Cisco Systems To Lay Off About 14,000 Employees, Representing 20% of Global Workforce

schwit1 writes from a report via CRN: Cisco Systems is laying off about 14, 000 employees, representing nearly 20 percent of the network equipment maker’s global workforce. San Jose, California-based Cisco is expected to announce the cuts within the next few weeks, the report said, as the company transitions from its hardware roots into a software-centric organization. Cisco increasingly requires “different skill sets” for the “software-defined future” than it did in the past, as it pushes to capture a higher share of the addressable market and aims to boost its margins, the CRN report said citing a source familiar with the situation. “The company’s headcount as of April 20, 2016, was 73, 104, ” reports CRN. “Cutting 14, 000 employees would be the single largest layoff in Cisco’s 32-year history.” Read more of this story at Slashdot.

See more here:
Cisco Systems To Lay Off About 14,000 Employees, Representing 20% of Global Workforce

Here’s How A Tesla Taxi Held Up After 100,000 Miles

Christian Roy of Quebec City has been using his Tesla Model S as a taxi for over two-and-a-half years, accumulating over 100, 000 treacherous taxi miles. How did this high-tech electric car stand up to that much cab abuse? Read more…

Visit link:
Here’s How A Tesla Taxi Held Up After 100,000 Miles

Linux Traffic Hijack Flaw Also Affects Most Android Phones, Tablets

Zack Whittaker, writing for ZDNet: As many as 80 percent of Android devices are vulnerable to a recently disclosed Linux kernel vulnerability. Security firm Lookout said in a blog post on Monday that the flaw affects all phones and tablets that are running Android 4.4 KitKat and later, which comes with the affected Linux kernel 3.6 or newer. According to recent statistics, the number of devices affected might run past 1.4 billion phones and tablets — including devices running the Android Nougat developer preview. Windows and Macs are not affected by the vulnerability. The flaw, disclosed at the Usenix security conference last week, is complicated and difficult to exploit. If an attacker can pull off an exploit, they could inject malicious code into unencrypted web traffic from “anywhere”. However, the source and destination IP address would need to be known in order to intercept the traffic, adding to the complexity of carrying out a successful attack.The exploitability isn’t easy, though. Read more of this story at Slashdot.

Read More:
Linux Traffic Hijack Flaw Also Affects Most Android Phones, Tablets

We’re One Step Closer To Proving Stephen Hawking Was Right That Black Holes Evaporate

In the 1970s, Stephen Hawking made an audacious prediction that black holes aren’t totally black; they evaporate over time, emitting tiny amounts of radiation in the process. Now Israeli physicists have reported the strongest evidence to date that Hawking was right in a new paper in Nature Physics . Read more…

More:
We’re One Step Closer To Proving Stephen Hawking Was Right That Black Holes Evaporate

Obsessed Audiophiles in Japan Are Installing Their Own Power Poles To Improve Sound

To an audiophile, there’s no such thing as ‘too expensive’ if it means an upgrade to their setup could improve their listening experience. And in Japan, some acoustic connoisseurs are now installing their own utility poles , with custom transformers, to ensure all of their audio gear is getting the purest power possible. Read more…

See more here:
Obsessed Audiophiles in Japan Are Installing Their Own Power Poles To Improve Sound

Personal Information of Nearly 200 Democrats Leaked in Latest Hack

We already knew that a recent hack that targeted Democratic officials was going to be more than just access to possibly incriminating emails, but we didn’t realize it would be this soon. Read more…

More:
Personal Information of Nearly 200 Democrats Leaked in Latest Hack

12 Things You Can Now Do With Windows 10 After the Anniversary Update

It’s Windows 10 update time! The so-called “Anniversary Update” marks a year since the OS officially made it out of Redmond and it’s the biggest update yet. We’ve already posted our initial impressions of the update, but with the hefty patch now rolling out for everybody, here are 12 new tricks to try on your Windows 10 machine. Read more…

See more here:
12 Things You Can Now Do With Windows 10 After the Anniversary Update

‘GoldenEye: Source’ Updated: A Classic, Free Multiplayer Game

An anonymous reader quotes The Verge: GoldenEye: Source received its first update in more than three years this week. It’s free to download and it features 25 recreated maps, 10 different multiplayer modes, and redesigned versions of the original game’s 28 weapons. It was created using Valve’s Source engine, the same set of tools used to create Counter Strike and Half-Life games. So it’s a massive step up in both visuals and performance for one of the more drastically dated gaming masterpieces of the last 20 years… GoldenEye 007, the beloved N64 first-person shooter, has been recreated in high-definition glory by a team of dedicated fans over the course of 10 years…the attention to detail and the amount of effort that went into GoldenEye: Source make it one of the most polished HD remakes of a N64 classic. With 8 million copies sold, Wikipedia calls it the third best-selling Nintendo 64 game of all-time (although this version doesn’t recreate its single-player campaigns). Anyone have fond memories of playing Goldeneye 007? Read more of this story at Slashdot.

See more here:
‘GoldenEye: Source’ Updated: A Classic, Free Multiplayer Game

Everything Revealed in the New Rogue One Trailer

We finally got another trailer for Rogue One: A Star Wars Story last night, and it was packed full of new stuff—including, of course, Darth Vader. We’ve gone through it with a magnifying glass and all of our nerdery to see what secrets and details are hiding inside it. Read more…

More:
Everything Revealed in the New Rogue One Trailer

Almost Every Volkswagen Built Since 1995 Is Vulnerable To Wireless Unlocking Hacks

Even more bad news for Volkswagen: security researchers have discovered a huge security hole that affects potentially up to 100 million cars. It’s possible, using hardware as cheap as a $40 setup with an Arduino and an add-on radio transceiver board, to intercept signals from a Volkswagen Group key fob, and then by combining it with a small number of cryptographic keys shared by every VW car, one could essentially clone the car’s key fob. Read more…

Read More:
Almost Every Volkswagen Built Since 1995 Is Vulnerable To Wireless Unlocking Hacks