The Blender Foundation has released Blender 2.71, an update to its cross-platform, open-source 3D graphics tool. Version 2.71, also available in 64-bit and portable form on Windows, includes new features and continues to build on the recently revamped user interface.
Areas that enjoy significant changes include the Cycles renderer, Animation, Modelling, Sculpting-Painting, Game Engine and Freestyle NPR Rendering tool.
Cycles gains support for rendering volume textures, fire and smoke, deformation motion blur, baking textures from cycles materials, additional texture interpolation modes and a new dedicated UV layer node.
The Animation tools adds new interpolation types containing “easing equation” presets, while auto-snapping becomes independent from the display type and locking time to other windows is once again possible. It also adds lasso selection support and the ability to set preview range based on selected strips.
Avast Software has released the fourth update to its Avast 2014 range of products with the unveiling of build number 9.0.2021 for Avast Free Antivirus 2014, Avast Internet Security 2014 and Avast Premier Security 2014.
As with the previous few updates, R4 contains no new features, but does include several important security enhancements among other tweaks and optimizations that once again make it essential for existing users.
Avast promises tighter security through improved process security, which is guarded by Avast’s self-defense component. Avast R4 also handles conditions for the Guest account better, increasing sensitivity to any incorrect user inputs that might compromise system security and tuning the import settings tool to prevent it from allowing users to bypass any protections.
In business perception is everything. Many companies succeed or fail not because their products are great but their brands are perceived to be that way. Apple is a remarkable perception manager. Consider iPhone 5s, which features and benefits fall far behind many competing devices. Rather than innovate, the fruit-logo launches an evocative marketing campaign -- "You're more powerful than you think" -- that makes the smartphone look better. Improved. The ads are compelling because they communicate: Your life will be better, you shall achieve your dreams, by buying iPhone 5s.
Meanwhile, competitors like Microsoft truly innovate and take the kind of risks that once defined Apple. Last year I asked: "Will 2013 be another year of Apple iteration masquerading as innovation?" Yes, and halfway into another year, little is changed. The answer is the same. Last month I explained "Why Apple no longer innovates". OS X Yosemite and iOS X 8 are prettier, but so what? Meanwhile, Windows 8/8.1 is a radical rethinking of the platform -- as is Surface, which delivers refreshing change to computing. What's that long-forgotten Yellow Pages tagline? Let your fingers do the walking. They do on Surface.
Bromium has just published the results of “Endpoint Protection: Attitudes and Opinions,” a survey of more than 300 information security professionals, focused on end user threats and security. The majority of the respondents believe:
Secunia Research classifies vulnerabilities by rating the severity of vulnerabilities from 1: "not critical" to 5: "extremely critical."
Going by the PR Heartbleed received, you would be excused for thinking that what we were dealing with here was, indeed, "extremely critical."
But it was not, as vulnerabilities go. That rating we use for "remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild."
The Heartbleed vulnerability was in fact only rated as a 3 of 5 by Secunia: "moderately critical", which is typically used for "remotely exploitable Denial of Service vulnerabilities against services like FTP, HTTP, and SMTP, and for vulnerabilities that allow system compromises but require user interaction."
It gets this rating because it enables information retrieval from remote without any user interaction or authentication requirements.