|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Sent out earlier this week were the AppArmor feature updates for the Linux 4.18 kernel merge window...
The WS2812 addressable LED is a marvellous component. Any colour light you want, all under the control of your favourite microcontroller, and daisy-chainable to your hearts content. Unsurprisingly they have become extremely popular, and can be found in a significant number of the project s you might read about in these pages.
A host of products have appeared containing WS2812s, among which Adafruits Neopixel rings are one of the more memorable. But they arent quite as cheap as [Hyperlon] would like, so the ever-resourceful hacker has created an alternative for the constructor of more limited means. It takes the form of a circular PCB that apes the Adafruit original, and it claims to deliver a Bill of Materials cost that is 85% cheaper.
In reality the Instructables tutorial linked above is as much about how to create a PCB and surface-mount solder as it is specific to the pixel ring, and many readers will already be familiar with those procedures. But we wont rest until everyone out there has tried their hands at spinning their own PCB project, and this certainly proves that such an endeavour is not out of reach. Whether or not you pay for the convenience of the original or follow this lead is your own choice.
The real thing has been in so many projects its difficult to pick just one to link to. This Christmas tree is rather nice.
A new analysis of data collected by NASA's Dawn orbiter suggests that organic molecules may exist in surprisingly high concentrations on the surface of Ceres. The study [DOI: 10.1029/2018GL077913] [DX] appears in the journal Geophysical Research Letters.
[...] To get an initial idea of how abundant those compounds might be, researchers compared the [Visible and Infrared Spectrometer] data from Ceres with lab reflectance spectra of organic material formed on Earth. Based on that standard, they concluded that 6-10% of the spectral signature they detected on Ceres could be explained by organic matter.
But for this the new study, Southwest Research Institute researcher Hannah Kaplan and co-authors wanted to re-examine those data using a different standard. Instead of relying on Earth rocks to interpret the data, they turned to an extraterrestrial source: meteorites. Some meteorites have been shown to contain organic material that's slightly different from what's commonly found on our own planet. And the new analysis shows that the spectral reflectance of the extraterrestrial organics is distinct from that of terrestrial counterparts. [...] "We estimate that as much as 40-50% of the spectral signal we see on Ceres is explained by organics. That's a huge difference compared to the 6-10% previously reported based on terrestrial organic compounds."
[...] There are two competing possibilities for where Ceres' organics may have come from. They could have been produced internally on Ceres and then exposed on the surface, or they could have been delivered to the surface by an impact from an organic-rich comet or asteroid.
Previously: Organic Molecules Found on Ceres
Somehow, walking robots at our level never really seem to deliver on the promise that should be delivered by all those legs. Articulation using hobby servos is simple enough to achieve, but cumbersome, slow, and not very powerful. [Paul Gould] has a plan to make a better, 3D-printed articulated robot actuator.
His solution is both novel and elegant, a fairly conventional arm geometry that has at its joints a set of brushless motors similar to but a little larger than the kind you might be more familiar with on multirotors, paired with 3D-printed cycloidal gearboxes. Magnetic encoders provide the necessary positional feedback, and the result is a unit that is both compact and powerful.
With such a range of small brushless motor controllers on the market, its at first sight unexpected that hes designed his own controller board. But this gives him complete control over his software, plus the CAN bus that ties everything together. Hes given us a video which weve placed below the break, showing the build process, the impressive capabilities of his system, and a selection of builds including a robot dog complete with tail. This is definitely a project to watch.
The Chandra X-Ray Observatory is a NASA telescope that looks at black holes, quasars, supernovas, and the like all sources of high energy in the universe. It shows a side of the cosmos that is invisible to the human eye.
After more than a decade in service, the observatory has helped scientists glimpse the universe in action. It has watched galaxies collide, observed a black hole with cosmic hurricane winds, and glimpsed a supernova turning itself inside out after an explosion.
The telescope billed as one of NASAs Great Observatories along with the Hubble Space Telescope, Spitzer Space Telescope and the Compton Gamma Ray Observatory has been a public relations tool for the agency, as well. Its pictures are frequently used by NASA in press releases.
deepin is a Debian-based Linux distribution which strives to provide an attractive and user-friendly experience via the Deepin Desktop Environment (DDE). The project's latest release, deepin 15.6, features a new welcome window and a quick settings navigation bar. There is also a new launcher window, designed to use....
The newest weekly release candidate of the upcoming FreeBSD 11.2 is now available for testing...
Submitted via IRC for BoyceMagooglyMonkey
Replacing potatoes or rice with pulses can lower your blood glucose levels by more than 20 per cent, according to a first-ever University of Guelph study.
Prof. Alison Duncan, Department of Human Health and Nutritional Sciences, and Dan Ramdath of Agriculture and Agri-Food Canada, found that swapping out half of a portion of these starchy side dishes for lentils can significantly improve your body's response to the carbohydrates.
Replacing half a serving of rice with lentils caused blood glucose to drop by up to 20 per cent. Replacing potatoes with lentils led to a 35-per-cent drop.
"Pulses are extremely nutrient-dense food that have the potential to reduce chronic diseases associated with mismanaged glucose levels," said Duncan, who worked on the study with PhD student Dita Moravek and M.Sc. students Erica Rogers, Sarah Turkstra and Jessica Wilson.
Dita Moravek, Alison M Duncan, Laura B VanderSluis, Sarah J Turkstra, Erica J Rogers, Jessica M Wilson, Aileen Hawke, D Dan Ramdath. Carbohydrate Replacement of Rice or Potato with Lentils Reduces the Postprandial Glycemic Response in Healthy Adults in an Acute, Randomized, Crossover Trial. The Journal of Nutrition, 2018; 148 (4): 535 DOI: 10.1093/jn/nxy018
Read more of this story at SoylentNews.
Via: WGN: The strangeness of the largest migrant childrens center in the United States, near the border with Mexico, shows up in the details. Here, there are 1,469 boys, ages 10 to 17, housed inside the 250,000-square-foot shell of a former Walmart superstore. None of the 313 bedrooms have doors. Or ceilings, so that children 
Assisted by police in France and the Netherlands, the FBI took down the pirate Android stores Appbucket, Applanet, and SnappzMarket during the summer of 2012.
During the years that followed several people connected to the Android app sites were arrested and indicted, resulting in prison sentences for some.
SnappzMarkets Scott Walton was handed a 46-month prison sentence for conspiracy to commit copyright infringement, and his colleague Joshua Taylor was sentenced to a 16-month term.
While some defendants pleaded guilty in order to get a reduced sentence, not all did. David Lee, a California man linked to Applanet, decided to fight the case instead, and not without success.
The US Government had charged Lee with aiding and abetting criminal copyright infringement (pdf). In addition, he was charged with conspiring to infringe copyrights and violating the DMCAs anti-circumvention provision.
As the case progressed, it became clear that the U.S. Governments evidence wasnt as strong as initially thought. Before the trial even started, the prosecution voluntarily dropped the criminal copyright infringement charge.
What remained was the conspiracy charge, but after hearing evidence and testimony from both sides of the case, the jury was unable to issue a unanimous decision. As a result, the case ended in a mistrial two years ago.
The Department of Justice did not let the case go though. Soon after the mistrial, it informed the court that it would re-try Lee. This second trial was delayed a few times but never took place.
Instead, the US Government asked the court to dismiss the indictment against the alleged pirate app store operator, without providing any context. This request was granted earlier this week, which means that Lee is relieved of all charges.
It is not clear what moved the US to dismiss the case. TorrentFreak contacted both Lees lawyers and the US Department of Justice for comment, but at the time of publication, we have yet to hear back.
However, with the indictment dismissed, Lee can close this chapter of his life after nearly six years.
Horizontal gene transfer is an important way that antibiotic resistance moves between bacterial species, but the process has never been observed before, since the structures involved are so incredibly small, said biologist Ankur Dalia of Indiana University Bloomington.
Bacteria are slippery little suckers. They evolve rapidly, developing resistance to antibiotics and therefore becoming increasingly difficult to deal with. Now, for the first time, researchers have caught on film one of the mechanisms the microbes use for this speedy evolution.
Two Vibrio cholerae bacteria the pathogen responsible for cholera sit under a microscope, glowing a vivid green. As we watch, a tendril snakes forth from one of the bacterium, harpooning a piece of DNA and carrying it back to its body.
That appendage is called a pili, and the process whereby the bacteria incorporates the new genetic material from a different organism into its own DNA to expedite its evolution is called horizontal gene transfer.
[Peter] is at it again. Not content with being one of the best RC confabulators on YouTube, and certainly not content with the first airplane he built in his basement, [Peter Sripol] is building another airplane in his basement.
The first airplane he built was documented on YouTube over a month and a half. It was an all-electric biplane, built from insulation foam covered in fiberglass, and powered by a pair of ludicrously oversized motors usually meant for large-scale RC aircraft. This was built under Part 103 regulations an ultralight which means there were in effect no regulations. Anyone could climb inside one of these without a license and fly it. The plane flew, but there were a few problems. It was too fast, and the battery life wasnt really what [Peter] wanted.
Now [Peter] is onto his next adventure. Compared to the previous plane, this has a more simplified,...
Pebble's online services will officially die at the end of this month, but some could live on through Rebble, an unofficial group of Pebble users who are trying to keep their watches alive.
Rebble initially popped up after Pebble said in 2016 that it would cease operations and be acquired by Fitbit. Now that Fitbit is weeks away from shutting down Pebble's remaining services, Rebble is promoting an unofficial replacement system that's meant to keep the majority of Pebble's internet-connected functions alive. Former Pebble employee Katharine Berry is spearheading the effort, and it's received an endorsement from Pebble founder Eric Migicovsky.
Also at Engadget.
Previously: Pebble Dead, Assets Sold to Fitbit
Read more of this story at SoylentNews.
In March this year I spoke about the Amateur VLBI with LilacSat-2 experiment. This experiment consisted of a GPS-synchronized recording of LilacSat-2 at groundstations in Harbin and Chongqing, China, which are 2500km apart. The experiment was a preparation for the Amateur VLBI project with the DSLWP lunar orbiting satellites, and I contributed with some signal processing techniques for VLBI.
As you may know, the DSLWP-B satellite is now orbiting the Moon since May 25 and the first Amateur VLBI session was performed last Sunday. The groundstations at Shahe in Beijing, China, and Dwingeloo in the Netherlands performed a GPS-synchronized recording of the 70cm signals from DSLWP-B from 04:20 to 5:40 UTC on 2018-06-10. I have adapted my VLBI correlation algorithms and processed these recordings. Here are my first results.
The baseline for these VLBI recordings (i.e., the distance between the groundstations) is roughly 7250km. The signals transmitted by DSLWP-B are 250bps GMSK using an \(r=1/2\) turbo code. Two transmit frequencies are used: 435.4MHz and 436.4MHz. Each transmit frequency uses a different antenna. The antenna marked below as UV Antenna A is used for 435.4MHz, while the UV Antenna B is used for 436.4MHz.DSLWP diagram
The transmissions are done in packets. A packet lasts about 15 seconds and is transmitted roughly every 5 minutes. Packets are transmitted simultaneously in both frequencies, but the data transmitted in each of the frequencies is different.
The format of the recordings is as follows. Each recording is 20
seconds long (or 19 seconds in some cases) and contains a single
packet. It is formed by two files, one for 435.4MHz and the other
for 436.4MHz. Each of these files is an IQ file at 40ksps centred
at 435.4MHz or 436.4MHz. The format of the files is the GNURadio
metadata format. The file metadata can be read with
gr_read_file_metadata and contains the UTC timestamps
for the IQ stream. These timest...
This video is the ninth in a multi-part series discussing computing and the second discussing non-classical computing. In this video, well be discussing what quantum computing is, how it works and the impact it will have on the field of computing.
[0:286:14] Starting off well discuss, what quantum computing is, more specifically the basics of quantum mechanics and how quantum algorithms will run on quantum computers.
[6:149:42] Following that well look at, the impact quantum computing will bring over classical computers in terms of the P vs NP problem and optimization problems and how this is correlated with AI.
[9:4214:00] To conclude well discuss, current quantum computing initiatives to reach quantum supremacy and ways you can access the power of quantum computers now!
Today, we want to draw your attention to an open-access review that focuses on the role of senescent cells in sarcopenia, the age-related loss of muscle mass and strength that leads to frailty.
Arthur T Knackerbracket has found the following story:
Storm-driven ocean swells have triggered the catastrophic disintegration of Antarctic ice shelves in recent decades, according to new research published in Nature today.
Lead author Dr Rob Massom, of the Australian Antarctic Division and the Antarctic Climate and Ecosystems Cooperative Research Centre, said that reduced sea ice coverage since the late 1980s led to increased exposure of ice shelves on the Antarctic Peninsula to ocean swells, causing them to flex and break. "Sea ice acts as a protective buffer to ice shelves, by dampening destructive ocean swells before they reach the ice shelf edge," Dr Massom said. "But where there is loss of sea ice, storm-generated ocean swells can easily reach the exposed ice shelf, causing the first few kilometres of its outer margin to flex."
"Over time, this flexing enlarges pre-existing fractures until long thin 'sliver' icebergs break away or 'calve' from the shelf front. This is like the 'straw that broke the camel's back', triggering the runaway collapse of large areas of ice shelves weakened by pre-existing fracturing and decades of surface flooding."
Study co-author Dr Luke Bennetts, from the University of Adelaide's School of Mathematical Sciences, said the finding highlights the need for sea ice and ocean waves to be included in ice sheet modelling. This will allow scientists to more accurately forecast the fate of the remaining ice shelves and better predict the contribution of Antarctica's ice sheet to sea level rise, as climate changes. "The contribution of the Antarctic Ice Sheet is currently the greatest source of uncertainty in projections of global mean sea level rise," Dr Bennetts said.
-- submitted from IRC
Read more of this story at SoylentNews.
Anyone who has ever wound a coil by hand has probably idly wondered How do they do this with a machine? at some point in the tedious process. Thats about when your attention wanders and the wire does what physics wants it to do, with the rats nest and cursing as a predictable result.
Theres got to be a better way, and [Russ Gries] is on his way to finding it with this proof-of-concept CNC flat coil winder. The video below is a brief overview of what came out of an intensive rapid prototyping session. [Russ] originally thought that moving the coil would be the way to go, but a friend put him onto the idea of using his delta-style 3D-printer to dispense the wire. An attachment somewhat like a drag knife was built, but with a wire feed tube and a metal roller to press the wire down onto an adhesive surface. The wire feed assembly went through a few design iterations before he discovered that a silicone cover was needed for the roller for the wire to properly track, and that the wire spool needed to be fed with as little friction as possible. Fusion 360s CAM features were used to design the tool paths that describe the coils. It seems quite effective, and watching it lay down neat lines of magnet wire is pretty mesmerizing.
Weve seen a couple of cylindrical coil winding rigs before, but it looks like this is the first flat coil winder weve featured. We cant help but wonder about the applications. Wireless power transfer comes to mind, as do antennas and coils for RF applications. We also wonder if there are ways to use this to make printed circuit boards.
Thanks to [smerrett79] for the tip.
With the recent stable debut of the Linux 4.17 kernel, one of the most common performance test requests coming in has been for checking out the Radeon WattMan-like support that was introduced with the Linux 4.17 AMDGPU code for recent generations of Radeon graphics card. Here are some benchmarks of that and on a somewhat related note also some Linux gaming benchmark results when carrying out some power capping tests to restrict the graphics card to a given Wattage...
David Eagleman, the science adviser for HBOs TV series Westworld, shares his thoughts on the future of AI and whether robots will ever become conscious.
Another success of the Europol made the headlines, the European police announced that several French nationals were arrested in the past year on suspicion of being involved with notorious hacker group known as Rex Mundi (King of the World).
The Rex Mundi crime group has been active since at least 2012. it hacked into the systems of several organizations worldwide and attempted to blackmail them.
The list of the victims is long and includes AmeriCash Advance, Webassur, Drake International, Buy Way, Hoststar, Websolutions.it, Numericable, Habeas, AlfaNet, Dominos Pizza, and the Swiss bank Banque Cantonale de Geneve (BCGE).
The hackers used to steal sensitive information from the victims, then they demanded fees for not disclosing the stolen data.
The operation coordinated by the Europol was launched in May 2017 after the group targeted a UK-based company. Crooks stole significant amounts of customer data from the company, then attempted to blackmail it by demanding the payment of a bitcoin ransom of nearly 580,000 ($670,000) for not disclosing the incident. The group also requested more than 825,000 ($776,000) for details on the hack.
The hackers also asked the victim additional 210,000 ($240,000) for each day the payment was delayed.
A 25-year-old coder was arrested on 18 May by the Royal Thai Police based on a French international arrest warrant. The arrest of this young cybercriminal was the eight in an international operation supported by Europol and the Joint Cybercrime Action Taskforce (J-CAT) that started exactly one year ago. reads the announcement published by the Europol.
In May 2017 a British-based company was the victim of a cyber-attack during which a large amount of customer data was compromised. The a...
Quantum computers, once they become common, will complete difficult tasks thousands of times more quickly than current PCs. That could obviously threaten a classic chipmaker like Intel, but it plans to use its knowledge of silicon production to build quantum chips more quickly than its peers.
A few months ago, during my keynote at Black Hat Europe, I was discussing how we should be limiting the amount of trust when building computer systems. Recently, a new technology from Intel has been gaining popularity among both developers and researchers, a technology which promises a big step towards such trust-minimizing systems. I'm talking about Intel SGX, of course.
Intel SGX caught my attention for the first time about 5 years ago, a little while before Intel has officially added information about it to the official Software Developer's Manual. I've written two posts about my thoughts on this (then-upcoming) technology, which were a superposition of both positive and negative feelings.
Over the last 2 years or so, together with my team at ITL, we've been investigating this fascinating technology a bit closer. Today I'd like to share some introductory information on this interesting project we've been working on together with our friends at Golem for several months now.
Read more of this story at SoylentNews.
There has been a lot of back and forth around the use of Free Software in public administration. One of the latest initiatives in this area was started by the Free Software Foundation Europe, FSFE. It focuses on the slogan: Public Money Public Code. There are various usage scenarios for Free Software in public administration. The span ranges from the use of backend technology over user-facing software, e.g. LibreOffice, up to providing a whole free desktop for the administrative staff in a public service entity such as a city council. In this article we will focus on the latter.
When the desktops in an administration are migrated to Linux, the administration becomes a distribution provider. An example for this is the LiMux desktop, that powers the administration of the city of Munich since 2012.
LiMux is a distribution, maintained by the central IT department of the City of Munich. Technically, it builds upon Kubuntu. It provides specific patches, a modified user experience and an automatic distribution system, so all desktops in all departments of the city can be easily administered and offer a consistent user experience.
Distributions in the Free Software ecosystem have different roles, one of them surely being the provider of the finishing touches, especially to important software for its own users. Obviously public administration has spec...
Manual transmissions! Those blessed things that car enthusiasts swear by and everyone else pretends no longer exists. Theyre usually shifted by using the gearstick, mounted in the centre console of the car. Swapping out the knob on the gearstick is a popular customization; you can have everything from 8-balls to skulls, to redback spiders mounted in epoxy, sitting proud atop your gearstick. Its rare to see anything new under the sun, but [John Allwine] came up with something wed never seen before.
[John]s design leans heavily on the unique ability of additive manufacturing to produce complex hollow geometries that are incredibly difficult or impossible to produce with traditional subtractive methods. The part was designed in CAD software, and originally printed on a Makerbot in plastic. After this broke, it was decided to instead produce the part in stainless steel using Shapeways custom order process. You can even buy one yourself. This is a much smarter choice for a part such as a gearknob which undergoes heavy use in an automotive application. The part is printed with threads, but due to the imperfect printing process, these should be chased with a proper tap to ensure good fitment.
The design was eyecatching enough to grab the attention of a professional engineer from a 3D printing company, who worked with [John] to make the part out of titanium. Its a very tough and hardy material, though [John] notes it was an arduous task to go about tapping the threads because of this.
Its a great example of what can now be achieved with 3D printing technology. No longer must we settle for plastic through services like Shapeways, its now possible to 3D print attractive metal parts in complex designs! And, if youve got the right friends, you can even step it up to titanium, too.
Posted by Marcus Brinkmann on Jun 16Hi,
The Fedora Engineering and Steering Committee (FESCo) approved on Friday more of the proposed features for this fall's release of Fedora 29, including two of the more controversial proposals...
Via: The Local: Swedens 22,000 volunteer soldiers were on Tuesday evening grabbing their guns and uniform, cancelling social engagements, and rushing to their stations, as the Swedish Armed Forces launched its biggest surprise exercise since 1975. The idea behind this exercise is that we are now strengthening our military defence of the country, Swedens Supreme 
The Syscoin clients allow users to mine Syscoin cryptocurrency or manage Syscoin funds.
The other versions in the v18.104.22.168 release were not replaced, this means that Mac and Linux clients were not replaced by the hackers.
The Syscoin developers found that a malicious, unsigned copy of the Windows Syscoin 22.214.171.124 installer was made available via the Syscoin Github release page on June 9th, 2018 due to a compromised GitHub account. This installer contained malicious code. (Trojan:Win32/Feury.B!cl) reads the security notice published by the development team.
The virustotal scan of the malicious file named re.exe that is saved to the local temp folder (C:\Users\user\AppData\Local\Temp) upon running the fake installer: https://www.virustotal.com/#/file/b105d2db66865200d1b235c931026bf44428eb7327393bf76fdd4e96f1c622a1/detection
The Syscoin team discovered the security breach after receiving a warning from users that Windows Defender SmartScreen, AVG and Kaspersky was marking downloads of the Syscoin Windows client as a virus.
The affected executabl...
Oracle Solaris 11.4 is still being prepared for release but in the meantime there is now the thirty-third stable release update for Solaris 11.3...
Yet even the U.S. is disturbingly vulnerableand in some respects is becoming quickly more so. It depends on a just-in-time medical economy, in which stockpiles are limited and even key items are made to order. Most of the intravenous bags used in the country are manufactured in Puerto Rico, so when Hurricane Maria devastated the island last September, the bags fell in short supply. Some hospitals were forced to inject saline with syringesand so syringe supplies started running low too. The most common lifesaving drugs all depend on long supply chains that include India and Chinachains that would likely break in a severe pandemic. Each year, the system gets leaner and leaner, says Michael Osterholm, the director of the Center for Infectious Disease Research and Policy at the University of Minnesota. It doesnt take much of a hiccup anymore to challenge it.
The epidemics of the early 21st century revealed a world unprepared, even as the risks continue to multiply. Much worse is coming.
Image above: Workers at the University of Nebraska Medical Centers biocontainment unit practicing safe procedure on a mannequin.
Two soylentils have submitted stories about improvements in lithium battery storage capacity. The first focuses on the cathode while the second features improvements in the anode.
Submitted via IRC for BoyceMagooglyMonkey
A collaboration led by scientists at the University of Maryland (UMD), the U.S. Department of Energy's (DOE) Brookhaven National Laboratory, and the U.S. Army Research Lab have developed and studied a new cathode material that could triple the energy density of lithium-ion battery electrodes. Their research was published on June 13 in Nature Communications.
"Lithium-ion batteries consist of an anode and a cathode," said Xiulin Fan, a scientist at UMD and one of the lead authors of the paper. "Compared to the large capacity of the commercial graphite anodes used in lithium-ion batteries, the capacity of the cathodes is far more limited. Cathode materials are always the bottleneck for further improving the energy density of lithium-ion batteries."
Scientists at UMD synthesized a new cathode material, a modified and engineered form of iron trifluoride (FeF3), which is composed of cost-effective and environmentally benign elementsiron and fluorine. Researchers have been interested in using chemical compounds like FeF3 in lithium-ion batteries because they offer inherently higher capacities than traditional cathode materials.
Read more of this story at SoylentNews.
KANSAS CITY, MO Researchers at the Stowers Institute for Medical Research have captured the one cell that is capable of regenerating an entire organism. For over a century, scientists have witnessed the effects of this cellular marvel, which enables creatures such as the planarian flatworm to perform death-defying feats like regrowing a severed head. But until recently, they lacked the tools necessary to target and track this cell, so they could watch it in action and discover its secrets.
Now, by pioneering a technique that combines genomics, single-cell analysis, flow cytometry and imaging, scientists have isolated this amazing regenerative cell a subtype of the long-studied adult pluripotent stem cell before it performs its remarkable act. The findings, published in the June 14, 2018, issue of the journal Cell, will likely propel biological studies on highly regenerative organisms like planarians and also inform regenerative medicine efforts for other organisms like humans that have less regenerative capacity.
This is the first time that an adult pluripotent stem cell has been isolated prospectively, says Alejandro Snchez Alvarado, Ph.D., an investigator at the Stowers Institute and Howard Hughes Medical Institute and senior author of the study. Our finding essentially says that this is no longer an abstraction, that there truly is a cellular entity that can restore regenerative capacities to animals that have lost it and that such entity can now be purified alive and studied in detail.
Researchers at F5 Labs have observed a spike in the number of cyber-attacks targeting Singapore from June 11 to June 12, in the wake of the meeting between U.S. President Donald Trump and North Korean President Kim Jong-un in a Singapore hotel.
Experts remarked that typically Singapore is not a top attack destination, and the skipe of the number of attacks coincides with Trump-Kim Jong-un meeting.
Most of the attacks originated from Russia (88% of overall attacks) and frankly speaking, Im not surprised due to the importance of the Trump-Kim summit.
According to F5 Labs and Loryka, 97% of all the attacks that originated from Russian from June 11 to June 12 targeted Singapore.
From June 11 to June 12, 2018, F5 Labs, in concert with our data partner, Loryka, found that cyber-attacks targeting Singapore skyrocketed, 88% of which originated from Russia. Whats more, 97% of all attacks coming from Russia during this time period targeted Singapore. reads the analysis published by F5 Labs. We cannot prove they were nation-state sponsored attacks, however the attacks coincide with the day President Donald Trump met with North Korean President Kim Jong-un in a Singapore hotel.
The cyber attacks hit almost any computer system, from VoIP phones to IoT devices. The attacks began out of Brazil targeting port SIP 5060 of IP phones where communications are transmitted in clear text.
After an initial attack that lasted for a couple of hours, researchers observed a reconnaissance activity originated from the Russian IP address 126.96.36.199 that is owned by ASN 49505, operated by Selectel; the scans targeted a variety of ports.
None of the attacks was carried out to spread malware.
The number two attacked port was Telnet, consistent with IoT device attacks that could be leveraged to gain access to or listen in on targets of interest. continues the analysis.
Other ports attacked include the SQL database port 1433, web traffic ports 81 and 8080, port 7541, which was used by Mirai and Annie to target ISP-managed routers, and port 8291, which was targeted by Hajime to PDoS MikroTik routers.
Singapore was hit by 40,000 attacks in just 21 hours, starting at 11:00 p.m. on June 11 through 8:00 p.m. June 12, local time.
The experts highlighted that only 8% were exploit attacks, while 92% were reconnaissance scans for potential targets.
34% of t...
[Charlie Morris] has been busy building a portable ham radio rig and documenting his progress in a series of videos. You can see the first one below. Theres four parts (more if you count things like part 4 and part 4a as two parts) so far and it is always interesting to see inside a build like this, where the choices and tradeoffs are explained.
The first part covers the Si5351 VFO and the associated display. Theres very little to the VFO other than off-the-shelf modules including an Arduino. You can also see the portable Morse code key which is actually a micro switch. The second part experiments with audio amplifiers. [Charlie] looked at the NE5534 vs discrete amplifiers. He was shooting for lowest current draw that was usable. Other parts discuss the RF amplifier and the receiver. Despite the VFO, there is quite a bit of non-module parts by the time things start shaping up.
Theres a lot of good information about why he selected particular devices and component values. Theres doubtless more videos to come, but theres enough there now to get started. You can not only pick up some design ideas, but looking at the neat prototype construction can give you some thoughts too.
We arent sure what the final project will look like, but we are sure it will be interesting to follow along. [Charlie] has done other homebrew radio design videos and they are always educational.
Two weeks back we shared the news that one of Intel's open-source Linux graphics driver veterans decided to change roles and is now focused on improving FreeBSD for Intel hardware. Ben Widawsky is working on FreeBSD improvements that can at least relate to Intel and it turns out the company has a new team of developers on the task...
Ask just about anybody, and you'll probably hear that a healthy diet is one full of fruits and vegetables, olive oil, nuts and fish what's called Mediterranean diet. A lot of research has suggested people who eat this way tend to be healthier, but it's been harder to prove whether that is because of the diet or some other factor. So in 2013, many took notice of a study in the New England Journal of Medicine that seemed to provide some proof. The study found that people eating the Mediterranean diet supplemented with olive oil were 30 percent less likely to experience a heart attack, stroke, or death from cardiovascular causes than people assigned to a low-fat diet. People who stuck with a Mediterranean diet supplemented with mixed nuts had a 28 percent lower risk than those asked to follow a low-fat diet.
Anesthesiologist Dr. John Carlisle published an analysis of clinical studies in 2012 that led to the retraction of over 160 papers by Dr. Yoshitaka Fujii due to improper randomization of study participants. He began applying his method to thousands of other studies, including 934 in the New England Journal of Medicine. He flagged 11 of them, including the 2013 Mediterranean diet paper. The lead author of the paper confirmed that there were problems with randomization in the study:
It turns out...
As a result, much blame is laid at the feet of companies like Google, who are regularly blamed for not doing more to tackle infringements carried out by individuals and entities outside of their control.
Search results are a particularly sticky subject. Google, Bing, and Yahoo, for example, wish to provide the most comprehensive indexes possible. On the flip side, entertainment industry companies insist that those indexes shouldnt help people find pirated content. If they do, its argued that these companies act as piracy facilitators.
This familiar battle is now underway in Russia, where Yandex is in receipt of a strongly-worded letter which accuses the search giant of being a big part of the piracy problem.
According to local publication Vedomosti, the letter is signed by Leonid Agronov, general director of the National Federation of the Music Industry, Alexei Byrdin, general director of the Internet Video Association, Sergei Selyanov, director of the Association of Film and Television Producers, and Pavel Stepanov, president of the Media Communication Union.
The entertainment giants explain that due to pirate search results appearing in its indexes, Yandex is contributing to the growth of online piracy. They want the company to show responsibility by adopting measures to both find and remove infringing links from search and related products.
We urge Yandex to use all available methods to detect illegal content and eliminate it both from search results and from the applications and services of Yandex, the letter reads.
Its suggested that Yandex should take a similar path to that taken by search companies in the UK, via the signing of a Memorandum of Understanding which declares common interests in fighting piracy.
Yandex wont be alone, however.
A spokesman for the Media and Communications Union, which is one of the groups behind the letter, told Vedomosti that a similar letter would be sent to Google in the near future. Needless to say, Google is no stranger to these kinds of allegations, whether in Europe or the United States.
In the letter, search engines like Yandex are accused of promoting illegal resources over legal content, resulting in revenue being siphoned away from legitimate players and into the hands of criminals. The search engine is a...
With regard to any application that claims to provide privacy: The simple fact is that the platforms on which it runs are compromised from the operating systems down to the silicon. Im not saying to not encrypt. Encryption can prevent your data from falling into the hands of thieves, Google and maybe the local police. 
On May 20, China launched Queqiao, a lunar communications relay satellite for the upcoming Change 4 lander and rover mission. On the way out to the Moon, it dropped off a pair of small satellites bound for lunar orbit called Longjiang-1 and Longjiang-2. The satellites weigh just 45 kilograms each and measure 50-by-50-by-40 centimeters. Their purpose is testing out future radio astronomy and interferometry techniques, and one also has a camera built by Saudi Arabia.
Unfortunately, Longjiang-1 had a problem and didnt make it into lunar orbit. Longjiang-2, however, was successful, and sent home a few pictures! Check them out:
GNOME's Mutter Wayland compositor support is among the few Wayland implementations offering support for EGLStreams so it can play along with the approach used by the NVIDIA proprietary driver as an alternative to the GBM API used by the open-source graphics drivers. One of the NVIDIA engineers has just furthered along Mutter's EGLStreams support...
A surprising use of 3D printing has been in creating life-like models of human body parts using MRI or CT scans. Surgeons and other medical professionals can use models to plan procedures or assist in research. However, there has been a problem. The body is a messy complex thing and there is a lot of data that comes out of a typical scan. Historically, someone had to manually identify structures on each slice a very time-consuming process or set a threshold value and hope for the best. A recent paper by a number of researchers around the globe shows how dithering scans can vastly improve results while also allowing for much faster processing times.
As an example, a traditional workflow to create a 3D printed foot model from scan data took over 30 hours to complete including a great deal of manual intervention. The new method produced a great model in less than an hour.
One thing the researchers note is that the technique should be easy to adopt since it uses all open source software and existing image processing algorithms. There are some limitations, though. There are several things that limit the resolution and can introduce inaccuracies. For example, MRI intensity versus actual tissue appearance is highly variable based on the scanning machines settings and operator.
The researchers also note that advances in scanning technology will make even better 3D printed models possible. Naturally though, these prints arent coming off a $150 hobby-grade printer. The Connex500 printer used costs a cool quarter of a million dollars. It can print up to 14 different materials in the same job and has a reasonably large build volume (500x400x200 mm). That price, however, doesnt include the water station to wash away support material, so budget accordingly.
We couldnt help but wonder if you will one day have a bad part of your body scanned, printed, and then youll get the new part to replace the old. It seems like if you have a model of a body part, it would be just a little math to print a perfect cast, brace, or splint, too. But, then again, we arent doctors.
Photo Credit: Steven Keating and Ahmed Hosny/Wyss Institute at Harvard University
Kim Bayley breaks down UK spending statistics to show that superfans buying old school physical media are providing for 15% of the UK's total retail music market, even when streaming is counted. She asserts that curtailing the availability of these physical storage media will damage not just retailers, but the overall health of the music industry itself. In doing so, she presents a strong economic case for why the music industry should treasure its vinyl and CD superfans.
Naturally it would have a clear financial cost: according to ERA's research those 157,000 vinyl Superfans spent between them 63m on vinyl in 2017, equivalent to more than half a million 525,000 premium music subscriptions.
In other words, lose a town's worth of vinyl buyers the size of Chelmsford and you need a city's worth of premium music subscribers the size of Manchester to make up the loss.
When it comes to CD, the impact is even greater. ERA's researches show that in 2017 an incredible 292,000 Britons spent 400 or more on the format. That's equivalent to buying a CD virtually every week.
Read more of this story at SoylentNews.
Via: The Verge: Today, President Trump announced an aggressive new set of tariffs against China, setting a 25 percent import tax on $50 billion worth of industrially significant technologies imported from China. In previous discussions, China has threatened to retaliate against such tariffs, stoking fears of a far-reaching and unpredictable trade war between the countries. 
Initial RISC-V architecture support was added to the Linux 4.15 kernel and in succeeding kernel releases have been mostly modest updates. With Linux 4.18 the RISC-V changes are on the small side still, but with a few notable additions for this open-source, royalty-free processor ISA...
New gTLDs are becoming less popular, as registrations have fallen precipitously over the last year. Verisign's recently released Q1 2018 Domain Name Industry Brief indicates that new gTLDs represent only 6%, or 20.2 million, of the total of registered TLDs.
The report indicates that active registrations of new gTLDs "decreased by approximately 5.3 million domain name registrations, or 20.7 percent, year over year." Of the top 10 most used new gTLDs, four were listed in Symantec's Top 20 list. Meanwhile, registrations overall increased by 3.2 million, year over year.
[...] Last year, a group of researchers at the Delft University of Technology and SIDN Labs in The Netherlands found (PDF link) that there are "higher concentrations of compromised domains in legacy gTLDs" but that "miscreants frequently choose to maliciously register domain names using one of the new gTLDs." The number of spam domains per 10,000 for new gTLDs was nearly 10 times that of standard gTLDs like .com. However, not all new gTLDs are a problem, as approximately one-third of new gTLDs had zero reported incidents of spam. But, according to the researchers, "Spamhaus blacklisted at least 10% of all 24 registered domains in as many as 15 new gTLDs at the end of 2016."
Read more of this story at SoylentNews.
When you saw the picture for this article, did you think of a peacocks feather? These fibers are not harvested from birds, and in fact, the colors come from transparent rubber. As with peacock feathers, they come from the way light reflects off layers of differing materials, this is known as optical interference, and it is the same effect seen on oil slicks. The benefit to using transparent rubber is that the final product is flexible and when drawn, the interference shifts. In short, they change color when stretched.
Most of the sensors we see and feature are electromechanical, which has the drawback that we cannot read them without some form of interface. Something like a microcontroller, gauge, or a slew of 555 timers. Reading a single strain gauge on a torque wrench is not too tricky, but simultaneously reading a dozen gauges spread across a more complex machine such as a quadcopter will probably require graphing software to generate a heat map. With this innovation it could now be done with an on-board camera in real-time. Couple that with machine learning and perhaps you could launch Skynet. Or build a better copter.
The current proof-of-concept weaves the fibers into next-generation bandages to give an intuitive sense of how tightly a dressing should be applied. For the average first-aid responder, the rule is being able to slide a finger between the fabric and skin. Thats an easy indicator, but it only works after the fact whereas saying that the dressing should be orange while wrapping gives constant feedback.
1 in 3 Adults In The U.S. Take Medications That Can Cause Depression. These drugs already list depression as a possible symptom:
If you take Prilosec or Zantac for acid reflux, a beta blocker for high blood pressure, or Xanax for anxiety, you may be increasing your risk of depression.
More than 200 common medications sold in the U.S. include depression as a potential side effect. Sometimes, the risk stems from taking several drugs at the same time. Now, a new study finds people who take these medicines are, in fact, more likely to be depressed.
The list includes a wide range of commonly taken medications. Among them are certain types of proton pump inhibitors (PPIs) (used to treat acid reflux), beta blockers, anxiety drugs, painkillers including ibuprofen, ACE inhibitors (used to treat high blood pressure), and anti-convulsant drugs.
I often take Zantac or Rantab for acid reflux. I used to take the beta blocker propanolol for the hand tremor caused by the anti-convulsant Depakote.
About 15 percent of participants who simultaneously used three or more of these drugs were depressed. By comparison, among participants who didn't use any of the medications, just 5 percent were depressed. Even those who used just one of these medications were at slightly higher risk of depression: About 7 percent were depressed.
Read more of this story at SoylentNews.
The IT security researchers at Kaspersky Lab have published a
This is a post from HackRead.com Read the original post: Chinese hackers attack National Data Center using watering hole attack
Submitted via IRC for Runaway1956
Facebook has consistently denied allegations that it listens to its users' conversations through their phone's microphone, but a new document suggests the tech giant has not ruled out doing so in the future.
Facebook users have been sharing circumstantial evidence for several years that suggests Facebook snoops on their private conversations in order to deliver more personalised ads. In April, US lawmakers finally brought the concerns to CEO Mark Zuckerberg in a hearing about data misuse on the firm's platform.
The social media firm released a 454-page document this week to follow up with questions posed to Mr Zuckerberg, after he was criticised for evading some of the most important ones.
[Editor's Note: the two response documents are 229 and 225 pages, respectively for a total of 454 pages.]
Read more of this story at SoylentNews.
New Mesa release manager Dylan Baker has issued the second point release of the Mesa 18.1 series...
If you work for a large company, you probably have test equipment that is routinely calibrated. Some companies have their own metrology labs and others send out to an external lab. In a garage lab, you are less likely to do calibrations and in our experience that isnt usually a problem. Still, it is nice to be able to do at least a sanity check on your gear. Also, if you buy old test gear and repair it, it would be nice to be able to check it, as well. [IMSAI guy] built his own little calibration setup, adding to it over the years, and he shares the details in a recent video, which you can see below.
The board started out simply as one voltage regulator and some 0.01% resistors. Over time, though, he added a few more bells and whistles. The setup isnt going to rival a NIST-traceable lab setup, but for your garage it is perfectly fine.
The regulators are really precision voltage reference ICs that are readily available, so they should be better than your old bench supply. However, we didnt think youd really want to slavishly copy this design, but the idea of having a single calibration kit on a board is something you can grow organically out of your junk box and hamfest finds.
Among the additions to the board are a precision oscillator module from an old GPS and a second voltage reference. The initial reference was a 10V device that is specified to have a maximum error at room temperature of +/- 0.05%. He might have wanted to put some diode protection on the device, though, since reverse wiring it destroyed it. On the plus side, it caused him to look to see if any new better devices.
So when he replaced the reference he also added an AD587 as a second 10V reference which is just as accurate and has an ability to trim the output (although he doesnt use that capability).
Of course, if you get obsessed with calibration, you might want to get a rubidium standard in fact, one shows up in the video. There are also a variety of precision resistors weve looked inside of in the past.
Researchers at the Stanford University School of Medicine have found a way to predict whether someone exposed to the flu virus is likely to become ill.
Purvesh Khatri, PhD, associate professor of medicine and of biomedical data science, and his team used a computational approach to pinpoint a blood-based genetic biomarker to determine an individual's susceptibility to the disease.
"We've been after this for about four years," Khatri said. "To our knowledge, it's the first biomarker that shows susceptibility to influenza, across multiple strains."
The biomarker is a gene called KLRD1, and it essentially acts as a proxy for the presence of a special type of immune cell that may be a key to stamping out nascent flu infection. Put simply: the more of this cell type found in a person's blood, the lower their flu susceptibility. The research even hints at new avenues for pursuing a broadly applicable flu vaccine.
A paper describing the work will be published online June 14 in Genome Medicine. Khatri is the senior author. Graduate student Erika Bongen is the lead author.
[...] Khatri said his findings could help health professionals understand who's at the highest risk for flu infection. "If, for example, there's a flu epidemic going on, and Tamiflu supplies are limited, this data could help identify who should be prophylactically treated first," Khatri said.
Khatri emphasizes that for now, the link between KLRD1 levels and influenza susceptibility is only an association. The next step, he said, is to find the mechanism.
Read more of this story at SoylentNews.
Founded around the turn of the last century, Soulseek is a small dinosaur in the file-sharing world.
Created by former Napster programmer Nir Arbel, the application swiftly turned into a tight community of music fans, which is still active today.
Over the years Soulseek operators Nir and Roz Arbel have seen other file-sharing tools come and go, but all this time they remained dedicated to their principles. Despite its name, Soulseek had long found its purpose.
While it kept a relatively low profile, Soulseek is not immune to the stigma that comes with being a file-sharing tool. In 2015, PayPal cut off its ability to collect donations, claiming that sharing tools required pre-approval, even though that policy didnt exist when it signed up.
Soulseek is not a profit-oriented platform but donations are welcomed. Without PayPal, this became a challenge, but luckily for the developers, the Electonic Frontier Foundation (EFF) was able to intervene.
February 2016 everything returned to normal when the PayPal account was restored, for a while at least. Earlier his year, PayPal apparently changed its mind and booted the application once again.
Soulseek operator Roz Arbel was told that the application violated the payment services acceptable use policy and that pre-approval was required for file-sharing tools. It was pretty much the same recycled argument from years before.
Faced with this deja-vu, Soulseek turned to EFF for help once again, but this time PayPal wouldnt budge.
PayPal made it clear that theyre not willing to offer Soulseek financial services any longer. The company did give the Arbels access to their funds and tax documentation, after a request from EFF, the digital rights group writes.
EFF asked whether PayPals latest ban was linked to a concrete copyright complaint, but the payment processor didnt provide any further information. It just confirmed that Soulseek was banned, apparently for good.
Elizabeth Holmes, the founder of the embattled health startup Theranos, on Friday was charged in federal court with wire fraud with prosecutors alleging that the company was a multi-million dollar scheme to defraud investors.Holmes and Ramesh ...
Summary: Sidestepping the existential crisis of the EPO (running out of work and issuing many questionable patents with expectation of impending layoffs), the PR people at the Office choose a facts-denying, face-saving damage control strategy while staff speaks out, wholeheartedly agreeing with concerned stakeholders
THE WORLDS patent offices/systems, with the exception of Chinas (SIPO), are doing reasonably OK. The USPTO is nowadays in the process of improving patent quality and we commend US courts for that, notably SCOTUS and the Federal Circuit below it.
The EPO isnt just above the law; it actively exploits that to break the law, so it has no credibility talking about courts.The EPO, by contrast, is quite a monster. The EPO repeatedly disobeyed court orders. Corruption at the EPO is just outstanding, not to mention violations of the law, constitutions, and the EPC. The EPO isnt just above the law; it actively exploits that to break the law, so it has no credibility talking about courts. It seems incapable of grasping the notion of justice. It also assaulted a judge, who is now rumoured to be hospitalised. Several hours ago the EPO wrote: Next week we’...
A preclinical trial demonstrated that gene therapy could dissolve the nerve-blocking scars that form after spinal cord damage in lab rats.
Mozilla may be working on a voice-controlled platform of its own. A listing for an all-hands internal meeting appeared about what seems like a new project: Scout. "With the Scout app, we start to explore browsing and consuming content with voice," it read. It's very unclear what the platform may or may not end up doing, as the meeting is focused on technical requirements for a "voice browser" that would, as a stated example, be able to read users an article about polar bears.
[...] CNET interpreted Scout to be a new voice-controlled web browser. With Google, Apple, Amazon and Microsoft falling over themselves refining their voice assistant technology (with Facebook not far behind), it's unsurprising that Mozilla would join the fray. Given the company's decades of web platform experience, a browser is surely simpler to implement than a new proprietary speaker. Plus, vocal navigation through a browser setup is probably easier for the average person to grasp.
So that's why they needed Common Voice.
Read more of this story at SoylentNews.
Security experts at Trend Micro have spotted a new attack relying on weaponized Word documents and PowerShell scripts that appears related to the MuddyWater cyber-espionage campaign.
The first MuddyWater campaign was observed in late 2017, then researchers from Palo Alto Networks were investigating a mysterious wave of attacks in the Middle East.
The experts called the campaign MuddyWater due to the confusion in attributing these attacks that took place between February and October 2017 targeting entities in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date.
Threat actors used PowerShell-based first stage backdoor named POWERSTATS, across the time the hackers changed tools and techniques.
In March 2018, experts at FireEye uncovered a massive phishing campaign conducted by TEMP.Zagros group (another name used by the experts to track the MuddyWater), targeting Asia and Middle East regions from January 2018 to March 2018.
Attackers used weaponized documents typically having geopolitical themes, such as documents purporting to be from the National Assembly of Pakistan or the Institute for Development and Research in Banking Technology.
The attacks have been mistakenly associated with the FIN7 group, when Palo Alto discovered the first campaign reported that a C&C server delivering the FIN7-linked DNSMessenger tool was involved in MuddyWater attacks as well.
The new campaign discovered by the experts presents many similarities with previous ones conducted by the same threat actor, attackers attempted to distribute a backdoor through weaponized Word documents that execute PowerShell scripts.
In May 2018, we found a new sample (Detected as W2KM_DLOADR.UHAOEEN) that may be related to this campaign. Like the previous campaigns, these samples again involve a Microsoft Word document embedded with a malicious macro that is capable of executing PowerShell (PS) scripts leading to a backdoor payload. reads the analysis published by Trend Micro.
One notable difference in the analyzed samples is that they do not...
As reported by the BBC, the United States is set to impose a 25% tariff on over 800 categories of Chinese goods. The tariffs are due to come into effect in three weeks, on July 6th. Thousands of different products are covered under this new tariff, and by every account, electronic designers will be hit hard. Your BOM cost just increased by 25%.
The reason for this tariff is laid out in a report (PDF) from the Office of the United States Trade Representative. In short, this tariff is retaliation for the Chinese government subsidizing businesses to steal market share and as punishment for stealing IP. As for what products will now receive the 25% tariff, a partial list is available here (PDF). The most interesting product, by far, is nuclear reactors. This is a very specific list; one line item is, multiphase AC motors, with an output exceeding 746 Watts but not exceeding 750 Watts.
Of importance to Hackaday readers is the list of electronic components covered by the new tariff. Tantalum capacitors are covered, as are ceramic caps. Metal oxide resistors are covered. LEDs, integrated circuits including processors, controllers, and memories, and printed circuit assemblies are covered under this tariff. In short, nearly every bit that goes into anything electronic is covered.
This will hurt all electronics manufacturers in the United States. For a quick example, Im working on a project using half a million LEDs. I bought these LEDs (120 reels) two months ago for a few thousand dollars. This was a fantastic buy; half a million of the cheapest LEDs I could find on Mouser would cost seventeen thousand dollars. Sourcing from China saved thousands, and if I were to do this again, I may be hit with a 25% tariff. Of course; the price on the parts from Mouser will also go up Kingbright LEDs are also made in China. Right now, I have $3000 worth of ESP-12e modules sitting on my desk. If I bought these three weeks from now, these reels of WiFi modules would cost $3750.
There are stories of a few low-volume manufacturers based in the United States getting around customs and import duties. One of these stories involves the inexplicable use of the boxes Beats headphones come in. But (proper) electronics manufacturing isnt usually done by simply throwing money at random people in China or committing customs fraud. These tariffs will hit US-based electronics manufacturers hard, and the margins on electronics may not be high enough to absorb a 25% increase in the cost of materials.
Posted by Anthony Liguori on Jun 15Alan Coopersmith writes:
In a joint operation, the FBI (Federal Bureau of Investigation),
This is a post from HackRead.com Read the original post: 74 arrested after FBI disrupts International gang of BEC scammers
Posted by Alan Coopersmith on Jun 15Did the attachment get lost on the way to the list? I didn't see any.
Some worms that inhabit lakes and rivers are capable of almost limitless regeneration.
The ability of planarian flatworms to regrow severed heads and other body parts has been known for over a century, but new techniques have allowed a research team to discover how they do it.
From a single building block known as an adult pluripotent stem cells, an entire worm can be rebuilt.
Hillicon Valley: Trump hits China with massive tech tariffs | Facebook meets with GOP leaders over bias allegations | Judge sends Manafort to jail ahead of trial | AT&T completes Time Warner purchase "IndyWatch Feed Tech"
The Cyber and Tech overnights have joined forces to give you Hillicon Valley, The Hill's new comprehensive newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team,...
Your weekly selection of awesome robot videos Photo: Festo
Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; heres what we have so far (send us your events!):
Let us know if you have suggestions for next week, and enjoy todays videos.
Kuka, who has a near monopoly on industrial robots that are painted orange, is now getting into consumer robots. Or, theyre thinking about it, at least.
Our i-do concept study, that we presented at Hannover Fair 2018, goes a considerable step further, however. I-do is a home robot platform that already hints at how we expect our homes to be in the future. Our home assistant is designed to assume all types of duties and makes our homes safer, achieving all this equipped with the requisite modular features and controlled by voice commands.
President Trump's 2020 reelection campaign is working either directly or indirectly with former staffers from the shuttered consulting firm Cambridge Analytica, according to an Associated Press report. The AP reported on Friday that...
The Hackaday Prize is all about empowering you with the tools you need to create the next great hardware device. To that end, weve set up seed funding for your projects, weve given you a project hosting site, and most importantly, Hackaday gives you the opportunity to connect with tens of thousands of like-minded hardware hackers across the globe.
Not all hackers are out tinkering in their garage after work. Some are pulling the night shift in their dorm rooms, balancing classes, homework, hacking, and life. Student hackers, we salute you with the Enders Achievement!This robotic gripper is the solution to robotic gripping
The Modular Universal Jamming Gripper by [cole b.] and a group of students at the Arizona Makers Collective is something every robot needs. Its a device that allows a robot to pick up just about anything. The old way of doing this is by fancy robotic fingers, maybe an Armatron, or if youre of a sufficient vintage or radioactive, a Waldo. This is not anything like that. Instead of robotic fingers, this is basically a balloon filled with grains of sand. To use it, the robot jams this squishy ball over an object and sucks the air out of the balloon. The result is an end effector that latches onto any small object.
Devices like this have been...
Why is no one talking about this? More than one-third of U.S. adults are taking prescription medications that may lead to depression, new research finds. The study, published in the Journal of the American Medical Association, warns that depression is a potential side effect of more than 200 commonly prescribed medications, including beta blockers for blood pressure, birth control pills, antacids, and painkillers.
___ Many Americans taking common meds that may cause depression, study finds (CBS News): More than one-third of U.S. adults are taking prescription medications that may lead to depression, new research finds. The study, published in the Journal of the American Medical Association, warns that depression is a potential.
The Trump administration took its war with the media to the next level this week when federal authorities seized years of phone records from New York Times reporter Ali Watkins as part of a federal investigation into leaks of classified information.
Watkins, who previously worked for BuzzFeed News and Politico, had a three-year relationship with James Wolfe, a former Senate Intelligence Committee aide who was arrested on Thursday and charged with lying to federal agents investigating the classified leaks.
The seizure set off alarm bells about the relationship between the administration and the media. The Department of Justice under Obama took phone records from Associated Press reporters and editors, named a Fox News reporter an unindicted "co-conspirator" in a leak case, and prosecuted multiple cases involving whistleblowers and leakers. So is what Trump doing more of the same? Or is a president who routinely bashes the media and threatens to jail leakers finally turning his rhetoric into reality?
"It's deeply alarming that the Trump administration has decided to build off of the worst of the Obama legacy on leak investigations and reporter-source protection," said Alexandra Ellerbeck, the North America program coordinator for the Committee to Protect Journalists.
Posted by Jakub Wilk on Jun 15* Marcus Brinkmann , 2018-06-15, 16:43:
Two senators are demanding answers from Amazon following an incident where an Echo device reportedly recorded a couples conversation and sent it to an acquaintance.While Amazon has stated that the company is evaluating options to make this series...
Canonical's developers working on the Mir display server are putting the finishing touches on the Mir 0.32 release...
In a short article, the US Naval Institute reports that the Navy will bring back the Warrant Officer-1 rank for certain specialists:
After a 44-year absence, the rank of warrant officer-1 will return to the Navy in 2019 for cyber specialists, a move signifying the great lengths the service must take to retain talent and fill leadership roles in an increasingly tight labor market.
The return of warrant officer-1 (W-1) discontinued by the Navy in 1975 is both a Navy bid to keep highly sought-after computer technicians and is indicative of the greater challenge facing the service as it seeks to meet growing recruiting and retention targets.
[...] Only a small number of enlisted personnel will qualify for W-1, the pay still will not match what the private sector offers, and the Navy will still face tough recruiting and retention challenges. However, those sailors who do qualify for W-1 will be the ones the Navy hopes will consider remaining in the service longer because [the] rank offers something the private sector can't as easily match a quicker path to management positions.
Read more of this story at SoylentNews.
The most computationally intense part of an Apollo mission was the moon landing itself, requiring both real-time control and navigation of the Lunar Module (LM) through a sequence of programs known as the P60s. Data from radar, inertial navigation, and optical data sighted-off by the LM commander himself were fed into the computer in what wed call today data fusion.
The guy who wrote that code is Don Eyles and the next best thing to actually hanging out with Don is to read his book. Dons book reads as if you are at a bar sitting across the table listening to his incredible life story. Its personal, hilarious, stressful, fascinating, and more importantly for those of us who are fans of Hackaday, its relatable.
Don epitomizes 1960s counter-culture. He has been featured in Rolling Stone magazine, credited with saving Apollo 14 by a creative software hack to bypass the faulty abort switch on the LM, in the article entitled Don Eyles: Extra! Weird-Looking Freak Saves Apollo 14!. Don is also a well known photographer in Boston area. If you want to meet him show up to one of his exhibits.
I met up with Don recently at a talk he presented at the MIT Museum on his book: Sunburst and Luminary; An Apollo Memoir....
If you are more the artistic type than a software developer, Debian is looking for your help. They are soliciting proposals for the artwork/theme for next year's Debian 10 "Buster" release...
A vulnerability affecting GnuPG has made some of the widely used email encryption software vulnerable to digital signature spoofing for many years. The list of affected programs includes Enigmail and GPGTools. About the vulnerability (CVE-2018-12020) CVE-2018-12020, dubbed SigSpoof by Marcus Brinkmann, the researcher which found it, arises from weak design choices. The signature verification routine in Enigmail 188.8.131.52, GPGTools 2018.2, and python-gnupg 0.4.2 parse the output of GnuPG 2.2.6 with a status-fd 2 option, which More
The post Vulnerability in GnuPG allowed digital signature spoofing for decades appeared first on Help Net Security.
Its been seven years since astronauts launched into space from U.S. soil.
From idolized to anonymous, what it means to be an American astronaut is changing once more.
It's a slow-driving pod, but that should be good enough for corporate campuses Photo: Perceptin
A self-driving vehicle can avoid a lot of problems by just going slowly. A slow bot hurts a lot less when it hits you, and cheap sensors are good enough when you dont have to see far to avoid a collision.
And cheap is more than a feature, its a strategy. Make a costly product cheaply, and its not the same productjust look to the supercomputer in your pocket that calls itself a phone.
Thats the idea behind Perceptin, a little startup founded in 2016 by Shaoshan Liu, who got a Ph.D. from the University of California at Irvine and then worked for a decade at the U.S. branch of Baidu. Liu asked himself just how much robocar he could build on a shoestring, and made the task easier by specifying a top speed of 20 kilometers per hour (12 mph).
Our manufacturer in China can make these EV cars for under US $5,000, says Liu. Throw in the software and other necessities, he adds, and the total manufacturing cost should stay below $10,000.
And what do you do with slow bots that cant manage street traffic, let alone highway speeds? You fence them within the sheltered parks of university and industrial campuses, where nobody minds if you brake for squirrels. Its a narrow market niche, but big enough for a startup.
Look through China and theres thousands of campuses, for universities and companiesprobably a million-unit market, Liu says.
Perceptin now has five bots serving its first customer, ZTE. Yep, thats the Chinese telecom company thats lately been at the center of U.S.-China trade disputes. ZTE has an enormous campus in Shenzhen.
Each bot packs four high-definition cameras, four midrange radar sets, and 10 ultrasound sensors, as well as GPS and sensors for wheel autometry. Thats a fancy name for counting how many times the wheels go round, and by itself it can locate the vehicle to within about 20 centimeters. The radar can see up to 50 meters ahead, and the ultrasound is good out to five meters. Those capabilities wouldnt be nearly good enough for the likes of Waymo, but theyre fine at campus speeds.
The cameras work in stereoscopic pairs to provide a three-dimensional point clou...
A spacecraft, spinning in Earths orbit, reaches inside itself. One of its four arms pulls out a length of polymer pipe that has been 3D-printed inside the body of the machines. All four of the spacecrafts arms are securing pieces together as it builds a new space station right there in orbit.
This surreal project, called Archinaut, is the future vision of space manufacturing company Made In Space. The company promises a future of large imaging arrays, kilometer-scale communications tools, and big space stations all built off-planet by smart robots.
In case we needed more evidence that staying fit is good for you
A study to be published in the Journal of Alzheimers Disease shows a correlation between low fitness, aortic stiffness, and the cognitive decline typically observed during brain aging .
There was a time when most 3D printers used ABS plastic. It stinks, is probably bad for you, and tends to warp unless printed in a heated enclosure. So most people have gone to something else, mostly PLA. But ABS also dissolves in a readily-available solvent, acetone, and this is useful for smoothing the layer artifacts from a 3D print. [3DSage] has a technique that works for PLA or he says probably any filament. You can see what hes doing in the video below.
The video starts out with a recap of things most Hackaday readers will already know. But hang in there because at about 1:20, he reveals his method.
The technique involves using plastic-compatible paint and fast-drying polyurethane. He quickly sprays a thin coat of paint and then a thin coat of polyurethane on the part and uses a fan to rapidly dry the mixture before it can run. The two sprays merge to form a coating. He does apply several coats, leaving half an hour to dry between layers, and waits overnight before applying the final coat.
The results look pretty good. This is more like a coating than truly smoothing, but it does fill in the gaps and ridges nicely. As [3DSage] points out, you can print with a larger layer height, and you can change the final color by just changing paint colors.
It certainly looks easy enough to try out. A trip to a big box store and a fiver should put you in business. Our own [Donald Papp] has done something similar with UV resin. The paint method does seem safer than torching your prints.
Posted by Marcus Brinkmann on Jun 15Thanks, fixed.
Posted by Anthony Liguori on Jun 15Affected Software / Hardware:
Deep-seated fears, like the memory of a death or war-time trauma, can be crippling. Theyre also notoriously hard to study and treat, says neuroscientist Ossama Khalaf, Ph.D. But finally, were making progress: In a Science paper published Thursday, Khalaf and his team show new evidence suggesting that fearful memories that dwell deep in the brains neural circuitry dont have to be a burden forever. Its possible, the paper suggests, that they can be rewired.
The paper is rooted in the science of engrams the idea that memories leave a physical trace in the brain. In this case, Khalaf, a researcher at cole Polytechnique Fdrale de Lausanne, and his team traced deep-seated fear memories in rats back to the activity of specific neurons. They found that the way those neurons fire and thus the fearful memory they encode can be reprogrammed.
In our study, we are providing the first experimental evidence that fear memory attenuation is mediated by the re-engagement of the original fear re-writing it towards safety, Khalaf tells Inverse via email.
Hawking is being interred at Westminster Abbey on Friday, with a thousand members of the public (selected through a lottery system) present for the ceremony. The physicists remains will be placed between those of Isaac Newton and Charles Darwin.
His voice will be broadcast into space after the service honoring his life.
Hawkings words have been set to an original score by composer Vangelis, most famous for his Chariots of Fire film theme, the BBC reports.
SpinLaunch Inc. has closed a $35 million Series A funding round with a powerhouse syndicate of investors. Investors include Airbus Ventures, GV (formerly Google Ventures), and Kleiner Perkins. This syndicate joins institutional investors including Lauder Partners, ATW Partners, Bolt, and Starlight Ventures to total $40 million. Investment funds will be used to scale the team and technology, through first launch by 2022.
SpinLaunch is revolutionizing access to space by developing a kinetic energy launch system designed to provide the worlds lowest-cost orbital launch service for the rapidly growing small satellite industry. Their environmentally responsible approach is unmatched in the industry. SpinLaunch is currently considering four different states for potential launch sites within the United States.
Spinlaunch use large centrifuges to store energy and will then rapidly transfer that momentum into a catapult to send a payload to space at up to 4,800 kilometers per hour (3,000 mph). If successful, the acceleration architecture is projected to be both lower cost and use much less power, with the price of a single space launch reduced to under US$500,000.
Intel researchers are taking new steps toward quantum computers by testing a tiny new spin qubit chip. The new chip was created in Intels D1D Fab in Oregon using the same silicon manufacturing techniques that the company has perfected for creating billions of traditional computer chips. Smaller than a pencils eraser, it is the tiniest quantum computing chip Intel has made.
The new spin qubit chip runs at the extremely low temperatures required for quantum computing: roughly 460 degrees below zero Fahrenheit 250 times colder than space.
The spin qubit chip does not contain transistors the on/off switches that form the basis of todays computing devices but qubits (short for quantum bits) that can hold a single electron. The behavior of that single electron, which can be in multiple spin states simultaneously, offers vastly greater computing power than todays transistors, and is the basis of quantum computing.
A new report by the Interior Department's Inspector General highlights several basic cybersecurity issues Photo: iStockphoto
The U.S. Bureau of Reclamation, a part of the Interior Department, operates more than 600 of the some 100,000 dams in the United States, five of which are considered part of the national critical infrastructure. This means that the incapacitation or destruction of either the Glen Canyon Dam in Arizona, the Shasta or Folsom Dams in California, the Hoover Dam in Nevada, or the Grand Coulee Dam in Washington State would, in the Department of Homeland Securitys words, have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
The Interior Departments Inspector General released a report (pdf) this week stating that two of the dams industrial control systems, while seeming secure from being attacked remotely, operate at high risk from insider threats. The report, which does not identify the two dams in question due to security concerns, lists a number of rudimentary cybersecurity practices that were not being followed. These included limiting system administrator access to the control systems and conducting rigorous background checks on individuals granted system privileges.
Dams have been a national security concern (pdf) for years. The importance of the cybersecurity aspect was highlighted in 2016 when the Justice Department indicted seven Iranians for not only conducting cyberattacks against American banks, but trying to compromise the small Bowman Dam north of New York City in 2013. A successful cyberattack on a major dam like the Hoover Dam could be devastating to tens of millions of people....
Almost anywhere in the world, an HIV-infected woman who has an uninfected partner and wants to have a baby would be first in line to receive ARVs. The challenges Katia faced in getting treatment amid Russias epidemic highlight the countrys faltering response, which critics have blasted as misguided, lackadaisical, and downright dismissive. Some federal health officials even question the term epidemic. This is a very large and very serious epidemic, and certainly one of the few epidemics in the world that continues to get worse rather than get better, says Vinay Saldanha, the Moscow-based regional director for the Joint United Nations Programme on HIV/AIDS (UNAIDS) in Eastern Europe and Central Asia. This is a public health crisis.
The government has begun to confront its shortcomings, but critics want more aggressive change.
Three authors at the Harvard Business Review briefly discuss the Peter Principle by dealing with a quantifiable data set. That principle is the one which states that people are promoted to rise to their particular level of their incompetence. At the end they propose several possible solutions or work-arounds.
The Peter Principle problem arises when the skills that make someone successful at one job level dont translate to success in the next level. In these cases, organizations must choose whether to reward the top performer with a promotion or to instead promote the worker that has the best skill match with a managerial position. When organizations reward success in one role with a promotion to another, the usual grumbles ensue; the best engineer doesnt make the best engineering manager, and the best professor doesnt make the best dean. The same problem may apply to scientists, physicians, lawyers, or in any other profession where technical aptitude doesnt necessarily translate into managerial skill.
[...] While the Peter Principle may sound intuitively plausible, it has never been empirically tested using data from many firms. To test whether firms really are passing over the best potential managers by promoting the top performers in their old roles, we examined data on the performance of salespeople and their managers at 214 firms. Sales is an ideal setting to test for the Peter Principle because, unlike other professional settings, its easy to identify high performing salespeople and managers for salespeople, we know their sales records, and for the sales managers, we can measure their managerial ability as the extent to which they help improve the performance of their subordinates. The data, which come from a company that administers sales performance management software over the cloud, allow us to track the sales performance of a large number of salespeople and managers in a large number of firms. Armed with these data, we asked: Do organizations really pass over the best potential managers by promoting the best individual contributors? And if so, how do organizations manage around the Peter Principle?
Read more of this story at SoylentNews.
It's been a little over one year since we last covered Debian's reproducible builds project. The effort has not stopped in the interim; progress continues to be made, the message has sharpened up, and word is spreading. Chris Lamb, speaking about this at FLOSS UK in a talk called "You may think you're not a target: a tale of three developers", hinted that the end may be starting to come into sight.
Security updates have been issued by CentOS (plexus-archiver), Fedora (chromium, kernel, and plexus-archiver), Mageia (firefox, gifsicle, jasper, leptonica, patch, perl-DBD-mysql, qt3, and scummvm), openSUSE (opencv), Oracle (kernel), Red Hat (kernel), Scientific Linux (kernel), SUSE (gpg2, nautilus, and postgresql96), and Ubuntu (gnupg2 and linux-raspi2).
Frustrated by thousands of cheaters who wreak havoc in Fortnites Battle Royale, game publisher Epic Games decided to take several to court.
The game developer isnt trying to bankrupt these people financially. It is mainly interested in preventing them from cheating in the future.
The main strategy thus far has been to settle the cases. Several accused cheaters have signed consent judgments, promising not to cheat or engage in any copyright infringing activity going forward.
This tactic doesnt work in all cases. One of the accused, a man from Russia going by the name of Konstantin Vladimirovich Rak, has failed to respond to the allegations in court.
This failure prompted Epic Games to file for a default judgment, requesting an injunction that would prevent the defendant from using Epics copyrighted works to develop cheats, as well as other infringing activity.
Without Rak being able to put up a defense, one might expect an easy win for Fortnites developer, but thats certainly not the case.
In an order published this week, United States Magistrate Judge Laurel Beeler notes that the balance currently weighs against granting the default judgment.
Judge Beeler is specifically concerned with the merits of Epics claims and the sufficiency of the complaint. This includes the copyright infringement accusations, which need work.
One of the claims is that Mr. Rak engaged in direct copyright infringement. This requires Epic to show that the alleged infringer violates its exclusive rights, but thats not the case here,
Epic alleges that users can download Mr. Raks cheat and then inject the cheat into Fortnite code, but it does not allege that Mr. Rak himself injected the cheat into Fortnite code or created an unauthorized derivative work, Judge Beeler notes.
In addition, the defendant allegedly displayed the cheat in action by posting gameplay on YouTube, thereby violating its exclusive right to perform the copyrighted work publicly. However, without further details, the court is not convinced that this is copyright infringement.
Epic does not allege what exactly Mr. Rak publicly performed or address whether its copyright extends to that performance. On this issue, Epics complaint says only that the Rak Video showed full-screen gameplay using the cheat, without more, Judge Beeler writes.
Then, there is the issue of whether posting gameplay mat...
The history of Area 51 stretches back to the 1950s.
Area 51 has been the focal point of alien conspiracy theories in America for decades. The remote military base in the Nevada desert has a lot of history, and has been associated with aliens almost since its inception. Heres why. Following is a transcript of the video:
In the early 1950s, US planes were conducting low-flying recon missions over the USSR. But there were constant worries of them being spotted and shot down.
So in 1954, President Eisenhower authorized the development of a top secret, high-altitude recon aircraft Dubbed Project Aquatone. The program required a remote location that wasnt easily accessible to civilians or spies. Area 51 fit the bill perfectly.
Posted by Solar Designer on Jun 15There's nothing like this in the moderation queue. Also not in the spam
A Silicon Valley startup has devised an ingenious way of sending rockets into space.
Dubbed SpinLaunch, the firm wants to blast tiny payloads into orbit atop miniature rockets.
But instead of using propellants like a typical launch would, SpinLaunch would slingshot them into space using a novel catapult technology.
We like to think that all these new voice-controlled gadgets like our cell phones, Google Home, Amazon Echo, and all that is the pinnacle of new technology. Enabled by the latest deep learning algorithms, voice-controlled hardware was the stuff of science fiction back in the 1961s, right? Not really. Turns out in around 1960, Ideal sold Robot Commando, a kids toy robot that featured voice control.
Well, sort of. If you look at the ad in the video below, youll see that a kid is causing the robot to move and fire missiles by issuing commands into a microphone. How did some toy company pull this off in 1961?
Watch the video below carefully. The eyes are on their own motor and just move on their own. The drive train and the missile launchers are subject to the voice control. If you cant get the scale from the video, the robot stood an impressive 19 inches tall.
The remote has a rotary switch (marked arrow knob in the instruction booklet) and a thick cable (control wire) coming out of it and connecting to the robot. Turns out the wire isnt a wire at all. It was a Bowden cable. This is the original kind of Bowden cable like you find on a bicycle, not a 3D printing feed me...
A new vulnerability tracked as LazyFP (CVE-2018-3665) involving side channel speculative execution affects Intel CPUs, like previous ones it could be exploited by hackers to access sensitive information from the affected system.
The vulnerability was discovered by Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology and Zdenek Sojka from SYSGO AG.
The vulnerability resides in the floating point unit (FPU) that is used by the operating system when switching between processes. It is used to save the current context (state of the current process and registries) and restores the context of the new process.
System software may opt to utilize Lazy FP state restore instead of eager save and restore of the state upon a context switch. Lazy restored states are potentially vulnerable to exploits where one process may infer register values of other processes through a speculative execution side channel that infers their value, reads the advisory published by Intel.
There are two types of switching, Lazy FPU and Eager FPU, the former has better performance on older systems.
Security researchers discovered recently that if the Lazy method if vulnerable to attacks that could expose FPU state data, which can contain sensitive information such as cryptographic keys.
The register state of the floating point unit (FPU), which consists of the AVX, MMX and SSE register sets, can be leaked across protection domain boundaries. This includes leaking across process- and virtual machine boundaries. reads the analysis published by Thomas Prescher, Julian Stecklina, Jacek Galowicz
The FPU state may contain sensitive information such as cryptographic keys.
According to the expert, the CVE-2018-3665 vulnerability is similar to Meltdown Variant 3a.
Intel confirms the CVE-2018-3665 vulnerability affects Core processors, but it claims the issue has been addressed by operating system and hypervisor software developers for many years, Intel urges vendors that still havent fixed the issue to do it as soon as possible by releasing necessary security updates.
Lazy FPU doesnt affect systems using AMD or ARM processors, while Microsoft confirmed that Lazy restore is enabled by de...
Bouvet Island's most valuable resource might be its untapped .bv country code Image: Jesse Allen and Robert Simmon/NASA Earth Observatory Ice covers about 94 percent of Bouvet Island year-round.
Bouvet Island has little to offer. The most remote island in the world is fewer than 20 square miles in size, and its almost entirely covered by a glacier. Long ago, it was an active volcano, but those fiery days have long since passed. Now, its home to hundreds of thousands of seabirds, a Norwegian research station, and its own top-level internet domain.
Top-level domains serve as part of the Internets architecture. Aside from generic domains like .com and .edu, every country has a specific two-letter domain assigned to it. The United Kingdom, for example, uses .uk; Japan uses .jp. The United States has .us, though its not widely used. The original idea was that each country could manage the websites registered by individuals and organizations within its borders by issuing them websites that use their country-specific domain.Gif: Google Maps/Google Earth/IEEE Spectrum Where in the world is Bouvet Island?
But heres the weird thing about Bouvet Island having its own top-level domain: Its uninhabited. Its always been uninhabited. Located in the southern Atlantic, the closest land to Bouvet Island is the coast of Antarctica, 1,100 miles to the south. The closest inhabited land is the island Tristan da Cunha, a British overseas territory located 1,400 miles to the north (Interestingly enough, Tristan da Cunha does not have its own top-level domain).
So how did Bouvet Island end up with the .bv domaina domain which is not in use and not open to registration?
It starts with the United Nations. The UNs Statistics Division maintains a publication called the Standard Country or Area Codes for Statistical Use. Published since 1970 and also known as the M49 standard, the UNs primary intention is to use its three-digit codes to group nations and geographic regions for statistical analysis.
Since 1974, the International Organization for Standardization, an international standards body just as unaffili...
While Intel Icelake hardware is quite a ways out from making its debut, the open-source Intel Linux developers working on the hardware enablement for its "Gen 11" graphics continue working dilligently on this hardware enablement...
Facebook is sending some of its top executives to meet with Republican leaders following complaints about anti-conservative bias on social media, the company confirmed to The Hill on Friday.The officials from Facebooks public policy team will be...
Posted by Marcus Meissner on Jun 15Hi,
A hi-tech padlock secured with a fingerprint can be opened by anyone with a smartphone, security researchers have found.
On its website, Tapplock is described as the "world's first smart fingerprint padlock".
But researchers said it took just 45 minutes to find a way to unlock any Tapplock.
[...] The "major flaw" in its design is that the unlock key for the device is easily discovered because it is generated from the Bluetooth Low Energy ID that is broadcast by the lock.
Anyone with a smartphone would be able to pick up this key if they scanned for Bluetooth devices when close to a Tapplock.
Using this key in conjunction with commands broadcast by the Tapplock would let attackers successfully open any one they found, said Mr Tierney.
In response, Tapplock said in a statement that it was issuing a software update.
-- submitted from IRC
Read more of this story at SoylentNews.
Posted by Georgi Guninski on Jun 15Looks like util-linux currently supports pty's:
July 12th sees us launch our first conference in New York City dedicated to the field of rejuvenation biotechnology, the science that seeks to end age-related diseases forever.
At the Frederick P. Rose Auditorium, Cooper Union in New York City, we will be hosting a special one-day conference focused on aging research and biotech investment. Developing therapies from initial concepts, through clinical testing, and ultimately to market takes a pipeline, and right now, that p
President Trump on Friday announced that the United States would impose tariffs on $50 billion in Chinese products, making good on a threat that has been months in the making.The White House's move is expected to ramp up trade tensions with Beijing...
Cyber security awareness programs are beginning to gain ground among businesses, but many of the professionals responsible for their implementation are challenged by a lack of time, budget and resources, according to a new SANS Security Awareness report. The report also highlights a clear correlation between the level of support given to security awareness by the organisations leadership and the maturity of that program within the organisation. In light of recent large breaches such as More
The post Exploring the maturity of corporate security awareness programs appeared first on Help Net Security.
Recently, Apricorn announced new research highlighting that 95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and nearly one in five (18%) suggest their mobile workers dont care about security. In this podcast, Jon Fielding, Managing Director for Apricorn in EMEA, talks about the challenges related to securing mobile workers, and how they can be solved. Heres a transcript of the podcast for your convenience. Hello, my names Jon More
The post The challenges of securing mobile workers and keeping data secure appeared first on Help Net Security.
The University of Chicago will no longer require ACT or SAT scores from U.S. students, sending a jolt through elite institutions of higher education as it becomes the first top-10 research university to join the test-optional movement.
Numerous schools, including well-known liberal arts colleges, have dropped or pared back testing mandates in recent years to bolster recruiting in a crowded market. But the announcement Thursday by the university was a watershed, cracking what had been a solid and enduring wall of support for the primary admission tests among the two dozen most prestigious research universities.
[...] U-Chicago is also expanding financial aid and scrapping in-person admission interviews, which had been optional. Instead, it will allow applicants to send in two-minute video pitches, in an effort to connect with a generation skilled at communicating via cellphone clips.
Read more of this story at SoylentNews.
Purism's PureOS downstream of Debian that is shipped on their Librem laptops and is also planned as part of the software stack making up their in-development Librem 5 smart-phone is planning for more changes...
Privacy and security online are one of the top concerns of Americans, especially after numerous massive data breaches (Equifax, Yahoo, Uber) that happened in the past couple of years. According to Pew Research Center, 61% of people would like to do more to protect their privacy online, and 74% would like to be more in control of who can get information about them online. 64% of Americans have personally experienced a major data breach, and More
Approximately six in seven aerospace/defense companies (86 percent) expect to integrate blockchain into their corporate systems within three years, according to a new research report from Accenture. One of the worlds newest and most promising technologies, blockchain is a type of distributed ledger that maintains and records data in a way that allows multiple stakeholders to confidently and securely share access to the same information. Blockchains secure, immutable and decentralized features can help aerospace companies More
The post Most aerospace and defense companies to integrate blockchain by 2021 appeared first on Help Net Security.
Kees Cook describes the security-oriented changes included in the 4.17 kernel release. "It was possible that old memory contents would live in a new processs kernel stack. While normally not visible, uninitialized memory read flaws or read overflows could expose these contents (especially stuff deeper in the stack that may never get overwritten for the life of the process). To avoid this, I made sure that new stacks were always zeroed. Oddly, this priming of the cache appeared to actually improve performance, though it was mostly in the noise."
Ars technica has the story of a set of Docker images containing cryptocurrency miners that persisted on Docker Hub for the better part of a year after being discovered. "Neither the Docker Hub account nor the malicious images it submitted were taken down. Over the coming months, the account went on to submit 14 more malicious images. The submissions were publicly called out two more times, once in January by security firm Sysdig and again in May by security company Fortinet. Eight days after last month's report, Docker Hub finally removed the images."
Threat Fabric (formerly known as SfyLabs) reports of a newly discovered banking Trojan targeting Android 7 and 8 versions. It seems to be linked to Lokibot, the hydra of the Android malware zoo, because it uses the same command and control (C&C) server.
The recently discovered banking Trojan, dubbed Mysterybot, seems to be an update of Lokibot, or belonging to the same family of Trojan malware.
Lokibot is known as the hydra of the Android malware zoo, because it has Android Trojan and ransomware capabilities. Killing one does not kill the other.
Mysterybot features improved commands compared to Lokibot, a new name, and modified network communication.
Although certain Android banking malware families such as but not limited to ExoBot 2.5, Anubis II, DiseaseBot have been exploring new techniques to perform overlay attacks on Android 7 and 8, it seems that the actor(s) behind Mysterybot have successfully implemented a workaround solution and have spent some time on innovation,
Here is a list of the innovative features the researchers discovered:
[Scott Harden] wrote in to tell us of some success hes having using the FT232 chip to speak SPI directly from his laptop to a AD98850 digital signal generator. At least that was his destination. But as so often in life, more than half the fun was getting there, finding some still-unsolved silicon bugs, and (after simply swapping chips for one that works) potting it with hot glue, putting it in a nice box, and putting it up on the shelf.
In principle, the FTDI FT232 series of chips has a bit-bang mode that allows you to control the individual pins from a fairly simple API on your target computer, using their drivers and without installing anything on basically any platform. We wrote this feature up way back in 2009, and [Scott] was asking himself why he doesnt see more hacks taking advantage of bit-bang mode.Square waves
Then he answered his own question the hard way, by spending hours debugging his code until he stumbled on the...
El Reg reports
Microsoft had to emit a hasty update for its R Open analysis tool after developers found the open-source package was not playing nice with some Linux systems.
[...] Additionally, Preining found, the script Microsoft used to uninstall R Open would cause further problems, one being that it would delete files without checking where they actually pointed
[...] Fortunately, it looks as though Redmond was listening, and Microsoft's dev team was quick to act. Within two days of Preining's blog post going up, he reported that R Open had been patched by the Windows giant to resolve the issues and properly install and remove itself on Debian systems.
"Thanks Microsoft for the quick fix, it is good news that those playing with Open R will not be left with a hosed system", Preining noted.
 Text highlighting and scrollwheel scrolling on the page work
now. Mouse actions were broken June 13. (Scrolling was mentioned
down in the comments there.)
 Content is behind scripts.
Read more of this story at SoylentNews.
It's GIF's 31st anniversary -- exciting, right? Those animated images have truly changed the world. All kidding aside, it is pretty amazing that the file format came to be way back in 1987!
To celebrate tomorrow's milestone, Google releases a new open source tool today. Called "GIF for CLI," it can convert a Graphics Interchange Format image into ASCII art for terminal. You can see such an example in the image above.
A security researcher has discovered a critical vulnerability in some of the world's most popular and widely used email encryption clients that use OpenPGP standard and rely on GnuPG for encrypting and digitally signing messages. The disclosure comes almost a month after researchers revealed a series of flaws, dubbed eFail, in PGP and S/Mime encryption tools that could allow attackers to
NetworkManager has finally landed support for dealing with Wake On Wireless LAN (WoWLAN) as the WoL-like functionality for wireless adapters...
A supercomputer, of course, isn't really a "computer." It's not one giant processor sitting atop an even larger motherboard. Instead, it's a network of thousands of computers tied together to form a single whole, dedicated to a singular set of tasks. They tend to be really fast, but according to the folks at the International Supercomputing Conference, speed is not a prerequisite for being a supercomputer.
Good news for the victims of the Everbe Ransomware, the popular malware researchers Michael Gillespie and Maxime Meignan have released a decryptor that could be used by victims to decrypt their files for free.
The Everbe Ransomware encrypts files and appends the .[firstname.lastname@example.org].everbe, .embrace, or .pain extensions appended to the encrypted files name.
Now victims can use the InsaneCrypt Decryptor to restore their files, they have to select the men item Settings and choose Bruteforcer.
In order to decrypt the files, it is necessary to provide the tool both encrypted and unencrypted versions of the files.
There's a new biotech in town. And it doesn't care about making money. The Bill and Melinda Gates Foundation has spun out a nonprofit biotech offspring, the Bill and Melinda Gates Medical Research Institute. With funding of $273 million for its first four years, the organization is in an enviable position.
"We don't have to worry about revenue, return on investment. Our bottom line is lives saved. So it's a pretty exciting place to be," Dr. Penny Heaton, the institute's CEO, explained in an interview with STAT this week. Though the institute opened its doors in temporary space in Cambridge, Mass. in early January, Heaton introduced it to the biotech world on Thursday at the BIO International Convention in Boston.
The institute's focus is on diseases that disproportionately affect the poor: malaria, tuberculosis, and enteric diseases. The latter are diseases caused by viruses, bacteria, or parasites that attack the digestive system. They can cause life-threatening, even fatal bouts of diarrhea, disrupt nutrient absorption, and stunt development.
Read more of this story at SoylentNews.
On May 25, the FBI asked us all to reboot our routers. The story behind this request is one of sophisticated malware and unsophisticated home-network security, and its a harbinger of the sorts of pervasive threats from nation-states, criminals and hackers that we should expect in coming years.
A security flaw within Intel Core and Xeon processors can be potentially exploited to swipe sensitive data from the chips' math processing units. Malware or malicious logged-in users can attempt to leverage this design blunder to steal the inputs and results of computations performed in private by other software.
These numbers, held in FPU registers, could potentially be used to discern parts of cryptographic keys being used to secure data in the system. For example, Intel's AES encryption and decryption instructions use FPU registers to hold keys.
When it comes to choice of metals that can be melted in the home foundry, its a little like [Henry Ford]s famous quip: you can melt any metal you want, as long as its aluminum. Not that theres anything wrong with that; theres a lot you can accomplish by casting aluminum. But imagine what you could accomplish by recycling cast iron instead.
It looks like [luckygen1001] knows a thing or two about slinging hot metal around. The video below shows a fairly expansive shop and some pretty unique tools he uses to recycle cast iron; we were especially impressed with the rig he uses to handle the glowing crucibles from a respectful distance. The cast iron comes from a cheap and abundant source: car disc brake rotors. Usually available free for the asking at the local brake shop, he scores them with an angle grinder and busts them into manageable chunks with a hammer before committing them to the flames. The furnace itself is quite a thing, running on a mixture of diesel and waste motor oil and sounding for all the world like a jet engine starting up. [luckygen1001] had to play with the melt, adding lumps of ferrosilicon alloy to get a cast iron with better machining properties than the original rotors. Its an interesting lesson in metallurgy, as well as a graphic example of how not to make a flask for molding cast iron.
Cast iron from the home shop opens up a lot of possibilities. A homemade cast aluminum lathe is one thing, but one with cast iron parts would be even better. And if you use a lot of brake rotors for your homebrew cast iron lathe, it might require special handling.
The UK has some of the toughest intellectual property legislation to be found anywhere in the world and rightsholders have plenty of options available, from civil action through to criminal referrals.
For the past several years the government has also shown a willingness to engage with the private sector in respect of online piracy. It has provided funding and resources to initiatives including the Police Intellectual Property Crime Unit and the multi-faceted Operation Creative, a commitment that looks set to continue.
At the heart of many of these matters sits the Intellectual Property Office (IPO), the government department responsible for copyrights, trademarks, patents and designs. This week the IPO published two documents, one detailing its corporate plan for 2018-2019 and the other outlining its overall strategy to 2021. Both contain statements relating to online copyright enforcement.
IP matters. It touches everything that makes modern life, easier, safer, prosperous and more enjoyable, the IPO Strategy 2018 report begins.
Our work gives researchers, inventors and creators, whether as individuals or businesses, the confidence to invest their time, energy and money in doing something new and making life better.
The IPO says its aim is to help the UK become the most creative and innovative country in the world by providing excellent IP services, a world-leading IP environment, and by making the IPO itself a great place to work. Much of the information in the reports focuses on how that progress will be made in the broader sense, including via the reduction of IP crime and infringement.
The IPO believes this can be achieved in a number of ways, including by investing in enforcement and improving access to enforcement options for rights holders. Investment in intelligence and an increased capacity for strategic leadership are foreseen, in addition to spending boosts to convince everyone that infringement is unacceptable.
We will work towards a time where infringement is seen as socially unacceptable by all, the IPO writes.
Periodically over the past couple of years, the government has stepped into the middle of disputes between rightsholders and Internet intermediaries, suggesting that if agreements to curb piracy arent reached, legislation could follow.
The IPO sees this kind of work continuing over the next couple of years with an offer to broker greater engagement from online intermediaries in the fight against infringement and IP crime....
They have the audacity to call patent tribunals death squads whilst abusing immunity to dodge these tribunals
Summary: Auditory roles which help ascertain high quality of patents (or invalidate low-quality patents, at least those pointed out by petitions) are being smeared, demonised as death squads and worked around using dirty tricks that are widely described as scams
THE quality of patents not the quantity matters a lot; a new letter about the EPO demonstrates just that and USPTO leadership ought to take notice. Failing to ensure high patent quality or inability to assure consistent patenting standards may be disastrous; for instance, if an office grants very low-quality patents for a number of months/years, that may be enough to muddy the water and harm the reputation of (or confidence in) all patents, collectively. People and firms pay a humongous amount of money to patent offices under the assumption that granted patents would then be honoured by courts. When that stops happening the demand for patents declines and many are considered questionable if not worthless.
This post is about the USPTO, where attacks on PTAB have intensified also at the executive level (not judicial), adding to the loud if not aggressive protests from patent extremists.The Patent Trial and Appeal Board (PTAB) is the American equivalent of Europes BoA and its constantly under attack from patent maximalists, including Battistellis American equivalent, Andrei Iancu. He too is a patent maximalist, having come from a law firm and as we recalled in the previous post, he and Battistelli now jointly participate (in capacity as keynote speakers) in PTAB-bashing events organised by IAM, the patent trolls lobby. Why do they hate patent quality so much? Cant they just...
The signature verification routine in Enigmail 184.108.40.206, GPGTools 2018.2, and python-gnupg 0.4.2 parse the output of GnuPG 2.2.6 with a status-fd 2 option, which allows remote attackers to spoof arbitrary signatures via the embedded filename parameter in OpenPGP literal data packets, if the user has the verbose option set in their gpg.conf file, reads the blog post published by Marcus Brinkmann who discovered the SigSpoof flaw.
The expert noticed that even if the verbose is disabled by default, it is included in several recommended configurations for GnuPG.
Status messages are parsed by applications that get information from GPG about the validity of a signature.
Status messages are created with the option status-fd N, where N is a file descriptor. If N is 2, status messages and regular diagnostic messages share the stderr output channel. explains GnuPG maintainer Werner Koch.
The issue resides in the OpenPGP protocol allowing the inclusion of the file name of the original input file into a signed or encrypted message. The GnuPG tool can display a notice with that file name during decryption and verification, but it does not sanitize the file name, meaning that an attacker could include line feeds or other control characters in it.
The lack of file name sanitization in GnuPG tool could be exploited by attack...
It was just days ago that the VirGL driver stack -- which is used for supporting OpenGL hardware acceleration within guest VMs that is passed onto the host's driver -- picked up FP64 support while now its latest addition is ARB_tessellation_shader support...
Leaked documents have provided details about Microsoft's upcoming Surface tablets, the next-generation Xbox, a two-screen handheld device, and the next HoloLens:
Andromeda, Microsoft's mythical pocketable, two-screen, hand-held device that's supposed to carve out a whole new market for itself, is due for release in 2018. The documents also say that, after Andromeda, Microsoft OEMs will produce their own comparable products, just as they've done with Surface Pro.
The big question for Andromeda is the same as it has always been: why? To define a new hardware form factor, as appears to be the intent, its design needs to be particularly suitable for something. Surface Pro, for example, has appealed particularly to groups such as students (taking notes with OneNote) and artists, thanks to its form factor and multimodal input support. To succeed, Andromeda needs to offer similar appealit needs to enable something that's widely useful and ill-suited to existing hardware. But presently, there are few ideas of just what that role might be.
Read more of this story at SoylentNews.
The lack of willingness to view human cognition and behavior as within the purview of evolutionary processes has prevented evolution from being fully integrated into the social science curriculum.Photograph by David Carillet / Shutterstock
My high school biology teacher, Mr. Whittington, put a framed picture of a primate ancestor in the front of his classrooma place of reverence. In a deeply religious and conservative community in rural America, this was a radical act. Evolution, among the most well-supported scientific theories in human history, was then, and still is, deliberately censored from biological science education. But Whittington taught evolution unapologetically, as the single best idea anybody ever had, as the philosopher Dan Dennett described it. Whittington saw me looking at the primate in wonder one day and said, Cristine, look at its hands. Now look at your hands. This is what common descent looks like.
Evolution has shaped the human body, but it also shaped the
human brain, so evolutionary principles are indispensable for understanding our psychology.
Yet many students, teachers, and even social scientists struggle to
see how our evolutionary history significantly shapes our cognition
and behavior today. Learning and culture do not explain behavior so
Summary: Having spread surrogate terms like 4IR (somewhat of a 'mask' for software patents, by the EPO's own admission in the Gazette), the EPO continues with several more terms like ICT and now were grappling with terms like AI, which the media endlessly perpetuates these days (in relation to patents it de facto means little more than clever algorithms)
TECHRIGHTS routinely comments, sometimes quite harshly, about the EPO and USPTO not because it opposes patents but because it opposes patent maximalism. The same can be said for copyrights and trademarks; were in favour of both, but in moderation. We need policy that actually reflects societal needs rather than a meta-industry saturated by lawyers. None of this is new of course; copyright maximalists typically receive most of the attention in the media (e.g. this story thats circulating this week [1, 2]) and we feel like theres a lack of sceptics when it comes to patent maximalism. Some sites are against patents altogether, but were not among them.
Some sites are against patents altogether, but were not among them.As we noted the other day, theres...
Scientists have directly identified the cluster of neurons in the brain responsible for recalling long-term memories of traumatic experiences, helping answer the question of whether therapy suppresses fear-based memories or if it actually rewrites those memories.
Autonomous deliveries and drones
UPS execs insist that the UPS driver is a core element to its success and the face of the company, but they have tested the use of drone deliveries for some applications including dropping essential supplies in Rwanda and demonstrating how medicine could be delivered to islands. In rural areas, where drones have open air to execute deliveries and the distance between stops makes it challenging for the drivers to be efficient, drones launched from the roofs of UPS trucks offer a solid solution to cut costs and improve service. Drones could also be deployed in UPS sorting facilities and warehouses to get items on high shelves or in remote areas.
The technology used by UPS generates a cache of data that opens up even more opportunities to become more efficient, improve the customer experience, innovate delivery solutions, and more. From optimizing the UPS network to driving operational improvements, big data and artificial intelligence are at the core of UPSs business performance.
Microsoft is all-in on building a quantum computer and is making advancements every day, according to one of the companys top experts on the technology.
Julie Love (above), Director of Quantum Computing, called the firms push to build the next generation of computer technology one of the biggest disruptive bets we have made as a company.
Quantum computing has the potential to help humans tackle some of the worlds biggest problems in areas such as materials science, chemistry, genetics, medicine and the environment. It uses the physics of qubits to create a way of computing that can work on specific kinds of problems that are impossible with todays computers. In theory, a problem that would take todays machines billions of years to solve could be completed by a quantum computer in minutes, hours or days.
In the search for fundamental truths in our Universe, one of the biggest questions, are space and time continuous or discrete, remains unanswered.
Tesla to fire 9% (almost one in ten) of its workforce:
Tesla is cutting nine per cent of its workforce in a "comprehensive organizational restructuring", according to an internal email sent by its CEO Elon Musk on Tuesday.
While that email was sent only to employees, Musk then tweeted the full text immediately afterwards and it is clear that the missive was designed to be read by external critics and worried investors.
[...] It goes on: "As part of his effort, and the need to reduce costs and become profitable, we have made the difficult decision to let go of approximately 9 per cent of our colleagues across the company."
The email then shifted in tone and notes that the cuts will not impact the company's delayed production schedule for its latest car model: "These cuts were almost entirely made from our salaried population and no production associates were included, so this will not affect our ability to reach Model 3 production targets in the coming months."
[...] Musk addresses that very real issue of running out of money and finding it hard to find people to put in more cash in the last paragraph of his email. But, of course, he can't stop himself from doing so in typical arrogant fashion, even employing the royal "we" in his apparent recognition of reality.
"Given that Tesla has never made an annual profit in the almost 15 year since we have existed, profit is obviously not what motivates us. What drives us is our mission to accelerate the world's transition to sustainable, clean energy, but we will never achieve that mission unless we eventually demonstrate that we can be sustainably profitable. That is a valid and fair criticism of Tesla's history to date."
The news is the first sign that Musk has had little choice but to respond to his investors' concerns, no doubt because he realizes he will need to go to them again soon for more cash.
Read more of this story at SoylentNews.
Red Hat Enterprise Linux is widely thought of as the first choice in operating systems for important servers, but it may not be the right choice for all applications.
Customers have other options for data center operating systems. RHEL wouldnt always be appropriate for edge devices, functions-as-a-service, and highly specialized applications, Pacheco noted.
We first heard of Chrome OS gaining Linux app support back in February. Google officially confirmed during Google I/O 2018 that the Pixelbook would be the first Chromebook with Linux app support, but since then the Samsung Chromebook Plus has joined in on the fun. Tonight, a device that we expected to eventually gain Linux app support finally got support for it: the HP Chromebook X2.
When a hacker owns an oscilloscope, its more than a possession. Weary nights are spent staring at the display, frantically twiddling the dials to coax out vital information. Over time, a bond is formed and only the best will do for your scope. So why settle for the stock plastic dials when you could go for gold? Well in case you hadnt noticed, were partial to a bit of over-engineering here at Hackaday, and [AvE] has upgraded his Rigol scope by adding metal knobs.
Employing his usual talent in the shop, [AvE] first turns the basic knob shapes from the stock, before drilling them and milling the outer texture pattern at an angle. Voil: six custom knobs for 100% more torque and traction control. No matter how trivial the project, its always good to watch him at work. This [AvE] video doesnt come with the usual fruity language warning; instead this build is set to the swelling tones of Beethoven. Less Talk More Action! says the title, but we have to say that we miss his quips. That said, he still manages to deliver his signature humour through action alone.
For some slightly more functional oscilloscope upgrades, you can read about adding a hybrid touchscreen interface, or hacking a Rigol scopes software to unlock greater bandwidth, storage depth and more.
Intel expects to lose some server/data center market share to AMD's Epyc line of chips:
The pitched battle between Intel and AMD has spread to the data center, and while Intel has been forthcoming that it expects to lose some market share in the coming months to AMD, Brian Krzanich's recent comments to Instinet analyst Roman Shah give us some insight into the surprising scope of AMD's threat. Shah recently sat down with Intel CEO Brian Krzanich and Barron's reported on his findings:
Shah relates that Krzanich "was very matter-of-fact in saying that Intel would lose server share to AMD in the second half of the year," which is not news, but he thought it significant that "Mr. Krzanich did not draw a firm line in the sand as it relates to AMD's potential gains in servers; he only indicated that it was Intel's job to not let AMD capture 15-20% market share." (emphasis added).
Furthermore, Intel's problems with the "10nm" node could allow AMD to pick up market share with "7nm" (although it may be similar in performance to Intel's "10nm"):
Nomura Instinet is less bullish on further stock gains for Intel after talking to the chipmaker's CEO, Brian Krzanich. [...] The analyst said Intel's problems in moving to its next-generation chip manufacturing technology may be a factor in its potential market share losses. The chipmaker revealed on its April 26 earnings conference call that it delayed volume production under its 10-nanometer chip manufacturing process to next year. Conversely, AMD said on its call that it plans to start next-generation 7-nanometer chip production in late 2018.
[...] "We see Mr. Krzanich's posture here reflecting the company's inability thus far to sufficiently yield 10nm for volume production while AMD's partner TSMC is currently making good progress on 7nm; thus, setting Intel up for stiff competition again in 2019," the analyst said.
Here are a couple of post-mortem articles on Intel's misleading 28-core CPU demo and more:
Adding to the growing list of features for Fedora 29 is a plan to fully support the FreeDesktop.org Boot Loader Specification and making use of their defined fragment files to populate boot-loader boot menu entries, including the kernel entries...
Posted by Williams, Ken on Jun 14CA20180614-01: Security Notice for CA Privileged Access Manager
Posted by Branco, Rodrigo on Jun 14<<< application/pkcs7-mime: EXCLUDED >>>
Posted by Michael Catanzaro on Jun 14------------------------------------------------------------------------
The Intel FPU speculation vulnerability has been confirmed. Theo guessed right last week.
Using information disclosed in Theo's talk, Colin Percival developed a proof-of-concept exploit in around 5 hours. This seems to have prompted an early end to an embargo (in which OpenBSD was not involved), and the official announcement of the vulnerability.
An update to the article appearing in The Register adds:
A security flaw within Intel Core and Xeon processors can be potentially exploited to swipe sensitive data from the chips' math processing units.
Malware or malicious logged-in users can attempt to leverage this design blunder to steal the inputs and results of computations performed in private by other software.
These numbers, held in FPU registers, could potentially be used to discern parts of cryptographic keys being used to secure data in the system. For example, Intel's AES encryption and decryption instructions use FPU registers to hold keys.
In short, the security hole could be used to extract or guess at secret encryption keys within other programs, in certain circumstances, according to people familiar with the engineering mishap.
Windows Server 2008 is among the operating systems that will need to be patched, we understand, and fixes for affected Microsoft and non-Microsoft kernels are on their way. The Linux kernel team is back-porting mitigations to pre-4.9 kernels.
Essentially, hold tight, and wait...
Posted by Sebastien Delafond on Jun 14-------------------------------------------------------------------------
Posted by Apple Product Security on Jun 14APPLE-SA-2018-06-13-01 Xcode 9.4.1
Its probably fair to say that anyone reading these words understands conceptually how physically connected devices communicate with each other. In the most basic configuration, one wire establishes a common ground as a shared reference point and then the signal is sent over a second wire. But what actually is a signal, how do the devices stay synchronized, and what happens when a dodgy link causes some data to go missing?
All of these questions, and more, are addressed by [Ben Eater] in his fascinating series on data transmission. He takes a very low-level approach to explaining the basics of communication, starting with the concept of non-return-to-zero encoding and working his way to a shared clock signal to make sure all of the devices in the network are in step. Most of us are familiar with the data and clock wires used in serial communications protocols like I2C, but rarely do you get to see such a clear and detailed explanation of how it all works.
He demonstrates the challenge of getting two independent devices to communicate, trying in vain to adjust the delays on the receiving and transmitting Arduinos to try to establish a rel...
AT&T announced Thursday evening that it has completed its acquisition of Time Warner, two days after a federal judge gave the telecommunication and entertainment giants the green light to go ahead with their $85 billion merger. "...
Apple is about to make it much harder for law enforcement agencies to gain access to information on iPhones.
The company will include a new feature, called USB Restricted Mode, in a future update of its iOS software, which runs on iPhones and iPads.
The feature disables data transfer through the Lightning port one hour after a phone was last locked, preventing popular third-party hacking tools used by law enforcement from accessing the device. The port can still be used for charging.
Law enforcement officers have already been quoted opposing the security upgrade:
"If we go back to the situation where we again don't have access, now we know directly all the evidence we've lost and all the kids we can't put into a position of safety," said Chuck Cohen, who leads an Indiana State Police task force on internet crimes against children. The Indiana State Police said it unlocked 96 iPhones for various cases this year, each time with a warrant, using a $15,000 device it bought in March from a company called Grayshift.
[...] Hillar Moore, the district attorney in Baton Rouge, La., said his office had paid Cellebrite thousands of dollars to unlock iPhones in five cases since 2017, including an investigation into the hazing-related death of a fraternity pledge at Louisiana State University. He said the phones had yielded crucial information, and he was upset that Apple planned to close such a useful investigative avenue. "They are blatantly protecting criminal activity, and only under the guise of privacy for their clients," he said.
What would you do if you were a 19-year-old kid with $3.3 million? There are few people more equipped to answer that than teenaged bitcoin millionaire Erik Finman. His answer? You use some of that cash to build a Doctor Octopus-style exosuit and try and shake up the education system.
A Dutch construction company is about to 3D print five actually habitable homes near the city of Eindhoven. But can the technique replace brick and mortar?
Intel open-source developers today posted the set of patches for adding support for upcoming Whiskey Lake and Amber Lake processors for the Linux kernel's Direct Rendering Manager driver...
The BFR spaceship that Elon Musk wants to build for carrying mankind to Mars and beyond has posted its first job listing for an engineer.
She may be one of the most famous women in science history, but what is it that Augusta Ada King, Countess of Lovelace achieve to gain such eminence?
Sharks are often the subject of TV specials or news stories focusing on their attacks on humans. But scientists are finding that sharks could inspire a new type of surface that would attack bacteria, helping humans instead of hurting them. As reported in ACS Applied Materials & Interfaces, researchers have designed a coating that is infused with antimicrobial agents and has the patterned diamond-like texture of shark skin.
Fighting bacteria is an ongoing battle, resulting in more than 2 million infections and 23,000 deaths in the U.S. every year, according to the U.S. Centers for Disease Control and Prevention. As a result of overusing antibiotics, bacterial resistance to these drugs is on the rise. Patients in hospitals who are already battling illnesses or have compromised immune systems are especially at risk of developing infections just by touching contaminated bedrails and door knobs. Scientists have been developing coatings for these high-touch surfaces to fight the spread and growth of microbes. For example, Sharklet AF is a coating designed to mimic a shark's skin, and it reduces the ability of bacteria to adhere to surfaces. But long-term use will result in bacteria accumulation. James J. Watkins, Jessica D. Schiffman and colleagues wanted to see if adding titanium dioxide (TiO2) nanoparticles, which are antibacterial, to a shark skin material would efficiently fight off microbes.
The team printed their own shark skin surfaces with polymer and ceramic composites, and added titanium dioxide nanoparticles to them. The shark skin surface without nanoparticles reduced the attachment of E. coli by 70 percent compared to smooth films. But shark skin surfaces with TiO2 nanoparticles exposed to UV light for one hour killed off over 95 percent of E. coli and 80 percent of Staphylococcus aureus. The group says the fabrication method could be scaled up for mass production.
Read more of this story at SoylentNews.
By Ciarn Lee
I HAVE a confession to make: Im bored of quantum mechanics. This is an odd thing for a physicist to admit, but the most successful theory of modern physics has started to leave me cold. Perhaps I have just grown too used to its spooky predictions and its love of randomness. Or it might be the fact that, despite its many successes and the way it has captured popular imagination, there are hints that quantum mechanics isnt as accurate a picture of reality as some would have you believe.
The Cyber and Tech overnights have joined forces to give you Hillicon Valley, The Hill's new comprehensive newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team,...
Between the dust storms, thin atmosphere, and frigid temperatures, future Mars colonists are going to have it rough. But they wont even get a chance to battle the Martian elements unless we figure out a way to supply them with life-giving oxygen. It may seem impossible to do so organically on the barren red planet, but a new Science paper suggests a single Earth organism might be able to do the trick.
In the paper, published Thursday, an international team of researchers report that cyanobacteria, a huge family of tiny organisms that thrive in extreme environments, show promise as oxygen sources for future Mars colonists. Because they are photosynthetic, cyanobacteria thrive on carbon dioxide and energy from the sun, burping up oxygen as a byproduct just like plants. Theyre the ideal fresh air source for Mars, as long as they dont demand too much sunlight.
This might sound like science fiction, but space agencies and private companies around the world are actively trying to turn this aspiration into reality in the not-too-distant future, said study co-author and Australian National University Emeritus Professor Elmars Krausz, Ph.D., in a statement published Wednesday.
[Will Donaldson] has been making robot snakes of all sorts. One of his snakes hugs the ground, slithering across it with a sine wave motion. Flipping it on its side and calling different code, that same snake also moves like an inchworm. Another of his snakes lifts parts of itself upward to move sideways across the ground, again using sine waves.3D printed scales
At first, his slithering snake would only oscillate in place on the floor. Looking more closely at biological snakes, he found that part of the reason they moved forward was due to their scales. The scales move smoothly over the ground in one direction but grip when pushed backward or sideways. He also found work done at Harvard University where they combined pumped air and papercraft to make scales which change shape. And so [Will] designed and 3D printed some scales for his snake. However, as you can see in the video below, they didnt work on carpet.
His success came when he added wheels to each seg...
When I first tried switching to Firefox Quantum, the regression that bothered me most was Ctrl-W, which I use everywhere as word erase (try it -- you'll get addicted, like I am). Ctrl-W deletes words in the URL bar; but if you type Ctrl-W in a text field on a website, like when editing a bug report or a "Contact" form, it closes the current tab, losing everything you've just typed. It's always worked in Firefox in the past; this is a new problem with Quantum, and after losing a page of typing for about the 20th time, I was ready to give up and find another browser.
A web search found plenty of people online asking about key bindings like Ctrl-W, but apparently since the deprecation of XUL and XBL extensions, Quantum no longer offers any way to change or even just to disable its built-in key bindings.
I wasted a few days chasing a solution inspired by this clever way
of remapping keys only for certain windows using
getactivewindow; I even went so far as to write a Python
script that intercepts keystrokes, determines the application for
the window where the key was typed, and remaps it if the
application and keystroke match a list of keys to be remapped. So
if Ctrl-W is typed in a Firefox window, Firefox will instead
receive Alt-Backspace. (Why not just type Alt-Backspace, you ask?
Because it's much harder to type, can't be typed from the home
position, and isn't in the same place on every keyboard the way W
But sadly, that approach didn't work because it turned out my window manager, Openbox, acts on programmatically-generated key bindings as well as ones that are actually typed. If I type a Ctrl-W and it's in Firefox, that's fine: my Python program sees it, generates an Alt-Backspace and everything is groovy. But if I type a Ctrl-W in any other application, the program doesn't need to change it, so it generates a Ctrl-W, which Openbox sees and calls the program again, and you have an infinite loop. I couldn't find any way around this. And admittedly, it's a horrible hack having a program intercept every keystroke. So I needed to fix Firefox somehow.
But after spending days searching for a way to customize Firefox's keys, to no avail, I came to the conclusion that the only way was to modify the source code and rebuild Firefox from source.
Ironically, one of the snags I hit in building it was that I'd named my key remapper "pykey.py", and it was still in my PYTHONPATH; it turns out the Firefox build also has a module called pykey.py and mine was interfering. But eventually I got the build working.
I was lucky: building was the only hard part, because a very helpful person on Mozilla's ...
Posted by Jason A. Donenfeld on Jun 14Project write up is here:
Posted by Jakub Wilk on Jun 14* Marcus Brinkmann , 2018-06-14, 23:46:
IBM is pushing congressional leaders to update workforce legislation aimed at helping workers get technical skills necessary from the growing number of technology-related vocational jobs. In a letter, the legacy tech giant, leading a coalition...
Posted by Marcus Brinkmann on Jun 14This is the third (and for now last) in my series of GnuPG signature
Taxi app company Uber has applied for a patent to use artificial intelligence to determine how drunk potential passengers might be.
The app used to summon rides could also feed other information to the driver, including a passenger's location, how accurately they are typing and even the angle they are holding their phone at.
It could help drivers who do not want to pick up inebriated riders.
But critics said it could also be used to identify vulnerable passengers.
According to the application to the US patent office, the system would spot "uncharacteristic user activity".
Also at The A.V. Club.
Read more of this story at SoylentNews.
Chicago cuts deal with Musk's Boring Company to whisk passengers to O'Hare Airport underground on high-speed electric vehicles Illustration: Boring Company
On Thursday, the Chicago Infrastructure Trust, on behalf of the City of Chicago, announced that it was awarding Elon Musks Boring Company a contract to build a rapid-transit link between OHare Airport and downtown.
The trip currently takes about 40 minutes on public transportation; the Boring Company aims to cut that to 12 minutes, using electric shuttlesMusk calls them skatesto zip passengers through tunnels at 125 to 150 miles per hour, paying US $20 to $25 a rideroughly half the price of a taxi or Uber. The Chicago Tribune reported that the entire project is expected to come in under $1 billion.
The goal of the project, according to the Boring Companys web site, is to alleviate soul-destroying traffic.Illustration: Boring Company
Four companies had submitted competitive bids. The Boring Company was one of two finaliststhe other two were eliminated because of questions regarding their ability to deliver the critical project with no public subsidy, according to the Sun Times .
Musk will front the construction funds in return for a share of the fees paid by passengers and advertising revenue.
Its been a big month for the Boring Company. The companys Not-a-Flamethrower flamethrowers, sold out in preorders, recently started landing in customers hands (just in time for Californias fire season).
Astronomers have been watching the full fallout of a tidal disruption event for years.
A team of European scientists believes that their gene therapy research could prove to be a life-changing option for individuals who suffer from spinal cord injuries.
A research team from Kings College in London has taken a giant step toward helping paralyzed individuals regain control of their hands. In a recent experiment, the scientists have had success repairing spinal cord damage in rats using gene therapy.
The spinal cord is a cylindrical tube of nerve fibers and connected tissue that is enclosed within the spine. It carries instructions to virtually every part of the body, forming the central nervous system.
Since the release of Linux 4.17 almost two weeks ago, I haven't heard of any horror stories, Linux 4.17 continues running excellent on all of my test systems, the 4.17.1 point release was quite small, and more distributions are gearing up to ship this latest kernel release...
A patent maximalism council, serving the interests of patent trolls in Europe
Summary: The EPO keeps demonstrating lack of interest in genuine patent quality (it uses buzzwords to compensate for deviation from the EPC and replaces humans with shoddy translators); it is being aided by law firms which work for patent trolls and think tanks that propel their interests
Grnecker, Hoffmann Eitle, Maiwald and Vossius & Partner have finally found the courage to speak out against the EPO for at least some of its many scandals. Rest assured the German FCC will take note of that when dealing with several concurrent constitutional complaints regarding the EPO (like denial of travel to the World Cup which starts today and the UPC complaint).
Its a piece which promotes software patents using buzzwords like AI and 4IR (like in the EPOs Gazette, with a similar article there authored by Mnire).The UPC is dead. Team UPC has barely said anything about it for over a week and Bristows UPC blog has just moved goalposts to SPCs [1, 2]. As for Team Battistelli, it barely even mentioned that lately, except in some delusional statements from Battistelli himself (in the threatre which he manages).
As we have mentioned in this post the other day, something called 4iP Council (we hadnt heard of it before!) posted some puff piece for the EPOs fake economist (Battistellis new friend) Yann Mnire. Its a piece which promotes software patents using buzzwords like AI and 4IR (like in the EPOs Gazette, with a similar article there authored by Mnire). Hes clearly clueless on technical matters and his only quality appears to be 1) some degree; 2) being French and 3) being loyal to a corrupt president that loots the employer. The EPO is worse than a laughing stock these days. Its...
The Dawn spacecraft has entered its lowest-ever orbit around Ceres:
Dawn entered orbit around 1 Ceres on March 6, 2015. Up until this year, Dawn's orbits brought it no closer than 483 kilometers (300 miles) from the rock's surface. The complicated process of entering the new 27-hour, 13-minute orbit around the asteroid began on April 16th, when NASA engineers instructed Dawn to fire its ion engines. The new orbit has a periapsis of less than 48 km above the pockmarked surface of Ceres and an apoapsis of 4,000 km.
[...] Attaining a low orbit around Ceres object is no mean feat, as the asteroid's gravitational field is lumpy due to the asteroid's uneven composition. NASA engineers looked at over 45,000 possible trajectories before settling on the solution. A lower orbit will allow researchers to map Ceres's gravitational field and hence its internal mass distribution. Surprises may be in store, though: Dawn's reaction wheels failed earlier this year, so it now uses its hydrazine-fueled thrusters to control its orientation in space.
[...] We can enjoy the final closeups of Ceres before Dawn falls silent later this year. Then, the excitement in asteroid exploration will shift towards the arrival of the Japanese Aerospace Exploration Agency's Hayabusa-2 at 162173 Ryugu this July, as well as Osiris-REX's arrival at 101955 Bennu this August.
The most common flaw types are Cross-Site Scripting and Remote Command Execution, followed by implementation flaws and information disclosure.
It seems that the downward trend in the number of monthly notes is continuing. This month, a total of 14 security notes has been released, with only seven notes published today. Seven notes in total (50%) are tagged as High Priority or Hot News. reads the post published by Onapsis.
The first update is related to a Security Note released on April 2018 Patch Day, it addresses third-party web browser controls delivered with SAP Business Client, while the latter is an update for a Note released on November 2016 Patch Day that addresses an OS command injection vulnerability in the Report for Terminology Export component.
SAP June 2018 Security Patch Day also addresses four High severity vulnerabilities and four Medium risk flaws.
On 12th of June 2018, SAP Security Patch Day saw the release of 5 Security Notes. Additionally, there were 5 updates to previously released security notes. states the SAPs advisory.
The note does not contain many details, but mentions the vulnerability allows an attacker to access information which would otherwise be restricted. It does seem the se...
Researchers at QuTech in Delft have succeeded in generating quantum entanglement between two quantum chips faster than the entanglement is lost. Via a novel smart entanglement protocol and careful protection of the entanglement, the scientists led by Prof. Ronald Hanson are the first in the world to deliver such a quantum link on demand. This opens the door to connect multiple quantum nodes and create the very first quantum network in the world. Their results are published in Nature.
By exploiting the power of quantum entanglement, it is theoretically possible to build a quantum internet invulnerable to eavesdropping. However, the realization of such a quantum network is a real challengeit is necessary to create entanglement reliably on demand, and maintain it long enough to pass the entangled information to the next node. So far, this has been beyond the capabilities of quantum experiments.
Lawmakers at a hearing on Thursday scolded NASA officials over a recent report that found the space agency's major projects are running over-budget and over-schedule.Unfortunately, NASA has been plagued for years with contract management issues...
Facebooks top communications executive is stepping down after a decade with the company.Elliot Schrage, the social networks vice president for public policy and communications, announced the move on his Facebook page Thursday.After more than a...
[Rulof Maker] is a master at making things from salvaged parts, and being an Italian lover of espresso coffee, this time hes made an espresso machine. The parts in question are a piston and cylinder from an old motorbike, believe it or not, and parts from an IKEA lamp.
Why the piston and cylinder? For those not familiar with espresso machines, they work by forcing pressurized, almost boiling water through ground coffee. He therefore puts the water in the piston cylinder, and levers the piston down onto it, forcing the water out the bottom of the cylinder and through the waiting coffee grounds. Parts from the IKEA lamp form a base for the waiting cup to sit on.
Of course, he takes great care to clean out any burnt oil and gas before starting. We also like how he centers a lever arm on a U-shaped bolt using two springs. Clever. But see the master in action for yourself in the video below.
For more of [Rulofs] awesome hacks, check out his leg-mounted beer bottle underwater propulsion system and his surprisingly good sounding microphone made from hard drive parts.
Note: There are two places where the video below is briefly interrupted by a message about the media being offline. Dont worry, the video continues after them.
Summary: The astounding levels of abuse at the EPO have caused some of the EPOs biggest stakeholders to speak out and lash out, condemning the Office for mismanagement amongst other things
THE EUROPEAN Patent Office, EPO, is in a very bad state because many talented examiners are no longer there and the Office struggles to recruit talent. Money can buy some reputation, but it cannot bury a legacy of pure evil from Battistelli. Applicants (for patents and jobs) understand, more or less at least, whats going on.
Theres only half a month for the crook to still lead (i.e. destroy) the Office before his child Antnio Campinos takes over. Insiders say that Campinos intends to change pretty much nothing. Team Battistelli will remain in tact, protected by Herrnst (Ernst) and the rest of the Administrative Council.
Thankfully, some stakeholders have dare we say! unionised against the Office and have put forth a letter. Antnio Campinos too has received the relatively strongly-worded letter, warning about the damage Battistelli caused (without specifically mentioning Battistelli). A copy of the letter was also sent to Battistelli and Herrnst (Ernst), his boss who did pretty much nothing over the past year, at times even openly denying the decline in patent quality. Remember that EPO staff (about a thousand of them) already admitted a massive decline in patent quality a monumental effort to speak about it without risk of retribution.
Leading German patent law firms grew tired of the abusive and corrupt administration; we appreciate that, but why did they wait until a fortnight before Battistelli leaves? Is Campinos the main target audience of this letter? Hes indebted to Battistelli who gave him the job (or cemented the candidacy), so we very much doubt itll have an effect on him. Each year our law firms file more than 9500 patent applications with the EPO, said the authors of the letter. Will they consider reducing that as deterrence against the EPOs bad policies? They make some solid points; for example, the fifth point: If the users of the European system gain the impression that granted EP patents cannot be relied upon anymore due to insufficient search and examinat...
The Securities and Exchange Commission (SEC) said on Thursday that it does not consider the popular cryptocurrency ether to be a security. When we look at how ether today is operating, we see a highly decentralized network, and we dont see a...
A woman debilitated from Crohn's disease tells how vagus nerve stimulation changed her life Photo: Sean Owens
Four times a day, 29-year-old Kelly Owens holds a magnet over her chest, activating an implanted device that sends gentle electrical pulses up to a large group of nerve fibers in her neck. It makes her voice a little shaky while the stimulation is on. But thats nothing compared to the pain shes used to enduring.
Owens has Crohns disease, a condition that causes inflammation in the digestive tract. For Owens, the disease has been debilitating, causing pain not only in her gut, but also throughout her body.
She is one of 16 Crohns sufferers who have enrolled in an experimental trial in Europe where they receive electrical stimulation in an attempt to improve their symptoms. The therapy is part of a burgeoning branch of medicine called electroceuticals, or bioelectronic medicine.
The technique harnesses the fact that the human nervous system communicates in the language of electrical impulses. By hacking into that system with artificial impulses, researchers can change, and possibly correct, faulty, disease-causing communication.
Over the last decade, researchers have increasingly looked to electroceuticals to do what drugs and therapy traditionally do: improve memory, improve organ function, correct speech, treat vertigo, treat Parkinsons disease, alleviate depression, and even restore feeling and motion after paralysis.
In the ongoing Crohns trial, scientists are tapping into the language of the vagus nerve, which connects the brain to...
A company owned by Elon Musk has been chosen to dig an express route linking Chicagos downtown area to the OHare International Airport.The Boring Company on Thursday confirmed a report in The Chicago Tribune that said Mayor Rahm Emanuel...
A researcher at the center of the Cambridge Analytica data scandal will testify before a Senate panel next week. Aleksandr Kogan, a former Cambridge Analytica contractor who is said to have harvested data on 87 million Facebook users...
The top Democrat on the House Energy and Commerce Committee says that Facebook CEO Mark Zuckerberg has failed to follow up with the panel to answer questions that he couldnt during an April hearing.It has been nine weeks since Facebook CEO Mark...
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog