Input Devices

Video Mechanical 'Clicky' Keyboards Still Have Followers (Video) 147

For a good number of years, the sound of the old IBM or other mechanical keyboard clacking away was the sound of programmers (or writers) at work on their computers. Then, according to Edgar Matias, president and cofounder of the Matias Corporation, computer companies started using membrane switches and other cheaper ways to make keyboards, which made a lot of people mutter curse words under their breath as they beat their fingers against keys that had to go all the way to the bottom of their travel to work, unlike the good old mechanical keyboards we once knew and loved.

Enter Edgar Matias, who started out making the half keyboard, which is like a chorded keyboard except that you can use your QWERTY typing skills with little modification -- assuming you or your boss has $595 (!) to lay out on a keyboard. But after that Edgar started making QWERTY and Dvorak keyboards for semi-competitive prices. FYI: No Slashdot person got a free keyboard (or extra money) for making this video, but I have a Matias keyboard, and in my opinion it's far better than the cheapie it replaced. A lot of other people seem to want "real" keyboards, too, which they buy from Matias or from other companies such as Unicomp, which makes keyboards just like the classic, heavily-loved IBM Model M. Again, I've owned a Unicomp keyboard (that I bought; it was not a giveaway) and it was excellent. Both companies put out quality products that are far easier on your hands and wrists than the $10 or $20 keyboards sold by big box electronics retailers.
IBM

Are We Entering a "Golden Age of Quantum Computing Research"? 86

Lashdots writes: Last month, an elite team at IBM Research announced an advance in quantum computing: it had built a four-qubit square lattice of superconducting qubits, roughly one-quarter-inch square, that was capable of detecting and measuring the two types of quantum computing errors (bit-flip and phase-flip). Previously, it was only possible to address one type of quantum error or the other. The next step is to correct quantum errors.

In a blog post, Mark Ritter, who oversees scientists and engineers at IBM's T.J. Watson Research Laboratory, wrote: "I believe we're entering what will come to be seen as the golden age of quantum computing research." His team, he said, is "on the forefront of efforts to create the first true quantum computer." But what would that mean, and what other big next steps are there?
Security

Beware the Ticking Internet of Things Security Time Bomb 131

alphadogg writes: A panel of security experts, including from IBM, LogMeIn and formerly RSA, warn that IoT security is a growing threat because device makers haven't baked in security. IT security staffs are already inundated with safeguarding internal infrastructure and cloud-based resources, so guarding against a slew of new threats is likely to be overwhelming. LogMeIn's Paddy Srinivasan says most Internet-of-things OEMs "barely even have IT staff," so they aren't capable of developing rigorous security even if they wanted to. IBM’s Andy Thurai says most companies are rushing technology to market to try to monetize you as much as possible, and they aren't even willing to give you a cut for the data you supply. Regulations may help, but probably not enough and definitely not soon.
Communications

Apple, IBM To Bring iPads To 5 Million Elderly Japanese 67

itwbennett writes: An initiative between Apple, IBM and Japan Post Holdings could put iPads in the hands of up to 5 million members of Japan's elderly population. The iPads, which will run custom apps from IBM, will supplement Japan Post's Watch Over service where, for a monthly fee, postal employees check on elderly residents and relay information on their well-being to family members.
IBM

IBM CIO Thinks Agile Development Might Save Company 208

Nerval's Lobster writes: A new Wall Street Journal article details how IBM CIO Jeff Smith is trying to make Big Blue, which is going through some turbulent times as it attempts to transition from a hardware-dependent business to one that more fully embraces the cloud and services, operate more like a startup instead of a century-old colossus. His solution centers on having developers work in smaller teams, each of which embraces Agile methodology, as opposed to working in huge divisions on multi-year projects. In order to unite employees who might be geographically dispersed, IBM also has its groups leave open a Skype channel throughout the workday. Smith hopes, of course, that his plan will accelerate IBM's internal development, and make it more competitive against not only its tech-giant competition, but also the host of startups working in common fields such as artificial intelligence.
Technology

When Exxon Wanted To Be a Personal Computing Revolutionary 124

An anonymous reader writes with this story about Exxon's early involvement with consumer computers. "This weekend is the anniversary of the release of the Apple IIc, the company's fourth personal computer iteration and its first attempt at creating a portable computer. In 1981, Apple's leading competitor in the world of consumer ('novice') computer users was IBM, but the market was about to experience a deluge of also-rans and other silent partners in PC history, including the multinational descendant of Standard Oil, Exxon. The oil giant had been quietly cultivating a position in the microprocessor industry since the mid-1970s via the rogue Intel engineer usually credited with developing the very first commercial microprocessor, Federico Faggin, and his startup Zilog. Faggin had ditched Intel in 1974, after developing the 4004 four-bit CPU and its eight-bit successor, the 8008. As recounted in Datapoint: The Lost Story of the Texans Who Invented the Personal Computer, Faggin was upset about Intel's new requirement that employees had to arrive by eight in the morning, while he usually worked nights. Soon after leaving Intel and forming Zilog, Faggin was approached by Exxon Enterprises, the investment arm of Exxon, which began funding Zilog in 1975."
Data Storage

220TB Tapes Show Tape Storage Still Has a Long Future 229

alphadogg writes: IBM and Fujifilm have figured out how to fit 220TB of data on a standard-size tape that fits in your hand, flexing the technology's strengths as a long-term storage medium. The prototype Fujifilm tape and accompanying drive technology from IBM labs packs 88 times as much data onto a tape as industry-standard LTO-6 systems using the same size cartridge, IBM says. LTO6 tape can hold 2.5TB, uncompressed, on a cartridge about 4 by 4 inches across and 2 centimeters thick. The new technologies won't come out in products for several years.
Microsoft

Microsoft Celebrates 40th Anniversary 142

HughPickens.com writes Alyssa Newcomb reports at ABC News that the software company started by Bill Gates and Paul Allen on April 4, 1975 is 40 and fabulous and highlights products and moments that helped define Microsoft's first four decades including: Microsoft's first product — software for the Altair 8800; Getting a deal to provide a DOS Operating System for IBM's computers in 1980; Shipping Windows 1.0 in 1985; Microsoft Office for Mac released in 1989; Windows 3.0 ships in 1990, ushering in the era of graphics on computers; Windows 95 launches in 1995, selling an astounding 7 million copies in the first five weeks, and the first time the start menu, task bar, minimize, maximize and close buttons are introduced on each window.

For his part, Bill Gates sent a letter to employees celebrating Microsoft's anniversary, and how far computing has come since he and Paul Allen set the goal of a computer on every desk and in every home, and predicting that computing will evolve faster in the next 10 years than it ever has before.
China

IBM and OpenPower Could Mean a Fight With Intel For Chinese Server Market 85

itwbennett writes With AMD's fade out from the server market and the rapid decline of RISC systems, Intel has stood atop the server market all by itself. But now IBM, through its OpenPOWER Foundation, could give Intel and its server OEMs a real fight in China, which is a massive server market. As the investor group Motley Fool notes, OpenPOWER is a threat to Intel in the Chinese server market because the government has been actively pushing homegrown solutions over foreign technology, and many of the Foundation members, like Tyan, are from China.
Databases

Michael Stonebraker Wins Turing Award 40

An anonymous reader writes: Michael Stonebraker, an MIT researcher who has revolutionized the field of database management systems and founded multiple successful database companies, has won the Association for Computing Machinery's $1 million A.M. Turing Award, often referred to as "the Nobel Prize of computing." In his previous work at the University of California at Berkeley, Stonebraker developed two of his most influential systems, Ingres and Postgres (PDF), which provide the foundational ideas — and, in many cases, specific source code — that spawned several contemporary database products, including IBM's Informix and EMC's Greenplum. Ingres was one of the first relational databases, which provide a more organized way to store multiple kinds of entities – and which now serve as the industry standard for business storage. Postgres, meanwhile, integrated Ingres' ideas with object-oriented programming, enabling users to natively map objects and their attributes into databases. This new notion of "object-relational" databases could be used to represent and manipulate complex data, like computer-aided design, geospatial data, and time series.
IBM

IBM Will Share Tech With China To Help Build IT Industry There 108

An anonymous reader sends this report from Reuters: IBM Corp will share technology with Chinese firms and will actively help build China's industry, CEO Virginia Rometty said in Beijing as she set out a strategy for one of the foreign firms hardest hit by China's shifting technology policies. IBM must help China build its IT industry rather than viewing the country solely as a sales destination or manufacturing base, Rometty said. ... [Her] remarks were among the clearest acknowledgements to date by a high-ranking foreign technology executive that companies must adopt a different tack if they are to continue in China amid growing political pressure. A number of U.S. technology companies operating in China are forming alliances with domestic operators, hoping a local partner will make it easier to operate in the increasingly tough environment for foreign businesses.
IBM

A Sucker Is Optimized Every Minute 110

theodp writes Now that we have hard data on everything, observes the NY Times' Virginia Heffernan in A Sucker Is Optimized Every Minute, we no longer make decisions from our hearts, guts or principles. "The gut is dead," writes Heffernan. "Long live the data, turned out day and night by our myriad computers and smart devices. Not that we trust the data, as we once trusted our guts. Instead, we 'optimize' it. We optimize for it. We optimize with it." To win Presidential elections. To turn web pages into Googlebait. To sucker people into registering for websites. Of the soon-to-arrive Apple Watch, Heffernan notes: "After time keeping, the watch's chief feature is 'fitness tracking': It clocks and stores physiological data with the aim of getting you to observe and change your habits of sloth and gluttony. Evidently I wasn't the only one whose thoughts turned to 20th-century despotism: The entrepreneur Anil Dash quipped on Twitter, albeit stretching the truth, 'Not since I.B.M. sold mainframes to the Nazis has a high-tech company embraced medical data at this scale.'"
Caldera

Not Quite Dead: SCO Linux Suit Against IBM Stirs In Utah 170

An anonymous reader points to a story in the Salt Lake Tribune which says that The nearly defunct Utah company SCO Group Inc. and IBM filed a joint report to the U.S. District Court in Salt Lake City saying that legal issues remain in the case, which was initiated in 2003 with SCO claiming damages of $5 billion against the technology giant, based in Armonk, N.Y. That likely means that U.S. District Judge David Nuffer, who now presides over the dispute, will start moving the lawsuit — largely dormant for about four years while a related suit against Novell Inc. was adjudicated — ahead. What kind of issues? In addition to its claims of IBM misappropriation of code, SCO alleges that IBM executives and lawyers directed the company's Linux programmers to destroy source code on their computers after SCO made its allegations. The company's other remaining claims are that IBM's actions amounted to unfair competition and interference with its contracts and business relations with other companies. IBM has remaining claims against SCO that allege the Utah company violated contracts, copied and distributed IBM code that had been placed in Linux and that SCO created a campaign of "fear, uncertainty and doubt" about IBM's products and services because of the dispute over Unix code.
Blackberry

BlackBerry's Latest Experiment: a $2,300 'Secure' Tablet 95

An anonymous reader writes: After missing the boat on smartphones, BlackBerry has been throwing everything they can at the wall to see what sticks. From making square phones to insisting users want physical keyboards, their only standard is how non-standard they've become. Now they're expanding this strategy to the tablet market with a security-centric tablet that costs $2,300. And they're not doing it alone — the base device is actually a Samsung Galaxy Tab S 10.5. The tablet runs Samsung Knox boot tech, as well as software from IBM and encryption specialist Secusmart (which BlackBerry recently purchased). The device will be targeted at businesses and organizations who have particular need for secure devices.

"Organizations deploying the SecuTablet will be able to set policies controlling what apps can run on the devices, and whether those apps must be wrapped, said IBM Germany spokesman Stefan Hefter. The wrapping process—in which an app is downloaded from a public app store, bundled with additional libraries that encrypt its network traffic and intercept Android 'intents' for actions such as cutting or pasting data, then uploaded to a private app store—ensures that corporate data can be protected at rest, in motion and in use, he said. For instance, it can prevent data from a secure email being copied and pasted into the Facebook app running on the same device—yet allow it to be pasted into a secure collaboration environment, or any other app forming part of the same 'federation,' he said."
IBM

IBM Reported To Be Developing Blockchain-Based Currency Transaction System 78

An anonymous reader writes: According to a Reuters source, IBM is working with the U.S. Federal Reserve and other central banks to develop a digital currency transaction system using the same blockchain technology that underpins Bitcoin — but which will deal with existing national currencies. The anonymous source says: "These coins will be part of the money supply...It's the same money, just not a dollar bill with a serial number on it, but a token that sits on this blockchain," Despite vocal community protest about the potential "co-opting" of a geographically-neutral cryptocurrency in favor of a centrally-controlled distributed transaction ledger, the IBM project, if true, is only one among hundreds seeking to leverage the blockchain for new transaction systems.
Security

Flaw In Dropbox SDK For Android Lets Attackers Steal Data Sent To Users' Account 23

An anonymous reader writes: Researchers from IBM's security team have discovered an authentication flaw in the Dropbox Software Development Kit (SDK) for Android that can be exploited to capture new data a user saves to its Dropbox account. The flaw has been extensively documented by the researchers in a blog post, but the things you initially need to know are these: the vulnerability can be exploited if you use an app that uses a Dropbox SDK Version 1.5.4 through 1.6.1 (the latest one is v1.6.3), or if you visit a specially-crafted malicious page with your Android web browser targeting that app, and that's only if you don't have the Dropbox for Android app installed. Also, an attacker can't access the data you have previously stored in your Dropbox account.
Security

Anthem Blocking Federal Auditor From Doing Vulnerability Scans 116

chicksdaddy writes Anthem Inc., the Indiana-based health insurer, has informed a federal auditor, the Office of Personnel Management, that it will not permit vulnerability scans of its network — even after acknowledging that it was the victim of a massive breach that leaked data on tens of millions of patients. According to this article, Anthem is citing "company policy" that prohibits third party access to its network in declining to let auditors from OPM's Office of the Inspector General (OIG) conduct scans for vulnerable systems. OPM's OIG performs a variety of audits on health insurers that provide health plans to federal employees under the Federal Employee Health Benefits Program, or FEHBP. Insurers aren't mandated to comply — though most do. This isn't Anthem's first time saying "no thanks" to the offer of a network vulnerability scan. The company also declined to let OIG scan its network in 2013. A partial audit report issued at the time warned that the company, then known as WellPoint, "provided us with conflicting statements" on issues related to information security, including Wellpoint's practices regarding regular configuration audits and its plans to shift to IBM's Tivoli Endpoint Manager (TEM) platform.
United States

US Govt and Private Sector Developing "Precrime" System Against Cyber-Attacks 55

An anonymous reader writes A division of the U.S. government's Intelligence Advanced Research Projects Activity (IARPA) unit, is inviting proposals from cybersecurity professionals and academics with a five-year view to creating a computer system capable of anticipating cyber-terrorist acts, based on publicly-available Big Data analysis. IBM is tentatively involved in the project, named CAUSE (Cyber-attack Automated Unconventional Sensor Environment), but many of its technologies are already part of the offerings from other interested organizations. Participants will not have access to NSA-intercepted data, but most of the bidding companies are already involved in analyses of public sources such as data on social networks. One company, Battelle, has included the offer to develop a technique for de-anonymizing BItcoin transactions (pdf) as part of CAUSE's security-gathering activities.
Open Source

Linux Kernel Switching To Linux v4.0, Coming With Many New Addons 264

An anonymous reader writes Following polling on Linus Torvald's Google+ page, he's decided to make the next kernel version Linux 4.0 rather than Linux 3.20. Linux 4.0 is going to bring many big improvements besides the version bump with there being live kernel patching, pNFS block server support, VirtIO 1.0, IBM z13 mainframe support, new ARM SoC support, and many new hardware drivers and general improvements. Linux 4.0 is codenamed "Hurr durr I'ma sheep."
Businesses

Microsoft To Offer Azure Credits To Compete With IBM, AWS 29

Amanda Parker writes Google, AWS and IBM already offer incentives for start-ups to join them. Microsoft is trying to lure start-ups and SME's to its Azure profile by offering them $500,000 in Azure credits. The deal, announced by Y Combinator, is only available to Y Combinator-backed companies and will be offered to the 2015 Winter and future batches. In addition to this, Microsoft is also giving Y Combinator start-ups a three years Office 365 subscription, access to Microsoft developer staff and one year of free CloudFlare and DataStax enterprise services. The move signifies Microsoft's desire to compete with Amazon Web Services and Google, both of whom already offer credits and freebies.

Slashdot Top Deals