Never mind tagging people in photos: OneDrive now tags your Pokémon

Finally, facial recognition technology put to good use.

Unfortunately, OneDrive did not recognize the Rattata sitting on my Coke can. (credit: Peter Bright)

In a surprisingly swift attempt to ride the Pokémon Go bandwagon, Microsoft has released, of all things, Pokémon detection for photos stored on OneDrive. If you have an iPhone or an Android handset and enable camera uploading to OneDrive, any screenshots or photos you take with the Pokémon Go camera tool will be stored on Microsoft's cloud system. Once there, your Pokémon will be recognized, and the images will be tagged accordingly, letting you easily find your best Pikachu snaps.

Microsoft is also rolling out some other features: automatic generation of galleries from pictures taken at around the same time in around the same place, better presentation of folders with lots of photos in them, and better display of OneDrive photos in the Windows Photos app.

Pokémon Go for HoloLens concept.

It's just too bad there's no version of Pokémon Go for Microsoft's own platform. Mock-ups of Pokémon Go for HoloLens have been created, and they look awesome. But, alas, creating a game for a $3,000 developer kit probably isn't high on Niantic's priority list.

Read on Ars Technica | Comments

Wild birds learn to recognize when humans ask for help finding honey

A strange cooperation between humans and a wild bird.

A local honey hunter holds one of his trusty guides. (credit: Claire Spottiswoode)

Humans and wild animals often help each other out, but the relationship is usually accidental. For example, birds of prey sometimes follow farm equipment through fields because the hardware flushes small animals out. Humans don't help the birds intentionally, and we don't gain anything from them. For truly cooperative relationships, you generally have to look to animals we've domesticated.

Generally, but not exclusively. There's an African bird called the honeyguide that helps humans find bees' nests. The humans get the honey, while the birds feast on the wax left behind (the honeyguides were first formally described after they were witnessed eating some candles). Now, new research shows that the birds can specifically respond when a human makes a call that indicates they're interested in finding honey.

Honeyguides inhabit an area of Africa that includes Tanzania and Mozambique. When they're in the mood for beeswax, they approach a human and start making a chattering call. This call is distinct from the call they use to communicate with each other, and it's accompanied by very specific behavior: the bird flits from tree to tree in the general direction of a bee's nest. Once the nest is located and opened, the human comes away with honey and leaves the wax behind for the honeyguide to eat.

Read 8 remaining paragraphs | Comments

Deals of the Day (7-22-2016)

Deals of the Day (7-22-2016)

Thanksgiving may be four months away, but Best Buy has decided Black Friday should come a little early this year. The store is running a Black Friday in July sale with deep discounts on a range of laptops, tablets, phones, wearables, and other gadgets.

The sale runs through Saturday, July 22nd.

I suspect there’ll be a Black Friday in November sale too… you’ll just have to wait a while for that.

Continue reading Deals of the Day (7-22-2016) at Liliputing.

Deals of the Day (7-22-2016)

Thanksgiving may be four months away, but Best Buy has decided Black Friday should come a little early this year. The store is running a Black Friday in July sale with deep discounts on a range of laptops, tablets, phones, wearables, and other gadgets.

The sale runs through Saturday, July 22nd.

I suspect there’ll be a Black Friday in November sale too… you’ll just have to wait a while for that.

Continue reading Deals of the Day (7-22-2016) at Liliputing.

Hacker who published LA Times login credentials ordered to prison

Matthew Keys must begin serving two-year sentence for putting login info online.

(credit: Cyrus Farivar)

A journalist convicted of hacking was ordered Thursday to begin serving his two-year prison sentence. Matthew Keys was scheduled to begin serving his term last month, but a federal appeals court stayed his custody to determine whether he should remain free from the federal prison camp in Atwater, California pending an appeal of his federal conviction under the Computer Fraud and Abuse Act (CFAA).

After reviewing the conviction for a month, the 9th US Circuit Court of Appeals announced that there is nothing novel about his conviction and that he is likely to lose on appeal. Therefore, the court ruled (PDF), he should begin serving his time even while his appeal is pending. The court wrote:

Appellant has not shown that the appeal raises a "substantial question" of law or fact that is "fairly debatable," and that "if that substantial question is determined favorably to defendant on appeal, that decision is likely to result in reversal or an order for a new trial of all counts on which imprisonment has been imposed," or a sentence that does not include a term of imprisonment, or a reduced sentence to a term of imprisonment less than the total of the time already served plus the expected duration of the appeal process.

Keys maintains that he did not expose login information that led to the 40-minute alteration of a Los Angeles Times headline in 2010 when he worked for a local California television station, KTXL Fox 40 in Sacramento, which was owned by the newspaper's parent company, Tronc. Authorities said he published Tronc login credentials in a hacker forum and told forum readers to go "fuck some shit up." On appeal, Keys maintained that there was no damage done because the defaced article was restored from a backup, and therefore the CFAA was misapplied.

Read 3 remaining paragraphs | Comments

Digital Citizens Slam Cloudflare For Enabling Piracy & Malware

Consumer interest group Digital Citizens Alliance has published a new report highlighting the connection between pirate sites and malware delivery. The group says that as many as one in three pirate sites are engaged in the practice, assisted by US-based companies including Cloudflare.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

For the past several years, one of the key educational strategies of entertainment industry companies has been to cast doubt on the credibility of so-called ‘pirate’ sites.

Previously there have been efforts to suggest that site operators make huge profits at the expense of artists who get nothing, but there are other recurring themes, mostly centered around fear.

One of the most prominent is that pirate sites are dangerous places to visit, with users finding themselves infected with viruses and malware while being subjected to phishing attacks.

This increasingly well-worn approach has just been revisited by consumer interest group Digital Citizens Alliance (DCA). In a new report titled ‘Enabling Malware’, the Hollywood-affiliated group calls out United States-based companies for helping pirate site operators “bait consumers and steal their personal information.”

“When you think of Internet crime, you probably imagine shadowy
individuals operating in Eastern Europe, China or Russia who come up with devious plans to steal your identity, trick you into turning over financial information or peddling counterfeits or stolen content. And you would be right,” DCA begin.

“But while many online criminals are based overseas, and often beyond the reach of U.S. prosecutors, they are aided by North American technology companies that ensure that overseas operators’ lifeline to the public – their websites – are available.”

DCA has examined the malware issue on pirate sites on previous occasions but this time around their attention turns to local service providers, including hosting platform Hawk Host and CDN company Cloudflare who (in)directly provide services to pirate sites.

“Are these companies doing anything illegal? No more than the landlord of an apartment isn’t doing anything illegal by renting to a drug dealer who has sellers showing up day and night,” DCA writes.

“But just like that landlord, more often than not these companies either look the other way or just don’t want to know.”

Faced with an investigative dead-end when it comes to tracing the operators of pirate sites, DCA criticizes Cloudflare for providing a service which effectively shields the true location of such platforms.

“In order to utilize CloudFlare’s CDN, DNS, and other protection services customers have to run all of their website traffic through the CloudFlare network. The end result of doing so is masked hosting information,” DCA reports.

“Instead of the actual hosting provider, IP address, domain name server, etc., a Whois search provides the information for CloudFlare’s network.”

To illustrate its point, DCA points to a pirate domain which presents itself as the famous Putlocker site but is actually a third-party clone operating from the dubious URL, Putlockerr.ac.

“From websites such as putlockerr.ac consumers are tricked into downloading malware. For example, when a consumer clicks to watch a movie, they are sent to a new screen in which they are told their video player is out of date and they must update it. The update, Digital Citizens’ researchers found, is the malware delivery mechanism.”

There’s little doubt that some of these low-level sites are in the malware game so DCA’s research is almost certainly sound. However, just like their colleagues at the MPAA and RIAA who regularly shift responsibility to Google, DCA lays the blame on Cloudflare, a more easily pinpointed target than a pirate site operator.

Unsurprisingly, Cloudflare isn’t particularly interested in getting involved in the online content-policing business.

“CloudFlare’s service protects and accelerates websites and applications. Because CloudFlare is not a host, we cannot control or remove customer content from the Internet,” the company said in a response to the report.

In common with Google, Cloudflare also says it makes efforts to stop the spread of malware but due to the nature of its business it is unable to physically remove content from the Internet.

“CloudFlare leaves the removal of online content to law enforcement agencies and complies with any legal requests made by the authorities,” the company notes.

“If we believe that one of our customers’ websites is distributing malware, CloudFlare will post an interstitial page that warns site visitors and asks them if they would like to proceed despite the warning. This practice follows established industry norms.”

Finally, while DCA says it has the safety of Internet users at heart, its malware report misses a great opportunity. Aside from criticizing companies like Cloudflare for not doing enough, it offers zero practical anti-malware advice to consumers.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Sony is the only remaining hurdle to cross-platform play, developers say

Rocket League, Gwent makers urge the destruction of PlayStation’s walled garden.

(credit: Aurich x Getty)

Back in March, Microsoft announced that it would allow generic cross-platform play on its Xbox Live network. The move was essentially a public challenge for Sony to similarly open up the PlayStation Network, allowing for multiplayer matches involving more than one type of console for what would essentially be the first time.

Now, some major game developers are stressing that any technical hurdles to this cross-platform play have been overcome. Sony's walled-garden policy is the final obstacle to allowing play between Xbox and PlayStation systems, they say. "Right now, we're literally at the point where all we need is the go-ahead on the Sony side and we can, in less than a business day, turn [cross-platform play] on and have it up and working, no problem," Jeremy Dunham, vice president of Rocket League developer Psyonix told IGN in a recent interview. "It'd literally take a few hours to propagate throughout the whole world, so really we're just waiting on the permission to do so... It could be tomorrow, it could be longer than that. We just don't know—we're anxiously awaiting that, just like the rest of our fans."

Rocket League was one of the first games that announced cross-platform play between the Xbox One and Windows 10 (well before Microsoft's recent Play Anywhere initiative), so it's not that surprising that the title is ready to link in with the PS4 as well. But The Witcher maker CD Projekt says it's also simply awaiting Sony's go-ahead for a cross-platform version of the upcoming Gwent card game.

Read 6 remaining paragraphs | Comments

Reaction captures carbon, generates electricity, makes a cleaning product

Novel technique would save 9.3kg of CO2 emissions for every 1kg of aluminum used.

(credit: Randy)

The capture of CO2 from smokestacks could make an important contribution to limiting climate change, but there are two obstacles. One is that you have to store that CO2 somewhere (like underground reservoirs). The other is that the capture process requires energy, so your power plant ends up producing less electricity per unit of fuel. That comes with a financial cost.

There are efforts afoot to overcome both of those hurdles, but there are also other possible approaches. One that sounds obvious and attractive is to turn that CO2 into something useful and valuable, rather than just reservoir filler. The sticky wicket here is chemistry. Carbon dioxide is pretty stable, and turning it into something else can require a large energy input.

Cornell University’s Wajdi AlSadat and Lynden Archer, however, are playing with one possible process that could convert CO2 into a commodity—and generate electricity while you’re at it.

Read 8 remaining paragraphs | Comments

100 MBit/s: Zusagen der Bundesnetzagentur drücken Preis für Vectoring

Ein exklusives Vectoring der Telekom im Nahbereich kommt nur, wenn der Konkurrent gute und günstige virtuelle Zugangsprodukte angeboten bekommt. Das dürfte den Preis für bis zu 100-MBit/s-Zugänge drücken. (Vectoring, DSL)

Ein exklusives Vectoring der Telekom im Nahbereich kommt nur, wenn der Konkurrent gute und günstige virtuelle Zugangsprodukte angeboten bekommt. Das dürfte den Preis für bis zu 100-MBit/s-Zugänge drücken. (Vectoring, DSL)

Insolvenz: Unister Holding mit 39 Millionen Euro verschuldet

Das Unternehmen “verfügt über liquide Mittel einschließlich eines Kassenbestandes in Höhe von 0,00 Euro” heißt es im Insolvenzantrag von Unister. Auch Yahoo schuldet die Firma viel Geld. (Unister, Wirtschaft)

Das Unternehmen "verfügt über liquide Mittel einschließlich eines Kassenbestandes in Höhe von 0,00 Euro" heißt es im Insolvenzantrag von Unister. Auch Yahoo schuldet die Firma viel Geld. (Unister, Wirtschaft)

BlackBerry “Hamburg” mid-range Android phone specs leaked?

BlackBerry “Hamburg” mid-range Android phone specs leaked?

BlackBerry is expected to launch several new Android phones this year, including a mid-range model code-named “Hamburg,” which is expected to sell for under $400 and have a touchscreen display but no physical keyboard.

Now more details about the Hamburg are starting to emerge. The phone recently showed up at the FCC and GFXBench websites.

The FCC documents don’t provide many details about the phone, other than the fact that it seems to have a 2,610 mAh battery and that the phone is manufacturer by TCL, the same company behind Alcatel smartphones.

Continue reading BlackBerry “Hamburg” mid-range Android phone specs leaked? at Liliputing.

BlackBerry “Hamburg” mid-range Android phone specs leaked?

BlackBerry is expected to launch several new Android phones this year, including a mid-range model code-named “Hamburg,” which is expected to sell for under $400 and have a touchscreen display but no physical keyboard.

Now more details about the Hamburg are starting to emerge. The phone recently showed up at the FCC and GFXBench websites.

The FCC documents don’t provide many details about the phone, other than the fact that it seems to have a 2,610 mAh battery and that the phone is manufacturer by TCL, the same company behind Alcatel smartphones.

Continue reading BlackBerry “Hamburg” mid-range Android phone specs leaked? at Liliputing.