Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Hotel CEO Openly Celebrates Higher Prices After Anti-Airbnb Law Passes ( 72

An anonymous reader quotes a report from Washington Post: A hotel executive said a recently-passed New York law cracking down on Airbnb hosts will enable the company to raise prices for New York City hotel rooms, according to the transcript of the executive's words on a call with shareholders last week. The law, signed by New York's Governor Andrew Cuomo on Friday, slaps anyone who lists their apartment on a short-term rental site with a fine up to $7,500. It "should be a big boost in the arm for the business," Mike Barnello, chief executive of the hotel chain LaSalle Hotel Properties, said of the law last Thursday, "certainly in terms of the pricing." Barnello's comment adds fuel the argument, made repeatedly by Airbnb and its proponents, that a law that was passed in the name of affordable housing also allows established hotels to raises prices for consumers. It was included in a memo written by Airbnb's head of global policy, Chris Lehane, to the Internet Association, a tech trade group, reviewed by the Washington Post. LaSalle, a Bethesda, MD-based chain, owns hotels around the country, including New York City. The memo is the latest volley in a bitter fight that has pit the hotel industry, unions, and affordable housing advocates against Airbnb and its supporters. At the heart of the fight is a debate over the societal value of the Airbnb platform and its role in the economy of cities throughout the world. The question is whether Airbnb has been a net benefit, by enabling middle class city-dwellers to make extra money by renting out their homes, or whether it has had the unintended consequence of exacerbating affordable housing crises in expensive cities such as New York and Los Angeles.

WhatsApp Is Rolling Out Video Calls On Its Android App ( 23

WhatsApp appears to be rolling out its video calling feature for beta users of the Android app. The arrival of the feature was first spotted by Android Police, which found that an updated app interface caused some users of the beta builds of the application to be able to access video calling. TechCrunch reports: For those on a version of WhatsApp which includes video calling support, you're able to tap the call button or tap on a contact card to kick off a video call. In this case, a new dialog box will appear, offering the choice between a standard voice call and a video call. In addition, the call log will show which calls were made via video by annotating them with the camera icon, instead of the telephone icon. However, there isn't yet a way to call other WhatsApp users who don't also have video calling support. If you try to, WhatsApp defaults to a voice call. Android isn't the only platform where video calling has been switched on. Last week, some users on the WhatsApp beta for Windows Phone were also surprised to find that the feature was now functional. And in this case, it didn't require an app update -- indicating a server-side change could enable it. Some users have also reported seeing the feature on iOS.

How Vigilante Hackers Could Stop the Internet of Things Botnet ( 53

An anonymous reader quotes a report from Motherboard: Some have put forth a perhaps desperate -- and certainly illegal -- solution to stop massive internet outages, like the one on Friday, from happening: Have white-hat vigilante hackers take over the insecure Internet of Things that the Mirai malware targets and take them away from the criminals. Several hackers and security researchers agree that taking over the zombies in the Mirai botnet would be relatively easy. After all, if the "bad guys" Mirai can do it, a "good guys" Mirai -- perhaps even controlled by the FBI -- could do the same. The biggest technical hurdle to this plan, as F-Secure chief research officer Mikko Hypponen put it, is that once it infects a device, Mirai "closes the barn door behind it." Mirai spreads by scanning the internet for devices that have the old-fashioned remote access telnet protocol enabled and have easy to guess passwords such as "123456" or "passwords." Then, once it infects them, it disables telnet access, theoretically stopping others from doing the same. The good news is that the code that controls this function actually doesn't at times work very well, according to Darren Martyn, a security researcher who has been analyzing the malware and who said he's seen some infected devices that still have telnet enabled and thus can be hacked again. Also, Mirai disappears once an infected device is rebooted, which likely happens often as owners of infected cameras and DVRs try to fix their devices that suddenly have their bandwidth saturated. The bad news is that the Mirai spreads so fast that a rebooted, clean, device gets re-infected in five minutes, according to the estimates of researchers who've been tracking the botnets. So a vigilante hacker has a small window before the bad guys come back. The other problem is what a do-gooder hacker could do once they took over the botnet. The options are: brick the devices, making them completely unusable; change the default passwords, locking out even their legitimate owners; or try to fix their firmware to make them more resistant to future hack attempts, and also still perfectly functioning. The real challenge of this whole scenario, however, is that despite being for good, this is still illegal. "No one has any real motivation to do so. Anyone with the desire to do so, is probably afraid of the potential jail time. Anyone not afraid of the potential jail time...can think of better uses for the devices," Martyn told Motherboard, referring to criminals who can monetize the Mirai botnet.

Dyn DNS DDoS Likely The Work of Script Kiddies, Says FlashPoint ( 76

While nobody knows exactly who was responsible for the internet outrage last Friday, business risk intelligence firm FlashPoint released a preliminary analysis of the attack agains Dyn DNS, and found that it was likely the work of "script kiddies" or amateur hackers -- as opposed to state-sponsored actors. TechCrunch reports: Aside from suspicion falling on Russia, various entities have also claimed or implied responsibility for the attack, including a hacking group called the New World Hackers and -- bizarrely -- WikiLeaks, which put a (perhaps joke) tweet suggesting some of its supporters might be involved. FlashPoint dubs these claims "dubious" and "likely to be false," and instead comes down on the side of the script kidding theory. Its reasoning is based on a few factors, including a detail it unearthed during its investigation of the attack: namely that the infrastructure used in the attack also targeted a well-known video game company. The attack on Dyn DNS was powered in part by a botnet of hacked DVRs and webcams known as Mirai. The source code for the malware that controls this botnet was put on Github earlier this month. And FlashPoint also notes that the hacker who released Mirai is known to frequent a hacking forum called hackforums[.]net. That circumstantial evidence points to a link between the attack and users and readers of the English-language hacking community, with FlashPoint also noting the forum has been known to target video games companies. It says it has "moderate confidence" about this theory. The firm also argues that the attacks do not seem to have been financially or politically motivated -- given the broad scope of the targets, and the lack of any attempts to extort money. Which just leaves the most likely being motivation to show off skills and disrupt stuff. Aka, script kiddies.

Repeat Infringers Can Be Mere Downloaders, Court Rules ( 93

A 10-year-old copyright case has prompted an interesting opinion from a US appeals court. In determining the nature of a "repeat infringer" (which service providers must terminate to retain safe harbor), the court found these could be people who simply download infringing content for personal use. The case was filed by recording labels EMI and Capitol against the since long defunct music service MP3Tunes nearly a decade ago. The site allowed, among other things, the ability to store MP3 files and then play it remotely on other devices. The site also allowed users to search for MP3 files online and add them to MP3Tunes service. This is what the recording labels had a problem with, and they sued the site and the owner. TorrentFreak adds: The case went to appeal and yesterday the 2nd Circuit Court of Appeals handed down an opinion that should attract the attention of service providers and Internet users alike. The most interesting points from a wider perspective cover the parameters which define so-called 'repeat infringers.' [...] Noting that the District Court in the MP3Tunes case had also defined a 'repeat infringer' as a user who posts or uploads infringing content "to the Internet for the world to experience or copy", the Court of Appeals adds that the same court determined that a mere downloader of infringing content could not be defined as a repeat infringer "that internet services providers are obligated to ban from their websites." According to the Court of Appeal, that definition was too narrow. "We reject this definition of a 'repeat infringer,' which finds no support in the text, structure, or legislative history of the DMCA. Starting with the text, we note that the DMCA does not itself define 'repeat infringers'," the opinion reads. Noting that 'repeat' means to do something "again or repeatedly" while an 'infringer' is "[s]omeone who interferes with one of the exclusive rights of a copyright," the Court of Appeals goes on to broaden the scope significantly. [...] The notion that the term 'repeat infringer' can now be applied to anyone who knowingly (or unknowingly) downloads infringing content on multiple occasions is likely to set pulses racing. How it will play out in practical real-world scenarios will remain to be seen, but it's certainly food for thought.

Those Facebook Live Videos From Space That Are Going Viral Are Fake, NASA Confirms ( 39

Earlier this morning, a Facebook Live video allegedly showed a live feed of the International Space Station (ISS). The video has gone viral on the internet, with more than 17 million views, two million likes, and 400,000 shares. The only problem: that video feed is fake, a NASA spokesperson told Mashable. It said, "there is no spacewalk being conducted outside the International Space Station today." The video was shared by UNILAD, Viral USA, and Interstinate Facebook pages. From the report: NASA announces it whenever a spacewalk is expected to occur on the station, and they don't have anything about a spacewalk on their schedule for today. If the livestreams are showing spacewalks, that's a big hint they're fake.Good thing Facebook insists it isn't a media company.

Intel Announces Atom E3900 Series - Goldmont for the Internet of Things ( 67

Intel has announced the Atom E3900 series. Based upon the company's latest generation Goldmont Atom CPU core, the E3900 series will be Intel's most serious and dedicated project yet for the IoT market. AnandTech adds: So what does an IoT-centric Atom look like? By and large, it's Broxton and more. At its core we're looking at 2 or 4 Goldmont CPU cores, paired with 12 or 18 EU configurations of Intel's Gen9 iGPU. However this is where the similarities stop. Once we get past the CPU and GPU, Intel has added new features specifically for IoT in some areas, and in other areas they've gone and reworked the design entirely to meet specific physical and technical needs of the IoT market. The big changes here are focused on security, determinism, and networking. Security is self-evident: Intel's customers need to be able to build devices that will go out into the field and be hardened against attackers. Bits and pieces of this are inerieted from Intel's existing Trusted Execution Technology, while other pieces, such as boot time measuring, are new. The latter is particularly interesting, as Intel is measuring the boot time of a system as a canary for if it's been compromised. If the boot time suddenly and unexpectedly changes, then there's a good chance the firmware and/or OS has been replaced.

Google Fiber Pauses Operations, CEO Leaves, and About 9 Percent of Staff Is Being Let Go ( 193

The future of Google Fiber has been shaky ever since Google's parent company, Alphabet, was founded. The original plan was to expand Fiber's blazing fast internet service to more than 20 cities, with the goal of eventually delivering nationwide gigabit service. However, Alphabet hit the reset button on those plans Tuesday. Not only is Google Fiber CEO Craig Barratt leaving, but about 9 percent of staff is being let go. That translates to about 130 job losses, since the business has about 1,500 employees. Bloomberg reports: Barratt wrote in a blog post that the company is pulling back fiber-to-the-home service from eight different cities where it had announced plans. Those include major metropolitan areas such as Dallas, Los Angeles and Phoenix. Moving into big cities was a contentious point inside Google Fiber, according to one former executive. Leaders like Barratt and Dennis Kish, who runs Google Fiber day-to-day, pushed for the big expansion. Others pushed back because of the prohibitive cost of digging up streets to lay fiber-optic cables across some of America's busiest cities. "I suspect the sheer economics of broad scale access deployments finally became too much for them," said Jan Dawson, an analyst with Jackdaw Research. "Ultimately, most of the reasons Google got into this in the first place have either been achieved or been demonstrated to be unrealistic."

Scientists Create AI Program That Can Predict Human Rights Trials With 79 Percent Accuracy ( 81

An anonymous reader quotes a report from The Verge: Computer scientists have created an AI program capable of predicting the outcome of human rights trials. The program was trained on data from nearly 600 cases brought before the European Court of Human Rights (ECHR), and was able to predict the court's final judgement with 79 percent accuracy. Its creators say it could be useful in identifying common patterns in court cases, but stress that they do not believe AI will be able to replace human judgement. As described in a study published in the journal PeerJ Computer Science, the AI program worked by analyzing descriptions of court cases submitted to the ECHR. These descriptions included summaries of legal arguments, a brief case history, and an outline of the relevant legislation. The cases were grouped into three main violations of human rights law, including the prohibition on torture and degrading treatment; the right to a fair trial; and the right to "respect for private and family life." (Used in a wide range of cases including illegal searches and surveillance.) The AI program then looked for patterns in this data, correlating the courts' final judgements with, for example, the type of evidence submitted, and the exact part of the European Convention on Human Rights the case was alleged to violate. Aletras says a number of patterns emerged. For example, cases concerning detention conditions (eg access to food, legal support, etc.) were more likely to end in a positive judgement that an individual's human rights had been violated; while cases involving sentencing issues (i.e., how long someone had been imprisoned) were more likely to end in acquittal. The researchers also found that the judgements of the court were more dependent on the facts of the case itself (that is to say, its history and its particulars) than the legal arguments (i.e., how exactly the Convention on Human Rights had or had not been violated).

Apple Has Created 'Detailed Mockups' of iMessage For Android ( 142

One of the biggest features on iOS that isn't available on Android is iMessage, an instant messaging service that allows users to send information over Wi-Fi, 4G LTE, and other forms of internet access to other iOS or OS X users. Earlier this year, there were been rumors swirling around the possibility of the service coming to Android due to Apple's increased focus on services, "which means opening up certain avenues beyond its own iOS and OS X platforms." Today, Daring Fireball's John Gruber has added fuel to the fire by mentioning that he's "heard from little birdies" that a handful of "detailed mockups" of iMessage for Android have been shared around Apple. MacRumors reports: The user interface of the Android app is said to have gone through numerous designs, from one that looks identical to the version on iOS, to another that has a "pure Material Design," using Google's design language it developed a few years ago. Gruber still thinks iMessage on Android "might happen sooner or later," mainly because of iMessage's new monetized Messages App Store, which could net Apple increased income in its already profitable services category if it translated the app to Android. Apple undoubtedly created mockups for all types of products and services, the vast majority of which never make it to release, and it's unclear exactly how far along the iMessage for Android preliminary designs were at the time of their circulation through Apple, or when exactly that occurred. Still, Gruber notes that while an Android version of iMessage "may never see the light of day," even the existence of such mockups "strongly suggests that there's no 'of course not' to it."

Yahoo Scanning Order Unlikely To Be Made Public: Reuters ( 57

An anonymous reader quotes a report from Reuters: Obama administration officials briefed key congressional staffers last week about a secret court order to Yahoo that prompted it to search all users' incoming emails for a still undisclosed digital signature, but they remain reluctant to discuss the unusual case with a broader audience. Executive branch officials spoke to staff for members of the Senate and House of Representatives committees overseeing intelligence operations and the judiciary, according to people briefed on the events, which followed Reuters' disclosure of the massive search. But attempts by other members of Congress and civil society groups to learn more about the Yahoo order are unlikely to meet with success anytime soon, because its details remain a sensitive national security matter, U.S. officials told Reuters. Release of any declassified version of the order is unlikely in the foreseeable future, the officials said. The decision to keep details of the order secret comes amid mounting pressure on the U.S. government to be more transparent about its data-collection activities ahead of a congressional deadline next year to reauthorize some foreign intelligence authorities. On Tuesday, more than 30 advocacy groups will send a letter to Director of National Intelligence James Clapper asking for declassification of the Yahoo order that led to the search of emails last year in pursuit of data matching a specific digital symbol. The groups say that Title I of the Foreign Intelligence Surveillance Act, under which sources said the order was issued, requires a finding that the target of such a wiretap is probably an agent of a foreign power and that the facility to be tapped is probably going to be used for a transmission. An entire service, such as Yahoo, has never publicly been considered to be a "facility" in such a case: instead, the word usually refers to a phone number or an email account.

Benchmark Battle October 2016: Chrome Vs. Firefox Vs. Edge ( 134

Krystalo quotes a report from VentureBeat: It's been more than a year since our last browser benchmark battle, and the competition remains fierce. Google Chrome, Mozilla Firefox, and Microsoft Edge have all gained a variety of new features and improvements over the past year. It's time to see if any of them have managed to pull ahead of the pack. It appears that Edge has made the biggest gains since last year. That said, browser performance is improving at a very rapid pace, and it shouldn't be your only consideration when picking your preferred app for consuming Internet content. You can click on individual tests below to see the details:

SunSpider: Edge wins!
Octane: Edge wins!
Kraken: Chrome wins!
JetStream: Edge wins!
Oort Online: Firefox wins!
Peacekeeper: Firefox wins!
WebXPRT: Edge wins!
HTML5Test: Chrome wins!

You can also read all about the setup used for the benchmark tests here. VentureBeat used a custom desktop PC, featuring an Intel Core i5 4440 processor (6M Cache, 3.10 GHz), 8GB of DDR3 1600MHz RAM, a 500GB SATA hard drive (7200 RPM), an Nvidia GeForce GTX 460 graphics card, and a 24-inch widescreen LED monitor (1920 x 1080).

The Phone Hackers At Cellebrite Have Had Their Firmware Leaked Online ( 29

An anonymous reader quotes a report from Motherboard: Cellebrite, an Israeli company that specializes in digital forensics, has dominated the market in helping law enforcement access mobile phones. But one apparent reseller of the company's products is publicly distributing copies of Cellebrite firmware and software for anyone to download. Although Cellebrite keeps it most sensitive capabilities in-house, the leak may still give researchers, or competitors, a chance to figure out how Cellebrite breaks into and analyzes phones by reverse-engineering the files. The apparent reseller distributing the files is McSira Professional Solutions, which, according to its website, "is pleased to serve police, military and security agencies in the E.U. And [sic] in other parts of the world." McSira is hosting software for various versions of Cellebrite's Universal Forensic Extraction Device (UFED), hardware that investigators can use to bypass the security mechanisms of phones, and then extract data from them. McSira allows anyone to download firmware for the UFED Touch, and a PC version called UFED 4PC. It is also hosting pieces of Cellebrite forensic software, such as the UFED Cloud Analyzer. This allows investigators to further scrutinize seized data. McSira is likely offering downloads so customers can update their hardware to the latest version with as little fuss as possible. But it may be possible for researchers to take those files, reverse-engineer them, and gain insight into how Cellebrite's tools work. That may include what sort of exploits Cellebrite uses to bypass the security mechanisms of mobile phones, and weaknesses in the implementation of consumer phones that could be fixed, according to one researcher who has started to examine the files, but was not authorised by his employer to speak to the press about this issue.
Desktops (Apple)

It Looks Like Apple is Killing the Physical Esc and Power Keys On New MacBook Pro 505

Curious minds on the internet have uncovered an image file on their Mac, which was added by Apple in the latest macOS update. The image reveals a new laptop that fully fits the description of rumored MacBook Pro, which Apple is expected to launch on October 27. The laptop in the picture has what seems like a "contextual" OLED display (some are calling it Magic Toolbar display) on the top. What's interesting from that picture is that there's no physical Escape key or Power key to be found anywhere.

Editor's note: We usually tend to avoid covering leaks and rumors, but several readers pitched the story to us, and media outlets are also covering it now, which adds some credibility to the matter.

Twitter Plans To Cut About 300 Jobs As Soon As This Week: Bloomberg ( 104

An anonymous reader quotes a report from Bloomberg: Twitter Inc. is planning widespread job cuts, to be announced as soon as this week, according to people familiar with the matter. The company may cut about 8 percent of the workforce, or about 300 people, the same percentage it did last year when co-founder Jack Dorsey took over as chief executive officer, the people said. Planning for the cuts is still fluid and the number could change, they added. An announcement about the job reductions may come before Twitter releases third-quarter earnings on Thursday, one of the people said. Twitter, which loses money, is trying to control spending as sales growth slows. The company recently hired bankers to explore a sale, but the companies that had expressed interest in bidding -- Inc., The Walt Disney Co. and Alphabet Inc. -- later backed out from the process. Twitter's losses and 40 percent fall in its share price the past 12 months have made it more difficult for the company to pay its engineers with stock. That has made it harder for Twitter to compete for talent with giant rivals like Alphabet Inc.'s Google and Facebook Inc. Reducing employee numbers would relieve some of this pressure.

People Like Netflix's Original Content More Than Its Other Content: AllFlicks ( 77

According to a study by IHS Markit this month, in the last two years Netflix's spending on original content rose from $2.38 billion to $4.91 billion. The company has invested big in original programming -- and it looks to be paying off. The folks over at AllFlicks have found that Netflix's subscriber base prefers Netflix's original content to that of its syndicated content. AllFlicks reports: Netflix user ratings show that Netflix's subscriber base prefers Netflix's original content to its syndicated content. Netflix originals sport an average rating of 3.85 stars out of five; all other content averages 3.47 stars. That means that user ratings for Netflix originals are 11% higher, on average, than user ratings for syndicated content. Netflix does best in the documentaries category, where users rate non-original content, on average, at 3.54. Netflix's documentaries average 4.07 stars, a pretty impressive showing. Netflix's TV shows do the worst, but still edge their other TV show content by 5.7%. It's possible that the frequent reviewers among Netflix's user base differ from the user base as a whole, but there's not a lot of reason to doubt the raw data here. The Netflix originals and non-originals were both reviewed on the same service and using the same rating system, yet originals consistently outperformed the rest of the content.

Alibaba Founder To Chinese Government: Use Big Data To Stop Criminals ( 46

An anonymous reader quotes a report from Bloomberg: Chinese billionaire Jack Ma proposed that the nation's top security bureau use big data to prevent crime, endorsing the country's nascent effort to build unparalleled online surveillance of its billion-plus people. China's data capabilities are virtually unrivaled among its global peers, and policing cannot happen without the ability to analyze information on its citizens, the co-founder of Alibaba Group Holding Ltd. said in a speech published Saturday by the agency that polices crime and runs the courts. Ma's stance resonates with that of China's ruling body, which is establishing a system to collect and parse information on citizens in a country where minimal safeguards exist for privacy. "Bad guys in a movie are identifiable at first glance, but how can the ones in real life be found?" Ma said in his speech, which was posted on the official WeChat account of the Commission for Political and Legal Affairs. "In the age of big data, we need to remember that our legal and security system with millions of members will also face change." In his speech, Ma stuck mainly to the issue of crime prevention. In Alibaba's hometown of Hangzhou alone, the number of surveillance cameras may already surpass that of New York's, Ma said. Humans can't handle the sheer amount of data amassed, which is where artificial intelligence comes in, he added. "The future legal and security system cannot be separated from the internet and big data," Ma said. Ma's speech also highlights the delicate relationship between Chinese web companies and the government. The ruling party has designated internet industry leaders as key targets for outreach, with President Xi Jinping saying in May last year that technology leaders should "demonstrate positive energy in purifying cyberspace."

Electronic Surveillance Up 500% In DC Area Since 2011, Almost All Sealed Cases ( 39

schwit1 quotes a report from Washington Post: Secret law enforcement requests to conduct electronic surveillance in domestic criminal cases have surged in federal courts for Northern Virginia and the District, but only one in a thousand of the applications ever becomes public, newly released data show. The bare-bones release by the courts leaves unanswered how long, in what ways and for what crimes federal investigators tracked individuals' data and whether long-running investigations result in charges. In Northern Virginia, electronic surveillance requests increased 500 percent in the past five years, from 305 in 2011 to a pace set to pass 1,800 this year. Only one of the total 4,113 applications in those five years had been unsealed as of late July, according to information from the Alexandria division of the U.S. District Court for the Eastern District of Virginia, which covers northern Virginia. The report adds: "The federal court for the District of Columbia had 235 requests in 2012, made by the local U.S. attorney's office. By 2013, requests in the District had climbed 240 percent, to about 564, according to information released by the court's chief judge and clerk. Three of the 235 applications from 2012 have been unsealed. The releases from the Washington-area courts list applications by law enforcement to federal judges asking to track data -- but not eavesdrop -- on users' electronic communications. That data can include sender and recipient information, and the time, date, duration and size of calls, emails, instant messages and social media messages, as well as device identification numbers and some website information."

Seth's Blog: Hardware is Sexy, But It's Software that Matters ( 78

American author and entrepreneur Seth Godin argues that though hardware is nice and dandy, it is the software that matters. And not just software that runs on a computer, "but the metaphorical idea of rules and algorithms designed to solve problems and connect people," he writes. Godin has used the piece to note how Apple has increasingly grown focused on hardware, and as a result, it's not putting much effort to fixing its software. He writes, "Automator, a buggy piece of software with no support, and because it's free, no competitors. Keynote, a presentation program that hasn't been improved in years. iOS 10, which replaces useful with pretty. iTunes, which is now years behind useful tools like Roon. No significant steps forward in word processing, spreadsheets, video editing, file sharing, internet tools, conferencing, etc. Apple contributed mightily to a software revolution a decade ago, but they've stopped. Think about how many leaps forward Slack, Dropbox, Zapier and others have made in popular software over the last few decades. But it requires a significant commitment to keep it moving forward. It means upending the status quo and creating something new." From the article: Software can change faster than hardware, which means that in changing markets, bet on software. It's tempting to treat the user interface as a piece of fashion, some bling, a sort of jewelry. It's not. It's the way your user controls the tool you build. Change it when it stops working, not when you're bored with it. Every time you change the interface, you better have a really good reason.John Gruber disagrees. He writes: Software, in general, is much better than it used to be. Unlike 1995, we don't lose data due to bugs very often. (For me personally, I can't even remember the last time I lost data.) But our hardware is so much better than our software, the contrast is jarring. An iPhone is a nearly perfect object. Sleek, attractive, simple. The hardware is completely knowable -- there are only five buttons, each of them easily understood. iOS, however, is effectively infinite. The deeper our software gets, the less we know and understand it. It's unsettling.

New York Times Buys The Wirecutter For $30 Million ( 40

An anonymous reader quotes a report from Recode: The New York Times is buying The Wirecutter, a five-year-old online consumer guide. The Times will pay more than $30 million, including retention bonuses and other payouts, for the startup, according to people familiar with the transaction. Brian Lam, a former editor at Gawker Media's Gizmodo, founded The Wirecutter in 2011, and has self-funded the company's growth. The Wirecutter provides recommendations for electronics and other gadgets that are both obsessively researched and simply presented. The Wirecutter also owns The Sweethome, which takes the same approach for home appliances and other gear. "We're very excited about this acquisition on two fronts," said Mark Thompson, CEO of The New York Times Company, in the acquisition release. "It's an impressively run business with a very attractive revenue model and its success is built on the foundation of great, rigorously reported service journalism." The Wirecutter tweeted earlier today: "Hey, we're still us. But we're a part of The New York Times now."

Slashdot Top Deals