|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
For the past few hours, Chrome and Firefox users have been unable to access Torrentz2.eu without running into a significant roadblock.
Instead of the usual torrent search box, visitors to the meta-search engine now see an ominous red warning banner when they try to find a torrent.
The site ahead contains harmful programs, Google Chrome informs its users.
Attackers on torrentz2.eu might attempt to trick you into installing programs that harm your browsing experience (for example, by changing your homepage or showing extra ads on sites you visit), the warning adds.
Mozillas Firefox browser displays an equally worrying message.
These warning messages are triggered by Googles Safebrowsing algorithm which flags websites that pose a potential danger to visitors. Chrome, Firefox, and others use this service to prevent users from running into unwanted software.
Usually, these warnings are the result of malicious ads, but here thats less apparent. The operator of Torrentz2 informs us that he only advertises a VPN at the moment, which is by no means malicious.
According to Googles Safebrowsing report, however, Torrentz2 is flagged for installing unwanted or malicious software on visitors computers.
TorrentFreak previously learned from another site admin that Google also flags social engineering attempts. That is, for example, when users are tricked by false claims to take a certain action.
Torrentz2s ad warned: Your Internet Provider is tracking your torrent activity! which in theory could fit this category, as ISPs generally dont keep track of users torrenting habits.
In any case, Chrome and Firefox users should be familiar with these intermittent warning notices by now. If users believe that an affected site is harmless they can always take steps (Chrome, FF) to bypass the blocks, but thats completely at their own risk.
For Torrentz2 a bypass is not going to help much at the moment. The torrent site is currently down due to hosting issues, whic...
In this video from the Stanford HPC Conference, Christian Kniep from Docker Inc. presents: State of Containers.
This talk will recap the history of and what constitutes Linux Containers, before laying out how the technology is employed by various engines and what problems these engines have to solve. Afterward, Christian will elaborate on why the advent of standards for images and runtimes moved the discussion from building and distributing containers to orchestrating containerized applications at scale. In conclusion, attendees will get an update on what problems still hinder the adoption of containers for distributed high performance workloads and how Docker is addressing these issues.
There was a time when USB to serial hardware meant one company: FTDI. But today there are quite a few to choose from and one of the most common ones is the WCH CH341. Theres been support for these chips in Linux for a while, but only for use as a communication port. The device actually has RS232, I2C, SPI, and 8 general purpose I/O (GPIO) pins. [ZooBaB] took an out-of-tree driver th...
Godfrey Bloom is a member of the British Parliament. His in-your-face style of educating and shocking his peers has made him a controversial politician. He has occasionally been escorted out of the assembled parliament because of his rowdy rhetoric.
Consider the video below. Bloom offers a critical, but simple and clear explanation of the Fractional Reserve banking system used in the US and Europe. This gets to the heart of the matter! [continue below video]
Conclusion (mine, and not Mr. Blooms): It is in the interest of governments to use a form of money that they cannot manipulate, print, spend, hide or lend without first earning, taxing or legitimately borrowing and then balancing the books, openly.
Bitcoin is such a currency. Any country that adopts an open source, permissionless, and completely transparent monetary instrument will demonstrate to citizens and taxpayers that they respect their constituents and that they commit to balance their books like any state, corporation, NGO or household.
Would an ethical government surrender control of its own monetary policy? H*ll, yes! This is how a government avoids rampant inflation and the burden of non-consensual debt to future generations. It is also how a government makes taxation, redistribution and spending transparent and accountable. It is how a government restores trust.
We have been raised with centuries of dogma that teach us to accept inflation, and a constantly escalating public debt. Sometimes, the path forward is not immediately obvious. But history doesnt lie. When trusted nations with large economies manipulate interest rates, borrow without a lender, or inflate a nation out of a crisis (what the US calls quantitative easing), the long term effect is certain to be no different than Argentina, Zimbabwe, Venezuela or Germany between the wars. It is a recipe for disaster. It places every citizen and their future children into debt-bondage.
Moving away from the Gold Standard in the 1970s was a risky maneuver. The risk was not abandoning a precious metal with intrinsic valuebut rather it placed the full faith and credit of our economy in the hands of transient politicians, rather than in a capped commodity with certain and immutable properties.
Bitcoin is the new gold. It is capped, transparent, open-source, vetted and without a mechanism for quick or covert manipulation (...
[...] might have been surprised when headlines began appearing last year suggesting that Google and its fellow tech giants were threatening everything from our economy to democracy itself. Lawmakers have accused Google of creating an automated advertising system so vast and subtle that hardly anyone noticed when Russian saboteurs co-opted it in the last election. Critics say Facebook exploits our addictive impulses and silos us in ideological echo chambers. Amazon's reach is blamed for spurring a retail meltdown; Apple's economic impact is so profound it can cause market-wide gyrations. These controversies point to the growing anxiety that a small number of technology companies are now such powerful entities that they can destroy entire industries or social norms with just a few lines of computer code. Those four companies, plus Microsoft, make up America's largest sources of aggregated news, advertising, online shopping, digital entertainment and the tools of business and communication. They're also among the world's most valuable firms, with combined annual revenues of more than half a trillion dollars.
In a rare display of bipartisanship, lawmakers from both political parties have started questioning how these tech giants grew so powerful so fast. Regulators in Missouri, Utah, Washington, D.C., and elsewhere have called for greater scrutiny of Google and others, citing antitrust concerns; some critics have suggested that our courts and legislatures need to go after tech firms in the same way the trustbusters broke up oil and railroad monopolies a century ago. But others say that Google and its cohort are guilty only of delighting customers. If these tech leviathans ever fail to satisfy us, their defenders argue, capitalism will punish them the same way it once brought down Yahoo, AOL and MySpace.
[...] There's a loose coalition of economists and legal theorists who call themselves the New Brandeis Movement (critics call them "antitrust hipsters"), who believe that today's tech giants pose threats as significant as Standard Oil a century ago. "All of the money spent online is going to just a few companies now," says [Gary Reback] (who disdains the New Brandeis label)....
In 2016, a new Guinness World Record was set for the largest object to be 3D printed in one piece. The ABS/carbon fiber composite tool was 3D printed in 30 hours, and measured 17.5 feet long, 5.5 feet wide, and 1.5 feet tall. It was about as long as an average sport utility vehicle. The part was inarguably an impressive accomplishment but that long length cannot compare to what Made In Space just 3D printed.
Made In Space is known for some pretty impressive accomplishments already. The company was responsible for the first 3D printer to be launched into space, and has since created a full Additive Manufacturing Facility (AMF) on the International Space station. Plenty of firsts have been set by the AMF as 3D printed tools, medical supplies, art and more have been 3D printed in space, the first of their kind. Now Made In Space has claimed the Guinness World Record for longest non-assembled 3D printed object, and its a lot longer than an SUV its 37.7 meters, or 123 feet, 8.5 inches long.
The BPF virtual machine is working its way into an increasing number of kernel subsystems. The previous article in this series introduced the BPF Compiler Collection (BCC), which provides a set of tools for working with BPF. But there is more to BCC than a set of administrative tools; it also provides a development environment for those wanting to create their own BPF-based utilities. Read on for an exploration of that environment and how it can be used to create programs and attach them to tracepoints.
Additive manufacturing has come a long way in a short time, and the parts you can turn out with some high-end 3D-printers rival machined metal in terms of durability. But consumer-grade technology generally lags the good stuff, so theres no way you can 3D-print internal combustion engine parts on a run of the mill printer yet, right?
As it turns out, you can at least 3D-print connecting rods, if both the engine and your expectations are scaled appropriately. [JohnnyQ90] loves his miniature nitro engines, which weve seen him use to power both a rotary tool and a hand drill before. So taking apart a perfectly good engine and replacing the aluminum connecting rod with a PETG print was a little surprising. The design process was dead easy with such a simple part, and the print seemed like a reasonable facsimile of the original when laid side-by-side. But there were obvious differences, like the press-fit bronze bearings and oil ports in the crank and wrist ends of the original part, not to mention the even thickness along the plastic part instead of the relief along the shaft in the prototype.
Nonetheless, the rod was fitted into an engine with a clear plastic cover that lets us observe the spinning bits right up to the inevitable moment of failure, which you can see in the video below. To us it looks like failing to neck down the shaft of the rod was probably not a great idea, but the main failure mode was the bearings, or lack thereof. Still, we were surprised how long the part lasted, and we cant help but wonder how a composite connecting rod would perform.
Still in the mood to see how plastic performs in two-stroke engines? Break out the JB Weld.
That in-home DNA test wont tell you much about how to eat or exercise. Fortunately, you dont need it to.
What if instead of blasting cargo into space on a rocket, we could fling it into space using a catapult? Thats the big, possibly crazy, possibly genius idea behind SpinLaunch. It was secretly founded in 2014 by Jonathan Yaney, who built solar-powered drone startup Titan Aerospace and sold it to Google. Now TechCrunch has learned from three sources that SpinLaunch is raising a massive $30 million Series A to develop its catapult technology. And weve scored an interview with the founder after four years in stealth.
Sources whove spoken to the SpinLaunch team tell me the idea is to create a much cheaper and sustainable way to get things like satellites from earth into space without chemical propellant. Using a catapult would sidestep the heavy fuel and expensive booster rockets used by companies like SpaceX and Blue Origin.
SpinLaunch plans to use a centrifuge spinning at an incredible rate inside a vacuum that reduces friction. All that momentum is then harnessed to catapult a payload into space at speeds one source said could be around 3,000 miles per hour. With enough momentum, objects could be flung into space on their own. Alternatively, the catapult could provide some of the power needed with cargo being equipped with supplemental rockets necessary to leave earths atmosphere.
How else will astronauts get a Big Gulp on their way to Mars?
We at the Free Software Foundation (FSF) value net neutrality for many reasons, and we know it's necessary for a free Web and the future of free software.
Protecting net neutrality in the United States is one of the most important issues facing digital rights activists and advocates here. After the Federal Communication Commission (FCC) shamefully revoked the common carrier classification of Internet Service Providers (ISPs) -- the closest thing to pro-net neutrality laws that we had at a national level -- members of Congress finally took notice and started working on a Congressional Review Act (CRA). A CRA allows Congress to vote to overturn a policy decision, like the FCC's reclassification of ISPs.
In order for a CRA to work, a simple majority of Senators and Representatives need to support it -- which means 51 Senators. We currently have 50 Senators pledging to support net neutrality. We need one more.
This February 27th, the Internet is coming together to support the CRA, and we need you to join.
We urge you to call your Senator. Information about contacting your Senator is available on the Senate Web site.
Not sure what to say? Try the following:
I'm a voter/resident in your district, and I am concerned about the future of the internet. Net neutrality is necessary for a free Web. I hope you will support the CRA to overturn the FCC's decision on ISPs as common carriers.
After you call, share on social media. We prefer GNU social and Mastodon -- if your social media supports hashtags, use #NetNeutrality and #OneMoreVote. Don't forget to tag @fsf and let us know!
Want some bonus points? There are more than 100 members from the House of Representatives supporting the CRA. We need 218 to step up for a free Web. Call your Representative and ask them to save net neutrality and vote for the CRA.
You can find your Representative online.
Thank you for everything you do for free software, the FSF, and net neutrality. We're looking forward to hearing from you on the 27th!
Hackers Hijack Teslas AWS servers, Use It To Mine Cryptocurrency
Tesla, the electric car manufacturer based in Palo Alto, California, is the latest victim of crypto-mining malware that allowed the hackers to covertly mine cryptocurrency an attack known as crypto-jacking.
Researchers from the RedLock Cloud Security Intelligence (CSI) team discovered the breach on Tesla-owned Amazon cloud account last month and alerted the car manufacturer. The CGI security researchers came across the breach while trying to find out which organization left credentials for an Amazon Web Services (AWS) account open to the public Internet. The owner of the account happened to be Tesla, they said.
We werent the first to get to it, Varun Badhwar, CEO and co-founder of RedLock, told Fortune in a phone conversation. Clearly, someone else had launched instances that were already mining cryptocurrency in this particular Tesla environment.
The CGI researchers in their February 2018 Cloud Security Trends report said that the anonymous hackers infiltrated Teslas Kubernetes console (an open source system originally designed by Google to manage applications) that was not password protected and exposed access credentials to Teslas Amazon Web Services (AWS) environment.
The exposed Tesla AWS contained an Amazon Simple Storage Service (S3) bucket, which stored sensitive data such as telemetry, mapping, and vehicle servicing data, RedLock researchers stated. Once the hackers gained access to Teslas cloud servers, they installed cryptocurrency mining software called Stratum to mine cryptocurrencies and configured the malicious script to connect to an unlisted or semi-public endpoint. They then began cryptomining by obscuring the true IP address of the mining pool server behind Cloudflare and kept the CPU usage low to evade detection.
In Teslas case, the cyber thieves gained access to Teslas Kubernetes administrative console, which exposed access credentials to Teslas AWS environment, RedLock says. Those credentials provided unfettered access to non-public Tesla information stored in Amazon Simple Storage Service (S3) buckets.
Last year, RedLock had published a report that said that 53% of organizations using cloud storage services such as Amazon had accidentally exposed these to the public, with hundreds leaking credentials through services such as Kubernetes.
The CGI researchers said they are not certain of the type and the value of currency mined using the stolen power. They were also uncertain as to how long the intruders had access.
Bigelow Aerospace the Las Vegas-based company manufacturing space habitats is starting a spinoff venture aimed at managing any modules that the company deploys into space. Called Bigelow Space Operations (BSO), the new company will be responsible for selling Bigelows habitats to customers, such as NASA, foreign countries, and other private companies. But first, BSO will try to figure out what kind of business exists exactly in lower Earth orbit, the area of space where the ISS currently resides.
Bigelow makes habitats designed to expand. The densely packed modules launch on a rocket and then inflate once in space, providing more overall volume for astronauts to roam around. The company already has one of its prototype habitats in orbit right now: the Bigelow Expandable Activity Module, or BEAM, which has been attached to the International Space Station since 2016. The BEAM has proven that Bigelows expandable habitat technology not only works, but also holds up well against the space environment.
The first satellite powered by the sun was sent into orbit 50 years ago this month. Photovoltaics have progressed much since then, but the progress has been slower than many people realize Photo-illustration: Stuart Bradford
Sixty years ago this month, a rocket lifted off from Cape Canaveral bearing the Vanguard 1 satellite, a small, 1.46-kilogram aluminum sphere that was the first to use photovoltaic cells in orbit.
As a safeguard, one of the satellites two transmitters drew power from mercury batteries, but they failed after just three months. The six monocrystalline silicon cells, each roughly 5 centimeters on a side and delivering a total of just 1 watt, kept on powering a beacon transmitter for 14 months, until May 1964.
It happened in space because cost was no object. In the mid-1950s, PV cells ran about US $300 per watt. The cost fell to about $80/W in the mid-1970s, to $10/W by the late 1980s, to $1/W by 2011, and to about 40 cents per watt in 2017. Thats enough to bring the total system costfor installations with single-axis trackingclose to $1/W. Forecasts indicate that the cost will fall by as much as 60 percent further by 2025.
But the anniversary of the launch reminds us that it has taken quite a while to get to this point. Edmond Becquerel first described the photovoltaic effect in 1839 in a solution, and William Adams and Richard Day discovered it in 1876 in selenium. Commercial opportunities opened up only when the silicon cell was invented at Bell Telephone Laboratories, in 1954. Even then, the cost per watt remained around $300, and except for use in a few toys, PVs were just not practical.
It was Hans Zie...
Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the perspective of a remote unauthenticated attacker. The Trend Micro Encryption for Email Gateway (TMEEG) is a Linux-based software solution/virtual appliance that provides the ability to perform the encryption and decryption of email at the corporate gateway, regardless of the email client and the platform from which it originated. The encryption More
According to Ars Technica
A number of "alt-right," pro-Trump, and self-described conservative social media personalities awoke this morning to find that they had a lot fewer followers on Twitter than they had the night before. The apparent cause was the latest culling by Twitter of accounts that in some way violated the company's terms of service, a Twitter spokesperson told Ars, including "behaviors that indicate automated activity or violations of our policies around having multiple accounts, or abuse." The sweep has some on the right accusing Twitter of politically motivated censorship.
"Twitter's tools are apolitical, and we enforce our rules without political bias," a Twitter spokesperson said in a statement emailed to Ars. The accounts were targeted as part of "our ongoing work in safety," the spokesperson said. "We also take action on any accounts we find that violate our terms of service, including asking account owners to confirm a phone number so we can confirm a human is behind it. That's why some people may be experiencing suspensions or locks. This is part of our ongoing, comprehensive efforts to make Twitter safer and healthier for everyone."
And at Vanity Fair:
Renewed fears of censorship have once again led some users to talk about leaving to join Gab, the so-called free-speech social network that cropped up in 2016 as an alternative to Twitter. And Gab couldn't be more pleased. Utsav Sanduja, the company's chief operating officer, told me on Wednesday that the company had seen "a surge of donations, Gab memberships, [and] user sign-ups" since Tuesday night.
Read more of this story at SoylentNews.
Google reveals unpatched security vulnerability in Microsofts Edge browser
Googles Project Zero team of security researchers disclosed a high-severity vulnerability it found in Microsofts Edge browser after the company failed to patch it within the allotted time of 90 days. The vulnerability can allow an attacker to gain administrator privileges if exploited.
For those unfamiliar, Project Zero is a team of security analysts employed by Google to find zero-day vulnerabilities before they are found and exploited by malicious people. On finding and disclosing the vulnerability to the relevant company, Google gives them 90 days to fix the issue. However, if the company fails to issue a patch within the specified time period, the Project Zero team discloses the vulnerability to the public so that users can protect themselves by taking necessary steps.
This most recent vulnerability was identified by James Forshaw, a Google Project Zero researcher, who disclosed it to Microsoft on November 10 as part of a separate security issue with Windows 10. Apparently, there are actually two bugs in this vulnerability, named 1427 and 1428. While Microsoft addressed the bug 1427 with its Februarys Patch Tuesday release earlier this month, as it found it to be more critical. However, it chose to leave the other bug 1428 untouched, as it says its not a critical vulnerability.
Currently, the issue has been listed as high-severity by Google because of its ease of exploitation. However, since the latest elevation of privilege flaw in Windows 10 cannot be exploited remotely or in browsers that run in a sandbox, Microsoft has categorized it as important rather than critical. Forshaw points outs that the flaw only affects Windows 10 and he hasnt verified whether it works on earlier versions, like Windows 7 or 8.1.
When Neowin contacted Microsoft for clarification regarding the security flaw, they responded by saying, Windows has a customer commitment to investigate reported security issues, and proactively update impacted devices as soon as possible.
Only last week, Googles Project Zero had revealed a...
[Eric Strebel] is quickly becoming a favorite here at Hackaday. Hes got a fantastic knack for turning everyday objects into something awesome, and hes kind of enough to document his builds for the viewing pleasure of hackers and makers everywhere. It also doesnt hurt that his voice and narration style gives us a real Bob Ross vibe.
The latest Happy Accident out of his workshop is a neat light-up cane made from a ceramic skull found at a local store. But while the finished cane itself might not be terribly exciting, the construction methods demonstrated by [Eric] are well worth the price of admission. Rather than using Bondo like the filler were all accustomed to, he shows how it can be used to rapidly build free-form structures and components.
After building up layers of Bondo, he uses a cheese grater to smooth out the rough surface and a hobby knife to clean up the edges. According to [Eric], one of the benefits of working with Bondo like this is that its very easy to shape and manipulate before it fully hardens; allowing you to really make things up as you go.
[Eric] also shares a little secret about how he makes his gray Bondo: he mixes some of the toner from a laser printer cartridge into it. This allows you to very cheaply augment the color of the filler, and is definitely something to...
Tesla has confirmed that hackers have compromised its cloud computing platform to mine cryptocurrency, after the incident was discovered by cloud security firm RedLock.
The hackers have breached the Tesla cloud servers and have installed a crypto currency miner, the company fixed the issue exploited by the hackers within hours.
The attackers gained access to the Teslas Amazon Web Services environment on a Kubernetes console that was reportedly not password-protected. The console is used by companies to manage the infrastructure deployed on the cloud hosting providers.
According to RedLock, the hackers discovered log-in details to Teslas Amazon Web Services environment on a Kubernetes console a system originally designed by Google to manage applications. The console was reportedly not password-protected. states the BBC.
RedLock experts discovered a pod inside the Kubernetes console that stored login credentials for one of Teslas AWS cloud infrastructure.
The security breach happened in 2017, according to the company no customer data had been stolen.
Our initial investigation found no indication that customer privacy or vehicle safety or security was compromised in any way, said a Tesla spokesman.
According to RedLock, the exposed AWS buckets contained sensitive information, including telemetry data.
The hackers had infiltrated Teslas Kubernetes console which was not password protected. Within one Kubernetes pod, access credentials were exposed to Teslas AWS environment which contained an Amazon S3 (Amazon Simple Storage Service) bucket that had sensitive data such as telemetry. reads a blog post published by RedLock.
Posted by Solar Designer on Feb 22Hi,
Back in December was our most recent round of Windows Subsystem for Linux benchmarking with Windows 10 while since then both Linux and Windows have received new stable updates, most notably for mitigating the Spectre and Meltdown CPU vulnerabilities. For your viewing pleasure today are some fresh benchmarks looking at the Windows 10 WSL performance against Linux using the latest updates as of this week while also running some comparison tests too against Docker on Windows and Oracle VM VirtualBox.
Women working at several Comcast offices have described experiencing sexual harassment from their co-workers that often was ignored or mishandled by the company, reports Jezebel.One former employee at a Comcast center in Washington, D.C.,...
An Anonymous Coward provides the following news from this Cisco white paper:
Hyperscale data centers will grow from 338 in number at the end of 2016 to 628 by 2021. They will represent 53 percent of all installed data center servers by 2021.
Traffic within hyperscale data centers will quadruple by 2021. Hyperscale data centers already account for 39 percent of total traffic within all data centers and will account for 55 percent by 2021.
Annual global data center IP traffic will reach 20.6 Zettabytes (ZB) (1.7 ZB per month) by the end of 2021, up from 6.8 ZB per year (568 exabytes [EB] per month) in 2016.
Global data center IP traffic will grow 3-fold over the next 5 years. Overall, data center IP traffic will grow at a Compound Annual Growth Rate (CAGR) of 25 percent from 2016 to 2021.
By 2021, 94 percent of workloads and compute instances will be processed by cloud data centers; 6 percent will be processed by traditional data centers.
Read more of this story at SoylentNews.
When I got my first computer, a second hand 386 running MS-DOS 6.22, I didnt have an Internet connection. But I did have QuickBASIC installed and a stack of programming magazines the local library was throwing out, so I had plenty to keep myself busy. At the time, I thought QuickBASIC was more or less indistinguishable from magic. I could write simple code and compile it into an .exe, put it on a floppy, and give it to somebody else to run on their own machine. It seemed too good to be true, how could this technology possibly be improved upon?
Of course, that was many years ago, and things are very different now. The programming languages du jour are worlds more capable than the plodding BASIC variants of the 80s and 90s. But still, when I found a floppy full of programs I wrote decades ago, I couldnt help but wonder about getting them running again. With something like DOSBox I reasoned I should be able to install the QuickBASIC IDE and run them like I was back on my trusty 386.
Unfortunately, that was not to be. Maybe Im just not well versed enough in DOSBox, but I couldnt get the IDE to actually run any of the source code I pulled off the floppy. This was disappointing, but then it occured to me that modern BASIC interpreters are probably being developed in some corner of the Internet, and perhaps I could find a way to run my nearly 30 year old code without having to rely on 30 year old software to do it.
Move over, OLEDs. Quantum dots will be the next darling of display manufacturers Illustration: James Provost
The future of the television set was supposed to be simple. At some point in the near future, LCDs were supposed to become obsolete and give way to bright, sharp, and incredibly thin OLED displays. It turns out that the near future of TVs isnt going to be so simplebut it sure is going to be bright.
The reason? Quantum dots. If youve shopped for a TV lately, youve probably been dazzled, or more likely perplexed, by the array of new acronyms being splashed around by the best-known TV makers. Perhaps youve wondered what they mean by QD, QUHD, SUHD, and ULED. Were here to help. Each of these trade names refers to a quantum-dot technology available today. Well explain the different approaches as well as other ways quantum dots will be used in future television displays. Even if youve had your heart set on an OLED TV, we think youll find the coming world of very-high-performance quantum-dot displays appealing. For one thing, this emerging technology is going to finally make possible the printable, rollable, and wallpaper-ready televisions that weve all been promised for the past 20 years.
But to understand how televisions are going to make this, er, quantum leap, first consider why people are using quantum dots for TVs in the first place.
At just a few nanometers in diameter, a...
Posted by Solar Designer on Feb 22As I just wrote in a comment to the GitHub issue above:
A steering wheel that pretends to bite you could make more advanced autonomous cars safer to drive Photo: Brian Mok
Most of the autonomous vehicles that youre likely to encounter in the near future are either Level 2 or Level 4 autonomous. Level 2, which youll find in a Tesla on the highway, means that the car drives itself in specific situations but expects you to be paying attention the entire time. Level 4 you might see in some experimental fully autonomous vehicles: They can drive themselves in specific areas when the conditions are good, and, like taxis, you sit in the back while they do all the driving no matter what happens.
Theres a reason that automotive companies have mostly skipped Level 3 autonomy: It puts a human in the loop sometimes, which is way worse than having a human in the loop either all of the time or not at all. To help us help our cars make safe, prompt transitions in and out of intermediate autonomous modes, researchers from Stanford University are experimenting with a robotic steering wheel that can physically transform, giving you a cute little nudge to help you pay attention when necessary.
At Level 3, an automated driving system is expected to be able to handle all aspects of a driving task in a specific driving mode such as on the highway, except when it cant, at which point it will rely on the human driver to respond appropriately to a request to intervene.
The problem here is that the system tells the human, okay, you can chill out and not pay attention at all because I got this, except you need to be able to focus on the road with very little warning whenever I think I might be getting into trouble. Humans are bad at these types of situations. Studies have shown that we dont reliably shift our attention (or, lets be honest, wake up) quickly enough to make a safe transition back to driving. Research has shown that most drivers need between 5 and 8 seconds to make the switch from doing whatever to competently controlling a car. That is a very long timeand distanceat 70 miles per hour (115 km/h).
Part of the problem is that conventional cues such as sounds or flashing lights arent always effective at communicating whether the car is driving itself or it expects you to be in command, and any ambiguity during these transitions can be dangerous. Other tricks like vibrating seats help somewhat. But the Stanford researchers are testing whether an actuated, transforming steering wheel can help even more....
Posted by Justin Bull on Feb 22Apologies. This fails to account for a non-trivial scenario.
Last month, a coalition of Canadian companies called on the local telecom regulator CRTC to establish a local pirate site blocking program, which would be the first of its kind in North America.
The Canadian deal is supported by Fairplay Canada, a coalition of both copyright holders and major players in the Telco industry, such as Bell and Rogers, which also have media companies of their own.
Thus far, theres been a fair amount of opposition to the proposal. While CTRC is reviewing FairPlay Canadas plans, OpenMedia has launched a petition to stop the effort in its tracks, which has already been signed by tens of thousands of Canadians.
However, there are also people who are backing the blocking efforts. In some cases, with a gentle push from their employer.
Canadian law Professor Micheal Geist, whos one of the most vocal opponents of the blocking plans, recently tweeted a note Bell sent to its employees. Through an internal message, the ISP asks its workers to help stop online piracy and protect content creators.
The company clearly hopes that its employees will back the site-blocking agenda, but according to Geist, this may not be the best way to do it.
Geist points out that the internal message doesnt encourage employees to disclose their affiliation with Bell. This raises eyebrows, in particular, because Bell agreed to a $1.25 million settlement in 2015 after it encouraged some employees to write positive reviews and ratings on Bell apps.
In this case, the message has nothing to with app ratings, but its clear that the company is encouraging its employees to support a regulatory effort that serves Bells interests.
All Canadians can provide their views on the website blocking proposal, but corporate encouragement to employees to participate in regulatory processes on the companys behalf may raise the kinds of concerns regarding misleading impressions that sparked the Commissioner of Competition to intervene in 2015, Geists writes in a blog post....
It's been a busy past week for open-source GPU compute with Intel opening up their new NEO OpenCL stack, Karol Herbst at Red Hat posting the latest on Nouveau NIR support for SPIR-V compute, and now longtime Nouveau contributor Pierre Moreau has presented his latest for SPIR-V Clover support...
Hacking baby monitors is nothing new but the fact that
This is a post from HackRead.com Read the original post: Over 50,000 baby monitors can be hacked but its vendor is AWOL
Blockchain Consultant Joshua Massey joins our New Money Systems Board.
It sometimes seems as though barely a week can go by without yet another major software-related hardware vulnerability story. As manufacturers grapple with the demands of no longer building simple appliances but instead supplying them containing software that may expose itself to the world over the Internet, we see devices shipped with insecure firmware and little care for its support or updating after the sale.
The French government have a proposal to address this problem that may be of interest to our community, to make manufacturers liable for the security of a product while it is on the market, and with the possibility of requiring its software to be made open-source at end-of-life. In the first instance it can only be a good thing for device security to be put at the top of a manufacturers agenda, and in the second the ready availability of source code would present reverse engineers with a bonanza.
Its worth making the point that this is a strategy document, what it contains are only proposals and not laws. As a 166 page French-language PDF its a long read for any Francophones among you and contains many other aspects of the French take on cybersecurity. But its important, because it shows the likely direction that France intends to take on this issue within the EU. At an EU level this could then represent a globally significant move that would affect products sold far and wide.
What do we expect to happen in reality though? It would be nice to think that security holes in consumer devices would be neutralised overnight and then wed have source code for a load of devices, but wed reluctantly have to say well believe it when we see it. It is more likely that manufacturers will fight it tooth and nail, and given some recent stories about devices being bricked by software updates at the end of support we could even see many of them willingly consigning their products to the e-waste bins rather than complying. Wed love to be proven wrong, but perhaps were too used to such stories. Either way this will be an interesting story to watch, and well keep you posted.
Merci beaucoup [Sebastien] for the invaluable French-language help.
French flag: Wox-globe-trotter [Public domain].
Member of the European Parliament Julia Reda writes an update to what has been going on with with proposed changes to copyright law as they make their way from the European Commission and over to the European Parliament:
Ever since the European Commission presented its hugely controversial proposal to force internet platforms to employ censorship machines, the copyright world has been eagerly awaiting the position of the European Parliament. Today, the person tasked with steering the copyright reform through Parliament, rapporteur Axel Voss, has finally issued the text he wants the Parliament to go forward with.
It's a green light for censorship machines: Mr. Voss has kept the proposal originally penned by his German party colleague, former Digital Commissioner Gnther Oettinger, almost completely intact.
She walks through the following points to notice in the so-called compromise:
She closes with encouragement that it's not too late to stop the Censorship Machines:
Now it's time to call upon your MEPs to reject Mr. Voss' proposal! You can use tools such as SaveTheMeme.net by Digital Rights NGO Bits of Freedom or ChangeCopyright.org by Mozilla to call the Members of the Legal Affairs Committee free of charge. Or look for MEPs from your country and send them an email. But most importantly, spread the words! Ask you local media to report on this law. The Internet as we know it is at stake.
Source : Green light for
upload filters: EU Parliament's copyright rapporteur has learned
nothing from year-long debate
See also : Proposal for a Directive on Copyright in the Digital Single Market : Draft compromise [sic] amendments on Article 13 and corresponding recitals (warning for PDF)
The Federal Communications Commission's (FCC) order repealing net neutrality was published in the Federal Register Thursday morning, opening the door for supporters of the Obama-era rules to launch legislative and legal challenges.The...
Trinity College Dublin (TCD), in Ireland, is to be the recipient of a new specialist 3D bioprinting facility supported by a collaboration between multinational medical device and pharmaceutical company Johnson & Johnson, and the AMBER research center.
With preparations beginning in the first quarter of this year, the new 3D bioprinting laboratory is due to be opened by the close of 2018.
Professor Michael Morris, AMBER director, comments.
Besides bringing Ubuntu Touch to new mobile devices, the UBports team has also managed to continue their community-driven work on advancing the Unity 8 convergence desktop after Canonical abandoned work on it last year. They now have Unity 8 working on top of Ubuntu 18.04 LTS...
Intel has released to OEMs a new set of Spectre firmware updates. They include microcode for Kaby Lake, Coffee Lake, and Skylake processors. This represents our 6th, 7th, and 8th Generation Intel Core product lines as well as our latest Intel Core X-series processor family. It also includes our recently announced Intel Xeon Scalable and Intel Xeon D processors for data center systems, Navin Shenoy, general manager of the Data Center Group at Intel Corporation, More
Posted by Moritz Muehlenhoff on Feb 22-------------------------------------------------------------------------
On the face of it, keeping fluids contained seems like a simple job. Your fridge alone probably has a dozen or more trivial examples of liquids being successfully kept where they belong, whether its the plastic lid on last nights leftovers or the top on the jug of milk. But deeper down in the bowels of the fridge, like inside the compressor or where the water line for the icemaker is attached, are more complex and interesting mechanisms for keeping fluids contained. Thats the job of seals, the next topic in our series on mechanisms.
One of the simplest seals is packing, or compressing some sort of flexible material into a space to control the flow of a fluid. Packing probably dates to at least the time when humans began making boats more complicated than a simple dugout canoe, in response to the fact that its really difficult to keep water from leaking between two pieces of wood. Ship seams have been caulked with fibers like hemp and cotton soaked in pitch or tar for millennia.Marine propeller shaft stuffing box. The gland compresses the seals against the shaft, controlling water flow into the bilge. Source: Engineman 1 & C
A more complex seal, in the form of a s...
Turkey is targeting the production of unmanned tanks for its armed forces, President Recep Tayyip Erdoan has stated. "We will carry it a step further [after domestically produced unmanned aerial vehicles] ... We should reach the ability to produce unmanned tanks as well. We will do it," Erdoan said at a meeting held at the presidential complex in Ankara on Feb. 21.
Five Turkish soldiers were recently killed in a tank near the Sheikh Haruz area of Syria's Afrin district, where Turkey has been carrying on a military operation against the People's Protection Units (YPG) since Jan. 20.
[...] The Turkish president has repeatedly criticized certain foreign countries for allegedly being reluctant to sell unmanned aerial vehicles, armed or unarmed, stressing that unmanned systems could decrease casualties.
Also at ABC.
Read more of this story at SoylentNews.
Which is the cost of cybercrime? It is hard to provide an effective a good estimation of the overall impact of the numerous phenomena that happen every day, including cyber attacks, data breaches, scams and so on.
According to the report was written by McAfee in collaboration with the Center for Strategic and International Studies (CSIS), the global cost is estimated at $600 billion annually, a disconcerting figure that corresponds to 0.8% of the global GDP. The value is jumped from $500 billion in 2014 to $600 billion (+20%).
In 2014, taking into account the full range of costs, CSIS estimated that cybercrime cost the world between $345 billion and $445 billion. As a percentage of global GDP, cybercrime cost the global economy 0.62% of GDP in 2014. Using the same methods, CSIS now believe the range is now between $445 billion and $600 billion. states the report.
The jump is mainly caused by the significant increase of theft of intellectual property and business confidential information, intellectual property theft accounts for at least 25% of overall cybercrime costs.
The cost of cybercrime is distributed among all the countries of the world, no one is immune. The report shows variations by region, that are linked to income levels and level of cybersecurity maturity, the countries with greater losses are the richest ones.
According to the report, Russia leads cybercrime activities worldwide, the reports also highlighted the thin line between crime rings and nation-state actors.
CSIS believes that Russia leads overall in cybercrime, reflecting the skill of its hacker communit...
Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control activity. To reduce adversaries time to operate, security professionals said they will increasingly leverage and spend more on tools that use AI and machine learning, reported in the 11th Cisco 2018 Annual Cybersecurity Report (ACR). While encryption is meant to enhance security, the expanded volume of encrypted web traffic (50 percent as More
Security updates have been issued by Arch Linux (strongswan), Fedora (torbrowser-launcher), openSUSE (libdb-4_5, libdb-4_8, postgresql96, python3-openpyxl, and xv), Red Hat (rh-maven35-jackson-databind), and Ubuntu (kernel, libreoffice, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-hwe, linux-azure, linux-gcp, linux-oem, and linux-lts-xenial, linux-aws).
Flu fighting gets an injection of high tech Photo: iStock Photo
Hand sanitizer just isnt cutting it this winter. Much of the US remains in the throws of its worst flu season this decade, according to federal officials. One out of every 13 doctor visits during the second week of February was for fever, cough and other flu-like symptoms, matching the peak levels during the 2009 swine flu pandemic, the US Centers for Disease Control and Prevention (CDC) reported this month .
We wondered if there was any new technology out there that might help. It turns out some engineers are on it, with new software and sanitizing gadgets. In the hope that it might inspire further ingenuity or provide a resource for consumers, heres our short list of the latest trends in flu fighting tech.
1. Far-UVC light kills airborne viruses without harming human tissue
For those of you sitting at your desks, listening to your office mates sneeze their way down the corridors, take heart: Researchers at Columbia University are developing overhead lights that can kill airborne viruses and bacteria, harmlessly decontaminating the space around you.
The lights emit a narrow spectrum of ultraviolet C (UVC) light, called far-UVC, at a wavelength of about 222 nanometers. This month, a team out of Columbia University Medical Center reported for the first time that a very low dose of far-UVC light kills more than 95% of airborne H1N1 influenza in its path.
Yet the light doesnt harm mammalian cells, according to previous research by the Columbia team, led by David Brenner and David Welch. It can penetrate bacteria and viruses because they are much smaller, says Welch.
Far-UVC differs from conventional UVC light, which, at a wavelength of 254 nanometers, can penetrate human skin can lead to skin cancer and cataracts. Conventional UVC germicidal light has been used for decades in enclosed spaces in hospitals to kill bacteria and viruses on surgical equipment.
The Columbia researchers next move is to test the effects of long-term exposure to far-UVC light in mice, and eventually in humans, Welch says. If the tech proves safe, the researchers envision installing the invisible lights in high traffic areas of doctors offices, hospitals, schools, airports and other public spaces.
2. UV Gadgets Sanitize Personal It...
Disclosure: I sell solar power systems in New Zealand. Via: Reuters: Rather than rising, GE Powers profit fell 45 percent last year, forcing GE to slash its overall profit outlook and cut its dividend for only the second time since the Great Depression. Its shares have plunged more than 50 percent since the March 
Calculate Linux is a Gentoo-based rolling release distribution which is available in several desktop and server editions. The project's latest version, Calculate Linux 17.12.2, features fixes for the Spectre and Meltdown CPU bugs, restores functionality for LXC containers, permits renaming of network interfaces and makes it possible to....
Based on in-depth interviews with security executives from 30 participating organizations across multiple industries, RiskRecon revealed how companies are managing the security risks of their complex digital supply chains and sensitive business partnerships. Researchers identified vendor-neutral capability sets comprising common, emerging, and pioneering practices that firms have implemented to manage third-party security risk. Enterprise risk officers are waking up to the reality that their information risk increasingly resides in the systems of their third-parties, beyond More
For the past seven years, Open Networking Summit (ONS) has brought together the networking industrys ecosystem of network operators, vendors, open source projects, leading researchers, and investors to discuss the latest SDN and NFV developments that will shape the future of the networking industry. With this years event, taking place March 26-29, 2018 in Los Angeles, ONS will evolve its approach as the premier open source networking event.
NVIDIA developer Thierry Reding on Wednesday posted a series of patches for providing NVIDIA Tegra support in Mesa in conjunction with the Nouveau DRM driver...
Understanding reliability is an equally complex problem to understanding user needs and we still need to consider the usereven more important than poor reliability is the perception of poor reliability. That why its essential that balanced teams start involving UX researchers in the reliability research of their product as ultimately this is a tool for product design.
Nigerian scammers are targeting Fortune 500 companies, and have already stolen millions of dollars from some of them, IBM Security researchers have found. Their strategy is well known: they take over or impersonate a trusted users email account to target companies that conduct international wire transfers, and trick accounts payable personnel into wiring money into bank accounts under their control. These so-called business email compromise (BEC) scams dont require much technical knowledge, malware or special More
Citizens were previously allowed to obtain content for their own use due to a levy on blank media that compensated rightsholders. However, the European Court of Justice found that system to be illegal and the government quickly moved to ban downloading from unauthorized sources.
In the four years that have passed since the ban, the downloading landscape has undergone change. Thats according to a study published by the Consumer Insights panel at Telecompaper which found that while 41% of respondents downloaded movies, TV shows, music and games from unauthorized sources in 2013, the figure had plunged to 27% at the end of 2016. There was a further drop to 24% by the end of 2017.
Of the people who continue to download illegally, men are overrepresented, the study found. While 27% of men obtained media for free during the last year to October 2017, only 21% of women did likewise.
While as many as 150 million people still use P2P technologies such as BitTorrent worldwide, there is a general decline in usage and this is reflected in the report.
In 2013, 18% of Dutch respondents used torrent-like systems to download, a figure that had fallen to 8% in 2016 and 6% last year. Again, male participants were overrepresented, outnumbering women by two to one. However, people appear to be visiting P2P networks less.
The study showed that people who reported using P2P to download content, have done so on average 37 times a year [to October 2017]. In January of 2017 it was significantly higher, 61 times, the study notes. P2P usage in November 2015 was rated at 98 instances per year.
Perhaps surprisingly, one of the oldest methods of downloading content has maintained its userbase in more recent years. Usenet, otherwise known as the newsgroups, accounted for 9% of downloaders in 2013 but after falling to around 6% of downloaders in 2016, that figure remained unchanged in 2017. Almost five times more men used newsgroups than women.
Drilling down into more obscure systems, 2% of respondents told Telecompa......
ARM wants mobile or IoT devices to include a tiny integrated SIM card:
Every millimeter of space matters when you're trying to build increasingly complex electronics into increasingly tiny packages, and the relatively spacious SIM card has long been an area of frustration for hardware manufacturers. Now, the chip design company ARM may have an answer: an integrated component called an iSIM that's built into the same chip as the processor.
ARM says the iSIM will take up a "fraction of a millimeter squared," whereas the current SIM standard Nano SIMs are about 12.3 x 8.8mm in size, not including the hardware usually needed to house them. Not only will that save space, but ARM says it'll more importantly save on costs, too: instead of paying "tens of cents" per card, manufacturers will be paying single-digital cents.
Related: Infineon Demos a 1.65 mm^2 eSIM Chip
Read more of this story at SoylentNews.
The Cadillac ELR is a plug-in hybrid car with a bit of class, it has the beating heart of a Chevy Volt in a nice coup body with some up-market styling and a nice interior. Since it wasnt on the market for long and some consumers are still wary of cars with electric motors, it also represents something of a sweet spot: according to [Andrew Rossignol] you can pick them up for less outlay than you might imagine. He bought one, and being an inquisitive soul decided to probe its secrets through its OBD-II ports.
OBD-II sniffing is nothing especially new, but his write-up provides an interesting run-down of the methodology used to identify the different proprietary pieces of data that it makes available. His Python script attempted to parse the stream as though it were multi-byte words of different lengths, plotting its results as graphs, It was then a straightforward process of identifying the graphs by eye that contained useful data and rejecting those that were obviously garbage. He was able to pick out the figures in which he was interested, and write an interface for his little Sony VAIO UX to display them on the move.
Weve covered OBD hacks too numerous to mention over the years, but perhaps youd like to read our history of the standard.
Tuukka Turunen of The Qt Company has shared some of the company's plans for the Qt toolkit in 2018. There is a lot ahead for this open-source, cross-platform toolkit in 2018 with another long-term support release later this year, new Qt Python bindings, a safety-critical renderer and more...
Expect more of that in weeks/months to come
Summary: In their characteristic fashion, firms that created the UPC for their self-enrichment purposes, along with publishers/writers who deem it their role to promote the UPC and set up lobbying events for the UPC, look for ways to downplay if not intentionally distort what happened in Germany yesterday
THIS was predictable. Judging by how much lying we have seen so far coming from Team UPC and EPO management it would be shocking if they didnt lie about it. So okay, bring it on. Lets compare fiction to reality before the next wave of spin gets crafted.
As we noted yesterday morning, this whole gamble on UPC may be costing a lot of jobs. UPC would not only threaten many productive jobs (e.g. cost of fighting trolls in courts or paying them protection money, draining SME budgets); it actually threatens the jobs of examiners. This too was predictable and even though the UPC will never materialise (its very unlikely), it does a lot of damage to examiners. Regardless. What a blunder. Another casualty is patent quality, as we shall explain in a moment (judges are wrongly assumed to be substitutes for examiners).
Be ready for lots of spin from Bristows and other Team UPC members, I wrote last night. They hate reality and they hate facts.
It didnt take long for the spin to come. Minutes maybe!
Kluwer Patent blogger (i.e. Bristows) is already spinning this latest news from Germany; its possible that this account gets shuffled among UPC proponents, but based on the style, context and wording one can make a pretty safe guess. Its almost certainly Bristows. The firm does not want to be held accountable for lying, having written very briefly about this development in its private blog shortly after the news came out (we mentioned their short blog post on Wednesday night).
Here they are...
How do IBM scientists keep qubits colder than outer space?
IBM quantum physicists Dr. Stefan Filipp and Dr. Andreas Fuhrer (pictured) will be discussing quantum computing live from the IBM Zurich Research Lab, and will demonstrate how they keep qubits so cold, explain why, and take your questions.
Join us on Friday, Feb. 23 at 16:00 Paris time / 10:00 am EST.
You don't have to tear down your monolith to modernize it. You can evolve it into a beautiful microservice using cloud-native technologies.
Intel's next-generation Cannonlake processors with "Gen 10" graphics will be considered good to go with the next kernel cycle, Linux 4.17. The alpha/preliminary hardware support flag is being removed for these CPUs expected later this year...
Normally, autonomous computer programmes known as bots trawl the internet, for example, to help search engines. However, there are also programmes known as social bots which interfere in social media, automatically generating replies or sharing content. They are currently suspected of spreading political propaganda. Scientists at Friedrich-Alexander-Universitt Erlangen-Nrnberg (FAU) have investigated the extent to which such autonomous programmes were used on the platform Twitter during the general elections in Japan in 2014. By using methods taken from corpus linguistics, they were able to draw up a case study on the activity patterns of social bots. At the same time, the FAU researchers gained an insight into how computer programmes like these were used, and recognised that nationalistic tendencies had an important role to play in the election, especially in social media. The results of the investigation have been published in the journal Big Data.
Read more of this story at SoylentNews.
Its easy for her to speak out about these scandals now that shes retired (just like Siegfried Bro)
Image credit: Sheikh it Sheikh it
Summary: In the process of devaluing EPO workers and perhaps preparing them for a large round of layoffs information is also revealed about further repressions against the independence of the Boards of Appeal
THE EPO is rumoured to be heading towards layoffs (700-1000 in number, i.e. 10-15% of staff), as we noted yesterday morning and CA/3/18 seems to be stripped apart by Battistelli, as we noted last night. New Art. 53(1)(f) must be suppressed in the proposal CA/3/18, another source told us overnight. That was decided in the Board 28 meeting on Wednesday. So, the status of permanent staff is maintained. But the other foreseen changes probably stay in CA/3/18 (still to be confirmed).
We certainly hope that the German Constitutional Court is paying attention to this.We are hearing these things (about layoffs and permanent staff status) from multiple independent sources, so its likely to be true. As time goes by rumours become concrete and eventually the press too reports these as facts (albeit belatedly, sometimes as much as a month late).
Heres another new comment related to this (not many people will have noticed it):
Another curious detail is that in order to designate his deputy the President of the Boards of Appeal needs to have the approval of the President of the Office (CA/D 4/17).
The background to this arrangement can be found in CA/53/17.
We certainly hope that the German Constitutional Court is paying attention to this. Our next post will be about the German Constitutional Court.
Waiting on research advances is the rationale behind cryopreservation, and more broadly, a worldview known as transhumanism. A person killed by cancer or heart disease could reasonably be revived in a future when such ailments no longer exist. They believe in the advance of technology, says Giuseppe Nucci, an Italian photographer who visited with transhumanists and toured the facilities of Russia-based cryonics company KrioRus. They hope that someone will wake them up.
This hope, that the future will vanquish the ills of the present, is as old as the first civilisations that realized that with each passing year life got a little better. The Russian philosopher Nikolai Fedorovich Fedorov helped create an early 20th-century movement known as cosmism that was rooted in the idea that, given enough time, humans could defeat evil and death. If the human life span was too short, then the simple solution was to extend it, even after death, and suspend its decomposition until the world caught up.
Researchers have achieved a new kind of chimeric first, producing sheep-human hybrid embryos that could one day represent the future of organ donation by using body parts grown inside unnatural, engineered animals.
With that end goal in mind, scientists have created the first interspecies sheep-human chimera, introducing human stem cells into sheep embryos, resulting in a hybrid creature thats more than 99 percent sheep but also a tiny, little bit like you and me.
Admittedly, the human portion of the embryos created in the experiment before they were destroyed after 28 days is exceedingly small, but the fact it exists at all is what generates considerable controversy in this field of research.
Now an advanced computer simulation has filled in some of the gaps, and it turns out the element is even weirder than many expected.
At the atomic level, oganesson behaves remarkably differently to lighter elements in several key ways and that could provide some fundamental insights into the basics of how these superheavy elements work.
Why redesigning the humble yeast could kick off the next industrial revolution.
These house plants would make a lovely addition to your home and would filter the toxins out of your air.
The study of exoplanets has advanced by leaps and bounds in the past few decades. Between ground-based observatories and spacecraft like the Kepler mission, a total of 3,726 exoplanets have been confirmed in 2,792 systems, with 622 systems having more than one planet (as of Jan. 1st, 2018). And in the coming years, scientists expect that many more discoveries will be possible thanks to the deployment of next-generation missions.
These include NASAs James Webb Space Telescope (JWST) and several next-generation ground based observatories. With their advanced instruments, these and other observatories are not only expected to find many more exoplanets, but to reveal new and fascinating things about them. For instance, a recent study from Columbia University indicated that it will be possible, using the Transit Method, to study surface elevations on exoplanets.
Entrepreneur Juan Enriquez describes a future in which we will be able to hack evolution and even alter our memories thanks to DNA manipulation.
Arthur T Knackerbracket has found the following story:
American investigators are looking into Mercedes maker Daimler's use of engine management software that is alleged to help its vehicles pass emissions tests, according to reports.
German tabloid Bild am Sonntag splashed yesterday (behind paywall) that US investigators had found "several software functions that helped Daimler cars pass emissions tests".
The report included several references to documents from US investigators, though none of the English-language translations state which agency these investigators or documents are from.
Another feature outlined in the documents allegedly detected whether the car was on a stationary test rig based on a comparison of speed and acceleration data.
A Daimler spokesman told Reuters the company was cooperating under a confidentiality agreement with the US Department of Justice: "The authorities know the documents and no complaint has been filed."
Read more of this story at SoylentNews.
A distance record for LoRa transmission has been set that you probably wont be able to beat. Pack up your gear and go home, nothing more to achieve here. At a superficial reading having a figure of 71,572 km (44,473 miles) seems an impossible figure for one of the little LoRa radio modules many of us have hooked up to our microcontrollers, but the story isnt quite what youd expect and contains within it some extremely interesting use of technology.
So the folks at Outernet have sent data over LoRa for that incredible distance, but they did so not through the little ISM band modules were used to but over a suitably powerful Ku-band uplink to a geostationary satellite. They are also not using the LoRaWAN protocols of the earthbound systems, but simply the LoRa modulation scheme. So its not directly comparable to terrestrial records such as the 702 km we reported on last year, and they are the first to admit that.
Where their achievement becomes especially interesting though is in their choice of receiver. We are all used to Ku-band receivers, you may even have one on your house somewhere for satellite TV. It will probably involve a parabolic dish with a narrow beam width and an LNB whose horn antenna is placed at its focus. It would have required some skill and effort to set up, because it has to be pointed very carefully at the satellites position in the sky. Outernets mission of delivering an information service with the lowest possible barrier to entry precludes the extra expense of shipping a dish and providing trained staff to align it, so they take a very different approach. Their receiver uses either an LNB horn or a small patch antenna pointing at the satellite, with none of the dishes or phased arrays you might be used to in a Ku-band installation.
You might wonder how such a receiver could possibly work with such a meagre antenna, but the secret lies in LoRas relatively tiny bandwidth as well as the resistance to co-channel interference that is a built-in feature of the LoRa modulation scheme. Even though the receiver will be illuminated by multiple satellites at once it is able to retrieve the signal and achieve a 30 kb/s data rate that they hope with technical refinements to increase to 100 kb/s. This rate will be enough over which to push an SD video stream to name just one of the several examples of the type of content they hope to deliver.
Its likely that the average Hackaday reader will not be hiring satellite uplink time upon which to place their LoRa traffic. But this story does provide a demonstration of LoRas impressive capabilities, and will make us look upon our humble LNBs with new eyes.
Last year, Irish astronomy took a leap forward with the construction of the LOFAR radio telescope in Birr, Co. Offaly. Sean Mooney, who was involved in the telescopes construction, reports on its significance for the future of astronomy.
Last year, Birr was thrust to the forefront of astronomy. What may seem a quaint and unassuming town, Birr, Co. Offaly, is steeped in astronomical history and it has regained its scientific prominence with the construction of a new telescope.
In 1842, William Parsons, 3rd Earl of Rosse, began construction of a telescope on his estate, Birr Castle demesne, which would colloquially come to be known as The Leviathan. Not only was it the largest telescope in the world, it held this title for a staggering 72 years. This fact can be appreciated most in the current era of rapid technological improvements where the best of anything in the world holds the title for weeks rather than years before a better model comes along.
The tech-loving characters on "The Big Bang Theory" are about to find themselves severely star-struck. The comedy series has booked Microsoft founder Bill Gates to guest star as himself in an upcoming episode, CBS and Warner Bros. tell CNN.
In the episode, Penny (Kaley Cuoco) will find herself hosting Gates at work, and her friends go to great lengths in their effort to meet the billionaire innovator. The episode is set to air in late March.
Read more of this story at SoylentNews.
With dozens of millions of active users a day, uTorrent is one of the most popular torrent client, the vulnerabilities could be easily exploited by the researchers to deliver a malware on the target computer or view the past downloads.
Project Zero hacker Tavis Ormandy published a detailed analysis of the issues because the vulnerabilities were not fixed in a 90-day period according to the disclosure policy.
By default, utorrent create an HTTP RPC server on port 10000 (uTorrent classic) or 19575 (uTorrent web). There are numerous problems with these RPC servers that can be exploited by any website using XMLHTTPRequest(). To be clear, visiting *any* website is enough to compromise these applications.0 reads the technical analysis.
Both desktop and web-based uTorrent clients use a web interface to display website content, the presence of JSON-RPC issues make possible the attack decribed by Ormandy,
The expert discovered that the issue can allow an attacker to trigger a flaw in the clients by hiding commands inside web pages that interact with uTorrents RPC servers.
An attacker can exploit the vulnerability to change the torrent download folder and download a file to any writable location, including the Windows Startup folder and download an executable file, that will be executed on every startup. The attacker could exploit the same flaw to gain access to users download activity information.
This requires some simple DNS rebinding to attack remotely, but once you have the (authentication) secret you can ju...
Research-based programs and practices to help protect children from gun violence in your homes, schools and communities.
People who are at-risk of hurting themselves or others often show signs and signals before an act of violence takes place. When you dont know what to look for, it can be easy to miss signs, or dismiss them as unimportant, sometimes with tragic consequences.
Its important to know that one warning sign on its own does not mean a person is planning an act of violence. But when many connected or cumulative signs are observed over a period of time, it could mean that the person is heading down a pathway towards violence or self-harm. By knowing the signs, you have the power to intervene and get help for that person. Your actions can save lives.
Sandy Hook Promise trains students and adults to know the signs of gun violence so that no other parent experiences the senseless, horrific loss of their child. Join us.
Posted by Core Security Advisories Team on Feb 21Core Security - Corelabs Advisory
Posted by Defense Code on Feb 21DefenseCode Security Advisory
On the one hand, drinking alcohol may make you live longer.
Drinking could help you live longerthat's the good news for happy-hour enthusiasts from a study presented last week at the annual meeting of the American Association for the Advancement of Science. According to the study, people who live to 90 or older often drink moderately.
On the other, you might not remember who you are any more.
Heavy drinkers are putting themselves at risk of dementia, according to the largest study of its kind ever conducted.
Read more of this story at SoylentNews.
The Golden Age of Radio Shack was probably sometime in the mid-1970s, a time when you could just pop into the local store and pay 49 cents for the resistors you needed to complete a project. Radio Shack was the place to go for everything from hi-fi systems to CB radios, and for many of us, being inside one was very much a kid in a candy store scenario.
Thats not to say that Radio Shack was perfect, but one thing it did very well was the education and grooming of the next generation of electronics hobbyists, primarily through their Science Fair brand. Some of us will recall the P-Box kits from that line, complete projects with all the parts and instructions in a plastic box with a perfboard top. These kits were endlessly entertaining and educational, and now [NetZener] has recreated the classic neon Goofy Light P-Box project.
As it was back in the day, the Goofy Light is almost entirely useless except for learning about DC-DC converters, multivibrators, RC timing circuits, and the weird world of negative resistance. But by using the original Science Fair instructions, compiling a BOM that can be filled from Mouser or Digikey, and making up a reasonable facsimile of the original P-Box chassis, [NetZener] has done a service to anyone looking for a little dose of nostalgia.
It would be interesting if someone brought back the P-Box experience as a commercial venture, offering a range of kits with circuits like the originals. If that happens, maybe some of the offerings will be based on that other classic from Radio Shacks heyday.
If you are making use of the Mesa 17.3 releases, have you found them to be buggier than normal for this open-source 3D graphics driver stack? There remains a higher than average amount of bugs still outstanding that have plagued Mesa 17.3, even with being up to 17.3.5...
Apple Inc. is in talks to buy long-term supplies of cobalt directly from miners for the first time, according to people familiar with the matter, seeking to ensure it will have enough of the key battery ingredient amid industry fears of a shortage driven by the electric vehicle boom.
The iPhone maker is one of the world's largest end users of cobalt for the batteries in its gadgets, but until now it has left the business of buying the metal to the companies that make its batteries.
The talks show that the tech giant is keen to ensure that cobalt supplies for its iPhone and iPad batteries are sufficient, with the rapid growth in battery demand for electric vehicles threatening to create a shortage of the raw material. About a quarter of global cobalt production is used in smartphones.
Read more of this story at SoylentNews.
Australian copyright holders and lawmakers have been struggling to find an adequate response to online piracy for several years.
Progress has been slow, but with pirate site blockades now in effect, there appears to be some movement.
New research published by INCOPRO this week shows that traffic to blocked pirate sites has decreased 53.4% since the first measures were implemented a year ago. In total, usage of the top 250 pirate sites dropped a significant 25.4% in Australia.
In summary, the research confirms that direct traffic to blocked sites has decreased dramatically. Or put differently, the site blocking efforts actually block pirate sites, which by itself should hardly come as a surprise.
In fact, one might wonder how effective the blockades really are when nearly half of all direct traffic to the blocked sites in Australia remains intact and dozens of the countrys ISPs are involved.
On top, its also worth mentioning that the research doesnt take VPN usage into account. Australian interest in VPNs surged after the blockades were announced, so many people are likely to be circumvented the blockades using foreign VPNs.
While VPNs were not factored in, the current research did look at proxy site traffic and concludes that this only substitutes a small portion of the traffic that went to pirate sites before the blockades.
While its undoubtedly true that direct traffic to blocked sites has dropped, the research also includes some odd results. For example, it attributes a recent drop in Isohunt.to traffic to the blocking measures, when in reality the site actually shut down.
ISOHunt usage has been on a downward trend since December 2016, and is now at its lowest on record having reduced by 96.4% since blocking began, the report reads, drawing on data from Alexa.
But perhaps were nitpicking.
Creative Content Australia (CCA) is happy with these results and states that the fight against piracy has claimed a significant victory. However, the anti-piracy group also stressed that more can be done.
The reduction in piracy is exciting news but that 53% could be 90%, CCA Chairman Graham Burke says, using the opportunity to take another stab at Google.
The antimatter of science fiction vastly differs from the real-life antimatter of particle physics. The former powers spaceships or bombs, while the latter is just another particle that physicists study, one that happens to be the mirror image with the opposite charge of the more familiar particles.
Normally, scientists produce antimatter in the lab, where it stays put in an experimental apparatus for further study. But now, researchers are planning on transporting it for the first time from one lab to another in a truck for research. Elizabeth Gibney reports for Nature:
In a project that began last month, researchers will transport antimatter by truck and then use it to study the strange behaviour of rare radioactive nuclei. The work aims to provide a better understanding of fundamental processes inside atomic nuclei and to help astrophysicists to learn about the interiors of neutron stars, which contain the densest form of matter in the Universe.
The world is getting flooded with tiny (creepy) robots that can crawl all over the place, including your clothes. The latest one, created by scientists at Harvard University, uses artificial scaly skins to move forward kind of like a snake.
The soft robot is just a silicone rubber tube. But whats special about it is its skin a thin, stretchable plastic sheet thats been cut with a laser. The cuts, in the shape of triangles or circles, resemble the scales on the skin of snakes. When air is pumped into the tube, the robot expands and contracts, allowing the scales to pop up, anchor against the surface, and pull the robot forward. In a study published today in Science Robotics, scientists showed that the artificial snakeskins work against rough surfaces like asphalt and concrete. In the future, these robots could be scaled down and used to deliver drugs inside arteries, or in disaster situations where bots need to crawl inside narrow spaces.
ShmooCon, an American hacker convention, has its 2018 presentations online over at the Internet Archive, or on Youtube maybe. Each year original material on subjects related to computer security and cyberculture is presented. ShmooCon 2018 ran from January 19th through the 21st in Washington, D.C. with about 2,200 attendees.
Read more of this story at SoylentNews.
CRISPR In China: Cancer Treatment With Gene Editing Underway : Shots Health News More than a third of patients with cancer of the esophagus responded to experimental treatment in China with the gene-editing technique CRISPR. Several CRISPR studies are underway there.
The world runs on marketing hype. Remember the public relations swirl around the Segway? Before it rolled out we were led to believe it was going to be remembered as fire, the wheel, and Segway. Didnt really happen. Microsoft and IBM had done something similar with OS/2, which you may not even remember as the once heir-apparent to MS-DOS. OS/2 was to be the operating system that would cure all the problems with MS-DOS just as IBMs new Microchannel Architecture would cure all the problems surrounding the ISA bus (primarily that they couldnt stop people from cloning it). What happened? OS/2 died a slow agonizing death after the Microsoft/IBM divorce. But for whatever reason [Ryan C. Gordon] decided to write a Linux emulation layer for OS/2 call 2ine (twine).
We like retrocomputing projects even if they arent very practical, and this one qualifies. The best analog for 2ine is it is Wine for OS/2, which probably has something to do with the choice of name. You might be ready to click away since you probably dont have any OS/2 programs you want to run, but wait! The good news is that the post has a lot of technical detail about how Linux and OS/2 programs load and execute. For that reason alone, the post is well worth a read.
[Ryan] had been working on Unreal Tournament 2004 and saw a product called [Pixomatic]. Under Linux, Pixomatic actually loads a Windows DLL to do some work. This led him to dig into how the loaders worked and of course this is not unlike how Wine can load Windows binaries and provide them Windows API services that really do things in the Linux way. This led to a lot of interesting projects he mentions in passing, including one to load a shared library from memory instead of a file.
So recently in a fit of boredom, hes started loading OS/2 programs and has had some success. This took some research on the OS/2 executable format and a lot of exploration of OS/2 strange memory model, exacerbated by the shift from 16-bit OS/2 to 32-bit OS/2. The big pay off is how he found how Wine and dosemu can cobble up the 32-bit Linux environment to run 16-bit code.
Theres more, but just go read the post. The detail is impressive and although it isnt running anything practical yet, it does work and the technical detective work behind it makes for a great read.
As for period reproductions, wed much rather do hardware and simulate a Z80 or just about anything else. Still, OS/2 is part of the PCs history, and the lessons you can glean from this transcend the actually usefulness or lack thereof of running...
On a late spring evening in 2015, at South Street Seaport, a square on the southern tip of Manhattan, hundreds of people slipped on headphones and slipped into their own worlds. It was a clear night, perfect for a stroll, but attendees werent interested in local shops and restaurants. They were too busy dancing silently to the music, tuning inor tuning outto a silent disco.
The silent disco is a concert that passersby can barely hear, and that attendees can customize with a flip of the switch. At this event, a wireless signal allowed dancers to choose their favorite of three playlists. Each pair of headphones covered the ears and gave off a robotic glow. This is what weve been reduced to: dancing with ourselves, one dancer told a reporter from The New York Times.
To some observers, the silent disco represents a peculiar form of shared isolationa way to turn up the volume of modern alienation, to look social but remain solitary. Headphones have been creeping into musical activities that once were social, the writer and jazz musician Eric Felten lamented in the Wall Street Journal.DANCING BY YOURSELF: Critics who lament that silent discos symbolize individualism and the
Money used to be local. The first non-precious metal coins emerged as a natural consequence of trade, and were seldom accepted as currency outside the city-state on the Grecian coast that minted them. Then nation-states emerged and central banking was invented as an institution. Fiat currencies were deigned into circulation and the connection between money and place was mostly lost. Today, a dollar printed in West Point is the same dollar wherever it is found, whether its Dubuque or Dubai. It derives its value from the law of the United States and that law has no physical home. The United States of America, like all other countries, is a polygon on a map, a theoretical construct, a policy document.
As the dust settles on the haboob that cryptocurrencies have
become over the last year or so and we try to find things of
lasting value from the wreckage, we should keep in mind this
missing piece of the puzzle: All resilient things start local. To
find inherent value and stability digital currencies need to ground
themselves somewhere. They need to go local. A theoretical
construct is no longer enough. Digital currencies need something
more tangible than just value by decree.
Some 48 kilometers north of Mexico City, in the Basin of Mexico, towers the Pyramid of the Sun at Teotihuacn. This massive 71-meter high structure makes you feel like a speck of dust in the presence of the gods. And that is exactly what the builders intended. Those who dwelt at Teotihuacn lived at the heart of a vast sacred landscape. The city itself covered more than 21 square kilometers, and it dominated the basin and the surrounding highlands. By 100 A.D., at least 80,000 people lived there. And between 200 and 750 A.D., Teotihuacns population swelled to more than 150,000. At the time, it was as big as all but the largest cities of China and the Middle East.
Archaeologists have worked there for nearly a century. Theyve learned that Teotihuacn was a vast symbolic landscape of artificial mountains, foothills, caves, and open spaces that replicated the spiritual world. Over a period of more than eight centuries, the Teotihuacnos built 600 pyramids, 500 workshop areas, a huge marketplace, 2,000 apartment complexes, and several squares or plazas.Cosmology as geography: A view from the Pyramid of the Moon toward the Pyramid of the Sun.DEA / ARCHIVIO J. LANGE / Contributor /
A former Google employee is now suing the company, claiming he was wrongfully terminated for his criticism of an anti-diversity memo sent to staff members last year, Wired Magazine reports. Tim Chevalier, a transgender former...
While the Winter Olympics are going on, heres.
A story of mine on the dream of a future Transhumanist Olympics: https://www.huffingtonpost.com/zoltan-istvan/is-it-time-for-77194.html #transhumanism
Oracle Team USA made a historic comeback to beat Emirates Team New Zealand in the Americans Cup in San Francisco last month. I have closely followed the sport of sail racing for over 30 years, and what astonishes me is how much faster and better the boats are today than they were three decades ago. Sailing speeds and performances have doubled in some cases.
The same cannot be said about most other major sports. Even Michael Phelps, considered by many the greatest living athlete, is only a few seconds faster than swimming world records set 30 years ago. Most sports have not allowed scientific improvements or technology upgrades to their athletes and the equipment they use. I find that disappointing.
What is on the rise in athletics, however, are multi-million dollar campaigns and testing measures designed to ensure athletes dont cheat by using performance enhancing drugs and technologies. Some athletes even complain about undergoing TSA-like testing procedures right before their events. Does anyone else see a problem with that? Does anyone else see something anti-progressive about the state of our competitive sporting industry today?
As an advanced society full of technological wonders, perhaps its time we consider upgrading our idea of sports and rethinking what constitutes an exemplary athlete. Perhaps its time for something more modern and exciting, such as the transhuman athlete.
Via: The Hill: Following a federal indictment of Russians accused of meddling in the U.S election, a former CIA director on Friday said the U.S. probably meddles in other countries elections, as well. The Russian embassy flagged his comments. When asked whether the U.S. interferes in other countries elections, James Woolsey said, Well, only for 
Posted by Justin Bull on Feb 21Hey everyone,
Submitted via IRC for FatPhil
An amateur astronomer has captured the birth of a supernova while trying out his new camera. Scientists believe this could be the first time anyone has photographed the initial flashing of a supernovaa phase which can last just minutes.
Researchers think the serendipitous snaps offer unique insights into the evolution of supernova, which are usually only pictured after this brief "shock breakout" phase. A new analysis of the surge of light is published in Nature this week.
[...] The discovery was monumental not just for Buso but astronomy as a whole. Researchers Melina Bersten and Gastn Folatelli, part of the team investigating the supernova in the Nature paper, told Newsweek these chance photos could be the first of their kind.
"We actually think this is the first time an observer recorded the appearance of a supernova literally on camera. Some supernova have been discovered hours after explosion. But, Victor Buso caught the exact minutes when the supernova was being born," Bersten said. Not only that, she added, but he had captured the evolution of this elusive phase.
Read more of this story at SoylentNews.
Wine-Staging has been a flavor of Wine popular with Linux gamers for often carrying bleeding-edge patches and other experimental work prior to being mainlined. But over two months ago, Wine-Staging went silent without any further updates. A few days ago the original maintainers announced they parted ways with the work due to lack of time and would not be issuing any new releases. Now there are new developers taking over...
A few days back FreeBSD 11 stable was mitigated for Meltdown (and Spectre vulnerabilities), which came more than one month after these nasty CPU vulnerabilities were disclosed while DragonFlyBSD was quickly mitigated and the first of the BSDs to do so. While OpenBSD is known for its security features and focus, only today did it land its initial Meltdown mitigation...
Flight simulators packed with password-grabbing malware, Facebook fighting Russian trolls, and how vulnerability researchers fear being sued.
All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Dave Bittner from The CyberWire podcast.
Retired Judge Siegfried Bro has long spoken out against the Unified Patent Court (UPC); and for good reasons
Summary: The Unitary Patent fantasy (of mass litigation firms) is coming to an end; in fact, the German government and courts (Bundesverfassungsgericht to be specific) now deem the complaint to be admissible and thus likely legitimate in spite of many attempts to shoot it down
The European Patent Office (EPO) barely says anything about the UPC. It used to. A lot. But it rarely mentions it anymore. The closest thing to a mention was todays tweet that said: Read more about the impact of #patent protection on trade & FDI in innovative industries in this study
Its like a template tweet that they cyclically shuffle/revolve in order for the propaganda to broaden its reach. Propaganda? Yes, propaganda. What they dont say is that they funded it. In the process, the EPO entered controversial territories; it really corrupted academia (we explained this before). This is a serious matter. The EPO not only corrupts the media but also academia; and guess whos paying for all this
The EPO not only corrupts the media but also academia; and guess whos paying for all thisEPO staff is said to be prepared for chopping while the management corrupts the press and universities. Its not cheap. It also pays something like 5 million euros for events that last just one afternoon (that alone is a years salary of about 50 examiners). As the EPO implicitly acknowledges (by mention of two Twitter accounts), it paid money to LSE (UK) and the University of Colorado Boulder (US) for UPC propaganda. Sadly for them, however, the Unitary Patent is dead regardless. How dead? Check out what...
A Bangkok court has awarded paternity rights to a Japanese man over 13 babies he fathered through Thai surrogate mothers. The ruling allows Mitsutoki Shigeta, 28, to pursue custody of the children.
The son of a wealthy entrepreneur, he caused controversy in 2014 when he was revealed to have fathered at least 16 babies via surrogates in Thailand. His so-called "baby factory" case and others led to Thailand banning commercial surrogacy for foreigners.
Mr Shigeta, who was not present at the trial, was awarded "sole parent" rights after the Thai surrogates forfeited their rights, according to the court, which did not name him.
"For the happiness and opportunities which the 13 children will receive from their biological father, who does not have a history of bad behaviour, the court rules that all 13 born from surrogacy to be legal children of the plaintiff," Bangkok's Central Juvenile Court said in a statement.
Read more of this story at SoylentNews.
There was a time when USB to serial hardware meant one company: FTDI. But today there are quite a few to choose from and one of the most common ones is the WCH CH341. Theres been support for these chips in Linux for a while, but only for use as a communication port. The device actually has RS232, I2C, SPI, and 8 general purpose I/O (GPIO) pins. [ZooBaB] took an out-of-tree driver that exposes the GPIO, and got it working with some frightening-looking CH341 boards.
He had to make a slight mod to the driver to get six GPIOs in /sys/class/gpio. Once there though, it is easy to manipulate the pins using a shell script or anything that can write to the virtual files corresponding to the GPIO pins.
For example, he did a speed test that was this simple:
#!/bin/bash x=100000 while ((x--)); do i=$((i+1)) echo 0 > /sys/class/gpio/gpio1/value echo 1 > /sys/class/gpio/gpio1/value done
He got about 2.2 kHz out of the output pin, and although he didnt say the exact hardware configuration it gives you some idea about the possible speed.
There are some other examples, and a look at several inexpensive boards that expose the I/O pins. Theres also some discussion of some mods of those boards.
The ability to share and hack drivers is one of the things that makes Linux so great for hackers. Your Linux system probably has all the tools you need and, if not, they are a package manager command away. Even if you arent comfortable building a whole driver, patching one like [ZooBab] did is very doable.
Clinton interviews Nicolas Steenhout about his accessibility workshop, covering the different areas that automated and manual testing can cover. We also talk about the conference in general, and on the different ways that conference get feedback about their speakers.
SEC UPDATES GUIDANCE ON DISCLOSING DATA BREACHES: Wall Street's top regulator on Wednesday released updated guidance on how public companies should go about disclosing cybersecurity breaches and "risks" to the public.The Securities and Exchange...
The XFS filesystem has been in the kernel for fifteen years and was used in production on IRIX systems for five years before that. But it might just be time to teach that "old dog" of a filesystem some new tricks, Dave Chinner said, at the beginning of his linux.conf.au 2018 presentation. There are a number of features that XFS lacks when compared to more modern filesystems, such as snapshots and subvolumes; but he has been thinkingand writing codeon a path to get them into XFS.
The draft reform proposal CA/3/18 will, if it is allowed to enter into force, put an end to permanent employment at the EPO. EPO insiders
Summary: The latest plot twist, as odd as that may seem, is that the attack on the rights of thousands of workers (many of whom are rumoured to be on their way out) is curtailed somewhat, at least for the time being
The European Patent Offices (EPO) demise is worrying. Its inevitable, but its still worrying (layoffs are probably coming very soon, based on insiders). CA/3/18 was covered here yesterday, based on the words of insiders.
The European Patent Offices (EPO) supervisory body, the Administrative Council (AC), will deliberate an employment proposal put forward by EPO president Benot Battistelli to recruit staff on renewable contracts of five years in March.
Battistelli and Elodie Bergot, principal director of human resources, added the motion to discuss permanent employment at the EPO during a budget and finance committee meeting in October last year.
At the time, a spokesperson for the EPO said that the office is in a unique situation with 97% of its staff hired on a permanent basis.
A first discussion of the proposal, which is called the Modernisation of the employment framework of the EPO, took place during the ACs meeting in December.
The proposal has since been amend...
Snap, the parent company of Snapchat, responded on Tuesday to a petition calling for it to reverse its app redesign.The messaging app did not say it would revert to its prior design, but did say that it will roll out a new update in the coming...
The House is expected to consider legislation when it returns from holiday recess next week that would ensure classified advertising websites such as Backpage.com can no longer enable sex trafficking.The bipartisan bill would allow the...
Trisha Navidzadeh, Principal of Space Marketing Group, joins our Space Settlement Board.
Terms like "cloud-native" and "web scale" are often used and understood as pointless buzzwords. Under the layers of marketing, though, cloud systems do work best with a new and different way of thinking about system administration. Much of the tool set used for cloud operations is free software, and Linux is the platform of choice for almost all cloud applications. While just about any distribution can be made to work, there are several projects working to create a ground-up system specifically for cloud hosts. One of the best known of these is Project Atomic from Red Hat and the Fedora Project.
For those curious about the state of Intel's open-source Mesa OpenGL driver relative to the company's closed-source Windows OpenGL driver, here are some fresh benchmark results when making use of an Intel Core i7 8700K "Coffee Lake" processor with UHD Graphics 630 and testing from Windows 10 Pro x64 against Ubuntu 16.04.3 LTS, Ubuntu with the Linux 4.16 Git kernel and Mesa 18.1-dev, and then Intel's own Clear Linux distribution.
Submitted via IRC for Runaway1956
We've noted for some time how Chinese hardware vendor Huawei has been consistently accused of spying on American citizens without any substantive, public evidence. You might recall that these accusations flared up several years ago, resulting in numerous investigations that culminated in no hard evidence whatsoever to support the allegations. We're not talking about superficial inquiries, we're talking about eighteen months, in-depth reviews by people with every interest in exposing them. One anonymous insider put it this way in the wake of the last bout of hysteria surrounding the company:
We knew certain parts of government really wanted" evidence of active spying, said one of the people, who requested anonymity. "We would have found it if it were there.
[...] This week, hysteria concerning Huawei again reached a fevered pitch, as U.S. intelligence chiefs, testifying before Congress over Russian hacking and disinformation concerns, again proclaimed that Huawei was spying on American citizens and their products most assuredly should not be used:
At the hearing, FBI Director Chris Wray testified, "We're deeply concerned about the risks of allowing any company or entity that is beholden to foreign governments that don't share our values to gain positions of power inside our telecommunications networks." Purchasing Huawei or ZTE products, Wray added, "provides the capacity to maliciously modify or steal information. And it provides the capacity to conduct undetected espionage.
Which values would those be, exactly? Would it be the values, as leaked Edward Snowden docs revealed, that resulted in the NSA hacking into Huawei, stealing source code, then attempting to plant its own backdoors into Huawei products? Or perhaps it's the values inh...
Ive been using Linux as my desktop operating system for 20 years now. When I first started using the open source operating system, pretty much everything was a challenge. Back then, I wore that as a badge of honor. I could use Linux! There was something special about saying that in a crowd of fellow geeks and nerds. It brought respect. Not only could I install the operating system, I could get it on line, and do just about anything I needed to do. Of course, back then, much of what had to be done began in the terminal window. Without that particular tool, I dont think I would have been able to function within Linux.
A white nationalist group and its founder said Wednesday that they were suing Twitter for banning their accounts, arguing the company did so because it disagreed with their viewpoints.Jared Taylor, who leads the American Renaissance...
Brian Acton, a co-founder of the Facebook-owned messaging service WhatsApp, is donating $50 million to a new nonprofit supporting the encrypted messaging app Signal.Acton will also serve as the executive chairman of the newly formed Signal...
The Spectre attack breaks the isolation between different applications, allowing to leak information from the kernel to user programs, as well as from virtualization hypervisors to guest systems.
Problems such as frequent reboots were related to the fix for the CVE-2017-5715 Spectre flaw (Spectre Variant 2) and affected almost any platform, including systems running on Broadwell Haswell CPUs, as well as Ivy Bridge-, Sandy Bridge-, Skylake-, and Kaby Lake-based platforms.
A couple of weeks ago Intel released new microcode for its Skylake processors, now it has announced security updates for Kaby Lake, Coffee Lake and other CPUs.
The microcode is now available for all 6th, 7th, and 8th generation Core processors and also X-series Intel Core products, as well as Xeon Scalable and Xeon D chips.
Intel released the Spectre firmware security updates for the following products:
Anniedale/Moorefield, Apollo Lake, Avoton/Rangeley, Broxton, Ch...
Computing error lets people grab Bitcoin tokens for $0 on Japans Zaif exchange.
This month, the power of artificial intelligence will be coming to more augmented reality developers as a leader in the game and 3D software development space and a major force behind the current school of cloud-based AI have officially announced a new partnership.
In a post on Unitys website on Tuesday, the company revealed a partnership with computing giant IBM to launch the IBM Watson Unity SDK. This programming interface will open up new cloud-based AI services for developers to use in their applications. And, with AR and AI having become increasingly intertwined technologies, this is only good news for AR developers.
Astronomers rarely see the beginnings of these explosions, but an Argentine amateurs lucky picture helped them study the start of a massive stars violent death.
Transhumanists believe in a future of human immortality. A community in Russia is working to make it happen.
Federal authorities on Wednesday brought fraud charges against BitFunder, a defunct cryptocurrency stock exchange, and arrested the company's founder for obstruction of justice.The Securities and Exchange Commission (SEC) charged the company with...
On June 2, 2017 a group of Canadian telecoms giants including Bell Canada, Bell ExpressVu, Bell Media, Videotron, Groupe TVA, Rogers Communications and Rogers Media, filed a complaint in Federal Court against Montreal resident, Adam Lackman.
Better known as the man behind Kodi addon repository TVAddons, Lackman was painted as a serial infringer in the complaint. The telecoms companies said that, without gaining permission from rightsholders, Lackman communicated copyrighted TV shows including Game of Thrones, Prison Break, The Big Bang Theory, Americas Got Talent, Keeping Up With The Kardashians and dozens more, by developing, hosting, distributing and promoting infringing Kodi add-ons.
To limit the harm allegedly caused by TVAddons, the complaint demanded interim, interlocutory, and permanent injunctions restraining Lackman from developing, promoting or distributing any of the allegedly infringing add-ons or software. On top, the plaintiffs requested punitive and exemplary damages, plus costs.
On June 9, 2017 the Federal Court handed down a time-limited interim injunction against Lackman ex parte, without Lackman being able to mount a defense. Bailiffs took control of TVAddons domains but the most controversial move was the granting of an Anton Piller order, a civil search warrant which granted the plaintiffs no-notice permission to enter Lackmans premises to secure evidence before it could be tampered with.
The order was executed June 12, 2017, with Lackmans home subjected to a lengthy search during which the Canadian was reportedly refused his right to remain silent. Non-cooperation with an Anton Piller order can amount to a contempt of court, he was told.
With the situation seemingly spinning out of Lackmans control, unexpected support came from the Honourable B. Richard Bell during a subsequent June 29, 2017 Federal Court hearing to consider the execution of the Anton Piller order.
The Judge said that Lackman had been subjected to a search without any of the protections normally afforded to litigants in such circumstances and took exception to the fact that the plaintiffs had ordered Lackman to spill the beans on other individuals in the Kodi addon community. He described this as a hunt for further evidence, not the task of preserving evidence it shouldve been.
Justice Bell concluded by ruling that while the prima facie case against Lackman may have appeared strong before the judge who heard the matter ex parte, the subsequent adversarial heari...
It is February of 2018. Do you remember what you were doing in December of 2012? If youre [juppiter], you were starting your CNC Embroidery Machine which would not be completed for more than half of a decade. Results speak for themselves, but this may be the last time we see a first-generation Raspberry Pi without calling it retro.
The heart of the build is a vintage Borletti sewing machine, and if you like machinery porn, youre going to enjoy the video after the break. The brains of the machine are an Arduino UNO filled with GRBL goodness and the Pi which is running CherryPy. For muscles, there are three Postep25 stepper drivers and corresponding NEMA 17 stepper motors.
The first two axes are for an X-Y table responsible for moving the fabric through the machine. The third axis is the flywheel. The rigidity of the fabric frame comes from its brass construction which may have been soldered at the kitchen table and supervised by a big orange cat. A rigid frame is the first ingredient in reliable results, but belt tension cant be understated. His belt tensioning trick may not be new to you, but it was new to some of us. Italian translation may be necessary.
The skills brought together for this build were vast. There was structural soldering, part machining...
Los Angeles, DallasFort Worth, and Philadelphia engineers: It might be time to relocate, LinkedIn study suggests Photo: iStock
A study by LinkedIn aimed at recruiters offers a few insights for software engineers.
For onethere are a few unexpected places in which software engineers are a particularly hot commodity, that is, where a lot of jobs are chasing a relatively small community of engineers. These areas, which LinkedIn calls saturated markets, include Austin, Denver, and Detroit. Software engineers in those markets just might be in a good position to negotiate a higher salaryor ask for a raise.
The study also spotted a few cities that are perhaps not where a software engineer looking to advance her career might want to put down roots. LinkedIn calls Los Angeles, Dallas, and Philadelphia hidden gems for tech recruitersplaces where demand for software engineers is low but supply is high. Engineers in these buyers markets might be open to relocating, the data suggested.Image: LinkedIn
And, the study indicated, many software engineers are open to relocatingwith most roads leading to the Bay Area but a few leading away.Image: LinkedIn
The LinkedIn report showed that engineers are moving to the Bay Area from New York, Los Angeles, Seattle, Boston, San Diego, Chicago, and Pittsburghand moving away from the Bay Area to Seattle, New York, and Los Angeles (those routes are apparently heavily trafficked in both directions).
LinkedIn also looked at demand and supply for six software engineering subspecialties. The machine-learning and data science category came out on top, with demand far outpacing supplybut you already knew that. Other hot categories identified are mobile development and front-end development, followed by infrastructure and cloud development, test and quality assurance, and embedded a...
With their insensitivity to decoherence what are known as Majorana particles could become stable building blocks of a quantum computer. The problem is that they only occur under very special circumstances. Now researchers at Chalmers University of Technology have succeeded in manufacturing a component that is able to host the sought-after particles.
After an intensive period of analyses the research team led by Professor Floriana Lombardi, Chalmers University of Technology, was able to establish that they had probably succeeded in creating a topological superconductor.
[...] Majorana fermions are highly original particles, quite unlike those that make up the materials around us. In highly simplified terms, they can be seen as half electron. In a quantum computer the idea is to encode information in a pair of Majorana fermions which are separated in the material, which should, in principle, make the calculations immune to decoherence.
In solid state materials they only appear to occur in what are known as topological superconductors - a new type of superconductor that is so new and special that it is hardly ever found in practice. But a research team at Chalmers University of Technology is now among the first in the world to submit results indicating that they have actually succeeded in manufacturing a topological superconductor.
"Our experimental results are consistent with topological superconductivity," says Floriana Lombardi, Professor at the Quantum Device Physics Laboratory at Chalmers.
To create their unconventional superconductor they started with what is called a topological insulator made of bismuth telluride, Be2Te3. A topological insulator is mainly just an insulator - in other words it does not conduct current - but it conducts current in a very special way on the surface. The researchers have placed a layer of a conventional superconductor on top, in this case aluminium, which conducts current entirely without resistance at really low temperatures. "The superconducting pair of electrons then leak into the topological insulator which also becomes superconducting," explains Thilo Bauch, Associate Professor in Quantum Device Physics.
However, the initial measurements all indicated that they only had standard superconductivity induced in the Bi2Te3 topological insulator. But when they cooled the component down again later, to routinely repeat some measurements, the situation suddenly changed - the characteristics of the superco...
Wall Streets top regulator on Wednesday released updated guidance on how public companies should go about disclosing cybersecurity breaches and "risks" to the public. The Securities and Exchange Commissions (SEC) new guidance&...
The Russia-linked APT28 group (aka Pawn Storm, Fancy Bear, Sofacy, Sednit, Tsar Team and Strontium.) made the headlines again, this time security experts from Kaspersky highlighted a shift focus in their interest, from NATO member countries and Ukraine to towards the Middle East and Central Asia.
Sofacy, one of the most active APT we monitor, continues to spearphish their way into targets, reportedly widely phishes for credentials, and infrequently participates in server side activity (including host compromise with BeEF deployment, for example). KSN visibility and detections suggests a shift from their early 2017 high volume NATO spearphish targeting towards the middle east and Central Asia, and finally moving their focus further east into late 2017. states Kaspersky.
The experts analyzed the infections of the Sofacy backdoor tracked as SPLM, CHOPSTICK and X-Agent, the APT group had been increasingly targeting former Soviet countries in Central Asia. The hackers mostly targeted telecoms companies and defense-related organization, primary target were entities in Turkey, Kazakhstan, Armenia, Kyrgyzstan, Jordan and Uzbekistan.
The researchers observed several attacks leveraging the SPLM and the Zebrocy tool between the second and fourth quarters of 2017 against organizations in Asia. The list of targeted countries included China, Mongolia, South Korea and Malaysia.
A study on dozens of galaxies within several billion light years of our own has revealed black holes that far exceed our expectations on just how big these monsters can grow.
The discovery not only helps us better understand the evolution of our Universes building blocks, it leaves us with a new intriguing question just how do black holes like these get to be so incredibly massive?
By now, the collapsed cores of massive stars known as black holes need no introduction. Weve heard about their cosmic crashes rippling space-time, watched them belch, and expect to capture the closest look yet at their nature very soon.
Dueling neural networks. Artificial embryos. AI in the cloud. Welcome to our annual list of the 10 technology advances we think will shape the way we work and live now and for years to come.
Meltdown mitigation is coming to OpenBSD. Philip Guenther (guenther@) has just committed a diff that implements a new mitigation technique to OpenBSD: Separation of page tables for kernel and userland. This fixes the Meltdown problems that affect most CPUs from Intel. Both Philip and Mike Larkin (mlarkin@) spent a lot of time implementing this solution, talking to various people from other projects on best approaches.
In the commit message, Philip briefly describes the implementation:
Amazon Web Services (AWS) has announced that all customers can now freely check whether their S3 buckets are leaking stored data. Previously available only to Business and Enterprise support customers, [the S3 bucket permissions check] identifies S3 buckets that are publicly accessible due to ACLs or policies that allow read/write access for any user, the cloud computing giant noted. The check is available through AWS Trusted Advisor, an online tool that helps users inspect their More
Twitter is cracking down on its users ability to coordinate posting across multiple social media platforms, a move that the company hopes will tamp down on the spread of spam and misinformation.These changes are an important step in ensuring we...
Pacemakers and implantable cardioverter defibrillators (ICDs) are lifesaving devices but malicious
This is a post from HackRead.com Read the original post: Life-saving Pacemakers, Defibrillators Can Be Hacked and Turned Off
Scientists from the University of Washington and Microsoft are improving their system for preserving digital data in strands of synthetic DNA and theyre giving you the chance to participate.
The UW-Microsoft team laid out the method in a research paper published this week in Nature Biotechnology.
For the experiment described in the paper, text files as well audio, images and a high-definition music video featuring the band OK Go were first digitally encoded, and then converted into chemical coding that is, adenine, thymine, cytosine and guanine, which make up the ATCG alphabet for DNA base pairs.
Its all about finding and riding the big waves Illustration: Harry Campbell
Ive been hearing about the impending end of Moores Law for so many years that Ive become skeptical of all the claims of doom. Like the Little Engine That Could, Moores Law keeps chugging along. Nonetheless, it has definitely reached the huffing and puffing stage.
I was considering upgrading my desktop with a new CPU and motherboard, but new, comparably priced CPUs have about the same clock speed as my 4-year-old model. The newer ones do have more transistors and better architectures, so technical benchmarks show about a 50 percent improvement. Nonetheless, when it comes to everyday applications, the newer models might not exhibit noticeably better performance. Im disappointed because I feel compelled to have the latest stuff at all times.
While transistors are continuing to shrink, its at a slower pace. The technology road map calls for 5-nanometer fabrication by about 2020, but since we cant run those transistors fastermostly because of heat dissipation problemswe will need to find effective ways of using more transistors in lieu of increasing clock speed. And because of increasing fabrication costs, these designs will have to be produced at high volume.
No one knows what electronics will be like in the future. Its hard to think beyond Moores Law. Since the time of the vacuum tube, there has been a century of exponential improvement. When I was a child, I thought that all future designs would simply be different arrangements of tubes, resistors, and capacitors. How little I knew! Im sure that todays budding engineers will feel the same way in the future.
Maybe they will be tinkering with carbon nanotubes, but whatever it is, the huffing and puffing will go on. The little engine will still be climbing the hill.
Meanwhile, I see electronics design as riding a series of waves. For maximum professional opportunity, we just need to find where the big waves are, go there, and enjoy the ride. Right now the biggest waves are to be found in the world of cellphone electronics. As cellphone technology matures and plateaus, we have an enormous reserve in all the meticulously designed, high-volume co...
The online publishing platform Medium has suspended the accounts of prominent far-right figures Mike Cernovich, Jack Posobiec and Laura Loomer.Medium spokesperson Sandee Roston told The Hill that the company does not comment on individual accounts...
Uber announced Wednesday its latest service will require users to take a short walk at the beginning and end of their rides to secure a faster, cheaper carpool with other riders. Express Pool, the ride-sharing company's new service, is a...
As a civilization, we are proficient with the boil water, make steam method of turning various heat sources into power we feed our infrastructure. Away from that, we can use solar panels. But what if direct sunlight is not available either? A team at MIT demonstrated how to extract power from daily temperature swings.
Running on temperature difference between day and night is arguably a very indirect form of solar energy. It could work in shaded areas where solar panels would not. But lacking a time machine, or an equally improbable portal to the other side of the planet, how did they bring thermal gradient between day and night together?
This team called their invention a thermal resonator: an assembly of materials tuned to work over a specific range of time and temperature. When successful, the device output temperature is out-of-phase with its input: cold in one section while the other is hot, and vice versa. Energy can then be harvested from the temperature differential via conventional thermoelectrics.
Power output of the initial prototype is modest. Given a 10 degree Celsius daily swing in temperature, it could produce 1.3 milliwatt at maximum potential of 350 millivolt. While the Hackaday coin-cell challenge participants and other pioneers of low-power electronics could probably do something interesting, the rest of us will have to wait for thermal resonator designs to evolve and improve on its way out of the lab.
From healthcare to warfare, machine-based thinking is revolutionising the way we live, exposing us to the benefits and the risks. Twenty-six world experts in emerging technologies say cybercrime will grow and drones will be misused in the next decade.
While we all know that APUs crave as fast as system memory as possible, with DDR4 memory kits these days easily costing more than the Ryzen 3 2200G and even the Ryzen 5 2400G, here are some reference results when testing the Ryzen 5 2400G under Linux with memory speeds from DDR4-2133MHz to DDR4-3600MHz...
A report written by academics from institutions including the Future of Humanity Institute, University of Oxford Centre for the Study of Existential Risk, University of Cambridge Center for a New American Security, Electronic Frontier Foundation, and OpenAI warns that AI systems could be misused:
Drones turned into missiles, fake videos manipulating public opinion and automated hacking are just three of the threats from artificial intelligence in the wrong hands, experts have said.
The Malicious Use of Artificial Intelligence report warns that AI is ripe for exploitation by rogue states, criminals and terrorists. Those designing AI systems need to do more to mitigate possible misuses of their technology, the authors said. And governments must consider new laws.
The report calls for:
- Policy-makers and technical researchers to work together to understand and prepare for the malicious use of AI
- A realisation that, while AI has many positive applications, it is a dual-use technology and AI researchers and engineers should be mindful of and proactive about the potential for its misuse
- Best practices that can and should be learned from disciplines with a longer history of handling dual use risks, such as computer security
- An active expansion of the range of stakeholders engaging with, preventing and mitigating the risks of malicious use of AI
Read more of this story at SoylentNews.
Harvard researchers are developing robots with deformable scaly skin that can move like snakes Photo: Ahmad Rafsanjani/Bertoldi Group/Harvard University
Snakes have got to be some of the most creatively mobile animals ever evolved. They can move fast. They can move stealthily. Theyre good climbers. Theyre good swimmers. They can squeeze into very small holes. Some of them can even fly, a little bit. And all of this despite looking like a lizard thats missing 100 percent of the limbs that its supposed to have.
Roboticists have been working on snake robots for a long time, primarily with a focus on versatile mobility in constrained spaces. With that in mind, weve seen a variety of limbless robots that can mimic snake gaits fairly well. But its not just the lack of limbs that makes snakes so specialits also their scales. In a new article in Science Robotics this week, researchers from Harvard show how mimicking snake scales with kirigami-inspired deformable materials enabled them to make a limbless soft robot that can crawl by simply inflating and deflating itself over and over.
A snakes scales are all pointed the same direction, providing a substantial amount of favorable friction that makes it easier for the snake to move forwards than it is to move backwards. This makes moving backwards occasionally inconvenient, but it also means that the snake is able to achieve forward motion by generating a wave along its belly that first pulls its scales forwards, and then pushes them backwards. If snakes scales had a symmetrical amount of friction, it would just move forward a little bit and backwards a little bit over and over. But since the scales are effectively slippery when they move one way and sticky when they move the other, the snake is able to move forward as long as it can get some grip on the surface. This is also how bristlebots work, incidentally.
The Harvard researchers from Katia Bertoldis group leveraged these anisotropic frictional properties of snake scales to turn the repetitive pulsing motion of an inflatable soft robot into forward motion, in much the same way that snakes can crawl forward on their bellies without using their trademark side-to-side slithering motion. In order to make scaly skin, the researchers manufactured a variety of different stretchable plastic sheets, each laser engraved with a unique pattern of flat scales. The pattern was structured such that when the robot in...
Some days it seems that wherever two or more free-software enthusiasts gather together, there also shall be licensing discussions. One such, which can get quite heated, is the question of whether a given free-software license is a license, or whether it is really a contract. This distinction is important, because most legal systems treat the two differently. I know from personal experience that that discussion can go on, unresolved, for long periods, but it had not previously occurred to me to wonder whether this might be due to the answer being different in different jurisdictions. Fortunately, it has occurred to some lawyers to wonder just that, and three of them came together at FOSDEM 2018 to present their conclusions.
Subscribers can read on for a report on the talk by guest author Tom Yates.
The Mesa-based open-source "RADV" Radeon Vulkan driver has new patches pending for AMD_gcn_shader support...
Another day, another malware This time it targets macOS
This is a post from HackRead.com Read the original post: Coldroot Mac Malware Silently Performs System-Wide Keylogging
How often do we find ourselves thankful for advertising? When it comes to Hackadays Retrotechtacular column its actually quite often since it snapshots a moment in culture and technology. Todays offering is a shining example, where we get a great look into vehicular utility of the day that is rarely seen in our modern lives.
In this ad, the case is made for Jeep as farm implement, acting as plow, mower, even post hole digger. As a firefighting implement the announcer boasts that One man with a Jeep can do the work of 100 men with shovels by cutting fire breaks into the soil. Its sold as the workhorse of cemeteries, ranches, county service crews, and anything else their marketing gurus could write into copy. We think the metrics are dubious but certainly the inexpensive build, versatile nature, and need for power equipment across the countryside brought these Jeeps into widespread rural and industrial service in myriad roles....
A misalignment between CEOs and technical officers is weakening enterprise cybersecurity postures, according to Centrify. CEOs are incorrectly focused on malware, creating misalignment within the C-suite, which results in undue risk exposure and prevents organizations from effectively stopping breaches. Technical officers (CIOs, CTOs and CISOs) on the front lines of cybersecurity point to identity breaches including privileged user identity attacks and default, stolen or weak passwords as the biggest threat, not malware. As More
A behemoth from the heroic age of power engineering stirs to life in the New York City subways Substation 13 Celia Gorman
On Broadway, a few blocks north of Times Square in New York City, visitors flock to the Ed Sullivan Theater. The theater is currently home to televisions The Late Show with Stephen Colbert , and nearly every week night, Colbert takes to the famous stage to tape a new comedy monologue in front of a live audience. But right around the corner from the illuminated marquee of the Ed Sullivan Theatre, another building draws a steady, if small, crowd of devotees. This building is Substation 13, and its been a vital cog in the running of New Yorks MTA subway system since 1904.
The star attraction of Substation 13 is an enormous rotary convertor weighing 45 tons with a spinning amature 3 meters in diameter, dubbed Rotary #1. Trains in the NYC subway drive their electric motors by tapping a third rail that is energized with 600 volts of direct current. But electricity generated by the power company is transmitted over the grid as alternating current, so the subway must convert this AC power to DC, and do so at wattage levels powerful enough to speed trains full of people beneath the streets. Today, this job is done in Substation 13, and other MTA substations, by nondescript grey cabinets full of solid-state rectifiers. But for decades, it was the job of converters like Rotary #1.
These converters essentially pair an AC motor with a DC generator on the same shaft. AC power at 25 hertz is fed into the enormous windings, the convertor spins at 250 revolutions per minute, and up to 1,500 kilowatts of DC power emerges from the other side. The converter and its connection to the third rail of the subway are controlled using a set of panels, each over 2 meters tall, that are studded with the kind of dials and knife switches that most people associate with the laboratories of old-school mad scientists. Convertors would be spun up and connected to subway lines as required to handle shifting power needs over the course of the day.
Rotary #1 was in operation until 1999, when the local power company stopped supplying 25-hertz AC power. The engineer who took the convertor off-line for the last time was Robert Lobenstein. Lobenstein later was a protagonist in the restoration of Rotary #1, and he now gives tours of Substation 13 (tickets can be obtained via the...
The usually staid world of professional-grade flight simulations was rocked by controversy over the weekend, with fans accusing mod developer FlightSimLabs (FSLabs) of distributing "malware" with an add-on package for Lockheed Martin's popular Prepar3d simulation. The developer insists the hidden package was intended as an anti-piracy tool but has removed what it now acknowledges was a "heavy-handed" response to the threat of people stealing its add-on.
The controversy started Sunday when Reddit user crankyrecursion noticed that FSLabs' Airbus A320-X add-on package was setting off his antivirus scanner. FSLabs had already recommended users turn off their antivirus protection when installing the add-on, so this wasn't an isolated issue.
The reason for the warning, as crankyrecursion found, was that the installer seemed to be extracting a "test.exe" file that matched a "Chrome Password Dump" tool that can be found online. As the name implies, that tool appears to extract passwords saved in the Chrome Web browsernot something you'd expect to find in a flight-sim add-on. The fact that the installer necessarily needs to run with enhanced permissions increased the security threat from the "Password Dump."
[...] In a later update, Kalamaras acknowledges that some users were uncomfortable with "this particular method which might be considered to be a bit heavy-handed on our part." The company promptly released a new installer without the test.exe code included.
FlightSimLabs, a studio that specialises in custom add-ons for other company's flight sims, has been found to be secretly installing a program onto user's computers designed to check whether they're playing a pirated copy of their software.
The codebasically a Chrome password dumping tool was discovered by Reddit user crankyrecursion on February 18, and as...
Apple is reportedly in talks to purchase a long-term supply of cobalt, a metal that serves as a key component in the production of its iPhones and iPads, amid fears of a potential shortage.Bloomberg reports that it could be the first time that...
Every three years, EFF's lawyers spend weeks huddling in their offices, composing carefully worded pleas we hope will persuade the Copyright Office and the Librarian of Congress to grant Americans a modest, temporary permission to use our own property in ways that are already legal.
Yeah, we think that's weird, too. But it's been than way ever since 1998, when Congress passed the Digital Millennium Copyright Act, whose Section 1201 established a ban on tampering with "access controls for copyrighted works" (also known as "Digital Rights Management" or "DRM"). It doesn't matter if you want to do something absolutely legitimate, something that there is no law against -- if you have to bypass DRM to do it, it's not allowed.
What's more, if someone wants to provide you with a tool to get around the DRM, they could face up to five years in prison and a $500,000 fine, for a first offense, even if the tool is only ever used to accomplish legal, legitimate ends.
Which brings us back to EFF's lawyers, sweating over their briefs every three years. The US Copyright Office holds proceedings every three years to determine whether it should recommend that the Librarian of Congress grant some limited exemptions to this onerous rule. Every three years, EFF begs for -- and wins -- some of these exemptions, by explaining how something people used to be able to do has been shut down by DMCA 1201 and the DRM it supports.
But you know what we don't get to do? We don't get to ask for the right to break DRM to do things that no one has ever thought of -- at least, that they haven't thought of yet. We don't get to brief the Copyright Office on the harms to companies that haven't been founded yet, the gadgets they haven't designed yet, and the users they haven't attracted yet. Only the past gets a seat at the table: the future isn't welcome.
That's a big problem. Many of the tools and technologies we love today were once transgressive absurdities: mocked for being useless and decried as immoral or even criminal. The absurd transgressors found ways to use existing techologies and products to build new businesses, over the howls of objections from the people who'd come before them.
It's a long and honorable tradition, and without it, we wouldn't have cable TV (reviled as thieves by the broadcasters in their early days); Netflix (called crooks by the Hollywood studios for mailing DVDs around in re...
Last year we covered the work on the project "Chai" as an open-source, reverse-engineered driver for Mali T700 series. After a hiatus, the lead developer is back working on the project...
At this year's FOSDEM in Brussels, Jan Tobias Mhlberg gave a talk on the latest work on Sancus, a project that was originally presented at the USENIX Security Symposium in 2013. The project is a fully open-source hardware platform to support "trusted computing" and other security functionality. It is designed to be used for internet of things (IoT) devices, automotive applications, critical infrastructure, and other embedded devices where trusted code is expected to be run.
Ah, the autorouter. Inside every PCB design tool, theres a function called the autorouter. This function, when used correctly, is able to automagically lay traces between pads, producing a perfect board in under a minute. The trouble is, no one uses it. We have been told not to trust the autorouters and we hear a lot of other dire warnings about it. The autorouter never works. The autorouter will put traces everywhere. The autorouter doesnt consider floorplanning, and sometimes youre going to get traces that go right through the edge of your board. Is avoiding the autorouter sound advice?
For this weeks Hack Chat, were talking about trusting the autorouter. The autorouter is just a tool, and like any tool, it will do exactly what you tell it. The problem, therefore, is being smart enough to use the autorouter.
Our guest for this weeks Hack Chat...
Not (yet!) of a sentient digital entity that could turn rogue and cause the end of mankind, but the exploitation of artificial intelligence and machine learning for nefarious goals. What sorts of AI-powered attacks can we expect to see soon if adequate defenses are not developed? According to a group of 26 experts from various universities, civil society organizations, and think-tanks, the threat landscape can undergo dramatic changes in the next five to ten years. More
The 5G Champion project shows off a 5G link between South Korea and Finland Photo: Emilio Calvanese Strinati/5G Champion Users aboard 5G Champion's demo bus watch an ice hockey game streaming at 5 Gbps from a nearby 5G basestation.
Olympics fans arriving at South Koreas Gangneung Station on their way to the coastal ice arenas this week are getting a sneak peek at 5G Champion, a pioneering mobile-broadband project two years in the making. This joint EU-Korea ventureled by Frances CEA-Leti and South Koreas Electronics and Telecommunications Research Institutestands out as a quiet contender in what the Games official telecommunications sponsor, KT Corp., has dubbed the first 5G Olympics.
Much ado has been made of KTs own widely-publicized demos, and in pizazz, they did not disappoint. After deploying its 5G trial network at the opening ceremony on Feb. 9 to synchronize in real time 1,200 flickering LED candles forming a giant dove, KT continues to dazzle spectators with display tablets and virtual-reality glasses live-streaming its vision for a 5G future: immersive footage from ski courses and bobsleigh cockpits; 360-degree close-ups of speed skaters and ice dancers; VR trips to hockey games and snowboarding runs.Photo: Richard Heathcote/Getty Images Performers on the stage form the shape of a dove at the opening ceremony of the Pyeongchang Winter Olympics in South Korea on Feb. 9, 2018.
Hackers are becoming persistent in phishing scams against banking and
This is a post from HackRead.com Read the original post: Wire bank transfer malware phishing scam hits SWIFT banking system
[Matt Obal] had a problem. The local skatepark was too far to skateboard, but close enough to bike. Carrying a skateboard on a bicycle is a rather awkward (and unsafe) maneuver. [Matts] answer to the problem is Truck Stop, a bicycle mounted skateboard carrier he developed and is manufacturing himself.
[Matts] work on Truck Stop began about a year ago, with his purchase of a 3D printer. He designed a seat back mounted device that secures the skateboard by wedging between the truck and the board itself. The design is printed in PLA and is hollow. Truck Stops strength comes from being filled with resin and fiberglass cloth.
If youve worked with resin, you probably know that some formulas get hot while they harden. This caused a few melted prints until [Matt] figured out that a dunk in cold water at the right time would allow the resin to complete its hardening process while keeping the heat below the melting temperature of PLA. Hes since switched to a different resin formula that generates less heat.
[Matt] is selling the Truck Stop at his website, and spent quite a bit of time working on a silicon mold so he could cast as many mounts as he wanted. The problem was fiberglass poking through the final cast part. In the end, he decided to stick with the resin filled PLA of his prototypes.
The price of solar panels has fallen far and fast. But the Energy Department (DOE) wants to bring those costs down even further, especially for residential homes. After all, studies have shown that if every inch of useable rooftop in the US had solar panels on it, the panels could provide about 40 percent of the nation's power demand. Right now, the DOE's goal is residential solar that costs 5 per kilowatt-hour by 2030.
In a new report from the National Renewable Energy Laboratory (NREL), researchers mapped out some possible pathways to that goal. Notably, the biggest barriers to cost reduction appear to be the stubborn "soft costs" of solar installation. Those soft costs include supply chain costs, labor costs, and sales and marketing costs that aren't related to the physical production of solar cells at a factory.
NREL wrote: "Because the 2030 target likely will not be achieved under business-as-usual trends, we examine two key market segments that demonstrate significant opportunities for cost savings and market growth: installing PV at the time of roof replacement and installing PV as part of the new home construction process."
Read more of this story at SoylentNews.
A New York man pleaded guilty Tuesday to threatening to kill Rep. John Katko (R-N.Y.) if he didnt support net neutrality.Federal prosecutors announced that 28-year-old Patrick Angelo, of Syracuse, N.Y., pleaded guilty to a charge of interstate...
About a year ago we first heard about SkyTorrents, an ambitious new torrent site which guaranteed a private and ad-free experience for its users.
Initially, we were skeptical. However, the site quickly grew a steady userbase through sites such as Reddit and after a few months, it was still sticking to its promise.
We will NEVER place any ads, SkyTorrents operator informed us last year.
The site will remain ad-free or it will shut down. When our funds dry up, we will go for donations. We can also handover to someone with similar intent, interests, and the goal of a private and ad-free world.
In the months that followed, these words turned out to be almost prophetic. It didnt take long before SkyTorrents had several million pageviews per day. This would be music to the ears of many site owners but for SkyTorrents it was a problem.
With the increase in traffic, the server bills also soared. This meant that the ad-free search engine had to cough up roughly $1,500 per month, which is quite an expensive hobby. The site tried to cover at least part of the costs with donations but that didnt help much either.
This led to the rather ironic situation where users of the site encouraged the operator to serve ads.
Everyone is saying they would rather have ads then have the site close down, one user wrote on Reddit last summer. I applaud you. But there is a reason why every other site has ads. Its necessary to get revenue when your customers dont pay.
The sites operator was not easily swayed though, not least because ads also compromise peoples privacy. Eventually funds dried up and now, after the passing of several more months, he has now decided to throw in the towel.
It was a great experience to serve and satisfy people around the world, the sites operator says.
The site is not simply going dark though. While the end has been announced, the sites operator is giving people the option to download and copy the sites database of more than 15 million torrents.
Thats 444 gigabytes of .torrent files for all the archivists out there. Alternatively, the site also...
Conservative Twitter users are speaking out about a loss in followers after Twitter reportedly suspended thousands of accounts.Twitter has yet to announce the purge, but there is speculation that the action was part of...
With a billion people registered, Indias Supreme Court weighs in on how these 12-digit IDs can be used Photo: Noah Seelam/AFP/Getty Images
In January, justices of the Supreme Court of India gathered to discuss the countrys national identification system, called Aadhaar. Since 2010, authorities have enrolled 1.19 billion residents, or about 93 percent of Indias population, in the system, which ties fingerprints, iris scans, and photos of Indian citizens to a unique 12-digit number.
Almost a decade later, India is still grappling with the technical, legal, and social challenges of launching the worlds most ambitious government identification program. Aadhaars reach and ubiquity has made it a tempting vehicle for centralizing activity, including welfare payments and mobile number registrations. But it has also raised major privacy and security issues.
The Indian governments original argument for Aadhaar was to replace paper ration cards for food entitlements [see Indias Big Bet on Identity, IEEE Spectrum, March 2012]. The old system excluded citizens who could not obtain a card from corrupt local officials, and members of families whose heads of household did not share benefits with them. Individuals, rather than households, now have Aadhaar numbers, and obtaining one is free at any enrollment office in the country.
In the years since the program began, banks, mobile operators, and the government itself have started to require Aadhaar authentication to access services, even though Indias Supreme Court has found that the government cannot force citizens to use Aadhaar to obtain entitlements.
The case now before the countrys highest court, which was ongoing at press time, combines almost three dozen petitions arguing that Aadhaar violates a constitutional right to privacy and interferes with access to entitlements. While some of the petitions challenge the entire Aadhaar Act, others focus on a government requirement to use Aadhaar to verify a......
Security updates have been issued by Arch Linux (libmspack), Debian (zziplib), Fedora (ca-certificates, firefox, freetype, golang, krb5, libreoffice, monit, patch, plasma-workspace, ruby, sox, tomcat, and zziplib), openSUSE (dovecot22, glibc, GraphicsMagick, libXcursor, mbedtls, p7zip, SDL_image, SDL2_image, sox, and transfig), Red Hat (chromium-browser), and Ubuntu (cups, libvirt, and qemu).
Longtime Nouveau contributor Karol Herbst joined Red Hat at the end of last year where his current task is on NIR intermediate representation support for Nouveau as part of bringing SPIR-V compute support to this open-source NVIDIA Linux driver...
While the Directory has been and continues to be a great resource to the world for over a decade now, it has the potential to be a resource of even greater value. But it needs your help!
We are back with another classic week of adding new entries to the Directory.
If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting.
The lathe is known as the King of Machine Tools for a reason. There are very few things that you cant make with one. In fact, people love to utter the old saw that the lathe is the only machine tool that can make itself. While catchy, I think thats a bit disingenuous. Its more accurate to say that there are parts in all machine tools that (arguably) only a lathe can make. In that sense, the lathe is the most fundamental machine tool. Before you harbor dreams of self-replication, however, know that most of an early lathe would be made by hand scraping the required flat surfaces. So no, a lathe cant make itself really, but a lathe and a skilled craftsperson with a hand-scraper sure can. In fact, if youve read the The Metal Lathe by David J. Gingery, you know that a lathe is instrumental in building itself while youre still working on it.
Were taking trip through the machining world with this series of articles. In the previous article we went over the history of machine tools. Lets cut to the modern chase now and help some interested folks get into the world of hobby machining, shall we? As we saw last time, the first machine tools were lathes, and thats also where you should start.
With that bit of pedantry out of the way, lets talk about why lathes are fundamental. Remember how I said that machine tools cleverly create parts that have greater precision than they themselves do? The lathe is the primary example of that.
While Python 3 has been around now for a decade, most Linux distributions are still working towards moving away from Python 2 and that includes Intel's Clear Linux distribution...
Bigelow Aerospace has created a spinoff company that will manage its orbital space stations, and has announced plans for an inflatable module that would be even larger than the B330:
Bigelow Aerospace the Las Vegas-based company manufacturing space habitats is starting a spinoff venture aimed at managing any modules that the company deploys into space. Called Bigelow Space Operations (BSO), the new company will be responsible for selling Bigelow's habitats to customers, such as NASA, foreign countries, and other private companies. But first, BSO will try to figure out what kind of business exists exactly in lower Earth orbit, the area of space where the ISS currently resides.
Bigelow makes habitats designed to expand. The densely packed modules launch on a rocket and then inflate once in space, providing more overall volume for astronauts to roam around. The company already has one of its prototype habitats in orbit right now: the Bigelow Expandable Activity Module, or BEAM, which has been attached to the International Space Station since 2016. The BEAM has proven that Bigelow's expandable habitat technology not only works, but also holds up well against the space environment.
Now, Bigelow is focusing on its next space station design: the B330. The habitat is so named since it will have 330 cubic meters (or nearly 12,000 cubic feet) of interior volume when expanded in space. That's about one-third the volume provided by the ISS. Bigelow hopes to launch two B330s as early as 2021, on top of the United Launch Alliance's Atlas V rockets, and the company even has plans to put a B330 around the Moon. After that, Bigelow has bigger plans to create a single station with 2.4 times the entire pressurized volume of the ISS, the company announced today. Such a huge station will need to be constructed in an entirely new manufacturing facility that Bigelow plans to build though the company hasn't decided on a location yet.
Bigelow's BEAM is currently attached to the ISS and has a volume of about 16 cubic meters, which has been described as that of "a large...
On May 25, the General Data Protection Regulation will bring sweeping changes to data security in the European Union. If your organisation collects personal data or behavioural information from anyone in an EU country, its subject to GDPR requirements. Wherever your team stands on its path to readiness, this whitepaper will help you better understand GDPR and your companys compliance obligations. Download the document for insights as you prepare, including the steps to put a More
A new quantum key distribution method uses a quantum state with the potential to encode more than one bit per photon Image: iStock Photo
Chinese researchers have put forward a new quantum cryptography standard that could, if confirmed, substantially increase the speed of encrypted messages. The proposed new standard has been simulated on computers although not yet tested in the lab.
Quantum cryptography, the next-generation of secret messages whose secrecy is guaranteed by the laws of quantum mechanics, has been in the news recently. Last fall a group from the Chinese Academy of Sciences transmitted quantum cryptographically encoded communications (via satellite) to a ground station in Vienna, Austria.
The communications included quantum-encoded images and a 75-minute quantum-cryptographically secured videoconference, consisting of more than 2 gigabytes of data. IEEE Spectrum reported on the event at the time. And now, as of last month, the entire project has been detailed in the journal Physical Review Letters.
Media coverage of the event stressed its significance in moving toward a so-called quantum Internet. Yet the quantum internet would still be a distant dream when quantum cryptography can only mediate one or, at most, a few quantum-secured communications channels. To scale up to anything worthy of the name quantum Internet, quantum cryptography would need to generate not only thousands of cryptographic keys per second. Rather, a scalable quantum crypto system should aspire to key-generation rates closer to billions per second or greaterin the gigahertz (GHz) range and up, not kilohertz (kHz).
Theoretically we can get gigahertz levels of quantum key distribution, says Pei Zhang, professor of applied physics at Xian Jiaotong University in Xian, China.
Zhang and five other researchers from his university and Tsinghua University in Beijing have built a quantum crypto protocol on a different and potentially more capacious standard than what last falls video teleconference used. (To be fair, other GHz-speed quantum crypto protocols have recently been proposed as well.)
The teleconference, mediated by a dedicated quantum communications satellite China launc...
Posted by SEC Consult Vulnerability Lab on Feb 21We have published an accompanying blog post to this technical advisory with
AMD is taking their Zen microarchitecture to the embedded space now with the announcement of the AMD Launches EPYC Embedded 3000 and Ryzen Embedded V1000 series...
Serge Wroclawski, a long-time contributor to OpenStreetMap, has posted a criticism of the management choices he believes are preventing the OpenStreetMap Foundation from fulfilling its mission (much like the Wikimedia Foundation):
I feel the OpenStreetMap project is currently unable to fulfill that mission due to poor technical decisions, poor political decisions, and a general malaise in the project. I'm going to outline in this article what I think OpenStreetMap has gotten wrong. It's entirely possible that OSM will reform and address the impediments to its success- and I hope it does. We need a Free as in Freedom geographic dataset.
Read more of this story at SoylentNews.
This blog post looks at the most important control plane components of a single Kubernetes master node etcd, the API server, the scheduler and the controller manager and explains how they work together. Although other components, such as DNS and the dashboard, come into play in a production environment, the focus here is on these specific four.
Technology platforms in the post-millennial era are heavily characterized by their use of automation and optimization techniques. As we increasingly analyze our software in order to quantify and qualify what applications and data workloads work well in situation A, we can start to automate an element of other software deployments with managed optimized controls in situation B.
A new report from RedLock offers a look at the threats and vulnerabilities that continue to mount in public cloud computing environments. Account compromises keep rising Poor user and API access hygiene, combined with ineffective visibility and user activity monitoring, are causing organizations to be more vulnerable to breaches. For example, 73% of organizations allow the root user account to be used to perform activities behavior that goes against security best practices. Furthermore, 16% More
Andra Keay, Managing Director of Silicon Valley Robotics, joins our Robotics/AI Board.
F. Marek Modzelewski, General Manager at Treeline Interactive, joins our Business Board.
One way to understand how the 555 timer works and how to use it is by learning what the pins mean and what to connect to them. A far more enjoyable, and arguably a more useful way to learn is by looking at whats going on inside during each of its modes of operation. [Dejan Nedelkovski] has put together just such a video where he walks through how the 555 timer IC works from the inside.
We especially like how he immediately removes the fear factor by first showing a schematic with all the individual components but then grouping them into what they make up: two comparators, a voltage divider, a flip-flop, a discharge transistor, and an output stage. Having lifted the internals to a higher level, he then walks through examples, with external components attached, for each of the three operating modes: bistable, monostable and astable. If youre already familiar with the 555 then youll enjoy the trip down memory lane. If youre not familiar with it, then you soon will be. Check out his video below.
This isnt the only time weve toyed with the guts of this wonderful chip. A few years ago we were all delighted with this mega-sized discrete 555 kit and a little more recently, this teardown of the actual chip.
[The "mobile launcher" component] supports the testing and servicing of the massive SLS rocket, as well as moving it to the launch pad and providing a platform from which it will launch.
According to a new report in NASASpaceflight.com, the expensive tower is "leaning" and "bending." For now, NASA says, the lean is not sufficient enough to require corrective action, but it is developing contingency plans in case the lean angle becomes steeper.
These defects raise concerns about the longevity of the launch tower and increase the likelihood that NASA will seek additional funding to build a second one. In fact, it is entirely possible that the launch tower may serve only for the maiden flight of the SLS rocket in 2020 and then be cast aside. This would represent a significant waste of resources by the space agency.
[...] [From] the tower's inception in 2009, NASA will have spent $912 million on the mobile launcher it may use for just a single launch of the SLS rocket. Moreover, the agency will have required eight years to modify a launch tower it built in two years.
The second mobile launcher, intended for larger versions of the SLS, will cost about $300 million (if not more).
Flight of the Space Launch System Delayed to 2019
Trump Space Adviser: Mars "Too Ambitious" and SLS is a Strategic National Asset
NASA Opens Door to Possibly Lowering SLS Cost Using Blue Origin's Engines
After the Falcon Heavy Launch, Time to Defund the Space Launch System?
Read more of this story at SoylentNews.
Posted by nafiez on Feb 21Unshar scans the input files (typically email messages) looking for the start of a shell archive. If no files are
Posted by nafiez on Feb 21Unshar scans the input files (typically email messages) looking for the
Oliver Isaacs joins our New Money Systems Board. Oliver is Marketing Advisor for Cryptocurrency, Blockchain, and ICOs.
The Netflix series takes place hundreds of years in the future, but references versions of technology that have been in development for years, like brain mapping, human and AI neural links, and mind uploading to computers. Millions of dollars has been bumped into technological ideas that promise, one day, our brains will be turned digital. That said, there are those who believe the human mind is too complex, and our consciousness too nuanced, to be recreated in a digital product. And none of that even goes into what would happen if someones digitized mind was placed into real human flesh.
Will we ever be able to upload our minds into other bodies? Furthermore, should we? And honestly, if we ever achieved such a feat, could we even call ourselves human anymore? On this weeks Giz Asks, we reached out to experts in neuroscience, philosophy and futurism.
To successfully deal with open source security, you need your developers (and DevOps teams) to operate the solution. Given the fast pace of modern development, boosted in part by the use of open source itself, an outnumbered security team will never be able to keep you secure. Therefore, the SCA solution you choose must be designed for developers to be successful with.
For Mesa 18.0 is the initial Intel shader cache support for archiving compiled GLSL shaders on-disk to speed up the load times of subsequent game loads and other benefits. For the Mesa 18.0 release the functionality isn't enabled by default but it will be for Mesa 18.1...
While Team Battistelli gives itself major bonuses
Just dont mention anything about luxury cars of top-level management or bars built secretly at the 10th floor (among other ludicrous spendings on media influence, Eurovision-type festivals, plenty of personal bodyguards and so on)
Summary: While the Administrative Council of the EPO praises Battistelli for his financial accomplishments (as laughable as it may seem) a lot of families stuck in a foreign country may soon see their breadwinner unemployed, according to rumours
THE EPO is in trouble/peril; insiders started to insinuate that something wrong and very major was brewing at the Office yesterday. Weve waited long enough and we now hear it from multiple sources. So here it goes.
According to rumours heard at the EPOs canteen, one source told us, the EPO seems to be planning dismissals of 700 to 1000 employees.
If they have as much money as they claim, why would the Office shrink this much?This does not surprise us. We wrote about layoffs just earlier this week and many imminent changes seem to be hinting at that. Battistelli is just planting the seeds of catastrophe, which no doubt already causes super-hard-working examiners to panic.
Now that we hear these things we cant help but recall some recent comments. One such comment said that the only bells to which the Administrative Council of the EPO usually reacts to are the cash register bells operated by Mr. Battistelli.
What cash register?
If they have as much money as they claim, why would the Office shrink this much? This is unprecedented; the Office grew over time rather than shrink.
Here is another interesting new comment:
If the Freie Whler stand up and file a pretty sensible and non-ideological...
Samsung unveils worlds largest 30.72TB capacity SSD for enterprise storage systems
Samsung Electronics, the world leader in advanced memory technology, unveiled its largest 30.72 terabyte (TB) solid state drive (SSD) for use in in next-generation enterprise storage systems.
The 30.72TB SSD, dubbed the PM1643, is double the capacity of Samsungs current 15.36TB SSD that it unveiled in March 2016. Not intended for consumer use, the new SSD is designed to meet the growing storage needs in a host of market segments, including the government, health and education markets, and others.
With our launch of the 30.72TB SSD, we are once again shattering the enterprise storage capacity barrier, and in the process, opening up new horizons for ultra-high capacity storage systems worldwide, said Jaesoo Han, Executive Vice President, Memory Sales & Marketing Team at Samsung Electronics. Samsung will continue to move aggressively in meeting the shifting demand toward SSDs over 10TB and at the same time, accelerating adoption of our trail-blazing storage solutions in a new age of enterprise systems.
Samsung claims the product is the industrys largest solid state drive (SSD). To make the breakthrough possible, Samsung used its V-NAND technology and 64-layer 3-bit 512-gigabit (Gb) chips. It combined 16 stacked layers of 512GB V-NAND chips into 1TB into super-dense 1TB packages, of which 32 were then combined into each 2.5-inch SSD form factor. This allows around 5,700 (5GB, Full HD) movie files and countless files to be stored on a single drive.
The new PM1643 SSD is based on a 12Gbps Serial Attached SCSI (SAS) interface. The PM1643 sports random read and write speeds of up to 400,000 IOPS and 50,000 IOPS, and delivers sequential read and write speeds of up to 2,100MB/s and 1,700 MB/s, respectively. These are basically four times the random-read performance and three times the sequential-read performance of a typical 2.5-inch SATA SSD, Samsung said.
Samsung said it achieved the new capacity and performance improvements through several technology progressions in the design of its controller, DRAM packaging and associated software. These advancements include a highly efficient controller architecture that integrates nine controllers from the previous high-capacity SSD lineup into a single package, enabling a greater amount of space within the SSD to be used for storage. The PM1643 drive also applies Through Silicon Via (TSV) technology to interconnect 8Gb DDR4 chips, creating 10 4GB TSV DRAM packages, totaling 40GB of DRAM. This marks the first time that TSV-applied DRAM has been used in an SSD, Samsu...
Cryptocurrency not a sound long-term investment, cautions Ethereum Founder Vitalik Buterin
More and more people are looking to invest in cryptocurrency, as it is currently seen as one of the best investment opportunity in the market. For instance, Bitcoin the virtual currency also called as cryptocurrency started off at the price of $1,000 in January 2017 and has now crossed the $11,000 mark as of yesterday.
While investing in Bitcoin or any other cryptocurrency does sound promising, however, these markets are highly unpredictable because of its volatile nature.
In a tweet over last weekend, Vitalik Buterin, the founder of blockchain network Ethereum and its associated cryptocurrency (ether), warned investors that cryptocurrency could fall violently at any time, as cryptocurrencies are still a new and hyper-volatile asset class. He also warned people to think twice before throwing their entire life savings into virtual coins.
Bitcoin, Ethereum, Ripple, Litecoin and other cryptocurrencies could drop to near-zero at any time, Buterin said on Twitter. Dont put in more money than you can afford to lose, he added. If youre trying to figure out where to store your life savings, traditional assets are still your safest bet.
Reminder: cryptocurrencies are still a new and hyper-volatile asset class, and could drop to near-zero at any time. Don't put in more money than you can afford to lose. If you're trying to figure out where to store your life savings, traditional assets are still your safest bet.
Vitalik Buterin (@VitalikButerin) February 17, 2018
This is not the first time Buterin has warned cryptocurrency investors about its dangers. Back in December 2017, he warned investors about bubbles and volatility in the high-flying digital currency market. He also criticized some crypto players for displaying their newfound wealth, and said that they should instead be thinking about how to use the technology for achieving something meaningful for society.
The last 12 months has witnessed the value of Bitcoin rising from $1,000 to nearly $20,000, before falling below $6,000 in early 2018 and then again crossing the $11,000 mark yesterday. Similarly, one ether coin that was around $13 a year ago is now worth $950. However, the last couple of months has also seen a fluctuation in the value of ether coin, which has hit high of $1,400 as well a low of $580.
The post Cryptoc...
Samsung has announced a 30.72 TB SSD. It uses 64-layer 512 Gb TLC NAND dies, with 16 of each stacked to make a 1 TB package. It has 40 GB of DDR4 DRAM cache, also using layered packages:
The PM1643 drive also applies Through Silicon Via (TSV) technology to interconnect 8Gb DDR4 chips, creating 10 4GB TSV DRAM packages, totaling 40GB of DRAM. This marks the first time that TSV-applied DRAM has been used in an SSD.
Complementing the SSD's hardware ingenuity is enhanced software that supports metadata protection as well as data retention and recovery from sudden power failures, and an error correction code (ECC) algorithm to ensure high reliability and minimal storage maintenance. Furthermore, the SSD provides a robust endurance level of one full drive write per day (DWPD), which translates into writing 30.72TB of data every day over the five-year warranty period without failure. The PM1643 also offers a mean time between failures (MTBF) of two million hours.
Samsung started manufacturing initial quantities of the 30.72TB SSDs in January and plans to expand the lineup later this year with 15.36TB, 7.68TB, 3.84TB, 1.92TB, 960GB and 800GB versions to further drive the growth of all-flash-arrays and accelerate the transition from hard disk drives (HDDs) to SSDs in the enterprise market.
Related: SK Hynix
Plans 72-Layer 512 Gb NAND for Late 2017
SK Hynix Developing 96 and 128-Layer TLC 3D NAND
Western Digital Announces 96-Layer 3D NAND, Including Both TLC and QLC
Toshiba Develops 512 GB and 1 TB Flash Chips Using TSV
Expect 20-30% Cheaper NAND in Late 2018
Names set expectations. Your project's name should showcase its functionality in the ecosystem and explain to users what your story is. In the crowded open source software world, it's important not to get entangled with other projects out there. Taking a little extra time now, before sending out that big announcement, will pay off later.
Here are four factors to keep in mind when choosing a name for your project.
It used to be something of an electronic rite of passage, the construction of an FM bug. Many of us will have taken a single RF transistor and a tiny coil of stiff wire, and with the help of a few passive components made an oscillator somewhere in the FM broadcast band. Connect up a microphone and you were a broadcaster, a prankster, and probably set upon a course towards a life in electronics. Back in the day such a bug might have been made from components robbed from a piece of scrap consumer gear such as a TV or VCR, and perhaps constructed spider-web style on a bit of tinplate. It wouldnt have been stable and it certainly wouldnt have been legal in many countries but the sense of achievement was huge.
As you might expect with a few decades of technological advancement, the science of FM bugs has moved with the times. Though you can still buy the single transistor bugs as kits there is a whole range of fancy chips designed for MP3 players that provide stable miniature transmitters with useful features such as stereo encoders. Thats not to say there isnt scope for an updated simple bug too though, and here [James] delivers the goods with his tiny FM transmitter.
Gone is the transistor, and in its place is a MAX2606 voltage-controlled oscillator. The on-chip varicap and buffer provided by this device alleviate some of the stability issues suffered by the transistor circuits, and to improve performance further hes added an AP2210 low-dropout regulator to catch any power-related drift. If it were ours wed put in some kind of output network to use both sides of the differential output, but his single-ended solution at least offers simplicity. The whole is put on a board so tiny as to be dwarfed by a CR2032 cell, and we can see that a bug that size could provide hours of fun.
This may be a small and simple project, but it has found its way here for being an extremely well-executed one. Its by no means the first FM bug weve shown you here, just a few are this one using scavenged SMD cellphone parts, or this more traditional circuit built on a piece of stripboard.
The most famous atmospheric features of both Jupiter and Neptune may be gone soon:
When we think of storms on the other planets in our Solar System, we automatically think of Jupiter. Jupiter's Great Red Spot is a fixture in our Solar System, and has lasted 200 years or more. But the storms on Neptune are different: they're transient.
[...] "It looks like we're capturing the demise of this dark vortex, and it's different from what well-known studies led us to expect," said Michael H. Wong of the University of California at Berkeley, referring to work by Ray LeBeau (now at St. Louis University) and Tim Dowling's team at the University of Louisville. "Their dynamical simulations said that anticyclones under Neptune's wind shear would probably drift toward the equator. We thought that once the vortex got too close to the equator, it would break up and perhaps create a spectacular outburst of cloud activity."
Rather than going out in some kind of notable burst of activity, this storm is just fading away. And it's also not drifting toward the equator as expected, but is making its way toward the south pole. Again, the inevitable comparison is with Jupiter's Great Red Spot (GRS). The GRS is held in place by the prominent storm bands in Jupiter's atmosphere. And those bands move in alternating directions, constraining the movement of the GRS. Neptune doesn't have those bands, so it's thought that storms on Neptune would tend to drift to the equator, rather than toward the south pole.
A ferocious storm has battered Jupiter for at least 188 years. From Earth, it is observed as red swirling clouds racing counter-clockwise in what is known as the planet's "Great Red Spot." But after shrinking for centuries, it may now be on the brink of disappearing for good.
"In truth, the GRS [Great Red Spot] has been shrinking for a long time," lead Juno mission team member and planetary scientist at NASA's Jet Propulsion Laboratory Glenn Orton told Business Insider in an email. "The GRS will in a decade or two become...
Way back in 2011, Streamiz was reported to be the second most popular pirate streaming site in France with around 250,000 visitors per day. The site didnt host its own content but linked to movies elsewhere.
This prominent status soon attracted the attention of various entertainment companies including the National Federation of Film Distributors (FNDF) which filed a complaint against the site back in 2009.
Investigators eventually traced the presumed operator of the site to a location in the Hauts-de-Seine region of France. In October 2011 he was arrested leaving his Montrouge home in the southern Parisian suburbs. His backpack reportedly contained socks stuffed with almost 30,000 euros in cash.
The man was ordered to appear before the investigating judge but did not attend. He also failed to appear during his sentencing this Monday, which may or may not have been a good thing, depending on ones perspective.
In his absence, the now 41-year-old was found guilty of copyright infringement offenses and handed one of the toughest sentences ever in a case of its type.
According to an AFP report, when the authorities can catch up with him the man must not only serve two years in prison but also pay a staggering 83.6 million euros in damages to Disney, 20th Century Fox, Warner Bros and SACEM, the Society of Authors, Composers and Music Publishers.
Streamiz is now closed but at its peak offered around 40,000 movies to millions of users per month. In total, the site stood accused of around 500,000,000 infringements, earning its operator an estimated 150,000 euros in advertising revenue over a two year period.
This is a clear case of commercial counterfeiting based on a very structured system, David El Sayegh, Secretary General of SACEM, told AFP. His sentence sends a very clear message: there will be no impunity for pirates, he added.
With an arrest warrant still outstanding, the former Streamiz admin is now on the run with very few options available to him. Certainly, the 83.6 million euro fine wont ever be paid but the prison sentence is something he might need to get behind him.
No. Via: Bloomberg: Picture this: Youre driving home from work, contemplating what to make for dinner, and as you idle at a red light near your neighborhood pizzeria, an ad offering $5 off a pepperoni pie pops up on your dashboard screen. Are you annoyed that your cars trying to sell you something, or pleasantly 
An outbreak of 28 salmonella infections in 20 states has been linked to kratom products, the US Centers for Disease Control and Prevention said in a statement Tuesday. Though no deaths have been reported, 11 people have been hospitalized.
[...] California had the highest number of salmonella cases (three). North Carolina, Ohio, Oklahoma, Oregon, Pennsylvania and Utah each reported two cases while Alabama, Arizona, Colorado, Florida, Kansas, Kentucky, Louisiana, Massachusetts, Michigan, North Dakota, New York, South Carolina and Tennessee each reported a single case, the CDC found.
Kratom should not be consumed in any form, the CDC said, because the source of salmonella contamination has not been identified.
Welcomes Kratom to the Schedule I List Beginning September
The Calm Before the Kratom Ban
FDA Blocks More Imports of Kratom, Warns Against Use as a Treatment for Opioid Withdrawal
FDA Labels Kratom an Opioid
Read more of this story at SoylentNews.
APT37 has been active since at least 2012, it made the headlines in early February when researchers revealed that the APT group leveraged a zero-day vulnerability in Adobe Flash Player to deliver malware to South Korean users.
Cyber attacks conducted by the APT37 group mainly targeted government, defense, military, and media organizations in South Korea.
FireEye linked the APT37 group to the North Korean government based on the following clues:
Researchers from FireEye revealed that the nation-state actor also targeted entities in Japan, Vietnam, and even the Middle East in 2017. The hackers targeted organizations in the chemicals, manufacturing, electronics, aerospace, healthcare, and automotive sectors.
APT37 has likely been active since at least 2012 and focuses on targeting the public and private sectors primarily in South Korea. In 2017, APT37 expanded its targeting beyond the Korean peninsula to include Japan, Vietnam and the Middle East, and to a wider range of industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive and healthcare entities reads the report published by FireEye.
A few months ago we showed you a bar bot built by [GreatScott] that uses peristaltic pumps to food-safely move the various spirits and mixers around behind the curtain. The bar bot uses three of them, and at $30 each for pumps with decent flow rate, they added a lot to the parts bill. These pumps are pretty much the ideal choice for a bar bot, so what do you do? [GreatScott] decided to see if it was worth it to make them instead.
Peristaltic pumps are simple devices that pump liquids without touching them. A motor turns a set of rollers that push a flexible tube against a wall. As the motor turns, the rollers move liquid through the tube by squeezing it flat from the outside in turns. Typically, the more you pay for an off-the-shelf peristaltic, the higher the flow rate.
[GreatScott] figured it was cheaper to buy the motor and the control circuitry. He chose a NEMA-17 for their reputation and ubiquity and a DRV8825 controller to go with it. The pump is driven by an Arduino Nano and a pot controls the RPM. After trying to design the mechanical assembly from scratch, he found [Ralf]s pump model on Thingiverse and modified it to fit a NEMA-17.
The verdict? DIY all the way, assuming you can print the parts. [GreatScott] was trying to beat the purchased pumps flow rate of 100mL/minute and ended up with 200mL/minute from his DIY pump. Squeeze past the break for the build video and demonstration.
Is there a bar bot build on your list? No? Is it because youre more of a single-malt scotch guy? Build a peristaltic pachyderm to pour your potion.
Posted by preethiknambiar on Feb 201. Introduction
Microsoft launched ARM-powered Windows 10 PCs with "all-day" battery life back in December. While HP, Asus, and Lenovo's devices aren't on sale just yet, we're still waiting to hear more about the limitations of Windows 10 running on these new PCs. Microsoft published a full list of limitations last week, spotted first by Thurrott, that details what to expect from Windows 10 on ARM. This list must have been published by accident, as the software giant removed it over the weekend so only cached copies of the information are available.
Read more of this story at SoylentNews.
Xorgproto debuted earlier this month as a centralized package of all X.Org protocol headers that used to be versioned and developed independently. Given the slower development now of the xorg-server and lots of the protocols being intertwined, they are now all bundled together. Tuesday marked the 2018.3 release with the new additions for Keith Packard's SteamVR Linux infrastructure work...
When Simon Schempp, a biathlete on the German Olympic team, was training for the Pyeongchang Games, he often capped a hard day on the trail with a bottle of nonalcoholic beer. He enjoys the taste of beer like most Germans, who drink more of it per capita than the people of almost any other nation. But he drank the nonalcoholic variety for more than just the flavor. "It's a really good drink directly after training or after competition," said Schempp, who won a silver medal in the 15-kilometer mass start event on Sunday.
Schempp's sober assessment is popular in Germany. While most people see nonalcoholic beer as a responsible replacement for regular beer, Germans often drink it in place of sports drinks after exercise. Beer or Gatorade? No contest.
Johannes Scherr, the doctor for the German Olympic ski team, said nearly all of his athletes drink nonalcoholic beer during training. And the brewery Krombacher has supplied 3,500 liters (about 1,000 gallons) of nonalcoholic beer to the athletes' village so German athletes can enjoy it during competitions at the Pyeongchang Games, where Germany is tied for the most gold medals.
[...] Scherr conducted a double-blind study [open, DOI: 10.1249/MSS.0b013e3182250dda] [DX] [alt], financed by a brewing company, in which he gave runners in the 2009 Munich Marathon nonalcoholic beer every day for three weeks before and two weeks after the race. These runners suffered significantly less inflammation and fewer upper respiratory infections after the race than runners who had been given a placebo.
Read more of this story at SoylentNews.
With little more than pen, paper, dice, and imagination, a group of friends can transport themselves to another plane for shenanigans involving dungeons and/or dragons. An avid fan of D&D and a budding woodworker, Imgurian [CapnJackHarkness] decided to build gaming table with an inlaid TV for their inaugural project.
The tabletop is a 4x4 sheet of plywood, reinforced from underneath and cut out to accommodate a support box for the TV. Each leg ended up being four pieces of 1x4 wood, laminated together with a channel cut into one for the tables power cable. An outer ledge has dice trays if theyre even needed in todays world ready for all those nat 20s, cupholders because nobody likes crying over spilled drinks, and electrical outlets to keep devices charged. Foam squares cover the tabletop which can be easily removed and washed if needed but more on that in a second. [CapnJackHarkness] painted the table as the wood rebuffed many attempts at staining, but theyre happy with how it turned out.
[CapnJackHarkness] based their build on a table made by Gaminggeek, adapting it t...
A casual viewer of nature documentariesor anyone who hasnt heard of or seen the film Attenborough wrote called, Charles Darwin and the Tree of Lifemight surmise that the man was hired to narrate the scripts merely because hes got a great voice.Photograph courtesy Johann Edwin Heupel / Flickr
The name David Attenborough has, to me, always been an enchanting but disembodied voice narrating the hidden struggles and splendors of the natural world. In the last few months Ive seen several of his documentaries (out of the 23 I could count on Netflix) from start to finishLife, Africa, and Planet Earth. Theyre mesmerizing, and some segments can be heart-racing, some distressing, and some morally confusing, as you feel your sympathies tugged in opposite directions (quite often, the offspring of one creature is taken as food to feed the offspring of another). Attenborough doesnt take sidesthe cruelty of necessity in nature is a spectacle he dramatizes neutrally.
What Attenborough doesnt do in his nature documentaries is
discuss Darwin and his theory of natural selection. Sure, every so
often hell utter the word evolveitd be cumbersome not to,
especially when its, say, birds with specialized, elongated beaks
that hes describing. But, watching these shows, youll
Last year, a vigilante hacker broke into the servers of a company that sells spyware to everyday consumers and wiped their servers, deleting photos captured from monitored devices. A year later, the hacker has done it again.
Thursday, the hacker said he started wiping some cloud servers that belong to Retina-X Studios, a Florida-based company that sells spyware products targeted at parents and employers, but that are also used by people to spy on their partners without their consent.
[...] "None of this should be online at all," the hacker told Motherboard, claiming that he had deleted a total of 1 terabyte of data.
"Aside from the technical flaws, I really find this category of software disturbing. In the US, it's mainly targeted to parents," the hacker said, explaining his motivations for going after Retina-X. "Edward Snowden has said that privacy is what gives you the ability to share with the world who you are on your own terms, and to protect for yourself the parts of you that you're still experimenting with. I don't want to live in a world where younger generations grow up without that right."
[...] Retina-X was not the only spyware company hacked last year. Other hackers also breached FlexiSpy, an infamous provider of spyware that has actively marketed its apps to jealous lovers. At the time, the hackers promised that their two victimsFlexiSpy and Retina-Xwere only the first in line, and that they would target more companies that sell similar products.
Read more of this story at SoylentNews.
Via: Wall Street Journal: A South Korean official who guided Seouls regulatory clampdown on cryptocurrencies was found dead on Sunday, according to a government spokesman. Jung Ki-joon, 52, was head of economic policy at the Office for Government Policy Coordination. He helped coordinate efforts to create new legislation aimed at suppressing cryptocurrency speculation and illicit 
Anders Hovmller has posted an account of migrating a large application to Python 3. There were multiple steps on the journey and plenty of lessons learned. "Our philosophy was always to go py2 -> py2/py3 -> py3 because we just could not realistically do a big bang in production, an intuition that was proven right in surprising ways. This meant that 2to3 was a non starter which I think is probably common. We tried a while to use 2to3 to detect Python 3 compatibility issues but quickly found that untenable too. Basically it suggests changes that will break your code in Python 2. No good. The conclusion was to use six, which is a library to make it easy to build a codebase that is valid in both in Python 2 and 3."
KDE e.V. is announcing today it has received a donation of 200,000 USD from the Pineapple Fund.
With this donation, the Pineapple Fund recognizes that KDE as a community creates software which benefits the general public, advances the use of Free Software on all kinds of platforms, and protects users' privacy by putting first-class and easy to use tools in the hands of the people at zero cost. KDE joins a long list of prestigious charities, organizations and communities that the Pineapple Fund has so generously donated to.
"KDE is immensely grateful for this donation. We would like to express our deeply felt appreciation towards the Pineapple Fund for their generosity" said Lydia Pintscher, President of KDE e.V.. "We will use the funds to further our cause to make Free Software accessible to everyone and on all platforms. The money will help us realize our vision of creating a world in which everyone has control over their digital life and enjoys freedom and privacy".
Read more of this story at SoylentNews.
It is 2018 and the easiest way to make quick
This is a post from HackRead.com Read the original post: Hackers Compromise Tesla Cloud Server to Mine Cryptocurrency
In the coming decades, artificial intelligence (AI) and machine learning technologies are going to transform many aspects of our world. Much of this change will be positive; the potential for benefits in areas as diverse as health, transportation and urban planning, art, science, and cross-cultural understanding are enormous. We've already seen things go horribly wrong with simple machine learning systems; but increasingly sophisticated AI will usher in a world that is strange and different from the one we're used to, and there are serious risks if this technology is used for the wrong ends.
Today EFF is co-releasing a report with a number of academic and civil society organizations1 on the risks from malicious uses of AI and the steps that should be taken to mitigate them in advance.
At EFF, one area of particular concern has been the potential interactions between computer insecurity and AI. At present, computers are inherently insecure, and this makes them a poor platform for deploying important, high-stakes machine learning systems. It's also the case that AI might have implications for computer [in]security that we need to think about carefully in advance. The report looks closely at these questions, as well as the implications of AI for physical and political security. You can read the full document here.
Over the past week we've had at least three occurrences of this particular bug crop up. It's currently already fixed but I thought I'd fill you lot in just in case it got you too and you haven't noticed yet.
On the subscription page there are two radio buttons if you're logged in. One is to subscribe for yourself and one is to give a gift subscription. For some reason they were both set unchecked. If you didn't check one your subscription would to go NCommander's non-admin account, mcasadevall. It beats the complete hell out of me why this would be the default but it is.
If you've purchased a subscription recently please check that you got credit for it. If you didn't please let us know either here or via email.
Read more of this story at SoylentNews.
Even though hes a faithful DeWalt cordless tool guy, [Richard Day] admits to a wandering eye in the tool aisle, looking at the Ryobi offerings with impure thoughts. Could he stay true to his brand and stick with his huge stock of yellow tools and batteries, or would he succumb to temptation and add another set of batteries and chargers so he could have access to a few specialty lime green tools?
Luckily, we live in the future, so theres a third way building a cross-brand battery adapter that lets him power Ryobi tools with his DeWalt batteries. [Richard]s solution is a pure hack, as in physically hacking battery packs and forcing them to work and play well together. Mechanically, this was pretty easy a dead Ryobi pack from the recycling bin at Home Depot was stripped down for its case, which was glued to a Dewalt 20-v to 18-v battery adapter. The tricky part came from dealing with the battery control electronics. Luckily, the donor DeWalt line has that circuitry in the adapter, while Ryobi puts it in the battery. That meant simply transplanting the PCB from the adapter to the Ryobi battery shell would be enough. The video below shows the process and the results Ryobi tools happily clicking away on DeWalt batteries.
While [Richard] took a somewhat brute-force approach here, we imagine 3D-printed parts might make for a more elegant solution and offer other brand permutations. After all, printing an adapter should be easier than whipping up a cordless battery pack de novo.
JUDGE BLOCKS AT&T REQUEST FOR WHITE HOUSE-DOJ COMMUNICATIONS: A federal judge overseeing the Justice Department's lawsuit against the AT&TTime Warner merger rejected AT&T's request for records of communications between the agency...
Engineers at Purdue University and GlobalFoundries have gotten today's most advanced transistors to vibrate at frequencies that could make 5G phones and other gadgets smaller and more energy efficient. The feat could also improve CPU clocks, make wearable radars, and one day form the basis of a new kind of computing. They presented their results today at the IEEE International Solid-States Circuits Conference, in San Francisco.
Read more of this story at SoylentNews.
The Federal Communications Commission is slated to publish on Thursday its order scrapping net neutrality rules, a source with knowledge of the matter told The Hill on Tuesday.The official publication of the measure, which was first reported by...
In 1998, Congress passed the Digital Millennium Copyright Act (DMCA), and profoundly changed the relationship of Americans to their property.
Section 1201 of the DMCA bans the bypassing of "access controls" for copyrighted works. Originally, this meant that even though you owned your DVD player, and even though it was legal to bring DVDs home with you from your European holidays, you weren't allowed to change your DVD player so that it would play those out-of-region DVDs. DVDs were copyrighted works, the region-checking code was an access control, and so even though you owned the DVD, and you owned the DVD player, and even though you were allowed to watch the disc, you weren't allowed to modify your DVD player to play your DVD (which you were allowed to watch).
Experts were really worried about this: law professors, technologists and security experts saw that soon we'd have softwarethat is, copyrighted worksin all kinds of devices, from cars to printer cartridges to voting machines to medical implants to thermostats. If Congress banned tinkering with the software in the things you owned, it would tempt companies to use that software to create "private laws" that took away your rights to use your property in the way you saw fit. For example, it's legal to use third party ink in your HP printer, but once HP changed its printers to reject third-party ink, they could argue that anything you did to change them back was a violation of the DMCA.
Congress's compromise was to order the Library of Congress and the Copyright Office to hold hearings every three years, in which the public would be allowed to complain about ways in which these locks got in the way of their legitimate activities. Corporations weigh in about why their business interests outweigh your freedom to use your property for legitimate ends, and then the regulators deliberate and create some temporary exemptions, giving the public back the right to use their property in legal ways, even if the manufacturers of their property don't like it.
If it sounds weird that you have to ask the Copyright Office for permission to use your property, strap in, we're just getting started.
Here's where it gets weird: DMCA 1201 allows the Copyright Office to grant "use" exemptions, but not "tools" exemptions. That means that if the Copyright Office likes your proposal, they can give you permission to jailbreak your gadgets to make some use (say, install third-party apps on your phone, or record clips fro...
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog