Chrome is going to lose support for some ancient CPUs

The Chromium Development Team has announced that CPUs older than the Intel Core 2 Duo and AMD Athlon 64 will not operate with Chrome 89 and future versions as they do not meet the current minimum instruction set specifications of SSE3 (Supplemental Streaming SIMD Extensions 3) support.

So, if you're still using the Intel Atom or Celeron M CPU, you'll soon be counting Chrome as one of the many programs that are incompatible with your potato-like rig. Apps can no longer attempt to install a browser while running it will cause the app to crash.

It has been noted that the move only affects Windows, such as Chrome OS, Android, and Mac, which already need SSE3 support.

Anyone still using one of the affected devices will start seeing a warning (below) in Chrome 87 about the upcoming end of the service.

Google claims that only a small number of users will be adversely affected by the change; very few people outside niche retro groups are still using pre-2005 PC hardware. And if you're in love with your old machine, Mozilla and Firefox remain viable browser alternatives that don't need SSE3.

 

 


Jeff Bezos to step down as Amazon CEO later this year

Bezos will hand the company's reins over to his friend and colleague, Andrew Jassy, after 27 years of service. Maybe Jassy is best known for founding the immensely popular Web Services (AWS) division of Amazon.

AWS is a platform for cloud computing that serves well over a million users; indeed, it is the reason why today many of your favorite websites and services are live. The popularity of AWS, combined with the long career of Jassy at Amazon — he joined in 1997 — made it clear to Bezos that he was the right man for the job.

Image result for andrew jassy

Within the company, Andy is well-known and has been at Amazon for almost as long as I have, "Andy is well known inside the company and has been at Amazon almost as long as I have," "He will be an outstanding leader, and he has my full confidence." The query now on all our minds is... Oh, why? Why is Bezos, of all times, leaving now? Amazon is in better financial condition than ever, and one of the richest individuals on the planet is the soon-to-be-ex CEO.

The response, apparently, is simple: time. Right now, Bezos is responsible for many companies and projects, including the Day 1 Fund, the Bezos Planet Fund, and, to name a few, Blue Roots. According to him, his position as Amazon's leader just doesn't leave him enough time and energy to give anything to these other ventures.

Bezos would be in a much stronger place to help those organizations succeed when he eventually steps down from the leadership position.

As mentioned before, the decision of Bezos here does not reflect a total detachment from Amazon as a company. Bezos will still be able to exert some power and influence over the overall course of Amazon since becoming Chairman of the Board, without needing him to be as present for the daily operations. The multi-billionaire sounds like a balanced balance.


The Dutch coronavirus app goes nationwide

The Dutch Coronavirus tracing app was introduced across the country on the 10th of October 2020 following the last senate vote of using the alert-based system.

The CoronaMelder app which was first introduced in early April will warn users if they have spent 15 minutes or more in close contact with someone who has tested positive for the virus in so far as the user gives permission for the information to be used.

It is not yet compulsory to use the app, which works by exchanging random codes with other phones via Bluetooth technology. The app has been available for download since mid-August and was already operational in five of the 25 regional health districts.

The app is available in English as well as Dutch and there is information about how it works in a number of other languages online, including German, Polish and Turkish.


Facebook plans to implement algorithms that limits the virality of political posts

Why it matters?

Facebook is set to deploy more rigid algorithmic tools to limit the spread of viral content on its platform. This is according to a new report by the Wall Street Journal that highlights measures that have been tested in recent elections, including in Sri Lanka and Myanmar, to mitigate disinformation campaigns.

The move is in preparation for the November U.S. presidential election, which is set to pose some unique challenges. The company believes that there’s tremendous potential for upheaval spurred on by the spread of disinformation during election season.

According to a recent blog post by Facebook CEO Mark Zuckerberg, the country is deeply divided along political lines. Zuckerberg has raised concerns about the recent surge in politically-motivated acts of violence as well as misinformed statements by public figures. He has alluded to these as indicators that democracy could be undermined if information is not regulated.

The following is the statement issued by Andy Stone, the company’s Policy Communications Director, in relation to this. “While I will intentionally not link to the New York Post, I want be clear that this story is eligible to be fact checked by Facebook’s third-party fact checking partners. In the meantime, we are reducing its distribution on our platform.” Facebook currently relies on a network of third-party fact-checking organizations to authenticate such information. They include the Associated Press, the Daily Caller, and France-Presse.


Dutch Coronavirus contact apphas been pushed backed until at least mid-October

The Dutch government-backed app which warns people if they come in contact with possible coronavirus patients will not be launched nationwide until mid-October at the earliest, broadcaster NOS said on Thursday.

This is because the legislation needed to anchor the app has not yet completed its passage through parliament, the broadcaster said.

The upper house of parliament will not vote on the legislation until October 6 at the earliest, but this could be delayed if senators have a lot of questions. Even if senators can pass the law on October 6, it will still take a week to finalize the legal paperwork and roll out a publicity campaign, a health ministry spokesman said. The app has been available for download since mid-August and is currently supported by five regional health boards.


Google is creating a microscope with AI and AR to help detect cancer

Google has won a contract with the Defense Innovation Unit (DIU) to use recent technological advancements to improve the accuracy of a cancer diagnosis. About five percent of diagnoses are made incorrectly, and in half of those cases, the incorrect diagnosis causes problems further down the road.

Google plans to train an AI using the open-source platform TensorFlow to detect cancerous cells in photos taken from a microscope. They’ve already started developing the neural networks by using the Google Cloud Healthcare API to de-identify and segment existing datasets. Once the AI is fully trained, they’ll design their own microscope with an integrated AR (augmented reality) overlay that shows physicians' information about the likelihood of cells being cancerous.

To effectively treat cancer, speed and accuracy are critical,” said Mike Daniels, vice president of Google Cloud’s department for the Global Public Sector. “We are partnering with the DIU to provide our machine learning and artificial intelligence technology to help frontline healthcare practitioners learn about capabilities that can improve the lives of our military men and women and their families.

Google hopes that their method will reduce the “overwhelming volume of data” physicians face and will make the diagnoses faster and cheaper, as well as being more accurate. But widespread use of AI in medical practices is still a while away. The first shipment of microscopes will be to select the Defense Health Agency treatment facilities for research only. Afterward, the technology will roll out to the broader US Military Health System and Veteran’s Affairs hospitals for real-world trialing.

 


Google and Apple release contact tracing app API to public health agencies accross the globe

Google and Apple delivered their contact tracing app API to public health agencies across the globe. The apps would allow Bluetooth pings between smartphones within six and a half feet of each other. And in theory, these apps would notify you if you had been in close contact with someone diagnosed with COVID-19. In practice, public health authorities will have to encourage around 60% of people in a given state or country to download the app in order to meaningfully conduct contact tracing/exposure notification. Computerworld executive editor Ken Mingis and PCWorld/Macworld’s Michael Simon join Juliet to discuss Apple and Google’s unprecedented collaboration, privacy concerns, and how state and federal governments will utilize the API.

You can listen to this podcast episode right now clicking on this link. And you can subscribe to this podcast series from your favorite podcast app on your mobile device to listen to any time, so you won't miss an episode. Just click the desired podcast app's button below to subscribe.


Affordable Home Security System Best Arlo and Blink

After the much-publicized hacking of Amazon`s Ring security cameras in December that allowed strangers to peer into homes and harass occupants, Arlo and Blink camera systems have been notified recently of required changes to their accounts meant to enhance security.

Arlo users are now required to turn on two-factor authentication by the end of the year (2020), while Amazon`s Blink is still taking baby steps in implementing the two-factor authentication. The 2FA has been an option to be activated since last year, however, a message has been sent to owners that it will be compulsory to enable it before the end of 2020. The 2FA can be verified via a push notification to a previously trusted device, through SMS messages, and emails.

Owners of low-cost, battery-powered Blink cameras have received emails informing them about 2FA been on the way and the owners had to verify their email addresses starting on March 30th.


Computer Hacking and How To Protect It

Individuals using a device connected to the Internet are vulnerable to the threats posed by cyber predators and computer hackers. Such computer hacking experts typically use phishing scams, instant messages or spam emails and fake websites to deliver dangerous malware to your computer and compromise your computer security.

If you are not secured by a firewall, these hackers may also try to access your device and private information directly. You will be able to monitor your messages, review the back-end of your personal website, and also install malware. Protecting your device from hackers is, therefore, a growing concern that can be solved by installing effective antivirus software and other virus protection measures.

Hackers can do the following things with your computer:

  • Make purchases
  • Hijack your passwords and usernames
  • Obtain cash advances
  • Ruin your credit
  • Request new account Personal Identification Numbers (PINSs) or additional credits
  • Add themselves or an alias that they control as an authorized user so it is easier to use your credit.

Tips on how to stay protected from computer hacking activities

Install, update and use antivirus

Installing antivirus software is an extremely important step that helps to protect viruses and avoid malware, but it doesn't affect everyone.

Turn on the windows firewall

Windows has a built-in firewall that protects your PC from unwanted internet attention. This software firewall is enabled by default and works alongside any hardware firewall that is installed into your home broadband router. Check its settings by entering "Test Firewall" in the Start menu search box and selecting Check Firewall status from the list. Three green tick marks mean that the firewall is usually operating, if not, choosing each one to turn the firewall on.

Check link locations

Unknown messages are connected to unknown pages. You could end up facing unintended consequences if you visit a cryptic website. Such pages may be unsecured or compromised with malware. Copy and paste the connection location to a new browser to see which site is on the other side. Encrypted pages are the easiest to visit because you know they are safe when you see HTTPS in the URL and the lock icon on your browser.

Use Advanced Password

An effective password includes lowercase, uppercase, punctuation, numbers, and special characters. Do not store a list in a saved file and refrain from making a personal reference to the password. Never use the same password on multiple accounts.

Use Two-Factor Authentication

When hackers get your passwords, they try to study which personal accounts they can control with the stolen data. Two-factor authentication is known to be an effective way to stop attackers who have stolen passwords. A growing number of companies are now setting standards for logging in. For two-factor authentication, users will need to enter a password and also validate an entry with another element like a code that is sent to the phone.

Be Suspicious of Emails

If you receive phone emails, make sure to check your email address to see if it suits the website you think it is from. You can also search the sender's IP address in order to be extra careful. This can be done by identifying the source information from the email and then searching for an IP address that matches the' Received: from' line. Google will have an IP address to discover the source of the email.

Use The Most Recent Version of Your Web Browser

Web browsers are vital tools, but they can contain bugs just like other apps. Hackers are fast to capitalize on these and create false websites with data designed to exploit them. After hacking the web browser in this way, the hacker will be able to monitor anything you type, from credit card numbers to passwords. It is therefore important for you to use the most recent version of your web browser, as this helps prevent hacking attempts by your computer and other related issues.

 


SPOTLIGHT ON SOFTWARE TECHNOLOGY: DOCKER

Introducing Docker the modern solution for all developers with deployment problems in applications.

Docker essentially use a container system that separate one’s application with the infrastructure its build on. By offering this, docker system not only increases the portability of the system but also reduces any environmental issues caused when deploying an application. It also helps duplicate and widen the scope of application across multiple servers.

Dockers will save your day by:

  • Accelerating developer on-boarding, setting up a complex developer system within a few mins.
  • Eliminating any app conflicts, because Dockers have so many containers it helps multiple versions exist side by side. Also, it’s easy to start and stop applications with Docker commands.
  • Docker helps you run containers in multiple environments. Therefore, the software shipping is made easier, which can also include being able to ship the infrastructure and software.

Now what are you waiting for? Dive in and get acquainted.

You’ll soon realise just how much Docker can improve your software development and application deployment.

To find out more about Dockers check https://www.docker.com

And if you want to find out about the best suited hardware for your software check https://easyhardwaretrading.com