韓國電子廠LG,在2015年10月推出中高階Android智慧型手機V10,當時該手機因為正面螢幕自拍鏡頭的上方,多了一條解析度1040 x 160的2.1吋資訊副螢幕的創新設計,因此LG V10在市場引起不少討論話題。不過該機正式上市後,不論國內外皆出現有用戶反映手機易過熱死機,最終送修更換主機板的情況。台灣有上百名V10手機用戶,也因相同問題,向台灣LG要求過保的維修優惠,不過台灣LG 發3點正式聲明,回絕台灣V10手機過保用戶的要求。
College basketball’s second-biggest postseason tournament has a bracket (matchups in full below), as the National Invitational Tournament revealed its teams and schedule for 2017. The NIT, which tips off March 14 and ends March 30, mostly picks its 32 from among the teams that didn’t makethe NCAA’s 68-team bracket.
Some teams won their regular season titles based on record, but lost in conference tournaments, which earned them automatic NIT bids. Those teams include Akron, Monmouth, Belmont, Oakland, South Dakota, and UNC Greensboro.
The format is a little different from the NCAA’s, in terms of locations. In the first three rounds, the home arenas of the teams with the higher seeds host. Once the NIT reaches the semifinals, the tournament moves to its traditional home, Madison Square Garden in New York City.
According toKenPom.com, Clemson and TCU have been the group’s best teams on the year.
2016’s winner was George Washington; St. John’s holds the all-time NIT titles record, with five (despite the Red Storm vacating their 2003 win); and, St. John’s is also first all-time in NIT appearances.
Many decades ago, the NIT was the bigger tourney, and even decided some ancient national titles, thanks partly to its association with NYC’s media exposure. By the 1970s, the NCAA had made its own tournament more and more prestigious and added a rule that required any NCAA-invited teams to either enter March Madness or skip the postseason.
Today, the NIT is the king of the consolation brackets (further down the list, there are also the CBI, CIT, and sometimes others), and its winner is popularly known as the 69th-best team in the country. Nice!
The NIT also serves as a rule experimentation zone:
NCAA tournament bracket tip sheet: Your guide to March Madness
Scott Gleeson, USA TODAY SportsPublished 12:31 a.m. ET March 13, 2017 |Updated 1 hour ago
CLOSE
Now that the field has been set, USA TODAY Sports' Nicole Auerbach examines the NCAA Tournament bracket and which teams have the best shot at making it to the Final Four.USA TODAY Sports
Here's region-by-region breakdowns that dissect each team’s strengths/weaknesses, current winning/losing streak and each team’s best player or recipe for a win.
► March Sadness: The sad side of the bubble was dealt to several teams, namely last year's Final Four finisher Syracuse and mid-major darling Illinois State. Gleeson reports on thesix biggest snubbed teams. Meanwhile, the NIT did its best totroll Jim Boeheim.
► History: Northwestern punched its first-ever NCAA tournament ticket in program history. National columnist Nancy Armourwas in Evanston to cover the emotional momentsfor the Wildcats, who drew a No. 8 seed, at a Selection Sunday party.
CLOSE
Northwestern and their host of famous alumni are pretty amped about making the NCAA Tourney for the first time.Time_Sports
【早安健康/H2U CLUB 營養師Hane】說到「酸、甜、苦、辣、鹹」,你會想到什麼顏色呢?而這些顏色是否會影響到食慾?有日本學者曾做過相關試驗,有趣的是,大多數的人對於口味的認定好像都有對應的顏色,也許是根據經驗,又或者是某個顏色給人的感覺,剛好與某口味給人的感覺不謀而合,到底調查結果是否與你想像中的一樣呢?讓我們繼續看下去﹒﹒﹒
澳洲相親節目讓男女雙方坦誠相對,尺度很大。(翻攝自每日郵報)〔娛樂頻道/綜合報導〕以前的交友節目通常都是男女互問問題,從了解彼此開始,但現在這個「速食時代」這種方法耗神耗力;據《每日郵報》報導,澳洲知名相親節目《The Kyle and Jackie O Show》有鑑於此,推出見面3秒全裸,直接讓兩人袒裎相見。
根據《太陽報》報導,美國芝加哥大學這份研究找來362名割包皮的男子,並選在他們手術6個月及2年之後進行測驗,結果顯示割完包皮後,有98%滿意手術結果,95%表示女性伴侶很滿意,94%的人在做愛時獲得極大的喜悅或更加滿意(very satisfied or somewhat satisfied),67%的人認為術後更加享受性愛。研究人員經調查證實,割包皮不僅提升了男性的性能力,還大大減少了做愛受傷的機率。
BOSTON, MA - AUGUST 27: Chien-Ming Wang #67 of the Kansas City Royals throws a pitch in the sixth inning against the Boston Red Sox at Fenway Park on August 27, 2016 in Boston, Massachusetts. (Photo by Darren McCollester/Getty Images)
"These people are the war victims, but they die unnoticed." Inside #SouthSudan's growing medical crisis: https://t.co/2LiqtNmf3T pic.twitter.com/0C78rxFEp3
— ICRC (@ICRC) 2017年3月7日
聯合國官員表示,聯合國人權委員會(U.N. Commission on Human Rights)對南蘇丹進行為期7個月的調查,最新報告指出,內戰多年的南蘇丹有種族清洗的現象,甚至可能導致種族滅絕。
WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies
Photo
A pedestrian walked by the Apple Store on Fifth Avenue in February 2016 in Manhattan, while a group of demonstrators protested F.B.I. efforts to force Apple to help access the iPhone of an attacker in the 2015 shooting in San Bernardino, Calif.CreditJulie Jacobson/Associated Press
SAN FRANCISCO — Four years ago, Edward J. Snowden’s disclosures that the federal government was hacking America’s leading technology companies threw the industry into turmoil.
Major technology companies, including Apple, Google and Microsoft, were trying to assess how badly their core products had been compromised. But one thing clearly had been ruptured yet again: trust between intelligence agencies and Silicon Valley.
“After the Snowden disclosures, the Obama administration worked hard to re-establish relationships and government-industry partnerships,” said David Gutelius, chief executive of the marketing technology company Motiva, who has worked with the federal government on national security projects. “This leak will challenge those ties to some extent. But I don’t see companies simply walking away from the table as a result of this. Government and industry still need one another.”
The tense relationship between the technology industry and government agencies has been well documented. After the disclosures by Mr. Snowden, a former contractor for the National Security Agency, the government appeared to give some ground to the industry, which was angered by previously unknown snooping on their products and embarrassed by disclosures of their cooperation with intelligence agencies.
The government allowed companies to describe in broad terms the number of secret court orders for access to customer information that they receive. President Barack Obama also promised that the government would share knowledge of security flaws so that they could be fixed.
But last year, relations soured again after Apple resisted a Justice Department request for help accessing the iPhone of one of the attackers in the 2015 shooting in San Bernardino, Calif. As the company’s chief executive, Timothy D. Cook, explained ina letter to customersat the time, “The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers.”
In that case, the government eventually found a way into the phone without Apple’s assistance.
The documents posted by WikiLeaks suggest that the C.I.A. had obtained information on14 security flawsin Apple’s iOS operating system for phones and tablets.
Apple said Tuesday night that many of those security issues had already been patched in the latest version of its software and it was working to address remaining vulnerabilities.
The leaked documents also identified at least two dozen flaws in Android, the most popular operating system for smartphones, which was developed by Alphabet’s Google division.
Google said it was studying the flaws identified by WikiLeaks. Android is more difficult to secure than Apple’s software because many phone makers and carriers use older or customized versions of the software.
The documents released by WikiLeaks reveal numerous efforts by the C.I.A. to take control of Microsoft Windows, the dominant operating system for personal computers, using malware. They include techniques for infecting DVDs and USB storage devices with malware that can be spread to computers when they are plugged in.
Photo
In February 2016, about a dozen protesters demonstrated outside F.B.I. headquarters in Washington against an attempt by the government to force Apple to create a so-called backdoor to the iPhone.CreditChip Somodevilla/Getty Images
“We’re aware of the report and are looking into it,” Microsoft said in a statement.
Security experts said it was not surprising that the government had stockpiled flaws in major technology products to use for spying. “The real scandal and damaging thing is not knowing these things exist, but that the C.I.A. could be so careless with them that they leaked out,” said Matthew D. Green, an assistant professor in the department of computer science at Johns Hopkins University.
Inside technology companies, the revelations set off a scramble to assess the potential damage to the security of their products.
Bits
Get the latest technology news and buzz from around the web.
The vulnerabilities, some of which were already known in the security community, could leave individual users of computers, mobile phones and other devices open to being snooped on. Technology companies are likely to plug the holes, however, even as new ones are discovered by spy agencies and others.
The more serious near-term effect could be on the reputation of the C.I.A. and the relationship between the technology industry and the intelligence community.
Denelle Dixon, chief legal and business officer at Mozilla, which makes the Firefox web browser and was mentioned in the WikiLeaks trove, said that if the reports were accurate, the C.I.A. and WikiLeaks were undermining the security of the internet.
“The C.I.A. seems to be stockpiling vulnerabilities, and WikiLeaks seems to be using that trove for shock value rather than coordinating disclosure to the affected companies to give them a chance to fix it and protect users,” Ms. Dixon said in a statement. “Although today’s disclosures are jarring, we hope this raises awareness of the severity of these issues and the urgency of collaborating on reforms.”
Oren Falkowitz, a former N.S.A. official and the chief executive of the cyberdefense firm Area 1 Security, said that WikiLeaks, run by Julian Assange, had again succeeded in disrupting the status quo, as it did during last year’s presidential election with the release of emails from the Democratic National Committee. “If you understand the Assange playbook,” Mr. Falkowitz said, “a lot of it is just to create chaos.”
But Mr. Falkowitz added that perhaps the most important message behind Tuesday’s leaks was that neither government agencies nor companies can trust their employees to keep their most precious information secret.
“We expect governments to be involved in espionage,” he said. “What we don’t expect is that the people within these organizations would create vulnerabilities by disclosing them.”
In a statement accompanying the documents, WikiLeaks said that the security flaws could easily fall into the wrong hands.
“Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike,” the organization said. It said it was still reviewing whether to release any of the underlying software code.
The security flaws described by WikiLeaks are intended to target individual phones. They do not appear to give the intelligence agencies the ability to intercept electronic communications en masse.
“What can you do as a user to defend?” he asked. “Boring stuff. Keep your software up to date. Don’t run unneeded apps. Don’t become a C.I.A. target.”
Attention, flapjack lovers. It's National Pancake Day.
Source: IHOP | Facebook
The food day, started byIHOPin 2006, offers diners a free short stack of buttermilk pancakes on March 7, between 7 a.m. and 7 p.m.
IHOP's National Pancake Day is more about fundraising than it is about pancakes, however. The all-day breakfast chain hopes to serve up 5 million pancakes and raise more than $3.5 million in charitable donations.
The International House of Pancakes uses National Pancake Day to support Children's Miracle Network Hospitals, Shriners Hospital for Children and the Leukemia & Lymphoma Society.
"Every pancake served on IHOP National Pancake Day has a purpose, and every penny raised goes a long way in making a meaningful, and lasting, impact on so many kids and families in our communities," Darren Rebelez, president of IHOP Restaurants, said in a statement.
Since its inception, National Pancake day has helped the organization raise around $24 million for charities.
There are more than 1,700 IHOP locations in the world, and locations in the U.S., Mexico, the Phillippines and Canada participate in the fundraiser. Nearly all U.S. stores participate in the promotion.