Diberdayakan oleh Blogger.

Popular Posts Today

Tesco to use face-scan ad targeting

Written By Unknown on Selasa, 05 November 2013 | 23.43

4 November 2013 Last updated at 12:46 ET

Tesco is installing face-scanning technology at its petrol stations to target advertisements to individual customers at the till.

The technology, made by Lord Sugar's digital signage company Amscreen, will use a camera to identify a customer's gender and approximate age.

It will then show an advertisement tailored to that demographic.

Tesco says the screens will be rolled out across all of its 450 forecourts in the UK.

"It's like something out of Minority Report," said Amscreen's chief executive Simon Sugar, Lord Sugar's eldest son.

"But this could change the face of British retail, and our plans are to expand the screens into as many supermarkets as possible."

A Tesco spokeswoman said: "This is not new technology."

"No data or images are collected or stored and the system does not use eyeball scanners or facial-recognition technology", she added.

'Ethically deployed'

The length of someone's hair could be used to work out their gender, she said.

Privacy campaigners said companies had to tell their customers they were using the technology.

Nick Pickles, from Big Brother Watch, said: "If people were told that every time they walked into a supermarket, or a doctor's surgery or a law firm, that the CCTV camera in the corner is trying to find out who they are, I think that will have a huge impact on what buildings people go into."

A targeted advert screen

Please turn on JavaScript. Media requires JavaScript to play.

Systems could only be "ethically deployed" if customers agreed to opt in to having their behaviour tracked, he added.

Philip James, joint head of technology at Pitmans law firm, argues that this technology is similar to the way social media sites tailor adverts to users based on the content of their profiles.

"The capture of facial signatures represents a potentially much greater infringement of customers' privacy in the absence of prior consent," he said.

The screens are expected to reach five million customers.


23.43 | 0 komentar | Read More

Mystery grows over Google US barges

5 November 2013 Last updated at 10:08 ET

Mystery surrounds two barges that Google has moored off the coast of America.

The barges have a four-storey structure on deck and rumours are circulating about what the company plans to use them for.

One suggestion is that they could be turned in to floating data centres powered by wave action.

Others believe they could be fitted out with new showrooms for Google Glass with a "party deck" on top.

So far Google has declined to comment on what the vessels are being used for. But the company does have a patent from 2009 for a "water-based" data centre.

"It's an interesting concept," said Nick Layzell, of Telehouse, a data centre provider.

"Cooling is the big cost for any data centre, so perhaps they're trying to take advantage of having some water on tap."

But he added that water was the biggest threat to data centres because of the damage it could cause to equipment.

One of the barges is anchored at Pier 1, Treasure Island Marina in San Francisco.

The authority in charge of projects within San Francisco Bay confirmed that it had met with Google officials several times in recent months. Its chief executive Larry Goldzband said that Google had been "less than specific" about its plans.

"When they decide to let us know what they plan to do with it, or hope to do with it, then we can decide if it's allowable," he told AP.

Documents revealed following a freedom of information request by the The Day newspaper in Connecticut show Google is also linked to a barge near Maine on the eastern coast of the United States.

According to the paper, the documents did not explain what the barge would be used for but detailed a plan to "operate" the barge in different ports around the United States starting in New York.


23.43 | 0 komentar | Read More

Twitter raises share price target

4 November 2013 Last updated at 16:40 ET

The micro-blogging company Twitter has increased its estimate of shares' value by 25%.

It now says they will sell for between $23-25 (about £15) a share on Monday, from a previous target of $17-20.

Demand for the shares has been so heavy the company is ending the offer a day early.

The estimate values the seven-year old company, which currently has 218 million monthly users but has yet to make a profit, at up to $13.6bn.

Twitter made a loss of $69m in the first six months of 2013, on revenues of $254m.

It is selling 70 million shares, which thanks to the revised share price valuation will raise up to $2bn.

Hot
Twitter logo

Please turn on JavaScript. Media requires JavaScript to play.

There is likely to be enough pent-up demand as a result of the shortened offer time and analysts expect the shares to rise once they begin trading later this week.

The share offer is the most hotly anticipated since Facebook's flotation in 2012, but the massive hype turned to disappointment after the share price fell in the following days.

Unlike Twitter, Facebook increased the number of shares it was releasing to take advantage of the hot demand at the time, a move some analysts say oversupplied the market.

The final price of Twitter's initial public offering (IPO) will be set to price on Wednesday, with shares making their debut on the New York Stock Exchange on Thursday.

Glitches

The traditional home for technology companies is the Nasdaq exchange, but Twitter chose the NYSE instead after trading in Facebook's shares hit difficulties due to the heavy demand.

The NYSE has already tested trading of Twitter's shares to try to clear up any technical hitches that it may face when shares go public.

Twitter also said on Monday it had received a letter from IBM alleging it had infringed at least three of IBM's US patents.

Patent disputes are a regular feature between technology companies.


23.43 | 0 komentar | Read More

Rock-paper-scissors bot always 'wins'

4 November 2013 Last updated at 08:23 ET By Matthew Wall Technology reporter, BBC News
Janken robot

Please turn on JavaScript. Media requires JavaScript to play.

The Janken robot uses high-speed recognition and reaction, rather than prediction

A robot developed by Japanese scientists is so fast it can "win" the rock-paper-scissors game against a human every single time.

The Janken robot - named after the game's Japanese name - is a faster version of one unveiled by University of Tokyo researchers in June 2012.

Version two completes its chosen hand shape almost at the same time as the human hand.

It uses high-speed recognition and reaction, rather than prediction.

Technically, the robot cheats because it reacts extremely quickly to what the human hand is doing rather than making a premeditated simultaneous action as the rules state.

Taking just one millisecond (ms) - a thousandth of a second - to recognise what shape the human hand is making, it then chooses a winning move and reacts at high speed.

Version one completed its shape 20ms after the human hand; version two finishes almost simultaneously.

The scientists at the Ishikawa Oku Laboratory, part of the University of Tokyo, specialise in a range of technologies, including "sensor fusion", which aims to replicate and improve upon the human senses using high-speed intelligent robots.

But Sethu Vijayakumar, professor of robotics at Edinburgh University, told the BBC: "These robots are really fast at reaction, but there are scenarios where even a millisecond's delay is not acceptable, such as accident avoidance or virtual stock markets.

"In these cases we need to combine high-speed reaction with high-speed prediction, using game theory and behaviour patterning."


23.43 | 0 komentar | Read More

Netflix tests 4K video streams

4 November 2013 Last updated at 12:39 ET

Netflix, the TV and film streaming service, has started testing "ultra high definition" video.

Also known as 4K the technology offers four times the amount of detail as 1080p high-definition content.

Netflix said it plans to offer the first titles in 4K to customers next year.

But some analysts question whether broadband speeds in the UK are fast enough to cope with ultra high definition streaming.

"Average broadband speeds in the UK are 7.6 megabits per second, you would need to have at least double that speed to watch 4K reliably on a streamed basis," says IHS broadband analyst, Richard Broughton.

"Currently only 15% to 20% of households have the speeds necessary."

Despite wide availability of broadband networks in the UK's towns and cities, only 4.8 million customers are taking advantage of "superfast" speeds, defined by Ofcom watchdog as 30Mbps or above.

Craig Nelson, spokesman for the Internet Service Providers' Association, told the BBC: "We think streaming of 4K TV services will require minimum broadband speeds of about 100Mbps to work properly, but only businesses, production houses and a limited number of homes currently have that kind of speed.

"A lot will depend on the compression technologies, or codecs, service providers use.

"The real hindrance won't be broadband speeds but the availability of screens."

Only a few manufacturers currently make 4K TVs and, as with all cutting-edge technologies, they are expensive. For example, Panasonic's 65in LED 4K TV costs £5,500, while Sony's equivalent costs £5,000.


23.43 | 0 komentar | Read More

Call of Duty faces 'slower' sales

4 November 2013 Last updated at 19:08 ET

The creator of the latest Call of Duty video game has acknowledged that initial sales of the title are likely to be slower than last time round.

CoD: Ghosts launches weeks ahead of the release of Sony and Microsoft's new consoles.

As a result, Mark Rubin, studio head at developer Infinity Ward, said some gamers would wait for the new hardware to become available.

The previous game, CoD: Black Ops II, made $1bn (£630m) within 15 days.

By the end of last year, more than 2.6 million copies had been sold in the UK alone - nearly double the number of tickets bought for the Avengers Assemble movie - making it the country's best-selling entertainment release of 2012.

"Next-gen has historically created a bit of a challenge for all games from a numbers standpoint," Mr Rubin told the BBC.

"It's definitely something we're aware of. I know talking to a lot of people, figuring out what they're going to buy is a problem.

"I think it will be spread out a little bit - it's harder to do the day-one [sales]... but I think we're in a good spot."

He added that to encourage early take-up, publisher Activision was offering purchasers of the Xbox 360 and PlayStation 3 games discounted copies of the Xbox One and PS4 editions if they upgraded within a time limit.

The launch is publisher Activision Blizzard's first since it gained its independence by using debt to buy most of French firm Vivendi's shares in the business.

Dog play

Ghosts is the first game in a new story arc, set in 2023 - a future in which much of the US lies in ruins after an attack by a space weapons system. In the single-player campaign, players take part in a military unit attempting to lead a fight-back against a new South American superpower.

It is being released just over a decade after the first CoD game went on sale. As part of efforts to keep the franchise fresh, Infinity Ward has added features not available before.

These include:

  • the ability to alter the landscape, changing available pathways and sightlines
  • new multiplayer Squads modes, which allow players to create a customised team of soldiers that can be pitched against other groups of human and computer-controlled characters
  • the chance to play as a German-shepherd dog

Gameplay in both the current and next-generation console editions is similar, although the latter promises superior graphics and the ability to have more people involved in multi-player battles.

"Early adopters of consoles will want a game that impresses visually," said Michael French, publisher of games trade magazine MCV.

"The games don't have to be 100% original. Eventually over time the audience will want something new - the big franchises will have to either take some time out or totally reinvent themselves.

"But for those buying close to day one, they just want something that looks better."

Ghosts will compete against Electronic Arts' recently released war game Battlefield 4 - which has won praise for its large-scale multiplayer maps - and its highly anticipated sci-fi shooter Titanfall, which has been developed by several former members of Infinity Ward.

Different resolutions

Mr Rubin caused surprise last week when he revealed that only the PlayStation 4 version renders Ghosts in full 1080p high-definition video.

The Xbox One and Nintendo's Wii U consoles will deliver 720p graphics - half the resolution - despite the fact they can support the higher-quality format.

"We did what we could to make sure each platform looked as good as it could and that it performed," Mr Rubin told the BBC.

"One of the key pillars of Call of Duty has been 60 frames per second... and ensuring that was of utmost importance, and the resolutions that appear are geared around that."

The PS4 and Xbox One are both powered by customised chips from the same manufacturer, AMD - however, Sony's machine has more cores in its graphics processing unit (GPU) and uses faster, albeit more expensive, RAM memory.

However, Mr Rubin did not rule out future CoD titles running in 1080p on Microsoft's machine.

"It don't think it's the case that the Xbox One definitely can't do it - I just think that we need time to get there.

"It's a normal thing when new platforms come out that the first games are trying to find their feet.

"An analogy I use is that it's like an awkward first date - you're still trying to figure each other out.

"There's enormous amounts of work ahead of us in perfecting our game engines on both platforms."


23.43 | 0 komentar | Read More

Bitcoin 'at risk' of network attack

5 November 2013 Last updated at 07:21 ET

The Bitcoin virtual currency is vulnerable to a "selfish" attack that would let someone gradually take control of the digital cash system.

The theoretical attack tries to subvert the way that computers involved in Bitcoin share information.

It plays upon the fact that everyone involved in keeping track of Bitcoin assumes all participants are honest.

Such an attack could already be happening, said the US researchers who discovered the vulnerability.

"Bitcoin is broken, " wrote Prof Emin Surer, one of the Cornell University scientists who developed the attack, in a blogpost describing the work.

Mining coins

The weakness he and Dr Ittay Eyal uncovered is fundamental to the way that Bitcoin works, he said, and emerges from the way that people find or mint new coins.

Typically new Bitcoins are generated by getting lots of computers to tackle a complicated cryptographic puzzle. At any given moment thousands of computers are involved in tackling this puzzle.

Roughly every ten minutes one group involved in solving this puzzle is rewarded with Bitcoins. The process is known as "mining" because, like miners, those who take part have to sift a lot of dross before they find a valuable nugget. As soon as the new coins are found, the news is circulated and everyone starts working on the next puzzle. One Bitcoin is currently worth about £145.

The Cornell attack involves one large mining group that does not say when it has been rewarded with new Bitcoins. This "selfish" mining group then begins working on the cryptographic puzzle that will eventually release the next reward.

This gives it an advantage because every other mining group will still be working on a puzzle that has already been solved. By leveraging this advantage and being careful about when they release information about new Bitcoins they have mined, the group could gradually take control of the entire mining system.

"Once the system veers away from the happy mode where everyone is honest, there is no force that opposes the growth of really large pools that command control of the currency," wrote Prof Surer. The pair pointed out that there were already mining groups big enough to mount a selfish attack on the protocol.

The two researchers have also proposed updating the protocol to limit the size of mining groups and make the whole system less susceptible to a selfish attack.

Vitalik Buterin, technical editor of Bitcoin Magazine, said the attack was "highly theoretical" because no software currently existed that could turn an honest mining group into a selfish one.

At the moment Bitcoin software shares information about what different miners are doing with the entire community. For a group to become selfish they would have to change this fundamental Bitcoin software in order to manipulate this information flow.

In addition, he said, only the biggest pools could try to subvert the system and the communication demands of the network would likely stymie those attempts.

In addition, he said, the rewards of selfish behaviour were outweighed by the benefits of being honest.

"No honest (or semi-honest) miner would want to join a selfish pool," he suggested. "Even if they do have a small incentive to [join], they have an even greater incentive to not break the Bitcoin network to preserve the value of their own Bitcoins and mining hardware."


23.43 | 0 komentar | Read More

'Sweetie' catches online predators

5 November 2013 Last updated at 07:56 ET Angus CrawfordBy Angus Crawford BBC News
Image of computer generated 10-year-old girl called 'Sweetie'

Please turn on JavaScript. Media requires JavaScript to play.

Sweetie, the computer avatar catching online predators

More than 100 Britons were among 1,000 men caught trying to pay a computer-generated child to perform sex acts online, after a Dutch children's charity set up a fake profile.

Terre des Hommes carried out a 10-week sting near Amsterdam, posing on video chat rooms as "Sweetie", a 10-year-old Filipina girl.

Some 20,000 men contacted her, with 1,000 found to have offered her money.

The names of these men - including 110 Britons - were passed to police.

Continue reading the main story

"Start Quote

We did not solicit anything unless it was offered to us"

End Quote Hans Guyt, Terre des Hommes

When I visited the charity's operations room - in a warehouse on the outskirts of Amsterdam - I watched as a researcher logged on to a chat room as Sweetie - incredibly life-like but created by a computer.

Within seconds, like sharks, men were circling.

Of the 1,000 men who were willing to pay Sweetie to take off her clothes in front of a webcam, 254 were from the US, followed by 110 from the UK and 103 from India.

Researchers used evidence including profiles on Skype and social media to identify the suspects.

Project director Hans Guyt told a news conference in the Hague on Monday that the crime "requires a new way of policing".

"The predator won't come forward. The victim won't come forward," he said.

"We identified ourselves as 10-year-old Filipino girls.

"We did not solicit anything unless it was offered to us."

Worst-case scenario

Terre des Hommes has launched a global campaign to stop "webcam sex tourism".

Managing director, Albert Jaap van Santbrink, said: "Our worst-case scenario is that the same will happen with this phenomenon as with child pornography, which is now a multi-billion industry in the hands of criminal gangs."

Continue reading the main story

"Start Quote

Working with our international law enforcement partners, we will now look at the information being passed on by Terre des Hommes"

End Quote Andy Baker, National Crime Agency

The charity has now handed over its findings to police and has said it will provide authorities with the technology it has developed.

But European policing agency Europol has expressed reservations about the findings.

"We believe that criminal investigations using intrusive surveillance measures should be the exclusive responsibility of law enforcement agencies," spokesman Soren Pedersen told the Reuters news agency.

Andy Baker, of the UK's National Crime Agency, also said that "tackling child sex abusers is best left to specialist law enforcement agencies".

But he praised the campaign, saying it had "widened awareness of a global child sex abuse threat".

"Working with our international law enforcement partners, we will now look at the information being passed on by Terre des Hommes," he added.

Sweetie will not be used again. She has done her job - showing the predators that they can easily become prey.


23.43 | 0 komentar | Read More

Telecom firms under spying scrutiny

5 November 2013 Last updated at 08:49 ET

Privacy International has asked the Organisation for Economic Co-operation and Development to investigate telecoms companies over the alleged interception of private data on their networks.

It follows allegations from whistle-blower Edward Snowden that fibre-optic networks were accessed as part of mass surveillance programmes.

His latest leaks suggest that data was intercepted on British territory.

The privacy group wants more information about how this was done.

Privacy right

"With each passing day, the public finds out more and more how private companies are colluding with governments to operate mass surveillance programs that intercept our daily phone calls, text messages, emails and personal data," said Eric King, head of research at Privacy International.

"Far from being coerced, it appears some of the companies have gone well beyond their legal responsibility by colluding with GCHQ on its Tempora [data collection] programme.

"We call on these companies to do the right thing and halt their involvement with mass surveillance," he added.

Privacy International wants companies such as Level 3, BT, Verizon, Vodafone Cable, Viatel and Interoute to explain all the steps they took to oppose or challenge requests from GCHQ, the UK's intelligence gathering headquarters, in Cheltenham.

It also wants them to cease any voluntary compliance with GCHQ and introduce policies to ensure that further requests do not interfere with what it calls "the fundamental right to privacy".

In response BT said that it would study the details of "any complaint we receive".

"We are clear that matters of national security are for governments, not telecommunications providers. As a company, we comply with the law," it told the BBC.

Level 3 said: "All of the countries where we deliver services have law enforcement and security concerns, and we are periodically compelled by in-country government authorities to assist in their investigations.

Our policy is the same everywhere. We comply with applicable local law, including all the applicable laws in the UK, while taking all reasonable steps to protect our customers' privacy."

Meanwhile Interoute declined to comment.

"The particular concern of Privacy International is that phone companies and [internet service providers] went beyond what the law required, either because they wanted a quiet life or because they thought that it was a good thing to do," said digital forensic expert Prof Peter Sommer.

Unwinding what legislation had been used and whether warrants had been issued for each intercept could be tricky though, he added.

"One of the puzzling things is how does it happen politically? Do the spooks go to their political masters and say, 'We are going dark. We can't follow the people we want to follow,' and ask for special warrants?"

"And if these are granted why aren't the politicians asking whether it is a good idea or not?"

Muscular programme

Last week the Washington Post alleged that the US National Security Agency had worked with British counterpart GCHQ to access the private data networks of Yahoo and Google.

The paper said it did not know exactly how the interception had worked only that it "happens on British territory".

Slides supplied by Edward Snowden appeared to show that the NSA had tools that could pull apart data packages sent across Yahoo and Google's internal networks.

The project, referred to as Muscular, was operated by GCHQ and offered "large international access located in the United Kingdom", according to the slide.

Companies such as Google have multiple data centres worldwide to share the load of the vast amount of traffic generated daily, making it easier and quicker for consumers to access the data they want.

"The allegations are that the spooks are able to get inside these networks, decode the information and reap the benefits," said Prof Sommer.

"The UK is a good place to do it because London and Manchester are huge hubs for telecom and internet data," he said.


23.43 | 0 komentar | Read More

'123456' tops Adobe password list

5 November 2013 Last updated at 08:58 ET

"123456" was the most popular password among the millions of Adobe users whose details were stolen during an attack on the company.

About 1.9 million people used the sequence, according to analysis of data lost in the leak.

Online copies of the data have let security researchers find out more about users' password-creating habits.

The analysis suggests that many people are making it easy for attackers by using easy-to-guess passwords.

Word games

On 4 October, Adobe reported that its systems had been penetrated by attackers who had stolen the online credentials for millions of its users.

Early reports suggested about 2.9 million records had been compromised.

Continue reading the main story
  • 123456
  • 123456789
  • password
  • adobe123
  • 12345678
  • qwerty
  • 1234567
  • 111111
  • photoshop
  • 123123
  • 1234567890
  • 000000
  • abc123
  • 1234
  • adobe1
  • macromedia
  • azerty
  • iloveyou
  • aaaaaa
  • 654321

On 30 October, this figure was revised, with Adobe saying information about 38 million active users had gone astray.

In total, information about more than 150 million accounts was stolen - but many of the other accounts were disused, abandoned or duplicates.

Adobe has now shut down all the compromised accounts, saying it will only reopen them once passwords have been changed.

Copies of the data that was exposed by the breach have begun circulating online and inspired security researcher Jeremi Gosney to go through it working out which password was most popular.

Top of the list, with 1.9 million entries, was the "123456" string of numbers. Second was the slightly longer "123456789" sequence.

Other popular easy-to-guess passwords included "adobe123", "qwerty" and "password".

Mr Gosney said the results of the analysis should be treated with caution because, so far, no-one had access to the keys that Adobe used to encrypt the data.

However, he added, flaws in the way Adobe had stored and encrypted passwords along with clues in the giant file of data had made it possible to draw up a list that he was "fairly confident" was accurate.

Computer security researchers who study password-creating habits have also seized on the data dump as a way to refine the word lists they use to attack login systems in a bid to make them more secure.

Lists of passwords and email addresses are a boon to attackers not just because they can be used to get access to the systems they were supposed to secure. Many people re-use the same password for different services potentially giving attackers a way into other networks.


23.43 | 0 komentar | Read More
techieblogger.com Techie Blogger Techie Blogger