NSA Improperly Collected U.S. Phone Records a Second Time

NSA Improperly Collected U.S. Phone Records a Second Time

CLOSE

The National Security Administration campus in Fort Meade, Md. (Photo: Patrick Semansky, AP)

The National Security Agency improperly collected phone call records of Americans last fall, months after a previous breach that compelled the agency to destroy millions of records from the contentious program, documents released Wednesday revealed. The redacted documents, obtained by the ACLU in a Freedom of Information Act lawsuit, do not indicate how many records NSA improperly collected in the October breach, nor which telecommunications provider submitted the improper data. “These documents provide further evidence that the NSA has consistently been unable to operate the call detail record program within the bounds of the law,” the ACLU said in a letter to Congress this week lobbying for an end to the program.

Source: www.usatoday.com

Mux is growing and hiring engineers to work in Elixir, React, Go, and Kubernetes

Mux is growing and hiring engineers to work in Elixir, React, Go, and Kubernetes

The first product we launched was analytics and performance monitoring – think “NewRelic for Video” – used by major video streaming companies like PBS, Vimeo, CBS Interactive, and the New York Times to monitor and improve billions of streams. In early 2018, we launched Mux Video, a simple API to video hosting, encoding and streaming – think “Stripe for Video” – which uses our performance data, machine learning, and just-in-time encoding for unmatched video quality and efficiency. Our founders previously started (and sold) Zencoder, an early leader in cloud video technology.

Source: mux.com

New AI programming language goes beyond deep learning

New AI programming language goes beyond deep learning

In a paper presented at the Programming Language Design and Implementation conference this week, the researchers describe a novel probabilistic-programming system named “Gen.” Users write models and algorithms from multiple fields where AI techniques are applied — such as computer vision, robotics, and statistics — without having to deal with equations or manually write high-performance code. In their paper, for instance, the researchers demonstrate that a short Gen program can infer 3-D body poses, a difficult computer-vision inference task that has applications in autonomous systems, human-machine interactions, and augmented reality. “Gen is the first system that’s flexible, automated, and efficient enough to cover those very different types of examples in computer vision and data science and give state of-the-art performance,” says Vikash K. Mansinghka ’05, MEng ’09, PhD ’09, a researcher in the Department of Brain and Cognitive Sciences who runs the Probabilistic Computing Project.

Source: news.mit.edu

Uber/Lyft drivers say they were misled into petitioning against workers rights

Uber/Lyft drivers say they were misled into petitioning against workers rights

Now, some drivers in California have told Recode they’ve been confused and misled by the emails and in-app messages Uber and Lyft have sent urging them to sign petitions or contact their local legislators to voice opposition to potential worker reclassification. One of the reasons drivers say they’ve been misled is because the messages Lyft and Uber have sent don’t mention AB5 at all — both companies have markedly refrained from ever mentioning the law in their oppositional messaging — and they also don’t mention the potential for drivers to become real employees. Uber

Other drivers told Recode that because of the manner in which the in-app messages appeared in Uber and Lyft, they thought it was mandatory to sign a petition or send an email to legislators.

Source: www.vox.com

EC2 Instance Connect

EC2 Instance Connect

With EC2 Instance Connect, you can control SSH access to your instances using AWS Identity and Access Management (IAM) policies as well as audit connection requests with AWS CloudTrail events. In addition, you can leverage your existing SSH keys or further enhance your security posture by generating one-time use SSH keys each time an authorized user connects. Instance Connect works with any SSH client, or you can easily connect to your instances from a new browser-based SSH experience in the EC2 console.

Source: aws.amazon.com

OS X/Linker: New Mac malware attempts zero-day Gatekeeper bypass

OS X/Linker: New Mac malware attempts zero-day Gatekeeper bypass

dmg (Apple Disk Image) files are much more commonly used to distribute Mac software. By the time the disk images had been discovered and analyzed, the NFS server was no longer hosting the Mac app referenced by the disk images’ symlinks. The disk images are disguised as Adobe Flash Player installers, which is one of the most common ways malware creators trick Mac users into installing malware.

Source: www.intego.com

One In Five Employees Is Highly Engaged and at Risk of Burnout

One In Five Employees Is Highly Engaged and at Risk of Burnout

For some people, engagement is indeed a purely positive experience; 2 out of 5 employees reported high engagement and low burnout. For some people, engagement is indeed a purely positive experience; 2 out of 5 employees in our survey reported high engagement and low burnout. That means that companies may be at risk of losing some of their most motivated and hard-working employees not for a lack of engagement, but because of their simultaneous experiences of high stress and burnout symptoms.

Source: hbr.org

The Muse (YC W12) Is Hiring a Senior Data Engineer

The Muse (YC W12) Is Hiring a Senior Data Engineer

The Muse is the most trusted and beloved career platform, connecting individuals and companies on a more authentic level. You’ll build the infrastructure to power our machine learning systems working with our team of engineers, product managers and designers to help us create a more personalized experience for the millions of users who come to The Muse for company research and career advice. You’ll also work with our business intelligence team to improve the data platform, ensuring that the entire company is able to make better data-driven decisions.

Source: www.themuse.com

Americans Greatly Overestimate U.S. Gay Population

Americans Greatly Overestimate U.S. Gay Population

Americans’ estimate of the proportion of gay people in the U.S. is more than five times Gallup’s more encompassing 2017 estimate that 4.5% of Americans are LGBT, based on respondents’ self-identification as being lesbian, gay, bisexual or transgender. As Gallup pointed out in its initial estimate of the entire LGBT population in 2012, “Exactly who makes up the LGBT community and how this group should be measured is a subject of some debate,” and “there are a number of ways to measure lesbian, gay, and bisexual orientation, and transgender status. Even the groups offering the lowest average estimates of gays and lesbians in the U.S. exceed Gallup’s figure on all LGBT identification by about four times.

Source: news.gallup.com

Gmail’s API lockdown will kill some third-party app access, starting July 15

Gmail’s API lockdown will kill some third-party app access, starting July 15

Google is locking down API access to Gmail data (and later, Drive data) soon, and some of your favorite third-party apps might find themselves locked out of your Google account data. The new policy closes off OAuth access to Gmail data, and while we by no means have a comprehensive list of what isn’t affected yet, so far we’ve seen users of Microsoft’s SwiftKey and the open source app SMS Backup+ receive notification emails. “We wanted to let you know that the following apps may no longer be able to access some data in your Google Account, including your Gmail content,” the email reads.

Source: arstechnica.com