NHL Lockout Gary Bettman Prosposes 2Week Break In Talks

NHL commissioner Gary Bettman suggested to NHLPA executive director Donald Fehr  that the two sides take a two-week moratorium from negotiations.Fehr informed Bettman he’d like to speak with his membership first, a source said. The union likely will give Bettman a response Friday, although it is believed it would prefer meeting rather than not, according to TSN and ESPN.Bettman’s suggestion follows a disheartening week of limited communication between the sides. The league and the union last met face to face on Sunday in a meeting that lasted less than an hour and yielded no progress.After the short session, in which neither side seemed willing to concede on its respective position on player-contracting issues, Fehr said he couldn’t see a “path to an agreement.”That prompted Bettman to float the possibility of the sides taking some time off to regroup before resuming negotiations, one source said.The sides did not have any communication Thursday.“I find it incredible that the Union is suggesting that we are somehow ‘close’ to a deal,” NHL deputy commissioner Bill Daly said in an email to ESPN. “They have utterly refused to negotiate for months. They have made essentially one proposal — five times. They continue to request a ‘guaranteed’ Players Share as part of the next agreement and we repeatedly tell them maybe they should get a reality check. And in the mean time, maybe they can make their position clear to us on 50-50, on the make-whole and on Player Contracting issues.”NHLPA’s special counsel Steve Fehr countered Daly’s statement.“Of course everyone on the players’ side wants to reach an agreement,” he said. “The players have offered the owners concessions worth about a billion dollars. What exactly have the owners offered the players? We believe that it is more likely that we will make progress if we meet than if we don’t.“So we are ready to meet. If indeed they do not want to meet, it will be at least the third time in the last three months that they have shut down the dialogue, saying they will not meet unless the players meet their preconditions. What does that tell you about their interest in resolving this?” read more

Read More »

Seahawks DE Michael Bennett 4 Others Say They Wont

Michael Bennett in a selfie with his family. Image via Instagram.Israel suffered a major public relations blow after five of 11 NFL players scheduled to visit the nation as goodwill ambassadors decided to pass on the trip.Seattle Seahawks defensive end Michael Bennett laid out his issues with the trip in an Instagram post on Feb. 10. The two-time Pro Bowl selection and Super Bowl champion said he refused to be used as a political pawn by the Israeli government. He also expressed support for Palestine.“I was not aware that my itinerary was being constructed by the Israeli government for the purposes of making me, in the words of a government official, an ‘influencer and opinion-former’ who would then be ‘an ambassador of goodwill,’” he wrote.“I will not be used in such a manner,” Bennett added. “When I do go to Israel — and I do plan to go — it will be to see not only Israel but also the West Bank and Gaza, so I can see how the Palestinians, who have called this land home for thousands of years, live their lives. I want to be a voice for the voiceless and I cannot do that by going on this kind of trip to Israel.”Seahawks defensive end Cliff Avril, Dolphins wide receiver Kenny Stills, 49ers running back Carlos Hyde and Broncos running back Justin Forsett followed suit and decided to skip the trip.Leading up to the seven-day, all-expenses paid goodwill tour, the Israeli Tourism Minister Yariv Levin and other Israeli officials told media they hoped the players’ presence in the sole Jewish state would curb “negative and false characterizations of Israel.” read more

Read More »

Sony hints at holodeck future with captivating videos

first_img This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. The videos were made to advertise the immersive effect buyers will find if they will only rent movies for download from the Playstation store; though they will likely not find that out from the videos themselves, as those, sadly, demonstrate what’s possible for the future, not what’s available now. Researcher uses card trick to reveal unconscious knowledge But the videos aren’t about the guy on the couch, they’re about showing off what can be done with simple existing technology and some old fashioned film-making trickery. To make them, the team used the Playstation Move, a Steadicam an EyeToy camera and some guys dressed in white body suits, girls with fish poles and other extras to manipulate various other objects such as tentacles. At any rate, in the videos a guy sits on his couch and the room around him changes as 3D imagery is projected onto all the surfaces around him, including the guys in the white suits. In one scene, the guy is morphed into a rocket and flies over a cityscape. It’s all very impressive stuff, perhaps even more so when taking into account that no fancy post-editing was allowed to insert computer generated imagery, or to remove stuff, such as the strings that held dangling objects. Also impressive is the fact that it was all done using a Steadicam, which had not been done before. The fact that the camera recording the videos is able to move about adds to the three-dimensional effect; something movie-makers and those that make commercials for television are likely to want as soon as possible.After all is said and done though, the coolest part of the whole project for those not a part of it, is just watching the videos they’ve produced, free of charge. Explore furthercenter_img Citation: Sony hints at holodeck future with captivating videos (2011, December 5) retrieved 18 August 2019 from https://phys.org/news/2011-12-sony-hints-holodeck-future-captivating.html (PhysOrg.com) — You have to hand it to the imaginative people at Sony, or at least those they partnered with at Studio Output and the Marshmallow Laser Factory; together the three have produced three videos that are likely to evoke feelings of nostalgia, even as they stir yearnings for more. The three videos, commercials, essentially for Sony’s Playstation Video store, show what the future may soon hold even as they remind us of what our collective imagination can inspire, the awe-inspiring holodeck of Star Trek fame. In the videos, which all involved claim were made with just one take and no postproduction work, a person is seen sitting on a couch experiencing what many a science fiction fan would give up many a day’s pay to experience for themselves; a true holodeck. © 2011 PhysOrg.comlast_img read more

Read More »

VM researchers post rude awakening about virtualization security

first_img(Phys.org)—A virtual machine stealing information from another virtual machine running on the same piece of hardware? That’s not supposed to happen. Virtual machines run various tasks on a single computer rather than relying on a separate machine to run each one. The assumption is that one can’t eavesdrop or tamper with the other. But now a technique reported in a paper, “Cross-VM Side Channels and Their Use to Extract Private Keys,” by Yinqian Zhang of the University of North Carolina, Chapel Hill, and computer scientist colleagues from the University of North Carolina, University of Wisconsin, and RSA Laboratories, suggests a different story. © 2012 Phys.org This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Citation: VM researchers post rude awakening about virtualization security (2012, November 9) retrieved 18 August 2019 from https://phys.org/news/2012-11-vm-rude-awakening-virtualization.html Explore further Researchers discover new way to patch holes in the ‘cloud’ More information: Research paper: www.cs.unc.edu/~reiter/papers/2012/CCS.pdf Diagram of the main steps in the side-channel attack. Credit: Yinqian Zhang et al. The researchers said they have completed the first demonstration of a successful side-channel attack on a virtualized, symmetric multiprocessing system, using a virtual machine manager (VMM). They said it is possible for one VM to steal the cryptographic keys that are in place to keep data secure from another running on the same physical hardware. This does not paint a happy blue-skies picture for computing facilities that leverage virtualization.In hours, they recovered the private key for a 4096-bit ElGamal-generated public key using the libgcrypt v.1.5.0 cryptographic library. They extracted the ElGamal decryption key stored on a VM running the GNU Privacy Guard. How it works: Both VMs share the same hardware cache, which stores data for use by the computer processor. The attacking VM fills the cache in a way that the target VM, which is processing a cryptographic key, may overwrite some of the attacker’s data. By looking at which parts of the cache are changed, the attacking VM learns about the key in use.”VM side channels” are likely to become familiar words to those who track security in cloud environments. The authors’ technique boiled down to “side-channel analysis,” in which a private key is cracked by studying the targeted cryptographic system’s behaviors. “In this paper,” said the authors, “we present the development and application of a cross-VM side-channel attack,” which they further described as an access-driven attack in which the attacker VM alternates execution with the victim VM and leverages processor caches to observe the behavior of the victim. The attack worked only when both attacker and target VMs were running on the same physical hardware or, in virtual computing language, as “co-residents” on a single machine. Co-author Ari Juels of RSA Laboratories said that one of the lessons to be learned is that virtualized machines running highly sensitive workloads should not be placed on the same hosts as potentially untrustworthy virtual machines.Ways to avoid such exploit headaches in the real world consist of countermeasures that administrators may take to avoid the leakage. One is to use a separate, “air-gapped” computer for high-security tasks.”In high-security environments, a longstanding practice is to simply not use the same computer to execute tasks that must be isolated from each other, i.e., to maintain an ‘air gap’ between the tasks. This remains the most high-assurance defense against side-channel (and many other) attacks,” the authors wrote.Other countermeasures may call upon side-channel resistant algorithms; the authors also mentioned “core scheduling.” The paper said, “Another defense might seek to modify scheduling to at least limit the granularity of interrupt-based side-channels.”last_img read more

Read More »