IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Saturday, 23 September

23:55

NVIDIA Making Progress On Server-Side GLVND: Different Drivers For Different X Screens "IndyWatch Feed Tech"

While NVIDIA isn't doing much to help out Nouveau, at least the company is contributing to the open-source Linux graphics ecosystem in other ways. In addition to presenting at XDC2017 this week on the Unix device memory allocator API and DeepColor / HDR support, they also presented on server-side GLVND...

22:53

Antibody Combination Attacks 99% of HIV Strains "IndyWatch Feed Tech"

Scientists have engineered a "tri-specific antibody" that they say can attack 99% of HIV strains:

Scientists have engineered an antibody that attacks 99% of HIV strains and can prevent infection in primates. It is built to attack three critical parts of the virus - making it harder for HIV to resist its effects.

The work is a collaboration between the US National Institutes of Health and the pharmaceutical company Sanofi. The International Aids Society said it was an "exciting breakthrough". Human trials will start in 2018 to see if it can prevent or treat infection.

Trispecific broadly neutralizing HIV antibodies mediate potent SHIV protection in macaques (DOI: 10.1126/science.aan8630) (DX)

The development of an effective AIDS vaccine has been challenging due to viral genetic diversity and the difficulty in generating broadly neutralizing antibodies (bnAbs). Here, we engineered trispecific antibodies (Abs) that allow a single molecule to interact with three independent HIV-1 envelope determinants: 1) the CD4 binding site, 2) the membrane proximal external region (MPER) and 3) the V1V2 glycan site. Trispecific Abs exhibited higher potency and breadth than any previously described single bnAb, showed pharmacokinetics similar to human bnAbs, and conferred complete immunity against a mixture of SHIVs in non-human primates (NHP) in contrast to single bnAbs. Trispecific Abs thus constitute a platform to engage multiple therapeutic targets through a single protein, and could be applicable for diverse diseases, including infections, cancer and autoimmunity.


Original Submission

Read more of this story at SoylentNews.

22:42

Why Are These People Eating Worms to Be Healthy? (part I) "IndyWatch Feed Tech"

Summary: The Hygiene Hypothesis persuades people to consume parasitic worms as a way to treat chronic autoimmune disorders. As well, people eat tapeworms as a way to lose weight. Learn more about two closely related scientific beliefs called the Hygiene Hypothesis and the Old Freinds Hypothesis. Part 1 of a 2-part series. Cover photo: 3drenderings / Getty Images.

Its difficult to believe, but thousands of people eat worms as a way to lose weight or cure diseases.

People dont just eat worms on TV shows, like the Fear Factor. Some extreme dieters consume tapeworms as a way to lose weight. Another group of people ingests parasitic worms known as helminths to ward-off the debilitating symptoms of autoimmune diseases.

22:08

Over Half a Million Vehicle Records from SVR Tracking Leaked Online "IndyWatch Feed Tech"

By Waqas

Over Half a Million Vehicle Records from SVR Tracking Leaked

This is a post from HackRead.com Read the original post: Over Half a Million Vehicle Records from SVR Tracking Leaked Online

22:02

Why Are These People Eating Worms to Be Healthy? (part II) "IndyWatch Feed Tech"

Summary: Helminthic therapy is the intentional consumption of parasites as a treatment for autoimmune disease. Out of the 7000 people who practice helminthic therapy each year, this report tells the story of a young woman who purchases black market worms and then treats herself at a high cost. Part 2 of a 2-part series. Cover photo: Eraxion / Getty Images.

Would you eat worms to boost your overall health or cure what ails you?

Over 7,000 people intentionally self-infect with parasites, and the practice is growing in popularity.

22:00

Hackaday Prize Entry: Infrared Vein Illumination "IndyWatch Feed Tech"

Phlebotomy is a fun word, and the fine art of finding veins. While the skill of putting needles in arms is honed by nurses and physicians over the course of decades, there are, of course, technological solutions to finding veins. One of the more impressive medical devices that does this uses near-infrared imaging basically looking under the skin with almost visible light. These devices cost a fortune.

One project in the Hackaday Prize is looking to change that. Its a near-infrared vein finder. Instead of the thousands of dollars professional unit costs, this one can be built for under one hundred bucks.

As far as this build goes, veins are illuminated via IR light at about 950nm. The backscatter of this light is captured via a Raspberry Pi NoIR camera, with regular old photography film blocking visible light. From there, its just a simple matter of image processing and hitting enhance several times until veins appear on a display.

The HackadayPrize2017 is Sponsored by:
Digi-Key
Supplyframe
Microchip
Texas Instruments

Filed under: The Hackaday Prize ...

21:27

Rhonda Stevenson, President of Tau Zero Foundation, joins our Space Settlement Board. "IndyWatch Feed Tech"

Rhonda Stevenson, President of Tau Zero Foundation, joins our Space Settlement Board.

21:24

Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Marcus Meissner on Sep 23

https://www.suse.com/security/cve/CVE-2017-9798/

We have released openSUSE Leap and SUSE Linux Enterprise 12 SP2/SP3 updates.

Where did you look and not find this?

SUSE has rated the issue as moderate severity (bordering on important),
as exploitability seems difficult and not targetable.

So we were not targeting a "same as CRD day release" as with other more
severe issues, but have now released updates in the next days after the...

21:15

SDL 2.0.6 Released With Vulkan Helpers, DRM/KMS Driver "IndyWatch Feed Tech"

SDL 2.0.6 was released on Friday as the latest feature update for this widely-used library that allows for more cross-platform portability of applications and games centered around input, audio, and video helpers...

21:10

Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Till Drges on Sep 23

Am 23.09.2017 um 13:44 schrieb Hanno Bck:

JFTR, there are:

https://bugzilla.opensuse.org/show_bug.cgi?id=CVE-2017-9798

Regards -- Till

21:02

A Vaccine Is Being Developed For Preventing Tooth Decay And It Sounds Amazing "IndyWatch Feed Tech"

Regular visits to the dentist are an important part of keeping your teeth healthy. But what if you could give your oral health a boost by receiving a vaccine on top of your regular dental care routine?

Researchers from the Wuhan Institute of Virology (WIOV) of the Chinese Academy of Sciences are working on such a vaccine, and their study has just been published in Scientific Reports.

Led by WIOV scientist Yan Huimin, the researchers tested a fusion of proteins to prevent the development of dental caries. Better known as dental cavities, caries is caused by the bacteria Streptococcus mutans (S. mutans).

20:31

3D Printing At Maker Faire "IndyWatch Feed Tech"

The current trend of cheap, desktop, consumer 3D printers arguably began at the World Maker Faire in New York several years ago. What began with just a single printer exploded into a mindless proliferation of extrusion boxes, and by 2012, every single booth had to have a 3D printer on display no matter how applicable a CNC machine was to what they were actually selling.

Now were in the doldrums of the hype cycle and 3D printers just arent cool anymore. This year at the World Maker Faire, 3D printers were relegated to a tiny corner of the faire, right next to the portajohns. Its the smallest showing of 3D printing Ive ever seen at the New York Maker Faire.

Of course, this doesnt mean the state of 3D printing isnt constantly improving. 3D printers have never been cheaper, more capable, or more popular. This is how technology works, really: it doesnt get good until it gets boring. Still, there were some impressive displays of the current state of 3D printing at the World Maker Faire this weekend. You can check that out below.

Prusas I3 Mk. 3

One of the perennial favorite 3D printers is the Prusa I3, In the last year, Prusa has been knocking everything out of the park with actual innovation like a slicer for beginners, a dead-simple implementation of variable layer thickness printing, and of course multi-material extrusion.

Now the I3 is getting an upgrade, announced today at the World Maker Faire. The I3 MK 3 is an incremental upgrade, but still has some awesome, very desirable features. The stepper drivers have been upgraded to Trinamic drivers, and the fan is now a PC Master Race-approved Noctua unit. The print bed has been upgraded to a removable, magnetic piece of spring steel coated with PEI, and theres now a touch sensor to turn the printer on. Also on the upgrade list is a Bondtech drive gear, an optical filament encoder, and the ability to recover prints after a power failure and to recover shifted layers.

There are a few pics of the prints coming off the multi-extrusion Prusa below. These are really some of the finest prints Ive ever seen coming off a 3D printer. Of course, most of this is due to the incredible operator skill demonstrated by the Prusa team, but these results show the Prusa is capable of just about anything.

...

Neanderthal Brains Developed More Slowly than Humans "IndyWatch Feed Tech"

A new study of a Neanderthal child's skeleton has suggested that Neanderthal brains developed more slowly than previous studies had indicated:

A new study shows that Neanderthal brains developed more slowly than ours. An analysis of a Neanderthal child's skeleton suggests that its brain was still developing at a time when the brains of modern human children are fully formed. This is further evidence that this now extinct human was not more brutish and primitive than our species. The research has been published in the journal Science.

Until now it had been thought that we were the only species whose brains develop slowly. Unlike other apes and more primitive humans modern humans have an extended period of childhood lasting several years. This is because it takes time and energy to develop our large brain. Previous studies of Neanderthal remains indicated that they developed more quickly than modern humans - suggesting that their brains might be less sophisticated.

But a team led by Prof Antonio Rosas of the Museum of Natural Sciences in Madrid found that if anything, Neanderthal brains may develop more slowly than ours. "It was a surprise," he told BBC News. "When we started the study we were expecting something similar to the previous studies," he told BBC News.

Also at Science Magazine, NYT, and Discover Magazine.

The growth pattern of Neandertals, reconstructed from a juvenile skeleton from El Sidrn (Spain) (open, DOI: 10.1126/science.aan6463) (DX)


Original Submission

Read more of this story at SoylentNews.

19:37

2 awesome open source apps to share your terminal over the web "IndyWatch Feed Tech"

Want to share your terminal over the web for demo, learning or collaboration purpose? Try these two applications to share your terminal as a web application.

19:00

The Tiny, $25 PocketBone "IndyWatch Feed Tech"

It was announced a day or two ago, but now the PocketBone has made its first real-world appearance at the World Maker Faire in New York this weekend. This is a tiny, tiny Linux computer thats small enough to fit on a keychain, or in an Altoids mini tin. Its only $25 USD, and from the stock lists on Mouser and Digikey, there are plenty to go around.

The specs for the PocketBeagle are more or less exactly what you would expect from any BeagleBone. Theres an ARM Cortex-A8 running at 1GHz, 512 MB of RAM, and SD card storage. I/O is eight analog inputs, up to 44 digital GPIOs, up to 3 UARTs, 2 I2C busses, 2 SPI busses, and 4 PWM outputs. All of this is packed into the OSD3358 System on a Chip from Octavo Systems.

This isnt the first time weve seen Octavo Systems BeagleBone on a Chip Before the release, head Beagle herder [Jason Kridner] built a PocketBone in Eagle, which was shortly followed by [Michael Welling]s similar efforts in KiCad. The PocketBone has been a reality for months, but now its accessible to hackers who dont want to deal with soldering BGA packages.

Of course, a new development board isnt worth anything without a few demos and examples. For Maker Faire, [Jason] brought out two demos. The first of these is effectively a PacMan arcade game just a simple 3D printed enclosure, a screen, and two d-pads made out tact switches. It plays PacMan and only PacMan, but its good enough to demonstrate the Linux-ness of the PocketBone.

...

18:22

Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Kurt H Maier on Sep 23

This is standard operating procedure for Red Hat, at least. Generally
days or even weeks pass before patches are released. If you're an
"Extended Update Support" customer you can expect months to go by. If
you're super lucky you'll get a systemtap script to play with, but that
generally requires a kernel RCE.

khm

18:10

Adobe Accidentally Publishes One of its Private PGP Keys "IndyWatch Feed Tech"

Adobe is showing that it can be transparent about its security practices:

Having some transparency about security problems with software is great, but Adobe's Product Security Incident Response Team (PSIRT) took that transparency a little too far today when a member of the team posted the PGP keys for PSIRT's e-mail accountboth the public and the private keys. The keys have since been taken down, and a new public key has been posted in its stead.

The faux pas was spotted at 1:49pm ET by security researcher Juho Nurminen:

Oh shit Adobe pic.twitter.com/7rDL3LWVVz
Juho Nurminen (@jupenur) September 22, 2017

Nurminen was able to confirm that the key was associated with the psirt@adobe.com e-mail account.

Also at The Register and Wccftech.

[How many here have done something like this? Perhaps an extra file accidentally uploaded to GitHub? --Ed.]


Original Submission

Read more of this story at SoylentNews.

18:08

Azam Shaghaghi, Strategy Analyst at BMO Financial Group, joins our New Money Systems Board. "IndyWatch Feed Tech"

Azam Shaghaghi, Strategy Analyst at BMO Financial Group, joins our New Money Systems Board.

18:03

How to install xfs and create xfs file system on Debian/Ubuntu Linux "IndyWatch Feed Tech"

I recently switched to a Ubuntu/Debian Linux server from a CentOS/RHEL 7.x. How do I install mkfs.xfs command on a Debian/Ubuntu Linux server? How do I create and manage file XFS file system on a Ubuntu or Debian Linux LTS server?

17:50

Retefe banking Trojan leverages EternalBlue exploit to infect Swiss users "IndyWatch Feed Tech"

Cyber criminals behind the Retefe banking Trojan have improved it by adding a new component that uses the NSA exploit EternalBlue.

ETERNALBLUE is the alleged NSA exploit that made the headlines with DOUBLEPULSAR in the WannaCry attack and NotPetya massive attacks.

ETERNALBLUE targets the SMBv1 protocol and it has become widely adopted in the community of malware developers.

Investigations on WannaCry, for example, revealed that at least other 3 different groups have been leveraging the NSA EternalBlue exploit. In August, a new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread, earlier this year, researchers at Flashpoint observed the TrickBot banking Trojan also included an EternalBlue module as well.

Cyber criminals behind the Retefe banking Trojan have improved it by adding a new component that uses the NSA exploit EternalBlue.

The Retefe banking Trojan has historically targeted Austria, Sweden, Switzerland and Japan, and we have also observed it targeting banking sites in the United Kingdom. While it has never reached the scale or notoriety of better-known banking Trojans such as Dridex or Zeus, it is notable for its consistent regional focus, and interesting implementation. states the analysis published by ProofPoint.

Unlike Dridex or other banking Trojans that rely on webinjects to hijack online banking sessions, Retefe operates by routing traffic to and from the targeted banks through various proxy servers, often hosted on the TOR network, 

Researchers have observed a wave of phishing messages using weaponized Microsoft Office documents. containing embedded Package Shell Objects, or Object Linking and Embedding Objects, that are typically Windo...

17:48

Nouveau Developers Remain Blocked By NVIDIA From Advancing Open-Source Driver "IndyWatch Feed Tech"

Longtime Nouveau contributors Martin Peres and Karol Herbst presented at this week's XDC2017 X.Org conference at the Googleplex in Mountain View. It was a quick talk as they didn't have a whole lot to report on due to their open-source NVIDIA "Nouveau" driver efforts largely being restricted by NVIDIA Corp...

17:42

Security cameras can be hacked using infrared light, claims study "IndyWatch Feed Tech"

Researchers hack security camera networks with IR LEDs

Cybersecurity experts from Ben-Gurion University of the Negev (BGU) in Israel have demonstrated that security cameras infected with malware can be hacked invisibly and controlled using infrared (IR) light, which then can be used to either infiltrate a network or disclose sensitive information from the cameras network.

In a paper titled aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR), the researchers said that the technique can be used on professional and home security cameras, and even LED doorbells, which can detect infrared light (IR), not visible to the human eye. CCTV cameras are equipped with IR LEDs, used for night vision, and are perfect for the aIR-Jumper technique to exploit.

In this paper, we show how attackers can use surveillance cameras and infrared light to establish bi-directional covert communication between the internal networks of organizations and remote attackers. We present two scenarios: exfiltration (leaking data out of the network) and infiltration (sending data into the network), the researchers wrote.

The cyber team led by Dr. Mordechai Guri, head of research and development for BGUs Cyber Security Research Center (CSRC), demonstrated how IR can be used to create a secret communication channel between malware installed on an internal computer network and an attacker located at a distance of hundreds of metres to kilometres away with direct line of sight.

The researchers were able to leak internal data at a bit rate of 20bit/s per camera and were able to deliver commands to the network at bit rate of more than 100bit/s from one camera. The aIR-Jumper method can be used to transfer hidden signals to surveillance cameras, including PIN codes, passwords, and encryption keys, which are modulated, encoded, and then transferred to attackers.

Security cameras are unique in that they have one leg inside the organization, connected to the internal networks for security purposes, and the other leg outside the organization, aimed specifically at a nearby public space, providing very convenient optical access from various directions and angles, Mordechai Guri said in the release.

The researchers uploaded two videos on YouTube, wherein the first video shows an attacker sending infrared signals to the security camera, while the second one shows the camera (which is already infected with malware) exfiltrating data from the affected network.

In an infiltration scenario, an attacker standing in a public area (e.g., in the s...

17:15

Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Marc Deslauriers on Sep 23

Hi,

Having access to the embargoed information allowed us (Ubuntu) to evaluate the
impact of the issue, look at the fix, and start locally testing the fix to
determine if there were any issues. It also allows us to properly assign
resources to working on the update.

It would have probably taken us more than a day to publish this update if we
didn't have access to the information in advance.

For issues that aren't critical, we tend to...

17:12

Samsung Galaxy S9 Video Camera May Be 4x Faster Than iPhone X "IndyWatch Feed Tech"

Samsung Galaxy S9 video with 1,000 frame-per-second, may be four times faster than iPhone X

We have always seen that Apple and Samsung try to outdo each other with their new flagships. Recently, Apple launched its premium smartphone iPhone X on September 12 in Cupertino to celebrate the 10th anniversary of the first ever iPhone. While people are still talking about Apples iPhone X, Samsung has decided not to be left behind and make its presence felt too.

According to a report by Korean publication ETNews, Samsung has reportedly developed a high speed new image sensor that can capture photos at an incredible 1,000 frames per second (fps) with 4x slow motion video capability. On the other hand, Apples iPhone X is able to take 240 frames per second based on full HD resolution.

The 4x slo-mo capture by Samsung is similar to how Sony created for its incredible Xperia XZ1 and XZ Premium smartphones. However, the company may use slightly different technology for the sensor to avoid infringement of Sony patent, the site said. For instance, Samsungs design is a little different from Sonys (which also uses a three-layer chip) in that the memory is bonded to the rear surface of an existing two-layer sensor design rather than fitted in between the image sensor and logic components.

The new image sensor camera is planned for Samsungs upcoming Galaxy S9 line and the company will start the mass production of the three-layered image sensor as early as November 17th. This layered three-structure design of the sensor is made into a layered structure by connecting a system semiconductor (logic chip) that is in charge of calculations and DRAM chip that can temporarily store data through TSV (Through Silicon Via) technology. After the pilot operation, the company will start mass producing it in December.

Currently, we are unsure if all these rumors and speculations are accurate. With Samsung not expected to announce the Galaxy S9 atleast till the start of 2018, we are likely to come across many more leaks about the device in the near future. However, on the other hand, if Samsung manages to fit the slow-mo camera into the Galaxy S9, it is expected to beat the Galaxy S8, Galaxy Note 8, iPhone X and maybe the current top end Sony phones too.

The post Samsung Galaxy S9 Video Camera May Be 4x Faster Than iPhone X appeared first on TechWorm.

17:02

The Think Liberty Podcast Candidate Spotlight Zoltan Istvan "IndyWatch Feed Tech"

I did a 30 minute podcast at Think Liberty about my #transhumanism ideas and governor run:


Our very own Kevin Shaw sits down and speaks with 2018 California Libertarian Governor candidate Zoltan Istvan. Comments comments Related.

16:49

The Court of Appeals for the Federal Circuit (CAFC) Gradually Champions Patent Quality, in a Spectacular Reversal on Its Past Ways "IndyWatch Feed Tech"

Under Chief Judge Sharon Prost

Sharon ProstSummary: Some of the latest actions and decisions from the Federal Circuit, which originally brought software patents to the United States and is now taking them away, gradually

LAST night we wrote about the Federal Circuit (CAFC) refuting Gilstrap yet again. We later updated our post with a statement from CCIA and then found this good coverage from a good journalist (a lot of those who cover patent issues are unfortunately with and usually from the patent microcosm). He summarised it as follows:

Not long after TC Heartland, though, the East Texas judge who hears more patent cases than any other turned down a motion to transfer by supercomputer maker Cray Inc., which was sued for patent infringement by Raytheon in 2015. Lawyers for Cray argued that, under the provisions of TC Heartland, their client was entitled to have its case in a home venue. But US District Judge Rodney Gilstrap disagreed and said that Crays ties to the districta single salesperson, working out of his homewas enough to keep the case in the Eastern District.

Today, Gilstraps decision was reversed by the US Court of Appeals for the Federal Circuit, which hears all patent appeals. In a 20-page decision (PDF), the three-judge panel directed the case against the Seattle-based tech company to be transferred.

Gilstraps decision to keep Raytheon v. Cray in his court turned the normally wonky area of patent venue into a scorching political issue. At a Capitol Hill hearing about patent reform, the judge was denounced by both Rep. Bob Goodlatte (R-Va.) and Rep. Darrell Issa (R-Calif.), with Issa calling Gilstraps decision reprehensible.

Last week the patent microcosm...

16:48

Dip update 90/n "IndyWatch Feed Tech"

[Orig: Sept 23, 2017]
Hi everyone,
Below is the latest LCO light curve. Comparing to other 'out of transit' times (e.g., pre- and post-Elsie), it is suggestive that the variability seen here after Angkor is real, though our observations are not sensitive enough to say more (you would need a space telescope to make this distinction at this low level of variability).        
More later,
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      

16:41

Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Anthony Liguori on Sep 23

Just as an FYI, we (Amazon Linux AMI) also did all of the preparation
during the embargo period published shortly after embargo lift.

The pre-disclosure period gives us an opportunity to take the time to
analyze the problem and run through testing of the reported fix. It's
super valuable for us.

Regards,

Anthony Liguori

16:04

New ransomware scam asks for nude pics to unlock files "IndyWatch Feed Tech"

By Uzair Amir

A few months ago, two ransomware scams made news for

This is a post from HackRead.com Read the original post: New ransomware scam asks for nude pics to unlock files

16:00

Quick and Dirty Blimp Mount for a Shotgun Mike "IndyWatch Feed Tech"

Sometimes you dont have the hardware you need, and you can either do without or let the projects needs inspire you to create an alternative. Thats pretty sweet, and its even sweeter when you find a solution thats dirt cheap.

[Chu_st] created a sub-$10 blimp mount for his shotgun mike. It consists of a PVC pipe which attaches to the microphones shock mount. Plastic gardening grid is used for the shell, shaped by hand into the desired blimp shape and secured with zip ties and gaffer tape. [Chu_st] suggests using nylon stocking as a wind screen. The microphone itself attaches to a length of bicycle seat tube using a standard mic clamp.

For DIY microphone projects, we got you covered, with everything from a low noise floor microphone to one built out of a hard drive published previously.


Filed under: hardware

15:59

Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Simon McVittie on Sep 23

The Debian bug tracker (bugs.debian.org) is always public and has no
mechanism for embargoing individual bugs, so it is never used before
public disclosure.

It's entirely possible that your conclusion is correct in this case
(I don't have any more information than you do on whether the Debian
security team or package maintainer made use of the embargo period
for this vulnerability), but the late opening of a bug is not evidence
that no...

15:58

Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Levente Polyak on Sep 23

[...]

For Arch Linux I tested the patch beforehand and prepared the changed
buildscripts locally. The final build/release/publication process was
invoked just minutes after the public disclosure and the final artifact
was signed and hit the repository just 20 minutes after the disclosure.
The advisories were sent ~4 hours later once gone through a
peer-reviewing process (yes this could have been done even faster).

But that's not actually...

15:53

The Mohawk-PTAB Fiasco Threatens the Tribes Reputation More Than It Threatens PTAB "IndyWatch Feed Tech"

Since the patents are not even assigned to the Mohawk people, this whole scam accomplishes nothing

Suscol Intertribal Council
Photo credit: Sarah Stierch (CC BY 4.0)

Summary: In an effort to dodge scrutiny from the Patent Trial and Appeal Board (PTAB), Allergan Plc offloaded a lot of negative publicity onto the Mohawk people, owing primarily to the Mowhawk Tribes general counsel, Dale White

THE Patent Trial & Appeal Board (PTAB) has been making many headlines recently. The patent microcosm is trying as hard as it can to kill it. It cannot kill the people inside the PTAB (whom it vainly refers to as a death squad), so it wants to kill the entire institution. Its appalling.

We were very sad to see the Mohawk people exploited, or virtually used as a sort of instrument for killing PTAB. As some people have put it, the Mohawk tribe is now facilitating a "scam" (not our word). Dont expect the patent microcosm to admit this. In fact, in some comments that we saw over the past week, all criticisms of this ploy are being dismissed or played down as being just a substance-less cry of scam. Far from it!

Earlier this week, in a site of the patent microcosm, Philippe J.C. Signore from Oblon wrote about this as a case for refreshing Constitutional Law recollection. Well, as patent radicalism is waning (the system has improved in recent years) they will try to crush the system. Here is what Signore wrote:

Article III also states that the judicial power of the U.S. is vested in the federal courts and judges. In its brief filed in August 2017, Oil States argued that IPR proceedings are unconstitutional because they are set up as adversarial judicial trials (as opposed to examination proceedings) of granted private property rights, and as such should be handled by Article III judges and not administrative agency employees who are beholden to Executive Branch officials. Oil States also argued that IPR trials resolve questions of novelty or obviousness, which are precisely the same questions that English jurors resolved, such that they fall within the Seventh Amendments scope.

The Eleventh Amen...

15:48

SolarCity Will Pay $29.5 Million to Settle Allegations that it Lied to the Government "IndyWatch Feed Tech"

SolarCity, a company Tesla acquired in Nov. 2016, has agreed to pay $29.5 million to resolve allegations that it lied to the government by submitting inflated claims to cash in on a solar stimulus program, the Department of Justice announced Friday.

SolarCity has agreed to drop charges it had against the US government as part of the settlement, which is not an admission of guilt. The settlement is a SolarCity obligation, a SolarCity representative told Business Insider.

The investigation centered on a program Section 1603 set up under the Obama administration that was meant to encourage solar adoption by subsidizing installation costs. The program allowed solar companies to receive a federal grant that was equal to 30% of the cost to install or acquire solar systems.

The Justice Department alleges that SolarCity made thousands of claims that overstated the costs of its installations, allowing it to receive inflated grant payments. It has been probing SolarCity and several other solar companies since 2012.

Source: Business Insider

SolarCity was founded in 2006 by brothers Peter and Lyndon Rive, based on a suggestion for a solar company concept by their cousin, Elon Musk, who is the chairman and helped start the company. The Rive brothers left SolarCity earlier this year.


Original Submission

Read more of this story at SoylentNews.

15:26

HTTPS By Default For Everyone "IndyWatch Feed Tech"

Just a quick heads up for those that haven't noticed yet, HTTPS is now used by default across all of Phoronix.com as of this week...

15:22

Dr. Aubrey de Grey "IndyWatch Feed Tech"

Aging is a consequence of physics, not biology. Dr. Aubrey de Grey believes that the aging of any machine with moving parents is fundamentally the same, whether that machine is alive or not. He states that the SENS Foundation doesnt work on longevity and immortality it works on health. The only way we are going to live substantially longer is by staying truly youthful for substantially longer.

15:04

Latest EPO Rumours Allege That Benot Battistelli Rigged the Process of EPO Presidents Selection "IndyWatch Feed Tech"

Dont mess with the cole

Order of succession
Reference: Order of succession

Summary: Antnio Campinos is quite likely the next EPO President, as insiders suspect that many applications for the job got rejected politically (turned down by political mischief)

THE German media believes that Antnio Campinos will be the next head of the EPO (the Office, not the Organisation, whose Chairman will leave one week from now). Campinos is believed to be French, for reasons we explained before [1, 2], and he is close to Battistelli. Insiders suspect that Battistelli is already paving the way for Campinos to win the job, as we previously explained in:

  1. Its a Family Business: French Succession Plan at EPO After Battistellis Departure
  2. One Week Left for Battistellis Coronation of Another Frenchman, Antnio Campinos, to Lobby for UPC?
  3. Rumours That Another Frenchman is the Only Candidate to Succeed Benot Battistelli at the EPO

Imagine having 3 French Presidents (out of 4) in succession! Never mind the fact that much of the remaining management, dubbed Team Battistelli, is also French. What a coup! (French word)

Insiders suspect that Battistelli is already paving the way fo...

14:09

X.Org Foundation Has Become A Khronos Adopter "IndyWatch Feed Tech"

The X.Org Foundation board announced during this week's XDC2017 summit that they have officially completed the paperwork to become a Khronos adopter...

13:46

Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Hanno Bck on Sep 23

Hi,

A few days have passed since the optionsbleed disclosure. Some
interesting things have surfaced, e.g. the fact that it was apparently
discovered already in 2014, but nobody noticed it was a security bug.

But I'd like to discuss something else:
I had informed the distros mailing list one week earlier about the
upcoming disclosure with a bug description and links to the already
available patch.
My understanding is that the purpose of the...

13:42

CSE CybSec ZLAB Malware Analysis Report: Petya "IndyWatch Feed Tech"

Im proud to share with you the second report produced by Z-Lab, the Malware Lab launched by the company CSE CybSec. Enjoy the Analysis Report Petya.

CybSec Enterprise recently launched a malware Lab called it Z-Lab, that is composed of a group of skilled researchers and lead by Eng. Antonio Pirozzi.

Its a pleasure for me to share with you the second analysis that we have recently conducted on the Petya Ransomware.

We have dissected the ransomware and discovered interesting details that are included in our report.

Below the abstract from the analysis, the detailed report is available for free on our website.

Abstract

In a modern environment, where data stored in computers play a fundamental role in the private and work routine, we must consider the problem of the risk of losing these data. In fact, the ever-increasing threat, that is spreading, is Ransomware. In the last 15 years, malware writers have realized that they may have anyone in their hand with his data.

Figure 1: Characteristic Petya Skull with the corresponding UI containing the payment ransom instructions.

...

13:40

Intel Prepping Support For Huge GTT Pages "IndyWatch Feed Tech"

Intel OTC developers are working on support for huge GTT pages for their Direct Rendering Manager driver...

13:27

More Ice Found in Craters on Mercury "IndyWatch Feed Tech"

More ice has been found to exist in permanently shadowed craters and terrain on Mercury's surface:

The study, published in Geophysical Research Letters [DOI: 10.1002/2017GL074723] [DX], adds three new members to the list of craters near Mercury's north pole that appear to harbor large surface ice deposits. But in addition to those large deposits, the research also shows evidence that smaller-scale deposits scattered around Mercury's north pole, both inside craters and in shadowed terrain between craters. Those deposits may be small, but they could add up to a lot more previously unaccounted-for ice.

"The assumption has been that surface ice on Mercury exists predominantly in large craters, but we show evidence for these smaller-scale deposits as well," said Ariel Deutsch, the study's lead author and a Ph.D. candidate at Brown. "Adding these small-scale deposits to the large deposits within craters adds significantly to the surface ice inventory on Mercury."

[...] To seek further evidence that such smaller-scale deposits exist, the researchers looked though the altimeter data in search of patches that were smaller than the big crater-based deposits, but still large enough to resolve with the altimeter. They found four, each with diameters of less than about 5 kilometers. "These four were just the ones we could resolve with the MESSENGER instruments," Deutsch said. "We think there are probably many, many more of these, ranging in sizes from a kilometer down to a few centimeters."

A Mercury Colony?

Also at the American Geophysical Union.


Original Submission

Read more of this story at SoylentNews.

13:25

Keith Packard's Work On Better Supporting VR HMDs Under Linux With X.Org/DRM "IndyWatch Feed Tech"

Earlier this year Keith Packard started a contract gig for Valve working to improve Linux's support for virtual reality head-mounted displays (VR HMDs). In particular, working on Direct Rendering Manager (DRM) and X.Org changes needed so VR HMDs will work well under Linux with the non-NVIDIA drivers...

13:00

Building This TARDIS Is Anything But A Snap "IndyWatch Feed Tech"

As an avid fan of the show Dr Who, [Adam Sifounakis] saw a model for a laser-cut TARDIS that piqued his curiosity that eventually grew into a multi-week project involving multiple setbacks, missteps, revamps and finally gratification. Behold, his sound activated TARDIS.

First and foremost, assembling and painting the model was a fun puzzle despite a few trips to the store with a little backtracking on the painting due to impatience. Next, the creation of a pulsing soft white LED circuit timed with an audio clip to really sell the image of a mini-TARDIS proved to be a tedious ordeal, paying off in the end with a satisfying glow through the vellum-diffused windows on the model.

How to trigger the lights? [Sifounakis] initially wanted a capacitive sensor to trigger the sound effects, but that way lay dragons and madness so he went with snap-activated effect to activate the TARDIS like the Doctor himself. After struggling with building his own microphone setup, he switched to an electret mic with adjustable gain which worked like a charm. Setting up this TARDIS Adafruit Pro Trinket brain involved a snag or two, and after that it was smooth s...

12:51

Links 23/9/2017: Mesa 17.1.10 RC, Samba 4.7.0, KStars 2.8.4 "IndyWatch Feed Tech"

GNOME bluefish

Contents

GNU/Linux

  • Roughing it, with Linux

    I have been traveling for about two weeks now, spending 10 days camping in Iceland and now a few days on the ferry to get back. For this trip I brought along my Samsung N150 Plus (a very old netbook), loaded with openSUSE Linux 42.3.

  • Server

    • Finding the Mainframers of the Future Through Open Source Ecosystem Development

      Speak the word mainframe to many millennial techies, and the first things that likely come to mind are in the form of grainy sepia photos of floor-to-ceiling, wall-to-wall computers with big spinning tapes. But thats far from the reality of the modern mainframe.

      Imagine instead up to 240 10-core, 5.2ghz processors, 32TB of RAIM (redundant array of independent memory), hardware-based encryption, and fully hot-swappable hardware components. Those are the specs of the newly released IBM z14 a single machine that could replace the computing resources of an average corporate data center with room to spare.

    • Hybrid datacenter is Dockers latest open source goal
      ...

11:42

Chinese robot dentist is first to fit implants in patients mouth without any human involvement "IndyWatch Feed Tech"

An epidemiological survey has found there were about 400 million patients needing new teeth in China, but the number of qualified dentists was lagging behind demand.

In March this year the US Food and Drug Administration approved the use of a robot system named Yomi designed to assist human surgeons when fitting implants.


Successful procedure raises hopes technology could avoid problems caused by human error and help overcome shortage of qualified dentists.

PUBLISHED : Thursday, 21 September, 2017, 6:30pm.

UPDATED : Friday, 22 September, 2017, 9:43pm.

11:06

Beijing-Shanghai Railway Restores 350 km/h Train Service "IndyWatch Feed Tech"

China is once again operating the world's fastest train service after a speed cap was lifted:

China increased the maximum speed of bullet trains on the Shanghai-Beijing line to 350 kilometers per hour yesterday, six years after a fatal accident led to a speed cap. The limit was reduced to 300kph after 40 people died in a high-speed train crash near Wenzhou, east China's Zhejiang Province, in July 2011.

The decision to increase the speed means that China once again has the world's fastest train service. The new limit cuts the time of the 1,318-kilometer journey between Shanghai and the capital to four hours and 28 minutes, saving passengers nearly an hour. A total of 14 trains a day will run between the two cities at the higher speed.

Also at Xinhua and NextBigFuture.


Original Submission

Read more of this story at SoylentNews.

10:58

Russias Largest Torrent Site Celebrates 13 Years Online in a Chinese Restaurant "IndyWatch Feed Tech"

For most torrent fans around the world, The Pirate Bay is the big symbol of international defiance. Over the years the site has fought, avoided, and snubbed its nose at dozens of battles, yet still remains online today.

But there is another site, located somewhere in the east, that has been online for nearly as long, has millions more registered members, and has proven just as defiant.

RuTracker, for those who havent yet found it, is a Russian-focused treasure trove of both local and international content. For many years the site was frequented only by native speakers but with the wonders of tools like Google Translate, anyone can use the site at the flick of the switch. When people are struggling to find content, its likely that RuTracker has it.

This position has attracted the negative attention of a wide range of copyright holders and thanks to legislation introduced during 2013, the site is now subject to complete blocking in Russia. In fact, RuTracker has proven so stubborn to copyright holder demands, it is now permanently blocked in the region by all ISPs.

Surprisingly, especially given the enthusiasm for blockades among copyright holders, this doesnt seem to have dampened demand for the sites services. According to SimiliarWeb, against all the odds the site is still pulling in around 90 million visitors per month. But the impressive stats dont stop there.

Impressive stats for a permanently blocked site

This week, RuTracker celebrates its 13th birthday, a relative lifetime for a site that has been front and center of Russias most significant copyright battles, trouble which doesnt look like stopping anytime soon.

Back in 2010, for example, RU-Center, Russias largest domain name registrar and web-hosting provider, pulled the plug on the sites former Torrents.ru domain. The Director of Public Relations at RU-Center said that the domain had been blocked on the orders of the Investigative Division of the regional prosecutors office in Moscow. The site never got its domain back but carried on regardless, despite the setbacks.

Back then the site had around 4,000,000 members but now, seven years on, its ranks have swelled to a reported 15,382,907. According to figures published by the site this week, 778,317 of those members signed up this year...

10:22

A humanely killed animal is still killed and thats wrong "IndyWatch Feed Tech"



Hereford cattle arrive at a meat processing plant. <em>Photo by Daniel Garcia/Getty</em>
















This is a stretch of course.  The animal's death releases its spirit body for a new cycle of life.  A humane death does matter while death itself does not matter at all.  The reason that is true is because death is inevitable while the experience is what is retained by the spirit body.  .

The faux moralists argue nonsense that demands outright extinction for all domesticates and a complete rewilding of the Earth as well.

I am actually a fan of a successful vegetarian diet.  At the same time i am also a fan of organic farming methodology and all that demands a massive increase in our use of working livestock to assist us.  That does mean a steady stream of animal protein to be consumed and ultimately a global surf...

10:00

Scooter Wheels Keep DIY Barn Doors on Track "IndyWatch Feed Tech"

[MotoGeeking] built a giant spray booth and is in the process of making customized, air-filtering barn doors for it. When it came to buy hardware to move the doors, though, he found all the ready-made options to be prohibitively expensive. You know what comes next: he designed barn door hardware from the ground up, and did it as cheaply as possible.

After intensely studying many images of barn doors and hardware, [MotoGeeking] decided on the right wheels and went from there. Kick scooter wheels fit the bill nicely, since they are designed to support a lot of weight and come with their own bearings and spacers. And theyre cheap, too just $9 for a pair.

[MotoGeeking] found some C channel extruded aluminium that seemed to be a perfect match for the wheels, but the wheel was quick to bind whenever it touched the sides. He solved that one by epoxying a length of round bar into the bottom corners. This allows the wheel to move freely while forcing it to stay centered in the track.

In designing the 1/4 aluminium brackets, [MotoGeeking] took a measure thrice, order once approach to selecting the fasteners. You probably know by now that McMaster-Carr has free CAD drawings for every little thing. [MotoGeeking] imported the ones he liked into Illustrator and built around them. This helped him get it right the first time and kept the headaches and hair-tearing away. Watch the giant door skeleton glide effortlessly on its track after the break.


Filed under: hardware, how-to

09:00

Return of the city-state "IndyWatch Feed Tech"




I personally posit the Communion of Xanadu as a global entity in which governance is through the natural community of approx. 150 souls and the rule of twelve.  The Nation State as we know it reduces natural communities into virtual communities inefficiently and fails a significant portion of its citizens.
 
What can be retained is the nation city that provides direct citizenship to ethnic avocations.   For example the city of Edinburgh can grant Scottish citizenship to all Scots.  This would give it almost 50,000,000 citizens able to vote on obvious cultural issues and a real forum to promote cultural values. They just would not mostly live there as that would no longer matter anyway.
 
 
What needs to be delinked is control over land use generally as that is best handled through the local; natural community and the application of the rule of twelve for conflicting issues...
 

Return of the city-state 
 
 
Nation-states came late to history, and theres plenty of evidence to suggest they wont make it to the end of the century

https://aeon.co/essays/the-end-of-a-world-of-nation-states-may-be-upon-us

If youd been born 1,500 years ago in southern Europe, youd have been convinced that the Roman empire would last forever. It had, after all, been around for 1,000 years. And yet, following a period of economic and military decline, it fell apart. By 476 CE it was gone. To the people living under the mighty empire, these events must have been unthinkable. Just as they must have been for those living through the collapse of the Pharaohs rule or Christendom or the Ancien Rgime.

We are just as deluded that our model of living in countries is inevitable and eternal. Yes, there are dictatorships and democracies, but the whole world is made up of nation-states. This means a blend of nation (people with common attribut...

09:00

Global cooperation depends on the strength of local connections "IndyWatch Feed Tech"




Of course it does.  Thus my Rule of Twelve.   No communicating fully networked population is able to sustain conflict at all.  Where the problem arises is when such communication is assigned to an ill chosen one in such a way that he or she restricts such communication.  In short, hierarchy acts to limit cooperation and by extension, the more hierarchy we have the less cooperation we earn


The future will see all this resolved.  A lot we are actually relearning.  It is instructive that my newly imagined rule of twelve is integral to Bronze Age community governance and likely goes back to Antediluvian times.


We still see little substantive movement in my indicated direction mostly because hierarchical structures have and continue to control access to credit.


.
Global cooperation depends on the strength of local connections 

https://aeon.co/ideas/global-cooperation-depends-on-the-strength-of-local-connections
Benjamin Allen  is an assistant professor of mathematics at Emmanuel College in Boston....

09:00

The healing power of nature "IndyWatch Feed Tech"



This is a reminder, but also do note that methodology is also evolving as well and that this all needs to be taken much further.  I do think that running water has much to do with all this.

Thus there are plenty of local streams that need to be dressed up a little and set up for straight up canoe trips.  This also has the advantage of placing eyeballs on these forgotten rivers and getting political support for full restoration.  They will no longer be out of sight and out of mind.


My own experience tells me that even modest creeks can use this attention and be nicely restored.





The healing power of nature 

The idea that immersing yourself in forests and nature has a healing effect is far more than just folk wisdom 

...

08:34

Scientists Develop Device to Detect Counterfeit Booze "IndyWatch Feed Tech"

Researchers at The University of Manchester have developed the world's first handheld SORS device that can detect fake spirits, such as vodka and whisky, whilst still in their bottles.

SORS, or 'spatially offset Raman spectroscopy," devices give highly accurate chemical analysis of objects and contents beneath concealing surfaces, such as glass bottles. It works by using 'an optical approach' where lasers are directed through the glass, enabling the isolation of chemically-rich information that is held within the spirits.

Such devices are already commercially available but are usually used for security and hazmat detection, screening and pharmaceutical analysis. This latest version, developed at the University's School of Chemistry in the Manchester Institute of Biotechnology (MIB), is the first time such a handheld tool is being used for a food or beverage product. The reseach has been published in Nature today (21st September).

Spirit drinks are the EU's biggest agri-food export, with EU governments' revenues of at least 23 billion in excise duties and VAT, and approximately 1 million jobs linked to the production, distribution and sale of spirit drinks.

Bah, I make my own.


Original Submission

Read more of this story at SoylentNews.

07:59

Google Will Survive SESTA. Your Startup Might Not. "IndyWatch Feed Tech"

There was a shocking moment in this weeks Senate Commerce Committee hearing on the Stop Enabling Sex Traffickers Act (SESTA). Prof. Eric Goldman had just pointed out that members of Congress should consider how the bill might affect hundreds of small Internet startups, not just giant companies like Google and Facebook. Will every startup have the resources to police its users activity with the level of scrutiny that the new law would demand of them?  There is a large number of smaller players who dont have the same kind of infrastructure. And for them, they have to make the choice: can I afford to do the work that youre hoping they will do?

Goldman was right: the greatest innovations in Internet services dont come from Google and Facebook; they come from small, fast-moving startups. SESTA would necessitate a huge investment in staff to filter users activity as a companys user base grows, something that most startups in their early stages simply cant afford. That would severely hamper anyones ability to launch a competitor to the big Internet playersgiving users a lot less choice.

Sen. Richard Blumenthals stunning response: I believe that those outliersand they are outlierswill be successfully prosecuted, civilly and criminally under this law.

Given the extreme penalties for under-filtering, platforms would err in the opposite direction, removing legitimate voices from the Internet.

Blumenthal is one of 30 cosponsorsand one of the loudest championsof SESTA, a bill that would threaten online speech by forcing web platforms to police their members messages more stringently than ever before. Normally, SESTAs proponents vastly understate the impact that the bill would have on online communities. But in that unusual moment of candor, Sen. Blumenthal seemed to lay bare his opinions about Internet startupshe thinks of them as unimportant outliers and would prefer that the new law put them out of business.

Lets make something clear: Google will survive SESTA. Much of the SESTA fights media coverage has portrayed it as a battle between Google and Congress, which sadly misses the point. Large Internet companies may have...

07:58

Google released a Chrome 61 update that patches 2 High-Risk Flaws "IndyWatch Feed Tech"

The first high-risk bug, tracked as CVE-2017-5121, is an Out-of-bounds access in V8 reported by Jordan Rabet, Microsoft Offensive Security Research and Microsoft ChakraCore team on 2017-09-14.

The expert received a $ 7,500 reward under the Google bug bounty program.

The second high-risk vulnerability, tracked as CVE-2017-5122, is an Out-of-bounds access in V8 as well that was reported by Choongwoo Han of Naver Corporation on 2017-08-04.

The CVE-2017-5122 vulnerability was also awarded a $3,000 bounty.

According to Krishna Govind from Google, many vulnerabilities in Google solutions have been detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.

Google Chrome

To date, Google has already fixed 25 vulnerabilities (8 of them were assessed as High-severity issues) affecting different Chrome 61 releases, half of which were reported by external researchers.

Google already paid over $30,000 in bug bounty rewards to the external security researchers who discovered the vulnerabilities, the highest one was $7,500.

Pierluigi Paganini

(Security Affairs  Google Chrome, bug bounty)

&

07:49

Re: [CVE-2017-14266] tcprewrite Heap-Based Buffer Overflow "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Sep 22

Hi

Thanks for providing the tcp.zip (it looks the mail did not make it to
the list, the attachment was 6.4M so maybe it was rejected).

I'm attaching for list archiving purposed the base64 encoded tcp.pcap
gzip compressed file.

Now looking at an ASAN build, on i386:

sid-i386:/tmp/source-tcpreplay/tcpreplay-3.4.4# ./src/tcprewrite --portmap=21:2121 --infile=/tmp/tcp.pcap
--outfile=/tmp/output.pcap...

07:00

Cheap, Full-Duplex Software Defined Radio With The LimeSDR "IndyWatch Feed Tech"

A few years ago, we saw the rise of software-defined radios with the HackRF One and the extraordinarily popular RTL-SDR USB TV tuner dongle. Its been a few years, and technology is on a never-ending upwards crawl to smaller, cheaper, and more powerful widgets. Now, some of that innovation is making it to the world of software-defined radio. The LimeSDR Mini is out, and its the cheapest and most capable software defined radio yet. Its available through a Crowd Supply campaign, with units shipping around the beginning of next year.

The specs for the LimeSDR mini are quite good, even when compared to kilobuck units from Ettus Research. The frequency range for the LimeSDR Mini is 10 MHz 3.5 GHz, bandwidth is 30.72 MHz, with a 12-bit sample depth and 30.72 MSPS sample rate. The interface is USB 3.0 (the connector is male, and soldered to the board, but USB extension cables exist), and the LimeSDR is full duplex. That last bit is huge the RTL-SDR cant transmit at all, and even the HackRF is only half duplex. This enormous capability is thanks to the field programmable RF transceiver found in all of the LimeSDR boards. We first saw these a year or so ago, and now these boards are heading into the hands of hackers. Someones even building a femtocell out of a Lime board.

The major selling point for the LimeSDR is, of course, the price. The early bird rewards for the Crowd Supply campaign disappeared quickly at $99, but there are still plenty available at $139. This is very inexpensive and very fun on the Crowd Supply page, you can see a demo of a LimeSDR mini set up as an LTE base station, streaming video between two mobile phones. These are the golden days of hobbyist SDR.


Filed under: Crowd Funding, radio hacks

06:58

Microsofts Andromeda OS to turn Windows 10 into a modular platform "IndyWatch Feed Tech"

Is Microsofts Andromeda OS, The New Windows 10 Mobile OS?

Microsoft is apparently working on to make Windows into a modular operating system known as Andromeda OS internally at the Redmond HQ, that will work cross-platform, on any device type or architecture, as reported by Microsoft insiders at Windows Central. Andromeda OS is the future support of Windows 10 operating system.

Windows OS is more than 30 years old now and is based on old and demanding code, architecture and features. With the introduction of Andromeda OS, Microsoft is looking to make Windows 10 a universal OS that will allow it to adapt to each specific device without being based on particular, prior product variants. In other words, Andromeda OS will turn Windows 10 into a modular system suitable for different architectures rather than the x86 architecture used by desktops, laptops, and tablets running Intel or AMD chips.

Andromeda OS will allow any functions to be added or removed to suit the system or device its required to run on. This will in turn offer developers the flexibility to build versions of Windows 10 with different features and functions, quickly and efficiently or use a Windows OS without being affected by performance-sapping features not required by the device.

Microsoft is expected to replace the mobile platform Windows 10 Mobile with Andromeda OS likely to be seen in phones and tablets, and possibly even wearables in 2018 or later.

The post Microsofts Andromeda OS to turn Windows 10 into a modular platform appeared first on TechWorm.

06:35

Janet Faulkner, Program Manager at the University of Houston, joins our Futurists Board. "IndyWatch Feed Tech"

Janet Faulkner, Program Manager at the University of Houston, joins our Futurists Board.

06:13

lowRISC is Hiring: Help Make Open-Source Hardware a Reality. "IndyWatch Feed Tech"

From the lowRISC blog:

We are looking for a talented hardware engineer to join the lowRISC team and help make our vision for an open source, secure, and flexible SoC a reality. Apply now!

lowRISC C.I.C. is a not-for-profit company that aims to demonstrate, promote and support the use of open-source hardware. The lowRISC project was established in 2014 with the aim of bringing the benefits of open-source to the hardware world. It is working to do this by producing a high quality, secure, open, and flexible System-on-Chip (SoC) platform. lowRISC C.I.C. also provides hardware and software services to support the growing RISC-V ecosystem. Our expertise includes the LLVM Compiler, hardware security extensions and RISC-V tools, hardware and processor design.

[...] lowRISC is an ambitious project with a small core team, so you will be heavily involved in the project's development direction. This role will involve frequent work with external contributors and collaborators. While much of the work will be at the hardware level the post will offer experience of the full hardware/software stack, higher-level simulation tools and architectural design issues.

Some practical experience of hardware design with a HDL such as Verilog/SystemVerilog is essential, as is a good knowledge of the HW/SW stack. Ideally, candidates will also have experience or demonstrated interest in some of: SoC design, large-scale open source development, hardware or software security, technical documentation, board support package development and driver development. Industrial experience and higher degree levels are valued, but we would be happy to consider an enthusiastic recent graduate with a strong academic record.

Informal enquires should be made to Alex Bradbury asb@lowrisc.org.

takyon (thanks to an AC): lowRISC is a project to create a "fully open-sourced, Linux-capable, system-on-a-chip"; it is based around RISC-V, the "Free and Open RISC Instruction Set Architecture", which is meant to provide an extensible platform that scales from low-level microcontrollers up to highly parallel, high-bandwidth general-purpose supercomputers.

Reduced instruction set computer (RISC).

Previously: RISC-V...

05:41

Marsia Bealby, Coeditor of "Current Research in Egyptology 2012", joins our Futurists Board. "IndyWatch Feed Tech"

Marsia Bealby, Coeditor of "Current Research in Egyptology 2012: Proceedings of the Thirteenth Annual Symposium", joins our Futurists Board.

04:00

8-Channel ADC For the Raspberry Pi "IndyWatch Feed Tech"

The Raspberry Pi is a powerful embedded computing platform. However, for all its Linux-based muscle, it lacks one thing that even the simplest 8-bit microcontrollers usually have analog-to-digital conversion. There are a great many ways to rectify this shortcoming, and [Chris Burgess] has brought us another with an 8-channel ADC for the Raspberry Pi.

For the ADC, [Chris] chose the MCP3008, for its low cost and availability. In this configuration it offers 10-bit resolution and a maximum sampling rate of 200 kilosamples per second. Adafruit has a great guide on working with the MCP3008, too. With such a useful resource to hand, [Chris] was able to spin up a PCB to interface the chip to the Raspberry Pi using SPI. [Chris] took care to try to make the board to the official HAT specifications. As far as the physical aspects go, the board is to spec, however [Chris] omitted the EEPROM required for auto-configuration purposes. That said, the pads are on the board if someone wants to take the initiative to install one.

Its a tidy build that provides something sorely missing from the Raspberry Pi, for a reasonable cost. [Chris]s goal was to build something that would enable the measurement of analog sensors for a robot project; wed love to hear your ideas for potential uses in the comments!


Filed under: Raspberry Pi

03:52

Inside the Strange Science of the Fake Meat that 'Bleeds' "IndyWatch Feed Tech"

From Wired:

WIRED wants to take you on the deepest dive yet into the science behind the Impossible Burger.

Biting into an Impossible Burger is to bite into a future in which humanity has to somehow feed an exploding population and not further imperil the planet with ever more livestock. Because livestock, and cows in particular, go through unfathomable amounts of food and water (up to 11,000 gallons a year per cow) and take up vast stretches of land. And their gastrointestinal methane emissions aren't doing the fight against global warming any favors either (cattle gas makes up 10 percent of greenhouse gas emissions worldwide).

This is the inside story of the engineering of the Impossible Burger, the fake meat on a mission to change the world with one part soy plant, one part genetically engineered yeastand one part activism. As it happens, though, you can't raise hell in the food supply without first raising a few eyebrows.

Read more of this story at SoylentNews.

03:42

New antibody attacks 99% of HIV strains "IndyWatch Feed Tech"

Experiments on 24 monkeys showed none of those given the tri-specific antibody developed an infection when they were later injected with the virus.


It will enter clinical trials to prevent and treat the infection next year.

03:22

One year later, Microsoft AI and Research grows to 8k people in massive bet on artificial intelligence "IndyWatch Feed Tech"

Microsofts first mission statement envisioned a computer on every desk and in every home, but Bill Gates also had another goal: that computers would someday be able to see, hear, communicate and understand humans and their environment.

More than 25 years and two CEOs later, Microsoft is betting its future on it.

02:29

Guajataca Dam in Puerto Rico Failing - 70,000 at Risk - Evacuations Ordered "IndyWatch Feed Tech"

As if the onslaught of hurricanes Irma and Maria were not enough, the National Weather Service in San Juan is reporting that a major dam is failing in Puerto Rico and that 70,000 people are being evacuated by bus. From CBS:

The National Weather Service in San Juan said Friday that the northwestern municipalities of Isabela and Quebradillas, home to some 70,000 people, were being evacuated with buses because the nearby Guajataca Dam was failing after Hurricane Maria hit the U.S. territory.

Maria poured more than 15 inches of rain on the mountains surrounding the dam, swelling the reservoir behind it.

Details remained slim about the evacuation with communications hampered after the storm, but operators of the dam reported that the failure was causing flash-flooding downstream. The 345-yard dam holds back a man-made lake covering about 2 square miles and was built decades ago, U.S. government records show.

"Move to higher ground now," the weather service said in a statement. "This is an extremely dangerous and life-threatening situation. Do not attempt to travel unless you are fleeing an area subject to flooding or under an evacuation order."

"Act quickly to protect your life," it added. "Buses will be evacuating people from these areas."

Wikipedia has a page about Guajataca Dam

NWS report on Twitter; also at Al Jazeera and BBC.


Original Submission

Read more of this story at SoylentNews.

01:39

Tesla Reportedly Teaming Up With AMD for Custom AI Chip "IndyWatch Feed Tech"

According to CNBC, Tesla is teaming up with AMD to develop a custom chip optimized for AI, to be used for self-driving features in Tesla cars. The head of Tesla's "Autopilot" team is Jim Keller, formerly of AMD and Apple, who helped design the A4 and A5 chips while working at Apple and was lead architect on the Athlon 64 at AMD.

Also at Engadget, TechCrunch, and Business Insider

GlobalFoundries, which fabricates chips for Advanced Micro Devices Inc, said on Thursday that Tesla had not committed to working with it on any autonomous driving technology or product, contradicting an earlier media report. [...] The spokesperson for GlobalFoundries said that Jhas comments at the GlobalFoundries Technology Conference were not reported accurately.


Original Submission

Read more of this story at SoylentNews.

01:11

Warren no longer blocking Trump antitrust nominee: report "IndyWatch Feed Tech"

Sen. Elizabeth Warren (D-Mass.) is no longer blocking President Donald Trumps nominee to head the Justice Departments Antitrust Division, Reuters reported.Warren on Friday reportedly lifted her hold and will allow the Senate to vote on Makan...

01:03

GitLab 10.0 Released "IndyWatch Feed Tech"

GitLab 10.0 has been released. "With every monthly release of GitLab, we introduce new capabilities and improve our existing features. GitLab 10.0 is no exception and includes numerous new additions, such as the ability to automatically resolve outdated merge request discussions, improvements to subgroups, and an API for Wiki thanks to a contribution from our open source community."

01:02

The quest for eternal life is trending "IndyWatch Feed Tech"

A long summary.


Could we live to 140? 1,000? Is there a limit? Scientific research into extending the human life span is being backed by Silicon Valley giants like Google and Facebook.

01:00

Solar Tide Clock Keeps Track of the Moon "IndyWatch Feed Tech"

[rabbitcreek] based his the tide prediction software off of [Luke Millers] Tide Clock, which applies location-specific adjustments to the standard lunar clock, taking into consideration such factors as the geographic features (basin depth, etc.) that modify the default timing. [Miller]s Arduino code includes a library of common locations organized by NOAA station number.

[rabbitcreek]s project consists of a Adafruit Feather board hooked up to a DS3231 RTC breakout and a HS-225BB servo, which turns the clocks hand. Its an 180-degree servo, attached to a hacked-down Actobotics gearbox gearing the servo down 2:1 to permit 360 degrees of movement.

He also wanted his creation to be left to operate unattended for years, theoretically so solar power was a natch. The face of the clock consists of individual wavers o...

00:36

Announcing Intel Clear Containers 3.0 "IndyWatch Feed Tech"

The Clear Containers team at Intel has announced the release of Clear Containers 3.0. "Completely rewritten and refactored, Clear Containers 3.0 uses Go language instead of C and introduces many new components and features. The 3.0 release of Clear Containers brings better integration into the container ecosystem and an ability to leverage code used for namespace based containers."

00:17

Blockchain for Good Hackathon, September 30 and October 1 "IndyWatch Feed Tech"

When is it on?

The Blockchain for Good Hackathon takes place Saturday, 30 September and Sunday, 1 October. Full agenda can be found here.

How many years has it been going?

This is the inaugural event.

What exciting things can people look forward to for the 2017 version?

00:09

Facebook relicenses several projects "IndyWatch Feed Tech"

Facebook has announced that the React, Jest, Flow, and Immutable.js projects will be moving to the MIT license. This is, of course, a somewhat delayed reaction to the controversy over the "BSD+patent" license previously applied to those projects. "This decision comes after several weeks of disappointment and uncertainty for our community. Although we still believe our BSD + Patents license provides some benefits to users of our projects, we acknowledge that we failed to decisively convince this community."

00:06

Five Ways Ancient India Changed the World With Maths "IndyWatch Feed Tech"

India's contributions to mathematics:

It should come as no surprise that the first recorded use of the number zero, recently discovered to be made as early as the 3rd or 4th century, happened in India. Mathematics on the Indian subcontinent has a rich history going back over 3,000 years and thrived for centuries before similar advances were made in Europe, with its influence meanwhile spreading to China and the Middle East.

As well as giving us the concept of zero, Indian mathematicians made seminal contributions to the study of trigonometry, algebra, arithmetic and negative numbers among other areas. Perhaps most significantly, the decimal system that we still employ worldwide today was first seen in India.

With such a significant technical lead, how did they fall behind?


Original Submission

Read more of this story at SoylentNews.

00:02

A Guide to Common Types of Two-Factor Authentication on the Web "IndyWatch Feed Tech"

Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password.

In addition to requesting something you know to log in (in this case, your password), an account protected with 2FA will also request information from something you have (usually your phone or a special USB security key). Once you put in your password, you'll grab a code from a text or app on your phone or plug in your security key before you are allowed to log in. Some platforms call 2FA different thingsMulti-Factor Authentication (MFA), Two Step Verification (2SV), or Login Approvalsbut no matter the name, the idea is the same: Even if someone gets your password, they won't be able to access your accounts unless they also have your phone or security key.

There are four main types of 2FA in common use by consumer websites, and it's useful to know the differences. Some sites offer only one option; other sites offer a few different options. We recommend checking twofactorauth.org to find out which sites support 2FA and how, and turning on 2FA for as many of your online accounts as possible. For more visual learners, this infographic from Access Now offers additional information.

Finally, the extra layer of protection from 2FA doesn't mean you should use a weak password. Always make unique, strong passwords for each of your accounts, and then put 2FA on top of those for even better log-in security.

SMS 2FA

When you enable a site's SMS 2FA option, you'll often be asked to provide a phone number. Next time you log in with your username and password, you'll also be asked to enter a short code (typically 5-6 digits) that gets texted to your phone. This is a very popular option for sites to implement, since many people have an SMS-capable phone number and it doesn't require installing an app. It provides a significant step up in ac...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 22 September

23:50

Video Friday: ANYmal Robot, Jibo Unboxing, and Anki Overdrive Fast & Furious "IndyWatch Feed Tech"

Your weekly selection of awesome robot videos Image: ANYbotics via YouTube

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next two months; heres what we have so far (send us your events!):

ROSCon  September 21-22, 2017  Vancouver, B.C., Canada
IEEE IROS  September 24-28, 2017  Vancouver, B.C., Canada
RoboBusiness  September 27-28, 2017  Santa Clara, Calif., USA
BtS Maritime Robotics  October 1-8, 2017  Biograd na Moru, Croatia
Drone World Expo  October 2-4, 2017  San Jose, Calif., USA
HAI 2017  October 17-20, 2017  Bielefeld, Germany

Let us know if you have suggestions for next week, and enjoy todays videos.


This video shows some impressively robust autonomous rough-terrain locomotion from ANYmal, but its mostly worth watching for the epic ANYmal back massage (!) at the end:

We present an architecture for rough-terrain locomotion with quadrupedal robots. All sensing, state estimation, mapping, control, and planning runs in real-time onboard the robot. The method is implemented on the quadrupedal robot ANYmal and we present experiments of climbing stairs, steps, and slopes and show how the robot can adapt to changing and moving environments.

By Pter Fankhauser, Marko Bjelonic, Miki Takahiro, Tanja Baumann, C. Dario Bellicoso, Christian Gehring, and Marco Hutter.

ANYmal ]


Some of you have been waiting a long, long, long time for this: an actual Jibo unboxing and setup video!

Jibos are shipping now for early Indiegogo backers. Im not sure how Sean got his first, but itll be interesting to see what...

23:46

Samba 4.7.0 released "IndyWatch Feed Tech"

The Samba 4.7.0 release is out. New features include whole DB read locks (a reliability improvement), active directory with Kerberos support, detailed audit trails for authentication and authorization activities, a multi-process LDAP server, better read-only domain controller support, and more. See the release notes for details.

23:08

Courts Are Losing Patience for Gilstraps Unbridled Support of Patent Trolls "IndyWatch Feed Tech"

Hes no better than Randall Rader, a facilitator of trolls (discharged with dishonor, so to speak)

Randall R. Rader
Photo from Reuters

Summary: The man whose court has become a trolling factory is being refuted (but not reprimanded) by the CAFC, which certainly can see that something is amiss and serves to discredit the system as a whole

THE media does not usually name judges (personifying cases). But Gilstrap is a special case; he himself has become the story due to outrageous rulings on patents (and more recently copyrights, too). The judge whom prominent politicians have dubbed reprehensible keeps ignoring the Supreme Court [1, 2]. He has single-handedly decided that the litigation industry in his town is more important than the law itself.

What will people think of the legal system, having read about the tales of Gilstrap? Its almost as though he is proudly biased; he boasts about it and openly invites patent trolls to his court (for favourable treatment). If he continues to make complete and utter mockery of the law, how long will it take before higher courts intervene at a more personal level/capacity?

Well, towards the end of this week the patent microcosms media took note of one such development; Federal Circuit rejects Gilstraps test for patent venue, said the headline. Here is the opening paragraph (much of the rest is behind a paywall):

The Federal Circuit has reversed an Eastern District of Texas refusal to transfer the Cray case, and rejected Judge Gilstraps test for determining patent venue. This includes the appeals court stating there must be a physical, geographical location in the district from which the business of the defendant is carried out

Almost simultaneously the other site of the patent micr...

23:05

India to Join China and the United States With Its Own Quantum Computer "IndyWatch Feed Tech"

India to take on China and the United States by building its own Quantum Computer

Quantum computer is touted as the next big leap in technology. China has been leading the Quantum computer arena and has already sent a hack-proof quantum computer into space. They even managed to achieve the first ever Star Trek-like teleportation by sending a Photon 500 km from space to the Space Center in China. The United States is not far behind but its Quantum computer technology is shrouded in secret under the official secrets act.  Indian scientists who have made a name for themselves by sending Mangalyaan a Mars orbiter at 1/5th the price of American Mars Orbiter and launching an extraordinary 104 satellites in the space at one go.

Now the Indian scientists have embarked on their next mission building Indias own Quantum computer. Keen to tap into the next big advance in computing technology, the Department of Science and Technology (DST) is planning to build its own quantum computer.

What is a Quantum Computer?

Unlike the normal computer and laptops that we have at our homes, the quantum computer employs the principles of quantum mechanics to store information in qubits instead of the typical bits of 1 and 0. While our computers and laptops run on the principle of bits and bytes, the Quantum computers run on Qubits These Qubits are theoretically 100 times faster than the conventions bits and bytes and work faster because of the way such circuits are designed, and their promise is that they can do intensive number-crunching tasks much more efficiently than the fastest comparable computers.

How fast is a Quantum Computer?

Quantum computers are considered to the fastest things on Earth. To give you an example, a quantum computer would require 3.5 million fewer steps than a traditional machine to sort and parse a billion numbers. A quantum computer can find the solution in only 31,623 steps compared to the millions of steps a conventional computer would take.

What is the use of a Quantum Computer?

One of the top uses of Quantum computer is of course military. Indian military could have the power to number crunch any problems from field military formations to in-house missile tests and hydrogen yield testing. Quantum computer can also be used to predict the weather correctly. India depends on monsoon and a correct prediction may help its millions of farmers produce a variety of crops according to the monsoon outbreak. A quantum computer can also help ISROs space programme besides providing the necessary infrastructure for the Aadhar card backbone. The Indian government hopes to directly credit benefits and subsidies (Universal Basic Inco...

22:57

Zuckerberg abandons plan to reclassify Facebook stocks "IndyWatch Feed Tech"

Mark Zuckerberg announced on Friday that he was dropping a bid to maintain majority control of Facebook while he and his wife Priscilla sell off almost all of their shares in the company to fund their philanthropy.Zuckerberg specifically said in a...

22:57

New Verizon data leak, the second one in a few months "IndyWatch Feed Tech"

Experts at Kromtech Security Research Center discovered a new Verizon leak exposed confidential and sensitive data on internal systems.

It has happened again, security researchers with Kromtech Security Research Center discovered a new Verizon leak exposed confidential and sensitive data on internal systems.

Leaked data includes server logs and credentials for internal systems, the huge trove of documents was found on an unprotected Amazon S3 bucket.

The archive seems to refer to internal Verizon Wireless systems, known as Distributed Vision Services (DVS), that is a middleware system used by the company to deliver data from the back-end systems to the front-end applications used by employees and staff in stores and at call centers.

On September 20th, Kromtech Security researchers discovered publicly accessible Amazon AWS S3 bucket containing around 100MB of data attributing to internal Verizon Wireless system called DVS (Distributed Vision Services). states a blog post published by Kromtech.

DVS is the middleware and centralized environment for all of Verizon Wireless (the cellular arm of VZ) front-end applications, used to retrieve and update the billing data.

The Amazon cloud storage contained several files, mostly scripts and server logs that included some login credentials to internal systems, some folders contained internal Verizon confidential documents, another folder contained 129 Outlook messages with internal communications within Verizon Wireless domain.

The repository contained:

  • Admin user info that could potentially allow access to other parts of the network
  • Command notes, logs including
  • B2B payment server names and info
  • Internal PowerPoints showing VZ infrastructure, with server IPs, marked as Verizon Wireless Confidential and Proprietary information
  • Global router hosts
  • 129 saved Outlook messages with access info and internal communications

Although no customers data are involved in this data leak, some scripts could be used by an attacker to elevate privileges within the internal systems and access them.

Some documents, marked as confidential and proprietary materials, include detailed information on the internal infrastructure, including server IP addresses and global router hosts.

Its not clear why the confidential documents were exposed on a public server.

According to ZDNet, the unprotected Amazon S3 storage server was controlled by an employee that told ZDNet on the phone Thu...

22:40

Game Engine Powered Arcan Display Server With Durden Desktop Updated "IndyWatch Feed Tech"

Arcan, the open-source display server powered by a game engine, is out with a new release. Its Durden desktop environment has also been updated...

22:32

U.S. Marine Corps to Have its First Female Infantry Officer "IndyWatch Feed Tech"

The U.S. Marine Corps will soon have its first female infantry officer. The unnamed lieutenant is expected to lead an infantry platoon of about 40 marines:

The Marine Corps is set to have its first female infantry officer, a milestone in its nearly 250-year-long history.

The lieutenant is scheduled to graduate with her all-male peers on Monday after she completed all of the graduation requirements in the service's grueling 13-week Infantry Officer Course, the Corps said. Her completion of the course was first reported by The Washington Post. The officer's name was not made public.

The course was opened to women in 2012, and on an experimental basis. More than 30 women attempted it, but when none passed, the course was once again closed to females in the spring of 2015. After the Pentagon opened all military jobs to women, four additional women tried the course without success.

Also at The Hill.


Original Submission

Read more of this story at SoylentNews.

22:24

Intellectual Ventures, GNU/Linux/Android/FOSS Patents, and the Ascent of European Patent Trolls "IndyWatch Feed Tech"

Summary: The existing status of GNU/Linux in a world full of patent trolls, which not only target OEMs from Asia typically in the US but are also dragging them into Europe, aided by the EPOs patent bubble

THE FREE/LIBRE software world is thriving. Its spreading everywhere. But that does not mean that users of such software are protected from frivolous lawsuits, especially in countries where software patents exist. Developers too are occasionally being threatened or sued; we have given examples where projects got shut down due to these actions.

Readers might rightly wonder why we havent said a single thing about Red Hats latest press release; we instead included about a dozen stories in our daily links under the Red Hat section (not much new there, just reiteration of a promise from a decade and a half ago). We are more concerned about real, existing, potent threats to software.

According to todays blog post from IAM, Microsofts patent troll Nathan Myhrvold now dominates the worlds largest troll, Intellectual Ventures. IAM is a fan of his and this is what it wrote:

Intellectual Ventures founder Greg Gorder has left the firm, becoming the latest of the quartet of its founders to step away from the business, following Peter Detkin and Ed Jung. According to his bio, which remains on the IV website, Gorder left earlier this month and will now focus on his familys philanthropic activities.

Detkin stood down as vice chairman in January 2015, although he has continued to devote part of his time to IV-related work. Earlier this year he became a senior adviser to Sherpa Technology Group, the consulting business that was established by former VP of IP at IBM and IP Hall of Fame member Kevin Rivette. Jung also took on a new role at the start of the year, becoming CEO of Xinova, the innovation business that was spun out of IV in 2016.

Intellectual property is the next software, Myhrvold once said. It means that to him its all about patents. This Microsoft-connected patent troll is already suing quite a few companies that distribute BSD and/or GNU/Linux. Its not a matter of if or when. The battle began years ago, but Intellectual Ventures operates through v...

22:11

Roku Is Building Its Own Anti-Piracy Team "IndyWatch Feed Tech"

Online streaming piracy is on the rise and many people use dedicated media players to watch unauthorized content through their regular TV.

Although the media players themselves can be used for perfectly legal means, third-party add-ons turn them into pirate machines, providing access to movies, TV-shows and more.

The entertainment industry isnt happy with this development and is trying to halt further growth wherever possible.

Just a few months ago, Roku was harshly confronted with this new reality when a Mexican court ordered local retailers to take its media player off the shelves. This legal battle is still ongoing, but its clear that Roku itself is now taking a more proactive role.

While Roku never permitted any infringing content, the company is taking steps to better deal with the problem. The company has already begun warning users of copyright-infringing third-party channels, but that was only the beginning.

Two new job applications posted by Roku a few days ago reveal that the company is putting together an in-house anti-piracy team to keep the problem under control.

One of the new positions is that of Director Anti-Piracy and Content Security. Roku stresses that this is a brand new position, which involves shaping the companys anti-piracy strategy.

The Director, Anti-Piracy and Content Security is responsible for defining the technology roadmap and overseeing implementation of anti-piracy and content security initiatives at Roku, the application reads.

This role requires ability to benchmark Roku against best practices (i.e. MPAA, Studio & Customer) but also requires an emphasis on maintaining deep insight into the evolving threat landscape and technical challenges of combating piracy.

The job posting

The second job listed by Roku is that of an anti-piracy software engineer. One of the main tasks of this position is to write software for the Roku to monitor and prevent piracy.

In this role, you will be responsible for implementing anti-pira

22:00

Making a Gun Without a 3D Printer "IndyWatch Feed Tech"

Around four years ago the world was up in arms over the first gun to be 3D printed. The hype was largely due to the fact that most people dont understand how easy it is to build a gun without a 3D printer. To that end, you dont even need access to metal stock, as [FarmCraft101] shows us with this gun made out of melted aluminum cans.

The build starts off by melting over 200 cans down into metal ingots, and then constructing a mold for the guns lower. This is the part that is legally regulated (at least in the US), and all other parts of a gun can be purchased without any special considerations. Once the aluminum is poured into the mold, the rough receiver heads over to the machine shop for finishing.

This build is fascinating, both from a machinists and blacksmiths point-of-view and also as a reality check for how easy it is to build a firearm from scratch provided the correct tools are available. Of course, we dont need to worry about the world being taken over by hoards of angry machinists wielding unlicensed firearms. Theres a lot of time and effort that goes into these builds and even then they wont all be of the highest quality. Even the first 3D printed guns only fired a handful of times before becoming unusable, so it seems like any homemade firearm, regardless of manufacturing method, has substantial drawbacks.

Thanks to [Rey] for the tip!


Filed under: tool hacks

21:50

Shelston IP Blames Well-Organised and Appropriately-Connected Open Source Lobby for Ban on Software Patents "IndyWatch Feed Tech"

Shelston IPSummary: The activism is working and foes of programmers are feeling the pressure, for software patents are being more explicitly banned in some countries

THANKFULLY enough, New Zealands software industry (i.e. developers) managed to keep software patents away. The same is true, to some degree, in Australia (we wrote some articles about that a few weeks ago). We have covered the subject very closely for many years and it last intensified again a couple of years ago when Shelston IP et el basically a bunch of self-serving liars (lying about the software industry) reared their ugly heads again [1, 2, 3, 4]. No doubt they will keep on trying again and again until they get their way (if ever).

It is now blaming FOSS by name for the de facto software patents ban (loopholes notwithstanding).A couple of days ago Shelston IP had another go at it. It is now blaming FOSS by name for the de facto software patents ban (loopholes notwithstanding). The whole thing was largely due to a well-organised and appropriately-connected open source lobby however, the change of Government and its amenability to such campaigning cannot be ruled out as a contributing factor.

Last year we wrote a lot of articles about the Productivity Commission of Australia, whose suggestions were more officially adopted only weeks ago, in defiance of pressure from law firms (whose agenda is altogether different; theyre patent maximalists).

Writing from Australia, here is...

21:21

Enterprise cloud adoption and IaaS security "IndyWatch Feed Tech"

Barracuda Networks and research firm Vanson Bourne polled 300 IT decision makers from organizations across the US on their use of public cloud Infrastructure as a Service (IaaS). Survey results Respondents included IT professionals across small, medium, and large-sized organizations, and their answers paint the following picture: Respondents currently run 44 percent of their infrastructure in the public cloud, but expect this percentage to increase to 75.57% in five years 74 percent of respondents state More

21:00

Startup: LPPFusion Embraces Instability "IndyWatch Feed Tech"

Rather than fighting to control plasma, this startups device exploits instabilities to fuse atoms Photos: LPPFusion (2)

img img Photos: LPPFusion (Almost) Tabletop Fusion: The heart of LPPFusions device is a vessel filled with gaseous fuel at low pressure [top]. Inside, a blast of current down a set of electrodes turns the gas into plasma. Instabilities fuse plasma atoms [bottom].

Since nuclear fusions earliest days, the sun has served as the ultimate prototype. Its the closest continuously functioning large-scale fusion reactor, after all. Why not copy from the best? So tokamaks, stellarators, and laser ignition facilities all strive to create high-pressure and high-temperature plasmas that behave like microcosms of the suns core.

One of the biggest challenges these systems face is achieving the tight control they require over the plasma fuel they seek to fuse. But one New Jersey fusion startup company is taking a very different tack: Guide the plasmas instability; dont fight it, says Eric Lerner, president and chief scientist at LPPFusion, based in Middlesex, N.J.

LPPFusion is building what it calls a Dense Plasma Focus (DPF) device. This consists of a thick, hollow central anode surrounded by a ring of cathodes that are about the size and shape of candles. And indeed, the whole thing looks rather like a candelabra.

Heres how its supposed to work: The device sits in a chamber filled with the gas to be fused at a low pressure, while a bank of external capacitors blast pulses of electricity down the electrodes, forming a plasma from the gas. In a millionth of a second, the electric blast reaches the top of the electrodes, and natural instabilities produce filaments of plasma. The pulse of current reaches the end of the electrodes, and the filaments combine and collapse near the mouth of the cathode. This produces microscopic balls of plasma called plasmoids. Further instabilities in the plasmoids produce electron beams, which heat up the plasmoids to the temperatures required for fusion.

Still under peer review as of press time was a paper submitted to the journal Physics of Plasmas,...

...

20:59

A SoylentNews Reader Reviews Firefox Developer Edition 57.0b1 "IndyWatch Feed Tech"

I knew this day would eventually come. We had been warned that Firefox 57 would force some significant changes on us users, including the removal of support for extensions that did not conform to the WebExtensions model, along with the introduction of the new Photon user interface appearance.

Although I have always only wanted to run the stable releases, long ago I had been forced to run the Developer Edition of Firefox just so I could easily use some extensions I had written on my own. Now Firefox was showing me that an update to Firefox 57.0b1 was available. Should I do it? Should I install this update? I debated with myself for several minutes. But in the end I knew I would have no choice. I would at some point have to update to Firefox 57 if I wanted to keep receiving security fixes and other important updates. So I did it. I upgraded to Firefox Developer Edition 57.0b1.

Read more of this story at SoylentNews.

20:54

Experian Flaw Lets Attacker Obtain Credit Freeze PIN and Access Account "IndyWatch Feed Tech"

By Waqas

Plenty of consumers decided to go for a credit freeze

This is a post from HackRead.com Read the original post: Experian Flaw Lets Attacker Obtain Credit Freeze PIN and Access Account

20:43

The EPOs Latest Lies About the UPC and SMEs Unraveled, Long-Term Plan Described as Daunting "IndyWatch Feed Tech"

Battistelli sets up Europe for patent trolls and abuse

Troll bookSummary: The vision of Battistelli and the latest lies (about SMEs) are being criticised anonymously for fear of retaliation as Europe braces for impact with patent trolls from all around the world

THE EPO has sunk to new lows this week, at least as far as lying is concerned. As we said last night, one must now assume that everything the EPOs management says is a lie. Its almost always the case (and were barely exaggerating).

Look at the EPOs Twitter account. When they dont post template promotions (e.g. of some upcoming event or section of the site) they just carry on with the usual nonsense. Earlier today the EPO wrote: The very first guide for obtaining, maintaining and managing Unitary Patents is out: http://bit.ly/2xuHsjV pic.twitter.com/Wl4xuQjUWC

Remember that EPO examiners are smart people. They are very well educated and they obviously know all the above. They know when theyre being lied to by the management and are conscious when the management lies in their name/on their behalf.So I responded: Why put out a guide for a system that does not exist and probably will never exist?

Later on they wrote: See if and where a patent has been granted, if it is valid, if there is still time to challenge it, etc. All here: http://bit.ly/2uVaOpR

They also wrote: Want to know more about the opposition procedure at the EPO? This course will help

I told them that Battistelli [had] narrowed [the] oppositions window, attacked the appeal board/s, forced examiners to issue many bogus patents (as leaks serve to reaffirm).

Its getting very frustrating to work as a patent examiner, no matter the level of compensation (salary).Remember that EPO examiners are smart people. They are very well educated and they obviously know all the above. They know when theyre being lied to by the management and are conscious when the management lies in their name/on their behalf. Th...

20:37

Report: T-Mobile, Sprint close to merger agreement "IndyWatch Feed Tech"

T-Mobile and Sprint are close to an agreement on a major wireless merger, Reuters reported on Friday.The deal would revive an effort that was abandoned in 2014 amid tough regulatory hurdles under President Obama. The Trump administration since...

20:30

Hackaday Prize Entry: HaptiVision Creates a Net of Vibration Motors "IndyWatch Feed Tech"

HaptiVision is a haptic feedback system for the blind that builds on a wide array of vibration belts and haptic vests. Its a smart concept, giving the wearer a warning when an obstruction comes into sensor view.

The earliest research into haptic feedback wearables used ultrasonic sensors, and more recent developments used a Kinect. The project team for HaptiVision chose the Intel RealSense camera because of its svelte form factor. Part of the goal was to make the HaptiVision as discreet as possible, so fitting the whole rig under a shirt was part of the plan.

In addition to a RealSense camera, the team used an Intel Up board for the brains, mostly because it natively controlled the RealSense camera. It takes a 640480 IR snapshot and selectively triggers the 128 vibration motors to tell you whats close. The motors are controlled by 8 PCA9685-based PWM expander boards.

The project is based on David Antn Snchezs OpenVNAVI project, which also featured a 128-motor array. HaptiVision aims to create an easy to replicate haptic system. Everything is Open Source, and all of the wiring clips and motor mounts are 3D-printable.

The HackadayPrize2017 is Sponsored by:
Digi-Key
Supplyframe
Microchip
Texas Instruments

Filed under: The Hackaday Prize ...

20:04

userdel: user vivek is currently used by process 749 error and fix on Linux "IndyWatch Feed Tech"

I am trying to delete a user named vivek using the userdel command as follows
userdel -r vivek userdel: user vivek is currently used by process 749

How do I fix this problem and delete username vivek on a Debian Linux 9.x server?

20:00

Your phone can now be turned into an ultrasound sonar tracker against you and others "IndyWatch Feed Tech"

radar-sonar-closeup-1280x720-istockphoto

Global:New research shows how a mobile phone can be turned into a passive indoor ultrasound sonar, locating people with high precision indoors using multi-target echolocation, and is even able to discern a rough selection of activities. It does this by overlaying imperceptible ultrasound sonar pings into played-back music, measuring the reflections coming back to the phones microphone. The privacy implications are staggering.

By emitting inaudible ultrasound pings as part of normal music playback, a phone can be turned into a passive sonar device, researchers from the University of Washington show in a new paper. It can track multiple individuals at an indoor precision of 8 centimeters (3 inches), and detect different types of activity by the people in its detection zone even through barriers, all using a normal smartphone.

People with military technology background will recognize this as next-generation passive covert radar systems, radar systems which dont transmit, but which detect objects in the sky from changes to reflection patterns from everpresent civilian transmitters such as radio and TV towers. The primary advantage of passive covert radars is that they cant be detected, as they only contain very sensitive receivers, no transmitters. This phone research appear to be using the same kind of technology, except it is also used as a transmitter of ultrasound pings; however, it would be trivial to separate the transmitter of pings from the receiver of the reflected patterns.

We achieve this by transforming a smartphone into an active sonar system that emits a combination of a sonar pulse and music and listens to the reflections off of humans in the environment. Our implementation, CovertBand, monitors minute changes to these reflections to track multiple people concurrently and to recognize different types of motion, leaking information about where people are in addition to what they may be doing.

The researchers are straightforward about the privacy threat that this technology poses: There are privacy leaks possible with todays devices that go beyond the ability to simply record conversations in the home. For example, what if an attacker could remotely co-opt your television to t...

20:00

Carbon Nanotube Thread Could Generate Electricity From The Bloodstream "IndyWatch Feed Tech"

Researchers have reported an idea to implant nanotube yarns that could draw electricity from flowing blood Image: Fudan University/Wiley

To power wearable electronics, engineers have for years been tinkering with ways to generate electricity from our bodies. Theyve cooked up schemes to convert heartbeats, footsteps, and muscle motions into electricity.

Now a team from Fudan University in China has come up with a method for generating electricity from blood flow using a tiny fiber spun from carbon nanotubes. The idea is that the fiber could be implanted in a blood vessel to harvest the energy from flowing blood. Theyve presented the rudimentary concept in Angewandte Chemie , and havent tested the device in animals yet.

To make the 0.8-millimeter-diameter fibers, they either wrap a plastic fiber with an ordered array of carbon nanotubes, or simply twist a carbon nanotube sheet to make a yarn-like thread.

As the solution flows past, negative ions in the solution and electrons drawn from the nanotubes try to balance out the electric double layer. But they dont quite succeed: more charge builds up at the front of the flow. And this leads to a potential difference between the two ends of the fiber, generating voltage and electric current. Other teams have made nanotube-based yarns that generate electricity when twisted and stretched.

When the fiber is put in a tube that is connected on each end with a copper wire and has salty fluid flowing through it, it generates power with an efficiency of over 23 percent. This is higher than previously reported fiber-shaped energy harvesting devices, the researchers say. The electrical output is higher with longer fibers, faster-flowing liquid, and more concentrated salt solution.

A 30-centimeter-long device generates...

19:52

Is your router sending out spam? "IndyWatch Feed Tech"

A Linux Trojan that has been infecting IoT devices for half a year and made them run a SOCKS proxy server has now acquired spam-sending capabilities. About Linux.ProxyM Doctor Web virus analysts first documented Linux.ProxyM back in February 2017, and posited that cybercriminals use this Trojan to ensure online anonymity. With the latest upgrade, they can also earn money by sending out spam. Two builds of this Trojan exist for devices possessing the following architectures: More

19:48

RADV Vulkan vs. RadeonSI OpenGL Performance With Linux 4.13 + Mesa 17.3-dev "IndyWatch Feed Tech"

It's been a few weeks since last delivering any large RADV/RadeonSI open-source AMD Linux graphics benchmark results due to being busy with testing other hardware as well as battling some regressions / stability problems within the AMDGPU DRM code and Mesa Git. But with Linux 4.13 stable and the newest Mesa 17.3-dev code, things are playing well so here are some fresh OpenGL vs. Vulkan benchmarks on three Radeon graphics cards.

19:32

Crooks using Linux.ProxyM IoT botnet to send spam messages "IndyWatch Feed Tech"

Experts at security firm Doctor Web discovered a new botnet of IoT devices leveraging the Linux.ProxyM, that is used by crooks for mass spam mailings.

The most popular thingbot since now is the Mirai, but it isnt the only one targeting Linux-based internet-of-things (IoT) devices.

Researchers with security firm Doctor Web discovered a new botnet of IoT devices leveraging the Linux.ProxyM, that is used by crooks for mass spam mailings.

Experts first analyzed the Linux.ProxyM in July, it was used to create a proxy network through SOCKS proxy server on infected devices that are used to relay malicious traffic, disguising his real source.

The Trojan has been noted since February 2017 but peaked in late May as reported in the chart below.

Linux malware proxym_en.2

According to Dr. Web, the number of devices infected with Linux.ProxyM reached 10,000 units in July since its discovery in February 2017.

Recently the Linux.ProxyM trojan has recently been updated to add mas spam sending capabilities to earn money.

The number of malicious programs capable of infecting smart Linux devices is constantly increasing. A major portion of them is designed to mount DDoS attacks and ensure online anonymity. Research conducted by Doctor Webs specialists has revealed that cybercriminals are using such Linux Trojans for mass mailings. reads the analysis from Dr. Web.

The malware is capable of detecting honeypots in order to hide from malware researchers and can operate on almost any Linux device, including routers, set-top boxes, and other equipment.

Experts identified two builds of this Linux.ProxyM Trojan for devices based on x86, MIPS, MIPSEL, PowerPC, ARM, Superh, Motorola 68000, and SPARC architectures.

Once the Linux.ProxyM infects a device, it connects to a command and con...

19:29

Special Relativity and Classical Field Theory "IndyWatch Feed Tech"

For quite a while Leonard Susskind has been giving some wonderful courses on physics under the name The Theoretical Minimum, pitched at a level in between typical popularizations and standard advanced undergraduate courses. This is a great idea, since there is not much else of this kind, while lots of people inspired by a popular book could use something more serious to start learning what is really going on. The courses are available as Youtube lectures here.

The third book in the series (also with Art Friedman) is about to appear. Its entitled Special Relativity and Classical Field Theory, and is in much the same successful style as the first two books. Robert Crease has a detailed and very positive review in Nature which does a good job of explaining whats in the book and which Id mostly agree with.

The basic concept of the book is to cover special relativity and electromagnetism together, getting to the point of understanding the behavior of electric and magnetic fields under Lorentz transformations, and the Lorentz invariance properties of Maxwells equation. Along the way, theres quite a lot of the usual sort of discussion of special relativity in terms of understanding what happens as you change reference frame, a lot of detailed working out of gymnastics with tensors, and some discussion in the Lagrangian language of the Klein-Gordon equation as a simpler case of a (classical) relativistic field theory than the Maxwell theory. Much of what is covered is clearly overkill if you just want to understand E and M, but undoubtedly is motivated by his desire to go on to general relativity in the next volume in this series.

At various points along the way, the book provides a much more detailed and leisurely explanation of crucial topics that a typical textbook would cover all too quickly. This should be very helpful for students (perhaps the majority?) who have trouble following whats going on in their textbooks or course due to not enough detail or motivation. Besides non-traditional students in a course of self-study, the book may be quite useful for conventional students as a supplemen...

19:27

Former Football Star Aaron Hernandez's Brain Found to Have Severe CTE "IndyWatch Feed Tech"

Former New England Patriots tight end Aaron Hernandez, who committed suicide a week after being acquitted of double homicide, has been found to have had severe signs (original AP text) of chronic traumatic encephalopathy (CTE). Hernandez's brain had been released to Boston University by his family for study. In 2015, Hernandez was found guilty for the murder of Odin Lloyd and automatically sentenced to life in prison without a possibility of parole:

Tests conducted on the brain of former football star Aaron Hernandez showed severe signs of the degenerative brain disease chronic traumatic encephalopathy, and his attorney said Thursday that the player's daughter is suing the NFL and the New England Patriots for leading Hernandez to believe the sport was safe.

In a news conference at his offices, Hernandez's attorney, Jose Baez, said the testing showed one of the most severe cases ever diagnosed. "We're told it was the most severe case they had ever seen for someone of Aaron's age," Baez said. Hernandez was 27 when he killed himself in April. Dr. Ann McKee, the director of the CTE Center at Boston University, concluded that the New England Patriots tight end had stage 3 of 4 of the disease and also had early brain atrophy and large perforations in a central membrane.

[...] A week before his suicide, Hernandez was acquitted in the 2012 drive-by shootings of two men in Boston. Prosecutors had argued that Hernandez gunned the two men down after one accidentally spilled a drink on him in a nightclub, and then got a tattoo of a handgun and the words "God Forgives" to commemorate the crime.

Baez said he deeply regretted not raising the issue of Hernandez's having CTE during his murder trials. He said the defense team did not blame CTE for the murders because Hernandez's defense was actual innocence.

Previously: NFL Acknowledges Link Between American Football and CTE
What if PTSD is More Physical Than Psychological?
A...

19:15

Passwords For 540,000 Car Tracking Devices Leaked Online "IndyWatch Feed Tech"

Another day, another news about a data breach, though this is something disconcerting. Login credentials of more than half a million records belonging to vehicle tracking device company SVR Tracking have leaked online, potentially exposing the personal data and vehicle details of drivers and businesses using its service. Just two days ago, Viacom was found exposing the keys to its kingdom on

19:01

Ask Hackaday: Security Questions And Questionable Securities "IndyWatch Feed Tech"

Your first school. Your mothers maiden name. Your favorite color. These are the questions were so used to answering when weve forgotten a password and need to get back into an account. Theyre not a password, yet in many cases have just as much power. Despite this, theyre often based on incredibly insecure information.

Sarah Palins Yahoo account is perhaps the best example of this. In September 2008, a Google search netted a birthdate, ZIP code, and where the politician met her spouse. This was enough to reset the accounts password and gain full access to the emails inside.

While were not all public figures with our life stories splashed across news articles online, these sort of questions arent exactly difficult to answer. Birthdays are celebrated across social media, and the average online quiz would net plenty of other answers. The problem is that these questions offer the same control over an account that a password does, but the answers are not guarded in the same way a password is.

For this reason, I have always used complete gibberish when filling in security questions. Whenever I did forget a password, I was generally lucky enough to solve the problem through a recovery e-mail. Recently, however, my good luck ran out. It was a Thursday evening, and I logged on to check my forex trading account. I realised I hadnt updated my phone number, which had recently changed.

Upon clicking my way into the account settings, I quickly found that this detail could only be changed by a phone call. I grabbed my phone and dialed, answering the usual name and date of birth questions. I was all set to complete this simple administrative task! I was so excited.

Thanks Lewin, Ill just need you to answer your security question.

Oh no.

The question is Chutney butler?

Yes. Yes it is. Uh

would you like to guess?

Needless to say, I didnt get it.

I was beginning to sweat at this point. To their credit, the call center staffer was particularly helpful, highlighting a number of ways to recover access to the account. Mostly involving a stack of identification documents and a visit to the nearest office. If anything, it was a little reassuring that my account details required such effort to change. Perhaps the cellular carriers of the world could learn a thing or two.

In the end, I realised that I could change my security question with my regular password, an...

18:43

Spoofed IRS notice delivers RAT through link updating trick "IndyWatch Feed Tech"

The malware delivery trick involving updating links in Word documents is apparently gaining some traction: the latest campaign to use it likely takes the form of fake emails from the Internal Revenue Service (IRS). The fake email includes an attachment, supposedly a CP2000 notice, which is sent by the IRS when the income and/or payment information they have on file doesnt match the information the person reported on his or her tax return. This mismatch More

18:14

Linux Trojan Using Hacked IoT Devices to Send Spam Emails "IndyWatch Feed Tech"

Botnets, like Mirai, that are capable of infecting Linux-based internet-of-things (IoT) devices are constantly increasing and are mainly designed to conduct Distributed Denial of Service (DDoS) attacks, but researchers have discovered that cybercriminals are using botnets for mass spam mailings. New research conducted by Russian security firm Doctor Web has revealed that a Linux Trojan,

18:14

How to find bash shell function source code on Linux/Unix "IndyWatch Feed Tech"

I am a new Linux server user. I cannot figure out how to find out the source code of a bash function named foo() which is defined. How to locate the file where a bash function is defined and how to view the source code of foo() from shell prompt itself?

18:00

For the First Time, Signal Transfer Between Molecules Has Been Achieved "IndyWatch Feed Tech"

Molecular computing reaches another milestone Image: Nanchang University/Nature Nanotechnology STM image of all the initial -form molecules in the middle row that changed into the -form owing to a single manipulation

The history of molecular computing and electronics has been a long and twisting roadone that was meticulously catalogued on the pages of IEEE Spectrum two years ago. While the future of molecular electronics and computing remains somewhat up in the air, a great deal of research is still being focused on the field.

There have been proof-of-concept molecular switches, molecular data storage bits, and diodes.  However, one fundamental issue that has not been resolved is the transfer and exchange of signals between molecular devices for complex signal processing at room temperature.

Now researchers at Nanchang University in China have described, in the journal Nature Nanotechnology , a device that uses a particular kind of molecule that takes on two specific geometries when in contact with a copper surface. These two geometries can serve as the 0 and 1 of digital logic.

The work is based on a phenomenon known as in-plane molecular orientation, which occurs when an organic molecule lands on a solid surface. This adsorbed molecule might take different adsorption geometries. These adsorption geometries can be classified into several groups.

In our case, the molecule we used has two distinguished adsorption geometries on a copper surface, explained Li Wang, professor of physics at Nanchang University, in an e-mail interview with IEEE Spectrum. One is left-handed, the other is right handed. For the purposes of data storage or transfer, We define left-handed geometry as 1 and the right-handed geometry as 0, added Wang.

Wang and his colleagues discovered that the in-plane orientation of a molecule could be controlled by the in-plane orientations of two neighboring molecules due to their intermolecular interactions. The researchers exploited this intermol...

17:43

Pimax Launches Kickstarter for "8K" Virtual Reality Headset "IndyWatch Feed Tech"

While the headsets have a listed refresh rate of 90 Hz, Pimax claims that its "Brainwarp" software technique can effectively double the perceived frame rate:

You may be asking yourself how a VR-ready gaming computer could possibly drive these sorts of graphically demanding resolutions. Pimax's answer is a software technique they call 'Brainwarp', which renders a 4K image only on a single display at time, doing it 150/180 times per second. Pimax says users "perceive a complete 8K at 150/180 Hz with high frame rate," and that it "boosts refresh rate, reduces latency and decreases GPU pressure for Pimax 8K."

Pimax showed off its headset prototypes at CES in January. The company is also developing modular accessories for its headsets.

Just 4.73 times more pixels to reach the "ideal" resolution.


Original Submission

Read more of this story at SoylentNews.

17:42

Modifying Neutrophil Behavior for Stroke Recovery "IndyWatch Feed Tech"

The immune system is like an army keeping us safe from invasion, injury and infection and helps us to regenerate and repair tissues and organs. However, the immune system is sometimes a double-edged sword that does more harm than good.

A lot of focus has been on the role of macrophages and their ability to facilitate tissue healing and regeneration. Today, we will be looking at a study that examines the role of neutrophils and how they can actually harm the brain further following a stroke[1].

17:30

Customizable PCB Business Card "IndyWatch Feed Tech"

[Corey Harding] designed his business card as a USB-connectable demonstration of his skill. If potential manager inserts the card in a USB drive, open a text editor, then touches the copper pad on the PCB, [Corey]s contact info pops up in the text box.

In addition to working as a business card, the PCB also works as a Tiny 85 development board, with a prototyping area for adding sensors and other components, and with additional capabilities broken out: you can add an LED, and theres also room for a 1K resistor, a reset button, or break out the USBs 5V for other uses. Theres an AVR ISP breakout for reflashing the chip.

Coolly, [Corey] intended for the card to be an Open Source resource for other people to make their own cards, and hes providing the Fritzing files for the PCB. Fritzing is a great program for beginning and experienced hardware hackers to lay out quick and dirty circuits, make wiring diagrams, and even export PCB designs for fabrication. You can download [Corey]s files from his GitHub repository.

For another business card project check out this full color business card we published last month.


Filed under: Arduino Hacks

17:24

Dip update 89/n "IndyWatch Feed Tech"

[Orig: Sept 22, 2017]
Hi everyone,
Below are the newest data from LCO at TFN and OGG, showing that we are sitting around normal brightness.  Also note that I have slightly changed some of the plot settings so the graph is easier to read (hopefully).  
Best,
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      

17:24

Security updates for Friday "IndyWatch Feed Tech"

Security updates have been issued by CentOS (augeas, samba, and samba4), Debian (apache2, bluez, emacs23, and newsbeuter), Fedora (kernel and mingw-LibRaw), openSUSE (apache2 and libzip), Oracle (kernel), SUSE (kernel, spice, and xen), and Ubuntu (emacs24, emacs25, and samba).

17:20

New infosec products of the week: September 22, 2017 "IndyWatch Feed Tech"

Cyber-defense for critical infrastructure including factories, plants, utilities & hospitals NTT Security has launched IT/OT Integrated Security Services, delivered via a combination of both Consulting Services (CS) and Managed Security Services (MSS). CS visualize components and potential risks of an industrial control system, and provides effective and efficient security measures. MSS provides proactive defense for industrial control system by continuously monitoring, detecting and blocking a cyberattack. WhiteHat Scout reinvents the way developers create secure software More

17:00

Lidar-Equipped Autonomous Wheelchairs Roll Out in Singapore and Japan "IndyWatch Feed Tech"

No more waiting for an orderly to see you out, or an attendant to see you to your gate Photo: Panasonic

img
Photo: Panasonic The Uber of Wheelchairs: At Haneda Airport in Tokyo, people with disabilities will be able to hail autonomous wheelchairs using a smartphone app that lets them select a destination, sit back, and relax.

Autonomous vehicles can add anew member to their ranksthe self-driving wheelchair. This summer, two robotic wheelchairs made headlines: one at a Singaporean hospital and another at a Japanese airport.

The Singapore-MIT Alliance for Research and Technology, or SMART, developed the former, first deployed in Singapores Changi General Hospital in September 2016, where it successfully navigated the hospitals hallways. It is the latest in a string of autonomous vehicles made by SMART, including a golf cart, an electric taxi, and most recently, a scooter that zipped more than 100 MIT visitors around on tours in 2016.

The SMART self-driving wheelchair has been in development since January 2016, says Daniela Rus, director of MITs Computer Science and Artificial Intelligence Laboratory and a principal investigator in the SMART Future Urban Mobility research group. Today, SMART has two wheelchairs in Singapore and two wheelchairs at MIT being tested in a variety of settings, says Rus.

The robots computer uses data from three lidars to make a map. A localization algorithm then determines where the smart chair is on the map. The chairs six wheels lend stability, and the chair is designed to make tight turns and fit through normal-size doorframes. When we visited several retirement communities, we realized that the quality of life is dependent on mobility. We want to make it really easy for people to move around, said Rus in a recent MIT statement.

A s...

16:40

Vintage Voyager: Online Video Resources "IndyWatch Feed Tech"

With Voyager on my mind because of its recent anniversary, I had been exploring the Internet landscape for archival footage. But Ioannis Kokkinidis made my search unnecessary with the following essay, which links to abundant resources. The author of several Centauri Dreams posts including Agriculture on Other Worlds, Ioannis holds a Master of Science in Agricultural Engineering from the Department of Natural Resources Management and Agricultural Engineering of the Agricultural University of Athens. He went on to obtain a Mastre Spcialis Systmes dinformations localises pour lamnagement des territoires (SILAT) from AgroParisTech and AgroMontpellier and a PhD in Geospatial and Environmental Analysis from Virginia Tech. Now a resident of Fresno CA, Ioannis tells us in addition how a lifelong interest in space exploration was fed by the Voyager mission and its continuing data return. 

by Ioannis Kokkinidis

Introduction

Back in the end of August 1989, when I was 9 years old and the whole family was on vacation, the Greek press set aside momentarily its coverage of the continuing shenanigans of Greek politics and the rapidly changing situation to the north of our borders due to the collapse of communism and instead put Voyager 2s encounter with Neptune in its front pages. My late grandfather was an avid reader of newspapers, which I would also read afterwards. I devoured what I could get my hands on, which alas was not much, it was after all August.

The next year my family moved to California for two years, my father was a visiting professor at UCSF, and I read all the books and magazines about space I could find in the public libraries. I even discovered NASAs Spacelink, a NASA public education computer service hosted by the Marshall Space Flight Center in Alabama, containing mostly NASA press releases, and I would dial in with our PC XTs 2400 bps modem. However feeding my space interest was a privilege and my parents made me do a thing I truly dreaded in exchange for dialing the long distance number and indulging myself: play the piano.

After we returned to Greece keeping myself appraised of the latest space developments proved difficult since there is very little popular scientific press in Greece and the mainstream press is not that interested in space. When I got our first internet connection NASAs Spacelink, now a website, was still up, it still had similar content, though more importantly the releases now included in the bottom instructions on how to g...

16:19

Russia denies use of Facebook ads in 2016 election "IndyWatch Feed Tech"

Russia's government on Friday denied using Facebook ads to influence the 2016 U.S. presidential election, saying in a statement it didn't even know "how to place an advert" on the social media giant.We do not know ... how to place an advert on...

16:15

CVE-2017-14489: Linux kernel: scsi: nlmsg is not properly parsed in iscsi_if_rx() "IndyWatch Feed Tech"

Posted by Vladis Dronov on Sep 22

Heololo,

It was found that the iscsi_if_rx() function in 'drivers/scsi/scsi_transport_iscsi.c'
in the Linux kernel since v2.6.24-rc1 through 4.13.2 allows local users to cause
a denial of service (a system panic) by making a number of certain syscalls by
leveraging incorrect length validation in the kernel code.

Our tests show that indeed an unprivileged local user can easily cause (i.e. run a binary)
a system panic or a compete lock...

16:09

Distrustful U.S. Allies Force Spy Agency to Back Down in Encryption Fight "IndyWatch Feed Tech"

An international group of cryptography experts has forced the U.S. National Security Agency to back down over two data encryption techniques it wanted set as global industry standards, reflecting deep mistrust among close U.S. allies.

In interviews and emails seen by Reuters, academic and industry experts from countries including Germany, Japan and Israel worried that the U.S. electronic spy agency was pushing the new techniques not because they were good encryption tools, but because it knew how to break them.

The NSA has now agreed to drop all but the most powerful versions of the techniques - those least likely to be vulnerable to hacks - to address the concerns.

Have the chickens come home to roost for the NSA, or should we distrust the report that they backed down?


Original Submission

Read more of this story at SoylentNews.

16:07

CCleaner Backdoor Attack: A State-sponsored Espionage Campaign "IndyWatch Feed Tech"

By Waqas

Infected CCleaner Software Attack that Affected 700,000 Customers is part

This is a post from HackRead.com Read the original post: CCleaner Backdoor Attack: A State-sponsored Espionage Campaign

16:00

VPSslim VPS+Dedicated Server offers! "IndyWatch Feed Tech"

Hey LowEndBox community! The guys over at VPSslim sent over an offer today and were pleased to have them back. Theyve been posted quite a few times, going all the way back to 2012, but we havent had anything from them since 2015. Theyve always had good reviews and support, so were happy to have a new offer to share.

VPSslim is a registered company in the Netherlands (52966887), their WHOIS is public, and you can find their ToS/Legal Docs here.  As method of payment, you can use: iDEAL, Creditcard, PayPal, Bitcoin, alt coins (50 different coins), & Wire transfer.

In their own words: 

VPSslim has been active in the hosting business for quite a while now. In that time we have become a major player in the field of virtual private server hosting. VPSslim is a profitable, healthy and independent company. When ordering a VPS, you can count on years of experience, professional and friendly staff and advanced equipment. We put all our knowledge and experience together to bring you the best hosting experience possible. Do you have a question, problem or comment? Our helpdesk can be reached 24 hours a day, 7 days a week via email or social media.

The offers: 

VPS OFFER:

4096MB RAM
 4096MB Swap
2x vCPU
200GB HDD space
5TB transfer
1Gbps uplink
1x IPv4
/64 IPv6
OpenVZ/SolusVM
Coupon: LEBEXCLUSIVE
$5/month
$40/year
[ORDER NOW] 


DEDICATED SERVER OFFER:

16GB RAM
Intel Xeon E3-1230v5 CPU
2x 1TB hard drives
Software RAID
25TB transfer
1Gbps uplink
/32 IPv4
/48 IPv6
IPMI: yes
Coupon: LEBEXCLUSIVE
$49/month
[ORDER NOW]


NETWORK INFO:

Datacenter Serverius Netherlands, Meppel
Test IPv4: 185.109.144.5
Test IPv6: ::1
Test file: 100mb.bin
Looking glass:...

16:00

Network Analysers: The Electrical Kind "IndyWatch Feed Tech"

Instrumentation has progressed by leaps and bounds in the last few years, however, the fundamental analysis techniques that are the foundation of modern-day equipment remain the same. A network analyzer is an instrument that allows us to characterize RF networks such as filters, mixers, antennas and even new materials for microwave electronics such as ceramic capacitors and resonators in the gigahertz range. In this write-up, I discuss network analyzers in brief and how the DIY movement has helped bring down the cost of such devices. I will also share some existing projects that may help you build your own along with some use cases where a network analyzer may be employed. Lets dive right in.

Network Analysis Fundamentals

As a conceptual model, think of light hitting a lens and most of it going through but part of it getting reflected back.

The same applies to an electrical/RF network where the RF energy that is launched into the device may be attenuated a bit, transmitted to an extent and some of it reflected back. This analysis gives us an attenuation coefficient and a reflection coefficient which explains the behavior of the device under test (DUT).

Of course, this may not be enough and we may al...

15:59

Pitivi 1.0 Release Candidate Arrives "IndyWatch Feed Tech"

The Pitivi open-source non-linear video editor has been in development for thirteen years while its v1.0 release is finally near...

15:58

Uber getting booted from London "IndyWatch Feed Tech"

Uber is losing its license to operate in London, its biggest market, according to the citys transportation authority.Transport for London (TfL) said on Friday that it will not renew the ride-hailing services license to operate in the city when it...

15:39

Satanic Fashion Show Inside a Church at London Fashion Week "IndyWatch Feed Tech"

Via: Vigilant Citizen: Turkish designer Dilara Findikoglus presented her Spring/Summer 2018 collection at London Fashion Week and it was nothing less than a satanic Black Mass. Indeed, the event took place at the altar of St Andrew Church in London and incorporated heavy occult and satanic symbolism. In short, the event summed up everything the []

15:38

Security Tools to Check for Viruses and Malware on Linux "IndyWatch Feed Tech"

Title: 
Security Tools to Check for Viruses and Malware on Linux

15:34

Open-Source OpenCL Adoption Is Sadly An Issue In 2017 "IndyWatch Feed Tech"

While most of the talks that take place at the annual X.Org Developers' Conference are around the exciting progress being made across the Linux graphics landscape, at XDC2017 taking place this week at Google, the open-source GPGPU / compute talk is rather the let down due to the less than desirable state of the open-source OpenCL ecosystem...

15:31

Hundreds of universities have helped DHS create a nation of fear "IndyWatch Feed Tech"


Ever wonder who's responsible for our daily dosage of fear, terror and crime?

Look no further than our colleges and universities.

According to DHS, 'Homeland Security Centers of Excellence' (COE) are 'led by a college or university'.

COE's are responsible for blacklists, countering violent extremism and DHS propaganda videos and literature.

Colleges and universities have been working with DHS for fifteen years.

Since 2002, when the Homeland Security Act was passed, numerous colleges and universities have been feeding from the DHS money trough. Each year they line up like good little Bundists, promoting DHS's vision of terror.

Think about that, everything you've been told about terrorism and extremism is coming from colleges!

Schools across America will do anything, even if that means working with DHS, so they can get a piece of the annual $35-$40......

15:24

Block The Pirate Bay Within 10 Days, Dutch Court Tells ISPs "IndyWatch Feed Tech"

Three years ago in 2014, The Court of The Hague handed down its decision in a long-running case which had previously forced two Dutch ISPs, Ziggo and XS4ALL, to block The Pirate Bay.

Ruling against local anti-piracy outfit BREIN, which brought the case, the Court decided that a blockade would be ineffective and also restrict the ISPs entrepreneurial freedoms.

The Pirate Bay was unblocked while BREIN took its case to the Supreme Court, which in turn referred the matter to the EU Court of Justice for clarification. This June, the ECJ ruled that as a platform effectively communicating copyright works to the public, The Pirate Bay can indeed be blocked.

The ruling meant there were no major obstacles preventing the Dutch Supreme Court from ordering a future ISP blockade. Clearly, however, BREIN wanted a blocking decision more quickly. A decision handed down today means the anti-piracy group will achieve that in just a few days time.

The Hague Court of Appeal today ruled (Dutch) that the 2014 decision, which lifted the blockade against The Pirate Bay, is now largely obsolete.

According to the Court of Appeal, the Hague Court did not give sufficient weight to the interests of the beneficiaries represented by BREIN, BREIN said in a statement.

The Court also wrongly looked at whether torrent traffic had been reduced by the blockade. It should have also considered whether visits to the website of The Pirate Bay itself decreased with a blockade, which speaks for itself.

As a result, an IP address and DNS blockade of The Pirate Bay, similar to those already in place in the UK and other EU countries, will soon be put in place. BREIN says that four IP addresses will be affected along with hundreds of domain names through which the torrent platform can be reached.

The ISPs have been given just 10 days to put the blocks in place and if they fail there are fines of 2,000 euros per day, up to a maximum of one million euros.

It is nice that obviously harmful and illegal sites like The Pirate Bay will be blocked again in the Netherlands, says BREIN chief Tim Kuik.

A very bad time for our culture, which was free to access via these sites, is now happily behind us.

Todays interim decision by the Court of Appeal will stand until the Supreme Court hands down its decision in the main case between BREI...

15:23

46,000 new phishing sites are created every day "IndyWatch Feed Tech"

An average of 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The data collected by Webroot shows todays phishing attacks are highly targeted, sophisticated, hard to detect, and difficult for users to avoid. The latest phishing sites employ realistic web pages that are hard to find using web crawlers, and they trick victims into providing personal and business information. Unique phishing URLs per More

14:48

Silicon Valley Should Just Say No to Saudi Arabia "IndyWatch Feed Tech"

American companies face a difficult tradeoff when dealing with government requests, but they should just say no to Saudi Arabia, which is using social media companies to do its dirty work in censoring Qatari media. Over the past few weeks, both Medium and Snap have caved to Saudi demands to geoblock journalistic content in the kingdom.

The history of Silicon Valley companies compliance with requests from foreign governments is a sad one, and one that has undoubtedly led to more censorship around the world. While groups like EFF have been successful at pushing companies toward more transparency and at pushing back against domestic censorship in the United States, it seems that companies are unwilling or unable to see why protecting freedom of expression on their platforms abroad is important.

After Yahoos compliance with a user data request from the Chinese government in the early 2000s resulted in the imprisonment of two Chinese citizens, the digital rights community began to pressure companies to use more scrutiny when dealing with orders from foreign governments. The early work of scholars such as Rebecca MacKinnon led to widespread awareness amongst civil society groups and the eventual creation of the Global Network Initiative, which created standards guiding companies compliance with foreign requests. A push from advocacy groups resulted in Google issuing its first transparency report in 2010, with other companies following the Silicon Valley giants lead. Todaythanks to tireless advocacy and projects like EFFs Who Has Your Back reportdozens of companies issue their own reports.

Transparency is vital. It helps users to understand who the censors are, and to make informed decisions about what platforms they use. But, as it turns out, transparency does not necessarily lead to less censorship.

Corporate complicity

The Kingdom of Saudi Arabia is one of the worlds most prolific censors, attacking everything from advertisements and album covers to...

14:42

Listen up: the easiest place to use CRISPR might be in your ear "IndyWatch Feed Tech"

Scientists are hopeful they can inject the gene-editing technology directly into the ear to stop hereditary deafness.

14:42

VIA Graphics & Other Vintage GPUs Still Interest At Least One Developer In 2017 "IndyWatch Feed Tech"

Kevin Brace, the sole active developer left working on the OpenChrome driver stack for VIA x86 graphics, presented yesterday at XDC2017 about his work on this driver and how in the years to come he still hopes to work on other vintage GPU support...

14:36

Researchers Find Recipe for Forest Restoration "IndyWatch Feed Tech"

To find out what works best for reestablishing tropical dry forests, the researchers planted seedlings of 32 native tree species in degraded soil or degraded soil amended with sand, rice hulls, rice hull ash or hydrogel (an artificial water-holding material). After two years, they found that tree species known for traits that make them drought tolerant, such as enhanced ability to use water and capture sunlight, survived better than other species. Some of the soil amendments helped get seedlings off to a good start, but by the end of the experiment there was no difference in survival with respect to soil condition.

"This study is important for a number of reasons," Powers said. "First, it demonstrates that it is possible to grow trees on extremely degraded soils, which provides hope that we can indeed restore tropical dry forests. Second, it provides a general approach to screen native tree species for restoration trails based on their functional traits, which can be applied widely across the tropics.

Is 'ecosystem restoration' the job growth area of the future?


Original Submission

Read more of this story at SoylentNews.

14:18

Nestl Makes Billions Bottling Water It Pays Nearly Nothing For "IndyWatch Feed Tech"

Via: Bloomberg: The companys operation in Michigan reveals how its dominated the industry by going into economically depressed areas with lax water laws. The Michigan operation is only one small part of Nestl, the worlds largest food and beverage company. But it illuminates how Nestl has come to dominate a controversial industry, spring by []

14:04

CCleaner hackers targeted tech giants with a second-stage malware "IndyWatch Feed Tech"

The threat actor that recently compromised the supply chain of the CCleaner software targeted at least 20 tech firms with a second-stage malware.

When experts first investigated the incident did not discover a second stage payload, affected users were not infected by other malware due to initial compromise.

The experts at Cisco Talos team that investigated the incident, while analyzing the command-and-control (C2) server used by the threat actor discovered a lightweight backdoor module (GeeSetup_x86.dll) that was delivered to a specific list of machines used by certain organizations.

In analyzing the delivery code from the C2 server, what immediately stands out is a list of organizations, including Cisco, that were specifically targeted through delivery of a second-stage loader. Based on a review of the C2 tracking database, which only covers four days in September, we can confirm that at least 20 victim machines were served specialized secondary payloads. Below is a list of domains the attackers were attempting to target. reads the analysis published by Cisco Talos.

The list of domains targeted by hackers is long and included:

  • Google
  • Microsoft
  • Cisco
  • Intel
  • Samsung
  • Sony
  • HTC
  • Linksys
  • D-Link
  • Akamai
  • VMware

CCleaner tech giants

The C2 MySQL database held two tables: one describing all machines that had reported to the server and one describing all machines th......

14:02

Scaled Composites, LLC Photo "IndyWatch Feed Tech"

Mojave, CA. The Scaled Composites Facebook Page.

14:00

Finding the Mainframers of the Future With Linux and Open Source "IndyWatch Feed Tech"

Speak the word mainframe to many millennial techies, and the first things that likely come to mind are in the form of grainy sepia photos of floor-to-ceiling, wall-to-wall computers with big spinning tapes. But thats far from the reality of the modern mainframe.

13:02

Trump: 'Russia hoax continues, now it's ads on Facebook' "IndyWatch Feed Tech"

President Trump early Friday called reports of Kremlin-linked groups buying Facebook ads to sway the 2016 presidential election part of a "Russia hoax.""The Russia hoax continues, now it's ads on Facebook. What about the totally biased and dishonest...

13:02

Automating Steps in the Security Process is Critical to Defeat Todays Relentless and Complex Attack "IndyWatch Feed Tech"

I often talk about automation in my articles and it's a hot topic in general a quick Google search reveals more than 100 million results for security automation. Given the global shortage of cybersecurity professionals, and the volume and velocity of increasingly sophisticated threats we all have to deal with, humans can't go it alone. Automation helps get more from the people you have handling time-intensive manual tasks so they can focus on high-value, analytical activities. But the catch with automation is that it has to be applied at the right time in the security lifecycle in order to be effective.

You've likely heard the phrase: "dirty data in, dirty data out." Jumping to the end of the security lifecycle and using automation to take action like automating playbooks and automatically sending the latest intelligence to your sensor grid (firewalls, IPS/IDS, routers, web and email security, endpoint, etc.) can backfire. Without first aggregating, scoring and prioritizing intelligence you can actually exacerbate the dirty data problem.

[...] But with the sheer volume of threat data continuing to climb at a staggering rate, we need to start with the threat automating how we gather, score and prioritize threat intelligence. Otherwise we're just amplifying the noise, wasting precious resources and hampering security and that's the dirty secret.

Filter first, not last.


Original Submission

Read more of this story at SoylentNews.

13:00

Reviving a $25 Generator "IndyWatch Feed Tech"

[Jennies Garage] found a used and abused inverter based generator in the clearance section of his local home improvement store. The generator had been returned on a warranty claim and was deemed uneconomical to fix. Originally $799, [Jennies Garage] picked it up for just $25. He documented his quest to get the device running with a trio of videos.

The generator had spark, but didnt want to fire. The only obvious problem was the fact that the machine had been overfilled with oil. There was little or no compression, but that is not uncommon with modern small engines many of them have a compression release mechanism which makes them easier to start.

With all the obvious problems eliminated, the only thing left to do was tear into the engine and figure out what was wrong. Sure enough, it was a compression issue. The overfull oil condition had forced engine oil up around the piston rings, causing them to stick, and snapping one of the rings. The cylinder bore was still in good shape though, so all the engine needed was a new set of rings.

Thats when the problems started. At first, the manufacturer couldnt find the rings in their computer system. Then they found them but the rings would take two weeks to ship. [Jennies Garage] isnt the patient type though. He looked up the piston manufacturer in China. They would be happy to ship him complete pistons but the minimum order quantity was 5000. Then he started cross-referencing pistons from other engines and found a close match from a 1960s era 90cc motorcycle. Ironically, its easier to obtain piston rings for an old motorcycle than it is to find them for a late model generator.

The Honda rings werent perfect the two compression rings needed to be ground down about 1/2 a millimeter. The oil ring was a bit too thick, but thankfully the original oil ring was still in good shape.

Once the frankenpiston was assembled, it was time to put the repair to the test. [Jennies Garage] reassembled the generator, guessing at the torque specs he didnt have. The surgery was a complete success. The generator ran perfectly, and lit up the night at the [Jennies Garage] cabin.

If youre low on gas, no problem. Did you know you can run a generator on soda? Want to keep an eye on your remote generator? Check out this generator monitor project.

...

12:58

Massive Viacom Data Exposed Through Amazon Web Services "IndyWatch Feed Tech"

By Waqas

Database on Amazon Web Services Containing Sensitive Data of Viacom

This is a post from HackRead.com Read the original post: Massive Viacom Data Exposed Through Amazon Web Services

12:35

Electric Cars, Open Source Summit, and Linux Server Innovation "IndyWatch Feed Tech"

Title: 
Electric Cars, Open Source Summit, and Linux Server Innovation

12:24

Heterogeneous Memory Management Made It For Linux 4.14 "IndyWatch Feed Tech"

While busy covering the many new features of Linux 4.14, one important change slipped by that I have long been waiting to see merged: Heterogeneous Memory Management...

12:13

Java JDK 9 Finally Reaches General Availability "IndyWatch Feed Tech"

Java 9 (JDK 9) has finally reached general availability! Following setbacks, Java 9 is officially available as well as Java EE 8...

12:01

A Set Of BFQ Improvements Ready For Testing "IndyWatch Feed Tech"

Recently I wrote about a BFQ regression fix that should take care of a problem spotted in our recent I/O scheduler Linux 4.13 benchmarks while now that work has yielded a set of four patches working to improve this recently-merged scheduler...

11:47

EU Piracy Report Suppression Raises Questions Over Transparency "IndyWatch Feed Tech"

Over the years, copyright holders have made hundreds of statements against piracy, mainly that it risks bringing industries to their knees through widespread and uncontrolled downloading from the Internet.

But while TV shows like Game of Thrones have been downloaded millions of times, the big question (one could argue the only really important question) is whether this activity actually affects sales. After all, if piracy has a massive negative effect on industry, something needs to be done. If it does not, why all the panic?

Quite clearly, the EU Commission wanted to find out the answer to this potential multi-billion dollar question when it made the decision to invest a staggering 360,000 euros in a dedicated study back in January 2014.

With a final title of Estimating displacement rates of copyrighted content in the EU, the completed study is an intimidating 307 pages deep. Shockingly, until this week, few people even knew it existed because, for reasons unknown, the EU Commission decided not to release it.

However, thanks to the sheer persistence of Member of the European Parliament Julia Reda, the public now has a copy and it contains quite a few interesting conclusions. But first, some background.

The study uses data from 2014 and covers four broad types of content: music,
audio-visual material, books and videogames. Unlike other reports, the study also considered live attendances of music and cinema visits in the key regions of Germany, UK, Spain, France, Poland and Sweden.

On average, 51% of adults and 72% of minors in the EU were found to have illegally downloaded or streamed any form of creative content, with Poland and Spain coming out as the worst offenders. However, heres the kicker.

In general, the results do not show robust statistical evidence of displacement of sales by online copyright infringements, the study notes.

That does not necessarily mean that piracy has no effect but only that the statistical analysis does not prove with sufficient reliability that there is an effect.

For a study commissioned by the EU with huge sums of public money, this is a potentially damaging conclusion, not least for the countless industry bodies that lobby day in, day out, for tougher copyright law based on the fact that piracy is damaging to sales.

That being said, the study did find that certain sectors can be affected by piracy, notably recent top movies.

The results show a displacement rate...

11:42

Too few antibiotics in pipeline to tackle global drug-resistance crisis, WHO warns "IndyWatch Feed Tech"

Ed Whiting, director of policy at the Wellcome Trust agreed and said: There is no doubt of the urgency the world is running out of effective antibiotics and drug-resistant infections already kill 700,000 people a year globally. Weve made good progress in getting this on the political agenda. But now, a year on from a major UN agreement, we must see concerted action to reinvigorate the antibiotic pipeline, ensure responsible use of existing antibiotics, and address this threat across human, animal and environmental health.

The reports authors have found 51 new antibiotics and biologicals currently in development that may be able to treat the diseases caused by these resistant bugs. But that will not be anywhere near enough because of the length of time it takes to get drugs approved and onto the market, and because inevitably some of the drugs will not work.

Given the average success rates and development times in the past, the current pipeline of antibiotics and biologicals could lead to around 10 new approvals over the next five years, says the report. However, these new treatments will add little to the already existing arsenal and will not be sufficient to tackle the impending antimicrobial resistance threat.

11:29

No Magic Pill to Cure Alcohol Dependence Yet "IndyWatch Feed Tech"

A new study published by the scientific journal Addiction has found no reliable evidence for using nalmefene, naltrexone, acamprosate, baclofen or topiramate to control drinking in patients with alcohol dependence or alcohol use disorder. At best, some treatments showed low to medium efficacy in reducing drinking, but those findings were from studies with a high risk of bias. None demonstrated any benefit on health outcomes.

The study pooled the results from 32 double-blind randomised controlled trials representing 6,036 patients, published between 1994 and 2015. The studies compared the effects of oral nalmefene (n=9), naltrexone (n=14), acamprosate (n=1), baclofen (n=4) and topimarate (n=4) against placebo.

Many of the studies provided unreliable results due to risk of bias (potential exaggeration of the effects of the drug). Twenty-six studies (81%) showed an unclear or high risk of incomplete outcome data due to the large number of withdrawals. Seventeen studies (53%) showed an unclear or a high risk of selective outcome reporting, as they did not include a protocol registration number, which would allow another researcher to check whether all outcomes were reported.

Clment Palpacuer, et. al. Pharmacologically controlled drinking in the treatment of alcohol dependence or alcohol use disorders: a systematic review with direct and network meta-analyses on nalmefene, naltrexone, acamprosate, baclofen and topiramate. Addiction, 2017; DOI: 10.1111/add.13974

Back to the drawing board.


Original Submission

Read more of this story at SoylentNews.

11:17

Microservice Architecture Takes a Whole New Approach to Infrastructure "IndyWatch Feed Tech"

With microservice architecture where it is today, the gap between the good, the bad, and the ugly, is now enormous in terms of being able to deliver high-quality software with speed and efficiency.

10:50

This hotel in Taiwan has put proper gaming machines inside its rooms "IndyWatch Feed Tech"

There is a gaming hotel in Taiwan for game lovers

Missing your gaming PC while on vacation, no problem! This hotel in Taiwan has the perfect room for you to do gaming.

While bed, TV, fridge and Wi-Fi connectivity are the basic common amenities that a hotel offers its customers during their stay, i hotel located in the Taoyuan district, which is about an hours train ride away from Taipei, provides proper gaming rigs in all its rooms for its gamer customers.

The rooms in this hotel come equipped with two gaming PCs with i5-7400 processors and 32-inch screens powered by ASUS. The gaming PCs come with 16GB of RAM and a GTX 1080 Ti GPU. To make your gaming experience a memorable one, two DXRacer gaming chairs are also provided. Once you are done with gaming, you can sit back and watch your favorite channels on a 46 inch TV screen provided in the room.

Each room costs an average of $100 a night. However, for those who are only interested in gaming there, the hotel has hourly rates starting at $12 per hour during weekends, to $75 for 15 hours.

Check out the walkthrough video (in Chinese) below that will give you a sneak peak about the hotel.

Source: Mashable

The post This hotel in Taiwan has put proper gaming machines inside its rooms appeared first on TechWorm.

10:10

Why Should You Speak at Tech Conferences? Or At Least Attend Them Regularly (Part 1) "IndyWatch Feed Tech"

Now I talk regularly at local meetups and I went as a speaker to few big conferences. Given that I am no expert in public speaking, my heart beat rises and occasionally words scramble as I am on the stage. But still, I will give you some reasons, why you should speak at conferences or at least attend them.

10:05

bento4: stack-based buffer underflow in AP4_VisualSampleEntry::ReadFields (Ap4SampleEntry.cpp) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
==4435==ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7fe62b800e86 at pc 0x00000057b5a3 bp
0x7ffea98c1b10 sp 0x7ffea98c1b08
WRITE of size 1 at 0x7fe62b800e86 thread T0...

10:02

bento4: stack-based buffer overflow in AP4_VisualSampleEntry::ReadFields (Ap4SampleEntry.cpp) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
==9052==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fc5ce900866 at pc 0x00000057b5a3 bp 0x7ffd0f773130
sp 0x7ffd0f773128
WRITE of size 1 at 0x7fc5ce900866 thread T0
#0 0x57b5a2 in AP4_VisualSampleEntry::ReadFields(AP4_ByteStream&)...

10:00

bento4: heap-based buffer overflow in AP4_DataBuffer::SetData (Ap4DataBuffer.cpp) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
==20986==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000000174 at pc 0x0000004ee515 bp 0x7ffd0b8395f0
sp 0x7ffd0b838da0
READ of size 65509 at 0x606000000174 thread T0...

10:00

Arduino and Pi Breathe New Life into Jukebox "IndyWatch Feed Tech"

What do you do when someone gives you a Wurlitzer 3100 jukebox from 1969, but keeps all the records? If you are like [Tijuana Rick], you grab an Arduino and a Rasberry Pi and turn it into a really awesome digital music player.

Well grant you, making a music player out of a Raspberry Pi isnt all that cutting edge, but restoration and integration work is really impressive. The machine had many broken switches that had been hastily repaired, so [Rick] had to learn to create silicone molds and cast resin to create replacements. You can see and hear the end result in the video below.

[Rick] was frustrated with jukebox software he could find, until he found some Python code from [Thomas Sprinkmeier]. [Rick] used that code as a base and customized it for his needs.

Theres not much how to detail about the castings for the switches, but there are lots of photos and the results were great. We wondered if he considered putting fake 45s in the machine so it at least looked like it was playing vinyl.

Of course, you dont need an old piece of hardware to make a jukebox. Or, you can compromise and build out a replica.

 

 


Filed under: Arduino Hacks, Raspberry Pi

09:58

bento4: heap-based buffer overflow in AP4_BytesToUInt32BE (Ap4Utils.h) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
==1966==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x617000000324 at pc 0x000000690d51 bp 0x7ffc25bed310
sp 0x7ffc25bed308
READ of size 1 at 0x617000000324 thread T0...

09:56

bento4: heap-based buffer overflow in AP4_HdlrAtom::AP4_HdlrAtom (Ap4HdlrAtom.cpp) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
==10603==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000af at pc 0x000000622588 bp 0x7ffccfc80f10
sp 0x7ffccfc80f08
WRITE of size 1 at 0x6020000000af thread T0...

09:56

Alphabet Seeking $2.6 Billion in Damages From Uber "IndyWatch Feed Tech"

Google parent company Alphabet is seeking at least $2.6 billion from Uber for allegedly stealing self-driving car trade secrets from Waymo:

Alphabet thinks Uber should pay $2.6 billion for allegedly stealing a single trade secret.

Alphabet is in court with Uber today to convince a judge to delay the Oct. 10 trial in its self-driving lawsuit against the ride-hail company. But during the hearing, an Uber attorney said that Alphabet is seeking $2.6 billion in damages for just one of the nine trade secrets the company is claiming a former Uber executive stole.

Before today's hearing, the amount of damages Alphabet wanted a court to award them was not public and had been redacted from court filings.

In its opposition to Alphabet's request for a trial delay, Uber claims Alphabet is simply asking for a "do-over" because its allegations that an executive stole files and brought them to Uber has weakened.

Also at Reuters, Ars Technica, Engadget, The Street, MarketWatch, and TechCrunch.


Original Submission

Read more of this story at SoylentNews.

09:55

bento4: NULL pointer dereference in AP4_StdcFileByteStream::ReadPartial (Ap4StdCFileByteStream.cpp) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
ASAN:DEADLYSIGNAL
=================================================================
==18215==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f23fa12110e bp 0x000000000017 sp
0x7fff671b9178 T0)
==18215==The signal is caused by a WRITE memory...

09:53

bento4: NULL pointer dereference in AP4_DataAtom::~AP4_DataAtom (Ap4MetaData.cpp) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
ASAN:DEADLYSIGNAL
=================================================================
==11595==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000005b27fe bp 0x7ffce60a67e0 sp
0x7ffce60a67c0 T0)
==11595==The signal is caused by a READ memory access....

09:52

bento4: NULL pointer dereference in AP4_AtomSampleTable::GetSample (Ap4AtomSampleTable.cpp) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
ASAN:DEADLYSIGNAL
=================================================================
==6365==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000005cf94c bp 0x7fff5857d580 sp
0x7fff5857d4c0 T0)
==6365==The signal is caused by a READ memory access....

09:50

bento4: NULL pointer dereference in AP4_Atom::SetType (Ap4Atom.h) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# mp42aac $FILE out.aac
ASAN:DEADLYSIGNAL
=================================================================
==23307==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x0000005c9865 bp 0x7fffd01b90d0 sp
0x7fffd01b9020 T0)
==23307==The signal is caused by a WRITE memory...

09:49

bento4: heap-based buffer overflow in AP4_BitStream::ReadBytes (Ap4BitStream.cpp) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
bento4 is a fast, modern, open source C++ toolkit for all your MP4 and MPEG DASH media format needs.

The complete ASan output of the issue:

# aac2mp4 $FILE /tmp/out.mp4
AAC frame [000000]: size = -7, 96000 kHz, 0 ch
=================================================================
==8420==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x625000002100 at pc 0x0000004eed45 bp 0x7ffdd3db9900
sp 0x7ffdd3db90b0
READ of size...

09:38

Ist ja bald Weihnachten: Cherry Klingon Keyboard "IndyWatch Feed Tech"

Cherry Klingon Keyboard

This is made by Cherry, it seems. But its not quite authentic without spikes on the keycaps. Because if you dont bleed when typing Klingon poetry, it is just pointless posing.

09:21

Google Pixel 2, Pixel 2 XL images, specs and prices leaked "IndyWatch Feed Tech"

Googles Pixel 2 and Pixel 2 XL prices, release date and color options leaked

While Google is gearing up to launch its next-generation of Pixel devices at an event on October 4, Droid Life, a long-running Android news site, in the meantime, has managed to get hold of some images, storage variants, color options and prices of the upcoming smartphones, Pixel 2 and Pixel 2 XL.

To begin with, the newly leaked renders of Pixel 2 reveal that the HTC-manufactured device will reportedly have a 5-inch screen display and prominent bezels on the sides. The smartphone will be powered by Qualcomms Snapdragon 835 processor and come in 64GB and 128GB storage options, priced at $649 and $749, respectively. The Pixel 2 smartphone is expected to offer a squeezable frame just like the HTC U11. Pixel 2 will be available in Just Black, Clearly White and Kinda Blue color options. Google is reportedly expected to offer financing offers on these devices over the course of two years.

On the other hand, LG made Pixel 2 XL is expected to feature a 6-inch OLED display and Qualcomms Snapdragon 835 processor. It will be available with 64GB and 128GB storage capacities, priced at $849 and $949 respectively. Further, the device will be available in two color variants one with a combination of black and white back cover and another with an all-black cover. Google is offering financing options on 64GB and 128GB Pixel 2 XL devices so that the investment can be spread over a period of 24 months.

Further, both the smartphones are expected to have the same 12MP rear camera as seen in the original Pixel devices and better batteries than its rivals.

We advise you to take the above leaked information with a pinch of salt and wait for the official announcement from Google on October 4. In the meantime, keep watching this space for more updates and leaks on the devices.

The post Google Pixel 2, Pixel 2 XL images, specs and prices leaked appeared first on TechWorm.

09:05

SEC announces it was hacked, information may have been used for insider trading "IndyWatch Feed Tech"

The top U.S. markets regulator SEC announced a security breach, accessed data might have been used by crooks for insider trading.

The U.S. Securities and Exchange Commission (SEC) announced that cyber criminals had previously breached its database of corporate announcements in 2016 and likely they have used it for insider trading.

On Wednesday, the SEC Chairman Jay Clayton released a statement on cybersecurity that reported a 2016 security breach of its EDGAR system.

The Securities and Exchange Commissions Edgar filing system is a platform which houses detailed financial reports on publicly traded companies, including quarterly earnings and statements on acquisitions.

SEC data breach

A general exterior view of the U.S. Securities and Exchange Commission (SEC) headquarters in Washington, June 24, 2011. REUTERS/Jonathan Ernst

According to Clayton, the security breach was discovered last, it is the result of the presence of  software vulnerability.

In August 2017, the Commission learned that an incident previously detected in 2016 may have provided the basis for illicit gain through trading.  Specifically, a software vulnerability in the test filing component of our EDGAR system, which was patched promptly after discovery, was exploited and resulted in access to nonpublic information. reads the statement on cybersecurity.

The SEC confirmed it is investigating the security breach but it did not share details about the attack, it only confirmed to have promptly fixed the flaw exploited by hackers.

Exactly as for the Equifax incident, this case is hilarious because the SEC agency is charged with protecting investors and markets.

The SEC believes the intrusion did not expose personally identifiable information.

It is believed the intrusion did not result in unauthorized access to personally identifiable information, jeopardize the operations of the Commission, or resu...

09:00

Why would there be Peruvian DNA in Towns County, Georgia? "IndyWatch Feed Tech"

Why would there be Peruvian DNA in Towns County, Georgia?









 
 
 
 
 
I look forward to when we simply DNA every child upon birth.   The Mega Stats will be well worth extensive mining in order to pin down origins and likely generational auras in the data.

We already know that movement existed.  After all the waters involved are no move difficult than the Mediterranean with ample large islands along the way that naturally allow mostly short hops.  The largest span which is the Gulf of Mexico can even be skirted if deemed too late in the season.
 
As always defeated communities did take sail to escape their enemies and head out for fertile under populated areas elsewhere known by traders.
 
Add in the mining in Georgia and you even have a natural magnet that surely brought everyone sooner or later....
.
Why would there be Peruvian DNA in Towns County, Georgia?

...

09:00

Trump's Historic Opportunity with the Federal Reserve "IndyWatch Feed Tech"



 Remarkable that this is so.  Better yet he has been a student of sorts of the Fed most of his adult life as noted in comments from times past. Can this lead to something is another matter altogether.  It is hard to see that it can.

Real change must actually be bottom up.

Time will tell and it is noted that change here has become possible.
.

.

Trump's Historic Opportunity with the Federal Reserve


by Tho Bishop

https://mises.org/library/trumps-historic-opportunity-federal-reserve

And then there were three.


Today Stanley Fischer submitted his letter of resignation from the Federal Reserves Board of Governors, effective next month, the second such resignation of Donald Trumps presidency. While Fischers term as Vice Chairman of the Fed was set to end next year, he had the ability to serve as a governor through 2020. Along with Trumps decision next year on whether to replace Janet Yellen as the Feds chair, this means Trumps will have the opportunity to appoint five of seven governors to Americas central bank.


Given that the position holds a 14-year term, it is unusual for a president to have the opportunity to make so many appointments. As Diane Swonk of DS Economics noted, Its the largest potential regime change in the leadership of the Fed since 1936.



Of course the question is now whether a change in personnel will lead to a change in policy.



Trump has already taken steps to fill one of the vacancies, nominating Randal Quarles earlier this year. Quarles, a former Bush-era Treasury official turned investment banker, will be taking the specific role of Fed vice chair of supervision. As a vocal critic of Dodd-Frank, and the Volker Rule in particular, Quarles may help relieve some of the regulatory burden on financial institutions, but his views on monetary policy are less clear. He...

09:00

The Stages of Fasting: What Happens to Your Body When You Fast? "IndyWatch Feed Tech"

 

 This is a useful bit.  we get plenty of how tos but mapping actual changes is usually left out.  My own experience caught me getting dehydrated and that must be avoided.
All good though..
The Stages of Fasting: What Happens to Your Body When You Fast?

While fasting is nothing new, it is experiencing a resurgence in popularity as many discover its health benefits. If you are planning your first fast or looking for ways to improve your next one, there are a few things you should do to prepare. The first step is learning about the different stages of fasting. This knowledge helps you mentally and physically prepare for what happens to your body when you fast.
The stages of fasting outlined below are based off a water fast, a traditional fast in which you abstain from any food and only drink water for 12-48 hours or long...

09:00

graphicsmagick: assertion failure in pixel_cache.c "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 22

Description:
graphicsmagick is a collection of tools and libraries for many image formats.

The complete output of the issue:

# gm convert $FILE null
gm: magick/pixel_cache.c:1089: const PixelPacket AcquireImagePixels(const Image , const long, const long, const
unsigned long, const unsigned long, ExceptionInfo ): Assertion `image != (Image ) NULL'
failed.

Affected version:
1.3.25, 1.3.26 and maybe past releases

Fixed version:
N/A...

09:00

Anatomy of terror: What makes normal people become extremists? "IndyWatch Feed Tech"




















This is not a difficult question.  You start with boredom and perhaps social isolation.  Then you self brainwash yourself to the point in which you finally drink the Koolaid.

The cure is even simpler. A low guilt  threshold for the application of Summary Castration. This makes reading Jihadi propaganda deeply unpopular and stops self brainwashing.

Put all that in place and it is no trick to make it all go away.

None of this ever had anything to do with religion at all, except to provide  useful idiots.  The inclination has been a fringe phenomena for centuries and includes neo Nazis, anarchists and communists as well..

.


Anatomy of terror: What makes normal people become extremists?

16 August 2017

 https://www.newscientist.com/article/mg23531390-700-anatomy-of-terror-what-makes-normal-people-become-extremists/

It takes more than religious fanaticism or hatred to make someone take innocent lives, but recognise the true roots of ISIS-inspired terror and they can be addressed





...

09:00

Precision Medicine and Aging Have This in Common - Facts So Romantic "IndyWatch Feed Tech"


Precision medicine and aging both drive the complexity of medical care up.Photograph by isak55 / Shutterstock

We are healthier and living longer than we ever have, and advances like personalized medicine seem to promise an ever brighter future. But as the proportion of elderly people increases, so do the complexities of age-related medical care.

Nautilus caught up with Mary Tinetti, a doctor and researcher at the Yale School of Medicine, to talk about her work on improving healthcare for aging patients. Tinetti emphasized the importance of treating people in all their complexity, not just their diseaseparticularly when multiple conditions are present, as often happens with elderly patients.  

What does the increasing specialization of medical research mean for clinicians, scientists, and patients?  

Sometimes we miss the big picture. We can know more and more about a very small area, but we dont know how addressing that area affects everything else thats happening in peoples health, lives, and bodies. At a time when we need to get broader, were getting narrower. When people have multiple issues in their lives that are important, what the clinician or specialist focuses in on may not be whats important to that individual.
Read More

08:58

bladeenc: global buffer overflow in iteration_loop (loop.c) "IndyWatch Feed Tech"

Posted by Agostino Sarubbo on Sep 21

Description:
bladeenc is an mp3 encoder.

There is a write overflow by default without a crafted file in the bladeenc command-line tool. The upstream website
does not work anymore for me.
The complete ASan output of the issue:

# bladeenc $FILE
==15358==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000141c3b4 at pc 0x00000052afc8 bp
0x7ffcb9e50bb0 sp 0x7ffcb9e50ba8
WRITE of size 4 at 0x00000141c3b4 thread T0
#0 0x52afc7 in...

08:23

Google Acquires HTC's "Pixel" Division, Rather than HTC Itself, for Just $1.1 Billion "IndyWatch Feed Tech"

Google has acquired HTC's "Pixel" division, which has made premium Android products for Google, for $1.1 billion. Google will get around 2,000 new employees (around a fifth of HTC's total workforce) and a non-exclusive license for HTC's "intellectual property":

Of the three most influential companies in smartphone design, Nokia fragmented into a million pieces after being bought out by Microsoft, Apple is still going strong, and Google just bought the third with its $1.1 billion deal with HTC. The reason why Google acquired what looks to be the majority of HTC's phone design and engineering team is simple, and it's been obvious for over a year: Google is serious about becoming a hardware company.

Early in 2016, Google created a new hardware division and re-hired Motorola chief Rick Osterloh to run that group. A brief few months after that, the company was plastering the streets of Europe and the US with billboards trumpeting the arrival of the first "Made by Google" Pixel devices. Why do we refuse to acknowledge what's right in front of our eyes? Google is going to war against the iPhone.

[...] The Motorola deal was complex, involved a vast and valuable patent portfolio, and required careful balancing to preserve at the least the appearance of Motorola operating independently. With its new staff coming in from HTC, Google is getting a big and highly experienced team close to 2,000 people, according to HTC CFO Peter Shen and it's putting them directly under [former Motorola chief Rick] Osterloh's command. There's no confusion about where orders are coming from, or any external interests that need to be appeased. It's just going to be Google, suddenly powered up with the years of experience that a new hardware vendor usually lacks, with the clear goal of ousting Apple's iPhone from its position as the device most identified with the word "smartphone."

Compare to the $12.5 billion acquisition of Motorola Mobility in 2011.

Also at Google's Blog (written by Google Senior Vice President of Hardware, Rick Osterloh), Business Insider, Reuters,...

08:02

ARCAs revolutionary aerospike engine completed and ready for testing "IndyWatch Feed Tech"

ARCA Space Corporation has announced its linear aerospike engine is ready to start ground tests as the company moves towards installing the engine in its Demonstrator 3 rocket. Designed to power the worlds first operational Single-Stage-To-Orbit (SSTO) satellite launcher, the engine took only 60 days to complete from when fabrication began.

Over the past 60 years, space launches have become pretty routine. The first stage ignites, the rocket lifts slowly and majestically from the launch pad before picking up speed and vanishing into the blue. Minutes later, the first stage shuts down and separates from the upper stages, which ignite and burn in turn until the payload is delivered into orbit.

This approach was adopted not only because it provides enough fuel to lift the payload while conserving weight, but also because the first-stage engines, which work best at sea level, are very inefficient at higher altitudes or in space, so different engines need to be employed for each stage of flight.

07:00

FPGA Clocks for Software Developers (or Anyone) "IndyWatch Feed Tech"

It used to be that designing hardware required schematics and designing software required code. Sure, a lot of people could jump back and forth, but it was clearly a different discipline. Today, a lot of substantial digital design occurs using a hardware description language (HDL) like Verilog or VHDL. These look like software, but as weve pointed out many times, it isnt really the same. [Zipcpu] has a really clear blog post that explains how it is different and why.

[Zipcpu] notes something weve seen all too often on the web. Some neophytes will write sequential code using Verilog or VHDL as if it was a conventional programming language. Code like that may even simulate. However, the resulting hardware will at best be very inefficient and at worst will not even work.

We did mildly disagree with one statement in the post: no digital logic design can work without a clock. However, [Zipcpu] goes on to elaborate and we agree with the elaboration. However, it is important to note that asynchronous and combinatorial logic dont use a clock in the conventional sense of the word. Combinatorial logic for example, a bunch of AND and OR gates can only handle simple tasks and full-blown asynchronous design is tough and not likely to be something a new FPGA developer will encounter.

The reality is that nearly all significant digital design uses clocks is because it makes the design manageable. Essentially, the clock tells all parts of the circuit to start processing and sets a deadline for the various combinatorial parts to complete. Without the clock, youd have to deal with the issue when, for example, an adder presents a result before the carry from another stage arrives to change that answer. With a clock, as long as the right answer is ready by the clock edge, you dont care about exactly how long it takes.

This is especially important because Verilog and VHDL dont execute line-by-line as a software developer would expect. Instead, HDL constructs become circuits and all the circuits operate at one time. This parallelism can be difficult to manage, but it is what makes FPGAs ideal for high-speed computations and fast response times.

The section of the post about how much logic to put between clocks is what you usually call making timing. The FPGA tools have a scary amount of data about how much time it takes for a signal to travel from one part of the FPGA to another. If the tool detects that the transit time between two clocked elements exceeds the clock period, it will flag that as an error. You can increase the clock speed or shorten the path either physically or logical...

06:50

The Ghost in Nintendo's Switch - Game Unlocks on the Date of Satoru Iwata's Death "IndyWatch Feed Tech"

Kotaku runs a story about the game that "spontaneously" unlocks on the date of the death of Satoru Iwata:

When a Switch owner named Setery told a gaming forum about how NES Golf randomly appeared on her Switch's screen, commenters accused her console of being haunted. Switch hackers' subsequent race to unearth NES Golf now indicates that there's a hidden game on the console and, actually, it appears to be a heartwarming tribute to the deceased Nintendo CEO Satoru Iwata.

[...] Prior to heading Nintendo, Iwata was a programmer... The story goes that, after several developers turned down the task of developing the NES's Golf, Iwata found a way to fit the game's 18-hole course onto a cartridge's modest memory.

On July 11th, 2015, Iwata succumbed to cancer at age 55. As Nintendo CEO, Iwata was known for his "Iwata Asks" column on Nintendo's website and his appearances at major Nintendo events. Thanks to Nintendo Directs, he also became associated with a very specific gesture.

[...] Fast forward to early summer, 2017, when hackers discovered a hidden NES emulator on the Switch referred to as "Flog," Ars Technica reports. "We thought they had included it during manufacturing by mistake," Plutoo, one of the Switch hackers... Last weekend, bored, Plutoo decided to look into it. ... He says he discovered two intriguing details: "The code looked for the date July 11th, and the code right before seemed to enable the 'Joycon sixaxis' motion sensors."

Read more of this story at SoylentNews.

05:42

Scientists spot sleeping jellyfish "IndyWatch Feed Tech"

Sept. 21 (UPI) Scientists have observed, for the first time, a jellyfish in a sleep-like state. Its the first time an animal without a brain or central nervous system has been observed sleeping.

The findings detailed this week in the journal Current Biology could help scientists finally answer the questions: Do all animals sleep?

All vertebrates studied by scientists sleep, but researchers havent been able to agree whether or not sleep is ubiquitous, or even common, among invertebrates. Studies have suggested fruit flies and roundworms sleep, but what about more primitive organisms like sponges and jellyfish?

05:17

Toshiba Decides to Sell Semiconductor Business to Bain Capital for $18 Billion "IndyWatch Feed Tech"

Western Digital has apparently been spurned as Toshiba has agreed to sell its semiconductor business to Bain Capital instead for around $18 billion. The deal has not been finalized so more confusion could be over the horizon:

Japan's Toshiba Corp agreed on Wednesday to sell its prized semiconductor business to a group led by U.S. private equity firm Bain Capital LP, a key step in keeping the struggling Japanese conglomerate listed on the Tokyo exchange. In a last-minute twist to a long and highly contentious auction, Toshiba said in a late-night announcement through the exchange it agreed to sign a contract for the deal worth about 2 trillion yen (13.22 billion pounds).

The decision to sell the world's No. 2 producer of NAND memory chips, first reported by Reuters, was made at a board meeting earlier on Wednesday. Late on Tuesday, sources had said Toshiba was leaning towards selling the business to its U.S. joint venture partner Western Digital Corp. It's unclear whether the sale to the Bain Capital-led group will proceed smoothly, as Western Digital has previously initiated legal action against Toshiba, arguing that no deal can be done without its consent due to its position as Toshiba's joint venture chip partner.

Also at NYT, Engadget, Nasdaq, BBC, and Bloomberg (alt opinion).

Previously: Chaos as Toshiba Tries to Sell Memory Business


Original Submission

Read more of this story at SoylentNews.

04:00

The Longest Tech Support Call: Apollo 14 Computer Hack "IndyWatch Feed Tech"

Deep-voiced and aptly named [Scott Manley] posted a video about the computer hack that saved Apollo 14. Unlike some articles about the incident, [Scott] gets into the technical details in an entertaining way. If you dont remember, Apollo 14 had an issue where the abort command button would occasionally signal when it shouldnt.

The common story is that a NASA engineer found a way to reprogram the Apollo guidance computer. However, [Scott] points out that the rope memory in the computer wasnt reprogrammable and there was no remote way to send commands to the computer anyway.

The initial patch had the astronauts use the DSKY to clear a bit that would prevent an abort from occurring. However, there was a chance that some other code would set that bit again as part of normal operations. If the bit was set and the switch malfunctioned, you could get a spurious abort. Engineers sent them another procedure to fool the computer into thinking it was already executing an abort which solved that problem.

However, this required a lot of effort during operations to make everything work. [Scott] shows you the nouns and verbs used and explains them in detail. It is rare to find such a technical treatment of this story and the NASA engineers were certainly doing a hack in the truest sense of the word.

The DSKY is no stranger to the pages of Hackaday. Weve even talked about the odd rope memory before. While Apollo 13 got the big budget movie, the Apollo 14 hack is a great story, too. And without it, wed have never had a golf shot on the moon.


Filed under: classic hacks

03:44

Securities and Exchange Commission Hacked in 2016 "IndyWatch Feed Tech"

The SEC has disclosed that its corporate filing system "Edgar" (Electronic Data Gathering, Analysis, and Retrieval) was hacked in 2016:

The top securities regulator in the United States said Wednesday night that its computer system had been hacked last year, giving the attackers private information that could have been exploited for trading. The disclosure, coming on the heels of a data breach at Equifax, the major consumer credit reporting firm, is likely to intensify concerns over potential computer vulnerabilities lurking among pillars of the American financial system.

The Securities and Exchange Commission said in a statement that it was still investigating the breach of its corporate filing system. The system, called Edgar, is used by companies to make legally required filings to the agency.

The agency said it learned in August that an incident detected last year "was exploited and resulted in access to nonpublic information." It said the security vulnerability used in the attack had been patched shortly after it was discovered. The hacking, it said, "may have provided the basis for illicit gain through trading."

Direct link to the SEC statement.

Also at Bloomberg.


Original Submission

Read more of this story at SoylentNews.

03:35

Senate Dems call for enhanced transparency for online ads "IndyWatch Feed Tech"

A pair of Democratic senators is reportedly pushing for legislation to force major digital platforms to publicly disclose the groups and individuals they sell ads to for more than $10,000 amid concern over Facebook ads sold to Russians during the...

02:34

Mesa 17.1.10 Is Being Prepped As The Final 17.1 Update "IndyWatch Feed Tech"

J.A. Suarez Romero of Igalia is preparing Mesa 17.1.10 as the final point release for the Mesa 17.1 release stream...

02:11

Jellyfish Found to Sleep Despite Lack of a Brain "IndyWatch Feed Tech"

A study of jellyfish has challenged the idea that animals need a brain to exhibit sleeping behavior:

We think of sleep as restoring our brains: a time to process memories, cleanse our cells of toxins, and prepare for a new day. But even animals that lack brains need to snooze. Biologists have discovered that, like people, jellyfish hit the hay and have the same trouble we do waking up. Because these creatures are very low on the animal family tree, the work suggests that the ability to sleep evolved quite early.

"Sleep was likely present in the very first animals on this planet," says David Raizen, a neuroscientist and sleep expert at the University of Pennsylvania who was not involved with the work. "The results of this study challenge certain commonly held beliefs," adds William Joiner, a neuroscientist at the University of California, San Diego, who was also not involved with the work. "For example, that sleep requires a centralized nervous system and related neural circuits across evolution." Evidence from one recent study even suggests that skeletal muscles may be involved [open, DOI: 10.7554/eLife.26557] [DX]at least in mice.

Read more of this story at SoylentNews.

02:00

IFA, IoT night, Armenian startups and Startup night - The Berlin week that was "IndyWatch Feed Tech"

Chris and Cate recount one crazy week in Berlin covering IFA, the France vs Germany IoT battle, Armenian startups and the long night of Startups.

HPR2385: 20170620 Into Action Part 7 "IndyWatch Feed Tech"

The big driver to changing the healthcare system in the U.S. was the inexorable rise in healthcare costs. These costs kept rising for a number of reasons, which we look at at in this episode. Links: https://en.wikipedia.org/wiki/Baumol%27s_cost_disease https://www.cnet.com/news/robots-for-cancer-diagnosis-biopsy-lack-the-human-touch/?ftag=CAD090e536&bhid=20535501410714773631202074326606 https://en.wikipedia.org/wiki/List_of_countries_by_total_health_expenditure_per_capita http://www.palain.com/?page_id=309

01:55

CVE-2017-14681: P3Scan privilege escalation via PID file manipulation "IndyWatch Feed Tech"

Posted by Michael Orlitzky on Sep 21

Product: P3Scan (transparent email proxy server)
Versions-affected: 3.0_rc1 and earlier (all versions)
Bug-report: https://sourceforge.net/p/p3scan/bugs/33/
Author: Michael Orlitzky

== Summary ==

The p3scan daemon creates its PID file after dropping privileges to a
non-root user. That may be exploited (through init scripts or other
management tools) by the unprivileged user to kill root processes, since
when the daemon is stopped, root usually...

01:23

In an Effort to Push the Unitary Patent (UPC), EPO and the Liar in Chief Spread the Famous Lie About SMEs "IndyWatch Feed Tech"

Rule of thumb: everything that the EPO says nowadays is a deliberate lie.

Ear

Summary: The EPO wants people to hear just a bunch of lies rather than the simple truth, courtesy of the people whom the EPO proclaims it represents

THE EPO offers nepotism and fast lanes to large corporations. It panics when the public finds out about it and constantly lies about the matter, stating that it protects SMEs, small inventors and so on. The European Digital SME Alliance has already refuted some of these lies, but that wasnt enough to make the lies stop.

As a matter of priority, even though its past midnight right now, weve decided to compose a quick rebuttal/response to todays EPO lies (disguised as study, as usual). What a nerve these people have. They are lying so much to the European public, with Battistelli taking the lead, as usual.

hat a nerve these people have. They are lying so much to the European public, with Battistelli taking the lead, as usual.The latest lie was promoted in Twitter in the late afternoon. I responded by stating that the first EPO announcement in more than a month spreads a lie, the famous SME-themed lie [in which the EPO] makes up more SME-themed lies in order to sell the [other] lie that UPC is good for SMEs. See last paragraph.

Yes, I used the word lie quite a lot. Its as simple as this. They lied deliberately.

The official news item (epo.org link), which quotes the king, as usual (self glorification), ends like this:

They also highlight the benefits that SMEs can expect from the planned Unitary Patent. These include savings in time and money, as well as increased legal certainty across the EU market.

Thats a lie. Even i...

01:10

Mercedes Plots Tesla Attack With $1 Billion U.S. Electric Push "IndyWatch Feed Tech"

Via: Bloomberg: Daimler AG plans to spend $1 billion to start production of Mercedes-Benz electric vehicles at its Alabama factory, setting the worlds largest luxury-car maker up to battle with battery-car specialist Tesla Inc. on its home turf. The German automaker will build its fifth battery plant globally and create more than 600 jobs in []

01:00

Spray Paint Goes DIY Virtual with a Vive Tracker "IndyWatch Feed Tech"

Here is a virtual spray painting project with a new and DIY twist to it. [Adam Amaral]s project is an experiment in using the Vive Tracker, which was released earlier this year. [Adam] demonstrates how to interface some simple hardware and 3D printed parts to the Trackers GPIO pins, using it as a custom peripheral that is fully tracked and interactive in the Vives VR environment. He details not only the custom spray can controller, but also how to handle the device on the software side in the Unreal engine. The 3D printed spray can controller even rattles when shaken!

Theres one more trick. Since the Vive Tracker is wireless and completely self-contained, the completed rattlecan operates independently from the VR headset. This means its possible to ditch the goggles and hook up a projector, then use the 3D printed spray can to paint a nearby wall with virtual paint; you can see that part in action in the video embedded below.

Instagram Photo

When the Tracker was announced we felt that the GPIO pins and capabilities could open a lot of doors for experimentation; its nice to see someone document a project using them. After all, VR experimenters come up with some crazy stuff, like stepping back and forth through the real and virtual.


Filed under: how-to, Virtual Reality

00:37

Ford Using Microsoft HoloLens to Help Design Cars "IndyWatch Feed Tech"

Ford says it is using Microsoft's HoloLens augmented reality headset to help design cars, alongside clay models:

Microsoft's HoloLens headset has been slowly pivoting towards commercial markets over the past year. NASA, Volvo, Lowe's, Audi, and Volkswagen are all testing HoloLens for various reasons, and now Ford is expanding its use of Microsoft's headsets after an initial pilot phase. Ford is using HoloLens to let designers quickly model out changes to cars, trucks, and SUVs. This allows designers to see the changes on top of an existing physical vehicle, instead of the traditional clay model approach to car design.

Ford is still using clay models, but the HoloLens can be used to augment additional 3D models without having to build every single design prototype with clay.

Also at CNBC and Engadget.


Original Submission

Read more of this story at SoylentNews.

00:33

Trump supporters dig up personal information on thousands of Trump opponents "IndyWatch Feed Tech"

Supporters of President Trump have compiled a list containing personal information on thousands of people they believe are either opposed to Trump or associated with left-wing "anti-fascist" or "antifa" groups.The list,...

00:16

Russian broadcaster tried to take over anti-Trump, anti-Clinton Twitter accounts: report "IndyWatch Feed Tech"

RT, the Russian government-backed broadcaster, tried to take over two Twitter handles to help promote its coverage of the 2016 presidential campaign, Foreign Policy reported on Thursday.The media outlet reportedly told Twitter's advertising...

00:06

Overnight Tech: Facebook to hand over Russian political ads to Congress | Zuckerberg vows more transparency on ads | EU wants higher taxes on Silicon Valley | SEC database hacked "IndyWatch Feed Tech"

FACEBOOK TO HAND OVER RUSSIAN-LINKED ADS TO CONGRESS: Facebook has made a deal with Congressional investigators to turn over roughly 3000 advertisements purchased by Kremlin-linked groups during the 2016 presidential campaign.The company...

Thursday, 21 September

23:39

Zuckerberg vows to make Facebook political advertising more transparent "IndyWatch Feed Tech"

Facebook CEO Mark Zuckerberg said on Thursday that he plans to make bring the companys advertising tools to a higher standard of transparency.When someone buys political ads on TV or other media, they're required by law to disclose who paid for...

21:30

Using VR to Diagnose Concussions "IndyWatch Feed Tech"

The new approach to concussion screening is spreading to colleges nationwide Photo: SyncThink

Jamshid Ghajar once asked a NFL football spottera person who watches games for possible brain injurieshow he recognized a player with a concussion. The spotter replied, Well, if he kneels down and shakes his head, he may have a concussion.

As a neurosurgeon and director of the Stanford Concussion and Brain Performance Center, Ghajar was more than a little dismayed with that answer. Spotting and other sideline assessments for concussionssuch as having players memorize and recall words, or track a moving finger with their eyesare just okay, Ghajar described on Tuesday to a small crowd at the MIT Media Lab in Cambridge, Massachusetts, during a technology conference hosted by ApplySci. Such techniques are not really picking up a biological signal of concussion, he added.

In search of a more accurate, yet speedy way to diagnose concussions, Ghajar and a team at SyncThink, a Palo Alto, California-based company, have developed a mobile eye tracking technology to diagnose concussions based on clinical research. Their goal is to transform concussion diagnoses from guesswork into an objective test.

The EYE-SYNC technologya VR headset platform that tracks eye movements and reports signs of impairment within 60 secondswas approved by the FDA last year and is now being rolled out to Pac-12 football schools and hospitals around the nation. Another eye-tracking tool to diagnose concussions,  EyeBOX from Oculogica, tracks 67 -domains of eye movements as participants watch videos, according to the company website . The technology has not yet been cleared by the FDA.

Tools such as this could help reduce the risk of brain damage in athletes, which can occur even before the age of 12, according to a study published this week in the journal Translational Psychiatry. In it, researchers at Boston University found that participation in youth...

21:00

Introducing The Linux Foundations Open Source Networking Days "IndyWatch Feed Tech"

OSN Days are a fantastic opportunity for network developers and users to learn how ONAP, OPNFV, OpenDaylight  and other open source initiatives are changing NFV/SDN orchestration and networking solutions.

21:00

Make the Web Better for Everyone "IndyWatch Feed Tech"

Corporations and governments must partner to fix a broken medium Illustration: Edmon de Haro

img Illustration: Edmon de Haro

The Web has serious problems: peddler of unreliable information, haven for criminals, spawning ground for irrational conspiracy fears, and tool for destructive people to broadcast their violence in real time and with posted recordings.

No doubt your list of Web pathologies is different from mine. But surely you agree that the Web disappoints as much as it delights.

Now the hard partwhat to do about it?

Starting over is impossible. The Web is the ground of our global civilization, a pillar of contemporary existence. Even as we complain about the excesses and shortcomings of the Web, we cant survive without it.

For engineers and technovisionaries, the solution flows from an admirable U.S. tradition: building a better mousetrap.

For redesigners of the broken Web, the popular impulse is to expand digital freedom by creating a Web so decentralized that governments cant censor it and big corporations cant dominate.

However noble, the freedom advocates fail to account for a major class of vexations arising from anonymity, which allows, say, Russian hackers to pose as legitimate tweeters and terrorist groups to recruit through Facebook pages.

To be sure, escape from government surveillance through digital masks has benefits, yet the path to improved governance across the world doesnt chiefly lie with finding more clever ways to hide from official oppression. More freedom, ultimately, will only spawn more irresponsible, harmful behavior.

If more freedom and greater privacy wont cure what ails the Web, might we consider older forms of control and the cooperation of essential public services?

In the 19th century, railroads gained such power over the lives of cities and towns across the United States that norms, rules, and laws emerged to impose a modicum of fairness on routes, fares, and services. Similarly, in the 20th century, the Bell telephone network, having gained a natural monopoly, came under the supervision of the U.S. government. So did the countrys leading computer company, IBM.

Because of government limits, Bell stayed out of the computer businessand licensed its revoluti...

03:07

Apple Watch Series 3 Ships with LTE Bug "IndyWatch Feed Tech"

The major feature of the third iteration of the Apple Watch, LTE cellular connectivity, can fail due to a bug involving Wi-Fi. This problem has been reflected in reviews of the device:

The new Apple Watch is mostly an iterative update over its predecessor, but for one major feature: LTE. The addition of cellular connectivity has been touted as everything from "nice" to "game changing," but reviewers appear to have early issues in testing. I didn't run into any in my own testing, but the Verge reported some big hiccups connecting to the cellular network on the device.

An Apple spokeswoman confirmed the problem with TechCrunch, stating, "We have discovered that when Apple Watch Series 3 joins unauthenticated Wi-Fi networks without connectivity, it may at times prevent the watch from using cellular. We are investigating a fix for a future software release."

The LTE also does not work if you take the device to another country.

Also at The Verge, Fox Business (WSJ/Dow Jones reprint), and Fortune.


Original Submission

Read more of this story at SoylentNews.

Apple Watch Series 3 Ships with LTE Bug "IndyWatch Feed Tech"

The major feature of the third iteration of the Apple Watch, LTE cellular connectivity, can fail due to a bug involving Wi-Fi. This problem has been reflected in reviews of the device:

The new Apple Watch is mostly an iterative update over its predecessor, but for one major feature: LTE. The addition of cellular connectivity has been touted as everything from "nice" to "game changing," but reviewers appear to have early issues in testing. I didn't run into any in my own testing, but the Verge reported some big hiccups connecting to the cellular network on the device.

An Apple spokeswoman confirmed the problem with TechCrunch, stating, "We have discovered that when Apple Watch Series 3 joins unauthenticated Wi-Fi networks without connectivity, it may at times prevent the watch from using cellular. We are investigating a fix for a future software release."

The LTE also does not work if you take the device to another country.

Also at The Verge, Fox Business (WSJ/Dow Jones reprint), and Fortune.


Original Submission

Read more of this story at SoylentNews.

02:00

Amazons Alexa wants to rule your world "IndyWatch Feed Tech"

Upon visiting Berlins IFA2107   Germanys answer to CES recently,  there was one word I kept hearing: Alexa. In the consumer hardware space, its a great time to be Amazon, if the sheer number of hardware companies jumping on the Alexa bandwagon are anything to go by.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog