IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Tuesday, 19 June

04:00

The Colpitts Oscillator Explained "IndyWatch Feed Tech"

The Colpitts oscillator is a time-tested design from 1918. [The Offset Volt] has a few videos covering the design of these circuits including an op-amp and a transistor version. You can find the videos below.

You can tell a Colpitts oscillator by the two capacitors in the feedback circuit. The capacitors form an effective capacitance for the circuit (assuming you have C1 and C2) of the product of C1 and C2 divided by the sum of the two capacitors. The effective capacitance and the inductance form a bandpass filter that is very sharp at the frequency of interest, allowing the amplifier to build up oscillations at that frequency.

It is unusual to show an op-amp oscillator, and it is interesting to think about the design changes and limitations discussed in the video. The video isnt just theoretical. He also builds the circuit and looks at the real world performance.

It is also interesting to look at the difference between the op amp and the bipolar circuit. Of course, you can use other active devices like a FET, too. This is also an important circuit when a crystal is part of the feedback circuit instead of an inductor.

We see a lot of these as low-power ham radio transmitters. If you want to see a different oscillator design, we talked about Pierce oscillators before.

03:33

President Trump Orders the Creation of a United States Space Force "IndyWatch Feed Tech"

Trump orders creation of space-focused U.S. military branch

U.S. President Donald Trump on Monday said he was ordering the creation of a sixth branch of the military to focus on space, a move critics said could harm the Air Force.

"It is not enough to merely have an American presence in space. We must have American dominance in space," Trump said before a meeting of his National Space Council. "We are going to have the Air Force and we're going to have the 'Space Force.' Separate but equal. It is going to be something," he said later.

The United States is a member of the 1967 Outer Space Treaty, which bars the stationing of weapons of mass destruction in space and only allows for the use of the moon and other celestial bodies for peaceful purposes.

The idea of a Space Force has been raised before, by Trump and previous administrations, with proponents saying it would make the Pentagon more efficient. It has also faced criticism from senior military officials. Air Force Chief of Staff General David Goldfein told a 2017 congressional hearing that creating a new space branch would "move us in the wrong direction." The Air Force oversees most of the nation's space-related military activity.

The move would require the budgetary approval of the U.S. Congress, which has been divided on the idea.

President Trump orders the creation of new Starship Troopers/Space Marines memes.

We should have a separate "Space" topic on SoylentNews at this point. We are all going to be drafted to fight aliens eventually.

Also at BBC (#winning image).

Previously: The United States Space Corps Wants You...
Congressional Panel Puts Plans for a US Space Corps in 2018 Defense Budget
The Case for a U.S. Space Force


Original Submission

Read more of this story at SoylentNews.

02:00

HPR2577: Emigration "IndyWatch Feed Tech"

Confused about leaving your homeland for <strike>greener</strike> pastures? Maybe this episode will shed some light on the subject. Public domain music from archive.org. Can you find your national anthem? Do you know all the words to your national anthem? Either way, you should be ashamed of yourself.

01:59

AMD Offers Threadripper Trade-in for Winners of Intel Core i7-8086K Sweepstakes "IndyWatch Feed Tech"

AMD Trolls Intel: Offers 16-Core Chip to Winners of Six-Core 8086K

AMD's feud with Intel took an interesting turn today as the company announced that it would swap 40 Core i7-8086K's won from Intel's sweepstakes with a much beefier Threadripper 1950X CPU.

At Computex 2018, Intel officially announced it was releasing the Core i7-8086K, a special edition processor that commemorates the 40th anniversary of the 8086, which debuted as the first x86 processor on June 8, 1978. As part of the special-edition release, Intel opened up a sweepstakes to give away 8,086 of the six-core 12-thread processors. Intel also made the processors available at retail, and though the company doesn't have an official MSRP, you can find the chips at several retailers for ~$425.

Now AMD is offering to replace 40 of the winners' chips with its own 16-core 32-thread $799 Threadripper processors, thus throwing a marketing wrench into Intel's 40th-anniversary celebration.

See also: The Intel Core i7-8086K Review


Original Submission

Read more of this story at SoylentNews.

01:40

RadeonSI Lands OpenGL 3.3 Compatibility Profile Support "IndyWatch Feed Tech"

Thanks to work done over the past few months by AMD's Marek Olk on improving Mesa's OpenGL compatibility profile support and then today carried over the final mile by Valve's Timothy Arceri, Mesa 18.2 now exposes OpenGL 3.3 under the compatibility context...

01:28

[$] TCP small queues and WiFi aggregation a war story "IndyWatch Feed Tech"

This article describes our findings that connected TCP small queues (TSQ) with the behavior of advanced WiFi protocols and, in the process, solved a throughput regression. The resulting patch is already in the mainline tree, so before continuing, please make sure your kernel is updated. Beyond the fix, it is delightful to travel through history to see how we discovered the problem, how it was tackled, and how it was patched.

Subscribers can read on for the full story by guest authors Carlo Grazia and Natale Patriciello.

01:23

Google can use AI to predict when youll die "IndyWatch Feed Tech"

It works by matching up personal data with hospital records.

By.

01:22

Inside the controversial new surgery to transplant human wombs "IndyWatch Feed Tech"

Pioneering surgeons have made it possible to transplant a human uterus that can bear children, offering hope to millions of women who never thought they could give birth.

01:22

A Neuroscientist Explains What Happens to Your Brain When You Dont Sleep "IndyWatch Feed Tech"

Sleep deprivation affects nearly all parts of your brain, but it is most detrimental to simple cognitive functions that we take for granted, such as memory and staying alert.

Ph.D. neuroscience candidate Shannon Odell says scientific research suggests that sleep deprivation majorly reduces cognitive performance. Studies have shown that patients have significantly reduced their thinking ability after just one night of sleep deprivation, specifically in the hippocampus, also known as the memory center.

Watch Your Brain on Blank on Facebook for more mind-expanding brain truths.

01:22

Colony ship to nearest star only needs crew of 100 to survive "IndyWatch Feed Tech"

A mission to Proxima Centauri b, the closest Earth-like exoplanet, would take over six thousand years but you only need a small crew to get started.

01:12

Trump Orders Creation of Space-Focused U.S. Military Branch "IndyWatch Feed Tech"

Oh sure, itll make the Pentagon more efficient: At incinerating trillions of taxpayer dollars. Also, theres Carol Rosins account of her time with Wernher Von Braun, which might finally be coming into play: The strategy that Wernher Von Braun taught me was that first the Russians are going to be considered to be the enemy. []

01:02

Researchers capture best ever evidence of rare black hole "IndyWatch Feed Tech"

ESAs XMM-Newton observatory has discovered the best-ever candidate for a very rare and elusive type of cosmic phenomenon: a medium-weight black hole in the process of tearing apart and feasting on a nearby star.

There are various types of black hole lurking throughout the Universe: massive stars create stellar-mass black holes when they die, while galaxies host supermassive black holes at their centres, with masses equivalent to millions or billions of Suns.

Lying between these extremes is a more retiring member of the black hole family: intermediate-mass black holes. Thought to be seeds that will eventually grow to become supermassive, these black holes are especially elusive, and thus very few robust candidates have ever been found.

01:01

Raytheons Analog Read-Only Memory is Tube-Based "IndyWatch Feed Tech"

There are many ways of storing data in a computers memory, and not all of them allow the computer to write to it. For older equipment, this was often a physical limitation to the hardware itself. Its easier and cheaper for some memory to be read-only, but if you go back really far you reach a time before even ROMs were widespread. One fascinating memory scheme is this example using a vacuum tube that stores the characters needed for a display.

[eric] over at TubeTime recently came across a Raytheon monoscope from days of yore and started figuring out how it works. The device is essentially a character display in an oscilloscope-like CRT package, but the way that it displays the characters is an interesting walk through history. The monoscope has two circuits, one which selects the character and the other determines the position on the screen. Each circuit is fed a delightfully analog sine wave, which allows the device to create essentially a scanning pattern on the screen for refreshing the display.

[eric] goes into a lot of detail on how this c.1967 device works, and its interesting to see how engineers were able to get working memory with their relatively limited toolset. One of the nice things about working in the analog world, though, is that its relatively easy to figure out how things work and start using them for all kinds of other purposes, like old analog UHF TV tuners.

00:47

[SECURITY] [CVE-2018-8030] Apache Qpid Broker-J Denial of Service Vulnerability when AMQP 0-8...0-91 messages exceed maximum size limit "IndyWatch Feed Tech"

Posted by Alex Rudyy on Jun 18

CVE-2018-8030: Apache Qpid Broker-J Denial of Service Vulnerability
when AMQP 0-8...0-91 messages exceed maximum size limit

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Versions 7.0.0-7.0.4

Description:

A Denial of Service vulnerability [1] was found in Apache Qpid Broker-J
versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to
publish messages with size greater than allowed maximum message...

00:42

Meet The Universes First-Ever Supermassive Binary Black Holes "IndyWatch Feed Tech"

If you thought LIGOs recent discoveries were profound and unusual, wait until you meet OJ 287.

00:42

The Shift From 4G to 5G Will Change Just About Everything "IndyWatch Feed Tech"

Telecom experts are going so far as to herald the arrival of 5G as the advent of the fourth industrial revolution. There are an ever-expanding number of high-tech devices out there trying to connect to the internet every day, many of which require extensive bandwidth, and companies across the board will leverage 5G capabilities to better reach consumers.

The application of 5G technology will result in massive changes for both consumers and enterprises, said Jeff Weisbein, founder and CEO of digital media company Best Techie. 5G networks will offer consumers incredible broadband speeds at home (up to 20Gb/s). It will also enable companies to make advancements such as even smarter, better connected cars, advancements in medical technologies and improved retail experiences through personalization.

5G refers to 5th-Generation Wireless Systems and uses additional spectrum in the existing LTE frequency range to build on the capabilities of 4G, which is often used interchangeably with 4G LTE by marketers. LTE denotes Long Term Evolution, and is a term that was deployed with early 4G networks that presented a substantial improvement on 3G, but did not fully qualify as 4G, meaning 4G LTE is essentially first-generation 4G.

00:27

Google Removes Uber Integration From Google Maps "IndyWatch Feed Tech"

Uber booking has been removed from Google Maps for Android

Google Maps can no longer be used to book an Uber on Android. It brings the app in line with the iOS version, which lost the feature last summer, as noted by Android Police.

Google has had the ability to show price estimates and pickup wait times for ride-sharing apps for a while. Back in January 2017, Uber alone gained the ability to actually book rides in the Google Maps app by pulling up your account window and hailing your ride without ever leaving the app.

[...] It's not entirely clear why Google is removing the feature. For what it's worth, Alphabet's venture capital business has made a large investment in Lyft.

Also at Ars Technica and 9to5Google.


Original Submission

Read more of this story at SoylentNews.

00:09

More Media Reports About Decline in Quality of European Patents (Granted by the EPO) "IndyWatch Feed Tech"

Free tour en ruine

Summary: What the media is saying about the letter from Grnecker, Hoffmann Eitle, Maiwald and Vossius & Partner whilst EPO communications shift attention to shallow puff pieces about how wonderful Benot Battistelli is

FOUND among the puff pieces from European Inventor Award (heres the latest example with a uniquely French flavour, Michelin) theres some EPO scandals coverage. Its not so easy to find however; the EPO wasted a lot of money on several external PR agencies, which are ghostwriting a bunch of nonsense to drown out actual, real news.

the EPO wasted a lot of money on several external PR agencies, which are ghostwriting a bunch of nonsense to drown out actual, real news.This morning in Google News the article EPO under pressure not to lower quality standards came up. Well, unlike EPO-bribed publications that look the other way while Europes system burns, this one has said:

In a letter send to the outgoing EPO president Benot Battistelli, four reowned law firms Grnecker, Hoffmann Eitle, Maiwald und Vossius&Partner critisise that the time for the examination of patents has been cut drastically on cost of quality. While the goal of establishing a higher productivity at the EPO through its Early Certainty Initiative in Examination was good, working routines, which incentivise a high throughput of patent searches and examinations have led to lower quality. When the aim is to terminate proceedings as quickly as possible within specific allowed times, the quality of the search and examination of applications must suffer, the patent attorneys write in their letter. The fees for search and examination, which are rather high when compared internationally, can only be justified by giving the examiners sufficient time for an indepth assessment......

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 18 June

23:31

HHVM 3.27 Released With More Mature HackC Compiler Front-End "IndyWatch Feed Tech"

Just over one month after the release of HHVM 3.26 that introduced the new HackC compiler front-end for Hack and PHP languages, HHVM 3.27 is now available...

23:30

Digital Enterprises - How Product Analytics can be used to automate insights to create actionable intelligence "IndyWatch Feed Tech"

Learn about the role of product analytics in optimizing the utilization phase of an enterprises solution.

Trends in the Electronics Industry such as intelligent, connected devices are disrupting how enterprises develop products, bring them to market, and evolve them over time.  Successful digitization strategies require an integrated approach to this flow of ideation, realization and utilization. The transformation in the utilization phase is arguably the most dramatic, since it has been driving large increases in a solutions value and even new business models. Increasingly, the data explosion from Advanced Manufacturing (Industry 4.0) and smarter more connected devices is complicating efforts to gain visibility to product and supply chain performance. Data is disparate, out of context and often inaccessible. Yet, customers increasingly demand rapid resolution of issues and innovation driven by their own product experiences.

In this webinar, the first in our series: Digital Enterprises - Electronics and Semiconductor Industry, we will focus on the role of product analytics in optimizing the utilization phase of an enterprises solution.  Well focus in on the following challenges and show you how to:

  • Close the loop between product design and performance
  • Discover emerging product trends to prevent recalls
  • Eliminate time and costs required to repeatedly consolidate and search big data
  • Empower data-driven decision making across the organization
  • Improve customer experience

You may think youre doing this today, right? Well, our experience is that traditional analytics projects are failing to deliver on expectations while they consume excess time and budget. Please join us while we take a deeper dive into some of the new and fascinating areas and technological advances that are transforming the electronics industry.

PRESENTER:

...

23:21

Beware Team UPCs Biggest Two Lies About the Unitary Patent (UPC) "IndyWatch Feed Tech"

France stands to benefit, as usual

The three Frenchmen

Summary: Claims that a Unified Patent Court (UPC) will commence next year are nothing but a fantasy of the Liar in Chief, Benot Battistelli, who keeps telling lies to French media (some of which he passes EPO money to, just like he passes EPO money to his other employer)

THE EPO has not been saying much about the UPC. There was mere repetition of Battistellis lies in French media a month ago (e.g. about UPC timeline [1, 2]) and its all the same nonsense about UPC getting ready to commence. Team UPC has not said much, either. For weeks!

This whole pursuit of unitary patents has been one big lie on top of serious political corruption and continental-scale entryism by the patent microcosm.Earlier today, however, we saw this new article from Charles Russell Speechlys LLPs Mary Bagnall, who perpetuates popular (among Team UPCs greedy echo chamber) myths. Amid Brexit negotiations and a serious constitutional complaint (related to EPO scandals and Brexit) they pretend that nothing is amiss.

As we said several weeks ago, the main two lies which Team UPC keeps telling/spreading/copy-pasting about UPC these days are as follows: 1) UPC will definitely start in 2019. 2) the only question is, can the UK participate?

One is wishful thinking and the second is a loaded statement/question. This whole pursuit of unitary patents has been one big lie on top of serious political corruption and continental-scale entryism by the patent microcosm. Thankfully, German judges are seeing all that and we expect the UPC to languish in year...

22:54

'Martyr of the A10': DNA Leads to France Arrests Over 1987 Murder "IndyWatch Feed Tech"

Submitted via IRC for Runaway1956

'Martyr of the A10': DNA leads to France arrests over 1987 murder

French police have arrested a couple 31 years after their daughter was found dead, in a cold case revived through DNA evidence. The mutilated body of the child, named by police as Inass, was found by a motorway in central France in 1987. The parents were traced after the DNA of their son, tested in an unrelated case, was matched with that of the girl, French media report.

[...] In 2008, her DNA was formally identified, and the related information registered in a national genetic prints database. However no identification was made at that stage. The case was reopened in 2012 when a call for witnesses was released with a picture of the dead girl's face and the caption: "Who is she?"

The apparent breakthrough in the case happened when a man was arrested over a violent incident in 2016. His DNA reportedly identified him as the victim's brother. Months of investigation then led police to the parents.

Related: DNA From Genealogy Site Led to Capture of Golden State Killer Suspect
GEDmatch: "What If It Was Called Police Genealogy?"
DNA Collected from Golden State Killer Suspect's Car, Leading to Arrest
Another Alleged Murderer Shaken Out of the Family Tree


Original Submission

Read more of this story at SoylentNews.

22:36

Diversity at the EPO "IndyWatch Feed Tech"

At the EPO, we already know that diversity of any kind can be great for an organisation. Our Office benefits from the dedication of staff that come from 35 countries. And we draw strength from our many different cultural backgrounds. Benot Battistelli, earlier this month.

French EPO

Summary: Two decades of EPO with 16-17 years under the control of French Presidents (and nowadays predominantly French management in general with Inventor Award held in France almost half the time) is diversity at the EPO

22:31

Hacking more than 400 Axis camera models by chaining 3 flaws "IndyWatch Feed Tech"

Researchers from cybersecurity firm VDOO have discovered several vulnerabilities affecting nearly 400 security cameras from Axis Communications.

Researchers from cybersecurity firm VDOO have conducted a study on IoT devices and discovered seven vulnerabilities in cameras manufactured by Axis Communications. According to the vendor, nearly 400 models are affected by the issue and Axis has released security patches for each flaw.

An attacker can remotely take over a camera by knowing its IP address, exploiting the flaws it is possible to access and freeze the video stream, control every function of the camera (e.g. motion detection, direction) and also to alter the software.

Experts warn that an attacker can compromise cameras to recruit them in a botnet that could be used to power a broad range of attacks, such a DDoS and cryptocurrency mining.

One of the vendors for which we found vulnerable devices was Axis Communications. Our team discovered a critical chain of vulnerabilities in Axis security cameras. The vulnerabilities allow an adversary that obtained the cameras IP address to remotely take over the cameras (via LAN or internet). In total, VDOO has responsibly disclosed seven vulnerabilities to Axis security team. reads the analysis published by VDOO.

Chaining three of the reported vulnerabilities together, allows an unauthenticated remote attacker that has access to the camera login page through the network (without any previous access to the camera or credentials to the camera) to fully control the affected camera.

The experts published Technical details for each issue and related proof-of-concept (PoC) code.

The researchers demonstrated that chaining three vulnerabilities it is possible to hack Axis cameras by sending specially crafted requests as root (CVE-2018-10662) and bypassing authentication (CVE-2018-10661), then injecting arbitrary shell commands (CVE-2018-10660).

Below the attack sequence demonstrated by the researchers:

  • Step 1: The attacker uses an authorization bypass vulnerability (CVE-2018-10661) to send unauthenticated HTTP requests that reach the .srv functionality (that handles .srv requests) inside /bin/ssid. Normally, this functionality should only be accessible to administrative users.
  • Step 2: The atta...

22:06

DragonFlyBSD 5.2.2 Released To Fix The Lazy State Save/Restore Bug "IndyWatch Feed Tech"

DragonFlyBSD 5.2.2 is now available as the latest stable release to this popular BSD operating system...

22:00

Arduino Watchdog Sniffs Out Hot 3D Printers "IndyWatch Feed Tech"

We know weve told you this already, but you should really keep a close eye on your 3D printer. The cheaper import machines are starting to display a worrying tendency to go up in flames, either due to cheap components or design flaws. The fact that it happens is, sadly, no longer up for debate. The best thing we can do now is figure out ways to mitigate the risk for all the printers that are already deployed in the field.

At the risk of making a generalization, most 3D printer fires seem to be due to overheating components. Not a huge surprise, of course, as parts of a 3D printer heat up to hundreds of degrees and must remain there for hours and hours on end. Accordingly, [Bin Sun] has created a very slick device that keeps a close eye on the printers temperature at various locations, and cuts power if anything goes out of acceptable range.

The device is powered by an Arduino Nano and uses a 1602 serial LCD and KY040 rotary encoder to provide the user interface. The user can set the shutdown temperature with the encoder knob, and the 162 character LCD will give a real-time display of current temperature and power status.

Once the user-defined tem...

21:59

SurveyMonkey confidentially registers for initial public stock offering "IndyWatch Feed Tech"

SurveyMonkey on Monday said that it has confidentially filed for an initial public offering with the Securities and Exchange Commission via its parent company SVMK. The company said that it had not yet determined the number of shares nor the price...

21:46

French authorities dismantle Black Hand dark web market "IndyWatch Feed Tech"

The Black Hand forum, considered to be one of the most important illegal platforms of the dark web in France, has been dismantled by French law enforcement. According to information shared by Grald Darmanin, the French Minister of Public Action and Accounts, over 40 agents of the National Directorate of Intelligence and Customs Investigations (DNRED), customs handlers and technical experts were involved in coordinated raids in several French cities on June 12, 2018. The operation More

The post French authorities dismantle Black Hand dark web market appeared first on Help Net Security.

21:44

Volkswagen Claims Ownership of an Entire Group of Insects "IndyWatch Feed Tech"

Using word searches to find infringement is a bad way to go about things. It is likely why Volkswagen filed three takedown requests for art of beetles. Not Beetles with four wheels and headlights. Beetles with six legs and hard, shiny carapaces. For the record, Volkswagen holds no rights to literal bugs.

Peggy Muddles is a scientist and an artist who marries her two lives by making science-themed art. Among her many digital prints are a number of works featuring beetlesthe type of insect. And, well, Volkswagen was not having any of that.

Muddles sells some of her prints through the website RedBubble. On December 1, 2017, she received a takedown notice for her rove beetle art from Volkswagen. Now, the rove beetle is a common insect found throughout Europe. A Volkswagen Beetle is a car.

Volkswagen, it turns out, does not own beetles the insect, the largest group of animals on this planet. Nor does it own rove beetles, the largest group of beetles alive. And it does not own the depiction of the species Paederus fuscipes, the species Muddles depicted in her art.

In response, Muddles did the right thing: she consulted a lawyer, crafted a counter-notice explaining that her bug was not the same as a car named for a bug, and sent it to RedBubble and Volkswagen. After VWs option to pursue expired, I repeatedly attempted to contact RedBubble to have my listing reinstated, but received only automated replies indicating that my email had been received, Muddles told EFF. After about two months, I chalked it up to a simple error and re-uploaded the design.

Oh, if only that were the end of it. Mistakes made, corrected, and everyone moves on having learned something. However, months later, in mid-2018, Muddles received two more takedowns for drawings of beetles from Volkswagen. Once again, the art was of insects and not cars.

...

21:42

5 Best Android Emulators for Windows PC and Mac "IndyWatch Feed Tech"

Android gained popularity after Google took over the nascent startup and released it publicly in 2007. Since then, Android emulators for PC gained popularity for various reasons. Some use it for trying different apps before installing on their phones while others try it for business purposes. A new breed of users has emerged as well who utilize Android emulators for gaming. It can be attributed to games like PUBG Mobile

What is an Android emulator?

An Android emulator is an Android Virtual Device(AVD) that emulates the Android environment for other devices to run the Android operating system. It is generally used for testing, bug-finding, running various apps on a virtually controlled system on devices other than actual Android phones.

It lets the host(mainly computer system) behave like another hardware or software system for different purposes. The idea of Android emulator gained traction with the release of Android SDK by Google, in 2007(2008 for Public)

Here are some of the best Android emulators for PC

1. MemeU Play

First on the list is Android 5.1 Lolipop based Android emulator for Windows. It is among the most customizable Android emulators for PC in the segment.

The installation is quick and simple with no bloatware third-party apps to install like we come across in some emulators. The installer is also one fancy thing, I might add.

It takes around 2-3 minutes when launching for the first time. Time varies according to the processing power of your computer, among the performance of other components.

MemU, android emulators for PC

The emulator comes pre-loaded with some third party apps, preferably the ones sponsoring them so cant really a complaint. There is no option to remove them. Honestly, I wouldnt worry unless Im running on 2 GIG of RAM and a Pentium 4 processor which really cant handle multi-tasking.

One of the hot selling points of this emulator is Key Mapping. What Key-Mapping does is that you can put markers anywhere on the screen and assign a keyboard key or mouse button.
When you press that key or push a button, the controls or app present on that part of the sc...

21:24

San Francisco Tourists Shocked By Aggressive Vagrants, Discarded Needles, Dead Bodies "IndyWatch Feed Tech"

Via: ZeroHedge: San Francisco a Democratic stronghold known for cable cars, quaint architecture and its diverse culture, has become a bastion of squalor and crime as city dwellers and visitors alike dodge aggressive, drug-addled vagrants. And its beginning to scare the tourists

21:04

Dem: Trump 'Space Force' would 'rip the Air Force apart' "IndyWatch Feed Tech"

Sen. Bill Nelson (D-Fla.) is pushing back on President Trumps declaration that the Pentagon will create a new military branch dedicated to space, warning that such a move will rip the Air Force apart.Trump on Monday ...

20:55

Mozilla is working on a voice-controlled web browser Scout "IndyWatch Feed Tech"

Mozilla discloses Scout, a voice-controlled web browser project

Considered as the preferred browser by many users, Googles Chrome is undoubtedly the leader in the browser market. However, its rivals such as Mozillas Firefox and Apples Safari are trying to compete and match up to its level.

For instance, Mozillas recently released Firefox Quantum browser has given the Chrome a tough competition on certain parameters, such as faster downloading speeds, and being less of a memory hog. Quantum has been reported to load websites faster than Chrome. Mozilla is constantly working on Firefox Quantum and is expected to bring in more changes and improvements in future updates.

Now, Mozilla is reportedly working on a new voice-controlled browser project called Scout, where it uses voice commands instead of the traditional mouse, keyboards, and even mobile touch inputs.

With the Scout app, we start to explore browsing and consuming content with voice, Mozilla said in an agenda item for its all-hands meeting this week in San Francisco. This talk will discuss the architecture and key components needed for a voice platform, the required capabilities of those components and the challenges of working with the limitations and confines of existing platforms.

The new browser will use the voice commands to not only open the requested page but also scroll pages and read pages aloud to the user. This browser could help people with visual impairments by using their voice to search the web and those who have trouble using their hands.

At present, details of the project are scarce, since it is still at a very early stage of development.

We use our internal All Hands conference to come together so we can plan and build for the future. We know there is a great deal of excitement about the early stage projects and initiatives we explore at this event. We look forward to discussing these efforts publicly when they are further developed, a Mozilla spokesperson told CNet who first spotted the project.

Currently, Google Chrome holds 58% of browser market share around the world, while Mozilla Firefox is struggling at 5%, according to StatCounter.

The post Mozilla is working on a...

20:53

Audi CEO Arrested for Role in Volkswagen Diesel Emissions Scandal "IndyWatch Feed Tech"

Head of VW's Audi arrested in Germany over diesel scandal

German authorities arrested the head of Volkswagen's luxury arm Audi on Monday, the most senior company official so far to be detained over the carmaker's emissions test cheating scandal.

Munich prosecutors, who earlier this month widened their probe into Audi, said Rupert Stadler was being held due to fears he might hinder their investigation into the scandal, plunging Volkswagen into a leadership crisis.

News of the arrest comes as Volkswagen's (VW) new group CEO Herbert Diess is trying to introduce a new leadership structure, which includes Stadler, to speed up a shift toward electric vehicles in the wake of its "dieselgate" troubles.

Also at BBC, DW, The Register, and CNN.


Original Submission

Read more of this story at SoylentNews.

20:49

Square receives New York state cryptocurrency license "IndyWatch Feed Tech"

The digital payment company Square has obtained a license that will allow New York state residents to buy and sell Bitcoin through its mobile payments app, Cash. The company announced on Monday that it had received the license from New Yorks...

20:45

How to add cron job on Asuswrt Merlin Wifi Router "IndyWatch Feed Tech"

How can I add or delete cron jobs on my wifi router powered by Asuswrt Merlin firmware? How do I add cron job on Asuswrt Merlin Wifi router using command line?

The post How to add cron job on Asuswrt Merlin Wifi Router appeared first on nixCraft.

19:30

FCC launches regulatory review of T-Mobile-Sprint merger "IndyWatch Feed Tech"

The Federal Communications Commission (FCC) has launched the regulatory review for T-Mobiles proposed $26 billion acquisition of Sprint.The FCC on Friday opened a docket for the merger and issued a protective order allowing the companies to shield...

19:22

Modulating the Immune System Reduces Inflammation Following Heart Attack "IndyWatch Feed Tech"

Researchers from Washington University School of Medicine in St. Louis have discovered that a particular type of immune cell encourages harmful inflammation in the heart after a heart attack, and they have found a potential solution for protecting the heart.

The study, which was led by Dr. Douglas L. Mann, showed that a mouse model of human heart attack lived longer than control mice when treated with the drug pirfenidone, a drug already approved for treating lung conditions. The researchers showed that the drug works by regulating the immune response of B cell lymphocytes in the heart, thereby reducing inflammation and progressive injury following a cardiac event.

Pirfenidone is already used to treat idiopathic pulmonary fibrosis, a condition in which the lungs become increasingly damaged and form scar tissue rather than healthy, functioning tissue. The researchers hope to understand how pirfenidone works in the heart and reduces inflammation; in doing so, they could potentially modify the drug to work more efficiently.

19:16

World Health Organization Officially Lists "Gaming Disorder" in ICD "IndyWatch Feed Tech"

The World Health Organization (WHO) will officially classify "gaming disorder" as a mental health condition:

The World Health Organization is set to announce "gaming disorder" as a new mental health condition to be included in the 11th edition of its International Classification of Diseases, set to release Monday.

"I'm not creating a precedent," said Dr. Vladimir Poznyak, a member of WHO's Department of Mental Health and Substance Abuse, which proposed the new diagnosis to WHO's decision-making body, the World Health Assembly. Instead, he said, WHO has followed "the trends, the developments, which have taken place in populations and in the professional field."

However, not all psychologists agree that gaming disorder is worthy of inclusion in the International Classification of Diseases, known as the ICD.

What are the characteristics of gaming disorder?

"One is that the gaming behavior takes precedence over other activities to the extent that other activities are taken to the periphery," he said. The second feature is "impaired control of these behaviors," Poznyak said. "Even when the negative consequences occur, this behavior continues or escalates." A diagnosis of gaming disorder, then, means that a "persistent or recurrent" behavior pattern of "sufficient severity" has emerged, according to the ICD. A third feature is that the condition leads to significant distress and impairment in personal, family, social, educational or occupational functioning, Poznyak said. The impact is real, he said, and may include "disturbed sleep patterns, like diet problems, like a deficiency in the physical activity."

Overall, the main characteristics are "very similar" to the diagnostic features of substance use disorders and gambling disorder, he said. Gambling disorder "is another category of clinical conditions which are not associated with a psychoactive substance use but at the same time being considered as addictive as addictions."

Also at NYT.

Previously: World Health Organization Will Recognize "Gaming Disorder"


Original Sub...

19:01

Buttery Smooth Fades with the Power of HSV "IndyWatch Feed Tech"

In firmware-land we usually refer to colors using RGB. This is intuitively pleasing with a little background on color theory and an understanding of how multicolor LEDs work. Most of the colorful LEDs we are use not actually a single diode. They are red, green, and blue diodes shoved together in tight quarters. (Though interestingly very high end LEDs use even more colors than that, but thats a topic for another article.) When all three light up at once the emitted light munges together into a single color which your brain perceives. Appropriately the schematic symbol for an RGB LED without an onboard controller typically depicts three discrete LEDs all together. So its clear why representing an RGB LED in code as three individual values {R, G, B} makes sense. But binding our representation of color in firmware to the physical system we accidentally limit ourselves.

The inside of an RGB LED

Last...

18:37

Free software is at risk in the EU -- take action now "IndyWatch Feed Tech"

Members of the European Parliament want to turn upload platforms like GitLab into "censorship machines" that require user-uploaded materials to be monitored and automatically filtered, a process which would prevent modified and reused code from being uploaded. This provision is covered under Article 13 of the Copyright Directive.

If Article 13, embedded within the proposal, becomes official policy, it will be impossible for developers to build off of one another's code -- which is not only a blow to the collaborative development of free software, but a push against the basic freedoms of free software. Software isn't free unless it can be modified and shared. Article 13 will affect all users of free software -- as development of free software suffers, the quality and availability of updates, new features, and new programs will also suffer.

What you can do

You can help turn the tide against Article 13. Contact your member of European Parliament (MEP) before June 20th.

Not sure what to say? You can try this sample email.

Dear MEP,

I am an EU citizen and I oppose Article 13 of the proposed Copyright Directive. Article 13 is harmful to the free, global development of software, including that which provides necessary infrastructure on an international scale. Please vote against the Copyright Directive.

Sincerely,
NAME

Need help finding your MEPs?

A complete list of MEPs is available online.

What to do next

After you contact your MEP, there is still more to do!

To learn more, you can check out the links below:

You can also support the work of the Free Software Foundation by become an Associate Member or making a donation today.

18:37

Apple macOS Bug Reveals Cache of Sensitive Data from Encrypted Drives "IndyWatch Feed Tech"

Security researchers are warning of almost a decade old issue with one of the Apple's macOS feature which was designed for users' convenience but is potentially exposing the contents of files stored on password-protected encrypted drives. Earlier this month, security researcher Wojciech Regula from SecuRing published a blog post, about the "Quick Look" feature in macOS that helps users

18:22

Why a minor change to how EPA makes rules could radically reduce environmental protection "IndyWatch Feed Tech"

Since the Reagan administration, federal agencies have been required to produce cost-benefit analyses of their major regulations. These assessments are designed to ensure that regulators are pursuing actions that make society better off.

In my experience working on the White House economic team in the Clinton and Obama administrations, I found cost-benefit provides a solid foundation for understanding the impacts of regulatory proposals. It also generates thoughtful discussion of ways to design rules to maximize net benefits to the public.

On June 7, Environmental Protection Agency Administrator Scott Pruitt proposed changing the agencys approach to this process in ways that sound sensible, but in fact are a radical departure from how government agencies have operated for decades.

18:22

To Start a New Life at Proxima Centauri, This Is How Many People We Need to Send "IndyWatch Feed Tech"

Humanity has long dreamed about sending humans to other planets, even before crewed spaceflight became a reality. And with the discovery of thousands exoplanets in recent decades, particularly those that orbit within neighboring star systems (like Proxima b), that dream seems closer than ever to becoming a reality.

But of course, a lot of technical challenges need to be overcome before we can hope to mount such a mission.

In addition, a lot of questions need to be answered. For example, what kind of ship should we send to Proxima b or other nearby exoplanets? And how many people would we need to place aboard that ship?

18:00

A Session Suspension & Restoration Protocol Proposed For Wayland "IndyWatch Feed Tech"

KDE Wayland developer Roman Gilg who started contributing to Wayland via last year's Google Summer of Code is proposing a new Wayland protocol for dealing with desktop session suspension and restoration...

17:48

(IN)SECURE Magazine issue 58 released "IndyWatch Feed Tech"

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 58 has been released today. Table of contents Is GDPR-regulated data lurking in unexpected pockets of your organization? Leveraging security analytics to investigate and hunt modern threats When was the last time your anti-virus software alerted you? Software-defined perimeter: The pathway to Zero Trust Report: Infosecurity Europe 2018 Life after May 25th: How large organization should navigate the More

The post (IN)SECURE Magazine issue 58 released appeared first on Help Net Security.

17:42

Promising new material has the right properties to capture solar energy, split water into hydrogen and oxygen "IndyWatch Feed Tech"

Solar energy is clean and abundant. But when the sun isnt shining, you must store the energy in batteries or through a process called photocatalysisin which solar energy is used to make fuels. In photocatalytic water splitting, sunlight separates water into hydrogen and oxygen. The hydrogen and oxygen can then be recombined in a fuel cell to release energy.

Now, a new class of halide double perovskitesmay have just the right properties to split water, according to a newly published paper in Applied Physics Letters.

If we can come up with a material that can be useful as a water-splitting photocatalyst, then it would be an enormous breakthrough, said Feliciano Giustino, a co-author on the paper.

17:42

LibreOffice Picks Up A Native "KDE 5" File Picker "IndyWatch Feed Tech"

Several months back LibreOffice developers began working on better integration with KDE Plasma 5 and that has advanced again today with now having a native file picker...

17:39

Tens or Hundreds of Billions of Dollars Needed to Combat Opioid Crisis? "IndyWatch Feed Tech"

US needs to invest 'tens of billions or hundreds of billions' to fight opioid epidemic

The goal of an opioid is to reduce pain, but the addictive drugs are creating pain for millions of families suffering through the crisis. Deaths from opioid overdoses number at least 42,000 a year in the U.S., according to the Centers for Disease Control.

"This is an epidemic that's been getting worse over 10 to 20 years," Caleb Alexander, co-director of Johns Hopkins Center for Drug Safety, told CNBC's "On The Money" in a recent interview. "I think it's important that we have realistic expectations about the amount of work that it will take and the amount of coordination to turn this steamship around," Alexander added.

[...] Alexander added: "The statistics are stunning. More than 2.1 million Americans have an opioid use disorder or opioid addiction" and he says the country needs to "invest tens of billions or hundreds of billions of dollars" to shore up the treatment system. He said patients should be able to access medications that "we know work to help reduce the cravings for further opioids."

Don't mention the Portugal model!

Meanwhile, the Massachusetts Attorney General is suing members of the family that runs Purdue Pharma:

Their family name graces some of the nation's most prestigious bastions of culture and learning the Sackler Center for Arts Education at the Guggenheim Museum, the Sackler Lefcourt Center for Child Development in Manhattan and the Sackler Institute for Developmental Psychobiology at Columbia University, to name a few.

Now the Sackler name is front and center in a lawsuit accusing the family and the company they own and run, Purdue Pharma, of helping to fuel the deadly opioid crisis that has killed thousands of Americans. Massachusetts Attorney General Maura Healey took the unusual step of naming eight members of the Sackler family this week in an 80-page complaint that accused Purdue Pharma of spinning a "web of ill...

17:31

Watch The World Spin With The Earth Clock "IndyWatch Feed Tech"

With the June solstice right around the corner, its a perfect time to witness first hand the effects of Earths axial tilt on the days length above and beyond 60 degrees latitude. But if you cant make it there, or otherwise prefer a more regular, less deprived sleep pattern, you can always resort to simulations to demonstrate the phenomenon. [SimonRob] for example built a clock with a real time rotating model of Earth to visualize its exposure to the sun over the year.

The daily rotating cycle, as well as Earths rotation within one year, are simulated with a hand painted plastic ball attached to a rotating axis and mounted on a rotating plate. The hand painting was done with a neat trick; placing printed slivers of an atlas inside the transparent orb to serve as guides. Movement for both axes are driven by a pair of stepper motors and a ring of LEDs in the same diameter as the Earth model is used to represent the Sun. You can of course wait a whole year to observe it all in real time, or then make use of a set of buttons that lets you fast forward and reverse time.

Earths rotation, and especially countering it, is a regular concept in astrophotography, so its a nice change of perspective to use it to look onto Earth itself from the outside. And who knows, if [SimonRob] ever feels like extending his clock with an aurora borealis simulation, he might find inspiration in this northern lights tracking light show.

This is a spectacular showpiece and a great project you can do with common tools already in your workshop. Once youve mastered earth, put on your machinists hat and give the solar system a try.

17:18

DHS, FBI published a join alert including technical details of Hidden Cobra-linked Typeframe Malware "IndyWatch Feed Tech"

The US DHS and the FBI have published a new joint report that includes technical details of a piece of malware allegedly used by the Hidden Cobra APT.

A new joint report published by US DHS and FBI made the headlines, past document details TTPs associated with North Korea-linked threat groups, tracked by the US government as Hidden Cobra.

The US authorities have published the report to reduce the exposure to the activities of North Korea-linked APT groups.

Hidden Cobras arsenal includes Sharpknot, Hardrain, Badcall, BankshotFallchil, Volgmer, and Delta Charlie.

The latest joint report includes a piece of malware dubbed Typeframe and it covers a total of 11 samples analyzed by the government experts.

The researchers analyzed several executables and weaponize Word documents containing VBA macros.

DHS and FBI identified Trojan malware variants used by the North Korean government. This malware variant is known as TYPEFRAME. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. reads the joint report.

This malware report contains analysis of 11 malware samples consisting of 32-bit and 64-bit Windows executable files and a malicious Microsoft Word document that contains Visual Basic for Applications (VBA) macros. These files have the capability to download and install malware, install proxy and Remote Access Trojans (RATs), connect to command and control (C2) servers to receive additional instructions, and modify the victims firewall to allow incoming connections.

Hidden Cobra

The security alert includes indicators of compromise (IoCs) for each of the sample analyzed by the experts.

The report includes a description...

17:15

California Tests Kindle-ized License Plates "IndyWatch Feed Tech"

California drivers can now opt for e-paper license plates that display custom messages Photo: Reviver Auto

That license plate frame sporting a dealership name, sports team logo, or your favorite superhero? Thats so last year.

This year, auto dealers in California will be able to go beyond personalized license plate frames to sell Kindle-ized license plates, in which the entire plate can display custom text and graphics using e-paper technology. These displays can be updated remotely, with such updates replacing the little date stickers that must be reapplied each year when registration is renewed.

And, when the car is stopped, drivers will also be able to reduce the license number to a small window and use the rest of the screen for a different graphic. (Though Im not sure the people stopped behind a custom-plate-bearing car will notice; so many people take that opportunity to surreptitiously check their mobile phones.)

Reviver Auto is making the so-called Rplates, and they arent cheapthe plates are listed at US $700, plus an $8 a month subscription fee. The company is initially focused on marketing them to fleet managers, who are expected to use the displays for advertising messages, but expects early adopters to quickly jump on the technology, and other consumers to come on board as the company proves out the plates usefulness.

The project started in 2008, Reviver founder and CEO Neville Boston says, with a plan to eliminate those date stickersit was time, he thought, to get registration renewals out of snail mail and into the wireless world. In the midst of an economic downturn, he says, he was also looking to get involved with something that exists in good times and badand the DMV is certainly that.

Then, he says, he started thinking about what else e-paper plates could do. His list of possibilities includes:

  • Paying for tolls and parking

  • Identifying cars as legal for travel in high-occupancy vehicle lanes

  • Replacing special hangtags and license plates for people with disabilities

  • Helping an Uber driver find a passenger by displaying the passengers name

  • Indicating that a car is in autonomous mode

    ...

17:04

Security updates for Monday "IndyWatch Feed Tech"

Security updates have been issued by CentOS (kernel), Debian (libgcrypt20, redis, and strongswan), Fedora (epiphany, freedink-dfarc, gnupg, LibRaw, nodejs-JSV, nodejs-uri-js, singularity, strongswan, and webkit2gtk3), Mageia (flash-player-plugin, freedink-dfarc, and imagemagick), openSUSE (enigmail, gpg2, java-1_7_0-openjdk, java-1_8_0-openjdk, poppler, postgresql96, python-python-gnupg, and samba), Oracle (kernel), SUSE (gpg2 and xen), and Ubuntu (gnupg and webkit2gtk).

17:02

Aevums New Rocket-Drone Airplane Duo Could Launch Satellites Every 3 Hours "IndyWatch Feed Tech"

A space launch every 3 hours may soon be possible using rockets carried on a fully autonomous unmanned airplane, a new startup company suggests.

Alabama-based startup Aevum aims to per mission, using an air-launch system called Ravn.

Ravn is designed to launch every 180 minutes, Jay Skylus, Aevums CEO and chief launch architect, told Space.com. Other launch vehicles fly only a handful of times a year with an average of 18 months of lead time. [Rocket Launches: The Latest Liftoffs, Photos & Videos].

16:55

Phoronix Test Suite 8.0.1 Is Coming Next Week "IndyWatch Feed Tech"

Just a heads up that Phoronix Test Suite 8.0.1 is slated for release next week if there are any last minute bug reports or requests...

16:28

How SUSE Is Bringing Open Source Projects and Communities Together "IndyWatch Feed Tech"

Title: 
How SUSE Is Bringing Open Source Projects and Communities Together

16:25

F-Secure acquires MWR InfoSecurity "IndyWatch Feed Tech"

F-Secure has signed an agreement to acquire all the outstanding shares of MWR InfoSecurity, a privately held cyber security company operating globally from its main offices in the UK, the US, South Africa and Singapore. Im thrilled to welcome MWR InfoSecuritys employees to F-Secure. With their vast experience and hundreds of experts performing cyber security services on four continents, we will have unparalleled visibility into real-life cyber attacks 24/7. This enables us to detect indicators More

The post F-Secure acquires MWR InfoSecurity appeared first on Help Net Security.

16:12

Can Great Tech Products Suffer From Poor Marketing? "IndyWatch Feed Tech"

Image is everything in business. The right illustrations, logo, and stock images can speak volumes about the essence of who you are and what you do as a company. The old adage of a picture speaking a thousand words goes to show that this has been the case for a long time. As humans, we respond to images. If the history of art has thought us anything, it is that there is always an audience for bold and beautiful things to look at, once they come in the right frame.

As our brains are hardwired to judge on the visual aspects of a person, company, and their actions, we can be persuaded into purchasing products and services through the medium of advertising alone. Striking images can attract the eyes like almost nothing else. Pictures from Focused Collection are a strong example of a company who further this point. For almost every adult over a certain age will tell you, sometimes impulse buys happen. The reason for our last-minute splurges and spontaneous purchases quite often come down to the image within the advertisement.

The importance of imagery to a business, therefore, cannot be underestimated. Procuring the right images ones which will do a brand good rather than harm is crucial. You want to stand out from the cacophony of advertisements and marketing material out there and sometimes, even if it is against our inner-nature, we must learn to adopt the understanding that those that shout loudest get the most attention.

The Dominant Sense

For those of us blessed with the wonders of good eyesight will know, the majority of things which our human minds are attracted to come via our vision. It is the most dominant of our senses and the one which forces the brain to work harder than any other. In fact, our eyesight is accountable for up to half of the human brains functioning powers, which, in turn, means that we are designed to respond to images.

Although the voracious reader may argue with this, text can only go so far to stimulate the human mind. It is the photos and images which resonate on a deeper cognitive level and this is not som...

16:07

malicious_ip_check.ps1- Freaky fast PowerShell script for malicious IP address checking "IndyWatch Feed Tech"

I here want to introduce my new PowerShell script, malicious_ip_check.ps1.

It checks a single IP address against a huge database (it included 26,073 IP addresses when I checked it today) of malicious IP addresses, constantly updated, available at https://lists.blocklist.de/lists/all.txt.

The code downloads the information from the webpage to an output text file, dumps that to an array and checks whether an IP address entered by the user is included in the list or not, and all this in one minute!

Isn't that awesome?

I think it is.

I recently published it on GitHub, so go check it out!





16:04

Google to Fix Location Data Leak in Google Home, Chromecast "IndyWatch Feed Tech"

Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network.

Craig Young, a researcher with security firm Tripwire, said he discovered an authentication weakness that leaks incredibly accurate location information about users of both the smart speaker and home assistant Google Home, and Chromecast, a small electronic device that makes it simple to stream TV shows, movies and games to a digital television or monitor.

Young said the attack works by asking the Google device for a list of nearby wireless networks and then sending that list to Googles geolocation lookup services.

An attacker can be completely remote as long as they can get the victim to open a link while connected to the same Wi-Fi or wired network as a Google Chromecast or Home device, Young told KrebsOnSecurity. The only real limitation is that the link needs to remain open for about a minute before the attacker has a location. The attack content could be contained within malicious advertisements or even a tweet.

It is common for Web sites to keep a record of the numeric Internet Protocol (IP) address of all visitors, and those addresses can be used in combination with online geolocation tools to glean information about each visitors hometown or region. But this type of location information is often quite imprecise. In many cases, IP geolocation offers only a general idea of where the IP address may be based geographically.

This is typically not the case with Googles geolocation data, which includes comprehensive maps of wireless network names around the world, linking each individual Wi-Fi network to a corresponding physical location. Armed with this data, Google can very often determine a users location to within a few feet (particularly in densely populated areas), by triangulating the user between several nearby mapped Wi-Fi access points. [Side note: Anyone whod like to see this in action need only to turn off location data and remove...

16:01

Fatalities vs False Positives: The Lessons from the Tesla and Uber Crashes "IndyWatch Feed Tech"

In one bad week in March, two people were indirectly killed by automated driving systems. A Tesla vehicle drove into a barrier, killing its driver, and an Uber vehicle hit and killed a pedestrian crossing the street. The National Transportation Safety Boards preliminary reports on both accidents came out recently, and these bring us as close as were going to get to a definitive view of what actually happened. What can we learn from these two crashes?

There is one outstanding factor that makes these two crashes look different on the surface: Teslas algorithm misidentified a lane split and actively accelerated into the barrier, while the Uber system eventually correctly identified the cyclist crossing the street and probably had time to stop, but it was disabled. You might say that if the Tesla driver died from trusting the system too much, the Uber fatality arose from trusting the system too little.

But youd be wrong. The forward-facing radar in the Tesla should have prevented the accident by seeing the barrier and slamming on the brakes, but the Tesla algorithm places more weight on the cameras than the radar. Why? For exactly the same reason that the Uber emergency-braking system was turned off: there are too many false positives and the result is that far too often the cars brake needlessly under normal driving circumstances.

The crux of the self-driving at the moment is precisely figuring out when to slam on the brakes and when not. Brake too often, and the passengers are annoyed or the car gets rear-ended. Brake too infrequently, and the consequences can be worse. Indeed, this is the central problem of autonomous vehicle safety, and neither Tesla nor Uber have it figured out yet.

Tesla Cars Drive Into Stopped Objects

Lets start with the Tesla crash. Just before the crash, the car was following behind another using its traffic-aware cruise control which attempts to hold a given speed subject to leaving appropriate following distance to the car ahead of it. As the Tesla approached an exit ramp, the car ahead kept right and the Tesla moved left, got confused by the lane markings on the lane split, and accelerated into its programmed speed of 75 mph (120 km/h) without noticing the barrier in front of it. Put simply, the algorithm got things wrong and drove into a lane divider at full speed.

...

16:00

Supreme Court to hear Apple's challenge to class-action lawsuit over iPhone apps "IndyWatch Feed Tech"

The Supreme Court on Monday agreed to hear Apple's challenge to a class-action lawsuit brought by consumers who alleged the company has a monopoly on how apps can be purchased for its devices.Consumers allege the tech company illegally...

15:18

Near-Infrared Photosynthesis Discovered in Cyanobacteria "IndyWatch Feed Tech"

A newly discovered form of photosynthesis could have implications for exoplanet/exomoon habitability:

The vast majority of life on Earth uses visible red light in the process of photosynthesis, but the new type uses near-infrared light instead. It was detected in a wide range of cyanobacteria (blue-green algae) when they grow in near-infrared light, found in shaded conditions like bacterial mats in Yellowstone and in beach rock in Australia. As scientists have now discovered, it also occurs in a cupboard fitted with infrared LEDs in Imperial College London.

The standard, near-universal type of photosynthesis uses the green pigment, chlorophyll-a, both to collect light and use its energy to make useful biochemicals and oxygen. The way chlorophyll-a absorbs light means only the energy from red light can be used for photosynthesis.

Since chlorophyll-a is present in all plants, algae and cyanobacteria that we know of, it was considered that the energy of red light set the 'red limit' for photosynthesis; that is, the minimum amount of energy needed to do the demanding chemistry that produces oxygen. The red limit is used in astrobiology to judge whether complex life could have evolved on planets in other solar systems.

However, when some cyanobacteria are grown under near-infrared light, the standard chlorophyll-a-containing systems shut down and different systems containing a different kind of chlorophyll, chlorophyll-f, takes over.

Also at ScienceAlert.

Photochemistry beyond the red limit in chlorophyll fcontaining photosystems (DOI: 10.1126/science.aar8313) (DX)


Original Submission

Read more of this story at SoylentNews.

15:12

Epic Games Fortnite for AndroidAPK Downloads Leads to Malware "IndyWatch Feed Tech"

Given Fortnite's current popularity and craziness across the globe, we understand if you have been searching the web for download links to Fortnite APK for Android phone. However, you are not alone, thousands of people out there are also searching tutorials and links for, "how to install Fortnite on Android" or "how to download Fortnite for Android" on the Internet. The app has taken the

15:09

Using W10Privacy To Boost Ubuntu WSL Performance On Windows 10 "IndyWatch Feed Tech"

While Microsoft is working on low-level improvement to the Windows Subsystem for Linux (WSL) to yield better I/O performance, it is possible to dramatically increase some disk workloads by removing a number of running Windows services via the independent W10Privacy application. Here are some benchmarks of W10Privacy on the overall performance impact to Microsoft Windows 10 Pro x64 itself and of Ubuntu 18.04 running on the Windows 10 installation via WSL.

15:06

Call for Code Is Open and Organizations Are Lining Up to Join the Cause "IndyWatch Feed Tech"

By Bob Lord, Chief Digital Officer, IBM

Today is the first official day of Call for Code, an annual global initiative from creator David Clark Cause, with IBM proudly serving as Founding Partner. Call for Code aims to unleash the collective power of the global open source developer community against the growing threat of natural disasters.

15:00

Will blockchain power the next generation of data security? "IndyWatch Feed Tech"

Cryptomania is dominating conversations from Silicon Valley to Wall Street. But cryptocurrency is only one implementation of the underlying technology innovation that has the ability to transform the way future technology products are designed and built. Of course, that technology is blockchain, the decentralized digital ledger that makes Bitcoin and other cryptocurrencies possible. First, we need to establish a common framework for the underpinnings of the technology. Its foundational element, the block, is a chunk More

The post Will blockchain power the next generation of data security? appeared first on Help Net Security.

14:59

YouTubes Piracy Filter Blocks MIT Courses, Blender Videos, and More "IndyWatch Feed Tech"

To protect copyright holders, YouTube uses an advanced piracy recognition system that flags and disables videos which are used without permission.

This system, known as Content ID, works well most of the time, but it is far from perfect.

Its not well equipped to determine whether content deployment is protected under fair use, and in some cases it even views white noise or birds chirping as piracy.

Over the past several days, an even more worrying trend has appeared. Several popular YouTube accounts including those belonging to MIT OpenCourseWare and the Blender Foundation, have suddenly had all their videos blocked.

People who try to watch one of the freely available MIT courses on YouTube get the following message, which typically appears if an uploader doesnt have the rights to show content locally.

This video contains content from MIT. It is not available in your country.

The message appears in all locations that we were able to check, suggesting that it may very well apply worldwide. In any case, on social media theres no shortage of people mentioning that they can no longer access the courses.

Blocked courseware

The issue hasnt gone unnoticed by MITs OpenCourseWare team which is investigating the matter, without pointing fingers.

You may have noticed that we are having some trouble with our videos! Please stand by. The elves are working around the clock to fix the issue, they write, referring people to non-video content in the meantime.

Interestingly, the MIT case doesnt appear to be an isolated incident. Another organization that was hit by the same mysterious blocking efforts is the Blender Foundation.

The nonprofit organization, which is leading the development of the open source 3D content-creation application Blender, has also had its videos blocked.

Ton Roosendaal, Chairman of the Blender Foundation, noticed the issue on Saturday and contacted YouTube. This is most prob...

14:41

China-Linked APT15 is still very active, experts found its new malware tracked as MirageFox "IndyWatch Feed Tech"

Following the recent hack of a US Navy contractor security experts found evidence of very recent activity by the China-linked APT group tracked as APT15.

The China-linked APT15 group (aka Ke3chang, Mirage, Vixen Panda, Royal APT and Playful Dragon) has developed a new strain of malware borrowing the code from one of the tool he used in past operations.

APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets in defense, high tech, energy, government, aerospace, manufacturing industries worldwide. The attackers demonstrated an increasing level of sophistication across the years, they used a custom-malware and various exploits in their attacks.

Across the years, security firms identified many hacking tools associated with APT15 such as Mirage, BS2005, RoyalCLI, RoyalDNS, TidePool, BMW and MyWeb.

The group has been known to target organizations in the defense, high tech, energy, government, aerospace, manufacturing and other sectors.

In March 2018, APT15 used new backdoors is an attack that was likely part of a wider operation aimed at contractors at various UK government departments and military organizations.

One of the attacks aimed at a UK-based customer of NCC Group, an organization that provides a wide range of services to the United Kingdom government. The hackers focused on government departments and military technology by targeting the customer of the company.

NCC noted at the time that the APT15 used two new backdoors, tracked as RoyalCLI and RoyalDNS.

APT15

One of the backdoors has been tracked as RoyalCLI due to a debugging path left in the binary, it is the successor of BS2005 backdoor used by the group. Both RoyalCLI and BS2005 communicate with command and control (C&C) servers via Internet Explorer using the COM interface IWebBrowser2.

The attackers utilized Windows commands to conduct reconnaissance activities, the lateral movement was conducted by using a combination of net command, mounting the C$ share of hosts and manually copying files to or from compromised hosts.

The second backdoor, tracked as RoyalDNS, uses DNS to communic...

14:19

Working through the cybersecurity skills gap "IndyWatch Feed Tech"

Its no secret that theres a shortage of qualified personnel in the field of cybersecurity. Its a problem that has long been noticed and one that is projected to get even worseto the tune of 1.8 million by 2022, according to (ISC). Despite this massive skills gap on the horizon, the number of breaches appears to be declining. Appearances, however, can be deceiving. As criminals shift their tactics toward new types of threats, such as More

The post Working through the cybersecurity skills gap appeared first on Help Net Security.

14:16

13 Ways Cyber Criminals Spread Malware "IndyWatch Feed Tech"

By David Balaban

Security incidents where hackers distribute malicious code (malware) via spam,

This is a post from HackRead.com Read the original post: 13 Ways Cyber Criminals Spread Malware

13:55

Why Open Source Is Good for Business, And People "IndyWatch Feed Tech"

The open source world isnt defined by geography, nor are the communities within it. Open source communities are defined by sharing attitudes, interests, and goals, wherever their participants are. An open source community spans locations, political affiliations, religion, and life experience. There are no boundaries of company, country, or even language. People from all backgrounds with diverse perspectives can get involved. And they do.

13:41

A Chat With 'Super Meat Boy Forever' Creator Tommy Refenes "IndyWatch Feed Tech"

Submitted via IRC for BoyceMagooglyMonkey

Tommy Refenes' life is about to change dramatically. He's turning 37 in a few days and his first child, a boy, is expected to arrive just a few weeks later. On top of this perfect storm of personal anxiety, he's preparing to launch his second major video game, Super Meat Boy Forever, later this year on the PlayStation 4, Xbox One, Nintendo Switch and PC.

Unlike in parenthood, Refenes has experience in the video game industry. He's famous in the world of independent development for his programming work on Super Meat Boy, a legendary 2010 platformer that helped usher in the modern marketplace for indie games. He's also a film star: Refenes and game designer Edmund McMillen were the focus of the 2012 documentary Indie Game: The Movie, which tracked the development and surprisingly successful launch of Super Meat Boy. The movie was a critical and commercial hit, picking up an award for documentary editing at the 2012 Sundance Film Festival.

Source: https://www.engadget.com/2018/06/15/super-meat-boy-forever-tommy-refenes-indie-interview-e3/


Original Submission

Read more of this story at SoylentNews.

13:28

Has Agile Programming Lost its Way? "IndyWatch Feed Tech"

Programmers are passionate about which development methodology is the best. Is it Agile? Waterfall? Feature Driven Development? Scrum? So everyone took notice when one of the 17 original signers of the seminal Agile Manifestowrote a blog post last month headlined Developers Should Abandon Agile.

13:01

Opening A Ford With A Robot and the De Bruijn Sequence "IndyWatch Feed Tech"

The Ford Securicode, or the keyless-entry keypad available on all models of Ford cars and trucks, first appeared on the 1980 Thunderbird. Even though its most commonly seen on the higher-end models, it is available as an option on the Fiesta S the cheapest car Ford sells in the US for $95. Doug DeMuro loves it. Its also a lock, and that means its ready to be exploited. Surely, someone can build a robot to crack this lock. Turns out, its pretty easy.

The electronics and mechanical part of this build are pretty simple. An acrylic frame holds five solenoids over the keypad, and this acrylic frame attaches to the car with magnets. Theres a second large protoboard attached to this acrylic frame loaded up with an Arduino, character display, and a ULN2003 to drive the resistors. So far, everything you would expect for a robot that will unlock a car via...

12:52

US Government warns of more North Korean malware attacks "IndyWatch Feed Tech"

US Government warns of more North Korean malware attacks

Just days after the two countries signed a joint agreement at their unprecedented talks, the US Department of Homeland Security has issued a warning about more malware being used by the North Korean government against US organisations.

Read more in my article on the Hot for Security blog.

12:38

Buildah 1.0: Linux Container Construction Made Easy "IndyWatch Feed Tech"

The good news about containers, such as Docker's, is they make it easy to deploy applications, and you can run far more of them on a server than you can on a virtual machine. The bad news is that putting an application into a container can be difficult. That's where Buildah comes in.

12:33

Feral Is Bringing Total War: WARHAMMER 2 To Linux "IndyWatch Feed Tech"

Feral Interactive has announced this morning that they will be bringing Total War: WARHAMMER 2 to Linux this year as the latest Total War game seeing a native Linux port...

12:07

Hayabusa2 Approaches Asteroid Ryugu "IndyWatch Feed Tech"

Hayabusa2 will begin orbiting asteroid 162173 Ryugu on June 27th. The spacecraft includes four robotic landers and will capture material for a sample return:

The Japanese asteroid sampling mission Hayabusa2, launched on December 3, 2014 aboard an H-IIA rocket from Tanegashima, Japan, has nearly completed its long flight to asteroid Ryugu (formerly 1999 JU3) after a five year mission and an Earth flyby.

[...] The Hayabusa2 follow-on has one more reaction wheel (to make four) and improved, higher thrust ion engines, along with a backup asteroid sampling system, and the spacecraft is in good health so far. Hayabusa2 is a 600 kilogram (1300 pound) spacecraft that is based on the Hayabusa craft, with some improvements. It is powered by two solar panels and uses an ion engine with xenon propellant as its main propulsion source. The ion engine technology was first used in the Deep Space One experimental spacecraft in the late 1990's and also has been successfully used in the Dawn asteroid probe as well.

[...] Besides the primary and backup sample collectors, the mission includes three MINERVA "hoppers" similar to the one used on the original Hayabusa mission that will land at several locations on the surface to study these locations with cameras and thermometers. [...] International contributions include a small robotic lander (10 kilograms or 20 pounds) called MASCOT that is a joint venture of DLR (Germany) and CNES (France), while NASA is providing communications through the Deep Space Network.

[...] Its arrival at Ryugu is set for June 27th, and Hayabusa2 will be 20 km (12 miles) above the surface on that date, as things currently stand. The arrival will be followed by a press conference in Sagamihara, Japan.

The total mission cost is about $150 million. The H-IIA rocket costs about $90 million to launch.

Also at NHK.


Original Submission

Read more of this story at SoylentNews.

12:00

Senate braces for Trump showdown over Chinese telecom giant "IndyWatch Feed Tech"

The Senate is speeding toward a confrontation with President Trump over his plan to revive the Chinese telecommunications giant ZTE.Senators are poised to pass legislation as part of a mammoth defense bill on Monday evening to block...

11:51

cantata: cantata-mounter D-Bus service local privilege escalation and other security issues "IndyWatch Feed Tech"

Posted by Matthias Gerstner on Jun 18

Hello list,

this is a report about local privilege and local denial of service
issues found in cantata, a graphical client for MPD
(<<a href="https://github.com/CDrummond/cantata/wiki/About-Cantata" rel="nofollow">https://github.com/CDrummond/cantata/wiki/About-Cantata>).

cantata supports a D-Bus helper daemon "cantata-mounter" for mounting
remote samba shares by calling `mount.cifs` on Linux systems. This
daemon is configured for on-demand activation, running as root and its
D-Bus interface is accessible by...

11:46

Systems Languages: An Experience Report "IndyWatch Feed Tech"

Recently, theres been a lot of turmoil in the systems language community. We have the Rust Evangelism Strikeforce nudging us towards rewriting everything in Rust. We have the C++17 folks who promise the safety and ease of use of modern programming languages with the performance and power of C. And then theres a long tail of other systems programming languages, like Nim, Reason / OCaml, Crystal, Go, and Pony.

11:42

Interplanetary Challenge "IndyWatch Feed Tech"

CADET EXPLORER MISSION

Let Bill Nye and Robert Picardo take you on a journey through the future of space exploration and artificial intelligence. Each week they will show us a different space-themed topic and reveal how AI can help us reach the stars.

11:03

Orrin Hatch, Sponsored the Most by the Pharmaceutical Industry, Tries to Make Its Patents Immune From Scrutiny (PTAB) "IndyWatch Feed Tech"

American (US) pharmaceutical patents on Canadian soil are meanwhile at risk as a result of Trumps trade war that invites retaliation

Orrin Hatch's funding
Source: OpenSecrets

Summary: Orrin Hatch is the latest example of laws being up for sale, i.e. companies can buy politicians to act as their couriers and pass laws for them, including laws pertaining to patents

THE SCOTUS issued some important rulings such as Alice and Mayo, which meant that patents granted by the USPTO may, in retrospect, be invalid. The Saint Regis Mohawk Tribe is attempting to shield Allergan from the Patent Trial and Appeal Board (PTAB), the only tribunal that can render Allergans patents invalid unless Allergan sues. All sorts of pharmaceutical patents are under a similar threat from PTAB and Mr. Kyle Bass made headlines some years ago when he used PTAB as a weapon. His threat was ending a monopoly.

The subject of immunity from PTAB is now at the Federal Circuit and we need to question the motivation of politicians who take Allergans side, even based on their sources of funding alone.

Watchtroll likes to heckle politicians who receive money from technology firms, but what about pharmaceutical firms?To be clear, in the area of technology pretty much all the companies both large and small support PTAB, except a few like IBM, which nowadays relies on patent shakedowns rather than sales (we have been saying this for years [1, 2,...

11:02

Elon Musk and State of Minds Transhumanism Philosophy "IndyWatch Feed Tech"

What does it mean to be human in world of increasingly powerful technology? This is a question video games have grappled with, most recently in the Deus Ex franchise and the upcoming E3 show-stealing Cyberpunk 2077.

Daedalics State of Mind approaches the topic in a different, more philosophical way. Guns and body mods arent the order of the day. Rather, State of Mind is a narrative adventure that considers how far the human race will go to trade dystopia for utopia.

Creative lead Martin Gantefhr is an avid follower of transhumanist theory, and how humanity will evolve over the coming decades as scientists pursue the singularity. Transhumanism explores the intersection of people and technology, with the ultimate goal giving all people access to technology that leads to an egalitarian utopia.

11:02

Is your brain ready for Monday? Tease your mind with these four optical illusions "IndyWatch Feed Tech"

Better than coffee smile


___ A great way to learn more about our brains and minds is to look at how we can trick themthat is, to see how we react to brain teasers and visual illusions. Below are four fun optical illusio

10:34

Australian Government Pursues "Golden Key" for Encryption "IndyWatch Feed Tech"

The Australian Government believes that it needs a golden key to backdoor encryption within Australia via legislation. The Brits and the Yanks have both already had a nudge at this and both have conceded that requiring a backdoor to encryption is not viable but this will not stop the Australian Liberal Party from trying.

Digital rights experts have described the proposal as "ludicrous" as Cyber security minister Angus Taylor stating that the legislation would be presented for public comment within the next quarter. While the Australian Government has not detailed how it expects to gain access to encrypted data, companies may be penalized if they don't kowtow to the new laws. There is nothing to be discussed here that hasn't been said before other than the Australian Government sincerely believes it can force companies to divulge encrypted data to authorities on demand.


Original Submission

Read more of this story at SoylentNews.

10:09

Distribution Release: Porteus Kiosk 4.7.0 "IndyWatch Feed Tech"

Tomasz Jokiel has announced the release of Porteus Kiosk 4.7.0, the latest stable build of the project's specialist Gentoo-based distribution designed for web kiosks (with Firefox and Chrome browsers): "I'm pleased to announce that Porteus Kiosk 4.7.0 is now available for download. Major software upgrades in this release....

10:07

Foxtel Pirate Site Blocking Application Could Be Granted in Record Time "IndyWatch Feed Tech"

Back in April, pay TV company Foxtel filed the latest in a series of blocking applications, this time targeting more than two dozen domain names facilitating access to 15 torrent and streaming services.

To save on time and costs, Foxtel envisioned things going a little bit differently this time around. The company didnt want to have expert witnesses present in court and asked whether live demonstrations of websites could be replaced by videos and screenshots instead.

Foxtel also said that if the ISPs expected to block the domains agree, it wouldnt serve its evidence on them as it had done previously.

The company then asked Justice Nicholas to deal with the entire injunction application on paper. He declined, instead scheduling a hearing to take place today.

As hoped by Foxtel, events were indeed more streamlined. According to a ZDNet report, the hearing lasted for just an hour, with no live website demonstrations and the requested videos being allowed.

The application targeted 15 torrent site domains and ten streaming sites located overseas (a requirement for blocking under Australian law), each of which unashamedly and flagrantly infringes copyright.

ComputerWorld lists the torrent sites as ETTV, MagnetDL, Torrent Download (possibly TorrentDownloads.me), Torrent Room (TorrentRoom.com), and Torrents.me. A domain facilitating access to the previously-blocked Pirate Bay was also included in the application.

Also demonstrated in Court was a search bar that can be used to access content on torrent sites including 1337x and The Pirate Bay. No further details on the bar have been made available, but as a standalone item, blocking seems unlikely.

The streaming services targeted by Foxtel include HDO, HDEuropix, 123Hulu, Watch32, Sockshare, NewEpisodes, 1Movies, 5Movies, WatchFreeMovies and SeriesTop. They represent just a handful of the hundreds of similar domains offering streaming today.

Both the torrent and streaming sites stand accused of facilitating access to a range of popular TV shows including Game of Thrones, Greys Anatomy and Fear the Walking Dead plus movies including Jason Bourne, Pacific Rim, and Red Sparrow.

Under Section 115a of the Copyright Act, Foxtel wants the usual ISPs Optus, Vocus, Tel...

10:01

Dissecting the Elusive Wax Motor "IndyWatch Feed Tech"

Wed wager most readers arent intimately acquainted with wax motors. In fact, a good deal of you have probably never heard of them, let alone used one in a project. Which isnt exactly surprising, as theyre very niche and rarely used outside of HVAC systems and some appliances. But theyre fascinating devices, and once youve seen how they work, you might just figure out an application for one.

[AvE] recently did a complete teardown on a typical wax motor, going as far as cutting the thing in half to show the inner workings. Now weve seen some readers commenting that everyones favorite foul-mouthed destroyer of consumer goods has lost his edge, that his newer videos are more about goofing off than anything. Well we cant necessarily defend his signature linguistic repertoire, but we can confidently say this video does an excellent job of explaining these little-known gadgets.

By turning heat directly into mechanical energy, wax motors are often used to open val...

09:09

Top 10 Most Pirated Movies of The Week on BitTorrent 06/18/18 "IndyWatch Feed Tech"

This week we have three newcomers in our chart.

Escape Plan 2: Hades is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the articles of the recent weekly movie download charts.

This weeks most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 () Escape Plan 2: Hades 3.9 / trailer
2 (1) Tomb Raider 6.6 / trailer
3 (2) Pacific Rim: Uprising 5.8 / trailer
4 (4) Avengers: Infinity War (HDCam) ...

09:02

Six Fitbit Employees Charged in Jawbone Trade Secrets Case "IndyWatch Feed Tech"

Submitted via IRC for BoyceMagooglyMonkey

Fitbit's and Jawbone's trade secret theft saga apparently didn't end when they reached a settlement in court back in December. According to Reuters, six former and current Fitbit employees have been charged in a federal indictment for being in possession of trade secrets stolen from the company's once-staunch rival Jawbone. All six worked for Jawbone for at least a year between May 2011 and April 2015. If you'll recall, the fallen wearables giant filed a lawsuit against Fitbit back in 2015 for "systematically plundering" insider information.

At the time, Jawbone said some of its employees sent over 300,000 confidential files to its rival, including outlines of future products, manufacturing prices and schedules. Jawbone even said that some of the products Fitbit released in recent years use tech stolen from the company. Fitbit, however, denied using Jawbone trade secrets in any product, feature or technology.

[...] Update: A Fitbit spokesperson offered the following statement: "In a trade secret misappropriation case brought by Jawbone in the International Trade Commission in 2016 that involved these same individuals, a federal administrative law judge during a nine-day trial on the merits found that no Jawbone trade secrets were misappropriated or used in any Fitbit product, feature or technology."

Source: https://www.engadget.com/2018/06/15/fitbit-employees-charged-jawbone-trade-secrets-case/


Original Submission

Read more of this story at SoylentNews.

09:00

Capital Flight to Germany in Full Swing? "IndyWatch Feed Tech"




Bah, here we go again.  Public demand for currency never ends and provides a continuing shrinking supply of cash which allows governmental spending.

The problem remains locating risk free investments and they do not exist except as a government promise.   The expanding cash and credit bubble drives the economy and makes it all work well enough.  Throw away all those borders and all this disappears immediately.

Local guarantees shift that capital to areas that are capital poor.  This is as it should be.  A guarantee in North Dakota shifts deposits into their banking system.  Their loan portfolio expands locally.

All those private deposits landing in Germany merely come back as local bank deposits simply absolving the individual of local government confiscation.  As it should.
  .
Capital Flight to Germany in Full Swing


The ECB guarantees these loans.

As long as they are guaranteed, then hells bells, why not make more loans?

1 Germany and the creditor nations forgive enough debt for Europe to grow. This is the transfer union solution.

2 Permanently high unemployment and slow growth in Spain, Greece, Italy, with stagnation elsewhere in Europe

3 Breakup of the eurozone



...

09:00

Qanon - Congress/ DOJ/FBI Confrontation Wednesday "IndyWatch Feed Tech"

 


The traffic from Q has become unusually heavy.  We now know that Huma and Podesta were indicted early last November.  This would remain sealed.  We also learn that the principal motive behind this Mil Intel operation is the ending of human trafficking or the children.  It also entails rolling up the DEEP STATE.  I understood that this was what was happening and this is formal confirmation trough this intel feed.

It is one thing to think logically and surmise actions.  it is quite another to have it directly confirmed. 

Our attention is now drawn to Obama's 2014 speech to the Bilderberg group.  Hitler could not have said this better and i am angry this was never brought out by the MSM who must be now understood as complicit.

Full confrontation between Congress and the DOJ/FBI is on this week.  They have now run out of stall options.


We are still some ways away from mass arrests it appears but sealed indictments are now past 35,000.  In the meantime rising support for the Trump GOP is narrowing DEM options.  Half of those in congress are likely to be forced to resign before the midterms as well.  That is only four months away and the shoe must drop soon.

I do think that the Obstructionists may well throw in the towel now.  ..
Q !CbboFOtcZs ID: 9fc2c1 No.1785859
Jun 17 2018 12:05:46 (EST)
Anonymous ID: 84b9ef No.1785584
Jun 17 2018 11:50:20 (EST)
>>1785388

https://www.youtube.com/watch?v=44kW03sfKrI...

09:00

The Natural Pedophile Conspiracy and the Royal Family. "IndyWatch Feed Tech"




The Natural Pedophile Conspiracy and the Royal Family.

I bring this topic up because it is an underlying meme drifting around the NPC or the Natural Pedophile Conspiracy.  First, though I do think that it is a False meme and my reasoning all goes back to numbers.

The NPC is made up of those individuals who are addicted to pedophilia and are largely unable to help themselves.  This is actually a very small group of men and women.  In numbers, it is likely in the thousands throughout North America.  This does not include those so driven but able to manage the impulses.  This dangerous subset works out to be several per million.  This still gives us a population of over ten thousand.

The difficulty worsens since they are all attracted to where children are vulnerable.  Thus they get to meet each other and by circumstance must conspire with each other.  It really is a natural conspiracy that can then last a lifetime.  No other conspiracy has this type of natural glue and is thus always suspect and unstable.

By extension, this network has worked itself into government service were their coherence allows them to promote internally and maintain loyalties as well.  Other organizations are far more vulnerable to exposure and that includes the church which is why we are hearing so much about it.

It is the very nature of a criminal conspiracy to claim that leadership comes from the very top even when that is impossible.  Thus we have the persistent claim of royal family involvement even when the natural statistics tells us that this must be impossible. The inclination is rare enough to ensure any given family will have candidates generations apart unless special influences are brought to bear and that is actually ridiculous.
...

09:00

Buddhists in love "IndyWatch Feed Tech"




Here is a fresh insight on the whole issue of relationships that is well worth thinking through.


This is different inasmuch Buddhism teaches change and the objective viewing of change.  I also observe that Christianity teaches the centrality of love while Islam is far to accepting of hate.  This article is central to developing a completed viewpoint.

Buddhists in love

Lovers crave intensity, Buddhists say craving causes suffering. Is it possible to be deeply in love yet truly detached?

Lisa Feldman Barrett is professor of psychology at Northeastern University in Boston and the author of How Emotions Are Made: The Secret Life of the Brain(2017).
John Dunne is a professor of contemplative humanities at the University of Wisconsin-Madison.

https://aeon.co/essays/does-buddhist-detachment-allow-for-a-healthier-togetherness?

Humans are soci...

09:00

Money Doesnt Buy HappinessBut Time Just Might Do It - Facts So Romantic "IndyWatch Feed Tech"


A citys pace of life was indeed significantly related to the physical, social, and psychological well-being of its inhabitants.Photograph by Neta Bartal / Flickr

While on vacation in distant locales, people often find that time moves quite differently than in the places theyre used to. In the tropics, we settle into the grooves of island time and relax thanks to a more leisurely rhythm. A trip to a big city can leave us exhilarated but also drained by the energetic whir of life there.

The different paces of different communities also seem to be connected to other cultural characteristics. Robert Levine and his colleagues have studied the speed of life in cities around the world and across the U.S. In a series of experiments they measured how fast solitary pedestrians in a downtown core covered a distance of 60 feet (being careful to exclude those who are obviously window shopping), timed how long it took to complete a simple commercial transaction, and recorded the accuracy of randomly selected clocks in the downtown business area. They found that places with a faster pace of life also had more robust economies (as measured by GDP per capita, average purchasing power, and average caloric
Read More

08:43

New antibiotic shows long-lasting promise as superbug killer "IndyWatch Feed Tech"

Antibiotics have saved countless lives for the better part of a century, but these medical marvels may be approaching the end of their usefulness. Thanks to overuse, bacteria are rapidly evolving resistance to our best drugs, prompting scientists to try to develop new ones. Now, a team at Purdue University has found that a compound called F6 is effective at killing bacteria that have already evolved resistance to existing antibiotics. In tests, the new drug also seems less susceptible to bacterial resistance down the track.

The discovery and use of antibiotics was one of the greatest scientific achievements of the 20th century, as previously-dangerous procedures quickly became safe and infections relatively easy to treat. But after decades of overuse and overprescription, bacteria are fighting back, with more and more antibiotics becoming ineffective including some of our last lines of defense. If left unaddressed, the problem is predicted to worsen until these so-called superbugs are killing up to 10 million people a year by 2050.

08:43

IBM overcomes von Neumann bottleneck for AI hundreds of time faster using hundreds of times less energy "IndyWatch Feed Tech"

IBM Research AI team demonstrated deep neural network (DNN) training with large arrays of analog memory devices at the same accuracy as a Graphical Processing Unit (GPU)-based system. This is a major step on the path to the kind of hardware accelerators necessary for the next AI breakthroughs. Why? Because delivering the Future of AI will require vastly expanding the scale of AI calculations.

Above Crossbar arrays of non-volatile memories can accelerate the training of fully connected neural networks by performing computation at the location of the data.

This new approach allows deep neural networks to run hundreds of times faster than with GPUs, using hundreds of times less energy.

08:43

New (?) ideas for utilizing space for business: hypergravity for isotopic enrichment "IndyWatch Feed Tech"

One night, as I was putting my daughter to bed and waiting for her to fall asleep, I tried to think of some new markets for space utilization.

We often hear about attempts to find industrial uses for microgravity for growing crystals, for purification of electronic materials (which is an actual thing with ACME Advanced Materials: http://www.a2-m.com/), maybe growth of certain metal foams, etc. However, in space, youre in both a hard vacuum and not physically resting on anything, so you can spin up something, and it will simply keep on spinning (stably, if you spin it around the correct axis) nearly indefinitely without any additional energy input and no wear on bearings or anything. So in fact, you can get basically any gravity level you want, including HYPERgravity, nearly for free.

What are the applications of this?

08:29

Nearly a Decade in Twitter and Half a Million Tweets "IndyWatch Feed Tech"

Twitter at 500000

Twitter is not a site that I like. Honestly, I dont! In fact, I think it is getting worse over time. In 2016 it shadowbanned me a lot of times and I receive plenty of abuse there. I now identify as living in the North Pole to avoid messages like youre English, so (method of shooting the messenger). I only very reluctantly joined Twitter after I had begun participating in identi.ca for the purpose of posting Free software news. Prior to that I preferred just blogging, relying on people who subscribe to RSS feeds to find my writings. At the time there was also Digg.com, which Im proud to say I was ranked 17th on (they had millions of users at the time). Having taken a quick look at my Twitter account last night, I noticed that a milestone is approached and will have been reached by weekss end. I am nowhere near the most prolific users (like 38 million tweets for this Japanese account; see the out-of-date chart below), but quantity was never my goal and besides, as many people know, I primarily post in Diaspora these days, with posts being exported from there to Twitter. I vastly favour these Freedom/Free software-centric communities (like identi.ca at the time and nowadays GNU Social, Diaspora etc.) and I humbly think that all this social control media phenomenon is a waste of human productivity and a threat to real, in-depth, fact-checked journalism. But no single person can tell the world how to use the Internet and how to communicate; if social control media is whats normal and necessary now (adapting to the so-called market), then so be it.

Twitter top users

08:22

Android-based devices Amazon Fire TV and Fire Stick hit by cryptomining malware "IndyWatch Feed Tech"

A new crypto mining malicious code dubbed ADB.miner is targeting Android-based devices Amazon Fire TV and Fire Stick.

Recently, security experts spotted the crypto mining malware ADB.miner (Android.CoinMine.15) targeting Amazon Fire TV and Fire TV Stick devices.

The malicious code is active at least since February when researchers at Qihoo 360s Netlab have spotted the Android mining botnet that targets Android devices by scanning for open ADB debugging interface (port 5555) and infects them with a Monero cryptocurrency miner.

The port 5555 is the working port ADB debug interface on Android device that should be shut down normally. The devices infected by ADB.miner are devices where users or vendors have voluntary enabled the debugging port 5555.

The Amazon devices hit by the ADB.miner leverages the ADB (Android Debug Bridge) for uninterrupted internet connections it is no surprise that they are now under attack.

Many Amazon Fire TV owners reported through a thread on the XDA forums that they streaming media players have been infected by the malware.

Once the malware has infected the device, it will abuse its resources to mine cryptocurrency and disrupts video playback feature.

The infected devices display the official Android logo and a message that states Test.

Infected devices will become very slow to use. Lo...

07:51

Apple USB Restricted Mode feature will make hard for law enforcement to crack devices "IndyWatch Feed Tech"

Apple introduced a new feature in the latest beta versions of iOS, dubbed USB Restricted Mode, to improve the security of a locked device,

Apple is implementing a new feature dubbed USB Restricted Mode to improve the security of its device, it is going to lock down the iPhones data port to avoid unauthorized access, but experts observed that in this way password-cracking tools used by forensics experts will be no more effective.

The USB Restricted Mode was implemented in the latest beta versions of the iOS operating system, it disables the data connection of the iPhones Lightning port after a specific interval of time but it doesnt interrupt the charging process.

Any other data transfer would require the user providing the passcode.

Initially, the USB Restricted Mode required a passcode after 7 days.

The USB Restricted Mode was implemented in the latest beta versions of the iOS operating system, it disables the data connection of the iPhones Lightning port after a specific interval of time but it doesnt interrupt the charging process. reads a blog post published by ElcomSoft.

Last week Apple provided an update on the new feature confirming that it will require a passcode every hour for the data transfers to continue.

Apple said it was planning an iPhone software update that would effectively disable the phones charging and data port the opening where users plug in headphones, power cables and adapters an hour after the phone is locked. reported the New York Times.

While a phone can still be charged, a person would first need to enter the phones password to transfer data to or from the device using the port.

Apple USB Restricted Mode feature

The new feature will have a significant impact on forensics investigation conducted using cracking tools such as Cellebrite and...

07:23

[SECURITY] [DSA 4229-1] strongswan security update "IndyWatch Feed Tech"

Posted by Yves-Alexis Perez on Jun 17

-------------------------------------------------------------------------
Debian Security Advisory DSA-4229-1 security () debian org
https://www.debian.org/security/ Yves-Alexis Perez
June 14, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : strongswan
CVE ID : CVE-2018-5388 CVE-2018-10811...

07:18

[security bulletin] MFSBGN03810 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF "IndyWatch Feed Tech"

Posted by cyber-psrt on Jun 17

https://softwaresupport.hpe.com/document/-/facetsearch/document/KM03180069

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: KM03180069
Version: 1

MFSBGN03810 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-06-15
Last Updated: 2018-06-15...

07:14

[SECURITY] [DSA 4230-1] redis security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jun 17

-------------------------------------------------------------------------
Debian Security Advisory DSA-4230-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
June 17, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : redis
CVE ID : CVE-2018-11218 CVE-2018-11219...

07:12

[SECURITY] [DSA 4231-1] libgcrypt20 security update "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Jun 17

-------------------------------------------------------------------------
Debian Security Advisory DSA-4231-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
June 17, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : libgcrypt20
CVE ID : CVE-2018-0495

It was...

07:06

[security bulletin] MFSBGN03809 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF "IndyWatch Feed Tech"

Posted by cyber-psrt on Jun 17

https://softwaresupport.hpe.com/document/-/facetsearch/document/KM03180066

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: KM03180066
Version: 1

MFSBGN03809 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-06-15
Last Updated: 2018-06-15...

07:00

Searchable KiCad Component Database Makes Finding Parts A Breeze "IndyWatch Feed Tech"

KiCad, the open source EDA software, is popular with Hackaday readers and the hardware community as a whole. But it is not immune from the most common bane of EDA tools. Managing your library of symbols and footprints, and finding new ones for components youre using in your latest design is rarely a pleasant experience. Swooping in to help alleviate your pain, [twitchyliquid64] has created KiCad Database (KCDB). a beautifully simple web-app for searching component footprints.

The database lets you easily search by footprint name with optional parameters like number of pins. Of course it can also search by tag for a bit of flexibility (searching Neopixel returned the footprint shown above). Theres also an indicator for Kicad-official parts which is a nice touch. One of our favourite features is the part viewer, which renders the footprint in your browser, making it easy to instantly see if the part is suitable. AngularJS and material design are at work here, and the main app is written in Go  very trendy.

The database is kindly publicly hosted by [twitchyliquid64] but can easily be run locally on your machine where you can add your own libraries. It takes only one command to add a GitHub repo as a component source, which then gets regularly ingested. Its great how easy it is to add a neat library of footprints you found once, then forget about them, safe in the knowledge that they can easily be found in future in the same place as everything else.

If you cant find the schematic symbols for the part youre using, we recently covered a service which uses OCR and computer vision to automatically generate symbols from a datasheet; pretty cool stuff.

06:43

Musician Wins Over $260,000 in Email Deception/Sabotage Lawsuit "IndyWatch Feed Tech"

Musician Wins $260,000 In Lawsuit Against Ex-Girlfriend Who Sabotaged Career

In the spring of 2014, Eric Abramovitz got the opportunity of a lifetime. He just didn't know it. Abramovitz was the victim of a deception that a Canadian judge called "despicable," as he granted Abramovitz $350,000 Canadian dollars (more than $260,000 U.S.) in damages.

Abramovitz is a gifted Canadian clarinetist who received national attention when he was still in his teens. As a student at McGill University, he applied for a spot and a scholarship at the prestigious Colburn Conservatory in Los Angeles, where he would study under the famed clarinet teacher Yehuda Gilad.

Only two spots open up per year, and they're seen as launching pads for elite careers. Competition is fierce. Abramovitz made it to the audition phase. But in March 2014, he saw an email in his inbox telling him he had been rejected.

It was heartbreaking. He went through "some really dark, sad, angry days," he told BuzzFeed. His girlfriend at the time, Jennifer Lee, another musician at McGill, consoled him.

But Abramovitz's despair was born out of a lie and Lee's comforting words were, in retrospect, "really sick," he told the site. He had actually made it into the Colburn Conservatory. He never saw his acceptance email, however, because Lee got to it first and sabotaged him. Apparently, a Canadian judge concluded, she didn't want him to move from Montreal to California.


Original Submission

Read more of this story at SoylentNews.

06:42

Science liaison Mariya Lyubenova "IndyWatch Feed Tech"

Mariya Lyubenova is an astronomer at ESO. Her research focusses on the motions and chemical properties of stars in galaxies to unravel the build-up and evolution of galaxies. She also works as a science liaison in the education and Public Outreach Department (ePOD).

06:42

8 Women in Science and Their Ground-Breaking Achievements "IndyWatch Feed Tech"

Women deserve attention for their great contributions to science. Here are some favorite figures who got us to where we are today.

06:05

OpenGL Floating Point Textures No Longer Encumbered By Patents, Enabled In Mesa "IndyWatch Feed Tech"

Back in 2012 when talking with Gabe Newell of Valve about open-source/Linux challenges one of the topics he was awed about was patents encumbering the open-source graphics driver progress. Six years later, Timothy Arceri working on the Valve Linux graphics driver team has freed Mesa's ARB_texture_float support from being built conditionally due to these patent fears...

05:42

Boston Dynamics Shows Latest Advancements in Robotics at CEBIT 2018 "IndyWatch Feed Tech"

Robots are getting lighter, faster, stronger and smarter. Marc Rybert, founder of Boston Dynamics shows the latest developments at CEBIT 2018.

Courtesy of CEBIT. June 2018.

05:22

HPV vaccine has almost wiped out infections in young women, figures show "IndyWatch Feed Tech"

T he HPV vaccine has almost completely wiped out infections in young women, and if expanded to men could prevent thousands of cancer cases in Britain each year, new figures suggest.

New figures from Public Health England show that the rate of Human Papilloma Virus (HPV) in women aged between 16 to 21 who were vaccinated between 2010 and 2016 has fallen by 86 per cent.

More than 3,000 women are diagnosed with cervical cancer each year, and more than 800 will die from the disease, with most cases caused by the HPV virus.

05:22

The big picture: Were getting closer to AI doctors "IndyWatch Feed Tech"

Its not unrealistic to think that 80% of what doctors do will be replaced by algorithms and artificial intelligence. The idea, evangelized by venture capitalist Vinod Khosla two years ago, is that machines can more accurately diagnosis us and that will reduce deadly medical errors and free doctors up to do other things.

The bottom line: Were getting closer to this reality. Algorithms, for example, can already diagnose diseases from imaging scans better than human radiologists. Computers possibly could take over the entire radiology specialty.

Read more toggle.

05:02

RIPPA The Farm Robot Exterminates Pests And Weeds "IndyWatch Feed Tech"

RIPPA, a fully autonomous robot, can cover five acres a day on a solar charge finding and exterminating pests and weeds on every single plant over the equivalent of four football fields. Are robots like RIPPA the future of farming?

RIPPA stands for Robot for Intelligent Perception and Precision Application.

Catalyst joins engineers from the Australian Centre for Field Robotics as they explore the world of agriculture to develop robots and smarter ways of farming.

Watch Catalyst on ABC iview now: https://iview.abc.net.au/programs/catalyst

SUBSCRIBE: http://ab.co/CatalystYouTube

About Catalyst:
Catalyst is Australias flagship science documentary program, showcasing Australian and international stories that impact us all. With our exciting mix of science genres, presented by top scientists and experts, viewers are exposed to extraordinary topics, discoveries, observations, and philosophies that shape our world. The viewer will be left inspired, activated, and in awe of this extraordinary planet.

04:21

Sunshine Is Making Deepwater Horizon Oil Stick Around "IndyWatch Feed Tech"

In the days and weeks after the 2010 Deepwater Horizon oil spill in the Gulf of Mexico, sunlight hit the oil slicks on the surface of the water. That triggered chemical reactions that added oxygen to oil molecules that once were just chains of carbon and hydrogen atoms. These oxygenated hydrocarbons are still sticking around eight years later with little evidence of degradation, researchers report May 29 in Environmental Science and Technology.

Chemist Christopher Reddy of Woods Hole Oceanographic Institution in Massachusetts and colleagues analyzed the oily soup of molecules floating in the Gulf post-disaster. (The Deepwater Horizon spill was the largest marine oil spill in U.S. history, leaking more than 3 million barrels.) While investigating how the leaked hydrocarbons broke down over time, the team got a surprise: More than half of the degrading oil by-products found in oil slicks from the spill were these oxygenated hydrocarbons, the researchers reported in 2012. The by-products had gone relatively unnoticed after previous oil spills, and so were mostly unstudied in that context.

Read more of this story at SoylentNews.

04:02

The most important lesson from 83,000 brain scans "IndyWatch Feed Tech"

Never miss a talk! SUBSCRIBE to the TEDx channel: http://bit.ly/1FAg8hB

In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)

04:01

Learn Six Oscilloscope Measurements with One Arduino "IndyWatch Feed Tech"

We wont mention names, but we are always dismayed to see people twist knobs randomly on a scope until it shows a good picture. These days, theres the dreaded auto button, too, which is nearly as bad. If you havent spent the time to learn how to properly use a scope [Bald Engineer] has a great introduction to making six measurements with an Arduino as a test device.

To follow along youll need an Arduino UNO and a two-channel (or better) scope. Actually, most of the measurements would probably work on any Arduino, but there are some that require the separate USB to serial chip like that found on the UNO and similar boards.

The six measurements are:

  1. The auto reset programming pulse
  2. Capture and decode serial data
  3. Noise on the power rail
  4. Observe probe loading effects
  5. PWM duty cycle
  6. The timing of pin manipulation code

Some of these measurements use a bit of Arduino code, while others just make use of the circuitry on the board no matter what software is running.

Not only does the post show you where to make the measurements and what the result should look like, theres also a discussion of what the measurement means and some suggested things to try on your own.

If you go through this post, you might also enjoy learning more about probes. If you are feeling adventurous, you can even build your own current probe.

04:00

UMaxHosting 50GB RAID-10 VPS for $1.95/mo with a month free and more! "IndyWatch Feed Tech"

John from UMaxHosting has submitted their first offer ever with us! They are offering OpenVZ based virtual services out of Los Angeles and New York. They started with New York and are now expanding over to the west coast! We hope you enjoy what they have to offer and please let us know of any questions/comments/concerns you may have below.

Heres what they had to say:

UMaxHosting is a hosting provider that specializes in providing maximum performance at the lowest cost possible. UMaxHosting provides a low latency network backed with a 99.9% network uptime guarantee. Additionally, our support staff are available 247 to assist our customers with any questions they may have. Our staff are also working behind the scenes to ensure our mission statement is constantly being delivered, without any shortcuts being taken!

Our Mission Statement: To deliver the highest level of hosting performance at the best value possible. To adapt to customer requirements and provide personalized service.

***** Order any LEB special below and get 1 month free on top of your next due date! Open a ticket to our Billing Department to claim your free month after you have ordered. *****

256MB Plan

  • 1 CPU Core
  • 256MB DDR3 RAM
  • 256MB vSwap
  • 50GB RAID-10 Storage
  • 2000GB Monthly Bandwidth
  • 100Mbps Network Port
  • SolusVM Control Panel
  • Any Linux OS
  • Unlimited OS Reinstalls
  • Full Root Privileges
  • Instant Deployment
  • Easy API Access
  • $1.95/mo [ORDER]

1GB Plan

  • 2 CPU Cores
  • 1024MB (1GB) DDR3 RAM
  • 1024MB (1GB) vSwap
  • ...

03:42

Astronaut Chris Hadfield says the rockets from NASA, SpaceX, and Blue Origin wont take people to Mars "IndyWatch Feed Tech"

Sorry, Elon.


Chris Hadfield, a former astronaut, says the future rockets and spaceships of NASA, SpaceX, and Blue Origin would be too risky to get people to and from Mars. He thinks we need some possibly outlandish solutions for space travel to make round-trip travel to the red planet practical.

03:17

Week in review: Digital signature spoofing, securing microservices "IndyWatch Feed Tech"

Heres an overview of some of last weeks most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, incident response, and forensics processes and personnel use code signing to weed out trusted code from untrusted code. To undermine a code signing implementation for a major OS would break a core security construct that many depend on for day to day security operations. Patch management is not just ITs More

The post Week in review: Digital signature spoofing, securing microservices appeared first on Help Net Security.

02:22

Elon Musk: I Am a Socialist "IndyWatch Feed Tech"

Tesla CEO and PayPal billionaire Elon Musk surprised many Friday when he declared on Twitter that he is a socialist. Conservative critics, however, may well have agreed, given his companies reliance on the state.

02:11

DistroWatch Weekly, Issue 768 "IndyWatch Feed Tech"

This week in DistroWatch Weekly: Review: Devuan GNU+Linux 2.0.0 "ASCII"News: The world's fastest super computer runs Red Hat, openSUSE's supported ARM devices, new NOVA filesystem coming to Linux, OpenBSD offers better handling of cron outputSoftware review: Building packages with pkgsrcReleased last week: deepin 15.6, NethServer 7.5, Univention Corporate....

02:00

HPR2576: My swedish and german podcasts part 1 "IndyWatch Feed Tech"

P1 Sprket http://api.sr.se/api/rss/pod/4012 P1 Vetenskapsradion Historia http://api.sr.se/api/rss/pod/4020 Medierna i P1 http://api.sr.se/api/rss/pod/3951 @mediasres http://www.deutschlandfunk.de/podcast-mediasres.762.de.podcast Europa heute http://www.deutschlandfunk.de/podcast-europa-heute.796.de.podcast Computer und Kommunikation http://www.deutschlandfunk.de/podcast-computer-und-kommunikation.685.de.podcast

01:59

Smoking and Diabetes Linked to Brain Calcifications "IndyWatch Feed Tech"

People who smoke or have diabetes may be at increased risk of calcifications in a region of the brain crucial to memory, according to a new study published online in the journal Radiology.

Dementia is a major public health problem that affects tens of millions of people worldwide. One focus of dementia research has been the hippocampus, a brain structure important for both short- and long-term memory storage. Alzheimer's disease, the most common type of dementia, is associated with atrophy of the hippocampus.

Researchers have hypothesized that abnormal buildups of calcium, or calcifications, in the hippocampus may be related to vascular problems that could contribute to hippocampal atrophy and subsequent cognitive deterioration. However, published research on the association between hippocampal calcification and cognitive impairment is limited.

"We know that calcifications in the hippocampus are common, especially with increasing age," said the study's lead author, Esther J.M. de Brouwer, M.D., a geriatrician at the University Medical Center in Utrecht, the Netherlands. "However, we did not know if calcifications in the hippocampus related to cognitive function."

Advances in imaging have provided opportunities to explore the role of hippocampal calcifications in dementia. The development of multiplanar brain CT scans has enabled better distinction between hippocampal calcifications and calcifications in nearby brain structures like the choroid plexus.

"A multiplanar CT scan makes it possible to see the hippocampus in different anatomical planes; for example, from top to bottom, right to left and front to back," Dr. de Brouwer said. "Before multiplanar CT scans, hippocampal calcifications were often mistaken for choroid plexus calcifications. So with multiplanar CT scans, hippocampal calcifications are better distinguished from calcifications in other areas."

[...] The researchers plan to carry out additional studies in different groups of people to better understand possible links between these calcifications and cognitive problems.


Original Submission

Read more of this story at SoylentNews.

01:42

EXT4 fscrypt vs. eCryptfs vs. LUKS dm-crypt Benchmarks "IndyWatch Feed Tech"

Given the recent advancements of the EXT4 file-system with its native file-system encryption support provided by the fscrypt framework, here are benchmarks comparing the performance of an EXT4 file-system with no encryption, fscrypt-based encryption, eCryptfs-based encryption, and a LUKS dm-crypt encrypted volume.

01:20

Notes on "The President is Missing" "IndyWatch Feed Tech"

Former president Bill Clinton has contributed to a cyberthriller "The President is Missing", the plot of which is that the president stops a cybervirus from destroying the country. This is scary, because people in Washington D.C. are going to read this book, believe the hacking portrayed has some basis in reality, and base policy on it. This "news analysis" piece in the New York Times is a good example, coming up with policy recommendations based on fictional cliches rather than a reality of what hackers do.


The cybervirus in the book is some all powerful thing, able to infect everything everywhere without being detected. This is fantasy no more real than magic and faeries. Sure, magical faeries is a popular basis for fiction, but in this case, it's lazy fantasy, a cliche. In fiction, viruses are rarely portrayed as anything other than all powerful.

But in the real world, viruses have important limitations. If you knew anything about computer viruses, rather than being impressed by what they can do, you'd be disappointed by what they can't.

Go look at your home router. See the blinky lights. The light flashes every time a packet of data goes across the network. Packets can't be sent without a light blinking. Likewise, viruses cannot spread themselves over a network, or communicate with each other, without somebody noticing -- especially a virus that's supposedly infected a billion devices as in the book.

The same is true of data on the disk. All the data is accounted for. It's rather easy for professionals to see when data (consisting of the virus) has been added. The difficulty of anti-virus software is not in detecting when something new has been added to a system, but automatically determining whether it's benign or malicious. When viruses are able to evade anti-virus detection, it's because they've been classified as non-hostile, not because they are invisible.

Such evasion only works when hackers have a focused target. As soon as a virus spreads too far, anti-virus companies will get a sample, classify as malicious, and spread the "signatures" out to the world. That's what happened with Stuxnet, a focused attack on Iran's nuclear enrichment program that eventually spread too far and got detected. It's implausible that anything can spread to a billion systems without anti-virus companies getting a sample and correctly classifying it.

In the book, the president creates a team of the 30 brightest cybersecurity minds the country has, from government, the private sector, and even convicted hackers on parole from jail -- each more brilliant than the last. This is yet another lazy cliche about genius hackers.

The cliche comes from the fact that it's rather e...

01:08

Canonical Shifts Its Fiscal Year Ahead Of Likely IPO "IndyWatch Feed Tech"

You have likely heard by now about Ubuntu maker Canonical planning to do an initial public offering (IPO) at some point in the not too distant future to become a publicly-traded company. The latest sign of that is Canonical has now shifted its corporate calendar...

01:00

Hackaday Links: June 17, 2018 "IndyWatch Feed Tech"

Do you like badges? Of course you like badges. Its conference season, and that means its also badge season. Well good news, Tindie now has a badge category. Right now, its loaded up with creepy Krustys, hypnotoads, and fat Pikas. Theres also an amazing @Spacehuhn chicken from [Dave]. Which reminds me: we need to talk about a thing, Spacehuhn.

On the list of weird emails we get in the tip line comes Rat Grease. Rat Grease is the solution to rodents chewing up cabling and wires. From what we can gather, its a mineral oil-based gel loaded up with capsaicin; its not a poison, and not a glue. Rats are our friends, though, which makes me want to suggest this as a marinade, or at the very least a condiment. The flash point is sufficiently high that you might be able to use this in a fryer.

[Matthias Wandel] is the guy who can build anything with a table saw, including table saws. He posts his stuff online and does YouTube videos. A while back, he was approached by DeWalt to feature their tools in a few videos. He got a few hand tools, a battery-powered table saw, and made some videos. The Internet then went insane and [Matthias] lost money on the entire deal. Part of the reason for this is that his viewers stopped buying plans simply because he featured yellow power tools in his videos. This is dumpster elitism, and possibly the worst aspect of the DIY/engineering/maker community.

Elon Musk is the greatest inventor ever. No scratch that. The greatest person ever. Need more proof? The CEO of Tesla, SpaceX, and our hearts has been given the green light to build a high-speed underground train from Chicago OHare to downtown. Heres the kicker: hes going to do it for only $1 Billion, or $55 Million per mile, making it the least expensive subway project by an order of magnitude. Yes, Subways usually cost anywhere between $500 to $900 Million per mile. How is he doing it? Luck, skill, and concentrated power of will. Elon is the greatest human ever, and were not just saying that to align ourselves with an audience that is easy to manipulate; were also saying this because Elon has a foggy idea for a media vetting wiki.

...

00:02

Four billion years of evolution in six minutes "IndyWatch Feed Tech"

Did humans evolve from monkeys or from fish? In this enlightening talk, ichthyologist and TED Fellow Prosanta Chakrabarty dispels some hardwired myths about evolution, encouraging us to remember that were a small part of a complex, four-billion-year process and not the end of the line. Were not the goal of evolution, Chakrabarty says. Think of us all as young leaves on this ancient and gigantic tree of life connected by invisible branches not just to each other, but to our extinct relatives and our evolutionary ancestors.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 17 June

23:51

Elizabeth Holmes Steps Down as Theranos CEO as DoJ Levels Charges "IndyWatch Feed Tech"

Submitted via IRC for BoyceMagooglyMonkey

Elizabeth Holmes steps down as Theranos CEO as DOJ levels charges

CNBC is reporting that Elizabeth Holmes has stepped down from her position as CEO of Theranos and the Department of Justice has indicted her on alleged wire fraud. Both the company and Holmes have been embroiled in scandal following reports that the blood tests it claimed to be working on weren't actually effective. Earlier this year, the Securities and Exchange Commission charged Holmes and Theranos with fraud.

[...] Along with Holmes, Ramesh "Sunny" Balwani, former president of Theranos, is being charged by the DOJ as well. Both Holmes and Balwani appeared before US Magistrate Judge Susan van Keulen today where they were arraigned on nine counts of wire fraud and two counts of conspiracy to commit wire fraud. [...] CNBC reports that Holmes will still chair Theranos' board and the company's general counsel, David Taylor, has been appointed CEO. If convicted, Holmes and Balwani face a maximum prison sentence of 20 years, a $250,000 fine and restitution for each count of wire fraud.


Original Submission

Read more of this story at SoylentNews.

22:58

Links 17/6/2018: Linux 4.18 RC1 and Deepin 15.6 Released "IndyWatch Feed Tech"

GNOME bluefish

Contents

GNU/Linux

  • Desktop

  • Server

    • Five Supercomputers That Arent Supercomputers

      A supercomputer, of course, isnt really a computer. Its not one giant processor sitting atop an even larger motherboard. Instead, its a network of thousands of computers tied together to form a single whole, dedicated to a singular set of tasks. They tend to be really fast, but according to the folks at the International Supercomputing Conference, speed is not a prerequisite for being a supercomputer.

      But speed does help them process tons of data quickly to help solve some of the worlds most pressing problems. Summit, for example, is already booked for things such as cancer research; energy research, to model a fusion reactor and its magnetically confi...

22:42

Smile, its the Future! Emotions, Mixed Reality, and Techno-Telepathy "IndyWatch Feed Tech"

Let me propose a hypothetical future scenario: Lets say that weve since developed an advanced method of brain-to-brain (B2B) communication, to which, naturally, has become quite popular among the younger generation of that time.


How might we judge futuristic societies using our present day standards? Better yet, how might the past have judged us today and would there be a difference?

22:23

[$] 4.18 Merge window, part 2 "IndyWatch Feed Tech"

By the time that Linus Torvalds released 4.18-rc1 and closed the merge window for this development cycle, 11,594 non-merge changesets had found their way into the mainline kernel repository. Nearly 4,500 of those were pulled after last week's summary was written. Thus, in terms of commit traffic, 4.18 looks to be quite similar to its predecessors. As usual, the entry of significant new features has slowed toward the end of the merge window, but there are still some important changes on the list.

22:18

Authorities shut down Dark Web marketplace Black Hand "IndyWatch Feed Tech"

By Carolina

In a joint operation, French police, the National Directorate of Intelligence

This is a post from HackRead.com Read the original post: Authorities shut down Dark Web marketplace Black Hand

22:00

Using IMUs For Odometry "IndyWatch Feed Tech"

The future is autonomous robots. Whether that means electric cars with rebranded adaptive cruise control, or delivery robots that are actually just remote control cars, the robots of the future will need to decide how to move, where to move, and be capable of tracking their own movement. This is the problem of odometry, or how far a robot has traveled. There are many ways to solve this problem, but GPS isnt really accurate enough and putting encoders on wheels doesnt account for slipping. Whats really needed for robotic odometry is multiple sensors, and for that we have [Pablo] and [Alfonso]s entry to the Hackaday Prize, the IMcorder.

The IMcorder is a simple device loaded up with an MPU9250 IMU module that has an integrated accelerometer, gyro, and compass. This is attached to an Arduino Pro Mini and a Bluetooth module that allows the IMcorder to communicate with a robots main computer to provide information about a robots orientation and acceleration. All of this is put together on a fantastically tiny PCB with a lithium battery, allowing this project to be integrated into any robotics project without much, if any, modification.

One interesting aspect of the IMcorders is that they can be used for robot kidnapping issues. This, apparently, is an issue when it comes to robots and other electronic detritus littering the sidewalks. Those electric scooters abandoned on the sidewalk in several cities contain some amazing components that are ripe for some great hardware hacking. Eventually, were going to see some news stories about people stealing scooters and delivery robots for their own personal use. Yes, its a cyberpunks dream, but the IMcorder can be used for a tiny bit of theft prevention. Pity that.

The HackadayPrize2018 is Sponsored by:

21:40

Another Alleged Murderer Shaken Out of the Family Tree "IndyWatch Feed Tech"

The Associated Press and the Everett Washington HeraldNet carry a story about a 30 year old double murder solved using Public Genealogy Sites similar to the Golden State Killer story carried here on SoylentNews.

Deaths of two Canadian visitors shopping in the Seattle area were unsolved since 1987.

The deaths remained a mystery for more than 30 years, until DNA led to a major breakthrough. A genealogist, CeCe Moore, worked with experts at Parabon NanoLabs to build a family tree for the suspect, based on the genetic evidence recovered from the crime scenes. They used data that had been uploaded by distant cousins to public genealogy websites. They pinpointed a suspect, Talbott, a trucker living north of Sea-Tac International Airport.

Police kept him under surveillance until a paper cup fell from his truck in Seattle in early May. A swab of DNA from the cup came back as a match to the evidence that had waited 30 years. Before then, Talbott had never been considered a suspect. Days later he was in handcuffs.

This time the police used Parabon NanoLabs (more well-known for generating facial models from mere samples of DNA) to build a family tree of the killer by submitting the 30 year old crime scene DNA samples to multiple genealogy sites.

Results from those sites were combined by a Parabon genealogist to map the family of distant cousins found in those data bases. Police were then able to narrow down the list using other methods unmentioned.

Neither article mentions if any family members were stalked by police while being eliminated as suspects, or whether any samples were submitted by other family members.


Original Submission

Read more of this story at SoylentNews.

21:23

Astronauts install hi-def docking cameras for Crew Dragon, Starliner capsules "IndyWatch Feed Tech"

In preparation for the commercial crewed modules that will arrive at the International Space Station soon, astronauts took a lengthy spacewalk to install some crucial equipment to the docking module. The extra-vehicular activity moved commander Drew Feustel to third on the list of all-time spacewalkers.

21:22

Watch Hyper-Realistic Skin Get Made for Bionic Limbs "IndyWatch Feed Tech"

Watch extremely realistic limbs, complete with hair and freckles, get made from beginning to end.

21:22

The Universe Is Not a Simulation, but We Can Now Simulate It "IndyWatch Feed Tech"

Computer simulations have become so accurate that cosmologists can now use them to study dark matter, supermassive black holes, and other mysteries of the real evolving cosmos.

21:18

You can now load tool input from URLs "IndyWatch Feed Tech"

You can now pass input data to all tools via ?input-url=URL query argument.

Check out this example - Load a GIF from Giphy and extract 15th frame from it as a PNG.

In this example GIF's URL is:

https://media.giphy.com/media/cNWU2Zeh54VJC/giphy.gif

And ?input-url query is:

?input-url=https://media.giphy.com/media/cNWU2Zeh54VJC/giphy.gif

Full url to a tool that extracts 15th frame:

onlinepngtools.com/convert-gif-to-png?input-url=https://media.giphy.com/media/cNWU2Zeh54VJC/giphy.gif&frame=15

Input-url query argument also works with chaining.

Here's an example - Load a good boi JPG from Imgur, flip it horizontally, convert to grayscale and change JPG output quality to 5%.

Image tools also accepts input images as Data URI encoded data via ?input argument.

Here's an example -...

20:42

Combining Laser And Particle Beams For Interstellar Travel "IndyWatch Feed Tech"

By jan mcharg, texas A&M university college of engineering

A new technology combining a laser beam and a particle beam for interstellar propulsion could pave the way for space exploration into the vast corners of our universe. This is the focus of PROCSIMA, a new research proposal by Dr. Chris Limbach and Dr. Ken Hara, assistant professors in the Department of Aerospace Engineering at Texas A&M University.

NASA has chosen the proposal PROCSIMA: Diffractionless Beam Propulsion for Breakthrough Interstellar Missions, for the 2018 NASA Innovative Advanced Concepts (NIAC) phase 1 study. PROCSIMA stands for Photon-paRticle Optically Coupled Soliton Interstellar Mission Accelerator, and is meant to evoke the idea that interstellar travel is not so far away.

19:55

To Keep the Patent System Alive and Going Practitioners Will Have to Accept Compromises on Scope Being Narrowed "IndyWatch Feed Tech"

They want to keep the pie and eat it as well

Big pie

Summary: 35 U.S.C. 101 still squashes a lot of software patents, reducing confidence in US patents; the only way to correct this is to reduce patent filings and file fewer lawsuits, judging their merit in advance based on precedents from higher courts

THE USPTO has undergone quite a few changes in recent years, triggered initially by AIA and then SCOTUS downwards (trickling down to lower courts over time).

The patent microcosm prefers to cherry-pick cases based on their outcome.Among the main casualties? Software patents. The patent microcosm prefers to cherry-pick cases based on their outcome. The latest such example is Zeroclick v Apple, a Federal Circuit (CAFC) case from the very start of this month [PDF]. We wrote about it a couple of days later and Watchtroll did too (a relatively long time afterwards); its said to be about (G)UI code even though theres no such thing (in programming theres a callback function associated with pertinent GUI elements, but the GUI itself is just a layout, which could possibly be seen as copyrighted). Anyway, this isnt a case about software patents or even 101/Alice. Some say it is about 112. Those same people (or a colleague, Charles Bieneman) speak of DDR Holdings, which is utterly desperate to salvage some abstract patents from 101; the famous case of DDR Holdings was mentioned a lot in 2016 (even here, e.g. [1, 2,...

19:25

DoJ Lets Cops Know SESTA/FOSTA Is For Shutting Down Websites, Not Busting Sex Traffickers "IndyWatch Feed Tech"

DOJ Lets Cops Know SESTA/FOSTA Is For Shutting Down Websites, Not Busting Sex Traffickers

[SESTA/FOSTA] is in force and all it's doing is hurting efforts to track down sex traffickers and harming sex workers whose protections were already minimal. Sex traffickers, however, don't appear to be bothered by the new law. But that's because the law wasn't written to target sex traffickers, as a top DOJ official made clear at a law enforcement conference on child exploitation. Acting Assistant Attorney General John P. Cronan's comments make it clear SESTA/FOSTA won't be used to dismantle criminal organizations and rescue victims of sex traffickers. It's there to give the government easy wins over websites while sex traffickers continue unmolested.

In April, Backpage.com the internet's leading forum to advertise child prostitution was seized and shut down, thanks to the collective action by CEOS and our federal and state partners. The Backpage website was a criminal haven where sex traffickers marketed their young victims. The Backpage takedown and the contemporaneous arrests of individuals allegedly responsible for administering the site struck a monumental blow against child sex traffickers.

But other sites inevitably will seek to fill the void left by Backpage, and we must be vigilant in bringing those criminals to justice as well. With the recent passage of the SESTA-FOSTA legislation, state and local prosecutors are now positioned to more effectively prosecute criminals that host online sex trafficking markets that victimize our children.

"Criminals" that "host sex trafficking markets." That's the target. That's any website that might be used by actual sex traffickers to engage in actual sex trafficking. There's no dedicated web service for sex trafficking -- at least not out in the open where Section 230 immunity used to matter. This is all about taking down websites for hosting any content perceived as sex trafficking-related. It wasn't enough to han...

19:15

Torrents Turn Rambo-Prequel Novel into a Success "IndyWatch Feed Tech"

In this day and age, aspiring artists have access to a wide variety of tools they can use to create a decent product.

Creating something is easy, but the real challenge is to escape obscurity and get noticed by the public.

Traditionally, this task has been fulfilled by major publishers and other media distributors, but there are also alternative routes.

The stories of YouTube sensations who turned into their own media empires come to mind. But in darker corners of the web, which are mostly associated with piracy, there are success stories too.

This week we spoke to Italian author Wallace Lee, whose unofficial Rambo-prequel Rambo Year One received great reviews after relying on torrents as a main distribution channel.

Lees story starts several years ago, when he began publishing short Rambo stories on a personal blog hosted by WordPress. It was fan-fiction in its purest form, but the author soon realized that not everyone was happy with his work.

Two years before free-sharing my first novel, I had a blog where I used to post my Rambo prequel short tales for free. And yet, a few months later, my site was shut down because the laws in the US allow copyright owners to stop fanfiction too, and even if its just for free.

It turned out that a rightsholder objected to his use of the Rambo character. While Lee doesnt recall the sender of the notice, it meant that he could no longer publish his work as he pleased.

Caught in a copyright stranglehold, the author felt limited in his creative expression. Ironically, he saw torrents as his way out. If he published his works on The Pirate Bay, copyright holders couldnt touch him, he thought.

It was a defiant thought, which may have worked, but luckily for him, it didnt get that far. Instead of becoming a pirate writer, Lee received permission from David Morrell, author of the novel First Blood on which the Rambo empire was built.

Frankly, I feel very lucky things ended up this way because I did not want to be at war with the same guys who owned Rambo in the first place, Lee tells TorrentFreak.

With permission to freely share his book, the unofficial Rambo-prequel was finally released. While Lee no longer had to turn to piracy, he was still committed to using torrent sites to get exposure and escape obscurity.

That worked to a certain degree. The book was picked up here and there, but without a major publisher, it was hard to be taken seriously by literary critics.

T...

19:00

Retrotechtacular: Car Navigation Like Its 1971 "IndyWatch Feed Tech"

Anyone old enough to have driven before the GPS era probably wonders, as we do, how anyone ever found anything. Navigation back then meant outdated paper maps, long detours because of missed turns, and the far too frequent stops at dingy gas stations for the humiliation of asking for directions. It took forever sometimes, and though we got where we were going, it always seemed like there had to be a better way.

Indeed there was, but instead of waiting for the future and a constellation of satellites to guide the way, some clever folks in the early 1970s had a go at dead reckoning systems for car navigation. The video below shows one, called Cassette Navigation, in action. It consisted of a controller mounted under the dash and a modified cassette player. Special tapes, with spoken turn-by-turn instructions recorded for a specific route, were used. Each step was separated from the next by a tone, the length of which encoded the distance the car would cover before the next step needed to be played. The controller was hooked to the speedometer cable, and when the distance traveled corresponded to the tone length, the next instruction was played. Theres a long list of problems with this method, not least of which is no choice in road tunes while using it, but given the limitations at the time, it was pretty ingenious.

Dead reckoning is better than nothing, but its a far cry from GPS navigation. If youre still baffled by how that cloud of satellites points you to the nearest Waffle House at 3:00 AM, check out our GPS primer for the details.

Thanks for the tip, [Chaffel]

[via Jalopnik]

17:59

Harvard Rewinds the Biological Clock of Time "IndyWatch Feed Tech"

Investigators at Harvard Medical School have identified the key cellular mechanisms behind vascular aging and its effects on muscle health, and they have successfully reversed the process in animals.

The scientists used a chemical compound thats an NAD+ booster called NMN which plays a critical role in repairing cellular DNA as well as maintaining cell vitality to test what would happen.

Could reversing the aging of blood vessels hold the key to restoring youthful vitality? If the old adage you are as old as your arteries reigns true then the answer is yes, at least in mice.

According to a new study by Harvard Medical School researchers, they have identified the cellular mechanisms that cause the aging of vascular arteries as well as the effects of such aging on the health of muscles. The Medical team was also able to successfully reverse this aging process.

What these findings seem to indicate is that theres a glitch in the normal crosswalk between both muscles and blood vessels and keeping both tissues healthy. The scientists were also able reverse the demise of blood vessels and muscle atrophy in the aging mice by using the synthetic precursors of two molecules naturally present in the body. This boosted their exercise endurance in the process.

The Medical team is excited because such a breakthrough will now pave the way to identifying new therapies for humans.

Study senior investigator David Sinclair, professor in the Department of Genetics at Harvard Medical School and co-director of the Paul F. Glenn Center for the Biology of Aging at Harvard Medical School stated weve discovered a way to reverse vascular aging by boosting the presence of naturally occurring molecules in the body that augment the physiological response to exercise.

Because there are some very important differences in biology between humans and mice theres a possibility that this treatment may not have the same effect in humans. Nonetheless, the research team plans to follow through with human clinical trials because the results of this experiment were important enough to prompt the research team in doing so.

Sinclair, wh...

17:34

Dust Clouds Can Explain Puzzling Features of Active Galactic Nuclei "IndyWatch Feed Tech"

Submitted via IRC for BoyceMagooglyMonkey

[...] A new analysis by researchers at UC Santa Cruz, published June 14 in Monthly Notices of the Royal Astronomical Society, explains these and other puzzling features of active galactic nuclei as the result of small clouds of dust that can partially obscure the innermost regions of AGNs.

[...] The findings have important implications because researchers use the optical emissions from the broad-line region to make inferences about the behavior of the gases in the inner regions around a supermassive black hole.

[...] "Once the dust crosses a certain threshold it is subjected to the strong radiation from the accretion disk," said Harrington. "This radiation is so intense that it blows the dust away from the disk, resulting in a clumpy outflow of dust clouds starting at the outer edge of the broad-line region."

The effect of the dust clouds on the light emitted is to make the light coming from behind them look fainter and redder, just as Earth's atmosphere makes the sun look fainter and redder at sunset. In their paper, Gaskell and Harrington present several lines of observational evidence supporting the existence of such dust clouds in the inner regions of active galactic nuclei. They developed a computer code to model the effects of dust clouds on observations of the broad-line region.

Source: https://www.sciencedaily.com/releases/2018/06/180614213615.htm


Original Submission

Read more of this story at SoylentNews.

17:32

DSLWP-B first JT4G test "IndyWatch Feed Tech"

Yesterday, between 9:00 and 11:00, DSLWP-B made its first JT4G 70cm transmissions from lunar orbit. Several stations such as Cees Bassa and the rest of the PI9CAM team at Dwingeloo, the Netherlands, Fer IW1DTU in Italy, Tetsu JA0CAW and Yasuo JA5BLZ in Japan, Mike DK3WN in Germany, Jiang Lei BG6LQV in China, Dave G4RGK in the UK, and others exchanged reception reports on Twitter. Some of them have also shared their recordings of the signals.

Last week I presented a JT4G detection algorithm intended to detect very weak signals from DSLWP-B, down to -25dB SNR in 2500Hz. I have now processed the recordings of yesterdays transmissions with this algorithm and here I look at the results. I have also made a Python script with the algorithm so that people can process their recordings easily. Instructions are included in this post.

The JT4G transmissions are made just after the end of each GMSK telemetry packet, as illustrated by the following figure made by Cees Bassa using the signals he received at Dwingeloo. Also note that the JT4G signal starts at an UTC minute, as it is common with WSJT-X modes. The frequency of the lowest JT4G tone seems to be 1kHz higher than the GMSK carrier.

GMSK and JT4G signals from DSLWP-B recorded by Cees Bassa at PI9CAM

As far as I know, the following stations have shared recordings of the JT4G signals:...

17:26

17jun2018 "IndyWatch Feed Tech"

17:24

The Affairs of the USPTO Have Turned Into Somewhat of a Battle Against the Courts, Which Are Simply Applying the Law to Invalidate US Patents "IndyWatch Feed Tech"

Poor assessment of patent applications can now be stopped or compensated for by the Patent Trial and Appeal Board (PTAB) and, failing that, the Court of Appeals for the Federal Circuit (CAFC)

A death squad
A death squad is what patent maximalists nowadays call a court (where the only casualty is a piece of paper, or a low-quality patent which US law renders invalid)

Summary: The struggle between law, public interest, and the Cult of Patents (which only ever celebrates more patents and lawsuits) as observed in the midst of recent events in the United States

THE ideology of patent maximalism is a toxic one and it is infectious only within circles that sell, trade, and exploit patents for litigation, not innovation. Its all about financial motivations and those motivated to spread patent maximalism typically profit from mass litigation. Its their most expensive product or service as it can last several years (appeals, discovery, so-called damages with a cut for respective law firms).

They dont seem to care about facts, only mythology and beliefs.Earlier this year we started habitually referring to patent maximalism (of the patent microcosm) as Cult of Patents because it has become almost like a religion to these people. They dont seem to care about facts, only mythology and beliefs.

A reader suggested this chart as we approach U.S. Patent No. 10,000,000, Patently-O wrote on Friday. As we said before, its a pretty meaningless milestone from this Cult of Patents (the patent maximalists). Half a decade or so after Alice and nearly a decade after the Bilski case the Office just granted far too many patents far too fast. Look at the rate of expansion of grants; do people invent twice as many things today as they did about a decade ago? Or a hundred times more than a century ago? Or maybe its just patent maximalism taking over, dubbing just about anything an invention and justifying/ permitting a monopoly on it?

Earlier this year we started habitually referring to patent maximalism (of the patent microcosm) as Cult of Patents because it has become almost like a religion to these people. They dont seem to care about f...

16:41

How to turn tutoring from a part-time job into a successful business "IndyWatch Feed Tech"

Tutoring is a fantastic way to earn some cash on the side. Whether youre a full time student doing some tutoring after classes or on weekends, or just trying to help your friendly neighbors get their GEDs, it can be a very satisfying and fulfilling experience.

But is there a way you could turn that part time job into a successful business and start earning serious cash while doing something that you love?

Were here to tell you that there is a way and that its much simpler than you think. You can use your tutoring skills to create something long lasting and meaningful and were here to show you how.

Create a website

Nothing is better at showcasing you and your business than a well made website. SITE123 is a free website builder that allows its users to create beautifully designed, fully responsive websites for free.

Use SITE123 to create a personal website that will make you look more professional and dedicated. Add your biography and your educational background to the About me page, and include testimonials from your former or current students.

Add a booking widget

Youll need a powerful calendar/booking tool to keep track of all of your students and classes, and luckily SITE123 has a few amazing ones to offer.

SITE123 currently offers Zapla, SimplyBookMe and Tockify, some of the best online booking apps available today. It fits seamlessly into your website and simplifies your scheduling and record keeping.

It even sends out confirmation and reminder emails to your students when their appointment is due.

Add a pricing chart

Being transparent with your fees will make you look more professional and trustworthy. Browsing SITE123s App Market, youll come across a few Ninja apps like Pricer Ninja and Charts Ninja. Add them to your website to make your pricing clear and visible. Add a short description of each class you teach and a price per hour per course.

Add videos

Having additional teaching material on your website will help your students learn more about your classes. Create a video and upload it via Huzzaz, a video gallery app you can add to your website. The player fits perfectly into any design and is incredibly fast and responsive.

Conclusion

Having an online base for your tutoring business will help it grow. Your students will have a quick and easy way to book appointments and share your website w...

16:30

12 Common Threat Intelligence Use Cases "IndyWatch Feed Tech"

12 Common Threat Intelligence Use Cases

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!

Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.

Are you using threat intelligence to its full potential?

The term threat intelligence is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner Market Guide for Security Threat Intelligence Products and Services explains the different use cases and how to best leverage threat intelligence in your organization.

You will learn how to:

  • Identify 12 common threat intelligence use cases.
  • Align these use cases to your specific requirements.
  • Implement strategies for getting value from threat intelligence.
  • Evaluate vendors based on your business needs.

Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.


If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

16:22

Patent Marketing Disguised as Patent Advice "IndyWatch Feed Tech"

Sheep and wolf

Summary: The meta-industry which profits from patents and lawsuits claims that its guiding us and pursuing innovation, but in reality its sole goal is enriching itself, even if that means holding science back

WED LIKE to take a moment aside from the usual EPO and USPTO focus. Something ought to be said which was said here many times before but merits extra emphasis.

The problem is, such patent consultants or practitioners or whatever they call themselves are rarely independent and impartial observers.When it comes to patent advisors, their motivation is usually to get more business or returning customers. This means that advice would likely gravitate towards lawsuits, even futile ones that cannot be won. The problem is, such patent consultants or practitioners or whatever they call themselves are rarely independent and impartial observers. Theyre personally involved and theyre immersed in a particular industry that relies on certain activities a subject we shall cover separately in our next post.

Patent attorneys and lawyers are typically in the business of advising on how to manage the mess which they themselves create (or at least perpetuate); we say so with no intention of offending anyone in particular. Its just putting the simple truth out there. Sure, there are some attorneys and lawyers who are honest and with great integrity (some of them send us information and material); some are willing to express the occasional dissent towards patent maximalism at great risk of being framed traitors to their profession. But theyre the exception rather than the norm. They wont be the ones to become abundantly wealthy.

The latter prior art is very important as it helps document the history of science and credit/attribute the correct people for their contribution to the sciences.To give a couple of examples from several hours ago, over at Patent Docs they now market or promote some upcoming webinars (Patent Portfolio Management and...

16:01

FPV-Rover 2.0 Has 3D Printed Treads and Plenty of Zip "IndyWatch Feed Tech"

[Markus_p] has already finished one really successful 3D printed tracked robot build. Now hes finished a second one using standard motors and incorporating what he learned from the first. The results are pretty impressive and you can see a video demo of the beast, below.

Most of the robot is PLA, although there are some parts that use PETG and flex plastic. There is an infrared-capable camera up front and another regular camera on the rear. All the electronics are pretty much off the shelf modules like an FPV transmitter and an electronic controller for the motors. Theres a servo to tilt the camera, as you can see in the second video.

The body fits together using nuts and magnets. The robot in the video takes a good beating and doesnt seem to fall apart so it must be sufficient. What appealed to us was the size of the thing. It looks like it would be trivially easy to mount some processing power inside or on top of the rover and it could make a great motion base for a more sophisticated robot.

Weve seen some similar projects, of course. This tracked robot uses mind control. And OpenWheel is a great place to get treads and other locomotion designs.

Looking for a tracked rover you can drive around on the desktop? [Markus_p] has one of those too!

15:47

Two Critical flaws affect Schneider Electric U.motion Builder. Patch them now! "IndyWatch Feed Tech"

15:13

Short Gamma-Ray Bursts Do Follow Binary Neutron Star Mergers "IndyWatch Feed Tech"

Researchers at Oregon State University have confirmed that last fall's union of two neutron stars did in fact cause a short gamma-ray burst. The findings, published today [14 June] in Physical Review Letters, represent a key step forward in astrophysicists' understanding of the relationship between binary neutron star mergers, gravitational waves and short gamma-ray bursts.

Commonly abbreviated as GRBs, gamma-ray bursts are narrow beams of electromagnetic waves of the shortest wavelengths in the electromagnetic spectrum. GRBs are the universe's most powerful electromagnetic events, occurring billions of light years from Earth and able to release as much energy in a few seconds as the sun will in its lifetime. GRBs fall into two categories, long duration and short duration. Long GRBs are associated with the death of a massive star as its core becomes a black hole and can last from a couple of seconds to several minutes.

Short GRBs had been suspected to originate from the merger of two neutron stars, which also results in a new black hole -- a place where the pull of gravity from super-dense matter is so strong that not even light can escape. Up to 2 seconds is the time frame of a short GRB.

Read more of this story at SoylentNews.

15:09

Zapcc Caching C++ Compiler Open-Sourced "IndyWatch Feed Tech"

Remember the Zapcc compiler that focused on lightning fast compiler times? It's now been open-sourced...

15:02

How Human Hibernation Will Soon Get Us to Mars "IndyWatch Feed Tech"

Itll be like that movie Passengers, but less creepy. #til

14:53

Features That Didn't Make It For The Mainline Linux 4.18 Kernel "IndyWatch Feed Tech"

There are many changes and new features for Linux 4.18 with the merge window having just closed on this next kernel version, but still there are some prominent features that have yet to work their way to the mainline tree...

14:49

ClipboardWalletHijacker malware replaces address to steal cryptocurrency "IndyWatch Feed Tech"

By Waqas

The IT security researchers at Qihoo 360 Total Security have discovered

This is a post from HackRead.com Read the original post: ClipboardWalletHijacker malware replaces address to steal cryptocurrency

14:49

All Box, no Boom : The Technics Sitman "IndyWatch Feed Tech"

The Co-Deck was Technics (rushed?) response to the runaway success of the Sony Walkman.

After the Sony Walkman arrived on the scene in 1979 at a price of 33,000 Yen the Technics Co-Deck M1 turned up in 1980 at a price of 29,800 Yen.  Whilst also being a portable cassette player, this was a very different machine in a form-factor that was never to be repeated. A look inside reveals a tell tale mystery button that gives away its simple origins.

FAQs including an update on the operation of the Rewind Auto-play function can be found in the youtube comments.

13:30

Dems seek to seize on data privacy as midterm issue "IndyWatch Feed Tech"

Democrats are looking to seize on growing public worries about data privacy to rally voters in the upcoming midterms.Tech policy typically ranks low on an average voters list of priorities, prompting skepticism that data privacy can move the needle...

13:13

Satori botnet is back again, experts observed a surge in port scan activity associated with it "IndyWatch Feed Tech"

This week, security experts observed a surge in port 8000 scan activity, researchers at  Qihoo 360 Netlab determined that the unusual activity was associated with Satori IoT botnet.

Experts from Qihoo 360 Netlab discovered that the author of the Satori botnet have integrated a the proof-of-concept (PoC) code for the XionMai web server software package after it was published on June 8.

The code recently included in the Satori botnet exploits a buffer overflow vulnerability, tracked as CVE-2018-10088, in XionMai uc-httpd 1.0.0. The exploit could be used by remote attackers to execute arbitrary code by sending a malformed package via ports 80 or 8000.

Two days ago, on 2018-06-14, we noticed that an updated Satori botnet began to perform network wide scan looking for uchttpd 1.0.0 devices. reads the report published by Qihoo 360 Netlab.

Most likely for the vulnerability of XiongMai uchttpd 1.0.0 (CVE-2018-10088). The scanning activities led to a surge in scanning traffic on ports 80 and 8000.

Satori botnet scan-on-port-80

...

13:12

FBI Recovers WhatsApp, Signal Data Stored on Michael Cohen's BlackBerry "IndyWatch Feed Tech"

Submitted via IRC for BoyceMagooglyMonkey

Letter to judge reveals 731 pages of messages, call logs uncovered on one of two phones.

[...] The letter to Judge Kimba Wood stated that "the Government was advised that the FBI's original electronic extraction of data from telephones did not capture content related to encrypted messaging applications, such as WhatsApp and Signal... The FBI has now obtained this material."

In a letter to the presiding judge in the case against Michael Cohen, President Donald Trump's long-time personal attorney, the US Attorney's Office for the Southern District of New York revealed today that it had obtained additional evidence for reviewincluding a trove of messages and call logs from WhatsApp and Signal on one of two BlackBerry phones belonging to Cohen. The messages and call logs together constitute 731 pages of potential evidence. The FBI also recovered 16 pages of documents that had been shredded, but it has not yet been able to complete the extraction of data from the second phone.

This change is likely because of the way the messages are stored by the applications, not because the FBI had to break any sort of encryption on them. WhatsApp and Signal store their messages in encrypted databases on the device, so an initial dump of the phone would have only provided a cryptographic blob. The key is required to decrypt the contents of such a database, and there are tools readily available to access the WhatsApp database on a PC.

Source: https://arstechnica.com/information-technology/2018/06/fbi-recovered-hundreds-of-encrypted-messages-from-michael-cohens-phone/


Original Submission

Read more of this story at SoylentNews.

13:01

Cheap Front Panels with Dibond Aluminium "IndyWatch Feed Tech"

The production capability available to the individual hacker today is really quite incredible. Even a low-end laser engraver can etch your PCBs, and it doesnt take a top of the line 3D printer to knock out a nice looking enclosure. With the wide availability of these (relatively) cheap machines, the home builder can churn out a very impressive one-off device on a fairly meager budget. Even low volume production isnt entirely out of the question. But theres still one element to a professional looking device that remains frustratingly difficult: a good looking front panel.

Now if your laser is strong enough to engrave (and ideally cut) aluminum sheets, then youve largely solved this problem. But for those of us who are plodding along with a cheap imported diode laser, getting text and images onto a piece of metal can be rather tricky. On Hackaday.io, [oaox] has demonstrated a cost effective way to create metal front panels for your devices using a print service that offers Dibond aluminum. Consisting of two thin layers of aluminum with a solid polyethylene core, this composite material was designed specifically for signage. Through various online services, you can have whatever you wish printed on a sheet of pre-cut Dibond without spending...

12:36

A Complete Look At Spectre V1/V2/V4 & Meltdown "IndyWatch Feed Tech"

Canonical's Engineering Tech Lead, Gavin Guo, has passed along a big slide deck on a presentation he is preparing about the Spectre and Meltdown CPU vulnerabilities...

12:29

Fun with DBM-type databases... "IndyWatch Feed Tech"

Posted by Lionel Debroux on Jun 17

Hi,

TL;DR
=====
Many crashes upon offline data corruption in multiple database systems.
Only two of these DB systems patched after 4+ months. Much work needed
to backport fixes and move away from insecure & unmaintained DB systems.

Summary
=======
In January, February and May 2018, I spent some of my free time fuzzing
a set of DBs more or less loosely from the DBM family, which are
packaged by Debian: LMDB, GDBM, freecdb, QDBM,...

11:54

Local User Tails Linux IP Leak "IndyWatch Feed Tech"

A compromised local user can leak your IP by using a script to start unsafe-browser hidden in the background and use X11 trickery to leak your real IP without privilege escalation. Most applications exploited on Tails would be capable of this.

deleting /etc/sudoers.d/zzz_unsafe-browser after booting will fix this issue until Tails fixes it themselves

Bug #15635

Feature #7072: Research potential for deanonymization by a compromised "amnesia" user

The Unsafe Browser allows to retrieve the public IP address by a compromised amnesia user with no user interaction


Original Submission

Read more of this story at SoylentNews.

11:42

Foxconn looks to AI after maker of Apple and Amazon products celebrates 30 years in China "IndyWatch Feed Tech"

That growth in factory worker salaries has been a double-edged sword for China. On one hand, it has increased the purchasing power of Chinese which in turn has powered consumer-led economic growth, but on the other it has made China less competitive on wages and forced companies like Foxconn to introduce more automation.


With 1 million employees and half a dozen factories contributing 4 per cent of the countrys export value, Foxconns expansion symbolises Chinas role as tech manufacturing powerhouse.

11:40

Sceper Set to Return After Attempted Sale Turned Into a Scam "IndyWatch Feed Tech"

Earlier this year, TorrentFreak received a steady stream of emails from users of Sceper.ws, one of the most popular release blog sites.

After about eight years of serving up links to large volumes of mainstream content, the site had apparently disappeared. There was no warning or indication of what may have transpired, but several weeks ago a message appeared on its homepage, indicating the platform was up for sale.

Intrigued as to why its operators had decided to throw in the towel, TF made contact seeking information. This week we received a response from part owner and long-standing editor Error but it wasnt what we were expecting.

The problems started when we stopped paying attention to our website due to real-life issues, Error explained.

Once we forgot to renew our domain which caused a few days of down time and more recently we switched to a new server and the payment renewal was not automated, so it expired. In the end, I decided it would be better to sell the site to a person who can actually take care of it and run it as we used to years back.

Error says that after putting the site up for sale they had a lot of responses from people with bids, but one individual stood out as a reasonable person with a decent offer.

In the world of warez, however, not many things are straightforward. Few people want to make their identities known and meeting people face to face is mostly out of the question. Error says he asked the prospective buyer to nominate an intermediary, such as a trusted and well-known person within the warez scene. The offer was declined.

[The buyer] said that he didnt trust anyone and was fine sending the money in two payments, half before he received the database and half after he was satisfied that he can work with the old database. Then the domain transfer could happen, Error explains.

The buyer identified himself as a former editor of a Sceper rival which had shut down under legal pressure back in 2012.

Additional proof came in the form of a panel screenshot which showed the buyer had access to a current scene release blog and other related domains. An email address used in correspondence with Error also belonged to the same blog, confirming the buyers identity.

Error says he hadnt heard of the release blog until that moment, bu...

11:27

Microsoft is Still Cybermobbing Its Competition Using Patent Trolls Such as Finjan "IndyWatch Feed Tech"

Protection offered only to those who pay Microsoft for Azure IP Advantage [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13,...

11:17

ClipboardWalletHijacker miner hijacks your Ether and Bitcoin transaction, over 300,000 computers have been infected "IndyWatch Feed Tech"

Researchers uncovered a new malware campaign spreading a clipboard hijacker dubbed ClipboardWalletHijacker that has already infected over 300,000 computers.

Security researchers from Qihoo 360 Total Security have spotted a new malware campaign spreading a clipboard hijacker, tracked as ClipboardWalletHijacker, that has already infected over 300,000 computers. Most of the victims are located in Asia, mainly China.

Recently, 360 Security Center discovered a new type of actively spreading CryptoMiner, ClipboardWalletHijacker. The Trojan monitors clipboard activity to detect if it contains the account address of Bitcoin and Ethereum. reads the analysis published by the company.

It tampers with the receiving address to its own address to redirect the cryptocurrency to its own wallet. This kind of Trojans has been detected on more than 300 thousand computers within a week.

Modus operandi for ClipboardWalletHijacker is not a novelty, the malware is able to monitor the Windows clipboard looking for Bitcoin and Ethereum addresses and replace them with the address managed by the malwares authors.

In March 2018, researchers at Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and alter clipboards to steal cryptocurrencies and payments.

In a similar way, ClipboardWalletHijacker aims at hijacking BTC and ETH transactions.

Experts observed the malware using the following addresses when replacing legitimate ones detected in users clipboards:

  • BTC: 1FoSfmjZJFqFSsD2cGXuccM9QMMa28Wrn1
  • BTC: 19gdjoWaE8i9XPbWoDbixev99MvvXUSNZL
  • ETH: 0x004D3416DA40338fAf9E772388A93fAF5059bFd5
below the function the replace the legitimate Ethereum wallet address with the attackers one:

10:01

Frozen Rat Kidney Shipping Container "IndyWatch Feed Tech"

The biggest allure of 3D printing, to us at least, is the ability to make hyper-personalized objects that would otherwise fall through the cracks of our mass-market economy. Take, for instance, the Frozen Rat Kidney Shipping Container, or maybe some of the less bizarro applications in the US National Institute of Healths 3D Print Exchange.

The Exchange is dominated, at least in terms of sheer numbers, by 3D models of proteins and other biochemical structures. But there are two sections that will appeal to the hacker in you: prosthetics and lab equipment. Indeed, we were sent there after finding a nice model of a tray-agitator that we wanted to use for PCB etching. We havent printed one yet, but check out this flexible micropositioner.

While its nowhere near as comprehensive a resource as some other 3D printing model sites, the focus on 3D printing for science labs should really help those who have that particular itch to find exactly the right scratcher. Or a tailor-made flexible container for slicing frozen rat kidneys. Whatever youre into. We dont judge.

Man with skull image: [jaqtikkun]

09:48

Genode-Based Sculpt OS Now Available With Easy-To-Use Disk Image "IndyWatch Feed Tech"

Sculpt OS is striving to become a general purpose operating system built off the Genode OS framework. The second release of Sculpt OS is now available and it's much easier now to try out...

09:47

SpinLaunch Gets $40 Million in Funding to Catapult Payloads Into Space "IndyWatch Feed Tech"

Startup SpinLaunch Inc. has received $40 million in funding. The company intends to use a centrifuge to catapult small payloads to the edge of space:

The company remains tight-lipped about exactly how this contraption will work, although its name gives away the basic idea. Rather than using propellants like kerosene and liquid oxygen to ignite a fire under a rocket, SpinLaunch plans to get a rocket spinning in a circle at up to 5,000 miles per hour and then let it gomore or less throwing the rocket to the edge of space, at which point it can light up and deliver objects like satellites into orbit.

[...] Over the past few years, the rocket industry has become quite crowded. Following in the footsteps of Elon Musk's Space Exploration Technologies Corp., dozens of companies have appeared, trying to make small, cheap rockets that can be launched every week or perhaps even every day. These smaller rockets have been built to carry a new breed of shoebox-sized satellitesdubbed smallsatsthat are packed full of imaging, telecommunications and scientific equipment. The small rockets, though, are really just miniaturized versions of the large, traditional rockets that have flown for decades. SpinLaunch is an entirely new take on the rocket-launch concept itself.

[...] SpinLaunch has a working prototype of its launcher, although the company has declined to provide details on exactly how the machine operates or will compare to its final system. The startup plans to begin launching by 2022. It will charge less than $500,000 per launch and be able to send up multiple rockets per day. The world's top rocket companies usually launch about once a month, and most of SpinLaunch's rivals have been aiming for $2 million to $10 million per launch for small rockets. If the startup were able to reach its goals, it would easily be the cheapest and most prolific small launcher on the market.

NextBigFuture puts the velocity at up to 4,800 km/h (3,000 mph) instead.

See also: Spinlaunch is using large centrifuges to accelerate to payloads into space target $500,000 per launch


Original Su...

09:02

The incredible career of NASAs Peggy Whitson, who applied to become an astronaut 10 times before she broke the American record for space travel "IndyWatch Feed Tech"

She retired from NASA on Friday after blazing a trail for countless female astronauts.


NASA astronaut Peggy Whitson, the 58-year-old from Iowa farm country who spent a record-breaking 665 days in space, retired from the space agency on Friday.

I have hit my radiation limit, Whitson told Business Insider during a recent interview. So not going into space with NASA anymore.

That realization is both melancholic and exciting for the biochemist, who only half-jokingly admits shes still not sure what shes going to do when I grow up.

08:42

A Black Hole Ate A Star And Left Crumbs Of Light For Astronomers To Discover "IndyWatch Feed Tech"

Black holes are notoriously messy eaters.


Using more than ten years of data, astronomers discovered traces of an unlucky star that got too close to a black hole. Because this event was partly hidden from us by dust, this discovery shows how we might find other cases of star-eating black holes.

08:42

Probiotics may help boost mood and cognitive function "IndyWatch Feed Tech"

Probiotics can do more than improve your gut health. They also may indirectly enhance your brain, too.

Research shows that the gut and brain are connected, a partnership called the gut-brain axis. The two are linked through biochemical signaling between the nervous system in the digestive tract, called the enteric nervous system, and the central nervous system, which includes the brain. The primary information connection between the brain and gut is the vagus nerve, the longest nerve in the body.

The gut has been called a second brain because it produces many of the same neurotransmitters as the brain does, like serotonin, dopamine, and gamma-aminobutyric acid, all of which play a key role in regulating mood. In fact, it is estimated that 90% of serotonin is made in the digestive tract.

07:43

US Painkiller Restriction Linked to 'Significant' Increase in Illicit Online Drug Trading "IndyWatch Feed Tech"

The US Drug Enforcement Administration's decision to restrict prescription drugs containing hydrocodone (a popular opioid painkiller) was associated with a 'significant' increase in illicit trading of opioids through online markets, finds a study published by The BMJ today.

In this study, the term opioids refers to drugs that are usually available by prescription but here are sourced illegally through the dark net and are not prescribed by anyone.

The findings show that the proportion of sales of opioids through illicit markets doubled over the study period and sales of more potent opioids also increased. Overdose death rates have quadrupled in the US since 1999, and 40% of all deaths involve prescription opioids, which are primarily used for pain relief.

Read more of this story at SoylentNews.

07:07

Howard Roark, John Galt, and The Transhumanist Wager "IndyWatch Feed Tech"

Heres a full chapter out exploring my novel The Transhumanist Wager as part of a new book out called Ayn Rand and the Posthuman: http://link-springer-com-443.webvpn.jxutcm.edu.cn//9783-3 #transhumanism


In his novel The Transhumanist Wager, Zoltan Istvan recreates certain elements of Ayn Rands work, in order to advance an argument for transhumanism. Istvan sees the transhuman

07:00

DIY Coil Winding Machine Counts The Hacky Way "IndyWatch Feed Tech"

Wait, was that 423 or 424? When youre stuck winding a transformer or coil that has more than a few hundred turns, youre going to want to spend some time on a winding jig. This video, embedded below, displays a simple but sufficient machine with a few twists.

The first elaboration is the addition of a shuttle that moves back and forth in sync with the main spindle to lay the windings down nice and smooth. Here, its tremendously simple a piece of threaded rod and a set of interchangeable wheels that are driven by a big o-ring belt. We love the low-tech solution of simply adding a twist into the belt to swap directions. We would have way overthought the mechanism.

But then the hack is the digital counter made out of an old calculator. Weve seen this before, of course, but heres a great real-world application.

Thanks [Jnis] for the tip!

...

06:58

Xfdesktop 4.13.2 Released As Another Step Towards Xfce 4.14 "IndyWatch Feed Tech"

As another step towards the long-awaited Xfce 4.14 desktop environment release, Xfdesktop 4.13.2 is now available as the latest development release for this important piece of the Xfce desktop stack...

Friday, 15 June

21:40

Get the latest in libre from the FSF Bulletin "IndyWatch Feed Tech"

The biannual Free Software Foundation (FSF) Bulletin is now available online. We hope you find it enlightening and entertaining!

Your activism drives the free software movement. Together, we have been proactively building a future where computer users are in control, while also reacting to immediate threats to our digital freedoms. Our associate membership program provides crucial, ongoing support that ensures the FSF's financial stability, making our work possible. Will you take the next step and join us as an associate member or make a one-time donation today?

Free software activists count on the FSF to play a role no other organization can: we refuse to compromise our values, we directly support free software development via the GNU Project, and we defend copyleft in the form of the GNU General Public License (GPL). We, in turn, count on you to provide the energy and resources that drive us.

So far this year, your financial support:

  • amplified the voice of free software in public conversations about net neutrality, Facebook privacy abuses, and high profile security compromises;

  • fought Digital Restrictions Management (DRM) by storming the US Digital Millennium Copyright Act exemptions process to not only support every exemption but be the sole organization arguing for abolition of the whole charade;

  • made major improvements to the infrastructure powering hundreds of GNU and other free software projects;

  • funded important technical work to help free JavaScript on the Web;

  • enabled certification of two more products according to the standards of our Respects Your Freedom program, put dozens more in the pipeline, and advanced a plan to scale the program to its full potential; and

  • helped policymakers and companies embrace the GPL -- the state of California and the US Department of Defense have both made strong moves in this area, and we expect more to follow suit.

Our Associate Member program launched in 2002, as a way to provide long-term stability for the FSF's work, and to recognize and thank those who choose to give consistently. Today there are over 4600 Associate Members residing in 82 countries, with dues comprising nearly half of the FSF's funding. This funding allows us to stay independent, serving the free software community, not corporations or governments. Thank you for your conti...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog