Tuesday, June 16, 2015

How much will Windows 10 really cost? (TechRepublic)

Is Microsoft really going to charge $100 to $200 to users who want the Pro edition or who don't qualify for the free upgrade? Greg Shultz takes a look at some alternative pricing ideas. 

Windows 10 subscription

In last week's article, "The Get Windows 10 program has hatched!," I showed you how you can use the Get Windows 10 program to reserve your free copy of Windows 10 upgrade from your Windows 7 and Windows 8.1 system. As you may know, the free upgrade will move you to the same edition of Windows that you're currently running. As Microsoft puts it on the Windows 10 Q&A page:

"When you upgrade, you'll stay on like-to-like editions of Windows. For example, Windows 7 Home Premium will upgrade to Windows 10 Home."

However, what if you get Windows 10 Home and then decide that you would like Windows 10 Pro? How much will it cost to upgrade? What if you are running Windows Vista or XP? Or, what if you are planning on building your own system and want to install Windows 10 from scratch? How much will you have to pay for Windows 10? Let's take a closer look.

The free upgrade chart
Along with the like-to-like editions description, Microsoft presented an upgrade chart 
(Figure A).

Figure A
Figure A


Microsoft released this upgrade chart to clarify the like-to-like editions of Windows description.

As you can see, this is how Microsoft will be doling out the free editions of Windows 10. For those getting the Pro edition of Windows 10, this will be perfect. And for most folks getting the Home edition of Windows 10, this will be a fine deal. However, what if you're really a Pro type of user who just happened to end up with a Home edition of Windows 7/8? Will you be satisfied with the Home edition of Windows 10?

For example, my main system is running Windows 8.1 Pro with Media Center. However, my laptop is running the standard Windows 8.1, because that's what was preinstalled when I purchased it last year from Dell. I've always wished that it had the Pro edition, as there are certain features that I've grown accustomed to on the Pro edition that I sorely miss, such as being able to configure my laptop as a Remote Desktop host.

I know that I won't be satisfied with the Home edition of Windows 10 on my laptop.

Monday, June 15, 2015

Five of the Best Computer Science Classes in the U.S. (BusinessWeek)

This is where the smartest coders cut their teeth

Plenty of adults wander the professional world hiding their ignorance about how computers work, a knowledge gap that can now be closed in a few hours. But in the modern workforce, to shun programming is to likely get left behind, and young learners have gotten the message. The number of college graduates who got degrees in computer science in 2011 was 2,000 percent higher than it was in 1970, according to the U.S. Department of Education. Some legendary classes at the country's best CS programs have elevated professors to idols, and classrooms to cultural phenomena. Here are five courses where the coding elite hone their skills.

Harvard University’s CS50: Introduction to Computer Science  
Professor: David Malan, PhD
Notable computer science program alumni: Bill Gates (did not graduate), early Google employee Craig Silverstein
CS50 has become one of the most popular undergraduate courses at Harvard, growing from 100 students when the class began in 2002 to nearly 900 in 2014 (they're tended to by around 100 teaching fellows, course assistants, and other staff). A 4,300 word tribute in the Harvard Crimson describes the course, and the charisma of its professor, as cult-like. It's "more than just a class at Harvard; it is a cultural touchstone, a lifestyle, a spectacle.” The class is notoriously difficult, yet most of its students sign up without prior programming experience, according to the Crimson
Stanford University’s CS106A: Introductory Programming
Professor: Mehran Sahami, PhD
Notable program alumni: Yahoo founder Jerry Yang 
The classroom for this popular entry-level class got so overcrowded in 2012 that it prompted a visit from the university fire marshal, according to the Stanford Daily. CS106A gives its 700-plus students with a foundation in JavaScript, problem solving, and software writing. The course is tough— it's used by the department to streamline prospective undergraduate classes—but students who persevere emerge with a fully-built application or platform on their resume. 
University of California, Berkeley’s CS61A: Structure and Interpretation of Computer Programming 
Professor: John DeNero, PhD
Notable program alumni: Apple co-founder Steve Wozniak '86
The first in a series of three computer science courses, CA61A concentrates on programing in the abstract, an elemental concept for any computer science major. Prospective students need to be quick, however: The course has consistently reached capacity within hours of registration opening for the past several semesters. 
MIT’s 6.034: Artificial Intelligence 
Professor: Patrick Winston, PhD
Notable alumni: Early Googler Wesley Chan, U.S. Chief Technology Officer Megan Smith, Internet entrepreneur Brewster Kahle 
Professor Winston, a pioneer in artificial intelligence, teaches students how to apply its core concepts. He "has a style all his own that you either love or hate, but you have to give it to him, he gives it to you straight," writes an anonymous student reviewer on RateMyProf.com. Michael Connell, CEO and co-founder of education startup Native Brain called Winston's class "one of the best courses in the major" on Quora
Carnegie Mellon University’s 15-112: Fundamentals of Programming 
Professor: David Kosbie
Notable alumni: Internet pioneer and Turing Award winner Ivan Sutherland, former Verizon Communications Chairman Raymond W. Smith. 
Fundamentals is intended to provide a solid coding background and insight into software testing and debugging.  “Students rave about the course and the professor – this course is an event,” said Carnegie Mellon faculty member Tom Cortina. Structured as an interactive and hands-on experience, 15-112 lets students demonstrate their work at an end-of-term showcase.

Friday, June 5, 2015

The Big One: Chinese Hackers Steal Records of 4 Million U.S. Gov. Employees





  (Source: Mashable)
So much for "the best defense is a good offense"; for all its cyberspying, feds fail to stop Chinese hackers biggest attack yet

On Thursday the Obama administration acknowledged that up to 4 million current and former employees of U.S. federal government may have had their personal and/or financial records stolen.  News of the massive data breach at the U.S. federal government comes after a report earlier in the day from The New York Times which revealed federal employees had began receiving notice of the breach.

I. The Third Attack

Both The New York Times and The Washington Post reported Thursday unnamed federal officials close to the ongoing investigation that the attacks had been traced to servers in China.  The New York Times report points out that this is the third major breach of federal government networks traced to a rival superpower over the course of the last year.

In June The New York Times reported that the networks of the Office of Personnel Management (OPM) -- a semi-autonomous federal agency in charge of personnel duties -- were breached by hackers traced to Chinese IP addresses.  

OPM Logo

The hackers appeared to be hunting for a database housed on the network called e-QIP.  e-QIP is used to screen federal security clearance request from government employees and contractors.  Applicants have to submit personal information and financial records.  The level of requested clearance is also in the database, hence it could potentially be used to identify high value targets such as undercover agents overseas and top researchers.

Careers at OPM
[Image Source: OPM/Stripes]

The attack was detected by watchdog software.  Reports did not indicate whether or no exfiltration occured, but the attack forced a widespread effort shore up the security of federal networks.

Following the summer breach came news in October that the White House found its email networks compromised.  Various reports indicated the breach to be a probable espionage attempt.  Various outlets reported the attack may have been traced to Russia, although some early reports noted administration suspicion of Chinese involvement.

Obama plotting
A White House email network was breached last October. [Image Source: The White House/Peter Souza]

Now the OPM has yet again been targeted, but this time different kinds of data were taken and the scope appeared far broader, raising tough questions about not only the U.S. federal government's lacking network security, but also regarding what the attackers true motives are.

II. Russia, China, and U.S. Mired in Cyberwar

Tensions mounted with China and Russia last year following a series of geopolitical spats.  Russia and the U.S. clashed on the subject of Ukraine, where a complex situation had led to an ouster of an embattled pro-Russia President amid a growing local rebellion.  Russia accused the U.S. of backing a "coup" to install a Western leaning government.  It subsequently helped to arm and train pro-Russia rebels in the east and Crimea, a sea-facing province of southeast of Ukraine.

Things grew more heated after eastern Ukranian rebels in July to shoot down a Malaysian passenger jet, in an apparent case of mistaken identity.  Russia was accused by the U.S. and European allies of providing the rebels with the anti-aircraft missiles used in the shootdown.  The U.S. issued sanctions against Russia in response to its alleged involvement in the crash and ongoing support of pro-Russia rebels in Ukraine.

Putin
Russian Prime Minister Vladimir Putin has Clashed w/ the U.S. [Image Source: Reuters]

Russia countered with sanctions of its own and with accusations that the U.S. was colluding with the Saudi royal family to artificially depress oil prices, damaging Russia's economy.  Russia has also turned a blind eye to nationalist blackhat hackers that since 2013 have scored massive breachesagainst top U.S. corporationsincluding Target Corp. (TGT), Home Depot Inc. (HD), and most recently Staples, Inc. (SPLS).  The hacks successfully stole millions of Americans' credit card numbers.

Hacker gang
[Image Source: MakeUseOf]


In 2010 then-U.S. Secretary of State Hillary Clinton delivered a fiery speech denouncing Chinese cyberagression and the Asian superpower's alleged censorship efforts against search giant GoogleInc. (GOOG).  In May 2011 the Pentagon chimed in, releasing a new guideline threatening thatcyberattacks could be considered an act of war.

Pentagon
China has been regularly hacking the Pentagon since at least 2007. [Image Source: CNN]

In Oct. 2012 Chinese companies were scrutinized by a national security panel at the U.S. House.  Some in Congress even suggested a ban on sale of Chinese-owned companies' telecommunications hardware and consumers electronics devices.  Chinese devicemakers were outraged, pointing out that American firms manufacture their devices in China as well.



PLA hackers charged

Tensions have run high since China found out about the NSA spy scheme and since the Obama administration countered by charging 5 PLA officers. [Image Source: FBI]


After the Obama administration threatened vague consequences in a 2013 policy document, China invited American officials to engage in joint talks about cybersecurity.  But ultimately both sides left the table unsatisfied.  Meanwhile former Obama administration officials continued accusations against top Chinese companies.

Obama bows to China
The Obama administration's dialogue with China failed to provoke action on the issue of spying.
[Image Source: Reuters]

In June of 2013 things would take an interesting turn after U.S. National Security Agency (NSA)whistleblower Edward Joseph Snowden revealed that federal spy agency was contracting cybercriminals and using a mixture of communication cable interceptsmalwarehardware implants, and zero day exploits to spy on its own citizens, Chinese citizens, Chinese corporations, and the Chinese government.

State-owned Chinese media outlets were fast to blast the Obama administration and U.S. Congress for the constant accusations they had leveled against the PLA and Chinese devicemakers in recent years.  In light of the revelations of massive NSA spying on phone and internet networks worldwide, the criticism were at best hypocritical, Chinese reporters argued.  And China's government demanded "answers" from the Obama administration about the secret global spy program.

NSA spy
Protesters picket a new NSA data center in Utah. [Image Source: Bloomberg]

Rather than apologize, though, the Obama administration doubled down, charging five PLA officers believed to be part of Unit 61398 with charges pertaining to a string of private sector intrusions and breach of the U.S. Department of Defense (DoD).  China threatened dire "consequences" againstU.S. companies and the U.S. government.  It indeed did make some punitives gestures against top American tech firms in months to come.

III. The Big One

There's an old adage that "the best defense is a good offense."

That certainly does not appear to be true here.  For all its global offense, the feds appear to be woefully lacking in defense.  Now the U.S. federal government is left trying to determined the extent of damage from another Chinese-linked breach.  

Unless the federal government is engaging in some elaborate deception to feign weakness or perhaps some sort of honeypot scheme, these ongoing embarassments ring rather ironic.  Apparently the U.S. is better at spying on its citizens without due process and spying on trade allies than it is at defending its own networks.  

Ironically, sources indicate that while the White House had vowed to put in place new security safeguards -- including more thorough review of all internet connection attempts to federal networks and restrictions to remote access -- federal security agencies were slow to act on that mandate.  As a result hackers are believed to have gained access to the OPM network a second time late last year.

Cybersecurity breach
[Image Source: Symantec]

And they reportedly lurked on the network until April, when the breach was discovered.  The good news is that discovery does sort of validate agency claims that the new security system software and procedures work.  The software system -- dubbed "Einstein" -- detected signs of the breach shortly after it was installed earlier this year.

Reportedly attackers used a zero-day exploit to circumvent security measures.  Zero-day exploitsare a relatively rare and coveted class of security vulnerabilities that are not only unpatched, but unknown to the company who makes the targeted software product.  So-called "whitehat" and "grayhat" hackers try to track down these flaws to prevent this kind of catastrophic breach.  Major software companies also extensively review their code for signs of exploitable features.  However, ultimately many zero-day exploits slip through the cracks and are only detected when blackhat attacks occur in the wild.

Zero day exploits
[Image Source: HowToDojo]

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) are currently investigating the breach.  Based on the fact that federal employees were notified, it seems probable that they suspect the attackers exfiltrated some data.  FBI spokesman Josh Campbell said in a statement:

We take all potential threats to public- and private-sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace,” he said.

Feds
The FBI says it's investigating the breach. [Image Source: ClearanceJobs]

Just how damaging the attack will prove to be may fall upon who is behind it.  

According to The New York Times, it's unclear whether the attackers are merely profit-motivated Chinese blackhats looking to scoop up social security numbers and other financial details stored by the OPM.  Alternatively, there remains suspicion that the PLA could be behind the attack, covering its tracks by appearance of financial motive.  Or the truth may lie somewhere in between.

OPM Director Katherine Archuleta comments:

Protecting our federal employee data from malicious cyberincidents is of the highest priority at O.P.M.  We take very seriously our responsibility to secure the information stored in our systems, and in coordination with our agency partners, our experienced team is constantly identifying opportunities to further protect the data with which we are entrusted.

The OPM has offered the estimated 4 million current and former employees exposed free credit reporting to watch for signs of identity theft.

Data breach investigation
The OPM is currently reaching out to 4 million government employees past and present to inform them of the breach and offer credit monitoring service. [Image Source: iStockPhoto]

The Washington Post offers up some more in-depth details on what is known so far about this latest intrusion, reporting:

The OPM, using new tools, discovered the breach in April, according to officials at the agency who declined to discuss who was behind the hack.

Other U.S. officials, who spoke on the condition of anonymity, citing the ongoing investigation, identified the hackers as being state-sponsored.

One private security firm, iSight Partners, says it has linked the OPM intrusion to the same cyber­espionage group that hacked the health insurance giant Anthem. The FBI suspects that that intrusion, discovered in February, was also the work of Chinese hackers, people close to the investigation have said.

The intruders in the OPM case gained access to information that included employees’ Social Security numbers, job assignments, performance ratings and training information, agency officials said. OPM officials declined to comment on whether payroll data was exposed other than to say that no direct-deposit information was compromised. They could not say for certain what data was taken, only what the hackers gained access to.
 
Data Breach sources
This infographic from CardConnect shows some key facts on Data Breaches in 2014.

Colleen M. Kelley, president of the second-largest federal worker union, the National Treasury Employees Union (NTEU), comments:

[We are] very concerned [about the breach].  Data security, particularly in an era of rising incidence of identity theft, is a critically important matter.  It is vital to know as soon as possible the extent to which, if any, personal information may have been obtained so that affected employees can be notified promptly and encouraged to take all possible steps to protect themselves from financial or other risks.

For now federal employees will just have to wait and see who got their hands on the data and what the long term impact will be, both on the citizens involved and the government itself.  The OPM has posted a brief overview acknowledging the attack and some of the details that were reported earlier in the day.

Thursday, June 4, 2015

12 insane tech projects DARPA is working on ...



MIT Cheetah Robot

This terrifying thing will be at the DARPA robotics challenge finals.
It can run at 22 km/h and jump hurdles.

Darpa Trials winner

Team SCHAFT's S1 robot finished first in the December 2013 DRC Trials

Controlling the robots

From a removed location, operators at the DRC Trials controlled their robots.

Cyborg moths

In 2009, DARPA made hybrid biological and electric insects -- a cyborg moth,
for instance. The latest iteration had an electrode inserted into the actual
living pupae when it was in its cocoon. As it developed, wires were incorporated 
into its body. Yeah, I'm cringing, too.

Competition
An artist's concept of robots competing in the challenge.

Drones

DARPA developed System of Systems Integration Technology 
and Experimentation to basically overhaul US military air power. 
This way, they can build open systems for drone and missile 
development.


Ground X-Vehicle Technology (GXV-T)

The DARPA website states: "GXV-T seeks to investigate revolutionary
ground-vehicle technologies that would simultaneously improve the mobility
and survivability of vehicles through means other than adding more armor,
including avoiding detection, engagement and hits by adversaries."


Atlas Unplugged

At least seven teams at the DARPA finals will be using Atlas Unplugged,
this bipedal robot developed by Google-backed Boston Dynamics.
The thing can stand up on its own, climb stairs, and walk around.
 A thought: What are the chances it could ride that MIT cheetah?

Extreme Accuracy Tasked Ordnance (EXACTO)

This is to improve sniper effectiveness by allowing better rifle accuracy.
The 50-caliber round and sighting technology was developed to extend
 the range during day and night.

Z Man

These "gecko gloves" allow a human to scale vertical walls.
DARPA developed them for people fighting in urban terrain.

AlphaDog

Guess what? There are TWO robot cheetahs being developed by DARPA.
This one is out of Boston Dynamics. AlphaDog can run at up to 30 mph,
and uses a hydraulics pump to launch.

EATR system rendering

EATR is a robot that obtains its own fuel by consuming plants, or, stealing
 fuel from other sources. DARPA is working with Elbit Systems to develop
this autonomous vehicle that can sustain itself.




Tuesday, June 2, 2015

What Google Just Announced Is a Bombshell (BusinessWeek)

Now on Tap could change everything about your phone
What Google just announced at its I/O developer conference is a bombshell for the future of the company. For years the search giant has witnessed the chipping away of its core product — search — due to the rise of mobile applications and their siloed-off experiences. Users are engaging more and more with programs that have no attachment and often no requirement for search on the broad web, and as a result Google's position as the owner of our habits, interests, and needs across the internet has looked increasingly at risk.
But Google might have just changed its trajectory.
The company demoed a new feature within its Android OS which allows the Now service (a dashboard of notifications focused on your life and interests) to plug in as a layer that essentially hovers above any app running on your phone or tablet. Activated by the home button, it's always there. This means that you can get contextual search information around almost anything you're doing, provided there is text and data that Google can pull from the app itself. And the best part is that developers won't have to make any changes to their existing software to allow the new service — dubbed Now on Tap — to bring search and context into the user's view.
For instance, while listening to music in Spotify you can search for more info on an artist across the entire web, or if you're talking about a restaurant with a friend in WhatsApp, Google can pull up data on the place and even help you make reservations. And this is not a feature of the app itself, rather an assistant that lives as part of the entire operating system.
This is a major move for two reasons. The first is that it really brings Google back to a place of dominance as the glue that holds your digital life together. The web has thrived and grown in no small part because of Google's ability to track, organize, and understand all of its disparate pieces. Now it's able to do the same thing with every app running on your phone. It allows Google to get back into the search game by speaking the common language of apps. It gives the company a second life with access to user behavior and needs.
But secondly, it starts to show how Google can be an interconnecting layer between the apps themselves — a kind of neutral staging ground between one action and another. This is a sea-change for how we use our mobile devices and how mobile apps interact with one another. Currently, we use operating system-defined tools which let apps interact with each other (with rules set out by the OS-makers, not developers). But imagine if developers didn't have to think about how their work connects to the rest of your world? Imagine if Now on Tap is aware enough of the core functions of those apps that it can predict what you'd most likely want to do with them, and then execute on those needs?
That's the ultimate promise of Now on Tap — and it's a game changing one.
However, the technology has its limits. There's no chance a service like this will ever make its way to Apple's iOS given the closed nature of the operating system (and the fact that Apple will undoubtedly take a stab at the same concept). And Google also has to prove that this kind of natural language processing can work effectively enough to live up to the company's promise of a seamless experience.
But if the service is as impressive as what Google just showed off on stage in San Francisco, there's a whole new world ahead of us for our devices. One that's more connected than ever.

Monday, June 1, 2015

It's official: Microsoft's Windows 10 will be available on July 29.(PCMagazine)

The 10 Best Windows 10 Universal Apps

Windows 10 Bug Art
By the end of next month, Windows 7 and Windows 8.1 users canupgrade to Windows 10 for free or buy a new PC with the new OS pre-installed.

The initial OS release will be limited to phones and tablets. A Windows 10 upgrade for Windows Phone 8.1 devices will vary by phone makers and carriers.
Starting today, those on Windows 7 and Windows 8.1 will be able to reserve an upgrade via a prompt that should appear in the PC's taskbar. Click "Reserve your free upgrade" when it appears, add an email for confirmation, and you're all set. When it's ready, the upgrade will require 3GB of space.
Those who pick up a Windows 8.1 device before the end of July, meanwhile, can also take advantage of the gratis upgrade.
Redmond in September revealed the next version of Windows, jumping from 8.1 directly to 10. Earlier this year, the company highlighted some of the consumer features like Cortana on the desktop and the revamped Microsoft Edge browser.
"With Windows 10, we start delivering on our vision of more personal computing," Terry Myerson, Microsoft's executive vice president of operating systems, said in an announcement.
Designed to run on Redmond's "broadest device family ever," Windows 10 is compatible with Microsoft's PCs, tablets, phones, Internet of Things, Surface Hub, Xbox One, and HoloLens—"all working together to empower you to do great things," Myerson said.
This release marks the return of Microsoft's Start menu, and promises faster overall speed with a quick startup and resume. Windows 10 is also, as the tech giant boasted, "the most secure platform ever."
On July 29, users can start playing around with functions like Windows 10 Continuum to transition between laptop and tablet, and Windows Hello for a personalized greeting and no-password login.
And while Redmond has ditched its regular Patch Tuesday program, and has said that Windows 10 is the last major version of its operating system, the company promised "new innovations" over time. "Like Windows 10 itself, these updates will be free for the supported lifetime of your device," Myerson said. Watch this link: