Gigabit Wireless and the Anti iPhone Set

One of the biggest disappointments at this year’s Mobile World Congress, which opened Monday, is that the Samsung Galaxy 8 phone won’t make it. The phone’s official launch is scheduled for March 29.

The Galaxy line has been the ultimate iPhone fighter. Rumors around the anniversary edition of the iPhone suggest that it will do amazing, magical things, like 3D selfies. (OK, I’m really missing Steve Jobs at the moment — who the hell wants 3D selfies?!?)

Missing the biggest historical alternative is keeping a lot of us home this week. Still LG, Motorola, Lenovo and Qualcomm are expected to make huge announcements that could result in the iPhone 8 looking a tad out of date when it finally launches later in the year.

I’ll share some observations on what they have in store and close with my product of the week: a new PC camera from Logitech that enables Microsoft Hello on laptops and desktop PCs that otherwise wouldn’t support it. (When it works, Microsoft Hello is actually pretty cool.)

Gigabit Wireless

Some of this stuff we can anticipate just from Qualcomm launches. Perhaps the biggest of late is the Qualcomm X20 Modem. This part

Linux Begins

Once you have a sense of the vast potential of Linux, you may be eager to experience it for yourself. Considering the complexity of modern operating systems, though, it can be hard to know where to start.

As with many things, computers can be better understood through a breakdown of their evolution and operation. The terminal is not only where computers began, but also where their real power still resides. I’ll provide here a brief introduction to the terminal, how it works, and how you can explore further on your own.

Although “terminal,” “command line,” and “shell” are often used interchangeably, it helps to learn the general distinctions between these terms. The word “terminal” comes from the old days of Unix — the architecture on which Linux is based — when university campuses and research facilities had a room-sized computer, and users interacted with it by accessing keyboard-and-screen terminals scattered around the campus and connected to the central hub with long cables.

Today, most of us don’t deal with true terminals like those. Instead, we access emulators — interfaces on Unix-like systems that mimic the terminal’s control mechanism. The kind of terminal emulator you’re most likely to see is called a “pseudo-terminal.”

Also

The Reason Linux Desktop Does Better

First and foremost, Linux is literally free. Neither the operating system nor any of the programs you run will cost you a dime. Beyond the obvious financial benefit of getting software for free, Linux allows users to be free by affording access to the basic tools of modern computer use — such as word processing and photo editing — which otherwise might be unavailable due to the cost barrier.

Microsoft Office, which sets the de facto standard formats for documents of nearly every kind, demands a US$70 per year subscription. However, you can run LibreOffice for free while still handling documents in all the same formats with ease.

Free software also gives you the chance to try new programs, and with them new ways of pursuing business and leisure, without their prospective costs forcing you to make a commitment.

Instead of painstakingly weighing the merits of Mac or Windows and then taking a leap of faith, you can consider a vast spectrum of choices offered by hundreds of distributions — basically, different flavors of Linux — by trying each in turn until you find the one that’s right for you.

Linux can even save money on hardware, as some manufacturers — notably Dell —

Quantum Leap Could Redefine

No, I’m not talking about that Quantum Leap. IBM just made a really interesting announcement in that it is enhancing its online quantum computer systems with a new API and improving its simulator so it can handle 20 qubits.

While listening to the prebriefing was a bit like pretending I was Penny trying to understand Sheldon Cooper on Big Bang Theory, I think this move does showcase yet another huge approaching computing wave that could eclipse the one we currently are trying desperately, but largely failing, to ride.

I’ll share some thoughts on quantum computing and close with my product of the week: the Arlo Security Camera system from Netgear, which has to be the best comprehensive home security system in the market.

It is easy to get lost in the terminology surrounding quantum computing and glaze over. Basically, quantum computing is a revolutionary, not evolutionary, system that is pretty much indistinguishable from magic.

Let me give you an example. With a regular computing system at a machine language level you have 1s and 0s — an element is one or the other. With quantum computing, an element is both at the same time. This is like someone asking if your new car

Increase the safety of users

Twitter on Wednesday announced that over the next few months it will roll out changes designed to increase the safety of users:

  • Its algorithms will help identify accounts as they engage in abusive behavior, so the burden no longer will be on victims to report it;
  • Users will be able to limit certain account functionality, such as letting only followers see their tweets, for a set amount of time;
  • New filtering options will give users more control over what they see from certain types of accounts — such as those without profile pictures, or with unverified email addresses or phone numbers; and
  • New mute functionality will let users mute tweets from within their home timelines, and decide how long the content will be muted.

Twitter also will be more transparent about actions it takes in response to reports of harassment from users.

“These updates are part of the ongoing safety work we announced in January, and follow our changes announced on February 7,” a Twitter spokesperson said in a statement provided to TechNewsWorld by Liz Kelley of the company’s communications department.

A Fine Balance

“We’re giving people the choice to filter notifications in a variety of ways, including

Work Into Social Networking

Jobs will appear in users’ News Feeds and also will be listed on individual businesses’ pages. Users can click on the Apply Now button to trigger the prepopulation of their personal information, but they will be able to review and edit that information before submitting their application.

Over the next few weeks, companies in the U.S. and Canada will be able to list jobs on their own pages and users will be able to find job listings at Jobs on Facebook.

It is not clear how Facebook intends to monetize the job listings. For example, will there be specific job-related charges for listing jobs? Will there be remuneration if a company fills a particular job through a Facebook ad?

Direct Competitors

The new functionality is certain to place Facebook into direct competition with LinkedIn for corporate users and individual job seekers. LinkedIn, which Microsoft last year acquired for US$26.2 billion, is the leading social media site for networking and job searching in the U.S., by many accounts.

Unlike Facebook, LinkedIn charges monthly subscription fees for job

Thwarting API

A new tool is available to check the persistent harassment of online trolls. Google’s Jigsaw think tank last week launched Perspective, an early stage technology that uses machine learning to help neutralize trolls.

Perspective reviews comments and scores them based on their similarity to comments people have labeled as toxic, or that are likely to result in someone leaving a conversation.

Publishers can select what they want to do with the information Perspective provides to them. Their options include the following:

  • Flagging comments for their own moderators to review;
  • Providing tools to help users understand the potential toxicity of comments as they write them; and
  • Letting readers sort comments based on their likely toxicity.

Forty-seven percent of 3,000 Americans aged 15 or older reported experiencing online harassment or abuse, according to a survey Data & Society conducted last year. More 70 percent said they had witnessed online harassment or abuse.

Perspective got its training through an examination of hundreds of thousands of comments labeled by human reviewers who were asked to rate online comments on a scale from “very toxic” to “very healthy.”

Like all machine learning applications, Perspective improves as it’s used.

Partners and Future Plans

A number of partners have signed on to work with

Cybersecurity Warriors

“Today’s sophisticated cybersecurity threats attack on multiple fronts to conceal their activities, and our security analysts face the difficult task of pinpointing these attacks amongst a massive sea of security-related data,” noted Sean Valcamp, chief information security officer at Avnet, an early tester of the Watson for Cyber Security system.

“Watson makes concealment efforts more difficult by quickly analyzing multiple streams of data and comparing it with the latest security attack intelligence to provide a more complete picture of the threat,” he said.

“Watson also generates reports on these threats in a matter of minutes, which greatly speeds the time between detecting a potential event and my security team’s ability to respond accordingly,” Valcamp added.

Only 7 percent of security pros currently use cognitive tools in their workflow, but that is changing, according to IBM, which expects usage to triple in the next two to three years.

That’s because as more and more devices come online, they create a burden on security teams they won’t be able to handle without the help an AI like Watson.

“The attack surface for the attacker is mushrooming,” Kennelly said. “Tools like Watson can help defend against those expanding attack patterns.”

 

Voice-Powered Security Assistant

IBM also announced the Havyn Project, which

Personal Cargo Robots

Welcome to Gadget Dreams and Nightmares, the column that occasionally stops gaping at contentious Senate confirmation hearings and votes to peruse the latest gadget announcements.

This time around, we’re looking at some of the gadgets that perhaps got a little lost in the noise after CES in January but caught our eye, for better or worse. Among them are a 4-D arcade machine and a robot designed to carry all the things you don’t want to.

As ever, dear readers, this is not a review column, in part because these products have yet to reach the public sphere, but mostly because the chances of my actually ever using said products are slim. The ratings relate only to how much I’d like to try them, should the stars align.

Reality Bites

Regular readers will know that I’ve played games my entire life. I hold deep reverence for the care and attention that go into creating these experiences, and I’ve rarely met a game I didn’t want to conquer.

Yet I am nervous about virtual reality. I’ve tried it and found those disorientating worlds difficult to handle, though I suspect that over time I could grow

Bug in the Bud

“This happened in response to a very small number of requests in the Cloudflare system — about 1 in 3.3 million,” a Cloudflare spokesperson said in a statement provided to TechNewsWorld by company rep Katie Warmuth.

Some of that data had been cached by search engines.

Cloudflare reviewed the available related cached information and “took comprehensive steps to clean up any residual material found in storage caches,” the spokesperson noted.

Cloudflare found that data for about 150 of its 6 million customers had been impacted.

The company has reached out to “a number of search engines to review and remediate the information in their caches,” the spokesperson said.

All identified episodes have been cleaned, and Cloudflare continues to work to confirm whether other residue persists.

There are at least 16 other search engines on the Web apart from Google, including Bing and Duck Duck Go.

What Happened

Tavis Ormandy, a vulnerability researcher with Google’s Project Zero, notified Cloudflare about the problem on Feb. 17. The memory leak occurred from September to Feb. 18, with the greatest period of impact being from Feb. 13-18.

A bug in Cloudflare’s Ragel-based parser was the cause. It had been dormant for years, but