The Commodore Amiga Was A Computer Ahead Of Its Time
Despite being ahead of its time when it was unveiled in 1985, the Commodore Amiga didn't survive past 1996.
The Amiga had enough support from consumers to sell over the years, with the stripped-back Amiga 500 doing particularly well. Video games did well on the platform, thanks to its technical edge.
“We’re sorry,” Facebook says, again—new photo bug affects millions
The company announced Friday morning that a photo API bug might have resulted in millions of people having their private photos become improperly accessible by up to 1,500 apps for a period of 12 days in September 2018.
The online blog post noted that up to 6.8 million people may have been affected.
Windows 10 can carry on slurping even when you're sure you yelled STOP!
First noted in an increasingly shouty thread over on Reddit, the issue is related to Activity History, which is needed to make the much-vaunted and little-used Timeline feature work in Windows 10.
Deliberate slurpage, or a case of poor QA and one team not talking to the other aside, it isn't a great look for Microsoft and users are muttering about potential legal action. Privacy lawyers will certainly be taking a close look – after all, the gang at Redmond are already under scrutiny for harvesting data and telemetry from lucky users of Windows 10.
IBM Embraces Knative to Drive Serverless Standardization
Serverless computing, also often referred to as functions-as-a-service, enables organizations to execute functions without the need to first provision a long-running persistent server.
There have been multiple efforts in recent years to enable serverless models, often using containers as the core element.
Latest Windows Insider build makes a major upgrade to, uh… Notepad
Notepad already received a significant update in the recent October 2018 Update: Microsoft added support for files with Unix-style line endings.
Notepad is also going to support a convention that's literally decades old: when the currently loaded file has been modified, an asterisk will be shown in the title bar.
'Outdated' IT and old computers found in Welsh schools
It added many schools are using old computers and are struggling to afford the latest equipment.
Current qualifications are outdated, with some a decade behind the latest digital developments such as smart phones, iPads and smart watches.
Microsoft can't even get a software patch right on its flagship Surface device
Microsoft has rolled back an update which was found to bork its hardware flagship, the Surface Book 2.
The official advice is to uninstall it, but we're hearing reports that doing so could actually brick your beloved premium device altogether, so be careful. A system restore might be an alternative, but we're neither recommending it, nor promising anything.
To have an crippling bug make its way on to your flagship, not to mention most expensive laptop isn't just a fail, it's irresponsible.
The curious tale of ICANN, Verisign, claims of subterfuge, and the $135m .Web dot-word
More than two years ago, the internet infrastructure industry was agape when an unknown company paid $135m for the rights to sell .web internet addresses: the sum paid was three times the previous record paid for a new dot-word, and seven times the average auction price for a top-level domain.
Unsurprisingly, the other bidders were furious, and the US government was suspicious too: several months later Verisign's CEO told financial analysts on an earnings conference call that the biz was being investigated by the US Department of Justice over the deal.
Australia data encryption laws explained
Australia has passed controversial laws designed to compel technology companies to grant police and security agencies access to encrypted messages.
Under Australia's legislation, police can force companies to create a technical function that would give them access to encrypted messages without the user's knowledge.
However, cyber-security experts say it's not possible to create a "back door" decryption that would safely target just one person.
Adobe Flash zero-day exploit... leveraging ActiveX… embedded in Office Doc... BINGO!
In its current form, the attack bundles exploit code for the Flash zero-day (a use-after-free() bug) with an ActiveX call that is embedded within an Office document.
When the target opens the poisoned Doc, the ActiveX plug-in calls up Flash Player to run the attack code.