|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Posted by Guido Vranken on Nov 21Dear list,
I went to Le Guess Who in Utrecht, and it was very good. Heres a festival report.
The festival is spread out all over Utrecht, like here in front
of a church where
Le Mystre des Voix Bulgares performed. (The doors closed mysteriously before the huddled throng and nobody let us know what was happening, so we stood there for half an hour until most people decided by themselves that perhaps de kerk is vol.) But the main bulk of the concerts took place either in the enormodome TivoliVredenburg, or 30 minutes south in the De helling/Pastoefabriek/LE:EEN/etc cluster of venues.
If you are looking out for a SATA 2.5-inch HDD/SSD to USB3 adapter, the Sabrent EC-SS31 is quite simple, works with Linux, supports USB 3.1, and retails for about $10 USD...
The new rules are expected to be announced on Wednesday, whilst most Americans are distracted by getting home to loved ones for Thanksgiving.
This will then be followed by a vote on 10 December, which would see the 2015 rules designed to protect the internet being torn down.
[...] The important point, as we've said before, is that once the genie is out of the bottle, getting it back in is almost impossible and for our readers outside the US, don't think this doesn't affect you - everything that passes through US servers will be affected in some way and will knock on to you.
Read more of this story at SoylentNews.
Microsoft employee Tim Sneath, who spent no less than 17 years with the company, announced in a blog post that hes leaving the software giant to work for Google on the new Flutter mobile framework.
Sneath started his post by emphasizing how great Microsoft is, explaining that he company has incredibly diverse interests and is filled with talented people.
Despite the good parts, however, the former Microsoft Program Manager who worked on a series of projects for developers, discussed what he described as the missteps that the Redmond-based software giant embraced beginning with the Windows Vista era.
Sir, It is encouraging to see a pro-Linux article in The Irish Times, with Derek Scally promoting the many advantages of the free and open-source operating system, without glossing over the difficulties a user may have when installing and using it for the first time on their personal computer (Goodbye Apple, goodbye Microsoft hello Linux, Technology, Novem...
Many of us are visiting parents/relatives this
Thanksgiving/Christmas, and will have an opportunity to help our
them with cybersecurity issues. I thought I'd write up a quick
guide of the most important things.
ISIS capability as a transnational terrorist organisation continues to collapse. They are unable to bring recruits to controlled territory for training, but rather have to rely entirely on remotely managed raw amateurs who are ineffective and error prone. This shows that counterterrorism efforts are working effectively to limit the damage that ISIS, the organisation, can do. Unfortunately, their trained and battle hardened members who survive and escape will be extremely dangerous. Good newsright now they suck; bad newsthe post ISIS world is scarier.
This post will examine why having an entirely remote external operations arm is not a winning strategy for a terrorist group. The positives:
These apparent benefits are actually outweighed by the negatives of using only trained professional operatives. The negatives:
An effective terrorist organisation makes strategic use of violence to attempt to achieve the result they want. At its most generic this is some sort of utopian ideal (global communism, the caliphate, freedom, the independence and/or union of greater population group). Since achieving this vision is a matter of developing and executing a strategy (class warfare, removal of colonial ruling elites, agitating for political autonomy, etc.) the leaders of the group, the centre, must be able to use their military resources with strategic precision (in theory anyway.)
A purely remote control agent is basically the least strategically effective mechanism availablethe centre has no control over their targeting, timing, effectiveness, success rate; and there is basically no way to increase the amount of control over the remote agent. A group that is unable to execute operations that further their strategic goal is severely handicapped. Even worse, the application of violence to further strategic goal is extremely tricky as violence needs to be calibrated and targeted very specifically. Too much violence can reduce support, as can too little, and embarrassing or incompetent acts of violence can also reduce p...
Phoronix Test Suite 7.6 Milestone 3 is now available as the last planned development release ahead of the stable debut of 7.6.0-Alvdal...
The 2017 OWASP Top 10 is based on data from 23 contributors covering more than 114,000 applications. OWASP published on GitHub the data used for its report.
The categories have been selected based on the risk they pose, but what are the application Security Risks?
Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention. states the OWASP.
Sometimes these paths are trivial to find and exploit, and sometimes they are extremely difficult.
The OWASP Top 10 vulnerabilities are injection, broken authentication, sensitive data exposure, XML external entity (XXE), broken access control, security misconfiguration, cross-site scripting (XSS), insecure deserialization, using components with known vulnerabilities, and insufficient logging and monitoring.
The insufficient attack detection and prevention results from the merger of the current 4th and 7th items, Insecure direct object references and the Missing Function Level Access Control.
The categories have been merged into the item Broken access control that was dated back in 2004.
A team of researchers with the University of Georgia in Athens has developed a technique for controlling chemical reactions that release drugs inside the body. In their paper published in the journal Nature Catalysis, the group describes coating chemicals to prevent a reaction from occurring until the application of a magnetic field that releases a desired drug.
In some medical applications, it is better for a medical treatment if a chemical can be applied directly to a certain part of the body and nowhere else. Chemicals meant to treat tumors are the prime examplechemotherapy drugs act on every cell they contact, causing a host of negative side effects. In this new effort, the group took a novel approach to solving this problem, using a magnet to force coated chemicals together, prompting a drug releasing reaction.
To provide a means for controlling when chemicals come into contact inside the body, the researchers created tiny packets by first coating iron oxide nanoparticles with silica and then coating them further with two types of polymers, which, when combined, form a brush-like structure. Each of the packets was then loaded with either an enzyme or a substrate meant to react with the enzyme, and, of course, the drug to be released.
The technique is intended to better target chemotherapy in cancer treatments such that only tumors are exposed to the chemical agents. It is hoped the more precise targeting can avoid the side effects of chemotherapy.
Read more of this story at SoylentNews.
LED matrix displays and flat-screen monitors have largely supplanted old-school electromechanical models for public signage. We think thats a shame, but its also a boon for the tinkerer, as old displays can be had for a song these days in the online markets.
Such was the case for [John Whittington] and his flip-dot display salvaged from an old bus. He wanted to put the old sign back to work, but without a decent driver, he did what one does in these situations he tore it down and reverse engineered the thing. Like most such displays, his Hannover Display 7 x 56-pixel flip-dot sign is electromechanically interesting; each pixel is a card straddling the poles of a small electromagnet. Pulse the magnet and the card flips over, changing the pixel from black to fluorescent green. [John] used an existing driver for the sign and a logic analyzer to determine the protocol used by the internal electronics to drive the pixels, and came up with a much-improved method of sending characters and graphics. With a Raspberry Pi and power supply now resident inside the case, a web-based GUI lets him display messages easily. The video below has lots of details, and the code is freely available.
You may recall [John] from a recent edge-lit Nixie-like display. Looks like hes got a thing for eye-catching displays, and were fine with that.
President Trump said that AT&T's proposed merger with Time Warner is "not good for the country," one day after the Department of Justice (DOJ) announced it was suing to blog the $85 billion deal."Personally, Ive always felt that...
As were waiting for security researchers to detail the Intel Management Engine vulnerability that can allow attackers to run undetectable, unsigned code on machines with Intel processors, the US-based chip maker has announced the release of firmware that plugs a number of potentially critical flaws in Intel Management Engine (ME), Intel Trusted Execution Engine (TXE), and Intel Server Platform Services (SPS). What is Intel ME, TXE and SPS? Intel Management Engine (ME) is a subsystem More
Today, we heard from the Federal Communications Commission (FCC) about its plans to devastate Network Neutrality. Instead of responding to the millions of Americans who want to protect the free and open Internet, the FCC instead is ceding to the demands of a handful of massive ISPs, like Comcast, Verizon, and AT&T.
EFF will be analyzing the full plan when it is released. But based on what we know so far, its clear that Chairman Pai is seeking to reverse the 2015 Open Internet Order that established clear but light touch protections for Internet users and Internet innovation. The FCCs new approach invites a future where only the largest Internet, cable, and telephone companies survive, while every start-up, small business, and new innovator is crowded outand the voices of nonprofits and ordinary individuals are suppressed. Costs will go up, as ISPs take advantage of monopoly power to raise rates on edge providers and consumers alike. And the FCCs proposed plan adds salt to the wound by interfering with state efforts to protect consumer privacy and competition.
The FCC today abdicates a fundamental responsibilitybut Internet users wont. Today, and every day, we will fight to defend net neutrality. Tell Congress that lawmakers must act to defend our open Internet.
Contact Congress now.
On Saturday night an unknown hacker targeted the Sacramento Regional
This is a post from HackRead.com Read the original post: Sacramento Regional Transit System in California Held for $7,000 Ransom
Three years ago, EFF exposed how hundreds of law enforcement agencies were putting families at risk by distributing free ComputerCOP Internet safety software that actually transmitted keystrokes unencrypted to a third-party server. Our report also raised serious questions about whether the company was deceiving government agencies by circulating a bogus letter of endorsement from a top official in the U.S. Treasury Department.
This month, our suspicions were confirmed. A document obtained through the Freedom of Information Act shows that, in response to EFFs research, the Treasury Departments Inspector General launched an investigation into ComputerCOP. The final report concluded that the company had, in fact, doctored a government letter to improperly convince law enforcement agencies to spend asset forfeiture funds to buy the product.
Unfortunately, the report shows that ComputerCOP dodged criminal prosecution because the statute of limitations expired. Nevertheless, the records should serve as the final nail in the coffin for this software. It was bad enough that the software was proven dangerous; it is even worse for law enforcement agencies to do business with a company that federal investigators caught forging documents.
ComputerCOP is a CD-ROM (now also available on a USB storage stick) that promises to help parents protect their children from Internet predators. More than 240 agencies signed contracts with ComputerCOP, often worth tens of thousands of dollars. But the software was less about safety than it was about self-promotion. Elected law enforcement officialsincluding sheriffs, mayors and district attorneysplaced their images on the cover and recorded promotional videos about how the software was the first step to protecting children online. By and large, the free software giveaway was used to generate positive media coverage. In Arizona, for example, the software project was spearheaded by the Maricopa County District Attorney...
Anouk Wipprechts hackerly interests are hard to summarize, so bear with us. She works primarily on technological dresses, making fashion with themes inspired by nature, but making it interactive. If that sounds a little bit vague, consider that shes made over 40 pieces of clothing, from a spider dress that attacks when someone enters your personal space too quickly to a suit with plasma balls that lets her get hit by Arc Attacks giant musical Tesla coils in style. She gave an inspiring talk at the 2017 Hackaday Superconference, embedded below, that you should really go watch.
Anouk has some neat insights about how the world of fashion and technology interact. Technology,...
Speed cameras have been the focus of motorists' anger and frustration for years, although we are told repeatedly that they are an effective means of reducing death and injury on the roads. But is this really the case?
Whether speed cameras actually do save lives seems an easy assertion to test: measure the numbers of casualties at a site over a period, say two years; introduce a speed camera; re-measure the number of casualties over an equal period, and any reduction is due to the camera. But it's not really that simple. Many other factors are at play that might make cameras appear to be more effective than they really are. And these factors are often ignored when evaluating the performance of speed cameras at improving road safety.
Do speed cameras actually save lives?
[...] In road safety data, there is a general tendency for collision incidents at a site to reduce anyway following a short-term rise in their number, without any treatment (such as a speed camera) being applied. In statistics, this is known as regression-to-the-mean (or RTM). We also know that the long-term trend in collisions has generally been downward due to factors such as improved vehicle safety and better driver education[PDF].
So if we observe a reduction in casualties at a site following the installation of a camera, we need to ask how much of this reduction would have happened anyway (the RTM effect)? How much is due to general trends in road safety? And how much can we actually attribute to the camera itself?
[...] To make matters worse, half of the UK's fixed speed cameras may not even be turned on. So the situation is far from simple.
Methods to accurately account for RTM and trend often require knowledge of advanced statistics which may not always be available within a road safety team, and so it is likely that these confounding factors are not being considered consistently across the country.
[...] So, do speed cameras save lives? The answer is almost certainly yes, but probably not always to the extent that people are led to believe.
Whether an Enterprise SOC or an MSSP the challenges of too many alerts, disconnected tools and a shortage of analysts continue to plague security operations. Security Automation and Orchestration are increasingly looked to enable analysts to triage the tsunami of alerts flooding the organisation, provide context to accelerate investigation, and provide the playbooks and workflow to drive consistency and efficiency throughout security operations. In this webinar Amos Stern, CEO of Siemplify and, Arthur Hedge, CEO More
Its novel design makes this pumped hydro project nearly as flexible as a storage battery. Whether the market is ready for it remains to be seen Photo: Absaroka Energy An artist's rendering of the Gordon Butte pumped hydro facility shows the upper and lower reservoirs and nearby Colstrip transmission line.
A pumped hydro project in southcentral Montana could provide electric utilities in the Pacific Northwest with a US billion-dollar, 400-megawatt facility that mimics both a battery and a fast-start natural gas-fired plant.
The Gordon Butte pumped storage project received its 50-year operating license from the Federal Energy Regulatory Commission in December 2016. The project holds a water right issued by the state of Montana to withdraw water from a nearby stream to fill the project reservoirs, and replace water lost to evaporation and seepage.With a FERC license in hand, Gordon Butte is in search of a customer for its pumped hydro capacity.
According to Carl Borgquist, president and CEO of Bozeman, Montana-based Absaroka Energy, an engineering contract with a design-construction firm is almost complete. But the project is by no means assured.
For one thing, two 40-year-old coal-fired units at the Colstrip power plant in southeastern Montana would need to close as expected in 2022. The closure was agreed to in 2016 by Allentown, Penn.-based Talen Energy and Seattle-based Puget Sound Energywhich own and operate the two unitsand environmental groups that sued over air emissions from the 2,094 MW plant.
For another thing, at least one of a handful of Pacific Northwest utilities still needs to sign a long-term purchase power agreement (PPA) to buy flexible capacity and ancillary services from the pumped hydro project. That may not be as simple as it sounds: Few U.S. power markets have set a value for the kinds of capacity and ancillary services the project could provide.
Whats more, in a straight-up comparison of installed capacity costs, Gordon Butte loses, according to numbers crunched for Absaroka by the consultancy Energy and Environment Economics, Inc., and presented by Borgquist in February 2017.
The numbers show that the cost per kilowatt for 400 MW of pumped hydro capacity is around $2,250. By contrast, the cost for gas-fired capacityprovided by technology that ranges from an aeroderivative combustion turbine to a reciprocating enginewas calculated to b...
Apple told senators that capitulating to the Chinese government's ban on certain privacy apps would help the iPhone continue to "promote greater opennness [sic] and facilitate the free flow of ideas and information."The comments came...
If you are using the NVIDIA proprietary graphics driver and anxious to try out the Linux 4.15 kernel for its many new features/improvements, unfortunately you will need to wait a few days as the current public driver is broken against this latest code...
With gene drives, scientists are trying to supercharge evolution to eradicate malaria and save endangered species from extinction. But is this DARPA-funded tech safe enough to test in the wild? One of its creators isnt so sure.
We had reported over a year ago that Google is working on a new in-development operating system named Fuchsia, which is not Android or Chrome OS based. It instead runs on top of the real-time Magenta kernel instead of Linux. Fuchsia is based on a new microkernel called Zircon, derived from Little Kernel, a small operating system intended for embedded systems. It runs across cross computers, mobile phones, tablets, and Internet of Things (IoT) devices.
Android Police noted that some of the most recent code commits that Google is working to integrate Swift, an open-source programming language developed by Apple with its Fuchsia OS. Fuchsia already supports programming languages like Dart, a language similar to C developed by Google and other languages like C/C++ and Go.
For those unaware, Swift, the successor of Objective-C, is a relatively clean, fast and error-free programming language that can reduce the length of the code, saving time and energy. Developed by Apple, Swift is suitable for building applications for iOS, macOS, watchOS and tvOS. It can be mixed with existing C/Objective-C/C++ code on Apples own platforms.
The support for Swift on Fuchsia was spotted on GitHub repository via a pull request adding Fuchsia OS support to the compiler. It was created by a Google employee and there are discussions about splitting it into several smaller pull requests in order to make it easier to review the code changes.
Confirming the move in a tweet, Apples Swift creator, Chris Lattner who currently works at Google, suggesting that it plans to have its own code.
Swift at Google has enough folks working on it that we need a staging ground/integration point, and we decided it should be public. https://t.co/hyphe0KrU0
Chris Lattner (@clattner_llvm) November 15, 2017
Google intends to make a code to meet their special requirements by making changes to Swift, and releasing it to Swift official repository. In fact, Google has already done this work. Google developer Zac Bowling posted a message in his social media account, which says that Swift GitHub has established a pull request to require support for the Fuchsia OS in t...
Stuff will be flown into space for the purpose of burning it so people can look at it:
Meteor showers are an awe-inspiring sight, and skywatchers often plan well in advance for their shot at spotting shooting stars as they rain down from the heavens. The rare events have, up until now, been a totally natural phenomenon, but one company is planning on turning on-demand meteor showers into big business, and it's scheduled its first man-made shooting star showcase for early 2019.
The company, called ALE, has created a spectacle it calls Sky Canvas, and it's as close to controlled meteor showers as we may ever get. What makes it so interesting is that this isn't some kind of slight of hand or illusion, but actual material dropped from special satellites burning up in the atmosphere to produce a brilliant light show overhead. It's wild, wild stuff.
The cube-shaped satellites that control ALE's Sky Canvas are tiny less than two feet on each side but they carry the proprietary pellets that create the "shooting stars" and can be controlled remotely from the ground. On command, the satellites release their payload, which then falls to Earth and, after coming into contact with the intense friction of the atmosphere, ignite.
Manmade explosions over Hiroshima?
Read more of this story at SoylentNews.
Google Joan Feynman and you can feel the search behemoth consider asking for clarification. Did you mean: Richard Feynman? Image search is even more biased toward Richard. After maybe seven pictures of Joan, theres an endless scroll of Richard alone, Richard playing the bongos, Richard with Arline, the love of his life.
Yes, Joan was overshadowed by her older brother, but what physicist of the era wasnt? Richard didnt do it on purpose. In fact, no one supported Joans scientific dreams more than he did, not even their mother. Before Richard ever illuminated the world with his brilliance, he shined a light on his little sister, Joan.
Baby Joan works on the Feynman smirk. Image via r/physics
Joan Feynman was born in Queens, New York City in 1927 to Lucille and Melville Feynman, nine years after Richard came along. Both children were raised to be insatiably curious. Their parents encouraged them to always ask why, and to take notice of the world around them.
Joan deeply admired her brother and was always interested in whatever he was doing. Richard capitalized on this right away, making Joan his first student. He taught her how to a...
Reexaminations (akin to but not identical to IPRs) can help weed out stupid patents like the one below
USPTO patent quality (US 6368227 B1)
Summary: The battle over the right to criticise particular patents has gotten very real and the Electronic Frontier Foundation (EFF) fought it until the end; this is why we need granted patents to be criticised upon petitions too (and often invalidated as a result)
THE USPTO, prior to some recent reforms, had been granting a lot of dubious patents on software patents which were later invalidated by PTAB, the appeal board which is half a decade old (US patents typically last two decades).
GEMSA wrote to EFF accusing us of
false and malicious slander. It subsequently filed a lawsuit and
obtained an injunction from a South Australia court purporting to
require EFF to censor itself.
EFFWe are very gratified to see PTABs growth and the crackdown on software patents. Earlier today I saw this press release about a new software patent on brain segmentation (my field of research). Do examiners seriously think that computer vision is anything but software and reducible to mathematics? Did words like brain and fancy jargon like dynamic atlas make them think that this is not an algorithm? This is where PTAB comes handy and such stupid patents (as the EFF calls them) get invalidated as though they were never granted.
Late July, President Vladimir Putin signed a new law which requires local telecoms watchdog Rozcomnadzor to maintain a list of banned domains while identifying sites, services, and software that provide access to them.
Rozcomnadzor is required to contact the operators of such services with a request for them to block banned resources. If they do not, then they themselves will become blocked. In addition, search engines are also required to remove blocked resources from their search results, in order to discourage people from accessing them.
Removing entire domains from search results is a controversial practice and something which search providers have long protested against. They argue that its not their job to act as censors and in any event, content remains online, whether its indexed by search or not.
Nevertheless, on October 1 the new law (On Information, Information Technologies and Information Protection) came into effect and it appears that Russias major search engines have been very busy in its wake.
According to a report from Rozcomnadzor, search providers Google, Yandex, Mail.ru, Rambler, and Sputnik have stopped presenting information in results for sites that have been permanently blocked by ISPs following a decision by the Moscow City Court.
To date, search engines have stopped access to 786 pirate sites listed in the register of Internet resources which contain content distributed in violation of intellectual property rights, the watchdog reports.
The domains arent being named by Rozcomnadzor or the search engines but are almost definitely those sites that have had complaints filed against them at the City Court on multiple occasions but have failed to take remedial action. Also included will be mirror and proxy sites which either replicate or facilitate access to these blocked and apparently defiant domains.
The news comes in the wake of reports earlier this month that Russia is considering a rapid site blocking mechanism that could see domains rendered inaccessible within 24 hours, without any parties having to attend a court hearing.
While its now extremely clear that Russia has one of the most aggressive site-blocking regimes in the world, with both ISPs and search engines required to prevent access to infringing sites, its uncertain whether these measures will be enough to tackle ram...
Even very moderate activity levels can influence the risk of death, according to a new study led by the University of Buffalo. The study showed that there was a significant reduction of mortality risk in women over 65 who regularly engaged in light physical activites, such as household chores.
Yes, folding the laundry, ironing, vacuuming the house and other menial tasks might not seem the most glamorous of activities, but they may help you to live longer.
Hackers looking for a payout have hit the Sacramento Regional Transit (SacRT) system, defacing the agency website, erasing data from some of its servers, and demanding money to stop the attack and not do further damage. The attack According to the Sacramento Bee, the hackers announced their presence on Saturday (November 18) by placing a message on the agencys main webpage saying that they wanted to help the agency fix vulnerabilities. On Sunday, they began More
Colorado has slapped Uber with a nearly $9 million fine for letting dozens of drivers with serious criminal or motor vehicle offenses work for the ride-hailing firm, The Associated Press reported.The Colorado Public Utilities Commission...
This will crush Chinese innovation
Summary: China is becoming what the United States used to be in terms of patents, whereas the American system is adopting saner patent policies that foster real innovation whilst curtailing mass litigation
THE USPTO, together with US courts, may have done whats necessary to stave off at least some patent trolls. With software patents on the rocks, venue-shifting becoming tough and various other notable factors, patent trolls either go out of business [sic] or move somewhere else. Some of them go to China.
Even China, based on yesterdays blog post, is lost in an appalling trap of a patent gold rush. The Chinese government now signals that competing/emergent players (those which compete against state-connected giants) are to be banned. From the blog: While many past customs enforcement campaigns have focused on foreign rights owners (often big international brands), this one was carried out on behalf of domestic tech companies. China Daily explains that it is part of the governments plan to nurture Chinese companies with IP advantages in their exported goods. In planning the Soaring Dragon operation, the Shenzhen authorities selected patent owners that were deemed capable of independent innovation Huawei and ZTE chief among them.
The Chinese government now signals that competing/emergent players (those which compete against state-connected giants) are to be banned.So put another way, a quarter million products were denied access to the market. Who exactly benefits from that? Whatever the details behind the numbers GACC is publicly promoting, it concludes, the message is clear: if youre an innovative Chinese company and your patents are being infringed, the customs services is one of the tools at your disposal. The more proactive they become, the more potent a remedy this will be, especially for the likes of Huawei and ZTE.
Those are massive corporations. They now shield themselves with a massive number of low-quality patents, just like in the US. This actually suppresses innovation and reduces competition. Its like ITC in the US.
Earlier today Watchtroll...
Net neutrality proponents are planning a last-ditch holiday protest against the Federal Communications Commission's (FCC) move to scrap Obama-era rules. Protesters in cities including Phoenix, Denver, San Francisco, New York City,...
Security updates have been issued by Debian (ldns and swauth), Fedora (kernel and postgresql), Mageia (botan, krb5, and sssd), and Ubuntu (apport, linux, linux-aws, linux-gke, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-raspi2, linux-hwe, linux-lts-xenial, procmail, and samba).
The agency wants ideas for turning computers into lifelong learners Illustration: iStockphoto
Earlier this month a self-driving shuttle in Las Vegas patiently waited as a delivery truck backed up, then backed up some more, then backed right into it. Inconveniently for the roboshuttles developer Navya, this happened within hours of the shuttles inauguration ceremony. The real problem is that the shuttle cant learn from the incident the way a human would: immediately and without forgetting how to do everything else in the process.
The U.S. Defense Advanced Research Projects Agency (DARPA) is looking to change the way AI works through a program it calls L2M, or Lifelong Learning Machines. The agency is looking for systems that learn continuously, adapt to new tasks, and know what to learn and when. We want the rigor of automation with the flexibility of the human, says the programs director Hava T. Siegelmann. The US $65-million program has already chosen 16 groups for 4-year projects, but according to Siegelmann there is still opportunity to propose 12- or 18-month projects.
AIs big problem stems from the structure in use today. Neural networks are adaptable systems whose ability to learn comes from varying the strength of connections between its artificial neurons. Today these networks are trained on a set of dataimages of cars and people for example. The strength of a networks connections are then fixed, and the system goes out into the world to do its thing.
The problem comes when the AI encounters something it was never trained to recognize. Without retraining, the system would make the same mistake over and over again. But right now, AIs cant really be retrained on the job. Trying to do so with todays systems leads to a phenomenon called catastrophic forgetting, Siegelmann explained at the IEEE Rebooting Computing Conference. Its a situation where learning the new item disrupts the knowledge of all the other things the system already knew how to do.
Even humans suffer some performance drop when they encounter something new, but we can recover while still performing a function. If you raise the net in a basketball game by 30-centimeters, players will miss most of the time at first, but as they continue playing theyll learn to score at the new height. You dont have to pull them off the court and teach them the entire game over again....
For better or worse, pets often serve as inspiration and test subjects for hardware hacks: smarten up that hamster wheel, tweet the squirrel hunting adventures from a dogs point of view, or automate and remote control a reptile enclosure. [TheYOSH], a gecko breeder from the Netherlands, chose the latter and wrote TerrariumPi for the Raspberry Pi to control and monitor his exotic companions home through a convenient web interface.
The right ecosystem is crucial to the health and happiness of any animal that isnt native to its involuntarily chosen surroundings. Simulating temperature, humidity and lighting of its natural habitat should therefore be the number one priority for any pet owner. The more that simulation process is reliably automated, the less anyone needs to worry.
TerrariumPi supports all the common temperature/humidity sensors and relay boards you will find for the Raspberry Pi out of the box, and can utilize heating and cooling, watering and spraying, as well as lighting based on fixed time intervals or sensor feedback. It even supports location based sunrise and sunset simulation your critter might just think it never left Madagascar, New Caledonia or Brazil. All the configuration and monitoring happens in the browser, as demonstrated in [TheYOSH]s live system with public read access (in Dutch).
It only seems natural that Python was the language of choice for a reptile-related system. On the other hand, it doesnt have to be strictly used for reptiles or even terrariums; TerrariumPi will take care of aquariums and any other type of vivarium equally well. After all, we have seen the Raspberry Pi handling greenhouses and automating mushroom cultivation before.
Ajit Pai, the Republican chairman of the Federal Communications Commission (FCC), announced on Tuesday that the FCC will vote to roll back Obama-era net neutrality rules that require internet service providers to treat all web traffic...
We are in a multidimensional and fully internationalized carry trade game, folks, which means there is a very serious and tangible risk pool sitting just below the surface across worlds largest insurance companies, pensions funds and banks, the so-called mandated undertakings
Human well-being will be severely jeopardized by negative trends in some types of environmental harm, such as a changing climate, deforestation, loss of access to fresh water, species extinctions and human population growth, scientists warn in today's issue of BioScience, an international journal.
The viewpoint article"World Scientists' Warning to Humanity: A Second Notice"was signed by more than 15,000 scientists in 184 countries.
The warning came with steps that can be taken to reverse negative trends, but the authors suggested that it may take a groundswell of public pressure to convince political leaders to take the right corrective actions. Such activities could include establishing more terrestrial and marine reserves, strengthening enforcement of anti-poaching laws and restraints on wildlife trade, expanding family planning and educational programs for women, promoting a dietary shift toward plant-based foods and massively adopting renewable energy and other "green" technologies.
Global trends have worsened since 1992, the authors wrote, when more than 1,700 scientistsincluding a majority of the living Nobel laureates at the timesigned a "World Scientists' Warning to Humanity" published by the Union of Concerned Scientists. In the last 25 years, trends in nine environmental issues suggest that humanity is continuing to risk its future. However, the article also reports that progress has been made in addressing some trends during this time.
The article was written by an international team led by William Ripple, distinguished professor in the College of Forestry at Oregon State University. The authors used data maintained by government agencies, nonprofit organizations and individual researchers to warn of "substantial and irreversible harm" to the Earth.
"Some people might be tempted to dismiss this evidence and think we are just being alarmist," said Ripple. "Scientists are in the business of analyzing data and looking at the long-term consequences. Those who signed this second warning aren't just raising a false alarm. They are acknowledging the obvious signs that we are heading down an unsustainable path. We are hoping that our paper will ignite a wide-spread public debate about the global environment and climate."
Here is the official page where you can read the full article, endorse the arti...
In past few months, several research groups have uncovered vulnerabilities in the Intel remote administration feature known as the Management Engine (ME) which could allow remote attackers to gain full control of a targeted computer. Now, Intel has admitted that these security vulnerabilities could "potentially place impacted platforms at risk." The popular chipmaker released a security
Online applications could work as smoothly as the programs you install on your machine Photo: Gabriela Hasbun
What if you could share a computer-aided design (CAD) model and even allow a colleague to manipulate it from afar? Click on this link, check out my design, and feel free to add more holes or fill some in, you might say. You wouldnt have to instruct your distant coworker to install special software or worry about whether her operating system could run it. Imagine that all your programs and data were stored in the cloud and that even computationally intensive applications like multimedia editing ran just as well in your browser as they would if they had been installed locally.
Since the early days of the World Wide Web, a lot of smart, passionate people have wanted to make it into a vehicle for running almost any kind of program. What makes that dream so tantalizing is that the Web is different from other software platforms. Its defined by open standards, so anyone can build on it. Its not owned by any company, so developers are beholden only to their users. And its constructed largely around open-source technologies, so it has the potential to be very democratic.
Over the past three decades, a whole generation of developers has worked to make this vision a reality. Weve added new capabilities to the Web, like audio and video streaming, 2D and 3D graphics, typography, peer-to-peer communication, data storage, offline browsing, as well as multitouch, location, and camera inputs. But we continue to struggle with performance, specifically the ability to run Web applications as quickly as non-Web applications.
Denial of Service (DoS) attacks have been around as long as computers have been networked. But if your business relies on the Internet to sell products or collaborate, a DoS attack is more than a nuisance, it can be critical.
Over the past few years, the number of DoS attacks has continued to slowly grow in a cat and mouse evolution bad actors get a slightly stronger attack, and network vendors come up with slightly more resilient equipment to defend. Generally the attacks came from botnets comprised of infected computers and servers. The cost of acquiring and keeping these systems in the botnet was relatively expensive, so there was an economic limiter on how fast the attacks would grow. Then Mirai happened in 2016 and everything changed.
The Mirai botnet didnt struggle with corporate security teams and technical security controls like anti virus software and firewalls.
Instead, it focused on the millions of Internet of Things (IoT) devices like webcams and Internet routers in the home to build the botnet. With no security controls to overcome, the Mirai botnet was able to grow and launch Distributed Denial of Service (DDoS) attacks larger than ever seen before. A high-profile attack against Internet journalist Brian Krebs signaled that things had changed, then the October 2016 attack against DNS provider Dyn, showed how devastating a DDoS attack can be. And in the world of a cyber...
European researchers assemble the components for a new kind of cochlear implant Photo: CSEM Two of the vertical cavity surface-emitting lasers used in a new optical cochlear implant are shown here next to a matchstick. Each laser rests within a sapphire box.
Blinking lights could soon serve a whole new purpose. Recent findings have led German, Swiss, and Austrian researchers to develop a prototype hearing implant based on the concept that a series of laser pulses can trigger auditory signals from hair cells located within the inner ear.
An array of near-infrared lasers can produce a soundwave using whats called the optoacoustic effect, the researchers believe. In their device, tiny vertical cavity surface-emitting lasers, which pulsate light at a spectrum of 1.4 to 1.9 microns, act upon the fluid within the nautilus-shaped cochlear canals in the inner ear.
Basically, the infrared light is absorbed by the liquid inside the cochlea. A small fraction of the liquid will expand due to heat. If that happens rapidly enough, it generates a soundwave inside the duct of the cochlea. This stimulates or moves tiny hair cells located there, which in turn sends a signal along the auditory nerve which the brain understands as sound.
Over the last three years, the researchers have built tiny laser arrays and completed tests on guinea pigs, finding they could generate action potentials, the signals carried by auditory nerves, using vertical laser light and the optoacoustic effect. They compared stimuli in the guinea pigs from the laser array with an acoustic click. Both generated nerve signals matching in form and amplitude.
It is still early days but the hope is that this technology can be used to replace or improve hearing devices and cochlear implants, says Mark Fretz, a physicist and project manager at the Centre Suisse dElectronique et Microtechnique (CSEM), an applied research and technology nonprofit based in Alpnach, Switzerland.
The next steps would be to improve the energy efficiency of the device and make it smaller. Individual components developed for the prototypeincluding a tiny sapphire case for hermetically sealing implanted body sensors and an improved laser lens designmay also find other uses, such as allowing laser light to shine within the ear to improve balance.Illustration: Chittka and Brockman, PloS Biology...
Posted by Matthias Weckbecker on Nov 21Hi,
Tether, a start-up firm known for offering dollar-backed cryptocurrency has announced that hackers have
This is a post from HackRead.com Read the original post: Hackers steal $30 million worth of cryptocurrency in Tether hack
Last week we presented our initial benchmarks of the Intel Optane SSD 900P on Linux and it offers mighty performance potential for those using I/O heavy workloads thanks to the use of 3D XPoint memory. But is a solid-state drive like this really worth the price if you are just a Linux gamer? Here are some tests comparing load times and boot times between a HDD, SATA 3.0 SSD, NVMe SSD, and this 3D XPoint NVMe U.2 SSD.
Having a mold problem in your home is terrible, especially if you have an allergy to it. It can be toxic, aggravate asthma, and damage your possessions. But lets be honest, before you even get to those listed issues, having mold where you live feels disgusting.
You can clean it with the regular use of unpleasant chemicals like bleach, although only with limited effectiveness. So I was not particularly happy to discover mold growing on the kitchen wall, and decided to do science at it. Happily, I managed to fix my mold problems with a little bit of hacker ingenuity.
I did some research into the underlying causes of the issue. We know mold loves moisture, but the specific root of the problem seems to be a high relative humidity in the surrounding air.
There is a limit to how much water vapor the air can contain at a given temperature. Relative humidity is the percentage of that water vapor limit at the current air temperature. High relative humidity also makes condensation worse, another source of moisture for mold growth. The thing to know is that moisture is our enemy here and the unit of measure that gives us the most reliable information about that is relative humidity.
A study done in Tokyo (PDF warning) seemed to show that the magic num...
Once again crooks succeeded in publishing a malware in the official Google Play Store deceiving the anti-malware protections implemented by the tech giant.
The android malware is also able to intercept text messages and delete them from the victims device, in this way it could bypass 2FA implemented by banks.
Google removed at least four previous versions of this banking trojan from the Play Store from the beginning of the year, but crooks always succeeded in proposing a new variant infecting victims of major banks worldwide.
Another set of malicious apps has made it into the official Android app store. Detected by ESET security systems as Android/TrojanDropper.Agent.BKY, these apps form a new family of multi-stage Android malware, legitimate-looking and with delayed onset of malicious activity. reads the analysis published by ESET.
We have discovered eight apps of this malware family on Google Play and notified Googles security team about the issue. Google has removed all eight apps from its store; users with Google Play Protect enabled are protected via this mechanism.
Researchers from security firms ESET, AVAST, and...
The fiftieth TOP500 list has been released. Although there has been little change at the top of the list, China now dominates the list in terms of the number of systems, rising to 202 from 160 in June, with the U.S. falling to 143 systems from 169. However, this seems to be the result of Chinese vendors pushing more commercial systems to get on the list:
An examination of the new systems China is adding to the list indicates concerted efforts by Chinese vendors Inspur, Lenovo, Sugon and more recently Huawei to benchmark loosely coupled Web/cloud systems that strain the definition of HPC. To wit, 68 out of the 96 systems that China introduced onto the latest list utilize 10G networking and none are deployed at research sites. The benchmarking of Internet and telecom systems for Top500 glory is not new. You can see similar fingerprints on the list (current and historical) from HPE and IBM, but China has doubled down. For comparison's sake, the US put 19 new systems on the list and eight of those rely on 10G networking. [...] Snell provided additional perspective: "What we're seeing is a concerted effort to list systems in China, particularly from China-based system vendors. The submission rules allow for what is essentially benchmarking by proxy. If Linpack is run and verified on one system, the result can be assumed for other systems of the same (or greater) configuration, so it's possible to put together concerted efforts to list more systems, whether out of a desire to show apparent market share, or simply for national pride."
Sunway TaihuLight continues to lead the list at just over 93 petaflops. The Gyoukou supercomputer has jumped from #69 (~1.677 petaflops) in the June list to #4 (~19.136 petaflops). Due to its use of PEZY "manycore" processors, Gyoukou is now the supercomputer with the highest number of cores in the list's history (19,860,000). The Trinity supercomputer has been upgraded with Xeon Phi processors, more than tripling the core count and bringing performance to ~14.137 petaflops (#7) from ~8.1 petaflops (#10). Each of the top 10 supercomputers now has a measured LINPACK performance of at least 10 petaflops.
The #100 system has an Rmax of 1.283 petaflops, up from 1.193 petaflops in June. The #500 system has an Rmax of 548.7 teraflops, up from 432.2 teraflops in June. 181 systems have a performance of at least 1 petaflops, up from 138 systems. The combined...
Do you own an Android smartphone? If yes, then you are one of those billions of users whose smartphone is secretly gathering location data and sending it back to Google. Google has been caught collecting location data on every Android device owner since the beginning of this year (that's for the past 11 months)even when location services are entirely disabled, according to an investigation
When I first wrote about the interstellar interloper now called Oumuamua, I made reference to Arthur C. Clarkes Rendezvous with Rama because of the delightful symmetry between the novel and the object, though noting that were unlikely to find that A/2017 U1 is as intriguing as Clarkes mysterious starship bound for the Magellanics (see An Interstellar Visitor?). Still, an interstellar object entering the Solar System only to go careening back out of it could not help but recall Clarke, whose asteroid 31/439 wound up being artificial.
Then came the paper from Karen Meech (University of Hawaii Institute for Astronomy, where the object was first detected with the Pan-STARRS1 telescope). Drawing on data from telescopes around the world, Meechs team has been able to characterize our first nearby object from another stellar system, with equally delightful results. For it turns out that Oumuamua (pronounced oh MOO-uh MOO-uh) has an unusual axis ratio, being about ten times longer than it is wide. Jim Benford couldnt resist suggesting I show a cover from Rendezvous with Rama depicting just such an axis ratio, and I agreed wholeheartedly.
Any science fiction fan familiar with Clarke (and are there any who arent?) will have fun with the similarities, but how much do we actually know about Oumuamua? Meechs team based its conclusions on the objects shape on the fact that its brightness changed so dramatically as it rotated (spinning on its axis every 7.3 hours). Lance Benner, who specializes in radar imaging of near-Earth and main-belt asteroids at JPL, calls the axis ratio here truly extraordinary. We know of no Solar System objects elongated more than 3 times longer than they are wide.
Nothing in our Solar System, in other words, quite matches an object shaped like this. Of course, it might also look like the image below, courtesy of the European Southern Observatory.
Samsung, the South Korean technology giant, has accidentally confirmed the launch of a new foldable smartphone Galaxy X through the devices support page.
The support page is for a smartphone with the model number SM-G888N0, a label that is widely believed to be the upcoming Samsung Galaxy X. According to the Dutch site, Mobiel Kopen (as reported by Lets Go Digital) found a support page for the smartphone on Samsungs Korean site. Although, the support page doesnt provide specifications of the device, it does confirm the existence of a foldable smartphone. The SM-G888 had already received a few certifications from regulators including the Bluetooth SIG, Wi-Fi Alliance, and South Koreas own National Radio Research Agency, reports Mobiel Kopen.
One can expect Samsung to launch the Galaxy X initially in South Korea and also get it certified there. Based on the reception of the Galaxy X, it may decide when to release the device in the other countries. Also, since its a foldable smartphone, it might see a limited launch.
The post Samsung accidentally confirms foldable Galaxy X launch through live support page appeared first on TechWorm.
The latest variants of tech support scams targeting Apple users have done away with the usual visually prominent error messages. Instead, they open the potential victims default communication or phone call app, and prompt them to call the fake tech support scam hotline (the number is already prepopulated in the app): With click-to-call links, tech support scams do not have to be as elaborate as many current tech support scam websites. They dont have to More
The company plans to capture the printed display market from right under the noses of OLED manufacturers Illustration: Nanosys
Quantum dots have established themselves as a go-to material for photoluminescence, in which light is emitted when stimulated by a light source. Based on this capability, companies such as Nanosys have been able to help display companies like Samsung capture a growing segment of the display market from competing technologies such as LED-backlit LCD and organic light-emitting diode (OLED) displays.
Nanosys currently has more than 60 quantum dot-enabled products on the market, and the company now wants to make a big push to expand the capabilities of quantum dots beyond just photoluminescence into the area of electroluminescence, where photons are emitted in the presence of an electric field or current. Nanosys expects this development to lead to a new era of what Nanosys is terming: Electro Luminescent Quantum Dot (ELQD) displays.
Executives at Nanosys believe that ELQD displays have the potential to disrupt the display industry over the next decade. The displays dont need a backlight and, because each subpixel is addressable, the display wastes no energy while the light travels from the backlight to the pixel. This should translate into lower power consumption, along with wider viewing angles, purer colors, and perfect black levels, according to Jeff Yurek, Director of Marketing and Investor Relations at Nanosys.
We expect to see these displays in the three to five year timeframe, said Yurek. We think that quantum dots have the potential to deliver on the promise of OLED.
It has long been promised that OLEDs would someday be available in...
This is a walk through of the Ethernaut capture-the-flag competition where each challenge was an ethereum smart contract you had to break.
I did this at 2am in a hotel room in Romania and ended up not finishing the last challenge because I took too long and didn't want to re-record that part. Basically what I was missing in my malicious contract: a function to withdraw tokens from the victim contract (it would have work since I had a huge amount of token via the attack). I figured I should still upload that as it might be useful to someone.
At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards ubiquity, their impacts will likewise scale, as will their effects. In fact, 74 percent of CTOs today believe that cloud computing will have the most measurable impact on their business this year. Specifically in the area of file storage, the cloud has swiftly become the domain of governmental regulations, More
KrebsOnSecurity recently featured a story about a New Mexico man who stands accused of using the now-defunct vDOS attack-for-hire service to hobble the Web sites of several former employers. That piece stated that I wasnt aware of any other prosecutions related to vDOS customers, but as it happens there was a prosecution in the United Kingdom earlier this year of a man whos admitted to both using and helping to administer vDOS. Heres a look at some open-source clues that may have led to the U.K. mans arrest.
In early July 2017, the West Midlands Police in the U.K. arrested 19-year-old Stockport resident Jack Chappell and charged him with aiding the vDOS co-founders two Israeli men who were arrested late year and charged with running the service.
Until its demise in September 2016, vDOS was by far the most popular and powerful attack-for-hire service, allowing even completely unskilled Internet users to launch crippling assaults capable of knocking most Web sites offline. vDOS made more than $600,000 in just two of the four years it was in operation, launching more than 150,000 attacks against thousands of victims (including this site).
For his part, Chappell was charged with assisting in attacks against Web sites for some of the worlds largest companies, including Amazon, BBC, BT, Netflix, T-Mobile, Virgin Media, and Vodafone, between May 1, 2015 and April 30, 2016.
At the end of July 2017, Chappell pleaded guilty to those allegations, as well as charges of helping vDOS launder money from customers wishing to pay for attacks with PayPal accounts.
A big factor in that plea was the leak of the vDOS attacks, customer support and payments databases to this author and to U.S. law enforcement officials in the fall of 2016. Those databases provided extremely detailed inf...
See the Top 10 moments of 2017 Linux Foundation events, including a conversation with Linus Torvalds, a video created by actor Joseph Gordon-Levitt through his colloborative production company, the Diversity Empowerment Summit, and Auto Grade Linux in the new Toyota Camry.
Eighty-five per cent of senior executives plan to invest in artificial intelligence (AI) and the Internet of Things (IoT) by 2020, according to a new survey of UK digital leaders by Deloitte. The findings come from the first edition of a new regular report from Deloitte, the Digital Disruption Index. The index will track investment in digital technologies and create a detailed picture of their impact on the largest and most influential business and public More
The Global Cyber Alliance has given the world a new free Domain Name Service resolver, and advanced it as offering unusually strong security and privacy features.
The Quad9 DNS service, at 188.8.131.52, not only turns URIs into IP addresses, but also checks them against IBM X-Force's threat intelligence database. Those checks protect agains landing on any of the 40 billion evil sites and images X-Force has found to be dangerous.
The Alliance (GCA) was co-founded by the City of London Police, the District Attorney of New York County and the Center for Internet Security and styled itself "an international, cross-sector effort designed to confront, address, and prevent malicious cyber activity."
[...] The organisation promised that records of user lookups would not be put out to pasture in data farms: "Information about the websites consumers visit, where they live and what device they use are often captured by some DNS services and used for marketing or other purposes", it said. Quad9 won't "store, correlate, or otherwise leverage" personal information.
[...] If you're one of the lucky few whose ISP offers IPv6, there's a Quad9 resolver for you at 2620:fe::fe (the PCH public resolver).
Read more of this story at SoylentNews.
Despite concerns about identity theft and fraud, consumers dont plan to curb their holiday shopping, according to Discover. While 62 percent of consumers are very or moderately concerned about identify theft or fraud this holiday season, 73 percent, say concerns over recent data breaches wont affect how theyll go about their holiday shopping. Discover has commissioned its annual holiday shopping survey since 2004. Consumers are taking proactive steps to safeguard their identities When it comes More
SecurityMatters and Waterfall Security Solutions announced a global partnership to protect industrial control systems from the most advanced cyber threats. The joint solution integrates SecurityMatters SilentDefense network monitoring platform with Waterfalls Unidirectional Security Gateways to enable industrial enterprises to continuously and centrally monitor industrial control networks, while thoroughly protecting those networks from cyber attacks. SecurityMatters flagship product, SilentDefense, is an OT network monitoring and intelligence platform that empowers industrial operators with unrivaled visibility, threat detection More
At this year's Opensource.com Community Moderator's meeting in Raleigh, North Carolina, Red Hat CEO Jim Whitehurst made a comment that stuck with me.
"Open source's supply chain is source code," he said, "and the people making up that supply chain aren't very diverse."
Diversity and inclusivity in the technology industryand in open source communities more specificallyhave received a lot of coverage, both on Opensource.com and elsewhere. One approach to the issue foregrounds arguments about concepts that are more abstractlike human decency, for example.
In the Harry Potter universe, Professor Moody was, perhaps unfairly, given the nickname Mad Eye for the prosthetic eye he wore. His eye remains a challenge for technically-minded cosplayers aiming to recreate the look and feel of this unique piece of headgear. [cyborgworkshop] had already mastered the basic eye, but wanted to take things further.
The original build relied on a sub-micro servo to move the eyeball. This was done at random as an attempt to simulate the eyes behaviour in the books and films. However, wanting more, [cyborgworkshop] decided to make the eye more reactive to its surrounding environment. Using the Adafruit Huzzah, a breakout board for the ESP8266, code was whipped up to detect the number of WiFi access points in the area. The more access points, the more frequent and erratic the movement of the eye. Occasional slower periods of movement are coded in before the eye resumes its wild darting once more, depending on just how saturated the local WiFi environment is.
Pirate streaming boxes are all the rage this year. Not just among the dozens of millions of users, they are on top of the anti-piracy agenda as well.
Backed by the major film studios, the organization booked a significant victory earlier this year against Filmspeler. In this case, the European Court of Justice ruled that selling or using devices pre-configured to obtain copyright-infringing content is illegal.
Paired with the earlier GS Media ruling, which held that companies with a for-profit motive cant knowingly link to copyright-infringing material, this provides a powerful enforcement tool.
With these decisions in hand, BREIN previously pressured hundreds of streaming box vendors to halt sales of hardware with pirate addons, but it didnt stop there. This week the group also highlighted its successes against vendors of unauthorized IPTV services.
BREIN has already stopped 170 illegal providers of illegal media players and/or IPTV subscriptions. Even providers that only offer illegal IPTV subscriptions are being dealt with, BREIN reports.
In addition to shutting down the trade in IPTV services, the anti-piracy group also removed 375 advertisements for such services from various marketplaces.
This is illegal commerce. If you wait until you are warned, you are too late, BREIN director Tim Kuik says.
You can be held personally liable. You can also be charged and criminally prosecuted. Willingly committing commercial copyright infringement can lead to a 82,000 euro fine and 4 years imprisonment, he adds.
While most pirate IPTV vendors threw in the towel voluntarily, some received an extra incentive. Twenty signed a settlement with BREIN for varying amounts, up to tens of thousands of euros. They all face further penalties if they continue to sell pirate subscriptions.
In some cases, the courts were involved. This includes the recent lawsuit against MovieStreamer, that was...
The melting Antarctic ice stream that is currently adding most to sea-level rise may be more resilient to change than previously recognised. New radar images reveal the mighty Pine Island Glacier (PIG) to be sitting on a rugged rock bed populated by big hills, tall cliffs and deep scour marks. Such features are likely to slow the ice body's retreat as the climate warms, researchers say. The study appears in the journal Nature Communications [open, DOI: 10.1038/s41467-017-01597-y] [DX].
"We've imaged the shape of the bed at a smaller scale than ever before and the message is really quite profound for the ice flow and potentially for the retreat of the glacier," said lead author Dr Rob Bingham from Edinburgh University. "Where the bed is flat - that's where we will see major retreat. But where we see these large hills and these other rough features - that's where we may see the retreat slowed if not stemmed," he told BBC News.
Read more of this story at SoylentNews.
It's been a while since last doing any Linux boot speed comparisons while this morning I have some numbers to share when looking at the boot performance from the Linux 4.6 kernel through Linux 4.15 Git to see how it's changed over time,..
If you plan on immersing yourself into the booming world of ecommerce, you need a dynamo tool that can propel you to the heights of success. The platform you choose needs an appealing and effective range of features for displaying your goods and collecting funds. And it needs to be as intuitive as it is powerful.
The multitude of ecommerce platforms have a lot to offer. Many of these solutions make it easy enough for novices to master creating professional storefronts, uploading products, establishing checkout processes and and all the other ecommerce ins-and-outs.
There are plenty of well-known options for merchants to choose from, such as Shopify, Magento and WooCommerce. Today I will give you the skinny on another one of the most popular solutions on the market: BigCommerce.
BigCommerce offers users a vast selection of powerful features that provide value to both ecommerce veterans and rookies. Despite a relatively simple interface and design, BigCommerce still touts high-level capabilities, effectively creating a one-stop shop for all of a merchants needs. Its not a perfect platform, but its pretty darn close.
Is BigCommerce your ideal ecommerce partner? Lets find out.
Packages and Offerings
For anyone who wants to test out BigCommerces features or interface, check out the 15-day free trail. Thats a good chunk of time to see if the platform is suited to your brands needs.
BigCommerce has four different tiers of service: Standard ($29.95/month), Plus ($79.95/month), Pro ($249.95/month), and Enterprise (custom).
Unlike other ecommerce solutio...
Again some bad news for cryptocurrency users. Tether, a Santa Monica-based start-up that provides a dollar-backed cryptocurrency tokens, has claimed that its systems have been hacked by an external attacker, who eventually stole around $31 million worth of its tokens. With a market capitalization of $673 million, Tether is the world's first blockchain-enabled platform to allow the
Last week was equally spent on refactoring, bugfixing and infrastructure. We're looking for replacement our oldish server and it seems that rented server or virtual hosts seems to be best fit for us these days. Still there are quite some choices to consider.
I've done quite some development as well - I'm most happy with Util::linkOrButton refactoring which helped to cleanup the code quite a lot, but there were other fixes and improvements as well.
After apologizing how they handled the EGLStreams proposal for NVIDIA Wayland support, James Jones of NVIDIA is trying to get the development of their proposed generic device memory allocator library back on track...
Little did I know that learning about Chomsky would drag me down a rabbit hole back to regular expressions, and then magically cast regular expressions into something that fascinated me. What enchanted me about regular expressions was the homonymous linguistic concept that powered them.
Here are some early AMD Radeon Linux gaming benchmarks using the in-development Linux 4.15 kernel. Unfortunately, there are a few performance regressions...
A committee of top tier infosec heavy weights (and a half dozen interns) got together and wrote a guide to campaign information security. Its a fine document produced by a lot of talented people and definitely a good starting point. Indeed, it mirrors much of the advice I put together in August 2016 for political campaigns. Im sure the authors have considerably more expertise on the details and ground realities of political campaigns than I do. Still, theres some additional content that I believe is worth sharing, perhaps it will be of use to someone.dont fear the trolls, f#*k with them.
Rule #1: your objective is not dont get hacked, your objective is dont let the adversary get useable information
The first and most important thing to keep in mind that your goal is to deny the adversary useful information. Not getting hacked is certainly the first step towards that goal, but it is not the final step.
Rule #2: authenticity is the only thing that people believe.
If the worst case scenario happens and the adversary begins leaking your data, verify that it hasnt been tampered with or altered. The Soviets preferred a mixture of 9 parts truth to 1 part dezinfomatsiya for their influence operations. When you encounter an alteration or manipulation, you must immediately expose it by showing the original. This robs the adversary of authenticity. Their lost credibility is your gain.
Rule #3: the e in email stands for evidence
Do not use email for anything that isnt routine or mundane (anyone hungry? Lets get lunch, is ok, gossip or rumours is not.) Communications are critical and in descending order of preference:
Rule #4: use deception to lure the adversary out
Get a Canary for your office network and configure it as a file or email server. They are ridiculously easy to setup, theyre cheap, they have essentially zero false positives. This means that an alert from the Canary is highly likely to be indicative of malicious activity on your network.
Rule #5: use deception to consume the adversarys analytic resources
Your team can focus on a limited number of real files whil...
Intel continues bringing up support for the 2019 Icelake processors within the open-source compiler toolchains...
In our view, to get the most from space-science programmes in terms of impacts on research and reputation government agencies and institutions need to choose, manage and assess missions in ways that optimize the scientific outputs. As heads of space-science agencies and institutes from around the world gather at a forum next week in Beijing to identify principles for maximizing returns on such missions, we call on them to put science first.
Put research goals first when prioritizing and managing national and international projects, urge Ji Wu and Roger Bonnet.
Just days after David Airlie landed R600g image shader support and other patches for this Radeon HD 2000 through HD 6000 series open-source driver, he's enabled support for another GL4 extension...
A bug bounty hunter shared evidence; DJI called him a hacker and threatened with CFAA.
DJI, the Chinese company that manufactures the popular Phantom brand of consumer quadcopter drones, was informed in September that developers had left the private keys for both the "wildcard" certificate for all the company's Web domains and the keys to cloud storage accounts on Amazon Web Services exposed publicly in code posted to GitHub. Using the data, researcher Kevin Finisterre was able to access flight log data and images uploaded by DJI customers, including photos of government IDs, drivers licenses, and passports. Some of the data included flight logs from accounts associated with government and military domains.
Finisterre found the security error after beginning to probe DJI's systems under DJI's bug bounty program, which was announced in August. But as Finisterre worked to document the bug with the company, he got increasing pushbackincluding a threat of charges under the Computer Fraud and Abuse Act (CFAA). DJI refused to offer any protection against legal action in the company's "final offer" for the data. So Finisterre dropped out of the program and published his findings publicly yesterday, along with a narrative entitled, "Why I walked away from $30,000 of DJI bounty money."
-- submitted from IRC
Read more of this story at SoylentNews.
Fn, a new serverless open source project was announced at this years JavaOne. Theres no risk of cloud lock-in and you can write functions in your favorite programming language. You can make anything, including existing libraries, into a function by packaging it in a Docker container. We invited Bob Quillin, VP for the Oracle Container Group to talk about Fn, its best features, next milestones and more.
This unusual activity was first spotted by The Next Webs Director Matt Navarra along with some users who flocked across different social media sites complaining about facing the same problem.
Its not just you!
Facebook seems to have removed the Delete post option
Matt Navarra (@MattNavarra) November 17, 2017
Some suggested that it could be a temporary bug and some claiming that Facebook has intentionally deleted this feature.
However, a newest update confirmed that the company didnt remove the delete post button and its still in its beta period. Instead, it appears that the delete post option was disabled for a large group of users leading to the rumor that one would no longer be able to remove posts. For desktop users looking to access the delete post option can still see it in the activity log section.
On the other hand, there were many others who reported to still have the delete post option in their profiles, which leaves one guessing if Facebook has restored the feature after a lot of users started complaining about the inability to delete something they posted on Twitter and on Facebook.
While the company has yet to officially address this issue, it makes one think if Facebook has again played mind games with its users. In the past, the company had deliberately labelled posts as Fake News to test peoples reaction. This is a developing story and we shall keep you updated once we receive information on it.
The post Did Facebook remove delete post option from the desktop website? appeared first on TechWorm.
AT&T says its not enough to deploy white box hardware and to orchestrate its networks with the Open Network Automation Platform (ONAP) software. Each individual machine also needs its own operating system, writes Chris Rice, senior vice president of AT&T Labs, Domain 2.0 Architecture, in a blog post.
[Sean Hodgins]s calls his three-part video series an Arduino Neural Network Robot but wed rather call it an enjoyable series on prototyping, designing a board with surface mount parts, assembling it, and oh yeah, putting a neural network on it, all the while offering plenty of useful tips.
In part one, prototype and design, he starts us out with a prototype using a breadboard. The final robot isnt on an Arduino, but instead is on a custom-made board built around an ARM Cortex-M0+ processor. However, for the prototype, he uses a SparkFun SAM21 Arduino-sized board, a Pololu DRV8835 dual motor driver board, four photoresistors, two motors, a battery, and sundry other parts.
Once hes proven the prototype works, he creates the schematic for his custom board. Rather than start from scratch, he goes to SparkFuns and Pololus websites for the schematics of their boards and incorporates those into his design. From there he talks about how and why he starts out in a CAD program, then moves on to KiCad where he talks about his approach to layout.
Part two is about soldering and assembly, from how he sorts the components while still in their shipping packages, to tips on doing the reflow in a toaster oven, and fixing bridges and parts that arent on all their pads, including the microprocessor.
In case you want to replicate this, [Sean]s provided a GitHub page with BOM, code and so on. Check out all three parts below, or watch just the parts that interest you.
[Sean]s neural network is one that learns using supervised learning, an approach where you iterate through a table of inputs and expected outputs. If you instead want your robot to learn from experimenting in its environment, called unsupervised learning, then c...
This is what I get when I log in
O-called social networks (Ive coined the term social control networks for these) are supposed to facilitate a diversity of views. Not threats. Not calls for genocide. These strands of speech constitute violations of very particular laws and for defensible reasons. But the point being, let people express their views, even if and when you disagree with these views.
I am not vulgar, I dont really curse, and I dont write negatively about vulnerable groups; my criticisms are usually directed at large organisations, institutions, corporations, political parties and so on. I never really considered myself worthy of censorship of any kind, yet Twitter has, on several occasions, shadowbanned me for no reason at all or simply because I was being bullied (shadowban by algorithms can lead to that). Time-limited shadowbans are not so severe because the user is typically not aware of them and can still post (albeit the audience is severely limited, its almost like talking to oneself sometimes).
Twitter, to its credit, never ever suspended me. Ever. The funny thing is that people in Mastodon say that I should delete Twitter and not participate in it. Eventually, as it turns out, its actually Mastodon that censors me. Its an actual suspension for which I have not been given reason other than some people reporting me (as if that alone merits action, DMCA-style).
I am guessing that the suspension will eventually be undone, but that may still result in self-censorship. I was actually very surprised when it happened and spent over an hour investigating what I assumed to be a technical fault. The above says error; it does not tell me that I got suspended.
As Mastodon has just suspended me
mastodon.technology to be precise), I believe it can
do it to virtually anyone. Apparently all it takes is a complaint
citing something from the rather vague ToS, which can be
interpreted as dont cause people offense (or make an oppressive
environment whatever exactly that may mean). Even without insulting
any other user let alone a mention of another user ones views/links
can apparently get one the boot, without as little as due process
of some kind.
Mastodon was always known to be tough on Nazis; it was known that they were strict on free speech only to a degree. After the treatment that I received yesterday, however, I can no longer recommend Mastodon. It may be Free software, but its very weak on free speech.
The most insul......
The researcher Will Dormann from the Carnegie-Mellon CERT has discovered the Address Space Layout Randomisation (ASLR) isnt properly implemented in versions of Microsoft Windows 8 and newer.
Actually, with Windows 7 and EMET System-wide ASLR, the loaded address for eqnedt32.exe is different on every reboot. But with Windows 10 with either EMET or WDEG, the base for eqnedt32.exe is 0x10000 EVERY TIME.
Conclusion: Win10 cannot be enforce ASLR as well as Win7! pic.twitter.com/Jp10nqk1NQ
Will Dormann (@wdormann) November 15, 2017
The Address Space Layout Randomization (ASLR Protection) is a security mechanism used by operating systems to randomize the memory addresses used by key areas of processes, it makes hard for attackers to find the memory location where to inject their malicious code.
The Address Space Layout Randomisation is particularly effective against stack and heap overflows and is able to prevent arbitrary code execution triggered by any other buffer overflow vulnerability. The security measures are present in almost any modern operating system, including Windows, Linux, macOS, and Android.
Applications running on Windows 8 and newer versions were allocated addresses with zero entropy, this means that it was possible to predict where the code is allocated in memory due to the failure of the randomisation. Windows 10 has the problem, too.
The CERT/CC published a security advisory late last, Dormann found the ASLR issue while he was analyzing a recently fixed bug in Microsofts equation editor, tracked as CVE-2017-11882, that could be exploited by remote attackers to install a malware without user interaction.
Microsoft Windows 8 introduced a change in how system-wide mandatory ASLR is implemented. This change requires system-wide bottom-up ASLR to be enabled for mandatory ASLR to receive entropy. Tools that enable system-wide ASLR without also setting bottom-up ASLR will fail to properly randomise executables that do not opt in to ASLR. states the security advisory.
Quoted from the http://tidbits.com/article/17633: "If you're running macOS 10.12 Sierra or earlier, and do not want to upgrade to 10.13 High Sierra right now, be careful because Apple has started pushing High Sierra to older Macs and making it all too easy to upgrade inadvertently." [...]
Read more of this story at SoylentNews.
The Algerian state telecom operator Algerie Telecom confirmed on Friday that it was hit by a series of cyber attacks aimed to hack and disrupt its system.
The company was able to repel the attack and security services managed to identify and arrest the attackers.
At the time of writing, there are no further details about the attacks or the motivation of the hackers.
According to a statement issued by the company, its staff was able to protect the operational infrastructure with the help of security services.
The rapid increase in the number of cyber attacks is raising concerns in Algeria especially over the security of recently launched services, such as the recently adopted e-payment system for electricity and water bills.
Iman Houda Faraoun, Minister of Post, Information and Communication Technologies and Digital Economy, said the e-commerce bill, which had been approved by the Council of Ministers, will come into force as soon as it is approved by the parliament. reported the Xinhuanet.com website.
She promised that the e-commerce process will be fully protected, as e-financial transactions data, invoices and postal and bank cards will remain confidential.
(Security Affairs Algerie Telecom, hacking)...
Chipmaker Marvell Technology Group Ltd (MRVL.O) said it would buy smaller rival Cavium Inc (CAVM.O) in a $6 billion deal, as it seeks to expand its wireless connectivity business in a fast consolidating semiconductor industry.
[...] Hamilton, Bermuda-based Marvell makes chips for storage devices while San Jose, California-based Cavium builds network equipment. "With Marvell facing secular challenges on its core chip business, this acquisition is a smart strategic move which puts the company in a stronger competitive position for the coming years," said GBH Insights analyst Daniel Ives.
Marvell, which has been trying to diversify from its storage devices business, had come under pressure from Starboard Value LP last year, when the activist investor called the company undervalued. "This is an exciting combination of two very complementary companies that together equal more than the sum of their parts," Marvell's Chief Executive Matt Murphy said in a statement.
Also at Ars Technica.
Related: HPC Chips Abound
Read more of this story at SoylentNews.
In July of 2016 a game was released that quickly spread to every corner of the planet. Pokemon Go was an Augmented Reality game that used a smart phones GPS location and camera to place virtual creatures into the persons real location. The game was praised for its creativity and was one of the most popular and profitable apps in 2016. Its been download over 500 million times since.
Most of its users were probably unaware that they were flirting with a new and upcoming technology called Augmented Reality. A few day ago, [floz] submitted to us a blog from a student who is clearly very aware of what this technology is and what it can do. So aware in fact that they made their own Augmented Reality system with Python and OpenCV.
In the first part of a multi-part series the student (we dont know their name) walks you through the basic structure of making a virtual object appear on a real world object through a camera. He 0r she gets into some fairly dense math, so you might want to wait until you have a spare hour or two before digging into this one.
Thanks to [floz] for the tip!
[...] Torvalds has long been unafraid to express himself in whatever language he chooses on the kernel and has earned criticism for allowing it to become a toxic workplace. He's shrugged off those accusations with an argument that his strong language is not personal, as he is defending Linux rather than criticising individuals. On this occasion his strong language is directed at a team and Cook's approach to security, rather than directly at Cook himself. It's still a nasty lot of language to have directed at anyone.
PULL] usercopy whitelisting for v4.15-rc1
[Linus' Response]: Re: [GIT PULL] usercopy whitelisting for v4.15-rc1
Read more of this story at SoylentNews.
LibreELEC is a minimal operating system dedicated to running the Kodi media centre. LibreELEC runs on x86 personal computers and ARM-based computers, such as the Raspberry Pi. The project has released LibreELEC 8.2.1 which features time zone fixes and security improvements to Samba network shares. "LibreELEC 8.2.1 is....
Over at Newsweek, Hannah Osborne is reporting - First Human Head Transplant Successfully Performed on Corpse, Sergio Canavero Announces Key bits:
Scientists have carried out a head transplant on a human corpse, the neurosurgeon behind the operation has announced.
At a press conference in Vienna, Austria, Sergio Canavero said his team was able to remove the head from one body and connect it to the body of another by fusing the spine, nerves and blood vessels. He said the next step will be to carry out the operation on a living person, The Telegraph reports.
"The first human transplant on human cadavers has been done. A full head swap between brain dead organ donors is the next stage, he said. "And that is the final step for the formal head transplant for a medical condition which is imminent.
Canavero said a high number of people have volunteered to be his first head transplant patient. It is thought he will carry out the operation in China in December.
Because, of course, some of us are aware of the special dynamics of the intersection between Ethics, Journalism, and the Chinese government.
And then the next kicker to sufficiently anti-bait the click:
The Italian neurosurgeon did not present any evidence of his claims at the conference.
But, who knows what gruesome story we'll hear about in December.
Read more of this story at SoylentNews.
He said, she said.
Kaspersky: Yes, we obtained NSA secrets. No, we didnt help steal them.
Moscow-based AV provider challenges claims it helped Russian spies.
Posted by Graham Leggett on Nov 20CVE-2017-15044: DocuWare FullText Search - Incorrect Access Control vulnerability
Its often said that Less is More, and we think that the chic ESP8266 environmental monitor posted by Thingiverse user [bkpsu] definitely fits the bill. Dubbed Kube, the device is a 3D printed white cube with an OLED display in the center, which [bkpsu] says was designed specifically for the approval of his wife. Weirdly, she didnt like the look of bare PCBs on the wall.Multiple Kubes allow for whole-house monitoring.
Inside, things are a little more complex. The Kube uses the NodeMCU development board, and a custom breakout that [bkpsu] designed to interface with the display and sensors. For temperature and humidity monitoring, the Kube is using the ever-popular DHT22, and [bkpsu] mentions that he has future plans for things like motion sensors and direct control of RGB LED strips. All the data collected by the Kube is piped into openHAB via MQTT.
On the very detailed Thingiverse page, [bkpsu] gives background information on his design goals for the project, tips for printing out a high-quality case, a parts list with Amazon links, and pinout information for getting it all wired up. The PCB is even available on OSH Park for those who want a Kube of their own.
Even with all the stick home monitoring and automation products on the market today,...
The Texas Rangers have served Apple a warrant for iPhone and iCloud data connected to the recent mass shooter Devin Patrick Kelley. However, it is unknown whether Kelley actually used iCloud to store data, and unlikely that Apple will be able or willing to help unlock the iPhone:
Texas Rangers investigating the mass shooting in Sutherland Springs have served a search warrant on Silicon Valley giant Apple Inc. and are seeking digital photos, messages, documents and other types of data that might have been stored by gunman Devin Patrick Kelley, who was found with an iPhone after he killed himself.
Court records obtained by the San Antonio Express-News show Texas Ranger Kevin Wright obtained search warrants on Nov. 9 for files stored on Kelley's iPhone, a second mobile phone found near his body and for files stored in Kelley's iCloud account Apple's digital archive that can sync iPhone files.
The iCloud feature is an optional service. Obtaining such records, if they exist, directly from Apple could aid authorities investigating the worst mass shooting in modern Texas history. Apple's policy regarding iCloud content states that material may be provided to law enforcement agencies if they obtain search warrants.
In addition, the FBI may have already screwed it up.
Read more of this story at SoylentNews.
Technology has been developed to approach, grasp, manipulate, modify, repair, refuel, integrate, and build completely new platforms and spacecraft on orbit, he said. But the lack of clear, widely accepted technical and safety standards for on-orbit activities involving commercial satellites remains a major obstacle to the expansion of the industry.
Musk seems to be talking about something different, a sports car that could hop over obstacles. The emphasis would, presumably, still be on performance and practicality with four wheels on the ground.
Hi all customers!
- I have team group hacked the cvv and many tools,update everyday for sell.
- I do business professional and quality.
- I'm a seller good,honest and always sell cvv good and fresh with high balance.
- My tools has tested before sell.
- I hope to get many good customers and will be long time
- I have sell cvv,fullz ,track,dumps,rdp,leads,paypal account,bank login,walmart,shell,smtp,ups,aliexpress, discover
ICQ:698019125>sell cvv,fullz ,track,dumps,rdp,leads,paypal account,bank login,walmart,shell,smtp,ups
Former Executive Secretary to UNFCCC, Christiana Figueres has laid down a challenge to UNEP FIs banking members, and the wider finance industry to increase their allocations to low carbon investments to avoid a 2 degrees scenario. Watch her recording which she made for participants at UNEP FIs Europe Regional Roundtable on Sustainable Finance which took place in October 2017.
Former Vice President and Chairman of Generation Investment Management, Al Gore, introduces PRI, UNEP FI and The Generation Foundations Fiduciary duty in the 21st century programme. The project finds that, far from being a barrier, there are positive duties to integrate environmental, social and governance factors in investment processes.
Federal Communications Commission (FCC) Chairman Ajit Pai will reportedly seek to completely repeal net neutrality rules put in place under former President Obama, according to a Monday report.Sources close to the matter tell Politico that...
Fifty years since the first United Nations Conference on the Exploration and Peaceful Uses of Outer Space (1968 2018): UNISPACE+50 United Nations Office for Outer Space Affairs (UNOOSA) "IndyWatch Feed Tech"
UNISPACE+50 will celebrate the fiftieth anniversary of the first United Nations Conference on the Exploration and Peaceful Uses of Outer Space. It will also be an opportunity for the international community to gather and consider the future course of global space cooperation for the benefit of humankind.
From 20 to 21 June 2018 the international community will gather in Vienna for UNISPACE+50, a special segment of the 61 st session of the Committee on the Peaceful Uses of Outer Space (COPUOS).
As some additional work past the KVM changes for Linux 4.15 submitted last week, a few more feature items have been queued...
When [James] moved to Lima, Peru, he brought his jogging habit with him. His morning jaunts to the coast involve crossing a few busy streets that are often occupied by old, smoke-belching diesel trucks. [James] noticed that his throat would tickle a bit when he got back home. A recent study linking air pollution to dementia risk made him wonder how cities could monitor air quality on a street-by-street basis, rather than relying on a few scattered stations. Lima has a lot of taxis, so why wire them up with sensors and monitor the air quality in real-time?
This taxi data loggers chief purpose is collect airborne particulate counts and illustrate the pollution level with a Google Maps overlay. [James] used a light-scattering particle sensor and a Raspi 3 to send the data to the cloud via Android Things. Since the Pi only has one native UART, [James] used it for the particle sensor and connected the data-heavy GPS module through an FTDI serial adapter. Theres also a GPS to locate the cab and a temperature/humidity/pressure sensor to get a fuller environment...
Klaatu covers the very very basics of servers: what they are, how to know one when you see one, what one ought to run, and why we have them.
A statement I commonly hear in tech-utopian circles is that some seeming inefficiency cant actually be inefficient because the market is efficient and inefficiencies will quickly be eliminated. A contentious example of this is the claim that companies cant be discriminating because the market is too competitive to tolerate discrimination. A less contentious example is that when you see a big company doing something that seems bizarrely inefficient, maybe its not inefficient and you just lack the information necessary to understand why the decision was efficient.
Nebraska regulators approved an alternative route Monday for the proposed Keystone XL pipeline. It was the last major regulatory hurdle facing project operator TransCanada Corp., though opponents say another round of federal approval may now be needed.
The Nebraska Public Service Commission's ruling was on the Nebraska route TransCanada has proposed to complete the $8 billion, 1,179-mile (1,897-kilometer) pipeline to deliver oil from Alberta, Canada, to Texas Gulf Coast refineries. The proposed Keystone XL route would cross parts of Montana, South Dakota and most of Nebraska to Steele City, Nebraska.
The long-delayed project was rejected by President Barack Obama in 2015, citing concerns about carbon pollution. President Donald Trump revived it in March, approving a permit.
[...] The five-member Nebraska Public Service Commission was forbidden by law from factoring pipeline safety or the risk of spills into its decision because pipeline safety is a federal responsibility. So, it couldn't take into account a spill of 210,000 gallons (790,000 liters) of oil on the existing Keystone pipeline in South Dakota announced on Thursday.
Read more of this story at SoylentNews.
Microsoft is taking advantage of unused airwaves between TV stations or white spaces to provide wireless internet in Puerto Rico after its broadband infrastructure was severely damaged during Hurricane Maria. The U.S. territory is still...
In a joint research, IT security researchers at Avast, ESET, and
This is a post from HackRead.com Read the original post: BankBot banking malware found in flashlight and solitaire apps
Top House Democrats want the Federal Communications Commission (FCC) to force Sinclair Broadcasting Group to sell off some television stations if the agency approves its proposed merger with Tribune Media.House Minority Leader Nancy Pelosi (D-Calif...
A federal judge has ruled that EFF need not obey an Australian injunction ordering EFF to take down a Stupid Patent of the Month blog post and never speak of the patent owners intellectual property again.
It all started when Global Equity Management (SA) Pty Ltd (GEMSA)s patent was featured as the June 2016 entry in our Stupid Patent of the Month blog series. GEMSA wrote to EFF accusing us of false and malicious slander. It subsequently filed a lawsuit and obtained an injunction from a South Australia court purporting to require EFF to censor itself. We declined and filed a suit in the U.S. District Court for the Northern District of California seeking a declaration that EFFs post is protected speech.
The court agreed, finding that the South Australian injunction cant be enforced in the U.S. under a 2010 federal law that took aim against libel tourism, a practice by which plaintiffsoften billionaires, celebrities, or oligarchssued U.S. writers and academics in countries like England where it was easier to win a defamation case. The Securing the Protection of Our Enduring and Established Constitutional Heritage Act (SPEECH Act) says foreign orders arent enforceable in the United States unless they are consistent with the free speech protections provided by the U.S. and state constitutions, as well as state law.
The court analyzed each of GEMSAs claims for defamation, and found [n]one of these claims could give rise to defamation under U.S. and California law, and accordingly EFF would not have been found liable for defamation under U.S. and California law. For example, GEMSAs lead complaint was that EFF had called its patent stupid. GEMSA protested that its patent is not in fact stupid but the court found that this was clearly protected opinion. Moreover, the court found that the Australian court lacked jurisdiction over EFF, and that this constitutes a separate and independent reason that EFF would prevail...
The tasty Japanese seaweed nori is ubiquitous today, but that wasn't always true. Nori was once called "lucky grass" because every year's harvest was entirely dependent on luck. Then, during World War II, luck ran out. No nori would grow off the coast of Japan, and farmers were distraught. But a major scientific discovery on the other side of the planet revealed something unexpected about the humble plant and turned an unpredictable crop into a steady and plentiful food source.
Fortunately, on an island at the other end of Eurasia, Kathleen Drew-Baker had recently gotten fired. She had been a lecturer in botany at the University of Manchester where she studied algae that reproduced using spores rather than flowers. But the university did not employ married women. So when she got married to fellow academic Henry Wright-Baker she was kicked off the faculty and relegated to a job as an unpaid research fellow.
Drew-Baker focused on a type of nori unfamiliar to nearly everyone: Porphyra umbilicalis. It's a leafy seaweed that grows off the coast of Wales. Locals harvest it, grind it up, and use it to make bread or soup. Known colloquially as laver, it's still eaten in Britain but has not attained the international standing of nori.
Thanks to Drew-Baker's work, Segawa was able to invent the industrial process that lead to the stable, predictable production of nori, for which everyone with a taste for sushi should be grateful.
If not for her work, sushi rolls would probably not be eaten today.
Read more of this story at SoylentNews.
Raspberry Slideshow (RSS) is a operating system for Raspberry Pi computers which provides a system which displays a series of images or videos in sequence. Marco Buratto has announced the release of Raspberry Slideshow 10.0 which is based on Raspbian Stretch. "Marco Buratto has just released Raspberry Slideshow....
For the first time ever astronomers have studied an asteroid that has entered the Solar System from interstellar space. Observations from ESOs Very Large Telescope in Chile and other observatories around the world show that this unique object was traveling through space for millions of years before its chance encounter with our star system. It appears to be a dark, reddish, highly-elongated rocky or high-metal-content object. The new results appear in the journal Nature on 20 November 2017.
On 19 October 2017, the Pan-STARRS 1 telescope in Hawaii picked up a faint point of light moving across the sky. It initially looked like a typical fast-moving small asteroid, but additional observations over the next couple of days allowed its orbit to be computed fairly accurately. The orbit calculations revealed beyond any doubt that this body did not originate from inside the Solar System, like all other asteroids or comets ever observed, but instead had come from interstellar space. Although originally classified as a comet, observations from ESO and elsewhere revealed no signs of cometary activity after it passed closest to the Sun in September 2017. The object was reclassified as an interstellar asteroid and named 1I/2017 U1 (Oumuamua) .
We had to act quickly, explains team member Olivier Hainaut from ESO in Garching, Germany. Oumuamua had already passed its closest point to the Sun and was heading back into interstellar space.
When we enter sensitive information our names, passwords, payment card information, medical information, what have you into websites, we do it with the expectation that it will be kept confidential and safe and will not be misused by the company running the site. Most tech-savvy users know that there are many ways this kind of information can end up in the wrong hands: machines infected with keyloggers, traffic interception/man-in-the-middle attacks, sniffing of unencrypted More
International Centre for Free and Open Source Software (ICFOSS), an autonomous institution under Government of Kerala and Society for Promotion of Alternative Computing and Employment (SPACE), an NGO promoting free software, have been conducting Women Hackers, a project to bring more women into free software. The programme involves intensive residential workshops on college campuses.
It was during one such hackathon that the idea for I install was put forward by the students of LBS College of Engineering, Kasaragod. A GNU/Linux installation camp, the event aims to promote the idea of taking control over the technology that you use. Those students who received training at the hackathon will be part of I install where they impart their learning to other students.
A server is a computer software or a machine that offers services to other programs or devices, referred to as clients. There are different types of servers: web servers, database servers, application serv...
People are debating this
email from Linus Torvalds (maintainer of the Linux kernel). It
has strong language, like:
Some security people have scoffed at me when I say that security
problems are primarily "just bugs".
Those security people are f*cking morons.
Because honestly, the kind of security person who doesn't accept that
security problems are primarily just bugs, I don't want to work with.
Of the many changes coming for Linux 4.15, as detailed this weekend Radeon GPU and AMD CPU customers have a lot to be thankful for with this new kernel update currently in development. Here are some initial benchmarks of the Linux 4.15 development kernel using an AMD EPYC 7601 32-core / 64-thread setup...
Consider this: Deputy Attorney General Rod Rosenstein has been going around talking about responsible encryption for some time now proselytizing for encryption thats somehow only accessible by the governmentsomething we all know to be unworkable. If the Department of Justice (DOJ) is taking this aggressive public position about what kind of access it should have to user data, it begs the questionwhat kind of technical assistance from companies and orders for user data is the DOJ demanding in sealed court documents? EFFs client The Stranger, a Seattle-based newspaper, has filed a petition with one court to find out.
In a democracy, we as citizens deserve to know what our government is up to, especially its interpretation of the law. A major reason we all knew about the government using the All Writs Acta law originally passed in 1789to compel Apple to design a backdoor for the iOS operating system is because the court order was public. However, there are many instances where we may not know what the government is asking. For example, could the government be asking Amazon to turn on the mic on its smart assistant product, the Echo, so they can listen in on people? This is not without precedent. In the past, the government has tried to compel automobile manufacturers to turn on mics in cars for surveillance.
Beyond the All Writs Act, we need to know what kind of warrantless surveillance the government is conducting under statutes like the Stored Communications Act (SCA) and the Pen Register Act. For instance, under certain authorities of the SCA, the government can obtain very private details about peoples email records, such as who they communicate with and when, and that in itself can be revealing regardless of the content of the messages.
The privacy problems of these non-warrant orders is compounded by the secrecy associated with them. The government files papers asking for such orders under seal, giving the public no opportunity to scrutinize them or to see how many are actually filed with the court. The people deserve to know and we support The Strangers efforts to seek access to these records....
Heres something only 90s kids will remember. In 1998, the Air Hogs Sky Shark, a free-flying model airplane powered by compressed air was released. This plane featured foam stabilizers, wings, a molded fuselage that served as a reservoir, and a novel engine powered by compressed air. The complete Sky Shark setup included an air pump. All you had to do was plug the plane into the pump, try to break the pressure gauge, and let the plane fly off into a tree or a neighbors rooftop. Its still a relatively interesting mechanism, and although were not going to see compressed air drones anytime soon its still a cool toy.
Since [Tom Stanton] is working at the intersection of small-scale aeronautics and 3D printing, he thought he would take a swing at building his own 3D printed air motor. This is an interesting challenge the engine needs to be air-tight, and it needs to produce some sort of usable power. Is a standard printer up to the task? Somewhat surprisingly, yes.
The design of [Tom]s motor is more or less the same as what is found in the Air Hogs motor from twenty years ago. A piston is attached to a crank, which is attached to a flywheel, in this case a propeller. Above the cylinder, a ball valve keeps the air from rushing in. A spring is mounted to the top of the piston which pushes the ball out of the way, allowing air into the cylinder. At the bottom of the stroke, the ball closes the valve and air escapes out of the bottom of the cylinder. Simple stuff, really, but can it be printed?
Instead of the usual printer [Tom] uses for his builds, he pulled out an old delta slightly modified for higher quality prints. Really, this is just a 0.2 mm nozzle and a few tweaks to the print settings, but the air motor [Tom] designed came out pretty well and was smoothed to a fine finish with acetone.
After assembling the motor, [Tom] hooked it up to a soda bottle serving as a compressed air reservoir. The motor worked, although its doubtful a plane powered with this motor would fly for very long. You can check out [Tom]s video below.
The Justice Department on Monday sued AT&T to block its $85 billion merger with Time Warner, court filings show.In a lawsuit filed in U.S. District Court in Washington, federal prosecutors argued that the merger would hurt competitors and...
Uber has reached an agreement with Volvo to purchase a fleet of driverless cars as the ride-hailing firm seeks to deploy autonomous vehicle technology.As part of the deal, Uber will buy as many as 24,000 XC90 Volvo SUVs between 2019 to...
Uber has entered into an agreement with carmaker Volvo to purchase 24,000 of its XC90 SUVs between 2019 and 2021 to form a fleet of autonomous vehicles, according to Bloomberg News. The XC90 is the base of Uber's latest-generation self-driving test car, which features sensors and autonomous driving computing capability installed by Uber after purchase on the XC90 vehicle.
The deal is said to be worth around $1.4 billion, per the Financial Times, with the XC90 starting at $46,900 in the U.S. in terms of base model consumer pricing. Uber is already testing the XC90 in Arizona, San Francisco and Pittsburgh in trials with safety drivers on board to help refine and improve their software. Uber also paired up with Volvo to jointly develop autonomous driving and a vehicle ready for self-driving implementation, with investment from both sides committed last year.
Also at NYT.
Read more of this story at SoylentNews.
iRobot is testing software that will be able to make sense out of all the rooms in your house Illustration: IEEE Spectrum; Roomba: iRobot iRobot is testing software to make sense of all the rooms in your house.
Based on conversations weve had with iRobot CEO Colin Angle, were expecting that within the next six months or so, robot vacuums will be able to understand our homes on a much more sophisticated and useful level than ever before. Specifically, theyll be able to generate maps that persist between cleaning sessions, and these maps will allow the robots to identify and remember specific rooms and adjust their cleaning behavior accordingly. (Neato is also implementing this kind of capability .) For example, if your robot vacuum knows where your kitchen is, it can respond to commands like Go clean the kitchen, or autonomously clean there as often as it needs to.
At IROS in September, we got a bit of a sneak peak into how iRobot is going to make this happen, and how much of a difference it can make to the speed and efficiency of home navigation. Its a big difference, and it can even work on your older (and affordable) Roomba that only has bump sensors on it.
The problem that iRobot is trying to solve here is how to turn a cluttered, messy occupancy grid into something useful. An occupancy grid is a sort of binary map, a representation of whether a given space has something in it or not. As a robot like a Roomba roams around, it adds to the occupancy grid whenever it bumps into something, whether that thing is a wall, a table leg, or a shoe. As you might expect, the occupancy grid that a robot vacuum creates isnt a very accurate representation of the rooms in your house, but with a little image processing, it doesnt look all that far off:Image: iRobot
The next step is the tricky one. Using the kind of CPU power that even old Roombas have, the occupancy grid needs to be segmented into a bunch of different rooms in a way that would make sense to a human. Once thats done, the robot can plan the most efficient path possible.Image: iRobot
iRobot has developed a method called RoomsSeg thats able to turn a clut...
Both the rate of EV adoption and the environmental benefits the vehicles will produce have been oversold Photo-illustration: Stuart Bradford
Let me begin with a disclaimer: I am neither promoting electric vehicles nor denigrating them. I simply observe that the rational case for accepting EVs has been undermined by unrealistic market forecasts and a disregard for the environmental effects involved in producing and operating these vehicles.
Unrealistic forecasts have been the norm. In 2008, Deutsche Bank predicted that EVs would claim 7 percent of the U.S. market by 2016; in 2010, Bloomberg Businessweek put the 2016 share at 6 percent. But actual sales came to 158,614 units, just 0.9 percent of the record 17.55 million vehicles sold that year.
In his 2011 State of the Union address, thenU.S. president Barack Obama called for 1 million EVs on the road by 2015, and a concurrent report by the Department of Energy claimed [PDF] that the countrys production capacity in that year would reach 1.2 million units. But the 2015 total came to 410,000 units, representing just 0.15 percent of all vehicles on the road, and sales of U.S. brands reached about 100,000 cars.
And this triumph of hope over experience continues. The worldwide total of EVs on the road reached 2 million units in 2016. If you plot the trajectory of the global stock of EVs since the beginning of their sales to the year 2016, you will see that the equation that best fits the data (a fourth-order polynomial) projects about 32 million units in 2025. But the International Energy Agencys 2017 EV outlook [PDF] estimates growth from 40 million to 70 million units worldwide by 2025 and from 160 million to 200 million by 2030. Then there are the environmental consequences. If EVs are to reduce carbon emissions (and thus minimize the extent of global warming), their batteries must not be charged with electricity generated from the combustion of fossil fuels. But in 2016, 68 percent of global electricity originated in fossil fuels; 5.2 percent came from wind and solar and the rest from hydro energy and nuclear fission.
As a g...
Such systems are used to build evidence in criminal cases, and grant access to personal information Illustration: Getty Images
Automatic speaker verification (ASV) systems are sometimes used to grant access to sensitive information and identify suspects in a court of law. Increasingly, they are being baked into consumer devices, such as Amazons Echo and Googles Home, to respond to person-specific commands, such as play my music or read my email.
But such systems make mistakes when speakers disguise their voices to sound older or younger, according to a new study published in Speech Communication by researchers from the University of Eastern Finland. Earlier research by the same group has shown that some ASV systems cant distinguish between a professional impersonator and the person they are imitating.
Its hard to tell how similar the systems tested for these studies are to commercial technologies, but Tomi Kinnunen, a coauthor and computer scientist at the University of Eastern Finland, says theyre probably not too far off. There are many variants of how this is implemented in practice, but pretty much, they are still based on a lot of machine learning and signal processing, he says.
Specifically, the researchers found that the equal error rate of an ASV systema measure that captures times when the system mistook the same speaker for someone else, and when it tagged different speakers as the same personincreased by 11 times for male speakers and six times for female speakers who tried to sound younger than they were. When speakers tried to sound older, the systems equal error rate increased by seven times for males and five times for females.
This means that people can fool ASV systems by changing the sound of their own voice. Speaking at a higher frequency, which most speak...
Visualize some radio controlled airplane fanatic of yesteryear, with the requisite giant controller hanging from a strap, neck craned to see the buzzing dot silhouetted against the sky. Its kind of a stereotype, isnt it? Those big transmitters were heavy, expensive, and hard to modify, but that was just part of the challenge. Additionally, the form factor has to a degree remained rigid: the box with gimbals or for the 3-channel controller, the pistol-grip with the big pot that looks like a cheesy race car wheel.
With so much changing in RC capabilities, and the rise of custom electronics across so many different applications, can commodity RC controllers stay relevant? Were facing an age where the people who invest most heavily in RC equipment are also the ones most likely to want, and know how to work with customization for their rapidly evolving gear. It only makes sense that someone will rise up to satisfy that need.
The RC hobby is rife with bad hardware and software. It hails from an era that valued cheapness over openness, with little in the way of standards. Every manufacturer has their own way of doing things.
Like a lot of expensive hobbies, manufacturers have placed no va...
The cloud computing company Amazon Web Services (AWS) announced on Monday that its launching a new service capable of hosting government data classified as secret.AWSs new Secret Region is part of its $600 million cloud services contract with...
The Intel Management Engine (ME), which is a separate processor and operating system running outside of user control on most x86 systems, has long been of concern to users who are security and privacy conscious. Google and others have been working on ways to eliminate as much of that functionality as possible (while still being able to boot and run the system). Ronald Minnich from Google came to Prague to talk about those efforts at the 2017 Embedded Linux Conference Europe.
Four billion passenger pigeons once darkened the skies of North America, but by the end of the 19th century, they were all gone. Now, a new study reveals that the birds' large numbers are ironically what did them in. The pigeons evolved quickly, but in such a way to make them more vulnerable to hunting and other threats.
[...] In 2014, Wen-San Huang, an evolutionary biologist at National Taiwan Normal University (NTNU) in Taipei, and colleagues turned to DNA in an attempt to solve the mystery. Genetic material from four 19th century museum specimens revealed that the species had relatively low genetic diversitymeaning that most individuals were remarkably similar to each otherand that its numbers had fluctuated 1000-fold for millions of years. Hunting and habitat loss came during a time when the species was already declining, the team concluded, which pushed the birds over the edge.
But the new study lays the lion's share of the blame back on people. Beth Shapiro, a paleogenomicist at the University of California, Santa Cruz, and colleagues sequenced the complete genomes of two passenger pigeons, and analyzed the mitochondrial genomeswhich reside in structures that power cellsof 41 individuals. The specimens came from throughout the bird's range. In addition, they reanalyzed data from Hung's group, and, for comparison, sequenced the bird's closest living relative, the band-tailed pigeon.
Read more of this story at SoylentNews.
You probably know the quote by Steve Jobs saying that death is lifes single best invention because it gets rid of the old and makes room for the new. This view is the core of another fairly common objection to rejuvenation, codename cultural stagnation.
Wouldnt all those rejuvenated people, however physically young, be always old people inside, and drag everyone down with them into their anachronistic, surpassed ways of thinking, making it harder for fresh ideas to take hold, ultimately hindering social progress and our growth as a species? Maybe itd be best not to take the risk, forget rejuvenation, and be content with old age as it is.
Well, try explaining to your grandfather that the reason he has to put up with heart disease is that were afraid people his age may all become troublemakers when you let them live too long.
Popular Git repository hosting service GitHub has introduced a new feature to help developers keep their projects safer: security alerts for vulnerabilities in software packages which their projects depend on. GitHub hosts some 67 million code repositories, and is among the largest collections of open source data. According to their statistics, 45% of the 100 largest companies in the United States (by revenue) use GitHub Enterprise to build software. Over 75 percent of GitHub projects More
The company formerly known as AxonVR unveils its first product, the HaptX Glove Photo: HaptX The new HaptX Glove, announced on Monday, is the first product from the Seattle-based startup HaptX. It is designed to be paired with an HTV Vive headset.
In early October, I showed up at an old firehouse on Staten Island for a glimpse into the future of virtual reality. That future depends largely on haptics. Now that we can use VR headsets to transport ourselves to another world, the thinking goes, we need systems to recreate sensations to bring those virtual experiences to life.
I went to Staten Island to meet up with a little-known company that fancies itself the leader of realistic haptic feedback. The companynow called HaptXhad promised to let me try out a prototype of its very first product.
I was looking forward to it, because Id seen a spectacular demo by the same company, then named AxonVR, at CES 2017. That demo consisted of putting on an HTC Vive and sticking my hand into a large metal box to experience the thrill of feeling a tiny virtual deer lay down in my palm.
The technology was bulky and awkward back then, but the results were absolutely magical, as my coworker Evan Ackerman wrote at the time. When we left CES, the company promised more announcements later in the year. In September, they said they were about to make a big one.
At the Staten Island firehouse (now an Airbnb the company had rented), the HaptX team showed me a prototype of the HaptX Glove, officially announced today, which will ship in 2018. It looks and feels like a big black ski glove, except it has plastic clips on the fingertips and is connected by a very thick black cord to a slick, glowing box (which the team says is 26 times smaller than the box I stuck my hand into at CES).Photo: HaptX HaptX hopes to sell its HaptX Glove to companies that want to give employees a more realistic environment in which to train, practice making...
Alex Williams pulled off an incredible engineering project. He developed an Autonomous Underwater Vehicle (AUV) which uses a buoyancy engine rather than propellers as its propulsion mechanism and made the entire project Open Source and Open Hardware.
The design aims to make extended duration missions a possibility by using very little power to move the vessel. Whats as remarkable as the project itself is that Alex made a goal for himself to document the project to the level that it is fully reproducible. His success in both of these areas is what makes the Open Source Underwater Glider the perfect Grand Prize winner for the 2017 Hackaday Prize.
We got to sit down with Alex the morning after he won to talk about the project and the path he took to get here.
The bouyancy engine Alex speaks about is located in the nose of the glider. He was clever to choose medical syringes as an off-the-shelf option for moving water in and out of the glider to affect boyancy. Theyre cheaply and readily available, and designed for moving liquids in exactly the way needed for the project. Alex collects six of them together and moves the plungers in union with a single machine screw at the center. After comparing tests between this and a peristaltic pump design he found that the syringe design operates more efficiently and to us it appears to be much less complicated to build....
As the Federal Communications Commission (FCC) gets ready to abandon a decade of progress on net neutrality, some in Congress are considering how new legislation could fill the gap and protect users from unfair ISP practices. Unfortunately, too many lawmakers seem to be embracing the idea that they should allow ISPs to create Internet fast lanes -- also known as paid prioritization, one of the harmful practices that violates net neutrality. They are also looking to re-assign the job of protecting customers from ISP abuses to the Federal Trade Commission.
These are both bad ideas. Let's start with paid prioritization. In response to widespread public demand from across the political spectrum, the 2015 Open Internet Order expressly prohibited paid prioritization, along with other unfair practices like blocking and throttling. ISPs have operated under the threat or the reality of these prohibitions for at least a decade, and continue to be immensely profitable. But they'd like to make even more money by double-dipping: charging customers for access to the Internet, and then charging services for (better) access to customers. And some lawmakers seem keen to allow it.
That desire was all too evident in a recent hearing on the role of antitrust in defending net neutrality principles. Subcommittee Chairman Tom Marino gave a baffling defense of prioritization, suggesting that its necessary or even beneficial to users for ISPs to give preferential treatment to certain content sources. Rep. Marino said that users should be able to choose between a more expensive Internet experience and a cheaper one that prioritizes the ISPs preferred content sources. He likened Internet service to groceries, implying that by disallowing paid prioritization, the Open Internet Order forced more casual Internet users to waste their money: Families who just want the basics or are on a limited income aren't forced to subsidize the preferences of shoppers with higher-end preferences.
Rep. Darrel Issa took the grocery metaphor a step further, saying that paid prioritization is the modern day equivalent of the practice of grocery stores selling prime placement to manufacturers: Within Safeway, theyve decided that each endcap is going to be sold to whoever is going to pay the most Pepsi, Coke, whoever thats certainly a prioritization thats paid for.
Thats an absurd analogy. Unlike goods at a physical store, every bit of Internet traffic can get the best pl...
A former Facebook employee is calling for the company to be strictly regulated to prevent it from abusing the mass amounts of user data it handles.Sandy Parakilas, a former platform operations manager for Facebook, wrote in an op-ed for The New...
Here's our latest Linux distribution comparison with this time looking at the out-of-the-box performance of six Linux distributions while running a range of enterprise/workstation-focused benchmarks while using two systems. One system is a high-end Core i9 7980XE desktop system and the other a Tyan 1U Xeon Scalable server with dual Xeon Gold 6138 processors.
I guess I should wish everybody out there a happy Thanksgiving that celebrates it.
I haven't been around much lately, certainly not as much as I would like to be. Things have been difficult lately, to say the least.
Around this time of year things go completely berserk at my dayjob. For a while I was pulling 14 hour days, capped off with feverishly working three days straight on one of the biggest projects of my career, which not only wound up going off without more than the expected number of hitches but has garnered quite a few kudos from the community. I'm rather proud of how it turned out. Unfortunately, it also took its toll, namely, on my health. During the final leg of the project I noticed that I was starting to get sick, and by that Tuesday my cow-orkers were telling me to go home and sleep because I looked like death warmed over. Unsurprisingly, I've been battling a nasty cold that's kicked the legs out from under me. I still haven't kicked out of big-project mode yet, because the last few times I've started to feel better I've run myself aground again without realizing I was doing so. This is not good. It also seems that I brought this particular nasty home, and now my family is in various stages of fighting it off.
I'm still trying to come to terms with the death of my grandfather earlier this year. It still does't feel real even though the hole in my life is almost tangible. I'm not going home for the holidays this year, and I wonder what effect that's going to have on my family. I miss him. I keep meaning to write about the details of it, but I fear that it's far too morbid for most people, and I don't want to cause casual readers trouble in an attempt to exorcise my own haunted memories.
A couple of weeks ago, somebody I knew on another social network committed suicide. We weren't particularly close though I did hang out in her "conspiracy theory and chill" chats once in a while. She was easily one of the most prolific beings in that particular feed. Her parents, however, chose to dishonor her in death by burying her under her deadname in inappropriate clothing, holding a service for same, and setting things up so that her 'real' family (the people who acted more like family toward her than her bloodline did) would be tripped up and stonewalled in every avenue available to try to set things right. For complex and difficult to serialize reasons I'm quite upset by this. I realize this all sounds clinical and remote, but it isn't. This manner of writing is really the only way I have of expressing what's going on, and it's an effort to get even this far.
This has lead me to consider my own mortality once again, as one might expect. My body's not getting any younger, it's pushing 40 these days, and I think I've hit the point wher...
The Atlantic writes:
The transparency organization asked the president's son for his cooperationin sharing its work, in contesting the results of the election, and in arranging for Julian Assange to be Australia's ambassador to the United States.
[...] The messages, obtained by The Atlantic, were also turned over by Trump Jr.'s lawyers to congressional investigators. They are part of a longand largely one-sidedcorrespondence between WikiLeaks and the president's son that continued until at least July 2017. The messages show WikiLeaks, a radical transparency organization that the American intelligence community believes was chosen by the Russian government to disseminate the information it had hacked, actively soliciting Trump Jr.'s cooperation. WikiLeaks made a series of increasingly bold requests, including asking for Trump's tax returns, urging the Trump campaign on Election Day to reject the results of the election as rigged, and requesting that the president-elect tell Australia to appoint Julian Assange ambassador to the United States.
Its a quite long, but interesting article.
Senior White House adviser and son-in-law to the president Jared Kushner failed to hand over to Senate investigators emails concerning contacts with WikiLeaks and a "Russian backdoor overture," according to a letter sent by two senior lawmakers.
The letter, released Thursday by Sen. Chuck Grassley, the chairman of the Senate Judiciary Committee, and its ranking Democrat, Sen. Dianne Feinstein, says Kushner failed to turn over "September 2016 email communications to Mr. Kushner concerning WikiLeaks" and other emails pertaining to a "Russian backdoor overture and dinner invite."
First, two local events, involving well-known physics bloggers:
For a Q and A with another well-known physics blogger, theres Tommaso Dorigo at Physics Today.
For a couple of encouraging indications that the theoretical physics community may finally be taking seriously the need to give up on failed thinking and try something new, theres
Basically, all the textbooks on quantum field theories out there use an old framework that is simply too narrow, in that it assumes the existence of a Lagrangian.
This is a serious issue, because whey you try to come up e.g. with a theory beyond the Standard Model, people habitually start by writing a Lagrangian but that might be putting too strong an assumption.
We need to do something
In General Relativity related news, theres a new edition out of Misner, Thorne and Wheeler, the book from which many of us learned both geometry and GR. It comes with new prefaces from David Kaiser as well as Misner and Thorne (which an appropriate search on the Amazon preview might show you). In other Wheeler-related news, Paul Halpern has a new book out,...
Millimeter waves, massive MIMO, full duplex, beamforming, and small cells are just a few of the technologies that could enable ultrafast 5G networks.
Todays mobile users want faster data speeds and more reliable service. The next generation of wireless networks5Gpromises to deliver that, and much more. With 5G, users should be able to download a high-definition film in under a second (a task that could take 10 minutes on 4G LTE). And wireless engineers say these networks will boost the development of other new technologies, too, such as autonomous vehicles, virtual reality, and the Internet of Things.
If all goes well, telecommunications companies hope to debut the first commercial 5G networks in the early 2020s. Right now, though, 5G is still in the planning stages, and companies and industry groups are working together to figure out exactly what it will be. But they all agree on one matter: As the number of mobile users and their demand for data rises, 5G must handle far more traffic at much higher speeds than the base stations that make up todays cellular networks.
Security updates have been issued by Arch Linux (icu and lib32-icu), CentOS (firefox), Debian (imagemagick, konversation, libspring-ldap-java, libxml-libxml-perl, lynx-cur, ming, opensaml2, poppler, procmail, shibboleth-sp2, and xen), Fedora (firefox, java-9-openjdk, jbig2dec, kernel, knot, knot-resolver, qt5-qtwebengine, and roundcubemail), Gentoo (adobe-flash, couchdb, icedtea-bin, and phpunit), Mageia (apr, bluez, firefox, jq, konversation, libextractor, and quagga), Oracle (firefox), Red Hat (firefox), and Scientific Linux (firefox).
If your Android smartphone has Lolipop, Nougat or Marshmallow, then
This is a post from HackRead.com Read the original post: Android Flaw Lets Attackers Capture Screen and Record Audio
While Nintendo is making a killing on nostalgic old consoles, there is a small but dedicated group of hackers still working with the original equipment. Since the original NES was rolled out in the 80s, though, there are a few shortcomings with the technology. Now, though, we have Arduinos, cheap memory, and interesting toolchains. What can we do with this? Absolutely anything we want, like playing modern video games on this antiquated system. [uXe] added dual-port memory to his ancient NES console, opening up the door to using the NES as a sort of video terminal for an Arduino. Of course, this is now also the King of All Game Genies and an interesting weekend project to boot.
Most NES cartridges have two bits of memory, the PRG and CHR ROMs. [uXe] is breaking out the cartridge connector onto an exceptionally wide rainbow ribbon cable, and bringing it into a custom Arduino Mega shield loaded up with two 16K dual-port RAM chips. These RAM chips effectively replace the PRG and CHR ROMs Since these are dual-port RAM chips, they can be written to by the Arduino and read by the NES simultaneously.
The NES sees one port of the RAM and can read and write from it while the Arduino still has access to make changes to the other post while thats happening. A trick like this opens up a whole world of possibilities, most obviously with tiling and other graphics tricks that can push beyond the consoles original capabilities. [uXe] is currently playing Arduboy games on the NES a really neat trick to pull off. Well done [uXe]!
Be sure to check out the video below of the NES running some games from the Arduboy system. It seems to integrate seamlessly into the hardware, so if youve always had a burning desire to fix crappy graphics on some of your favorite games, or run some special piece of software on an NES, now might just be your time to shine.
Organizations experienced an average of 237 DDoS attack attempts per month during Q3 2017 equivalent to 8 DDoS attack attempts every day as hackers strive to take their organisations offline or steal sensitive data, according to Corero Network Security. The data, which is based on DDoS attack attempts against Corero customers, represents a 35% increase in monthly attack attempts compared to the previous quarter (Q2 2017), and a 91% increase in monthly attack More
Nanoparticles release drugs on command using magnetic field Image: Ella Maru Studio
Researchers have developed a new way to control the delivery of drugs to the body using nanoparticles and a weak magnetic field. The inventors, at the University of Georgia in Athens, GA tested their system with a chemotherapy drug, and published the results today in the journal Nature Catalysis.
Patients undergoing treatments for cancer and other diseases often must take drugs that affect the whole body, when they really only need the medicine in a small area. Chemotherapy drugs typically act on all cells , killing cancer cells and also healthy cells, says Sergiy Minko, a professor at the University of Georgia and an author of the report. As a result, a big number of patients die because of complications from the drugs, he says.
To address the problem, scientists have proposed all sorts of tiny gadgets that can selectively deliver drugs in the body, including organic electronic ion pumps, silicon nanowires, amoeba-like molecular robots, squishy micromachines, and robots controlled by magnetic fields.
In the new design, Minko uses nanoparticles that carry either a drug or a catalyst, and release the substances when exposed to a magnetic field. One difference between Minkos tool and previous concepts is that the drug isnt encapsulated inside a device, so the release is easy. And it doesnt rely on a mechanical action or heat or salinity or light to do its job.
Minkos nanoparticles are composed of an iron oxide core encased in a silica shell. The shell is coated with a polymer layer consisting of polyacrylic acid (PPA), and a second polymer layer of poly(ethylene glyco) methyl ether acrylate macromer (PPEGMA). The two layers form a brush-like structu...
Keeping a million mosquitoes alive on board a drone isnt as easy as you think Photo: Dan Vostok/Getty Images
The deadliest animal onEarth, by far, is the mosquito. Each year, mosquitoes infect about 700 million people with diseases such as malaria, dengue fever, West Nile virus, and Zika. Millions of people die annually from mosquito-borne illnesses, and many of those diseases cant be cured with drugs. Its best to avoid being bitten in the first place, but this is becoming more difficult as the insects expand their range, migrating north with warming climates.
For decades, government agencies and nonprofit organizations have tried to prevent the spread of mosquito-borne diseases in developing countries by spraying large areas with insecticides. But that process is expensive, especially as mosquitoes develop resistance to commonly used chemicals. The United States Agency for International Development (USAID) has begun to look for other mosquito control methods.
One approach is to breed male mosquitoes in captivity, expose them to radiation that renders them sterile, and release them into the wild. These mosquitoes, being mosquitoes, dont understand that they can no longer successfully reproduce, and do their best to make it happen anyway. In large enough numbers, the sterile males will outcompete wild males for female mosquitoes, which can reduce local populations by as much as 90 percent.
This method has been around for half a century, but spreading sterile mosquitoes in the developing world is a challenge. Roads are nonexistent or in poor condition, so it may not be possible to release insects from a car or truck, and using a crewed aircraft is too expensive....
A Pentagon contractor left a vast archive of social-media posts on a publicly accessible Amazon account in what appears to be a military-sponsored intelligence-gathering operation that targeted people in the US and other parts of the world.
The three cloud-based storage buckets contained at least 1.8 billion scraped online posts spanning eight years, researchers from security firm UpGuard's Cyber Risk Team said in a blog post published Friday. The cache included many posts that appeared to be benign, and in many cases those involved from people in the US, a finding that raises privacy and civil-liberties questions. Facebook was one of the sites that originally hosted the scraped content. Other venues included soccer discussion groups and video game forums. Topics in the scraped content were extremely wide ranging and included Arabic language posts mocking ISIS and Pashto language comments made on the official Facebook page of Pakistani politician Imran Khan.
[...] In Friday's post, UpGuard analyst Dan O'Sullivan wrote:
Massive in scale, it is difficult to state exactly how or why these particular posts were collected over the course of almost a decade. Given the enormous size of these data stores, a cursory search reveals a number of foreign-sourced posts that either appear entirely benign, with no apparent ties to areas of concern for US intelligence agencies, or ones that originate from American citizens, including a vast quantity of Facebook and Twitter posts, some stating political opinions. Among the details collected are the web addresses of targeted posts, as well as other background details on the authors which provide further confirmation of their origins from American citizens.
Read more of this story at SoylentNews.
The Federal Network Agency (Bundesnetzagentur), Germanys regulatory agency for public utility companies, has categorized childrens smartwatches as spying devices, and has banned their sale. Why? The watches have a SIM card and limited telephony function that are set up and controlled using an app. This kind of listening function is often described as a monitor. The app user is able to make the watch call a desired number unnoticed by its wearer or those nearby. More
In this tutorial, we will be covering how to install Cacti on a
server running Ubuntu 16.04 LTS.
Cacti is supported on any type of virtualization platform (OpenVZ/XEN/KVM), so you can run
your monitoring server on a Low End VPS!
Step 1: Its always good practice to first make
sure everything on your Ubuntu system is up to
sudo apt-get update
Step 2: Install LAMP (Linux, Apache, MariaDB, PHP) server.
Please keep in mind that Cacti only supports MySQL 5.6, whereas
the current version in
the Ubuntus default repository is MySQL 5.7. In order to install this older version of
MySQL, follow the below steps:
deb http://archive.ubuntu.com/ubuntu trusty universe
Now install the following packages for Cacti setup on your
Ubuntu server with the help of
given below command:
apt-get install apache2 mysql-server-5.6 php libapache2-mod-php -y
Start the web server and MySQL server. Set them to automatically
start up on server
systemctl start apache2.service
systemctl enable apache2.service
systemctl start mysql.service
systemctl enable mysql.service
Step 3: Installing the Cacti packages.
Install SNMP and SNMP and RRDtools:
apt-get install snmp snmpd rrdtool -y
Now use the following command to install Cacti:
apt-get install cacti cacti-spine -y
During the installation process you will be prompted to
configure Cacti with few options to select
This robocar purchase order, the biggest ever, will stretch over three years, beginning in 2019 Photo: Volvo
"Our objective is to be able to operate them without anyone behind the wheel in select cities and environments; the more common definition of that is Level 4 [autonomy]," said Uber's head of automotive alliances, Jeff Miller, in an interview with Automotive News Europe .
Miller said Uber chose Volvo in part for its new SPA architecture, which includes wiring that can hook up with todays advanced driver assistance systems (ADAS) and any further self-driving components that Uber may specify. Uber may, for instance, need additional features in a vehicle meant to be used purely in a ride-hailing service. The electrical system connects all aspects of the cars functioningmovement, safety, infotainment, navigationseamlessly.
Such seamlessness does pose certain risks. The company, based in Gothenburg, Sweden, but owned by Chinas Geely, has to ensure that the cars electronic backbone is rock-solid and resistant to hacking. Still, Volvoperhaps more than any other car makerhas emphasized the importance of multiple redundant safety systems.
The model in question is the Volvo XC90 crossover, which can seat up to seven people. Presumably that means seven passengers and no driver, although who knows, maybe the service will start with a safety driver. Thats what Waymo is doing right now in its ride-hailing pilot program in Chandler, Ariz. However, this month Waymo took the safety driver from behind the steering wheel and put him into the back seat.
Volvo plans to begin its own self-driving program with a fleet of 100 XC90s in Gothenburg, Sweden, beginning next month.
Neither Volvo nor Uber put a price on the project or a precise date for its rollout. The technology would first have to be ready, of course, but so would new rules of the road, at least in the districts where the ride-hailing service is to operate.
TIOBE (The Importance of Being Earnest), one of the most popular rating index for programming languages, has released its latest index for November 2017. According to their rankings, Java continues to remain the most popular programming language followed by C and C++.
On the other hand, PYPL (PopularitY of Programming Language), which looks at the popularity of language tutorials on Google, shows Java as the most preferred programming language followed by Python and PHP.
For those unaware, TIOBE calculates the rankings based on the number of search engine queries, which contain the name of the programming language as a keyword. Alternatively, PYPL uses the raw data from Google Trends to calculate the rankings, which is based on the more number of searches for a particular language tutorial, the more popular it is assumed to be.
While Python continued to maintain its popularity, other scripting languages such as Perl, PHP, and Ruby have seen a decrease in their popularity. The reason behind this is the difficulty in writing a critical and large software system, which meets high-quality demands.
Based on research data as of November 2017, here is the list of the top programming languages in 2017, according to the TIOBE Index and PYPL rankings.PYPL ...
Its just another day with just another news explaining the
This is a post from HackRead.com Read the original post: Android malware found in hundreds of music player apps on Play Store
Time zones have been a necessity since humans could travel faster than a horse, but with computers, interconnected over a vast hive of information, a larger problem has emerged. How do you keep track of time zones? Moreover, how do you keep track of time zones throughout history?
Quick question. If its noon in Boston, what time is it in Phoenix? Well, Boston is in the Eastern time zone, theres the Central time zone, and Phoenix is in the Mountain time zone; noon, eleven, ten. If its noon in Boston, its ten oclock AM in Phoenix. Heres a slightly harder question: if its noon in Boston, what time is it in Phoenix during Daylight Savings Time? Most of Arizona doesnt observe Daylight Savings Time, so if its noon in Boston, its 9 AM in Phoenix. What about the Navajo Nation in the northwestern part of Arizona? Here, Daylight Savings Time is observed. You cant even make a rule that all of Arizona is always on Mountain Standard Time.
Indiana is another example of bizarre time zones. For most of the 20th century, Indiana was firmly in the Central time zone. Starting in the 1960s, the line between Eastern and Central time slowly moved west from the Ohio border. Some countries opted not to observe Daylight Savings Time. In 2006, the entire state started to observe DST, but the northwest and southwest corners of the state remained firmly in the Central time zone. The odd geographic boundaries of time zones arent limited to the United States, either; Broken Hill, New South Wales, Australia is thirty minutes behind the rest of New South Wales.
Working out reliable answers to all of these questions is the domain of the Time Zone Database, a catalog of every time zone, time zone change, and every strange time-related political argument. It records Alaskas transition from the Julian to the Gregorian calendar. It describes an argument in a small Michigan town in 1900. Its used in Java, nearly every kind of Linux, hundreds of software packages, and at least a dozen of the servers and routers youre using to read this right now.
The idea of daylight savings time was first suggested by Benjamin Franklin in a 1784 essay to the Journal de Paris. An Economical Project for Diminishing the Cost of Light suggested that by simply moving the clocks forward and backward in accordance with sun time, fewer candles would be burnt at night. Over the course of a year, this would save the city of Paris sixty-four million pounds of candles. Franklin also suggested posting guards in the shops of candle makers so no family would be permitted more than one pound of candles per week. It was also suggested that all church bells ring at the crack of dawn, and cannons be fired in every street, to wake the sluggards and sq...
The Mesa 17.3 release game is in overtime but it should be wrapping up in the days ahead...
A new malware campaign is threatening WordPress installs, the malicious code tracked as wp-vcd hides in legitimate WordPress files and is used by attackers to add a secret admin user and gain full control over infected websites.
The malware was first spotted in July by the Italian security expert Manuel DOrso who noticed that the malicious code was loaded via an include call for the wp-vcd.php file and injected malicious code into WordPress core files such as functions.php and class.wp.php.
The wp-vcd malware attacks continued, evolving across the months. Recently researchers from Sucuri firm discovered a new strain of this malware that injected malicious code in the legitimate files of the two the default themes twentyfifteen and twentysixteenincluded in the WordPress CMS in 2015 and 2016.
This is an old tactics that leverage themes files (active or not) files to hide malicious code, in the specific case the malware creates a new 100010010 admin user with the intent to establish a backdoor into the target installation.
Hackers triggered vulnerabilities in outdated plugins and themes to upload the wp-cvd malware.
The injection, on most of the cases we found, was related to outdated software (plugins or themes). Which a simple update or using a WAF would prevent. reads the blog post published by Sucuri.
Code is pretty straightforward and doesnt hide its malicious intentions by encoding or obfuscation of functions
Outdated and vulnerable plugins represents a privileged entry point for hackers, last week the researcher Jouko Pynnnen from Finland-based company Klikki Oy discovered several vulnerabilities in the Formidable Forms plugin the exposes websites to attacks....
If you, a friend or loved one lost money in a scam involving Western Union, some or all of those funds may be recoverable thanks to a more than half-billion dollar program set up by the U.S. Federal Trade Commission.
In January 2017, Englewood, Colo.-based Western Union settled a case with the FTC and the Department of Justice wherein it admitted to multiple criminal violations, including willfully failing to maintain an effective anti-money laundering program and aiding and abetting wire fraud. As part of the settlement, the global money transfer business agreed to forfeit $586 million.
Last week, the FTC announced that individuals who lost money to scammers who told them to pay via Western Unions money transfer system between January 1, 2004 and January 19, 2017 can now file a claim to get their money back by going to FTC.gov/WU before February 12, 2018.
Scammers tend to rely on money transfer businesses like Western Union and MoneyGram because once the money is sent and picked up by the recipient the transaction is generally irreversible. Such scams include transfers made for fraudulent lottery and prizes, family emergencies, advance-fee loans, and online dating, among others.
Affected consumers can visit FTC.gov/WU to file claims, learn more, or get updates on the claims process, which could take up to a year. The graphic below seeks to aid victims in filing claims.
The FTC says some people who have already reported their losses to Western Union, the FTC, or another government agency will receive a form in the mail from the claims administrator, Gilardi & Co., which has been hired by the DOJ to return victims money as part of the settlement. The form will have a Claim ID and a PIN number to use when filing a claim online via FTC.gov/WU.
The agency emphasized that filing a claim is free, so consumers should not pay an...
Way back in 1811 and 1812, a series of over 1,000 earthquakes rocked the Mississippi River between St. Louis and Memphis. One was so powerful that it caused the river to run backwards for a few hours. The infamous New Madrid earthquakes of 18111812 rang church bells in Boston, which is 1,200 miles from St. Louis. Today, scientists say that the 150-mile-long New Madrid Seismic Zone has a terrifying 40% chance to blast in the next few decades, impacting 7 states Illinois, Indiana, Missouri, Arkansas, Kentucky, Tennessee and Mississippi with 715,000 buildings damaged and 2.6m people left without power.
Unlike California, which has been super-prepared since the last major earthquake hit hard enough to delay the World Series, the New Madrid fault area has been sitting blissfully by. In case the 40 percent statistic didnt bother you, this should: The New Madrid fault has an impact zone ten times as big as its more famous San Andreas cousin.
As described by USGS: In 1811, the extent of the area that experienced damaging earth motion, which produced Modified Mercalli Intensity greater than or equal to VII, is estimated to be 600,000 square kilometers. However, shaking strong enough to alarm the general population (intensity greater than or equal to V) occurred over an area of 2.5 million square kilometers.
A New York state judge has concluded that a powerful police surveillance tool known as a stingray, a device that spoofs legitimate mobile phone towers, performs a "search" and therefore requires a warrant under most circumstances.
As a New York State Supreme Court judge in Brooklyn ruled earlier this month in an attempted murder case, New York Police Department officers should have sought a standard, probable cause-driven warrant before using the invasive device.
The Empire State court joins others nationwide in reaching this conclusion. In September, the District of Columbia Court of Appeals also found that stingrays normally require a warrant, as did a federal judge in Oakland, California, back in August.
According to The New York Times, which first reported the case on Wednesday, People v. Gordon is believed to be the first stingray-related case connected to the country's largest city police force.
Read more of this story at SoylentNews.
Last month, Microsoft announced its most powerful laptop and Apple MacBook Pros latest competitor, Surface Book 2. The new Surface Book 2 started arriving in the markets on November 16, after it was made available for pre-order on November 9.
iFixit, a company known for teardowns of consumer electronic devices, decided to do a teardown of Surface Book 2 to check the internal components and performed several tests to calculate the repairability score.
In the teardown video(below) of Surface Book 2 released by iFixit, the company has awarded the Surface Book 2 a score of 1/10 for repairability based on the difficulty of dismantling it, which is not bad in comparison to its predecessor, Surface Laptop which had scored 0/10. If by chance, someone gets lucky in opening the unit, the engineer can only replace the SSD (solid-state drive).
iFixit explains that everything is strongly joined with lots of glue, including the batteries and the display. The components are soldered and screwed. Not only this, the processor and RAM have been soldered to the motherboard that makes it difficult for a normal user to upgrade the RAM.
In addition, some connections are not immediately obvious, as they are hidden by other components or are accessible only from the opposite rear side. This does not provide easy access to the components and leads to a rating of only 1/10 for repairs.
This is the Microsoft Surface Book 2, and just like every Surface device weve done a teardown on this year, it scored horribly on our repairability scale. How bad did it do? We gave it a 1 out of 10, which to be honest is at least a little better than the Surface laptop which got a zero but still, the company explains.
The new Surface Book 2 comes in 13.5-inch and 15-inch models and is now available for order worldwide. For those interested, can order it here from Microsoft Store.
The post Microsofts Surface Book 2 scores surprisingly low in iFixit teardown appeared first on TechWorm.
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.
And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.
Which means that you will be able to benefit from a daily update of the following:
Infosec professionals agree that the Cyber Daily is an essential tool:
"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Futures Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.
So, what are you waiting for?
Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.
If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about...
Most of us fortunate enough to see 2001: A Space Odyssey in a theater when it was released never dreamed it would spawn a strange twin. But as Larry Klaes explains in the essay that follows, Dark Star was to emerge as a telling satire on the themes of the Kubrick film. Originating in the ideas of USC film students John Carpenter and Dan OBannon, Dark Star likewise plays into the screenplay for 1979s Alien in ways that have to be seen to be believed. Larry is quite a fan of the film, and explains how and why socially relevant screenplays like these would soon be swamped by blockbuster hits crammed with special effects (think Star Wars). But that orange beach ball still has a place in film history. Read on.
By Larry Klaes
Science fiction has certainly played an important role in inspiring and influencing humanitys future directions. The father of American rocketry, Robert H. Goddard, was moved to imagine sending a vessel to the planet Mars as a young man in 1899 after reading The War of the Worlds by H. G. Wells published just a few years earlier. From that spark developed a life-long dedicated pursuit of space exploration by Goddard, whose work in turn influenced others which eventually led to real rockets carrying real spaceships to the Red Planet and far beyond.
Conversely, science fiction also reflects the era it is created in. This can be seen in the changing depictions of the future during the Twentieth Century. While there are always exceptions, up into the 1960s the future was most often shown as a wonderful utopia, extrapolating from the real scientific and technological progress made in the preceding decades and centuries. Destination Moon (1950) had a contemporary near-future with a nuclear-powered rocket taking the first men to Earths natural satellite. Six years later, Forbidden Planet assumed the 23rd Century will have humanity working together to explore and colonize other worlds across the galaxy in faster-than-light (FTL) starships.
On television, Walt Disney presented an amazing future in full animated color with series such as Man in Space (1955-1959) and Magic Highway, USA (1958). The Jetsons (1962-1963) gently spoofed many future tropes such as flying cars, robot maids, pushbutton conveniences, and vacations on the Moon while simultaneously reinforcing the preconceived notions of its contemporary audiences that its depictions of society in the year 2062 were going to become an overall accurate one by then.
The belief in a shiny, happy future, thanks to science and technology, was also heavily supported by Worlds Fairs, especially the ones held in New York City in 1939 and 1964-1965 and Seattle in 1962. There visitors not only got to see the wonders of tomorrow but also interact with them, cementing their realities. That each...
Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is that most new malware recycles large chunks of source code from existing malware with some changes and additions (possibly taken from other publically released vulnerabilities and tools). This approach makes sense. Why reinvent the wheel when another author already created a working solution? While code reuse in malware More
The European Unions new ambitious approach to cyber challenges could be a game-changer for its cyber posture as well as for the transatlantic and neighbourhood relations, concludes this analysis by Tom Minrik and Siim Alatalu of the NATO Cooperative Cyber Defence Centre of Excellence, the NATO-affiliated cyber defence think-tank. Nevertheless, the EU could make better use of existing expertise in NATO and individual Member States.
The following analysis does not represent the official views of NATO.
On 13 September 2017, the European Commission and the High Representative issued a Joint Communication to the European Parliament and the Council [JOIN(2017) 450 final], bearing the title Resilience, Deterrence and Defence: Building strong cybersecurity for the EU. It introduces an ambitious and comprehensive plan to improve cybersecurity throughout the EU. The Commission and the High Representative (HR) proposed a broad range of measures, divided into three areas resilience, deterrence and defence:
The year 2016 was a bad year for torrent websites and the torrents community as a whole, since it lost two of its most popular torrent websites, KickassTorrents and Torrentz.eu.
For those unaware, KickassTorrents was shut down by the U.S. government with its alleged owner Artem Vaulin being arrested in Poland following a criminal investigation by the FBI. On the other hand, although Torrentz.eu was never a torrent website, it was a very popular mega torrent search engine, who too decided to mysteriously and abruptly shut shop after KickassTorrents.
While Torrentz sites operator kept the website online, but when the users tried to run a search, or looked to click any link on the site, it displayed the message: Torrentz will always love you. Farewell.
Even a year later, not much has changed, as the search engine Torrentz is still online but not operational. An unrelated site carrying the name Torrentz2 popped up as an alternative, which has millions of daily visitors itself now.
But, things may change in the near future, as the original Torrentz domain names, including Torrentz.eu, Torrentz.com and Torrentz.in, are for listed sale, according to a message posted on the original Torrentz site.
This is likely going to create interest in some online entrepreneurs looking to purchase these domains, due to the fact that it still has quite a bit of traffic.
However, the sale could either be used for a new torrent related venture, or someone could use it to simply seal it with ads, or even worse.
Although, the site hasnt carried any links to infringing content for over a year, it is still blocked in several countries, including the UK, which should be taken note of by any potential buyers interesting in purchasing the site.
TorrentFreak contacted the owner of Torrentz to know why sites domain names were listed for sale. He is yet to comment on the issue.
The Global Cyber Alliance (GCA) has launched the Quad9 DNS service (184.108.40.206), a new free Domain Name Service resolver that will check users requests against the IBM X-Forces threat intelligence database.
The Quad9 DNS service non only offer common resolution services implemented by DNSs but it will also add the security checks to avoid you will visit one of the the 40 billion malicious websites and images X-Force marked as dangerous.
The Global Cyber Alliance (GCA) was co-founded by a partnership of law enforcement and research organizations (City of London Police, the District Attorney of New York County and the Center for Internet Security) focused on combating systemic cyber risk in real, measurable ways.
GCA also coordinated the threat intelligence community to incorporate feeds from 18 other partners, including Abuse.ch, the Anti-Phishing Working Group, Bambenek Consulting, F-Secure, mnemonic, 360Netlab, Hybrid Analysis GmbH, Proofpoint, RiskIQ, and ThreatSTOP.
Back in 1988 some large /8 blocks of IPv4 addresses were assigned in whole to single organizations or related groups of organizations, either by the Internet Corporation for Assigned Names and Numbers (ICANN), through the Internet Assigned Numbers Authority (IANA), or a regional Internet registry.
Each /8 block contains 224 = 16,777,216 addresses, and IBM secured the 220.127.116.11/8 block which let the company dedicate 18.104.22.168 to the project.
IBM Security, Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service that gives consumers and businesses added privacy and security as they access the internet. The new Quad9 Domain Name System (DNS) service protects users from accessing millions of malicious internet sites known to steal personal information, infect users with ransomware and malware, or conduct fraudulent activity. reads the announcement published by the GCA.
According to the GCA, Quad9 has no impact on the speed of the connections, it is leveraging the Packet Clearing House global assets around the world with 70 points of presence in 40 countries.
The alliance believes that Quad9 points of presence will double over the next 18 months, further improving the speed, performance, privacy and security for users globally.
If you have been wanting to build a new system before the end of the year, AMD Ryzen CPU prices -- including the high-end Threadripper -- have been dropping in recent days in at least the US and EU...
Hello, and welcome back to the Beyond NERVA blog, and the second installment in our series on NASAs current plans for in-space nuclear reactors. Last time, we looked at the experiments leading up to the development of NASA and the Department of Energys newest reactor. Today, were looking at the reactor that will be tested by the end of this year (2017), and the reactors that will follow that test. We have two more installments after this, on larger power systems that NASA has planned and done non-nuclear testing on, but cant continue due to the testing and regulatory limitations it operates under. These are the Fission Surface Power program and Project Prometheus.
Now, the results of this experiment are being used to finalize the design and move forward with a new reactor, the Kilowatt Reactor Utilizing Stirling TechnologY, or KRUSTY. This is an incredibly simple small nuclear reactor being developed by Los Alamos National Laboratory (LANL) for the DOE, and Glenn Research Center (GRC) and Marshall Spaceflight Center (MSFC) for NASA.
There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin Feb. 9. In concert with feats of strength, dazzling stadiums and piping national anthems, the threat of cyberattacks looms large at the Olympic Games. The 2014 Winter Olympics in Sochi, Russia and the 2016 Summer Olympics in Rio de Janeiro, Brazil taught us that prior More
The Google Container Tools team originally built container-diff, a new project to help uncover differences between container images, to aid our own development with containers. We think it can be useful for anyone building containerized software, so were excited to release it as open source to the development community.
In the early days of open source, one of the primary goals of the open source community was educating people about the benefits of open source and why they should use it. Today, open source is ubiquitous. Almost everyone is using it. That has created a unique challenge around educating new users about the open source development model and ensuring that open source projects are sustainable.
A new survey of more than 300 IT professionals, conducted by Propeller Insights in October 2017, revealed that the state of enterprise cloud infrastructure governance is extremely poor. In spite of an ever-increasing number of security breaches, 28 percent of IT professionals arent confident their cloud infrastructure is secure, 62 percent rely on manual reviews before infrastructure is provisioned, and 42 percent have no cloud infrastructure governance processes in place. The cloud has completely transformed More
Security researchers at Bitdefender have discovered a critical password stealing banking Trojan. This banking Trojan is believed to be based on the famous Trojan Zeus. The discovered Trojan has been termed as Terdot by the researchers. This Trojan has the ability to use visited web pages data with HTML code to carry out MitM (man-in-the-middle)
The post Discovery of a critical password stealing banking Trojan appeared first on Hacker News Bulletin | Find the Latest Hackers News.
Look around your bench and chances are pretty good that theres a PCB or scrap of perfboard or even a breadboard sitting there, wires and LEDs sprouting off it, doing something useful and interesting. Taking it to the next level with a snazzy enclosure just seems too hard sometimes, especially if you dont have access to a 3D printer or laser cutter. But whipping up plastic enclosures can be quick and easy with this simple acrylic bending outfit.
At its heart [Derek]s bending rig is not much different from any of the many hot-wire foam cutters weve featured. A nichrome wire with a tensioning spring is stretched across a slot in a flat work surface. The slot contains an aluminum channel to reflect the heat from the wire upward and to protect the MDF bed; we wonder if perhaps an angle section set in a V-groove might not be more effective, and whether more vertical adjustment range would provide the wider heating area needed for wider radius bends. It works great as is, though, and [Derek] took the time to build a simple timer to control the heating element, for which of course he promptly built a nice looking enclosure.
We can imagine the possibilities here are endless, especially if you use colored acrylic or Lexan and add in some solvent welding. Weve covered acrylic enclosure techniques before; heres a post that covers the basics.
The US Navy and NASA have joined the search for an Argentine Armada (navy) diesel-electric attack submarinethe ARA San Juan (S-42)and its crew of 44 sailors missing in the Southern Argentine Sea. The last contact with the TR-1700 class sub, built in 1983 by the German shipbuilder Thyssen Nordseewerke, was on November 15.
NASA has dispatched a modified P-3 Orion patrol planepreviously used by the Navy for submarine huntingto aid in the search. The P-3 is equipped with a magnetic anomaly detector (or magnetometer), a gravimeter for detecting small fluctuations in the Earth's gravity, infrared cameras, and other sensors for measuring ice thickness. With that array, the P-3 may be able to detect the submerged submarine.
[...] The NASA P-3 joins three Argentine Armada ships in the searchthe destroyer ARA Sarand (D-13) and two corvettes, ARA Rosales (P-42) and ARA Drummond (P-31). Reuters reports that Argentine naval spokesman Enrique Balbi told reporters today, "We are investigating the reasons for the lack of communication [with the submarine]. If there was a communication problem, the boat would have to come to the surface." The submarine was traveling from Ushuaia to Mar del Plata, and it was expected to stay on course regardless of communications. The lack of any sighting or contact led to a request for assistance from NASA.
The search has been hampered by bad weather and 20-foot waves.
Read more of this story at SoylentNews.
I have a young son whos interested in aviation, so I knew about Peter Sripol from his FliteTest days. Peters segments were always our favorites on FliteTest because his builds were completely over the top. When I saw that Peter was building a real electric plane with R/C grade motors, 3D printed parts and stuff 
Dr. Caloss work has inspired us for over a decade: she has pioneered a radically novel approach to gene therapy that has the potential to overcome all the key obstacles that have held that field back for so long. We are delighted to welcome her to Berlin to discuss the latest advances in this technology.
Earlier this year, American satellite and broadcast provider Dish Network targeted two well-known players in the third-party Kodi add-on ecosystem.
In a complaint filed in a federal court in Texas, add-on ZemTV and the TVAddons library were accused of copyright infringement. As a result, both are facing up to $150,000 for each offense.
While the case was filed in Texas, neither of the defendants live there, or even in the United States. The owner and operator of TVAddons is Adam Lackman, who resides in Montreal, Canada. ZemTVs developer Shahjahan Durrani is even further away in London, UK.
Over the past few months, Lackman has spoken out in public on several occasions, but little was known about the man behind ZemTV. Today, however, he also decided to open up, asking for support in his legal battle against the Dish Network.
Shahjahan Durrani, Shani for short, doesnt hide the fact that he was the driving force behind the Kodi-addons ZemTV, LiveStreamsPro, and F4MProxy. While the developer has never set foot in Texas, he is willing to defend himself. Problem is, he lacks the funds to do so.
Ive never been to Texas in my life, Im from London, England, Shani explains. Somehow a normal chap like me is expected to defend himself against a billion dollar media giant. I dont have the money to fight this on my own, and hope my friends will help support my fight against the expansion of copyright liability.
Shanis fundraiser went live a few hours ago and the first donations are now starting to come in. He has set a target of $8,500 set for his defense fund so there is still a long way to go.
Speaking with TorrentFreak, Shani explains that he got into Kodi addon development to broaden his coding skills and learn Python. ZemTV was a tool to watch recorded shows from zemtv.com, which he always assumed were perfectly legal, on his Apple TV. Then, he decided to help others to do the same.
The reason why I published the addon was that I saw it as a community helping each other out, and this was my way to give back. I never received any money from anybody and I wanted to keep it pure and free, Shani tells us.
ZemTV was a passive service, simply scraping content from a third party source, he explains. The addon provided an interface but did not host or control any allegedly infringing content directly....
Summary: Jan Wolfe of Reuters treats a fringe group called US Inventor as though its a conservative voice rather than a bunch of patent extremists pretending to be inventors
A VERY short while ago Jan Wolfe, who had been covering PTAB for a while, published this article about so-called conservatives attacking PTAB. We wrote about it yesterday. These are not quite the classical Conservatives but anti-government groups that are also misogynist and racist the uglier face of US politics that aligns with the anti-scientific party (GOP). "US Inventor" (covered here before) is mentioned by Wolfe, who is perhaps easily misled by the name of the group. These are the people who bully Michelle Lee and resort to terms like drain the swamp. They could only get less than a dozen people to gather for an illegal protest on USPTO premises, so why even pay attention to them?
From the article:
Its time for us to make patents great again, Michael Caputo, an advisor to Donald Trumps presidential campaign, told those gathered. US Inventor, the group behind the protest Caputo now represents as a spokesman, is calling for the abolition of the U.S. Patent Trial and Appeal Board, an administrative tribunal run by the patent office that reviews the validity of patents.
The rallying cry marks an about-face for some conservatives, who broadly supported the boards creation in 2011 as a way to rein in trial lawyers and patent trolls, who hold patents for the sole purpose of suing big companies for licensing fees.
Things have really flipped when it comes to the conservative perspective on patents, said Charles Duan, a lawyer with left-leaning consumer group Public Knowledge.
Much of the credit goes to activists who have convinced many conservatives that the real problem is not out-of-control litigation but how the tribunal des...
At Browserling we're building a network of online tools websites. Each site in the network focuses on one and only one tool category. Each tool does one and only one thing. The first four websites in the network are Online CSV Tools, which is all about working with Comma Separated Values data, Online JSON Tools, which is all about working with JSON data, Online XML Tools, which is all about working with XML documents, Online STRING Tools, which is all about working with strings.
Now we're releasing the fifth site.
The fifth site in our network is Online Random Tools. Online Random Tools is a collection of simple, free and easy to use randomization utilities. There are no ads, popups or other garbage. Just randomization utilities that work in your browser. Press button and instantly get random data.
Here's a list of all randomization tools so far:
A vulnerability affecting Android smartphones running Lolipop, Marshmallow, and Nougat (Around 77.5% of all Android devices) could be exploited by an attacker to record audio and screen activity.
The vulnerability resides in the Android MediaProjection service that has the access to both screen contents and record system audio.
Starting with the release of Android Lolipop (5.0), the MediaProjection service is not restricted to users with root access.
To use the MediaProjection service, an application would simply have to request access to this system Service via an Intent. Access to this system Service is granted by displaying a SystemUI pop-up that warns the user that the requesting application would like to capture the users screen. the MWR team wrote in a report.
The researchers explained that an attacker could overlay this SystemUI pop-up which warns the user that the contents of the screen and system audio would be captured, with an arbitrary message to trick the user into granting a malicious application the ability to capture the users screen.
The lack of specific android permissions to use this API makes it difficult check if an application uses the MediaProjection service to record video and audio. The unique access control mechanism available to prevent the abuse of the MediaProjection service s the SystemUI pop-up that could be easily bypassed.
The root cause of this vulnerability is due to the fact that vulnerable Android versions dont implement mechanisms to detect partially obscured SystemUI pop-ups.
An attacker can craft an application to draw an overlay over the SystemUI pop-up which would lead to the elevation of the applications privileges.
Furthermore, the SystemUI pop-up is the only access control mechanism available that prevents the abuse of the MediaProjection service. An attacker could trivially bypass this mechanism by tap-jacking this pop-up using publicly known methods to grant their applications the ability to capture the users screen. added MWR.
This vulnerability would allow an attacker to capture the users screen should the user tap of the SystemUI popup that has been overlayed by the attacker with an arbitrary message.
Google patched the vulnerability only in Android Oreo Android Oreo (8.0), older versions are still affec...
This week we have three newcomers in our chart.
Valerian and the City of a Thousand Planets is the most downloaded movie again.
The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.
RSS feed for the weekly movie download chart.
|Movie Rank||Rank last week||Movie name||IMDb Rating / Trailer|
|Most downloaded movies via torrents|
|1||(1)||Valerian and the City of a Thousand Planets||6.7 / trailer|
|2||()||Logan Lucky||7.2 / trailer|
|3||()||Wind River||7.8 / trailer|
|4||(2)||The Hitmans Bodyguard||7.0 /...|
There was the release candidate back for Halloween while now officially available is SuperTuxKart 0.9.3, the latest installment of the Tux-themed racing game...
Furthermore, with advancements in quantum computing and machine learning, many notable public figures, including Stephen Hawking and Elon Musk, have indicated a growing concern with the imminent threat of AI surpassing human intelligence (Gosset, 2017). For instance, Darrell M. West, a political scientist, has proposed a protectionist framework that appeals to transhumanism, in which he restructures socioeconomic policy to account for changes in technology-induced unemployment. In particular, he posits that Separating the dispersion of health care, disability, and pension benefits outside of employment offers workers with limited skills social benefits on a universal basis (West, 2015). Expounding upon this equivocation, a more viable solution to potential unemployment is the realization of a multi-faceted policy which advocates the improvement of STEM-related education on a broad economic base, with habituation programs for the unskilled workforce. That is, with the implementation of appropriate and reformatory policies concerning the future development of AI technologies, this sector provides an economic incentive for new job creation, compatible with industrial development.
Prompt: What are the political implications of artificial intelligence technology and how should policy makers ensure this technology will benefit diverse sectors of society?
In recent years, the rapid development and mass proliferation of artificial intelligence have had various sociopolitical implications. It is a commonly held belief that the emergence of this technology will have an unprecedented impact on policies and political agendas. However, such discourse often lacks a geopolitical and social dimension, which limits the breadth of analysis. Further, little consideration has been given to potential employment and public policy reform. Growing concerns have been raised regarding the potential risk inherent in the evolution of strong AI, which provides the basis for transhumanism, whereby it is conjectured that AI will eventually be able to surpass human intelligence. As such, it is incumbent upon the upcoming generation of policymakers to implement and adopt necessary measures, which will provide a careful, multilateral framework, ultimately achieving market-oriented technological advancement with respect to employment and public policy.
Machine learning, the interplay of computer science and neuroscience, is a rapidly developing field that has been a source of much political controversy in recent years. While emerging technologies have significantly i...
Thanks for everything you do, Jehu. Jehu Garcia YouTube Via: Vice:
Summary: A walk back along memory lane reveals that Battistelli has, all along, suppressed and marginalised DG3 members, in order to cement total control over the entire Organisation, not just the Office
LAST night we wrote about the EPOs latest attack on the boards, which have already been relegated to the suburbs of Munich (Haar). Its like Battistelli does not want these boards to exist, or wishes to overburden them to the point where they become useless for assurance of patent quality (prior art search and the like). He cannot legally knock them out of existence because of the EPC, but the EPC does not say anything about punishing them relentlessly, so Battistelli will probably get away with it. Now that his departure is almost imminent its ever more unlikely that hell lose his immunity and himself be subjected to disciplinary actions. 6 weeks from now he and Bergot will officially put the axe to long-term contracts. In other words, 6 months before hes gone hes totally destroying any prospects of the EPO ever recovering or salvaging the talent it once had.
Disturbing. To say the least.
We very much doubt the press will cover our findings regarding the Haar party, which is a sad display of irony if not black comedy. The press repeatedly ignores important stories and developments, as recently as weeks ago. Even comments on the matter might not get through. Heres yesterdays report of censorship in IP Kat (or maybe slow moderation by Bristows, or perhaps approval only after a complaint about it). Censorship is never good, the comment said. And yes, its about the boards. It often seems as though these matters cannot be brought up at IP Kat anymore, as peoples names cannot safely be mentioned (this limits useful debate). Truths are now personal attacks. To quote the comment at hand:
Why has my comment relating to recent case re entitlement of priority at the EPO not been accepted?
Is it because I mentioned the plea of a well known specialist about the fact that the EPO should only looking whether there is identity of invention?
Have you seen headlines that look like the following?
Nibiru BLACKOUT: Fears Planet X could knock out power
Nibiru PROOF: Footage sparks claims Planet X spotted over UK
Governments 'ALREADY preparing for Planet X apocalypse'
Could the end of the world come TODAY? Mysterious planet Nibiru 'set to wipe out all life with apocalyptic earthquakes'
Nibiru Apocalypse Upon Us AgainHere's How Yellowstone, Nuclear War and Asteroids Could Actually End the World
"I assumed that Nibiru was the sort of Internet rumor that would quickly pass," Morrison wrote in 2008, after his "Ask an Astrobiologist" website had become inundated with predictions that Nibiru was going to cross paths with Earth in 2012. "I now receive at least one question per day, ranging from anguished ('I can't sleep; I am really scared; I don't want to die') to the abusive ('Why are you lying; you are putting my family at risk; if NASA denies it then it must be true.')" he wrote.
Morrison laid out a detailed explanation, which he would repeat in years to come: There is no evidence that Nibiru exists; if it did exist, it would have screwed up the outer planets' orbits long ago; and people have predicted its arrival before and been wrong.
But to no avail:
Read more of this story at SoylentNews.
Do you want to change our world by sending humans to another one?
Now is the time.
At Lockheed Martin Space, weve been robotically exploring the solar system for decades. Weve been on Mars for over 40 years starting with Viking, and were the only company in the world that has helped NASA visit as many planets, moon, and asteroids.
Have you ever found yourself wishing you had a clone of the Game Boy, except it was actually twice as wide, and instead of holding it in your hands you pop a tiny separate controller out of the middle and play it that way? No? Well, neither have we. But that didnt stop [Christian Reinbacher] from designing and building exactly that, and by the looks of the finished product, we have to say he might be onto something.
To be fair, the charmingly-named FatPiBoy is not really meant to be played like the GameBoy of yesteryear. Its more like a game console with built in display; you prop the console up on something, and then remove the controller from the system and play that way.
The controller itself is a commercial product, the 8bitdo Zero, but [Christian] based the rest of the system on parts intended for the Adafruit PiGRRL. For the battery, [Christian] used a 4,500 mAh pack that was originally from his Nexus 7 tablet; a tip to keep in mind next time youre looking for a big and cheap lithium-ion battery.
[Christian] notes that the case design isnt perfect. Theres currently no external access to the Pis USB ports, and the recess for the 8bitdo Zero could be a few millimeters deeper. Still,...
"How do you run an operating system?" may seem like a simple question, since most of us are accustomed to turning on our computers and seeing our system spin up. However, this common model is only one way of running an operating system. As one of Linux's greatest strengths is versatility, Linux offers the most methods and environments for running it.
Recently, while reviewing the FAQ, I came across the question Whats a Socket? For those who are not familiar, I shall explain.
In brief, a Unix Socket (technically, the correct name is Unix domain socket, UDS) allows communication between two different processes on either the same machine or different machines in client-server application frameworks. To be more precise, its a way of communicating among computers using a standard Unix descriptors file.
8 minutes that will make you leave Islam YouTube
This resolves a serious question i had with the historic slave trade. That must be defined best as asking where are the descendants of the fourteen centuries of African slaving? This video resolves that issue.
It turns out that all men were castrated outright. Worse, the dominant gender for the Arab trade were women who were all sold as concubines. All pregnancies were ended by killing the new born.
It is thought that 11 million made it to the Americas to form their current populations. At least twice as many were shipped into the Muslim world and no significant extent population exists. In the same way, few white populations exist in the Arab world as well although white slaving was endemic until the eighteenth century.
Sometimes nature simply surprises you. This produces a super hard metal that can go into the body.
Titanium does pretty well but this is much better.
All good to have.
The formality of clothing might not only influence the way others perceive a person, and how people perceive themselves, but could influence decision making in important ways through its influence on cognitive processing style.Photograph by John Chillingworth / Getty Images
In May 2015, an official vote was held by the Oxford University Student Union about clothing policy. It was over whether to keep subfusc, a traditional uniform dating back to the mid-seventeenth centurycomprised of a dark suit or skirt, black shoes, white shirt, and a white or black bow tie or ribbonmandatory for exams. The vote was overwhelming: Over seventy-five percent of Oxford students wanted to maintain it.
The argument over subfusc centered on the drawbacks of perceived elitism versus wholesome tradition. Some of the dissenters lambasted the outfit as snobbish, yet no one at the student union on voting day mentioned a recent scientific finding that could have completely changed the terms of the conversation: Different styles of dress may influence your test-taking skills. Wearing more formal clothing than your peers, according to a study published last year in Social Psychological & Personality Science, tends to make you think more abstractly, holistically, and creatively.
Abraham M. Rutchick, a
The controversial certificate authority StartCom is going to close, according to board chairman Xiaosheng Tan, the business will end its activity on January 1, 2018.
Starting from January 1, 2018, StartCom will no longer issue new digital certificates, but CRL and OCSP service will continue for two years, until the expiration of the StartComs three key root pairs.
First reply to StartCom announcing the end of its certification business is a founding engineer glad it's dead https://t.co/ccXo6WHGYh
SwiftOnSecurity (@SwiftOnSecurity) November 17, 2017
For this reason, according to Tan the shut down of the CA would not have a major impact.
According to w3techs.com, about 0.1 per cent of websites worldwide still use StartCom as an SSL certificate authority.
The following diagram shows the historical trend in the
percentage of websites using StartCom.
Another p2k17 hackathon report is just in, from Antoine Jacoutot (ajacoutot@), who writes:
Nothing fancy, just ports work, but my first time in Berlin was a blast!
It's been a while since I attended a ports hackathon where I ended up exclusively working on ports, and P2K17 was one of them.
While preparing material for the upcoming BSDCan PF and
networking tutorial, I realized that the pop3 gropers were
actually not much fun to watch anymore. So I used the traffic
shaping features of my OpenBSD firewall to let the
miscreants inflict some pain on themselves. Watching logs became
Yes, in between a number of other things I am currently in the process of creating material for new and hopefully better PF and networking session.
I've been fishing for suggestions for topics to include in the tutorials on relevant mailing lists, and one suggestion that keeps coming up (even though it's actually covered in the existling slides as well as The Book of PF) is using traffic shaping features to punish undesirable activity, such as
Facebook is no stranger when it comes to open sourcing its computing knowledge. Over the years, it has consistently created software and hardware internally, then transferred that wisdom to the open source community to let them have it. Today, it announced it was open sourcing its modular network routing software called Open/R, as the tradition continues.
"Open/R is a distributed networking application platform. It runs on different parts of the network. Instead of relying on protocols for networking routing, it gives us flexibility to program and control a large variety of modern networks," Omar Baldonado, Engineering Director at Facebook explained.
[...] "This goes along with movement toward disaggregation of the network. If you open up the hardware and open up the software on top of it, it benefits everyone," Baldonado said.
Read more of this story at SoylentNews.
Doctor says test run on corpses last week helped explore technical issues and results will be published soon.
The state government websites publicly displayed personal details such as names and addresses of Aadhaar users.
The Aadhaar is the worlds largest biometric ID system, with over 1.123 billion enrolled members as of 28 February 2017.
The role of the system is crucial for both authenticating and authorizing transactions and is a pillar of the Indian UID (unique identification database).
The Aadhaar issuing body confirmed that the data was removed from the websites just after the data breach was noticed, but it did provide further details on the alleged hack.
Even if the UIDAI never publicly disclosed Aadhaar details public, more than 200 websites of central government and state government departments, were displaying the list of beneficiaries along with their name, address, other details and Aadhaar numbers.
Though the UIDAI never made Aadhaar details public, 210 websites of central government and state government departments including educational institutes were displaying the list of beneficiaries along with their name, address, other details and Aadhaar numbers of general public. reported the IndiaToday website.
The Aadhaar architecture has been designed to ensure the data security and privacy.
Various policies and procedures have been defined, these are reviewed and updated continually thereby appropriately controlling and monitoring any movement of people, material and data in and out of UIDAI premises, particularly the data centres, the UIDAI said.
The UIDAI confirmed that the security audits are conducted on a regular basis to improve the security and privacy of data, it confirmed the efforts to make the data safer and protected....
How healthy are clones? What about clones of clones?
This seems like a pretty silly way to go about testing this. Id clone like 1,000 to 10,000 mice and track them down generations to see if there was anything abnormal. Then, 1,000 cloned rats. And, finally clone 100 monkeys.
In the 1996 film Multiplicity, Michael Keaton plays an overworked construction worker who gets cloned so that he can spend more time with his family. Eventually his clone gets cloned, but this clone is defective, with a low IQ and weird personality. As might be expected, the movie was a total flop at the box office*.
Silly as it was, the movie does raise an interesting question: How healthy are clones? What about clones of clones?
Dolly the sheep, the worlds first cloned animal, died young at the age of six. This, along with other data, suggested that cloned animals may not be entirely healthy, specifically that they may have shorter lifespans. However, a follow-up study that examined 13 cloned sheep concluded that cloning had no obvious detrimental long-term health effects.
Robots are great in general, and [taylor] is currently working on something a bit unusual: a 3D printed explorer robot to autonomously follow outdoor trails, named Rover. Rover is still under development, and [taylor] recently completed the drive system and body designs, all shared via OnShape.
Moving the motors and gearboxes into the wheels themselves makes for a very small main body to the robot, and its more than a bit strange to see the wheel spinning opposite to the wheels hub. Check out the video showcasing the latest development of the wheels, embedded below.
[taylor] has an image gallery of the current hardware to go with the video above. Robots whose primary purpose is exploration are always exciting to see; some examples include PUFFER the rover and the Autonomous Underwater Glider (winner of the 2017 Hackaday Prize!)
Scientists at Indias National Chemistry Laboratory have pinpointed a clean, cost-effective fuel cell that can replace the unreliable and pollutive diesel generators that power Indias telecom towers.
The following is an excerpt from Multiphysics Simulation 2017.
By Lexi Carver
Despite significant addition to power generation and transmission capacities in recent years, India still faces an energy deficit of 2.1% and about 20,000 villages are off-grid. Moreover, electricity supply to urban and rural India is still unreliable. As a result, diesel generators are widely used for decentralized power generation. These generators (Figure 1, top), although inexpensive, are inefficient and pose great environmental and health risks.
Figure 1. Top: Diesel generators used to power telecommunications towers in India. Bottom: PEM fuel cell.
This is why the National Chemistry Laboratory (NCL) in India, along with two other labs in the Council of Scientific and Industrial Research (CSIR), the Central Electrochemical Research Institute (CECRI), and the National Physical Laboratory (NPL), are investigating cleaner, cost-effective, and more dependable technology for powering telecom towers and eventually buildings.
A promising answer to the cost and pollution conundrum can be found in proton exchange membrane fuel cells (PEM fuel cells or PEMFCs, shown in Figure 1, bottom), which are being phased into many applications as replacements for older power technology. Thanks to their small carbon footprints, low decibel levels, fuel compatibility, and excellent complementarity with other renewable energy options, they have potential for use in transportation, residential buildings and offices, and certain industrial sectors. PEM fuel cell systems have an overall efficiency exceeding 30% (compared to 22-25% for diesel generators), and when run on pure hydrogen, their only emission is water vapor.
INSIDE A PEM FUEL CELL
PEM fuel cells contain a membrane electrode assembly (MEA) that comprises gas diffusion layers, electrodes, and polymer electrolyte membrane. Electrochemical reactions that generate power occur inside the MEA.
In a single PEM fuel cell, hydrogen streams to the anode side of the assembly, where it is split...
India plans to visit the moon a third time and also return, with Japan for company this time.
Their lander and rover mission will bring samples back from moon, the chiefs of the two space agencies said on Friday.
The Indian Space Research Organisation (ISRO) and the Japan Aerospace Exploration Agency (JAXA) have started to work out the contours of their joint trip which will be the third for both countries.
They did not say when it would be sent. The plans are in the early stages: Indian Space Research Organisation Chairman and Secretary, Department of Space, A.S.Kiran Kumar, and JAXA president Naoki Okumura said the 'implementation arrangements' are likely be reached in a couple of months.
Read more of this story at SoylentNews.
A team of university scientists has developed the worlds first artificial kidney technology to be implanted in the body. Their bio-hybrid approach uses living kidney cells in tandem with a series of specialized microchips powered by the human heart to filter waste from the blood stream.
The National Kidney Foundation estimates that over 100,000 patients are on the waiting list for a donor kidney, and over 3,000 are added list each year. The average patient spends 3.6 years waiting for a viable transplant, and may be treated with dialysis while they wait, but only one in three dialysis patient survives longer than five years without a transplant.
Even if you like using a graphical user interface, you can probably agree that writing a graphical program is usually harder than writing an old-fashioned text-based program. Putting that GUI into an online format means even more to think about. [Adam Kewley] has the answer to that problem: Jobson. As you can see in the video below, the program is a web server that runs command line programs as jobs.
Simply write a YAML file to describe the programs inputs and outputs and Jobson will create input fields for arguments and display the output in a web page. Any files the program creates are available to download. Basically any command line program can be quickly and easily pulled into one web interface to rule them.
If a program takes a long time to run, Jobson will let you switch away and then later resume looking at the output. You can also abort a job or look at the arguments it received. Jobson can also authenticate users with several different methods to prevent just anyone from executing jobs.
If you really want to write a graphical program, try QTCreator. Or, you can get a shell in a web browser if you want to go that route. But this is the smoothest method weve seen for gathering command line programs into one place for monitoring and control. Neat!
Take a close look at the R2-D2-shaped lander that startup Moon Express wants to land on the moon.
LIGO scientists say they have discovered gravitational waves coming from another black hole merger, and it's the tiniest one they've ever seen.
The findings, submitted to the Astrophysical Journal Letters, could shed light on the diversity of the black hole population and may help scientists figure out why larger black holes appear to behave a little differently from the smaller ones.
"Its mass makes it very interesting," said Salvatore Vitale, a data analyst and theorist with the LIGO Lab at MIT. The discovery, he added, "really starts populating more of this low-mass region that [until now] was quite empty."
The black holes had estimated masses of around 12 and 7 solar masses.
Related: LIGO May
Have Detected Merging Neutron Stars for the First Time
First Joint Detection of Gravitational Waves by LIGO and Virgo
"Kilonova" Observed Using Gravitational Waves, Sparking Era of "Multimessenger Astrophysics"
Read more of this story at SoylentNews.
Revolutionizing technology and spaceflight.
Its the first-ever sample of metallic hydrogen on Earth, so when youre looking at it, youre looking at something thats never existed before
For nearly 100 years, scientists have dreamed of turning the lightest of all the elements, hydrogen, into a metal.
Now, in a stunning act of modern-day alchemy, scientists at Harvard University have finally succeeded in creating a tiny amount of what is the rarest, and possibly most valuable, material on the planet, they reported in the journal Science.
"The world's longest aircraft dubbed the 'Flying Bum' was
seriously damaged on Saturday after it slipped its moorings and
crashed into a field....
'The aircraft has a safety system which operates automatically in circumstances of the aircraft breaking free of its mast, and is designed to rip open the hull and deflate the aircraft.'"
Read more of this story at SoylentNews.
This week in DistroWatch Weekly: Review: Fedora 27 WorkstationNews: Ubuntu running on Samsung phones, Red Hat unveils RHEL for ARM, Parabola continues to provide 32-bit packagesQuestions and answers: Cross-distro software portsReleased last week: Fedora 27, Tails 3.3, VyOS 1.1.8Torrent corner: Fedora, GhostBSD, KaOS, RDS, Slax, Sparky, Tails, VyOSOpinion....
[Peter]s homebuilt ultralight is actually flying now and not in ground effect, much to the chagrin of YouTube commenters. [Peter Sripol] built a Part 103 ultralight (no license required, any moron can jump in one and fly) in his basement out of foam board from Lowes. Now, hes actually doing flight testing, and he managed to build a good plane. Someone gifted him a ballistic parachute so the GoFundMe for the parachute is unneeded right now, but this gift parachute is a bit too big for the airframe. Not a problem; hell just sell it and buy the smaller model.
Last week, rumors circulated of Broadcom acquiring Qualcomm for the sum of One Hundred Billion Dollars. It looks like thats not happening now. Qualcomm rejected a deal for $103B, saying the offer, undervalued the company and would face regulatory hurdles. Does this mean the deal is off? No, there are 80s guys out there who put the dollar signs in Busine$$, and theres politicking going on.
A few links posts ago, I pointed out there were some very fancy LED panels available on eBay for very cheap. The Barco NX-4 LED panels are a 3236 panels of RGB LEDs, driven very quickly by some FPGA goodness. The reverse engineering of these panels is well underway, and [Ian] and his team almost have everything figured out. Glad I got my ten panels
TechShop is gone. With a heavy heart, we bid adieu to a business with a whole bunch of tools anyone can use. This leaves a lot of people with TechShop memberships out in the cold, and to ease the pain, Glowforge, Inventables, Formlabs, and littleBits are offering some discounts so you can build a hackerspace in your garage or basement. In other TechShop news, the question on everyones mind is, what are they going to do with all the machines?. Nobody knows, but the smart money is a liquidation/auction. Yes, in a few months, youll probably be renting a U-Haul and driving to TechShop one last time.
I was partially inspired by Bitbox's really wonderful episode, "hpr2413: personal health care", to ramble on about the need for the HPR community to, maybe, start talking about a mental health crisis that touches pretty much everyone in the modern world: addiction. Personal Health Care hosted by Bitbox: http://hackerpublicradio.org/eps.php?id=2413
We have just posted a short article at DataCamp (where I now work) titled "Using Data Science to Explore Software Development". We'd be grateful for feedback, and doubly grateful if you could help get it some attention: the more people who look and comment, the sooner we can move ahead with building some online courses to teach people how to get, clean, analyze, and make sense of software engineering data.
Tyranny of the patent microcosm continues to slip away
Nice try, patent zealots, but patent quality matters more than your protection money
Summary: The Leahy-Smith America Invents Act (AIA), which gave powers to the Patent Trial and Appeal Board (PTAB) through inter partes reviews (IPRs), has no imminent threats, not potent ones anyway
THE Patent Trial and Appeal Board (PTAB) is a subject we get to revisit every weekend. A lot is happening there. Technology companies like PTAB, whereas law firms are trying to destroy PTAB, which really says a lot about whose interests are served by improved patent quality.
A few days ago the patent trolls lobby expressed its interest in an old proposal for slicing USPTO. By independent USPTO they just mean a private USPTO, i.e. a for-profit monopoly whose goal would be to maximise profit, potentially by lowering patent quality (a la EPO).
The USPTO is one of the few federal agencies that actually makes a profit from its operations, versus the majority of other US federal agencies which require taxpayer dollars to carry out their delegated functions. At present, the USPTO collects filing fees from applicants for patents and trademarks, as well as additional fees for many other services. These fees cover the USPTOs operations, including the Trademark Trial and Appeal Board (TTAB) and the Patent Trial and Appeal Board (PTAB). Historically, however, the federal government has diverted excess fees collected by the USPTO away from that office and into unrelated government programmes some estimates put the figure at more than $1 billion diverted from the USPTO since the early 1990s alone. With the enactment of the America Invents Act in 2011, the Patent and Trademark Fee Reserve Fund was created to hold all patent and trademark fees collected by the USPTO, with all allocations from the reserve fund to be determined by Congress under the USPTOs annual appropriation amount.
Things as they stand at the moment arent pleasing to those who became accustomed to a venue-shifting, litigant-friendly system (favouring plaintiffs with patents that lack merit). Loopholes...
The Inquirer writes about research carried out by Google and the University of California which found over than 1.9 billion usernames and passwords available on the black market, many of which provide access to active Google accounts.
The researchers used Google's proprietary data to see whether or not stolen passwords could be used to gain access to user accounts, and found that an estimated 25 per cent of the stolen credentials can successfully be used by cyber crooks to gain access to functioning Google accounts.
Read more of this story at SoylentNews.
Summary: Demand of 35% increases from the boards serves to show that Battistelli now does to the independent judges what he already did to examiners at the Office
EARLIER this month we wrote about the Haar party which chairs refuse to attend. Team Battistelli had the brilliant idea of inviting EPO chairs to actually celebrate Battistellis attack on the EPC. How tactless a move.
So basically, Battistelli is now doing to the boards the same thing he did to examiners: working them to death.As far as I can tell, one source tells us, there are still only two takers for [the] meet up [and] In other news, Battistelli junior is demanding 35% increases from the boards on the basis of concentrating on essentials.
Battistelli junior is [t]he independent other president. Holder of secret delegated powers.
So basically, Battistelli is now doing to the boards the same thing he did to examiners: working them to death. Neither patent nor service quality can be assured this way.
It often seems like Battistelli wants the EPO to have no staff anymore.How independent and impartial they must feel
This has gotten as ridiculous as it can get. But also predictable. It often seems like Battistelli wants the EPO to have no staff anymore. Maybe he wants everyone replaced by useless computer programs and fresh graduates with only enough knowledge to help operate these. Or maybe Battistelli wants to just outsource most of the work to yet another French company. Or some French court (UPC in Paris).
Major tech companies are beefing up their lobbying amid scrutiny from Congress over their handling of Russian interference in the 2016 election.Executives from Facebook, Google and Twitter testified before lawmakers this month about Russian actors...
The details of your story may vary but for the most, it follows a familiar path. You travel along a default career path until a decision point when you need to shift the trajectory. This typically means obtaining new skills like learning how to become a manager or business skills when to work for yourself. What you really want is to use and deepen your expertise. What you lack is a clear path to move forward along your desired trajectory. And without an objective mentor, youre more likely to choose an undesirable path, or worse, choose none at all, allow inertia to carry you along.
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog