Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Television

Some Ads Play on Streaming Services Even When the TV Is Off, Study Finds (wsj.com) 118

Many commercials continue to play on ad-supported streaming services after viewers turn off their television, new research shows, a problem that is causing an estimated waste of more than $1 billion a year for brands. From a report: The findings come as an ever-growing share of ad dollars is shifting from traditional TV to streaming platforms, a trend that is likely to accelerate now that industry giants Netflix and Walt Disney's Disney+ have embraced the idea of offering an ad-supported version of their services. Some 17% of ads shown on televisions connected through a streaming device -- including streaming boxes, dongles, sticks and gaming consoles -- are playing while the TV is off, according to a study by WPP's ad-buying giant GroupM and ad-measurement firm iSpot.tv.

That is because when a TV set is turned off, it doesn't always send a signal to the streaming device connected to the TV through its HDMI port, GroupM said. As a result, the streaming device will continue playing the show and its ads unless users had exited or paused the streaming app they were watching before turning off their TV. Due to the nature of the problem, using a smart TV -- on which streaming apps are loaded -- makes it far less likely that ads would be shown while the TV is off, since in this instance the television and streaming device are just a single piece of hardware. GroupM said it found "virtually no incidence" of the issue on smart TV apps. The study, which included smart TVs and some hooked up with a streaming device, found that on average, between 8% and 10% of all streaming ads were shown while the TV was off.

Submission + - New CRISPR-based map ties every human gene to its function (mit.edu)

Hmmmmmm writes: The Human Genome Project was an ambitious initiative to sequence every piece of human DNA was finally completed in 2003. Now, over two decades later, MIT Professor Jonathan Weissman and colleagues have gone beyond the sequence to present the first comprehensive functional map of genes that are expressed in human cells. The data from this project, published online June 9 in Cell, ties each gene to its job in the cell, and is the culmination of years of collaboration on the single-cell sequencing method Perturb-seq.

The project takes advantage of the Perturb-seq approach that makes it possible to follow the impact of turning on or off genes with unprecedented depth. This method was first published in 2016 by a group of researchers including Weissman and fellow MIT professor Aviv Regev, but could only be used on small sets of genes and at great expense.

The Perturb-seq method uses CRISPR-Cas9 genome editing to introduce genetic changes into cells, and then uses single-cell RNA sequencing to capture information about the RNAs that are expressed resulting from a given genetic change. Because RNAs control all aspects of how cells behave, this method can help decode the many cellular effects of genetic changes.

Since their initial proof-of-concept paper, Weissman, Regev, and others have used this sequencing method on smaller scales. For example, the researchers used Perturb-seq in 2021 to explore how human and viral genes interact over the course of an infection with HCMV, a common herpesvirus.

In the new study, Replogle and collaborators including Reuben Saunders, a graduate student in Weissman’s lab and co-first author of the paper, scaled up the method to the entire genome. Using human blood cancer cell lines as well noncancerous cells derived from the retina, he performed Perturb-seq across more than 2.5 million cells, and used the data to build a comprehensive map tying genotypes to phenotypes.

Comment Deep packet inspection v. packet manipulation (Score 1) 60

Deep packet inspection is part and parcel to packet manipulation even packet editing.

Destination IP and MAC addresses can be edited.
URIs can be edited (yes check sums scrubbed clean).

Source and services can be routed through a SIP (serial line IP) 2400 baud network link if they like.

While hard to do them all ... traffic classification and shaping to good and bad ends are quite
possible.

The only reason to inspect packets is to make decisions and shape traffic.
Traffic shaping by ISPs that are also content providers is a conflict of interest.

Comment Golly Badly written poll. (Score 1) 164

Which search engines do you use is a better topic.
I use multiple ones and the way the question is written the least used is a valid answer.

I replied only because we are seeing many political polls and it is super simple to craft a poll that
elicits anonymous answers that then can be published with clickbait headlines. Be critical if
a poll summary does not contain an exact accounting of the questions. Beware that presentation
and the last mile of connectivity come to play.

Simple transcripts are insufficient to understand a presentation.
N.B. Both actors had the exact lines.
Yet the presentation and context is very different. https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fyoutu.be%2Fk29ogXL_S2U
The announcer sort of disambiguates things but the two story tellers have the exact same lines.

Cellphones

Google Ends Android Collaboration With Huawei. No Gmail, Play Store For Future Huawei Phones (reuters.com) 293

An anonymous reader quotes Reuters: Alphabet Inc's Google has suspended business with Huawei that requires the transfer of hardware and software products except those covered by open source licenses, a source close to the matter told Reuters on Sunday, in a blow to the Chinese technology company that the U.S. government has sought to blacklist around the world.

Huawei Technologies Co Ltd will immediately lose access to updates to the Android operating system, and the next version of its smartphones outside of China will also lose access to popular applications and services including the Google Play Store and Gmail app... Huawei will continue to have access to the version of the Android operating system available through the open source license that is freely open to anyone who wishes to use it. But Google will stop providing any technical support and collaboration for Android and Google services to Huawei going forward, the source said.

EU

Group Seeks Investigation of Deep Packet Inspection Use By ISPs (securityweek.com) 60

wiredmikey writes: European Digital Rights (EDRi), together with 45 NGOs, academics and companies across 15 countries, has sent an open letter to European policymakers and regulators, warning about widespread and potentially growing use of deep packet inspection (DPI) by internet service providers (ISPs). DPI is far more than is required by the ISP to perform its basic purpose, and by its nature privacy invasive, and not strictly legal within the EU. Nevertheless, many are concerned that its practice and use within Europe is growing, and that "some telecom regulators appear to be pushing for the legalization of DPI technology."

One of the drivers appears to be the growing use of 'zero-rating' by mobile operators. "A mapping of zero-rating offers in Europe conducted by EDRi member Epicenter.works identified 186 telecom services which potentially make use of DPI technology," writes EDRi. [PDF here]

Comment So his arrest warrant says...? (Score 1) 53

So his arrest and search warrant says he looks like Woody Harrelson, OMGolly.

I find it interesting...
      "Among the matches Harrelson’s photo returned, the detectives saw a man they believed was the person on camera,
          and they later arrested him for petty larceny — adding to the mounting evidence that police are using facial recognition
          technology seemingly however they see fit." https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Ffuturism.com%2Fpolice-wo...

Fueling speculation is FUD like this.
Teen Says Apple’s Facial Recognition Got Him Wrongfully Arrested
He’s now suing the company for $1 billion.
      https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Ffuturism.com%2Fsuing-app...

Encryption

New John the Ripper Cracks Passwords On FPGAs 58

Long-time Slashdot reader solardiz has long bring an advocate for bringing security to open environments. Wednesday he contacted Slashdot to share this update about a piece of software he's authored called John the Ripper: John the Ripper is the oldest still evolving password cracker program (and Open Source project), first released in 1996. John the Ripper 1.9.0-jumbo-1, which has just been announced with a lengthy list of changes, is the first release to include FPGA support (in addition to CPU, GPU, and Xeon Phi). This is a long-awaited (or long-delayed) major release, encompassing 4.5 years of development and 6000+ commits by 80+ contributors. From the announcement:

"Added FPGA support for 7 hash types for ZTEX 1.15y boards [...] we support: bcrypt, descrypt (including its bigcrypt extension), sha512crypt & Drupal7, sha256crypt, md5crypt (including its Apache apr1 and AIX smd5 variations) & phpass. As far as we're aware, several of these are implemented on FPGA for the very first time. For bcrypt, our ~119k c/s at cost 5 in ~27W greatly outperforms latest high-end GPUs per board, per dollar, and per Watt. [...] We also support multi-board clusters (tested [...] for up to 16 boards, thus 64 FPGAs, [...] on a Raspberry Pi 2 host)."

Comment Re: creimer's phat bootay is hot as phuck!!! HNNNN (Score 4, Informative) 108

"Why is everyone so interested in Julia?
"At some high level, Julia seems to solve what Steven Johnson (MIT) described at EuroSciPy on Friday as 'the two-language problem'. It's also known as Outerhout's dichotomy. Basically, there are system languages (hard to use, fast), and scripting languages (easy to use, slow). Attempts to get the best of boths worlds have tended to result in a bit of a mess. Until Julia.
(https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fagilescientific.com%2Fblog%2F2014%2F9%2F4%2Fjulia-in-a-nutshell.html)

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2F...
"the language-agnostic design of LLVM has since spawned a wide variety of front ends: languages with compilers that use LLVM include ActionScript, Ada, C#,[4][5][6] Common Lisp, Crystal, CUDA, D, Delphi, Fortran, Graphical G Programming Language,[7] Halide, Haskell, Java bytecode, Julia, Kotlin, Lua, Objective-C, OpenGL Shading Language, Pony,[8] Python, R, Ruby,[9] Rust, Scala,[10] Swift, and Xojo."

While Julia is not running on JVM it should be noted that a recent update to the JVM helps it be an interesting compiler target.
See: Java 7 JVM implements JSR 292: Supporting Dynamically Typed Languages[7] on the Java Platform, a new feature which supports dynamically typed languages in the JVM. This feature is developed within the Da Vinci Machine project whose mission is to extend the JVM so that it supports languages other than Java. (https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FJava_virtual_machine)

LLVM

Television

Samsung Wants To Bring Web Browsing, Office Work To the TV (variety.com) 54

Samsung's 2019 smart TVs will allow consumers to browse the web, access their PCs and even edit work documents from the comfort of their living room couch. From a report: The company previewed a new feature dubbed Remote Access this week, which integrates both Samsung's own Knox security framework as well as remote access software from VMWare. Samsung stopped short on revealing key details about Remote Access. It did disclose that Remote Access will make it possible to remotely access a PC from a TV, which then seems to function as a gateway to the web, as well as a way to play PC-based games.

To use Remote Access, consumers won't have to just rely on their TV remote controls. Instead, it will also work with a keyboard, mouse, and other input devices. These may come in handy when consumers access what Samsung vaguely described as a "web browser-based cloud office service" to "access files and work on documents."

Submission + - Linux Code of Conduct, F word code comments replaced with Hug (neowin.net)

mrspoonsi writes: In October, the Linux kernel project adopted a new Code of Conduct with the aim of enforcing more inclusive language; while it did have plenty of supporters, it also had detractors who were not keen on the idea at all. Today, Jarkko Sakkinen from Intel began putting the Code of Conduct into practice against several code comments, replacing the F-word with 'hug'. Following the change, several contributors responded to the alterations calling them insane, one wondered if Sakkinen was just trying to make a joke, and another called it censorship and said he’d refuse to apply any sort of patches like this to the code he's in charge of. Another contributor said they didn’t mind the change but that some of the sentences were now difficult to understand, this was echoed by a Dutch contributor who said the replacements were confusing for non-native English speakers. Some of the post-change comments read “Some Athlon laptops have really hugged PST tables”, “If you don’t see why, please stay the hug away from my code”, and “Only Sun can take such nice parts and hug up the programming interface”.

Slashdot Top Deals

Due to lack of disk space, this fortune database has been discontinued.

Working...