Posts

Microsoft commits to eliminating Flash support in Windows by 2020

Image
Microsoft is going public with its step-by-step plan for removing Adobe Flash support in Windows by the end of 2020. Adobe finally has drawn a line in the sand, noting that  Flash will no longer be supported after 2020 . Microsoft officials said they'd do their part to wind down Flash support in the company's Internet and Edge browsers, so that  Flash support will be entirely removed from Windows by the end of 2020 , as well. Flash in Edge already is only click-to-run, as of the Windows 10 Creators Update. Today, Microsoft posted its timeline and plan for getting rid of Flash over the next three years. From Microsoft's post: Through the end of 2017 and into 2018, Microsoft Edge will continue to ask users for permission to run Flash on most sites the first time the site is visited, and will remember the user's preference on subsequent visits. Internet Explorer will continue to allow Flash with no special permissions required during this time. In mid to lat

Google is using machine learning to create a news feed from your searches

Image
Google has rolled out a new version of its news feed that's based on the user's interests. Google has updated its mobile app with a more personalized news feed and a new button to follow topics from search results. Google introduced a news feed in December which offered a series of cards containing news that reflects previous searches as well as local weather, sports, TV schedules, movies trailers, and other content. Today's  update introduces the "smart feed"  which makes it easier for users to follow topics of interest and discover new content without necessarily typing out a search query. Also, the feed will now be influenced by trending subjects in the user's area and around the world. Google's machine learning algorithms also determine how interested a person is in different topics and adjusts the feed to reflect that. As with the previous version, users are able to customize the feed in settings. Google is also introducing a new "f

Workday to open up cloud platform, enters PaaS(Platform-as-a-service) fray

Image
Workday will enter the PaaS game as it hatches plans to open its cloud platform and court developers. Workday plans to open up its platform to developers, partners and third party software vendors. In a blog post , CEO Aneel Bhusri said the move will settle a long-running question for Workday. Bhusri added that Workday chose to focus on reliability and scalability as it built out its cloud service before opening up. Meanwhile, customers have been asking for "a more open Workday platform." These customers "want to use Workday as a cloud backbone that supports cohesive, digital workflows across multiple business applications." With the move, Workday enters the platform-as-a-service game and can better counter rivals. Oracle offers PaaS; SAP Cloud Platform is focused on connecting its apps; Salesforce has its formidable ecosystem; and companies like ServiceNow have opened up to expand into new enterprise areas including human resources. Here's the PaaS la

Benchmarking utility shows AMD Ryzen rapidly stealing market share from Intel

Image
PassMark figures reveal a nearly 10-percent rise in AMD's share of CPUs being benchmarked compared to the end of 2016 -- another sign that the chip maker's latest performance PC chips have halted a long slide against its rival. What a difference a year makes when it comes to the fortunes of AMD, the only real rival to Intel in PC processors, but one that was increasingly falling behind the market leader, especially in the profitable and influential high-end segment. An afterthought to performance PC buyers in 2016, AMD is back in the game in 2017 with the release of its warmly received Ryzen chip family, which delivers much of the power of Intel's Core CPUs at a noticeably lower cost. In the few months since the first Ryzen processors have been released, we've witnessed a few signs that AMD has succeeded in not only blunting but also undoing some of Intel's massive sales advantage. Revenue figures for Q1 were stronger thanks to Ryzen, which offset AMD

​Qantas systems restored, Amadeus outage not related to Petya ransomware

Image
Unfortunate timing, but Qantas says Wednesday's outage was not related to the latest global cyber attack. Q antas has been working on restoring its systems following an outage on Wednesday morning that was experienced by "multiple" airlines globally. The issue has been confirmed as one stemming from the airline's third-party booking system, owned by the Amadeus IT Group, headquartered in Europe. Qantas said Amadeus had advised the airline that the intermittent outages experienced by customers were due to a hardware issue. Amadeus also said the issues were unrelated to the ransomware attack that has swept the world. "To be clear, Qantas has not been impacted by the Petya ransomware attack," a statement from Qantas reads. Qantas  took to social media  on Wednesday morning to notify customers that its booking system was down. "We're expecting improvements soon & will update once it's restored," the company wrote in a Tweet

Samsung SDS unveils Brightics AI analytics platform

Image
Samsung SDS has unveiled its AI-based analytics platform Brightics AI aimed at the enterprise market Samsung SDS has unveiled its artificial intelligence (AI)-based analytics platform called Brightics AI, which is aimed at the global enterprise market. Brightics AI automates data analytics modeling, allowing for easy processing and analysis of big data for clients, the company said. Samsung said processing big data conventionally takes two experts up to three months to create and apply an analytics model. By comparison, Brightics AI will complete this process within two hours by automatically suggesting the best analytics algorithm. Collecting, analysing, and visualising data, which takes conventional counterparts three hours, only takes 10 minutes. The platform also has a "prescriptive" algorithm based on AI technology that offers solutions for problems faced by clients, the company said. The company said it has been testing the platform on 70 different busi

Workers in China detained for selling Apple user information

Image
Local police in China announced this week that they have uncovered an underground operation which has illegally traded Apple user data for profit. Police in Zhengjiang -- a wealthy Chinese province adjacent to Shanghai -- has recently cracked down on an underground network which has obtained personal information associated with iPhone accounts and traded them for huge profits. Twenty-two suspects, who were spread across several Chinese provinces including Guangdong, Jiangsu and Fujian, have been detained for suspicion of obtaining computer information and invading citizen's personal information, according to a Wednesday  Sohu news report . These suspects have reportedly used Apple's internal system to obtain user information connected with iPhone accounts -- including telephone numbers, names, as well as Apple ID information. This information has been resold for 10 yuan (US$1.50) to 180 yuan per item and total income in the case has exceeded 50 million yuan, it is

OneLogin security chief reveals new details of data breach

Image
Two breaches in as many years. Is the trust gone? Alvaro Hoyos, the company's chief information security officer, answered key questions. A week after OneLogin disclosed it had been hacked, the company's security chief has said that thousands of its customers may have been affected -- but admitted that it still has a lot to learn about how it was breached. The company has spent the past week investigating how it was breached. OneLogin is similar to a password manager, but also manages the identities and login information of enterprise and corporate users -- from hospitals, law firms, financial giants, and even newsrooms. OneLogin acts as a central sign-in point to allow its customers -- which includes millions of staff and end users -- to access their accounts on other popular sites and services, like Microsoft and Google accounts. At the end of last month, the company announced news that nobody wants to hear.An attacker obtained and used highly-sensitive keys for

Union blames Indian IT for British Airways systems collapse, but CEO points to power surge

Image
British Airways' CEO has blamed a local power supply issue rather than outsourcing tech to TCS, which should be a big relief for Indian IT. If Indian IT isn't already embattled by President Donald Trump's war against H-1B visas and a surge in automation that is threatening domestic jobs, another problem reared its head over the weekend that threatened to tarnish the industry further: An accusation that Indian IT companies were responsible for the devastating outage suffered by British Airways over the weekend. As you probably know by now, British Airways experienced a major global computer failure that severely disrupted the airline's IT systems and caused thousands of passengers to be stranded at both London's Heathrow and Gatwick airports due to cancelled flights. The crash affected BA's booking system, baggage handling, mobile phone apps, and check-in desks, affecting more than 1,000 flights and causing mayhem across the two airports. So what actual

Twitter flaw allowed you to tweet from any account

Image
All this time, a rather simple Twitter bug could have caused chaos on the platform. A Twitter security flaw which went undetected for years allowed attackers to post messages masquerading as any user they chose. A security researcher that goes under the moniker Kedrisch  disclosed the flaw  on Tuesday, which was present on the microblogging platform until 28 February this year. Discovered in  Twitter Ads Studio , a platform for advertisers to upload media and content, the high-severity bug appeared in the service library where users can review media before publishing. When handling media and tweet publishing requests, by sharing this media with an intended victim and then modifying the post request with the victim's account ID, the media in question would be automatically posted from the victim's account rather than the attacker's. As only the parameters of the code needed to be tweaked, there was no need to have any account credentials belonging to the vi