IBM reportedly has begun testing artificial intelligence software that mimics the human brain. The MIT Technology Review has reported that IBM is testing algorithms from Numenta, a machine learning company. “Our goal is not to be biologically inspired; I want to recreate exactly,” Jeff Hawkins, cofounder of Numenta, told the Technology Review. IBM is testing … continue reading
GitHub is trying to recover from a large-scale distributed denial of service (DDoS) attack on its website. According to the company, this is the largest DDoS attack it has experienced to date. “The attack began around 2 a.m. UTC on Thursday, March 26, and involves a wide combination of attack vectors,” wrote Jesse Newland, systems … continue reading
Microsoft has revealed that Windows 10 will be available this summer in 190 countries and 111 languages. “I can’t wait to see how amazing companies around the world will continue to innovate with devices running Windows 10,” wrote Terry Myerson, executive vice president of operating systems at Microsoft, on the company’s blog. “Working together, I … continue reading
Linus Torvalds wants Linux developers to play nicer. The Linux creator has proposed a small kernel patch called the Code of Conflict, providing discourse guidelines for the kernel community and laying out mediation steps if anyone feels threatened. “The Linux kernel development effort is a very personal process compared to ‘traditional’ ways of developing software,” … continue reading
Security researchers have revealed a new software vulnerability that is leaving Apple and Google users open to a hack attack. The vulnerability, Factoring RSA export keys (also known as the FREAK attack), was found in SSL/TLS—the protocol meant to provide secure Web connections. According to the miTLS team, composed of Inria (a research organization in … continue reading
Despite the efforts to defend against software vulnerabilities, businesses are still being compromised through known security issues. HP Security Research just released its 2015 Cyber Risk Report, which revealed a majority of bugs exploited in 2014 took advantage of code written years ago, and 44% of known breaches came from vulnerabilities that are two to … continue reading
Google wants to remind developers that they have until April 20 to migrate to newer Google Data APIs. The ClientLogin shutdown date is scheduled for that date, and all apps that rely on it will stop working. The company recommended developers switch to OAuth 2.0 to minimize user disruption. “Password-only authentication has several well-known shortcomings, … continue reading
Developers can get their hands on the first build of Windows 10 Technical Preview for phones. Microsoft has announced the first build is available for Windows Insiders. “This is the earliest publicly available preview we’ve ever done for Windows on phones,” wrote Gabe Aul, engineering general manager at Microsoft, on the company’s blog. “This preview … continue reading
Facebook is trying to combat the threat of malware and security through collaboration. The company just announced ThreatExchange, an API-based platform designed for organizations to share security threat information. The idea for ThreatExchange manifested about a year ago through a discussion about a botnet causing a malware attack across a group of technology companies’ services. … continue reading
Code.org announced its Hour of Code campaign has eclipsed 100 million hours, measured by the time students have spent taking the free programming courses and tutorials offered online. The total dates back to the program’s beginning back in June 2013. The organization also announced the number of lines of code written has surpassed 5 billion … continue reading
Microsoft has announced its code-formatting tool is now available through GitHub. The tool, which is based on Roslyn, will work with any C# project and automatically formats code based on set guidelines, according to Microsoft. “We strongly believe that having a consistent style greatly increases the readability and maintainability of a codebase. The individual style … continue reading