awareness of and promote multiple pathways to well-paying jobs for all Americans" through a voice vote. Prior to the vote, IBM VP of Corporate Marketing Ann Gould Rubin explained that "advertising can be a compelling way to change even deep-seated perceptions," adding that "it could both change perceptions and cause people to act." Rubin noted that -- on its own -- IBM has initiated some research to gain insights into how to reach the target audiences, looking at motivations, drivers, interests, barriers, and reactions to descriptions of pathways.
Hey, like voters, those poor 16-year-old kids won't even know what hit 'em!
CNBC Reports Open Source Software Has Essentially 'Taken Over the World' (cnbc.com) 103
The documentary does mention the 1990s, when Microsoft "even went so far as to call Open Source 'Unamerican' and bad for intellectual property rights." But two and a half minutes in, they also tell the famous story of that 1970s printer jam at MIT which led to the purchase of a proprietary printer that inspired Richard Stallman to quit his job to develop the GNU operating system and spearhead the free software movement. And at three and a half minutes in, they also describe how Linus Torvalds "unceremoniously released" Linux in 1991, and report that "By the turn of the century, NASA, Dell, and IBM were all using it." And at 4:18, they mention "other open source projects" gaining popularity, including MySQL, Perl, and Apache.
"But for the layperson at the turn of the century, the rise of these technologies could have gone unnoticed. After all, hardly anyone ran Linux on their personal computers. But then in 2008, Google released Android devices, which ran on a modified version of Linux. Suddenly the operating system blew up the smartphone market..." (Chen Goldberg, Google's Director of Engineering, cites 2.5 billion active Android devices.) The documentary then traces the open source movement up through our current decade, even mentioning Microsoft's acquisition of GitHub, IBM's acquisition of Red Hat, and various monetization models (including GitHub's new "Sponsors" program). And it ends with the narrator calling open source development "the new norm..."
"After all, the success of Open Source reveals that collaboration and knowledge-sharing are more than just feel-good buzzwords. They're an effective business strategy. And if we're going to solve some of the world's biggest problems, many believe that we can't afford to hoard our resources and learnings."
Here's a list (in order of appearance) of the people interviewed:
- Nat Friedman, CEO of GitHub
- Devon Zuegel, Open-Source Product Manager, GitHub
- Chris Wright, CTO of Red Hat
- Jim Zemlin, Executive Director of the Linux Foundation
- Feross Aboukhadijeh, Open-Source Maintainer
- Chen Goldberg, Google's Director of Engineering
Jim Zemlin, Executive Director of the Linux Foundation, even tells CNBC that 10,000 lines of code are added to Linux every day. "It is by far the highest-velocity, the most effective software development process in the history of computing... As the idea of sharing technology and collaborating collectively expands, we're moving into open hardware initiatives, data-sharing initiatives. And that's really going to be the future...
"The complexity of building these technologies isn't going down, it's only going up. We can get that technology out there faster when everybody works together."
In 1994 A 12-Year-Old Programmed a Videogame. It Turned Up on Twitch Monday (kotaku.com) 41
An anonymous reader quotes Kotaku: Rick Brewster is a programmer and the author of Paint.NET, a free replacement for Microsoft Paint that's expanded to have features similar to image creation programs like Photoshop and GIMP. In 1994, at the age of 12, Brewster made The Golden Flute IV: The Flute of Immortality, a DOS-based roleplaying game inspired by a text adventure from a 1984 instructional book on how to write adventure games. He wrote The Golden Flute IV on a Tandy 1000 TL/2, an IBM clone computer...
"I made ONE installable copy onto 3.5" 720K disks that I packaged up and mailed to my cousin on the east coast, and that's it," Brewster explained in a Twitter thread. That copy was seemingly lost, with no playable copy surviving.
Apparently, that's not what happened. Somehow, a version of that game found its way into the hands of a streamer name Macaw, who specializes in old and obscure games. He played The Golden Flute IV on December 23rd, exploring it for a short time before moving on to other games.
"Apparently breaking & entering is a 'serious felony' and punishable by execution without a trial in this universe," Brewster remembered on Twitter on Christmas Day.
He believes that back in 1994 his cousin must've uploaded the videogame to a BBS, since it's now ended up in the old game collection "Frostbyte" at the Internet Archive. Which means that you, too, can now play 12-year-old Rick Brewster's long-lost amateur videogame using Archive.org's online DOSbox emulator.
Randy Suess, Computer Bulletin Board Inventor, Dies at 74 (nytimes.com) 28
IBM Research Created a New Battery That May Outperform Lithium-Ion, Doesn't Use Conflict Minerals (gizmodo.com) 139
As a potential solution, scientists at IBM Research's Battery Lab came up with a new design that replaces the need for cobalt and nickel in the cathode, and also uses a new liquid electrolyte (the material in a battery that helps ions move from one end to the other) with a high flash point. The combination of the new cathode and the electrolyte materials was also found to limit the creation of lithium dendrites which are spiky structures that often develop in lithium-ion batteries that can lead to short circuits. So not only would this new battery have less of an impact on the environment to manufacture, but it would also be considerably safer to use, with a drastically reduced risk of fire or explosions. The researchers believe the new battery would have a larger capacity than existing lithium-ion batteries, could potentially charge to about 80 percent of its full capacity in just five minutes, would be more energy-efficient, and, on top of it all, it would be cheaper to manufacture which in turn means they could help reduce the cost of gadgets and electric vehicles. As IEEE Spectrum notes, the group has revealed precious little technical information about their battery's chemistry, configuration, or design -- so those in the field are unsure if IBM has created something truly remarkable, or if they're exaggerating their claims.
Russia Joins Race To Make Quantum Dreams a Reality (nature.com) 18
[...] The race is on to create quantum computers that outperform classical machines in specific tasks. Prototypes developed by Google and IBM, headquartered in Mountain View, California, and Armonk, New York, respectively, are approaching the limit of classical computer simulation. In October, scientists at Google announced that a quantum processor working on a specific calculation had achieved such a quantum advantage. Russia is far from this milestone. "We're 5 to 10 years behind," says Fedorov. "But there's a lot of potential here, and we follow very closely what's happening abroad." Poor funding has excluded Russian quantum scientists from competing with Google, says Ilya Besedin, an engineer at the National University of Science and Technology in Moscow.
Tony Brooker, Pioneer of Computer Programming, Dies At 94 (nytimes.com) 26
Mr. Brooker joined the Manchester lab in October 1951, just after it installed a new machine called the Ferranti Mark 1. His job, he told the British Library in an interview in 2010, was to make the Mark 1 "usable." Mr. Turing had written a user's manual, but it was far from intuitive. To program the machine, engineers had to write in binary code -- patterns made up of 0s and 1s -- and they had to write them backward, from right to left, because this was the way the hardware read them. It was "extremely neat and very clever but pretty meaningless and very unfriendly," Mr. Brooker said. In the months that followed, Mr. Brooker wrote a language he called Autocode, based on ordinary numbers and letters. It allowed anyone to program the machine -- not just the limited group of trained engineers who understood the hardware. This marked the beginning of what were later called "high-level" programming languages -- languages that provide increasingly simple and intuitive ways of giving commands to computers, from the IBM mainframes of the 1960s to the PCs of the 1980s to the iPhones of today.
George Laurer, Co-Inventor of the Barcode, Dies At 94 (bbc.com) 21
It was while working as an electrical engineer with IBM that George Laurer fully developed the Universal Product Code (UPC), or barcode. He developed a scanner that could read codes digitally. He also used stripes rather than circles that were not practical to print. The UPC went on to revolutionize "virtually every industry in the world", IBM said in a tribute on its website.
Can We Kill Fake News With Blockchain? (computerworld.com) 164
The New York Times is one of the first major news publications to test blockchain to authenticate news photographs and video content, according to Gartner. The newspaper's Research and Development team and IBM have partnered on the News Provenance Project, which uses Hyperledger Fabric's permissioned blockchain to store "contextual metadata." That metadata includes when and where a photo or video was shot, who took it and how and when it was edited and published...
Blockchain could also change how corporate public offerings are done. Many private companies forgo a public offering because of the complexity of the process. With blockchain ledgers, securities linked to digital tokens could move more easily between financial institutions by simply bypassing a central clearance organization.
The article also envisions a world with encrypted digital online credentials on a blockchain ledger that are linked back to the bank, employer, or government agency that created them.
Ken Elefant, managing director of investment firm Sorenson Capital, sees this technology creating a world of super-secure profiles where "only the individuals or companies authorized have access to that data -- unlike the internet today where you and I can be marketed to by anybody,"
New Iranian Wiper Discovered In Attacks On Middle Eastern Companies (arstechnica.com) 37
In addition to brute force attacks on network accounts, the attackers exploited a SharePoint vulnerability to drop web shells on a SharePoint server. These included China Chopper, Tunna, and another Active Server Pages-based webshell named "extensions.aspx," which "shared similarities with the ITG13 tool known as TWOFACE/SEASHARPEE," the IBM researchers reported. They also attempted to install TeamViewer remote access software and used a modified version of the Mimikatz credential-stealing tool -- obfuscated to hide its intent -- to steal more network credentials off the compromised servers. From there, they moved out across the network to spread the ZeroCleare malware. "While X-Force IRIS cannot attribute the activity observed during the destructive phase of the ZeroCleare campaign," the researchers noted, "we assess that high-level similarities with other Iranian threat actors, including the reliance on ASPX web shells and compromised VPN accounts, the link to ITG13 activity, and the attack aligning with Iranian objectives in the region, make it likely this attack was executed by one or more Iranian threat groups."
elementary OS 5.1 'Hera' Linux Distro is Here (betanews.com) 42
Geeks Successfully Transport a 50-Year-Old IBM Mainframe to Former UK Top Secret Mi6 Base (ibms360.co.uk) 46
"The traffic from Slashdot on our original posts was incredible," he writes today. "We definitely got Slashdotted. I was up until the early hours migrating servers!" Yet he's daring to send us another update. "We have now successfully got it back to the UK and to it's new home at a former Top Secret Mi6 base! "
Their blog post credits the discounted service they received from a "bespoke IT infrastructure solutions" company called Sunspeed: They confirmed that they'd be able to help, and because they recognized the importance of the project and how much they liked it, they were kindly willing to do it at a significant discount which was covered completely by the crowd funding donations... "Upon reading about the issues being experienced trying to find a large enough vehicle with a tail-lift capable of handling the weight, I knew we could help. We're really pleased we could help out and be a part of this amazing story to recover such a rare piece of IT history... I think we'll now have to change our marketing to: Whether you need to move a single server, an entire Data Centre or recover an extremely rare and sensitive IBM 360 Machine from Germany before Brexit, then Sunspeed is here to help....!"
They had tons of bubble wrap and pallet wrap, along with these fantastic cardboard corner pieces for the machines. They also had this fantastic plastic sheeting to go down on the difficult and uneven surfaces which made life a lot easier. Their plan was to wrap every machine in bubble wrap, and then wrap it in pallet wrap to keep everything safe before strapping it into the truck. This was much more than we were expecting so we were thoroughly impressed!
It's a tale of machine cables, loose panels, and a pallet of punch cards, with lots of fun photos from the move, as well as video of the vintage mainframe's triumphant arrival and unwrapping at its new home. "At that point, we were pretty tired and so we called it a day. We'll be heading back soon to start cleaning and cataloguing the machines to determine exactly what the specifications and state of them are. Needless to say, we're all terribly excited to get our teeth stuck into the project!"
"We can't thank everybody enough for all their help on this project."
The World's Fastest Supercomputers Hit Higher Speeds Than Ever With Linux (zdnet.com) 124
Close behind at No. 3 is the Sunway TaihuLight supercomputer, with an HPL mark of 93.0 petaflops. TaihuLight was developed by China's National Research Center of Parallel Computer Engineering and Technology (NRCPC) and is installed at the National Supercomputing Center in Wuxi. It is powered exclusively by Sunway's SW26010 processors. Sunway's followed by the Tianhe-2A (Milky Way-2A). This is a system developed by China's National University of Defense Technology (NUDT). It's deployed at the National Supercomputer Center in China. Powered by Intel Xeon CPUs and Matrix-2000 accelerators, it has a top speed of 61.4 petaflops. Coming at No. 5, the Dell-built, Frontera, a Dell C6420 system is powered by Intel Xeon Platinum processors. It speeds along at 23.5 petaflops. It lives at the Texas Advanced Computing Center of the University of Texas. The most powerful new supercomputer on the list is Rensselaer Polytechnic Institute Center for Computational Innovations (CCI)'s AiMOS. It made the list in the 25th position with 8.0 petaflops. The IBM-built system, like Summit and Sierra, is powered by Power9 CPUs and NVIDIA V100 GPUs. In closing, ZDNet's Steven J. Vaughan-Nichols writes: "Regardless of the hardware, all 500 of the world's fastest supercomputers have one thing in common: They all run Linux."
Quantum Computer Made From Photons Achieves New Record (scientificamerican.com) 23
The result was reported in a paper posted at the preprint server arXiv.org on October 22 and has yet to be peer-reviewed. But if it is confirmed, it would be an important milestone in the race for quantum-computational supremacy -- a fuzzy goalpost defined as the point where quantum computers outpace their best classical counterparts.... Pan and Lu argue in their paper that their technique is another possible route toward quantum supremacy... Part of the trouble is its limited utility. "A universal computer can solve any different type of problem," says Jonathan Dowling, a theoretical physicist at Louisiana State University, who was not involved with the research. "This can only solve one." But solving just one problem faster than a classical computer would count as a demonstration of quantum-computational supremacy...
Over the past few weeks, the race for quantum computational supremacy has reached a breakneck pace. Google's quantum computer performed an operation that its scientists claim would take a classical computer 10,000 years in just 200 seconds. IBM researchers, who are also working on a quantum computer, have expressed doubts, suggesting a classical computer could solve that problem in under three days... "Quantum supremacy is like a horse race where you don't know how fast your horse is, you don't know how fast anybody else's horse is, and some of the horses are goats," Jonathan Dowling, a theoretical physicist at Louisiana State University, says. But this result, he clarifies, is not a goat.
Public Cloud Providers' Network Performance Wildly Varies (zdnet.com) 14
First, ThousandEyes found some cloud providers rely heavily on the public internet to transport traffic instead of their backbones. This, needless to say, impacts performance predictability. During the evening Netflix internet traffic jam, if your cloud provider relies on the internet, you will see slowdowns in the evening. So, while Google Cloud and Azure rely heavily on their private backbone networks to transport their customer traffic, AWS and Alibaba Cloud rely heavily on the public internet for the majority of transport, IBM takes a hybrid approach that varies regionally.
What about AWS Global Accelerator? If you pay for this service, which puts your traffic on the AWS private backbone network, will you always see a better performance? Surprisingly, the answer's no. AWS doesn't always out-perform the internet. ThousandEyes found several cases, where the internet performs faster and more reliably than Global Accelerator -- or the results were negligible. For example, ThousandEyes discovered that from your headquarters in Seoul, you'd see a major latency improvement when accessing AWS US-East-1. That's great. But your office in San Francisco wouldn't see any improvement, while your group in Bangalore India would see a performance decrease. Generally speaking, Latin America and Asia have the highest performance variations across all clouds, whereas, in North America, cloud performance is generally comparable. You need to look at ThousandEye's detailed findings to pick out the best cloud provider on a per-region basis to ensure optimal performance. Regional performance differences can make a huge impact. Additionally, the ISP you use and whether or not you're moving traffic in or out of China also affects cloud performance.
For more on the report, see ThousandEyes' website.
Unusual New 'PureLocker' Ransomware Is Going After Servers (zdnet.com) 22
There's currently no figures on the number PureLocker victims, but Intezer and IBM X-Force have confirmed the ransomware campaign is active with the ransomware being offered to attackers 'as-a-service.' However, it's also believed than rather than being offered to anyone who wants it, the service is offered as a bespoke tool, only available to cyber criminal operations which can afford to pay a significant sum in the first place. The source code of PureLocker ransomware offers clues to its exclusive nature, as it contains strings from the 'more_eggs' backdoor malware. This malware is sold on the dark web by what researchers describe as a 'veteran' provider of malicious services. These tools have been used by some of the most prolific cyber criminal groups operating today, including Cobalt Gang and FIN6 -- and the ransomware shares code with previous campaigns by these hacking gangs. It indicates the PureLocker is designed for criminals who know what they're doing and know how to hit a large organization where it hurts.
IBM's 200,000 Macs Have Made a Happier and More Productive Workforce, Study Finds (appleinsider.com) 169
Turning to employee satisfaction, the first-of-its-kind study shows that Mac users were 17 percent less likely to leave IBM compared to their Windows counterparts. Mac users also were happier with the software available, with 5 percent asking for additional software compared to 11 percent of Windows users. A team of seven engineers is needed to maintain 200,000 Macs whereas a team of 20 is needed for that number of Windows PCs. During setup, the migration process was simple for 98 percent of Mac users versus only 86 percent of those moving from Windows 7 to Windows 10. Windows users were also five times as likely to need on-site support.
Share of Cryptocurrency Jobs Grew 1,457% In 4 Years (venturebeat.com) 25
In the past year, the share of cryptocurrency job postings per million on Indeed.com has increased by 26%, while the share of searches per million for jobs has decreased by 53%. Bitcoin's volatility seems to correlate with job seeker interest, and the change in Bitcoin price this year might be why job searches have declined. Employers, however, are doubling down on the technology, which uses decentralized ledgers to produce secure and transparent transactions. The report says that if you want a better chance at getting a job in this field you should be a programmer familiar with basic cryptography, P2P networks, and a language like C++, Java, Python, or JavaScript (along with certain soft crypto skills). To stand out, you should learn new blockchain development languages, like Hyperledger, Bitcoin Script, Ethereum's Solidity, the Ripple protocol, or even languages currently in development -- like Rholang.
The top hirers are as follows: Deloitte, IBM, Accenture, Cisco, Collins Aerospace, Ernst & Young, Coinbase, Overstock, Ripple, Verizon, Circle, Kraken, ConsenSys, JP Morgan Chase, and Signature Bank.