Microsoft's P language, for asynchronous event-driven programming and the IoT (internet of things), has been open-sourced.
Geared for embedded systems, device drivers, and distributed services, P is a domain-specific language the compiles to and interoperates with C, which itself has been commonly leveraged in embedded systems and the IoT. "The goal of P is to provide language primitives to succinctly and precisely capture protocols that are inherent to communication among components," said Ethan Jackson and Shaz Qadeer of Microsoft, in a tutorial on the language.
A maintenance exercise gone awry at root certificate authority GlobalSign caused what could be thousands of websites to be mistakenly treated as insecure by web browsers and therefore become inaccessible to users attempting to reach them.
GlobalSign itself has resolved the issue at its end. But users who visited the affected sites before the problem was resolved could find themselves being blocked until their browser cache expires—a process that could take four or more days.
This blog has featured several stories about payment card skimming devices designed to be placed over top of credit card terminals in self-checkout lanes at grocery stores and other retailers. Many readers have asked for more details about the electronics that power these so-called “overlay” skimmers. Here’s a look at one overlay skimmer equipped with Bluetooth technology that allows thieves to snarf swiped card data and PINs wirelessly using nothing more than a mobile phone.
Philips Hue lights are cool, but are you using them to they’re fullest potential? Sure, you can control them from your smartphone and turn them on from anywhere, but there are so many other useful tricks you can take advantage of. Here are a handful of clever uses for your Philips Hue setup.
A research center at the University of Toyama famous for its work on tritium, a substance used to fuel nuclear fusion reactors, is feared to have been targeted by cyber-attacks over a period of about six months, according to an internal investigation by the university and other sources.
The possibility of cyber-attacks was discovered in June of this year. Information is feared to have been stolen from the computer terminal of a researcher at the university's Hydrogen Isotope Research Center.