|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
The RSA Conference 2018 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor. Featured companies: Qualys, Anomali, Cisco Security, ZScaler, Swimlane, FireMon, Avast, Lookout, Micro Focus.
OneLogin is showcasing enhancements to its Identity-as-a-Service (IDaaS) cloud platform, including the OneLogin Desktop experience, LDAP, and RADIUS capabilities, at RSA Conference 2018, in continued efforts to serve the sophisticated Access Management needs of modern enterprises. As customers digitally transform, OneLogin makes it simpler and safer for organizations to access the apps and data they need anytime, anywhere. OneLogins Unified Access Management Platform (UAM) is purpose-built for hybrid customer environments, allowing companies of any size More
The post Identity-as-a-Service for hybrid customer environments appeared first on Help Net Security.
Accenture has polled 4,600 security decision makers at US$1B+ companies in 15 countries to understand the effectiveness of security efforts and the adequacy of existing investments. The survey has shown that, while the average number of focused cyberattacks per organization has more than doubled this year compared to the previous 12 months (232 vs 106), organizations are demonstrating far more success in detecting and blocking them. They are now preventing 87 percent of all focused More
The post Organizations are becoming more resilient to focused cyber attacks appeared first on Help Net Security.
Its been a strange decade for the financial industry. After enduring one of the most disastrous economic crisis in modern memory, a resurgent stock market and a booming economy have restored many of the most prominent institutions to their former grandeur.
Even so, all is not well in paradise.
The financial industry is humming along, but it continues to be plagued by problems and inefficiencies that require repair. For instance, the financial sector has the highest crime percentage of any industry. Moreover, in an assessment of the financial industry, research and consulting firm, Deloitte, identified several challenges ahead for the financial sector. Their findings include multiple challenges tied to regulations, legacy systems, disruptive models and technologies, new competitors, and restive customer base.
Now, in a season of abundance, its time for the financial industry to give itself a makeover before their indifference leads to a new set of problems that can stifle the industrys growth. Interestingly, the blockchain, a multipurpose new technology best known for powering Bitcoin, offers compelling solutions to many of the financial sectors most pressing problems.
As cryptocurrencies captured mind and market share last year, the blockchains unique capabilities and dynamic potential captivated the imagination of leaders from virtually every industry. However, no other industry is as ready for the blockchains disruptive ethos to promote change and foster innovation. Government officials and financial leaders are leading the charge for blockchains integration into the financial sector.
In their 2018 Joint Economic Report, members of the U.S. Congress lauded the blockchains capabilities. Their report concluded that So far, the technology has proven largely resistant to hackingYet the bl...
What is Computer Vision Syndrome?
With computers and other electronic devices becoming an integral part of our daily lives, many individuals end up watching computer screens, tablet, e-reader, and smartphones for prolonged or extended periods that can put a real strain on ones eyes.
This digital eye strain falls under the heading Computer Vision Syndrome (CVS). CVS has become more common these days as almost 50% to 90% of people work on computer screens for more than 3 to 4 hours a day. Not only working adults but even kids are affected due to use of tablets and computers at school if used for prolonged hours. However, CVS is a temporary condition that is caused due to concentrating on computer screen for too long.
What causes Computer Vision Syndrome?
There are a number of factors that contributes for CVS to develop. This could include lighting in the room, seating position, distance from the screen, glare and reflections on the monitor and surroundings, strain on the muscles of the eye due to work style, poor workstation setup or incorrect use of workstation, decreased blink rate or tear function, uncorrected spectacle power, inappropriate glasses for computer use, angle of the head, job nature and stress. Any one or all of the factors combine to cause an uncomfortable amount of strain on your eyes. Also, when one reaches around 40 years, the ability to concentrate on near and far objects starts going away, which is called as presbyopia by eye doctors.
Symptoms of Computer Vision Syndrome
Regular use of computer can start having effects on your body including eyes, although there is no proof that it causes any long-term damage to the eyes. However, you may have experienced at least one of the common symptoms of CVS which include:
If you experience any of the above problems, it is advisable to look into to avoid further damage to your eyes.
Treatment for Computer Vision Syndrome
A few simple changes can help prevent or reduce the risk of computer eye strain and other common symptoms of CVS:
In the performance-conscious world of high-speed networking, anything that can be done to avoid copying packet data is welcome. The MSG_ZEROCOPY feature added in 4.14 enables zero-copy transmission of data, but does not address the receive side of the equation. It now appears that the 4.18 kernel will include a zero-copy receive mechanism by Eric Dumazet to close that gap, at least for some relatively specialized applications.
LookingGlass Cyber Solutions announced at RSA Conference 2018 the general availability of the LookingGlass IRD-100 (Intelligence Response and Deception) security appliance. This fully programmable, custom stealth hardware is invisible to adversaries view of corporate and government networks. Designed to run in-line with low latency, the appliance creates a new point of control by using real-time traffic analysis. Performing these actions invisibly at line speeds across enterprise networks is made possible by the IRD-100s unique Titan More
The post Stealth network traffic analysis appliance automates defense actions appeared first on Help Net Security.
Driving a brushless motor requires a particular sequence. For the best result, you need to close the loop so your circuit can apply the right sequence at the right time. You can figure out the timing using a somewhat complex circuit and monitoring the electrical behavior of the motor coils. Or you can use sensors to detect the motors position. Many motors have the sensors built in and [Electronoobs] shows how to drive one of these motors in a recent video that you can watch below. If you want to know about using the motors coils as sensors, he did a video on that topic, earlier.
The motor in question was pulled from an optical drive and has three hall effect sensors onboard. Having these sensors simplifies the drive electronics considerably.
Normal motors with sensors have conditioned sensor outputs, but since this was a dumpster raid part, the hall-effect sensors needed some circuitry to drive and read them. A simple LM324 comparator and a few resistors took care of that.
The drive circuitry is just a few MOSFETs that form three H-bridge circuits. The trick is how to sequence the coils so that you get the rotation you desire. The video has some very good animations that explain the sequence and the critical timing involved.
If you decide to duplicate the circuit, note that the video has some diodes backward. You can find an updated schematic on the associated web site.
Without a doubt, some of the most quality-sensitive individuals are to be found in pirate communities and they arent scared to make their voices known when release groups fail to come up with the best possible goods.
This week theres been a sustained chorus of disapproval over the quality of pirate video releases sourced from Amazon Prime. The anger is usually directed at piracy groups who fail to capture content in the correct manner but according to a number of observers, the problem is actually at Amazons end.
Discussions on Reddit, for example, report that episodes in a single TV series have been declining in filesize and bitrate, from 1.56 GB in 720p at a 3073 kb/s video bitrate for episode 1, down to 907 MB in 720p at just 1514 kb/s video bitrate for episode 10.
Numerous theories as to why this may be the case are being floated around, including that Amazon is trying to save on bandwidth expenses. While this is a possibility, the company hasnt made any announcements to that end.
Indeed, one legitimate customer reported that hed raised the quality issue with Amazon and theyd said that the problem was probably on his end.
I have Amazon Prime Video and I noticed the quality was always great for their exclusive shows, so I decided to try buying the shows on Amazon instead of iTunes this year. I paid for season pass subscriptions for Legion, Billions and Homeland this year, he wrote.
Just this past weekend, I have noticed a significant drop in details compared to weeks before! So naturally I assumed it was an issue on my end. I started trying different devices, calling support, etc, but nothing really helped.
Billions continued to look like a blurry mess, almost like I was watching a standard definition DVD instead of the crystal clear HD I paid for and have experienced in the past! And when I check the previous episodes, sure enough, they look fantastic again. What the heck??
With Amazon distancing itself from the issues, piracy groups have already begun to dig in the knife. Release group DEFLATE has been particularly critical.
Amazon, in their infinite wisdom, have decided to start fucking with the quality o...
An iOS feature called iTunes Wi-Fi sync, which allows a user to manage their iOS device without physically connecting it to their computer, could be exploited by attackers to gain lasting control over the device and extract sensitive information from it. The vulnerability was discovered by Symantec researchers, disclosed to Apple and now to the RSA Conference 2018 attendees and the wider public. Apple has implemented a mechanism that should prevent easy exploitation of the More
The post How attackers can exploit iTunes Wi-Fi sync to gain lasting control of target devices appeared first on Help Net Security.
Tesla CEO Elon Musk in an interview with CBS This Morning last Wednesday admitted that Tesla depended too heavily on automation to boost Model 3 production.
Musk also tweeted last Friday to reiterate that Tesla used too many robots to produce the Model 3 electric vehicle in Teslas only auto factory. Excessive automation at Tesla was a mistake. To be precise, my mistake. Humans are underrated, he said.
According to Musk, too much of automation led to production hell that went on for months, which in turn led to failure in reaching its production targets. We got complacent about some of the things that we felt were our core technology. We put too much new technology into the Model 3 all at once. This this should have been staged, Musk said.
This eventually has prompted Musk to substitute robots with humans to meet the required electric vehicle production. We had this crazy, complex network of conveyor belts, Musk told CBS News, and it was not working, so we got rid of that whole thing.
In April, Tesla had reported that it was unable to meet its target to produce 2,500 Model 3 cars a week by the end of the first quarter. The company was able to produce only 2,020 Model 3 vehicles in a week at the end of the first quarter.
However, Musk is now hopeful of achieving target of producing about 5,000 units per week by the end of the second quarter. He said: We were able to unlock some of the critical things that were holding us back from reaching 2,000 cars a week. But since then, weve continued to do 2,000 cars a week.
Currently, Musk is sleeping at Teslas Fremont factory and personally overlooking the production of Model 3 cars to ensure that the process of vehicles roll-out is smooth.
The post Tesla CEO Elon Musk replaces robots with humans at Tesla factory appeared first on TechWorm.
Gene therapy is showing promise for treating one of the most common genetic disorders. Results of a study published Wednesday show that 15 of 22 patients with beta-thalassemia who got gene therapy were able to stop or sharply reduce the regular blood transfusions they had needed to alleviate their life-threatening anemia. There were no serious side effects.
[...] The researchers stress, however, that more research is needed to fully evaluate how well the treatment works and how safe it is. Still, the company that's developing the treatment, Bluebird Bio of Cambridge, Mass., plans to seek approval of the treatment in Europe by the end of the year, a spokeswoman said in an email.
An estimated 288,000 people have beta-thalassemia worldwide, which makes the disease one of the most common genetic disorders. It's found most often in Mediterranean countries, the Middle East, Asia, India, and parts of Africa and South America. In the United States, about 10,000 to 15,000 patients have beta-thalassemia.
Also at BBC.
Gene Therapy in Patients with Transfusion-Dependent -Thalassemia (DOI: 10.1056/NEJMoa1705342) (DX)
Read more of this story at SoylentNews.
Clearly, Linux is everywhere. In this article, we not even touched on fun everyday uses such as smart TVs, Roku sticks, Nest thermostats, Kindle e-readers, and all the rest.
And even though weve only listed eight unusual uses, the wide variety of the examples will hopefully give you an appreciation for how widespread the operating system is.
First, keep the great ideas comingwe all want to continue making Linux Journal 2.0 something special, and we need this community to do it.
The founding president of the Aerospace Corp. was the force behind the Navstar global positioning system of satellites Photo: Alfred Eisenstaedt/The LIFE Picture Collection/Getty Images
In 1991, I sat down with Ivan Getting, then age 79 and retired but still serving on the boards of directors of several companies. The U.S. satellite navigation system, now referred to as GPS, then more commonly called Navstar, wasnt complete, but covered most of the world and had proved essential to the U.S. military in the Persian Gulf War. We thought Spectrums readers would want to know more about how Getting came to play such a big role in making Navstar.
I had no idea at the time just how much GPS would come to mean personally, to me and just about everyone. Getting had some good stories to tell, so I was interested, but GPS hadnt changed my lifeat least, not yet.
Getting was the first satellite navigation pioneer to tell me his story, but not the last. The next year I interviewed Charles Trimble, founder of Trimble navigation and one of the first to bet his company on the commercial possibilities of satellite navigation; the full text of that profile is here. (In just that short year, wed stopped calling the technology Navstar, it was now and going forward GPS.)
This year, I met with a third key figure in the history of satellite navigation, Brad Parkinson, who, as an Air Force colonel, took Gettings vision of satellite navigation and ran the program that got that system specd out and launched (literally). Next month, Parkinson will receive the 2018 IEEE Medal of Honor for his work.
This time I knew how much of a difference GPS made to the world and to me, so was more than a little excited. On the way to meet Parkinson, I also thought about what Id perhaps lostonce in a while in that pre-GPS past, wrong turns led to even better destinations than those originally targeted. But the net gain has been a huge, even though my children will never know how to read a Thomas guide or a AAA Triptik.
What follows below is my 1991 article profiling Ivan Getting. It covers the development of Navstar, along with an early project in Gettings career which evolved into the Scudbuster used in the Gulf War, other technical projects, and the origins of the Aerospace Corp.
How to become a Professional Hacker? This is one of the most frequently asked queries we came across on a daily basis. Do you also want to learn real-world hacking techniques but dont know where to start? This week's THN deal is for you. Today THN Deal Store has announced a new Super-Sized Ethical Hacking Bundle that let you get started your career in hacking and penetration testing
As a species, weve done a pretty good job at inventing some useful devices. But as clever as we think we are, given sufficient time, natural selection will beat us at our game at almost every turn. So it makes sense that many of our best inventions are inspired by nature and the myriad ways life finds to get DNA from one generation to the next.
Velcro is one such design cribbed from nature, and the story behind this useful mechanism is a perfect example that a prepared mind, good observation skills, and a heck of a lot of perseverance are what it takes to bring one of Mother Natures designs to market.
If youre going to be inspired by natural mechanisms, it pays to be out in nature. During a hike in the Alps with his dog in 1941, George de Mestral, a Swiss electrical engineer, found his inspiration. He and the animal had picked up a multitude of burrs during their walk, and as George picked them out of the fur and off his clothes, he wondered how they managed to attach themselves so tenaci...
It's a busy day in the software and hardware space today as well as a busy week for Oracle with several big releases this week. The latest is the general availability of the long-awaited MySQL 8.0 update...
Via: Bloomberg: The LAPD uses Palantirs Gotham product for Operation Laser, a program to identify and deter people likely to commit crimes. Information from rap sheets, parole reports, police interviews, and other sources is fed into the system to generate a list of people the department defines as chronic offenders, says Craig Uchida, whose consulting 
A Facebook job posting indicates the company is looking to design its own system-on-a-chip or Application Specific Integrated Circuit (ASIC):
Facebook Inc. is building a team to design its own semiconductors, adding to a trend among technology companies to supply themselves and lower their dependence on chipmakers such as Intel Corp. and Qualcomm Inc., according to job listings and people familiar with the matter.
The social media company is seeking to hire a manager to build an "end-to-end SoC/ASIC, firmware and driver development organization," according to a job listing on its corporate website, indicating the effort is still in its early stages.
The Menlo Park, California-based company would join other technology giants tackling the massive effort to develop chips. In 2010, Apple Inc. started shipping its own chips and now uses them across many of its major product lines. Alphabet Inc.'s Google has developed its own artificial intelligence chip as well.
Read more of this story at SoylentNews.
IBM released an open-source software library meant to help developers and researchers to protect AI systems including Deep Neural Networks (DNNs) against adversarial attacks. DNNs are complex machine learning models that has certain similarity with the interconnected neurons in the human brain.
The Adversarial Robustness Toolbox is a platform-agnostic artificial intelligence (AI) toolbox created by IBM that features attacks, defenses, and benchmarks to protect AI systems.
Current AI methods like recognizing objects in images, annotating videos, converting speech to text, or translating between different languages are based on DNNs. According to IBM, while DNNs are usually very accurate, they are vulnerable to adversarial attacks and can be used to misclassify or incorrectly predict outcomes that could benefit an attacker.
Adversarial attacks pose a real threat to the deployment of AI systems in security critical applications. Virtually undetectable alterations of images, video, speech, and other data have been crafted to confuse AI systems. Such alterations can be crafted even if the attacker doesnt have exact knowledge of the architecture of the DNN or access to its parameters. Even more worrisome, adversarial attacks can be launched in the physical world: instead of manipulating the pixels of a digital image, adversaries could evade face recognition systems by wearing specially designed glasses, or defeat visual recognition systems in autonomous vehicles by sticking patches to traffic signs, IBM wrote in a blog post.
According to the researchers, outside of applications these adversarial attacks can affect the physical world by avoiding facial recognition systems and defeating visual recognition systems such as autonomous cars. IBMs Python-based Adversarial Robustness Toolbox aims to help protect AI systems against these types of threats, which can pose a serious problem to security-critical applications.
The Adversarial Robustness Toolbox is designed to support researchers and developers in creating novel defense techniques, as well as in deploying practical defenses of real-world AI systems. Researchers can use the Adversarial Robustness Toolbox to benchmark novel defenses against the state-of-the-art. For developers, the library provides interfaces which support the composition of comprehensive defense systems using individual methods as building blocks, the researchers wrote.
With the Adversarial Robustness Toolbox, multiple attacks can be launched against an AI system, and security teams can select the most effective defenses as bu...
A Dutch-Texan team found that most Houston-area drowning deaths from Hurricane Harvey occurred outside the zones designated by government as being at higher risk of flooding: the 100- and 500-year floodplains. Harvey, one of the costliest storms in US history, hit southeast Texas on 25 August 2017 causing unprecedented flooding and killing dozens. Researchers at Delft University of Technology in the Netherlands and Rice University in Texas published their results today in the European Geosciences Union journal Natural Hazards and Earth System Sciences.
It was surprising to me that so many fatalities occurred outside the flood zones, says Sebastiaan Jonkman, a professor at Delfts Hydraulic Engineering Department who led the new study.
Drowning caused 80% of Harvey deaths, and the research showed that only 22% of fatalities in Houstons 4,600-square-kilometre district, Harris County, occurred within the 100-year floodplain, a mapped area that is used as the main indicator of flood risk in the US.
The embargo on the Ryzen 5 2600X and Ryzen 7 2700X processors has expired now that these Ryzen+ CPUs are beginning to ship today. We can now talk about the Linux support and the initial performance figures for these upgraded Zen desktop CPUs.
The customer parks the car over a garage-floor charging plate, then comes back in the morning to a full battery Illustration: WiTricity
In the coming months, an unnamed manufacturer will bring an electric car to market that offers wireless charging from WiTricity, Alex Gruzen, the companys chief executive, tells IEEE Spectrum.
Unnamed, yes, but not utterly un-guessable. Among the companies that have demonstrated wireless charging are BMW and Hyundai. And, though there are other wireless charging companies out thereQualcomm, for exampleHyundai has explicitly named WiTricity as the supplier of the system it showed on its new Kona EV last week at the Geneva Motor Show. Other companies known to be working with WiTricity include Honda, Nissan, and Toyota.Photo: WiTricity A Hyundai Kona recharges with WiTricitys wireless system at the 2018 Geneva Auto Show.
Magnetic resonance was developed at MIT in the early 2000s.
It works by establishing a kind of
duet between an oscillating magnetic field in a pizza-box size
charger on the floor and a receiver
mounted under the car.
The charger and receiver are tuned to resonate, which is why little energy goes astray, making transmission as efficient as youd get from a cable.
"Theres often a misconception that somehow plugging in is 100 percent efficient," Gruzen says. "But a plug-in is from just 88 to 94 percent efficient; WiTricity's wireless system runs at 90 to 93 percent.
The resonance also gives you a certain leeway in aligning the car and the charging plate. The vertical clearance can be as little as 10 centimeters (4 inches), for a sports car, and as much as 25 cm, for an SUV. The left-to-right positioning need be only within 10 cm of dead center. The fore-and-aft errorwhich is easier for a driver to controlis 7.5 cm.
Drivers shouldnt take long to get the hang of parking close enough to the charger on the first try. That ease of use is the entire point.
About 70 percent of plug-in customers never bother to plug in, Gruzen says. They dont want to deal with cables. And broad, mainstream consumer behavior does not change, as it might with the 1 percent who are early adopters. I pl...
Today the Ryzen+ "Pinnacle Ridge" processors begin shipping and we can now share with you the initial performance results for the Ryzen 5 2600X and Ryzen 7 2700X processors. One of the most common questions I've received about these improved Zen processors since showing them off last week was inquiries/hopes about the Linux gaming performance, so those numbers are first up today followed by other Linux benchmark results forthcoming.
The KDE community has announced the release today of KDE Applications 18.04 as the first major update to the open-source KDE application set for 2018...
The RSA Conference 2018 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor. Featured companies: LogRhythm, Qualys, Sophos, RSA Conference, Intel, AWS, IBM Security, Wombat Security, A10 Networks.
Cisco has issued a critical patch to fix a serious vulnerability (CVE-2018-0112) in its WebEx software that could be exploited by remote attackers to execute arbitrary code on target machines via weaponized Flash files.
The vulnerability affects both client and server versions of WebEx Business Suite or WebEx Meetings. Cisco urges its users to update their software to fix the problem.
A vulnerability in Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server could allow an authenticated, remote attacker to execute arbitrary code on a targeted system. reads the security advisory published by Cisco.
The vulnerability is due to insufficient input validation by the Cisco WebEx clients. An attacker could exploit this vulnerability by providing meeting attendees with a malicious Flash (.swf) file via the file-sharing capabilities of the client. Exploitation of this vulnerability could allow arbitrary code execution on the system of a targeted user.
The flaw has received a CVSS score of 9.0 and was rated as a critical severity issue by Cisco.
The vulnerability was reported by the ENISA security expert Alexandros Zacharis of ENISA, it is due to insufficient input validation by the Cisco WebEx clients.
Zacharis discovered that an attacker could submit a malicious Flash file (.swf ) to a room full of attendees using the file sharing feature, then trigger the flaw to execute arbitrary code.
Cisco has already released software updates that fix the flaw, it confirmed that is not aware of any attacks exploiting the vulnerability in the wild.
Cisco added that currently there is no workaround to address the problem.
WebEx Business Suite software should be updated to the versions T32.10 and T31.23.2, while WebEx Meetings client software should be updated to T32.10 and Meetings Server should be updated to 2.8 MR2....
Cisco has fixed a critical vulnerability in its WebEx videoconferencing software that could be exploited to compromise meeting attendees systems by simply opening a booby-trapped Flash file shared in a meeting. About the vulnerability (CVE-2018-0112) The flaw is due to insufficient input validation by the Cisco WebEx clients, and affects Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server. (The Cisco WebEx Business Suite (WBS) meeting services and Cisco WebEx Meetings More
The post Cisco plugs critical hole in WebEx, users urged to upgrade ASAP appeared first on Help Net Security.
Common Dreams reports
[April 17] the Food and Drug Administration issued a report[PDF] based on inspections of Rose Acre Farms from March 26-April 11, and a review of facility records from September 2017. On [April 13], Rose Acre Farms announced a recall of 206 million shell eggs after federal investigators found that illnesses in multiple states were linked to a strain of Salmonella that was found at the company's facility in North Carolina. The FDA report shows an "ongoing rodent infestation" at the facility and "insanitary conditions and poor employee practices" that allow for the spread of pathogens. The FDA had also previously found "alarmingly high rodent populations" and salmonella contamination at another facility owned by the company in 2011.
In response, Food & Water Watch Executive Director Wenonah Hauter issued [a statement which included}:
"This most recent Salmonella outbreak resulting in a massive recall is another example of how the ultra-consolidated factory farm system can have major consequences for food safety. That one facility can so quickly supply so many stores with tainted food shows that we need more regulation, not less, of our food supply. And repeated violations over the years show that the company continues to act recklessly where food safety protocols are concerned."
Note that the recall is for "shell eggs".
It appears that processed foods in which eggs from this source have been used are not covered.
Read more of this story at SoylentNews.
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.
Are you using threat intelligence to its full potential?
The term threat intelligence is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner Market Guide for Security Threat Intelligence Products and Services explains the different use cases and how to best leverage threat intelligence in your organization.
You will learn how to:
Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.
If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
A new job opening post on Facebook suggests that the social network is forming a team to build its own hardware chips, joining other tech titans like Google, Apple, and Amazon in becoming more self-reliant. According to the post, Facebook is looking for an expert in ASIC and FPGAtwo custom silicon designs to help it evaluate, develop and drive next-generation technologies within Facebook
Trying to make it sound like patent maximalism is a patriotic duty
Summary: As one might expect, the patent extremists continue their witch-hunt and constant manipulation of USPTO officials, whom they hope to compel to become patent extremists themselves (otherwise those officials are defamed, typically until theyre fired or decide to resign)
THE US Supreme Court, SCOTUS, wont stop PTAB (based on Oil States predictions) and it stands firmly behind Alice. So the patent extremists now lean hard on the USPTO, in particular its new Director, who himself came from the patent microcosm.
We wish to remind readers that patent lawyers make a living out of intimidation; they are bullying, threatening and suing people. Theyre quite often sociopaths, so their attitude towards USPTO officials (or publishers like me whom they SLAPP) is consistent with their occupation. Its just what theyre trained to do; colleagues and classmates of theirs are largely the same.
We wish to remind readers that patent lawyers make a living out of intimidation; they are bullying, threatening and suing people.No Oil States Decision Today from the Supreme Court, one patent maximalist bemoaned a couple of days ago as if theres a chance theyll get their way (abolishing PTAB or its IPRs). Watch this anti-PTAB site doing its marketing. These people are attempting to make a business by dancing on a grave.
A couple of days ago CCIA wrote about yesterdays hearing, in which Director Iancu faced some grilling over the sanity of the patent system. To quote the CCIA (which generally represents technology companies):
Tomorrow, members of the Judiciary Committee will have the opportunity to point out to Director Iancu that predictability, stability, and positivity are in fact already here, in large part due t...
During the early years of cell phones, lifespan was mainly limited by hardware (buttons wearing out, dropping phones, or water damage), software is a primary reason that phones are replaced today. Upgrades are often prompted by dissatisfaction with a slow phone, or manufacturers simply stopping updates to phone software after a few years at best. [Oliver Smith] and the postmarketOS project are working to fix the update problem, and have begun making progress on loading custom software onto cellphone processors and controlling their cellular modems.
Since [Tom Nardi] introduced Hackaday readers to postmarketOS, the team has made progress on compiling a standard bootloader for MediaTek System-on-Chip (SoC) processors. Many Android phones use the MIT-licensed Little Kernel as the base of their bootloader and then apply custom closed-source modifications. [McBitter] has worked to eliminate this closed-source code by porting Little Kernel to the MT6735P used in the Coolpad Modena 2. By understanding the modifications MediaTek used for this particular SoC, the postmarketOS team hopes to use their modified, open-source Little Kernel bootloader with other MediaTek-based devices. While progress has been difficult and attempts at using emulators to probe bootloader memory have failed, [McBitter] was able to decode the DRAM configuration settings by searching for a leaked portion of the configuration strings. Now that he can set up the DRAM, there should be few barriers to running Little Kernel....
Be careful while plugging your iPhone into a friend's laptop for a quick charge or sharing selected files. Researchers at Symantec have issued a security warning for iPhone and iPad users about a new attack, which they named "TrustJacking," that could allow someone you trust to remotely take persistent control of, and extract data from your Apple device. Apple provides an iTunes Wi-Fi sync
Common Dreams reports
Election reform advocates on [April 18] praised a decision by Maine's Supreme Court, upholding the use of ranked-choice voting for the state's upcoming primary elections, saying the ruling demonstrated that the court heeded the demands of Maine voters.
[...]Unlike in traditional voting, in which the candidate with the largest share of votes wins--even if he or she is far from capturing a majority of the support--in ranked choice voting, voters rank each candidate in order of preference. If no candidate has a majority after the first count, the least-popular contender is eliminated, voters' ballots are added to the totals of their second-ranked candidates, and the ballots are recounted. The eliminations and recounts continue until one candidate has a majority.
Supporters of the system say it increases voter turnout and proportional representation.
Maine's June 12 multi-party primary elections, in which voters will choose candidates for governor and congressional districts, will now make history as the first state election to use ranked-choice voting.
Fifty-two percent of Maine voters supported the system in a November 2016 ballot initiative, but lawmakers passed a bill last year delaying its implementation until December 2021 and argued that the state could not use a new voting system without direction from the legislature. The state Senate also threatened to repeal ranked-choice voting altogether if it could not pass a constitutional amendment by then.
More than 77,000 Maine residents signed a petition saying any repeal of the system by the legislature should be voided.
"The Maine legislature has changed or repealed all four of the initiatives passed by Maine voters in 2016", said Kyle Bailey of the Committee for Ranked Choice Voting in a statement on Tuesday. "Today's decision by the Maine Supreme Court confirms that the Maine people are sovereign and have the final say."
The Portland Press Herald, Maine's largest circulation daily newspaper, has extensive background details in their April 17th story:...
Yesterday Feral announced that the long-awaited Linux release of Rise of the Tomb Raider would be coming tomorrow and now they have honored that release. Rise of the Tomb Raider is now natively available for Linux and this port is exclusively relying upon the Vulkan graphics API for rendering. Here are our initial benchmarks of Rise of the Tomb Raider on Linux with Radeon GPUs while making use of the Mesa RADV driver.
In September 2017, news broke that Taringa had suffered a data breach exposing 28 million records. Known as "The Latin American Reddit", Taringa's breach disclosure notice indicated the incident dated back to August that year. The exposed data included usernames, email addresses and weak MD5 hashes of passwords.
After months of development effort, Kubernetes is now fully supported in the stable release of the Docker Enterprise Edition.
Let's talk about some of the internals of git and how it stores
and tracks objects within
If you're unaware of what
.git directory is, it's simply a space
that git uses to store your repositories data, the directory is
created when you run
git init. Information such
as binary objects and plain text files for commits and commit data,
remote server information and information about branch locations
are stored within.
Royalty stacking until free/libre platforms become very expensive
Summary: The FRAND (or SEP) lobby seems to have caused a lot of monopolistic patent lawsuits; this mostly affects Linux-powered platforms such as Android, Tizen and webOS and there are new legal actions from Microsoft-connected patent trolls
EARLIER THIS week we wrote a couple of short articles that alluded to Samsungs small victory over Huawei. For those who dont know, Huawei is a highly government (or regime) connected entity, more so than a corporation as is known in Western democracies. Huawei nowadays uses patents in an effort to embargo the competition, but that hasnt been particularly successful outside China (where government connections help). The Asian giants almost always use Android; this includes Huawei and Samsung, which also has the Linux-based Tizen (LG has the Linux-based webOS). As one site put it yesterday:
Back in January, we updated you on the Huawei vs. Samsung patent infringement lawsuit. The big news was that a Chinese court found in favor of Huawei in that dispute.
The patent infringement had to do with Samsung using Huaweis cellular technology and software patents in various Samsung devices, without paying Huawei the necessary licensing fees. Samsung denied any wrongdoing (as usual), but the court said that Huaweis patents were indeed infringed upon, and Samsung would have to pay a fine and halt Chinese production and sales of the infringing devices.
Docket Navigator also wrote about Huawei Technologies Co., Ltd. et al v Samsung Electronics Co., Ltd. et al, showing that the US patent system/law suddenly becomes friendlier (to engineers, not lawyers) than Chinas. To quote:
The court granted defendant Samsungs motion for an antisuit injunction prohibiting plaintiff Huawei from enforcing injunction orders issued by a Chinese court and found that the Chinese injunction orders would frustrate domestic policies.
Boasting a new Samsung patent that we criticised the other day,...
Credit: Book cover by Mark Kohler
Summary: Some of the latest misleading claims from the patent microcosm, which is only interested in lots and lots of patents (its bread and butter is monopolies after all) irrespective of their merit, quality, and desirability
THE happenings at the USPTO have been particularly noteworthy this past week. Well say a lot about it over the weekend because we prefer to cover EPO scandals as a matter of priority. One aspect we cant quite wait until the weekend to cover is the lobbying and pressure put on Andrei Iancu. Well cover this in the post after our next post. This post will focus on software patents and the next one on litigation.
The patent maximalists are fuming. They have become rather nasty and unpleasant. Some sent me threats by post. Yesterday, for example, Watchtroll (Gene Quinn and Steve Brachmann) reran the China! scaremongering. Increases in Innovation, Patent Boom Leads to Development in China, says Watchtrolls headline. But patents have nothing to do with it, its just typical Watchtrollism; its watching after patent trolls interests by promoting patent maximalism. We already did a lot of articles debunking this China! nonsense. Its growing in influence not owing to patents but in spite of patents. China even permits software patents now; does that make China a software powerhouse? Not by a long shot! Its India, where such patents are banned, which takes the jackpot.
Its growing in influence not owing to patents but in spite of patents. China even permits software patents now; does that make China a software powerhouse? Not by a long shot! Its India, where such patents are banned, which takes the jackpot.In our view, patent maximalism is a flawed mindset and a brain virus; one lawyer typically poisons the minds of others with patent maximalism. It has become like a faith and a religion; theyre unable to see facts and instead saturate their minds with more of their nonsense, typically in exclusionary echo chambers that exclude people not like them. These are supposedly well-educated individuals, but greed outweighs the wits and they know they can make more money with patent maximalism (more litigation, draining money out of practising...
The first round of keynotes for Automotive Linux Summit & Open Source Summit Japan have been announced. Join us June 20 22, 2018 in Tokyo to hear from these speakers and more:
One passenger died and several others were injured [April 18] when a Boeing 737 operated by Southwest en route from New York to Dallas suffered a serious engine blowout. Shrapnel broke a passenger window and penetrated the fuselage, forcing an emergency landing in Philadelphia.
[...] Southwest Flight 1380 [...] suffered a serious engine blowout 20 minutes into the flight at 32,500 feet
[...] The left engine exploded with such force that shrapnel penetrated the aircraft's fuselage and broke a window in the passenger cabin, causing depressurization and the deployment of oxygen masks.
The pilots--Capt. Tammie Jo Shults and an unidentified co-pilot--guided the plane carrying 144 passengers and five crew to a smooth landing. According to flight-tracking service FlightAware, the jet landed 20 minutes after the explosion.
Emergency vehicles drenched the damaged left engine in foam to prevent a fire as passengers exited the plane via stairs on the right side.
The woman who died was identified by Albuquerque TV news station KOAT as Jennifer Riordan, 43, a mother of two children and vice president of community relations at Wells Fargo in Albuquerque, New Mexico.
In preliminary briefings, National Transportation Safety Board (NTSB) Chairman Robert Sumwalt said that inspection of the damaged engine revealed that one of the titanium blades on the big fan had broken off at the root, and that there was evidence of metal fatigue at the site where it broke.
He said metal fatigue is a major problem.
[...] Southwest CEO [Gary Kelly] said the airplane had undergone a routine maintenance inspection two days earlier, on April 15.
Read more of this story at SoylentNews.
Croteam today released a trailer for their upcoming game Serious Sam 4: Planet Badass...
Can you do math on the Linux command line? You sure can! In fact, there are quite a few commands that can make the process easy and some you might even find interesting. Let's look at some very useful commands and syntax for command line math.
First and probably the most obvious and commonly used command for performing mathematical calculations on the command line is the expr (expression) command. It can manage addition, subtraction, division, and multiplication. It can also be used to compare numbers. Here are some examples:
AMD's Huang Rui has posted a set of 20 patches providing "GFXOFF" support for the AMDGPU Direct Rendering Manager Linux kernel driver...
The old maxim is that if you pay peanuts, you get a monkey. Thats no longer true, though: devices like the Raspberry Pi W have shown that a $10 device can be remarkably powerful if it is well designed. You might not appreciate how clever this design is sometimes, but this great analysis of the antenna of the Pi W by [Carl Turner, Senior RF Engineer at Laird Technology] might help remind you.
[Carl] used some fancy toys in his analysis, such as the awesome-looking antenna test chamber that his employer uses to test designs. He used this to measure two very interesting things; the radiation pattern of the antenna, and the efficiency. Simply put, the efficiency is a measure of how much of the energy you push into an antenna is emitted as RF radiation. There is always a little loss, but he found that the Pi W antenna has decent efficiency, with -3.5 dB losses at WiFi frequencies. Thats nowhere near as good as the stand-up antennas on your wireless router, but remember that the WiFi antenna on the Pi W is tiny compared to them: it is a small spot on the PCB made by removing several layers of copper, creating what engineers call a resonant chamber. That makes it a remarkable bit of engineering, keeping the cost down and using the copper layers that are already on the board to create the antenna rather than adding a new component.
The radiation pattern of the Pi W is also interesting. Because the antenna is located right on th...
Chances are that youve never heard of Washington-based data firm LocalBlox. But that doesnt mean that they havent heard of you. And it doesnt mean that your personal information hasnt been recklessly exposed through their sloppy disregard for the most basic security.
Read more in my article on the Hot for Security blog.
The EPO sent Fieldfisher, which seeks to profit from the UPC, to bully us several times
SLAPP action: In their own words
Summary: The lack of curiosity and genuine journalism in Europe may mean that serious abuses (if not corruption) will go unreported
THE EPO scandals will hopefully be covered here as often as they used to be. Weve slowed down a bit in recent months even though theres no lack of material to cover. Whats disheartening, however, is seeing how the media no longer writes about EPO scandals. Almost never!
Whats disheartening, however, is
seeing how the media no longer writes about EPO
Yesterday we found nothing but this press release about a patent grant, the EPO was mentioned in this sponsored report about Asia, and there was another one about Brexit. UK patent protection will continue to be available through the EPO regardless of how Brexit proceeds, it says, but nobody ever doubted that (thats just a talking point of Team UPC in the UK). From the press release:
Provectus Biopharmaceuticals, Inc. (OTCQB: PVCT, www.provectusbio.com) (Provectus or the Company), a clinical-stage biotechnology company developing PV-10 as the first small molecule oncolytic immunotherapy for solid tumor cancers, today announced that the Japan Patent Office (JPO) had granted and the European Patent Office (EPO) had allowed the Companys patent a...
It's time to update your Drupal websites, once again. For the second time within a month, Drupal has been found vulnerable to another critical vulnerability that could allow remote attackers to pull off advanced attacks including cookie theft, keylogging, phishing and identity theft. Discovered by the Drupal security team, the open source content management framework is vulnerable to
Another blackout hit Puerto Rico Wednesday morning [April 18], the Associated Press reported, cutting off electricity across the whole island and once again undermining the fragile progress made in restoring power in the [seven] months since Hurricane Maria struck.
The Puerto Rico Electric Power Authority said that it could be 24 to 36 hours before power is restored to the areas that had it. Its priorities are to get electricity back to hospitals, the San Juan Airport, water systems, and financial centers
The outage was caused by a bulldozer hitting a power line while trying to remove a collapsed transmission tower, according to El Nuevo Dia. The company responsible was D. Grimm, a subcontractor for Cobra Energy, which received a $200 million contract to repair Puerto Rico's devastated power grid.
Cobra was selected alongside Whitefish Energy Services in the aftermath of the hurricane, but the deals drew scrutiny from Congress because the companies had limited experience in grid repair on such a large scale.
[...] more than 61,000 utility customers[PDF] haven't had electricity since last September, the US Department of Energy reported earlier this month. Since "customer" typically refers to a household, which can encompass several people, estimates indicate that more than 100,000 people haven't had power since the storm.
[...] The blackout is the largest in US history and is now the second-largest in the world. Only Typhoon Haiyan, one of the largest tropical storms ever to make landfall and the deadliest storm ever to hit the Philippines, had a bigger impact on electricity service.
 En Espaol
 As measured in millions of customer hours of lost electricity service.
You may speculate from the day that days were created, but you may not speculate on what was before that.Talmud, Tractate Hagigah 11b, 450 A.D.
To go back to the beginning, if there was a beginning, means testing the dominant theory of cosmogenesis, the model known as inflation. Inflation, first proposed in the early 1980s, was a bandage applied to treat the seemingly grave wounds cosmologists had found in the Big Bang model as originally conceived. To call inflation bold is an understatement; it implied that our universe began by expanding at the incomprehensible speed of light ... or even faster! Luckily, the bandage of inflation was only needed for an astonishingly minuscule fraction of a second. In that most microscopic ash of time, the very die of the cosmos was cast. All that was and ever would be, on a cosmic scale at leastvast assemblies of galaxies, and the geometry of the space between themwas forged.
For more than 30 years, inflation remained frustratingly
unproven. Some said it couldnt be proven. But everyone agreed on
one thing: If cosmologists could detect a unique pattern in the
cosmoss earliest light, light known as the cosmic microwave
background (CMB), a ticket
In the beginning it was known as TMM 41450-3. Then things got more personal.
Yes, life had already taken to the heavens, long ago in the Carboniferous, eons before TMM 41450-3s discovery in the spring of 1971. Some claim it was from gills that wings had originally sprouted, others that they grew from limbs. Some believe wings were a novelty, arising in tiny nubs that bud during development. There is little to go by; the guessing game rules. But whether wings on the Insects came from breathing or walking, in the waters or on land; whether they had or did not have a prior historythey needed to lift but ounces. And this, in comparison to TMM 41450-3, was childs play.
It was only later that the true challenge came, in the line of the Vertebrates. For there was lift and drag and thrust to navigate, and the terrible weight of the bones. Yes, after TMM 41450-3 evolution would yet converge, copying the ingenious solution. But before the birds, before the bats, before the planes, it was the lizards who took to the skies.Wikipedia
Much had transpired since the first fish walked onto land. For
after a time, by
The most arrogant astronomer in Switzerland in the mid-20th century was a solar physicist named Max Waldmeier. Colleagues were so relieved when he retired in 1980 that they nearly retired the initiative he led as director of the Zurich Observatory. Waldmeier was in charge of a practice that dated back to Galileo and remains one of the longest continuous scientific practice in history: counting sunspots.
The Zurich Observatory was the world capital for tallying sunspots: cool dark areas on the suns surface where the circulation of internal heat is dampened by magnetic fields. Since the 19th century, astronomers had correlated sunspots with solar outbursts that could disrupt life on Earth. Today scientists know the spots mark areas in the sun that generate colossal electromagnetic fields that can interfere with everything from the Global Positioning System to electricity grids to the chemical makeup of our atmosphere.
What alienated Waldmeiers potential Swiss successors was his
hostility toward methods other than his own. In the space age, he
insisted on counting sunspots by eye, using a Fraunhofer refracting
telescope, named after its 18th-century inventor, installed by the
first Zurich Observatory director, Rudolf Wolf, in 1849. (With
Waldmeiers legacy uncertain, his assistant walked off
The usage of LLVM as part of the graphics driver stack continues to be picked up now especially in the Vulkan/SPIR-V world...
Of all the major torrent sites that dominated the Internet at the beginning of this decade, only a few remain.
One of the sites that fell prey to ever-increasing pressure from the entertainment industry was isoHunt.
Founded by the Canadian entrepreneur Gary Fung, the site was one of the early pioneers in the world of torrents, paving the way for many others. However, this spotlight also caught the attention of the major movie studios.
After a lengthy legal battle isoHunts founder eventually shut down the site late 2013. This happened after Fung signed a settlement agreement with Hollywood for no less than $110 million, on paper at least.
Launching a new torrent search engine was never really an option, but Fung decided not to let his expertise go to waste. He focused his time and efforts on a new search project instead, which was unveiled to the public this week.
The new app called WonderSwipe has just been added to Apples iOS store. Its a mobile search app that ties into Googles backend, but with a different user interface. While it has nothing to do with file-sharing, we decided to reach out to isoHunts founder to find out more.
Fung tells us that he got the idea for the app because he was frustrated with Googles default search options on the mobile platform.
I find myself barely do any search on the smartphone, most of the time waiting until I get to my desktop. I ask why? Fung tells us.
One of the main issues he identified is the fact that swiping is not an option. Instead, people end up browsing through dozens of mobile browser tabs. So, Fung took Googles infrastructure and search power, making it swipeable.
From a UI design perspective, I find swiping through photos on the first iPhone one of the most extraordinary advances in computing. Its so easy that babies would be doing it before they even learn how to flip open a book!
Bringing that ease of use to the central way of conducting mobile search and research is the initial eureka I had in starting work on WonderSwipe, Fung adds.
That was roughly three years ago, and a few hours ago WonderSwipe finally made its way into the App store. Android users will have to wait for now, but the application will eventually be available on that platform as well.
The Office still controls and sometimes punishes judges
Summary: The Boards of Appeal have released a report and once again they openly complain that theyre unable to do their job properly, i.e. patent quality cannot be assured
THE management of the EPO has, in our humble assessment, destroyed the EPO. Its broken beyond repair. It may never recover. Even leadership has been compromised as its now succession-based, with Battistelli choosing his successor. Not to mention all the toxic people he brought in after he had seized power. Its grotesque, yet thats where we are today. To be most frank, I do not think EPO will ever recover, not even with reporting that exposes the corruption. Itll like abuse is just far too deeply embedded in the Organisation now, not just the Office. Oversight has been obliterated. Assumptions of goodwill (e.g. given huge budget with endless power and minimal oversight) might seem OK in theory. When you put a thug in charge, as happened about a decade ago, it will inevitably go bonkers. Even the media, which is supposed to cover such abuses, is being bribed by the Organisation. Its not a very obvious bribe, but it still is a soft bribe (we covered that subject a decade ago) and it has more or less the same effects. Academia too has been compromised. EPO budget, instead of improving the integrity of the EPO, has helped the EPO poison everything. Judges are being bullied, bloggers like myself habitually receive legal threats, votes are allegedly being bought, and my site (Techrights) has been blocked/banned by the EPO for over 3 years not because of falsehoods but because it helped expose EPO abuses.
Judges are being bullied, bloggers like myself habitually receive legal threats, votes are allegedly being bought, and my site (Techrights) has been blocked/banned by the EPO for over 3 years not because of falsehoods but because it helped expose EPO abuses.Where are so-called news sites about patents? Do they not care? Not even European sites? The systems they rely on (for coverage) are rotting away. Look at IAM! Benot Battistelli is joined by the hip to it. This patent trolls lobby, IAM, has given a keynote talk to him (Palace Hotel in San Francisco) one in which he will promote software patents. Joff Wild...
Ken Westerback (krw@ when wearing his developer hat) writes:
2018 is the third consecutive year that the community has reached Gold status or better.
These monthly paypal commitments by the community are our most reliable source of funds and thus the most useful for financial planning purposes. We are extremely thankful for the continuing support and hope the community matches their 2017 achievement of Platinum status. Or even their 2016 achievement of Iridium status.
Note that Bitcoin contributions have been re-enabled now that our Bitcoin intermediary has re-certified our Canadian paperwork.
Submitted via IRC for TheMightyBuzzard
A flip-flop is one of the most basic digital electronic circuits. It can most easily be built from just two transistors, although they can and have been built out of vacuum tubes, NAND and NOR gates, and Minecraft redstone. Conventional wisdom says you can't build a flip-flop with just one transistor, but here we are. [roelh] has built a flip-flop circuit using only one transistor and some bizarre logic that's been slowly developing over on hackaday.io.
[...] The single-transistor flip-flop works just like any other flip-flop there are set and reset pulses, and a feedback loop to keep the whatever state the output is in alive. The key difference here is the addition of a clock signal. This clock, along with a few capacitors and a pair of diodes, give this single transistor the ability to store a single bit of information, just like any other flip-flop.
That's damned nifty.
Read more of this story at SoylentNews.
Albert Einstein died exactly 63 years ago today.
Albert Einstein wasnt just a brilliant physicist he was also a master at explaining the human condition.
Earlier this month with the Vulkan 1.1.72 specification update was the new VK_EXT_descriptor_indexing extension that is quickly being well received by developers...
[Blake Patterson] is one of these people, and he writes in to tell us about his recent experiments with using a particularly gorgeous example the Epson PX-8 Geneva laptop on modernized BBSs. The form factor of the device makes it a fairly convenient client for chatting, despite the somewhat unusual screen. Luckily, modern BBS software is able to cope with the PX-8s 80 character by 8 line LCD display, its just a matter of getting the thing online.
The trick is tethering the PX-8 to a Linux machine as a serial terminal. [Blake] had to build a serial cable for the laptop, and then used a basic USB-to-serial converter to get it connected to a Raspberry Pi. Once youve logged in over serial, you can simply fire off a telnet command to connect to the BBS of your choice. In the video after the break, he demonstrates what its like browsing and chatting on a BBS using the PX-8. The screen certainly takes a bit of getting used to, but actually works fairly well given the nature of the BBS interface.
[Blake] recently gave us a look at a Wi-Fi modem for retro computers based on the ESP8266, if youd rather cruise your favorite BBS without a dangling Pi.
Intel tonight announced they are open-sourcing their nGraph compiler code, which serves as a framework-neutral deep neural network model compiler...
Biomarkers of ageing based on DNA methylation data enable accurate age estimates for any tissue across the entire life course. Horvath and Raj review the development of these epigenetic clocks and how they link to biological ageing.
At the end of March, the Drupal Security Team confirmed that a highly critical vulnerability (dubbed Drupalgeddon2), tracked as CVE-2018-7600, was affecting Drupal 7 and 8 core and announced the availability of security updates on March 28th.
The vulnerability was discovered by the Drupal developers Jasper Mattsson.
Both Drupal 8.3.x and 8.4.x are no more supported, but due to the severity of the flaw, the Drupal Security Team decided to address it with specific security updates and experts called it Drupalgeddon2.
Drupal development team released the security update in time to address CVE-2018-7600.
After the publication of a working Proof-Of-Concept for Drupalgeddon2 on GitHub for educational or information purposes, experts started observing bad actors attempting to exploit the flaw.
A week after the release of the security update, the experts at security firm Check Point along with Drupal experts at Dofinity analyzed the CMS to analyzed the Drupalgeddon2 vulnerability and published a technical report on the flaw.
After the publication of the report. the expert Vitalii Rudnykh shared a working Proof-Of-Concept for Drupalgeddon2 on GitHub for educational or information purposes.
Immediately after the disclosure of the PoC, security experts started observing bad actors attempting to exploit the flaw.
Over the weekend, several security firms observed threat actors have started exploiting the flaw to install malware on the vulnerable websites, mainly cryptocurrency miners.
The experts at the SANS Internet Storm Center...
Via: WTOP: A woman who drove into the CIA headquarters compound in McLean, Virginia, with a loaded gun, a passport and $100,000 in cash while wearing a wig is being held without bond. Charging documents said Beth Huth drove her white Kia Soul onto CIA property in Langley last Friday afternoon past signs restricting access 
Posted by Slackware Security Team on Apr 18[slackware-security] gd (SSA:2018-108-01)
The World Socialist Web Site reports:
In spite of a continuous chorus in the media of a booming economy creating robust job numbers, General Motors is unleashing a new round of attacks on autoworkers in North America as part of a global cost-cutting offensive against the working class.
The corporation announced on [April 13] it will cut one of two operating shifts at its massive Lordstown, Ohio, assembly plant, cutting as many as 1,500 jobs effective June 15. As recently as 2016, the plant was operating three shifts around the clock with nearly 4,000 workers. By the end of June only 1,500 will remain.
As sales for the compact Chevy Cruze, the only vehicle produced at the facility, began to slip, GM shuttered the third shift in January 2017, axing 800 jobs. Over the course of 2017, the plant was idled for weeks at a time and rumors began to circulate about the impending layoffs.
As an indication of the severity of the cuts, this is the first time since the recession of the 1980s that the plant will operate with only one shift.
[...] The company sold 450,000 fewer vehicles to dealers last year than they did in 2016, but because of aggressive cost-cutting attacks on the workers, imposed by the union, which include everything from an expansion of Temporary Part Time employees at less than half pay, widespread layoffs and shutdowns[,] GM pretax profits for 2017 topped $12.8 billion.
US passenger car sales are on track to decline for the fifth straight year while sales of light trucks are setting records. US sales of compact cars dropped 10 percent in the first quarter and 5.8 percent through 2017.
Lordstown is not the only plant affected by this shift. GM's Detroit-Hamtramck factory, for example, relies heavily on production of small and midsize sedans, including the Buick LaCrosse, Cadillac CT6, Chevrolet Impala, and the Chevrolet Volt. In October, the automaker announced plans to cut about 200 jobs there and halt production beginning November 20 through the Christmas break, affecting 1,500 jobs over the holidays. The second shift was eliminated in March 2017, eliminating 1,300 jobs.
[...] The same conditions are developing in [GM] factories everywhere as GM pursues its cost-cutting strategy with a vengeance.
Narendra Malewar joins our blog team with the post "Finding lost siblings of the Sun". Narendra Malewar joins our blog team with the post "Finding lost siblings of the Sun".
UNSW scientists in collaboration with European scientists demonstrated that the DNA, or spectra, of more than 340,000 stars in the Milky Way could aid them to search the siblings of the Sun, now scattered across the sky.
Scientists actually are working on project GALAH, the survey observations for the ambitious galactic archaeology project- which launched in late 2013 as part of a quest to uncover the formulation and evolution of galaxies. Scientists gathered the data from HERMES spectrograph at the Australian Astronomical Observatorys (AAO) 3.9-metre Anglo-Australian Telescope near Coonabarabran in NSW to collect spectra for the 340,000 stars.
The data shows that how the Universe went from having just hydrogen and helium soon after the Big Bang to being loaded with every one of the components show now on Earth that is fundamental forever.
Y Combinator announces the first wave of support for biotech startups working on aging.
Earlier this year, the Y Combinator (YC) community showed interest in supporting biotechnology focused on healthspan and age-related disease. The YC community is an influential part of the Bay Area technology-focused industry in California. It was great to hear that it was planning to support biotech startups working on aging through its YC Bio program.
The first area were going to focus on is healthspan and age-related diseasewe think theres an enormous opportunity to help people live healthier for longer, and that it could be one of the best ways to address our healthcare crisis.
YC Bio launches in June with lab space for biotech startups
Four baboons briefly escaped an enclosure at a biomedical research center by repositioning a barrel:
The barrels were in the enclosure because they are used as an enrichment tool for the animals, but after Saturday's escape, the barrels have been removed from the enclosure. Three of the baboons were recaptured within 20-30 minutes of escaping. The fourth baboon returned to the enclosure on his own.
KSAT viewers sent pictures and video of a baboon running along the road.
The Texas Biomedical Research Institute has congratulated itself on its response to the incident:
Read more of this story at SoylentNews.
The R820T tuner IC is used in the popular Airspy software defined radio (SDR) as well as many of the inexpensive RTL SDR dongles. [TLeconte] did some experiments on intermediate frequency (IF) configuration of the chip, and youll find his results interesting.
Using 5 million samples per second and the devices real mode, the tests look at a what comes out when the IC reads a noise source. There are two registers that set the IF parameters, but the tests show the effects these registers have in precise terms.
According to the post, there are three things you can set:
Some of the settings dont make sense at least at the 5 MHz sample rate because of aliasing. However, it is instructive to see what each setting does. [TLeconte] uses Octave to visualize the data.
Facebook is moving to exempt 1.5 billion users in Africa, Asia, Australia and Latin America from its terms of service as dictated under a new European Union regulation, according to a Reuters report.The move comes weeks before the E.U.'s...
Jerome Groopman discusses the results of a trial described in the New England Journal of Medicine, in which twenty-two patients with beta thalassemia, a common and devastating blood disorder, were treated with gene therapy.
WASHINGTON (AP) Surgeons pack donated organs on ice while racing them to transplant patients but it may be time for a warmer approach. British researchers said Wednesday that keeping at least some livers at body temperature instead may work better.
The livers keep functioning until theyre transplanted thanks to a machine that pumps them full of blood and nutrients. Its a life-support system for the organs, and similar machines are being explored for lung and heart transplants, too.
The transplant community isnt ditching affordable ice chests for the far pricier approach just yet. But proponents hope that storing organs in a way that mimics the body might eventually increase the number of transplants by keeping precious donations usable for longer periods, and allowing use of some that today get thrown away.
Emmanuel Macron has outlined his vision for the future of the European Union in Strasbourg. The 40-year-old, who secured the French Presidency in May on a pro-EU platform amid a populist surge in the bloc, delivered his highly anticipated speech to over 700 MEPs in the European Parliament on Tuesday.
Macron challenged "inward-looking nationalist selfishness" amid populist sentiment in the bloc and pushed for a more united and reinvigorated Europe. "Nationalism will lead Europe into the abyss. We see authoritarianism rising all around us," he said. "The response should not be authoritarian democracy but the authority of democracy."
Macron also sought to tackle the "poisoned debate" on migration, proposing the creation of a European programme that could subsidise local authorities which host and integrate refugees.
In a speech which touched on a range of issues, Macron recommended that copyright law be tightened to protect artists' "genius" and reiterated his support for tougher environmental legislation.
Meanwhile, Macron wants to "reform" Islam:
Speaking alongside the flag-draped coffin of a police officer killed in a terrorist attack in southern France, President Emmanuel Macron last month lay blame on "underground Islamism" and those who "indoctrinate on our soil and corrupt daily." The attack added further urgency to a project already in the works: Macron has embarked on a controversial quest to change Islam in France with the goal of integration but also preventing radicalization.
He has said that in the coming months he will announce "a blueprint for the whole organization" of Islam. And those trying to anticipate what that will look like are turning their attention to Hakim El Karoui, a leading voice on how Islamic traditions fit within French culture.
It's hard to miss that the man who appears to have Macron's ear on this most sensit...
We all knew this was going to happen eventually. But this is a seriously dangerous time for this kind of technology to come out, given the state of the countrys complete lack of ability to apparently discern truth from blatant self-serving lies. I wonder how many of these it would take to start a war, how many of these it would take to start a revolution.
Barack Obama appears to say, Stay woke, bitches.
A couple of weeks ago we moved to a new house and I had some time on my hands to talk to you guys while painting the ceiling. Moving was very much on the forefront of my mind since I also recently moved my company's Email platform to Office 365. As a cross platform slider with a foot in each major operating system I decided to give you my first impressions of the new platform (and upset the GNU-purists) with my review.
One of the most common Linux hardware questions I've received dozens of times in the past few weeks alone has been over the support for "RX Vega M" Vega-based graphics processors found on select newer Intel Kabylake CPUs. It appears RadeonSI at least should now support these Radeon graphics on Intel CPUs...
Crime forums on Facebook, fraudsters pose as anti-fraud hotlines, and how big advertising companies are in bed with the rampant data collection of internet giants.
All this and more is discussed in the latest edition of the Smashing Security podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest B J Mendelson, author of Social media is bullsh*t.
LocalBlox, a US-based data technology company that crawls, discovers, extracts, indexes, maps and augments data in a variety of formats from the web and from exchange networks and ties it all together to create profiles on individuals that contain personal, business and consumer data for marketing purposes, has been found leaking information on tens of millions of individuals. The discovery was made by UpGuard researcher Chris Vickery, who stumbled upon the unsecured Amazon Web Services More
The post LocalBlox found leaking info on tens of millions of individuals appeared first on Help Net Security.
Overnight Tech: Alleged robocall kingpin testifies before Congress | What lawmakers learned | Push for new robocall rules | Facebook changes privacy settings ahead of new data law | Time Warner CEO defends AT&T merger at trial "IndyWatch Feed Tech"
LAWMAKERS ARE GOING AFTER ROBOCALLS: Lawmakers heard from one of the most prolific alleged robocallers as they weigh new actions to cut down on the fraudulent phone calls.Senators grilled a Florida man who is accused of making 96 million robocalls&...
For sturdy utilitarianism, there were few designs better than the Western Electric Model 500 desk phone. The 500 did one thing and did it well, and remained essentially unchanged from the mid-1940s until Touch Tone phones started appearing in the early 70s. That doesnt mean it cant have a place in the modern phone system, though, as long as youre willing to convert it into a cellphone.
Luckily for [bicapitate], the Model 500 has plenty of room inside the case once the network interface is removed, because the new electronics take up a fair bit of space. Theres no build log per se, but the photo album makes it clear whats going on. An Arduino reads the hook switch and dial pulses, while a Fona GSM module takes care of the cellular side of things. It looks like a small electret mic and a speaker replace the original transmitter and receiver. As a nice touch, the original ringer is used, but instead of trying to drive it electrically, [bicapitate] came up with a simple cam mechanism on a small motor. Driven at the right speed, the cam hooks the clapper arm, rings one bell, then releases it to let the clapper spring back to hit the other bell. Everything is powered by a LiPo, so it could be taken to the local coffee shop for some hipster hijinks.
A promotional push by NVIDIA has apparently tied up PC builders, and raised the ire of its competitor AMD. The current leader in the graphics card market, NVIDIA has apparently developed a GeForce Partner Program (GPP) that it claims exists to "ensure that gamers have full transparency into the GPU platform and software they're being sold, and can confidently select products that carry the NVIDIA GeForce promise."
But according to AMD, that vague explanation hides an attempt to elbow competition out of high-profile system lines. A recent report by HardOCP suggests that for PC builders to be a part of the program (with access to combined marketing efforts, bundles and rebate offers) they have to exclusively align their gaming brand with NVIDIA's GeForce hardware (and not AMD's Radeon). Things came to a head yesterday when ASUS suddenly announced a new gaming line, AREZ, that apparently exists only to keep AMD Radeon-powered PCs out of its well-known ROG gaming equipment. With AMD out of the way, the ROG line can join NVIDIA's GPP.
Read more of this story at SoylentNews.
CoSoSys announced the latest update of its award-winning flagship Data Loss Prevention product, Endpoint Protector 5.1, which brings added functionalities to key features and a boost for GDPR compliance. With only a few weeks to go until the EUs General Data Protection Regulation (GDPR) comes into force on May 25th, companies on both sides of the Atlantic serving European customers are rushing to reach compliance before time runs out. Placing a heavy emphasis on protecting More
The post In preparation for the GDPR, CoSoSys launches Endpoint Protector 5.1 appeared first on Help Net Security.
The CEO of Time Warner on Wednesday argued in court that his companys merger with AT&T is essential to compete with internet giants and dismissed the Justice Department's case against the deal as "ridiculous."Jeff Bewkes took the stand in the...
CAPE CANAVERAL, Fla. (Reuters) SpaceX said all systems and weather were go for blast-off on Wednesday of its first high-priority science mission for NASA, a planet-hunting space telescope whose launch was delayed for two days by a rocket-guidance glitch.
FILE PHOTO: NASAs Transiting Exoplanet Survey Satellite, scheduled to launch from Cape Canaveral Air Force Station in Florida, U.S., is shown in this artists rendering image obtained on April 9, 2018. Courtesy Chris Meaney/Goddard Space Flight Center/NASA/Handout via REUTERS.
Facebook reportedly reached out to conservative groups last week to appeal for help as CEO Mark Zuckerberg was preparing to testify before Congress over its data practices. A Facebook public policy manager, Lori Moylan, emailed conservative...
In the new Netflix series Lost in Space, the Robinson family land on an unknown planet described as a Goldilocks planet by both Maureen Robinson and one of the shows writers, Burk Sharpless. The term Goldilocks planet refers to planets in the habitable zone of their solar system.
And just like that, humanity draws one step closer to the singularity, the moment when the machines grow so advanced that humans become obsolete: A robot has learned to autonomously assemble an Ikea chair without throwing anything or cursing the family dog.
Researchers report today in Science Robotics that theyve used entirely off-the-shelf partstwo industrial robot arms with force sensors and a 3D camerato piece together one of those Stefan Ikea chairs we all had in college before it collapsed after two months of use. From planning to execution, it only took 20 minutes, compared to the human average of a lifetime of misery. It may all seem trivial, but this is in fact a big deal for robots, which struggle mightily to manipulate objects in a world built for human hands.
To start, the researchers give the pair of robot arms some basic instructionslike those cartoony illustrations, but in code. This piece goes first into this other piece, then this other, etc. Then they place the pieces in a random pattern front of the robots, which eyeball the wood with the 3D camera. So the researchers give the robots a list of tasks, then the robots take it from there.
"With the news of Barbara Bush's passing on Tuesday, lawmakers and officials from around the world shared fond words about the former first lady."
Bush, described as "a relentless proponent of family literacy," died at the age of 92, a spokesman for the family confirmed.
The BBC adds:
She was a fierce advocate of civil rights and went against many of her husband's Republican party supporters with her more liberal view on abortion rights.
In a statement from the White House, President Donald Trump said Mrs Bush would be long remembered for her devotion to country and family, "both of which she served unfailingly well".
Barack and Michelle Obama described her as "the rock of a family dedicated to public service" and as "an example of the humility and decency that reflects the very best of the American spirit".
Another former US president, Bill Clinton, said Mrs Bush was "feisty in support of her family and friends, her country and her causes".
Read more of this story at SoylentNews.
A flip-flop is one of the most basic digital electronic circuits. It can most easily be built from just two transistors, although they can and have been built out of vacuum tubes, NAND and NOR gates, and Minecraft redstone. Conventional wisdom says you cant build a flip-flop with just one transistor, but here we are. [roelh] has built a flip-flop circuit using only one transistor and some bizarre logic thats been slowly developing over on hackaday.io.
[roelh]s single transistor flip-flop is heavily inspired by a few of the strange logic projects weve seen over the years. The weirdest, by far, is [Ted Yapo]s Diode Clock, a digital clock made with diode-diode logic. This is the large-scale proof of concept for the unique family of logic circuits [Ted] came up with that only uses bog-standard diodes to construct arbitrary digital logic.
The single-transistor flip-flop works just like any other flip-flop there are set and reset pulses, and a feedback loop to keep the whatever state the output is in alive. The key difference here is the addition of a clock signal. This clock, along with a few capacitors and a pair of diodes, give this single transistor the ability to store a single bit of information, just like any other flip-flop.
This is, without a doubt, a really, really weird circuit but falls well into territory that is easily understood despite being completely unfamiliar. The key question here is, why?. [roelh] says this could be used for homebrew CPUs, although this circuit is trading two transistors for a single transistor, two diodes, and a few more support components. For vacuum tube-based computation, this could be a very interesting idea that someone at IBM in the 40s had, then forgot to write down. Either way, its a clever application of diodes and an amazing expression of the creativity that can be found on a breadboard.
This gadget projects light onto the ground to help you remain visible at night David Schneider
Bicycling at night can be dangerous, particularly if you don't put much effort into making yourself visible to drivers. Alas, many people don't. This video describes the construction of an Arduino-controlled rear light meant to make a cyclist more visible by throwing a sequence of red spots on the ground adjacent to the bike. It's not a perfect insurance policy by any means, but it's better than what many people are doingriding about on bikes at night with little or no light to advertise their presence.
Read more: Build an Attention-Grabbing Bicycle Light
Over the years, the diffusion of darknets has created new illegal business models. Along with classic illegal goods such as drugs and payment card data, other services appeared in the criminal underground, including hacking services and malware development. New platforms allow crooks without any technical skills to create their own ransomware and spread it.
Ransomware is malicious code that infects the victims machines and blocks or encrypts their files, requesting the payment of a ransom. When ransomware is installed on a victim machine, it searches for and targets sensitive files and data, including financial data, databases and personal files. Ransomware is developed to make the victim machine unusable. The user has only two options: pay the ransom without having the guarantee of getting back the original files or format the PC disconnecting it from the Internet.
The rise of the RaaS business model is giving wannabe criminals an effortless way to launch a cyber-extortion campaign without having technical expertise, and it is the cause of flooding the market with new ransomware strains.
Ransomware-as-a-Service is a profitable model for both malware sellers and their customers. Malware sellers, using this approach, can acquire new infection vectors and could potentially reach new victims that they are not able to reach through a conventional approach, such as email spamming or compromised website. RaaS customers can easily obtain ransomware via Ransomware-as-a-Service portals, just by configuring a few features and distributing the malware to unwitting victims.
Naturally, RaaS platforms cannot be found on the Clearnet, so they are hidden into the dark side of the Internet, the Dark Web.
Surfing the dark web through unconventional search engines, you can find several websites that offer RaaS. Each one provides different features for their ransomware allowing users to select the file extensions considered by the encrypting phas...
IBM researchers have created the Adversarial Robustness Toolbox, an open-source library to help researchers improve the defenses of real-world AI systems. Attacks against neural networks have recently been flagged as one of the biggest dangers in our modern world where AI systems are increasingly getting embedded in many technologies we use and depend on daily. Adversaries can sometimes tamper with them even if they dont know much about them, and breaking the system could result More
The post Open-source library for improving security of AI systems appeared first on Help Net Security.
Besides the fresh BSD/Linux disk performance tests, some other tests I ran on various BSDs and Linux distributions this week was looking at the performance impact of Intel Meltdown CPU vulnerability mitigation on each of them, namely the performance impact of using kernel page-table isolation...
Senators grilled a Florida man who is accused of making 96 million robocalls during a hearing Wednesday focused on curbing fraudulent phone calls.Adrian Abramovich of Miami, who faces a $120 million fine from regulators, appeared before the Senate...
A group that lobbies on behalf of major technology companies, including Amazon, Facebook and Google, announced on Wednesday that it is hiring a new counsel and director of diversity and inclusion to improve minority representation an issue...
A group of Senate Democrats is floating a bill that would make it easier for the Federal Communications Commission (FCC) to go after robocall scammers.The Robocall Enforcement Enhancement Act of 2018, introduced by Sen. Brian Schatz (D-Hawaii) on...
Almost three years ago, the global domain name authority ICANN chartered a working group to consider how to build a replacement for the WHOIS database, a publicly-accessible record of registered domain names. Because it includes the personal information of millions of domain name registrants with no built-in protections for their privacy, the legacy WHOIS system exposes registrants to the risk that their information will be misused by spammers, identity thieves, doxxers, and censors.
But at the same time, the public availability of the information contained in the WHOIS database has become taken for granted, not only by its regular users, but by a secondary industry that repackages and sells access to its data, providing services like bulk searches and reverse lookups for clients as diverse as marketers, anti-abuse experts, trademark attorneys, and law enforcement authorities.
The working group tasked with replacing this outdated system, formally known as the Next Generation gTLD RDS to Replace WHOIS PDP Working Group did not get far. Despite holding 90 minute weekly working meetings for more than two years, deep divisions within the group have resulted in glacial progress, even as the urgency of its work has increased. A key privacy advocate within that Working Group, EFF Pioneer Award winner Stephanie Perrin, ended up resigning from the group in frustration this March, saying "I believe this process is fundamentally flawed and does not reflect well on the multi-stakeholder model."
With the impending commencement of Europe's General Data Protection Regulation or GDPR on May 25, which will make the continued operation of the existing WHOIS system illegal under European law, ICANN's board has been forced to step in. On April 3, members of the Working Group were informed that it had been "decided to suspend WG meetings until further notice while we await guidance from the Board regarding how this WG will be affected by the GDPR compliance efforts."
With this, the Board has floated its own interim solution aimed at bringing the legacy WHOIS system into compliance with the GDPR. The ingredients of this so-called "Cookbook" proposal...
Electric lighting is there anything it cant do? Coming in all manner of forms and flavours, you can get everything from a compact reading lamp to a blindingly powerful worklight for your garage. Generally, different lights are built in different ways to suit their purpose, but its not the only way to do things. Enter [slisgrinder] and the MOSAIC Lighting System.
At its heart, MOSAIC is a way of building lighting rigs out of individual modules. Where it gets interesting is the design theyre triangles! The boards carry a variety of LEDs and are laid out in a fashion that allows the power and data connections to be made between adjacent cells by laying them out next to each other. Many boards can be tesselated together to create larger, smaller, or unusually shaped arrays. The connections are well thought out, allowing the tiles to make a connection along any one of their 3 edges, regardless of orientation.
The project began out of a desire to grow okra in an otherwise inhospitable climate; to this end, there are both general work lighting modules as well as grow light versions with UV LEDs on board. The modules can be combined in different ways and command and control is done over RS-485.
Its a tidy project that shows how a little thought can create a versatile design through the use of an unusual form factor. Weve seen modular lighting projects before, too like this entry to last years Hackaday Prize.
A group of researchers from KU Leuven, Belgium, have proposed a practical security scheme that would allow secure communications between a widely used implantable neurostimulator an electrical brain implant used to treat a number of medical issues and its external device programmer. Other researchers have already noted that motivated attackers could find ways to hack brain implants due to their poor or inexistent security, and have pointed out that, while the current risk More
The post Researchers propose scheme to secure brain implants appeared first on Help Net Security.
A diamond-bearing space rock that exploded in Earth's atmosphere in 2008 was part of a lost planet from the early Solar System, a study suggests.
The parent "proto-planet" existed billions of years ago before breaking up in a collision and would have been about as large as Mercury or Mars.
A team has published their results in the journal Nature Communications.
They argue that the pressures necessary to produce diamonds of this kind could only occur in [a] planet of this size.
A large planetary body inferred from diamond inclusions in a ureilite meteorite (open, DOI: 10.1038/s41467-018-03808-6) (DX)
Planetary formation models show that terrestrial planets are formed by the accretion of tens of Moon- to Mars-sized planetary embryos through energetic giant impacts. However, relics of these large proto-planets are yet to be found. Ureilites are one of the main families of achondritic meteorites and their parent body is believed to have been catastrophically disrupted by an impact during the first 10 million years of the solar system. Here we studied a section of the Almahata Sitta ureilite using transmission electron microscopy, where large diamonds were formed at high pressure inside the parent body. We discovered chromite, phosphate, and (Fe,Ni)-sulfide inclusions embedded in diamond. The composition and morphology of the inclusions can only be explained if the formation pressure was higher than 20GPa. Such pressures suggest that the ureilite parent body was a Mercury- to Mars-sized planetary embryo.
Read more of this story at SoylentNews.
The experts at the security firm VPN Mentor found a pre-auth remote command injection vulnerability that affects the majority of LG NAS device models.
we found a way to hack into the system using a pre-authenticated remote command injection vulnerability, which can then allow us to do virtually everything including access the data and tamper with the user data and content. states the blog post published by VPN Mentor.
The vulnerability is a pre-auth remote command injection vulnerability found in the majority of LG NAS devices.
The flaw ties the improper validation of the password parameter of the user login page for remote management, this means that a remote attacker can pass arbitrary system commands through this field.
As we show in the video, you cannot simply log in with any random username and password. However, there lies a command injection vulnerability in the password parameter (you have to use an interceptor like burp). We can simply trigger this bug by adding to it. continues the analysis.
To add a new user, we can simply write a persistent shell called c.php by using:
;echo > /tmp/x2;sudo mv /tmp/x2
Entering it as a password exploits the vulnerability.
Then, by passing the following command, we can dump the users:
echo .dump user | sqlite3 /etc/nas/db/share.db"
The experts explained that it is quite simple to dump all database data and add a new user. The experts noticed that LG uses the MD5 hash algorithm to protect passwords, this means that they can be easily cracked.
Below a video PoC of the hack that shows how to exploit the vulnerability to establish a shell on the vulnerable Network-attached storage device and use it to execute...
Security researchers at Kaspersky Lab discovered that about 4 million
This is a post from HackRead.com Read the original post: Millions of apps are exposing sensitive & unencrypted user data
These robots are slow, careful, and successful, making them way better than humans at assembling an Ikea chair Image: NTU
Apparently, one of the standards by which we should be measuring the progress of useful robotic manipulation is through the assembly of Ikea furniture. With its minimalistic and affordable Baltoscandian design coupled with questionably creditable promises of effortless assembly, Ikea has managed to convince generations of inexperienced and desperate young adults (myself included) that we can pretend to be grownups by buying and putting together our own furniture. Its never as easy as that infuritatingly calm little Ikea manual dude makes it look, though, and in terms of things we wish robots would solve, Ikea furniture assembly has ended up way higher on the priority list than maybe it should be.
Weve seen a variety of robotic systems tackle Ikea in the past, but today in Science Robotics is (perhaps for the first time) a mostly off-the-shelf system of a few arms and basic sensors that can put together the frame of a Stefan chair kit autonomously(ish) and from scratch.
This research comes from the Control Robotics Intelligence (CRI) group at NTU in Singapore, and theyve been working on the whole Ikea chair assembly thing for a while. First, they had to teach robots to insert those wooden pins that Ikea uses to connect parts to one another:
Then youve got multiple pin insertion under uncertainty:
Next, cooperatively moving partially assembled chair pieces around:
And finally, bimanual whole-chair manipulation:
The research being presented today in Science Robotics is essentially a synthesis of these skills, all put together resulting in a fully autonomous Ikea chair frame assembly:
To help put this research in perspective, lets briefly take a look at a few other attempts at Ikea furniture assembly by robots, both from 2013:
The first release candidate of the upcoming Xen 4.11 virtualization hypervisor release is now available...
It is normally the grumpy editor's job to look at accounting software; he does so with an eye toward getting the business off of the proprietary QuickBooks application and moving to something free. It may be that Beancount deserves a look of that nature before too long but, in the meantime, a slightly less grumpy editor has been messing with this text-based accounting tool for a variety of much smaller projects. It is an interesting system, with a lot of capabilities, but its reliance on hand-rolling for various pieces may scare some folks off.
Trisquel GNU/Linux is an Ubuntu-based desktop distribution which features free and open source software exclusively. The project's latest release, Trisquel 8.0 "Flidas", is based on Ubuntu 16.04 and includes support through to the year 2021. "The biggest internal change to the default edition is the switch from GNOME....
Sometimes sensitive data, like passwords or keys that unlock encrypted communications, are accidentally left open for anybody to see. Its happened everywhere from the Republican National Committee to Verizon, and as long as information can be public on the internet the trend isnt going to stop.
But researchers at software infrastructure firm Pivotal have taught AI to locate this accidentally public sensitive information in a surprising way: By looking at the code as if it were a picture. Since modern artificial intelligence is arguably better than humans at identifying minute differences in images, telling the difference between a password and normal code for a computer is just like recognizing a dog from a cat.
The best way to check whether private passwords or sensitive information has been left public today is to use hand-coded rules called regular expressions. These rules tell a computer to find any string of characters that meets specific criteria, like length and included characters. But passwords are all different, and this method means that the security engineer has to anticipate every kind of private data they want to guard against.
A friend of mine once suggested that there should be a support group for burned-out former hackerspace directors. We could have our own Village of the Damned at summer camps, where wed sit moodily in the gathering twilight sipping our bourbon and Club Mate and decrying whatever misfortunes came to our space to leave such visible mental scars, or gazing hollow-eyed into the laser-tinged haze and moving gently to the pulse of the chiptune music. See thats Jenny over there, she dont say much. Hackerspace noir, where the only entry criterion is being crazy enough to stand for election to your spaces board.
You can tell [Dr. Seuss] is thinking about his next volume: How The Grinch Stole Whoville Hackspace. Al Ravenna, World Telegram [Public domain]....
Commonwealth Fusion Systems has pledged to build a commercial fusion reactor based on new superconducting magnets Image: Ken Filar, PSFC Research Affiliate
Research shows anti-hypertensive drugs improve heart rate more in patients who listen to music after taking medication. Among musical genres, classical music is the one with greatest efficiency at reducing arterial pressure; authors of the study speculate whether music acts on the patients' parasympathetic system, increasing their capability of absorbing medication.
In addition to remembering to take the medication prescribed by their cardiologists at the right times and going to the trouble of making healthy lifestyle changes, patients with high blood pressure (hypertension) can include a pleasing beneficial activity in routine treatment of the disease thanks to the discovery that listening to music significantly enhances the effect of anti-hypertensive drugs.
[...] "We've observed classical music activating the parasympathetic nervous system and reducing sympathetic activity," said the principal investigator of the FAPESP-funded project. The sympathetic and parasympathetic nervous systems constitute the autonomic nervous system, which maintains homeostasis. The sympathetic nervous system accelerates heart rate, constricts blood vessels and raises blood pressure. The parasympathetic nervous system controls the body at rest, slowing the heart, lowering blood pressure, and stabilizing blood sugar and adrenaline.
Read more of this story at SoylentNews.
With the recent release of DragonFlyBSD 5.2 one of the prominent changes is HAMMER2 now being considered stable for most use-cases. I've been running some benchmarks of this file-system compared to alternatives on other operating systems and have some FreeBSD / Linux reference points to share...
If you have installed a network-attached storage device manufactured by LG Electronics, you should take it down immediately, read this article carefully and then take appropriate action to protect your sensitive data. A security researcher has revealed complete technical details of an unpatched critical remote command execution vulnerability in various LG NAS device models that could let
A new open access paper takes a look at the potential of regenerative medicine for the treatment of Alzheimers disease . The review covers approaches such as spurring the production of new neurons and transplanting new neurons while taking a look at the disease-modeling approaches and techniques that science is now using to refine approaches to treating Alzheimers.
The authors here investigate how induced pluripotent stem cells (iPSCs) are contributing to the growing knowledge in the field by allowing researchers to create increasingly refined models of Alzheimers disease. A current problem we have is that animal models do not emulate the disease closely enough to lead to translational therapies that work in humans; this is why so many new medicines that work in mice fail in clinical trials. The review takes a look at the challenges and how science is working to develop better models.
HBO's Silicon Valley turns to real-world startup MaidSafe for its decentralized Internet Photo: Ali Paige Goldstein/HBO
Pied Piper, the fictional startup of HBOs Silicon Valley, began as a data compression company. Producers during its first few seasons consulted with researchers at Stanford who specialize in compression algorithmsfirst, Tsachy Weissman and Vinith Misra, and later Dmitri Pavlichinto put a real-world spin on discussions about its technology and the whiteboards explaining it. Weissman developed a new compression metric, the Weissman Score, for the show; real-world researchers even started using it. And Misra wrote a technical paper, published online, explaining a fictional (and R-rated) improvement to the compression algorithm.
But like so many startups, Pied Piper eventually pivoted to a different business modeland a new technology. Last season, Richard Hendriks and his team changed their focus to decentralizing the Internet, that is, creating what the show explained as a peer-to-peer network of websites with no firewalls, no tolls, no government regulation, no spying.
This wasnt a unique idea, though it hadnt gotten a huge amount of notice outside of segments of the tech industry. In 2015, Brewster Kahle, founder of the Internet Archive, published a white paper making a case for a Decentralized Web, and in 2016 the Internet Archive held the first Decentralized Web Summit. Meanwhile, several real-world startups were working on developing the technology, including Anonymouse and MaidSafe. (While HBO Silicon Valley refers to a decentralized Internet, what the show describes is generally what the rest of the tech world calls a de......
We are now in a golden age of printed circuit boards. It wasnt too long ago that making your own circuit boards either involved a lot of money, or slightly less money and using some proprietary garbage PCB layout tool. Now, every board house speaks Gerber, and you can get a ten-pack of PCBs from China for five bucks. This incredible cost reduction means people are making art with printed circuit boards. Weve seen portraits, landscapes, and memes. This is truly the beginning of a new artistic medium rendered in fiberglass and soldermask.
Check out this blinky bit of art nouveau. There is a facebook group for PCB paintings, and some of the Badgelife crew are relying on woodcut and linoleum engraving techniques to create works of art in copper and fiberglass.
For this weeks Hack Chat, were going to be talking all about PCB artwork. Our guest for this weeks Hack Chat will be [Andrew Sowa], an electrical engineer, a vocal advocate of KiCad, and the guy who made more of me money. The Benchoff Nickel was created by simply taking some of the fantastic illustrations from Hackadays own [Joe Kim] and applying KiCads Bitmap2Component tool. Since the creation of the nickel, [Andrew] has been working on extending his technique to cross-hatching, backlighting, and halftones.
Moxa announced a line of rugged, compact UC 2100 IoT gateways
that run 10-year available Moxa Industrial Linux and optional
ThingsPro Gateway middleware on a Cortex-A8 SoC.
Developers of database management systems are, by necessity, concerned about getting data safely to persistent storage. So when the PostgreSQL community found out that the way the kernel handles I/O errors could result in data being lost without any errors being reported to user space, a fair amount of unhappiness resulted. The problem, which is exacerbated by the way PostgreSQL performs buffered I/O, turns out not to be unique to Linux, and will not be easy to solve even there.
Since mobile app development is transforming our lives by turning unfeasible things into reality, Artificial Intelligence is not only a hot topic in the field of science but also a topic of exploration and development in the business industry, purposely in the industry of mobile app development.
These days, AI is not limited to Apples Siri anymore, but it is growing much more than our imaginations and the time is here to see mobile app developers putting more of artificial intelligence together in their endeavors.
Introduction to Artificial Intelligence
Well, AI or artificial intelligence is the branch of science that usually design and develop intelligent machines that totally work and react like humans. It is a brilliant way of impacting aptitude to advanced machines so they can troubleshoot problems themselves even more accurately, efficiently and rapidly than before.
A big number of well know companies and organizations are successfully using artificial intelligence in their business operations not only to accomplish their business process efficiently but to boost the productivity as well.
As mobile app development companies are using AI in business app development projects, it can boost competency of a company or business as it provides more personalized, relevant and flawless customer services at the end. Companies can easily understand customer behavior just by using the data collected by artificial intelligence in mobile apps.
Role of AI in Mobile App Development
Affirmative business growth and user engagement are the core factors that are proving the significance of the use of artificial intelligence in mobile app development services.
There are a lot of things that make huge difference between mobile apps developed with and without artificial intelligence such as
There is nothing wrong to say that it is the time to experience big change in performances and process as we are now getting more AI and machine learning-driven apps from mobile app development companies.
We have a lot of live examples of trending mobile app technologies in our mobile phones that are using artificial intelligence such as Google assistant, Siri and Contra etc.
Now in this digital age we can feel free to say that increasing growth of artificial intelligence is...
Threat management and collaboration solutions provider Anomali announced a partnership with Visa to provide cyber security teams with intelligence on indicators of compromise (IoCs) drawn from Visa Threat Intelligence, to better detect and manage breaches involving payment information in retail, hospitality, restaurant and other sectors. Delivered to the Anomali platform through an API from the Visa Developer Platform, Visa Threat Intelligence enables merchants to collaborate within and across sectors to proactively mitigate threats and work More
The post Anomali partners with Visa to offer global payment breach intelligence appeared first on Help Net Security.
By Uzair Amir
Ian Balina is a well-known, sponsored YouTube blogger or rather
This is a post from HackRead.com Read the original post: Vlogger loses $2M in cryptocurrency during YouTube live stream
In 2016, KrebsOnSecurity exposed a network of phony Web sites and fake online reviews that funneled those seeking help for drug and alcohol addiction toward rehab centers that were secretly affiliated with the Church of Scientology. Not long after the story ran, that network of bogus reviews disappeared from the Web. Over the past few months, however, the same prolific purveyor of these phantom sites and reviews appears to be back at it again, enlisting the help of Internet users and paying people $25-$35 for each fake listing.
Sometime in March 2018, ads began appearing on Craigslist promoting part-time social media assistant jobs, in which interested applicants are directed to sign up for positions at seorehabs[dot]com. This site promotes itself as leaders in addiction recovery consulting, explaining that assistants can earn a minimum of $25 just for creating individual Google for Business listings tied to a few dozen generic-sounding addiction recovery center names, such as Integra Addiction Center, and First Exit Recovery.
Applicants who sign up are given detailed instructions on how to step through Googles anti-abuse process for creating listings, which include receiving a postcard via snail mail from Google that contains a PIN which needs to be entered at Googles site before a listing can be created.
Assistants are cautioned not to create more than two listings per street address, but otherwise to use any U.S.-based street address and to leave blank the phone number and Web site for the new business listing.
In my story...
Please consider this as an extra video. Youll see that it was shot back in February and initially I scrapped it as I wasnt happy with the way the laser images came across on camera. Ive since added some sections and significantly re-edited it, however its still not the best. However as I mentioned in the video - it is what it is. Also the projector is a low-end model and no amount of software tweaking can fix that - its all about the hardware - if you want better results then you have to spend the money. But do you really want to spend a thousand pounds to play these games, well thats up to you, but as far as Im concerned this is the end of my experiment. Also if youre wondering about the other features of the software - download it and try it for yourself, its free.
In recent years, millions of file-sharers around the world have been ordered to pay significant settlement fees, or face legal repercussions.
These so-called copyright trolling efforts have been a common occurrence in several countries, with Sweden one of the latest hunting grounds.
Over the past months, tens of thousands of Swedes have been targeted in this manner.
The copyright holders go to court, armed with a list of IP-addresses, and when permission is granted they ask the associated ISPs for the account details of individual subscribers.
These suspected pirates then get a settlement demand in their mailbox, urging them to pay the equivalent of a few hundred dollars, or have their day in court.
As in many other countries, these practices are not without controversy. Several experts have spoken out against them, and ISPs have raised objections too. However, according to Swedish law, the rightsholders have the right to pursue these cases.
Despite its name, the Swedish Pirate Party has been relatively silent on the issue. However, that changed this week, as the party now calls on Justice Minister Morgan Johansson to take action.
The Pirate Party describes the copyright trolling efforts as extortion. It stresses that the evidence copyright holders rely on is far from solid, something they believe the courts should take into account.
It is a scandal that the Swedish judicial system facilitates the mafia-like methods of copyright trolls, says Pirate Party leader Magnus Andersson.
To condone the sending of extortion letters without reasonable ground for suspicion of criminal activity is not acceptable. We demand the Justice Minister to do something about the situation with these copyright trolls!
The Pirate Party sees plenty of opportunities to intervene. The Government could, for example, change how the IPRED directive is interpreted and demand higher scrutiny of the provided evidence.
Another option would be to work at the EU level to repeal the IPRED-directive in its entirety.
Besides calling on the Justice Minister to take action, the Pirate Party is also backing the anti-copyright troll initiative of Internet provider Bahnhof. Through this campaign, members of the public can voice their concerns to the Swedish Government.
Through these and other efforts, the Pirate Party hopes that something will be done to...
A group of 15 Democratic senators are urging the Federal Communications Commission (FCC) to take further action in stopping automated solicitation calls, or robocalls. In an era when the onslaught of unwanted and abusive robocalls is on the rise,...
Here is why you should avoid downloading mods and skins
This is a post from HackRead.com Read the original post: 50,000 Minecraft users infected with hard drive wiping malware
Why FoneEraser Is the Best iPhone Erasing Tool
After the Facebook privacy crisis, are you pay more attention to your personal information?
In fact, you may freak yourself out if you realize how much of your information stored by Facebook, Google and other apps. For instance, Google stores your location every time you turn on the phone, knows everything youve ever searched, and Facebook stores everything from your stickers to login location. Go without saying that, your iPhone must carry lots of important data about you.
So its very necessary to delete all iPhone files thoroughly when you want to sell it on eBay. Considering that, you need to find a reliable iPhone eraser tool to get the job done. Facing so many choices in the market, which iPhone eraser is the best for you to remove all iPhone data clearly? Through lots of tests, we found Aiseesoft FoneEraser. And here is why.
Why FoneEraser Is the Best iPhone Erasing Tool
Aiseesoft FoneEraser is one powerful utility to erase all iPhone content and settings permanently and thoroughly. It provides three erasing levels optionally. You can erase any data on iPhone/iPad/iPod to better protect your privacy. This iPhone eraser tool also enables you to remove all files and settings on more than one iOS device (iPhone/iPad/iPod) simultaneously to save your time.
Erase all files and settings
For all contents related to your personal information like Music, Videos, Photos, Contacts, Text Messages/iMessages, Call history, Calendar, Notes, Reminder, Safari bookmark, iBooks, Podcast, iTunes U, Ringtones, Audio Books, Voice Memos, App, documents and various settings, FoneEraser can remove them permanently. You can get a 100% privacy guard.
Facebook announced new privacy changes on Tuesday as it prepares for a sweeping new European data law, but the company says it will stick with the targeted advertising system thats come under fire in recent weeks.The new features are...
Facebook must face a class action lawsuit over its use of facial recognition technology, a California judge has ruled.
The lawsuit alleges that Facebook gathered biometric information without users' explicit consent.
It involves the "tag suggestions" technology, which spots users' friends in uploaded photos; the lawsuit says this breaches Illinois state law.
Facebook said the case had no merit and it would fight it vigorously.
On Monday, US District Judge James Donato ruled to certify a class of Facebook users - a key legal hurdle for a class action suit.
The class of people in question is Facebook users "in Illinois for whom Facebook created and stored a face template after June 7, 2011", according to the court order.
In a successful class action suit, any person in that group could be entitled to compensation.
In his order, Judge Donato wrote: "Facebook seems to believe... statutory damages could amount to billions of dollars."
The decision comes days after Facebook CEO Mark Zuckerberg faced intensive questioning by US lawmakers over the company's collection and use of user data.
June 2011 was the date on which Facebook rolled out its "tag suggestions" feature.
Read more of this story at SoylentNews.
Security updates have been issued by Debian (freeplane and jruby), Fedora (kernel and python-bleach), Gentoo (evince, gdk-pixbuf, and ncurses), openSUSE (kernel), Oracle (gcc, glibc, kernel, krb5, ntp, openssh, openssl, policycoreutils, qemu-kvm, and xdg-user-dirs), Red Hat (corosync, glusterfs, kernel, and kernel-rt), SUSE (openssl), and Ubuntu (openssl and perl).
A new targeted surveillance app has been found and booted from Google Play. The app, named Dardesh, posed as a chat application and acted as a downloader for a second app that could spy on users. The Dardesh app was spotted and analyzed by Lookout researchers, who dubbed the malware family Desert Scorpion. How was the app delivered to targets? The malicious Dardesh chat app was apparently downloaded and installed by over a hundred users, More
The post New targeted surveillance spyware found on Google Play appeared first on Help Net Security.
Tornadoes are a rightfully feared natural disaster. Fire tornadoes are an especially odious event to contend with on top of whatever else is burning. But, a fire vortex cannon? Thats some awesome eye candy.
The madman behind this cannon belching huge gouts of fire is none other than Youtuber [JAIRUS OF ALL]. This build is actually an upgrade to one of his previous projects a fire tornado gun that burned itself out and is now twice-revived and is arguably better at creating a proper vortex to direct the flames. Built around a modified NERF gun, a pair of 60mm electric ducted fans with some additional venting and tunable via a speed controller direct the airflow through slits in a vortex chamber. A backpack of liquid propane literally fuels this phoenix of a flamethrower, so [JAIRUS] had plenty of time to put together some great footage. Check it out!
As you may expect, to form a proper vortex [JAIRUS] has to point the cannon more or less straight up, but you can still see the flames spiraling outwards when hes firing it horizontally. Despite how wicked-cool it is, the fire vortex cannon is a hulking weapon to wield, so for fast-paced firefights you might want to rely on the art of firebending.
[Thanks for the tip, Itay!]
We've known openSUSE Leap 15 would arrive this summer now we finally know when exactly it will make its debut...
Strapping some gear to an Alaskan Malamute produces data that can train deep learning algorithms to navigate the world like a dog Image: DECADE
A dogs purpose can take on new meaning when humans strap a GoPro camera to her head. Such dog cam video clips have helped train computer vision software that could someday give rise to robotic canine companions.
The idea behind DECADE, described as a dataset of ego-centric videos from a dogs perspective, is to directly model the behavior of intelligent beings based on how they see and move around within the real world. Vision and movement data from a single dogan Alaskan Malamute named Kelp M. Redmonproved capable of training off-the-shelf deep learning algorithms to predict how dogs might react to different situations, such as seeing the owner holding a bag of treats or throwing a ball.
The near-term application would be to model the behavior of the dog and try to make an actual robot dog using this data, said Kiana Ehsani , a PhD student in computer science at the University of Washington in Seattle.
Dogs became the research candidate of choice for modeling visually intelligent agents because they have simpler behaviors than humans. But they also display more complex behaviors than many other animals through their social interactions with other dogs and humans.
This research was backed with funding from the U.S. National Science Foundation and the Office of Naval Research. Ehsani and her colleagues at the University of Washington and the Allen Institute for AI (AI2) published the details of their work in a 28 March 2018 paper uploaded to the preprint server arXiv [pdf].
The data collection process went beyond just putting a GoPro camera on the Alaskan Mamalutes head. Researchers also attached motion trackers to the dogs body and joints to record each body parts absolute position and the relative angle of the dogs limbs and body. The trackers collected an average rate of 20 readings per second and were synchronized through a system based on a Raspberry Pi 3.0 computer.
We needed the setup to be robust to the dog's movements and shakings and also light-weight and comfortable for the dog such that there is no interference in her normal behavior, Ehsani explained.
Signal Sciences announced the latest innovations for its Web Protection Platform. Its patented architecture provides security, operations and development teams with the visibility, security and scalability needed to protect against the full spectrum of threats their web applications now face, from OWASP Top 10 to account takeovers, API misuse and bots. Signal Sciences works across any architecture, providing the broadest coverage against real threats and attack scenarios as well as integrations into DevOps tools that More
The post Infrastructure-agnostic web app protection with virtual patching option appeared first on Help Net Security.
Remember the "Big bitcoin heist" we reported last month when a group of thieves stole around 600 powerful bitcoin mining devices from Icelandic data centers? Icelandic Police had arrested 11 suspects as part of the investigation, one of which has escaped from prison and fled to Sweden on a passenger plane reportedly also carrying the Icelandic prime minister Katrin Jakobsdottir. Sindri Thor
I recently spent a largely sleepless night at a hotel, and out of equal parts curiosity and boredom, decided to kill some time scanning the guest network to see what my fellow travelers might be up to. As youd probably expect, I saw a veritable sea of Samsung and Apple devices. But buried among the seemingly endless number of smartphones charging next to their sleeping owners, I found something rather interesting. I was as picking up a number of Amazon-made devices, all of which had port 5555 open.
As a habitual Android tinkerer, this struck me as very odd. Port 5555 is used for Android Debug Bridge (ADB), a development tool used to control and perform various administrative tasks on an Android device over the network or (more commonly) locally over USB. The number of users who would have legitimately needed to enable network ADB on their devices is surely rather low, so to see a half dozen of them on the network at the same time seemed improbable to say the least.
Why would so many devices manufactured by Amazon all have network ADB enabled? I realized there must be a connection, and it didnt take long to figure it out.
The somewhat awkwardly named Fire TV Stick is a cheap little device that you stick in the HDMI port of your TV to turn it into a smart TV. Ostensibly it allows you to stream content from all the big name providers out there, but realistically Amazon is hoping it will get you to spend more money within their ecosystem. For Amazon, the Fire Stick is to video content as the Kindle is to books: sell the hardware cheap, and make money on the subsequent content purchases....
Does your open source project have a succession plan for its key players? Here's why it should.
I propose that instead of viewing succession planning as a leadership pipeline, free and open source projects should view it as a skills pipeline. What sorts of skills does your project need to continue functioning well, and how can you make sure those skills always exist in your community?
A man who had previously received a face transplant has received another face transplant, following complications with an antibiotic:
The first person in the world to receive two facial transplants says he is feeling well, three months after his latest groundbreaking operation.
Jrme Hamon had his first transplanted face removed last year after signs of rejection following a treatment with an incompatible antibiotic during a cold. The 43 year old remained in a hospital in Paris without a face for two months while a compatible donor was sought. He said: "The first [face] I accepted immediately. This time it's the same."
Mr Hamon suffers from neurofibromatosis type 1, a genetic condition that caused severe disfiguring tumours on his face. His first transplant, in 2010, was a success, but he caught a common cold in 2015 and was given antibiotics. The drug was incompatible with the immunosuppressive treatment he was having to prevent a rejection of the transplanted material. The first signs of rejection came in 2016 and last November, the face, suffering from necrosis, had to be removed.
Read more of this story at SoylentNews.
With the RADV Mesa Radeon Vulkan driver continuing to be advanced by Valve and other independent developers while AMD continues with open-source code drops of their official AMDVLK Vulkan driver, it's been a friendly open-source Radeon Vulkan driver performance and feature/extension battle since that official AMD Vulkan driver was opened up at the end of last year. With new AMDVLK/XGL/PAL code drops happening about weekly and RADV continuing to receive new feature/performance work every few days, both drivers continue maturing gracefully as shown by our latest performance benchmarks.
Recently, it was revealed that data analysis firm, Cambridge Analytica and Facebook were involved in a privacy data scandal wherein the former illegally harvested up to 87 million Facebook users personal data without their knowledge and consent. Facebook allowed thousands of app developers to harvest data through third-party online games and quizzes.
This scandal raised concerns over users data privacy for which Facebooks CEO Mark Zuckerberg had to face intensive questioning by U.S. lawmakers over the companys collection and use of user data.
The popular social media giant has now released a detailed blog post explaining how Facebook collects information about its users from the web even if youre not a Facebook user or are logged out of your account. The blog post that was posted by David Baser, Facebook Product Management Director on Monday said that the post is a partial response to questions Zuckerberg was unable to answer during his Senate and Congressional hearings.
Baser pointed out in the blog post that not only Facebook even companies like Google, Twitter and Amazon use many of the same user data collection practices that the social media giant does.
He wrote, Twitter, Pinterest, and LinkedIn all have similar Like and Share buttons to help people share things on their services. Google has a popular analytics service. And Amazon, Google, and Twitter all offer login features. These companies and many others also offer advertising services. In fact, most websites and apps send the same information to multiple companies each time you visit them. Explaining how Facebook receives cookies, IP address, and browser info about users from other sites, he added, When you see a YouTube video on a site thats not YouTube, it tells your browser to request the video from YouTube. YouTube then sends it to you.
Baser said the team collects information on individuals for their own benefit. He wrote: Apps and websites that use our services, such as the Like button or Facebook Analytics, send us information to make their content and ads better.
In return, Facebook helps those websites serve up relevant and engaging ads or receive analytics to study how people use their services.
When you visit a site or app that uses our services, we receive information even if youre logged out or dont have a Facebook account. This is because other apps and sites dont know who is using Facebook, Baser added.
A bipartisan group of senators is pushing the Department of Homeland Security (DHS) to make public more information about the use of rogue surveillance devices colloquially known as Stingrays.Homeland Security recently acknowledged the devices are...
Adult entertainment giant Pornhub has announced a partnership with cryptocurrency Verge (XVG) that will now allow its users to make payments for its premium content in privacy-focused cryptocurrency. Verge (VXG), which is a secure and anonymous cryptocurrency, will allow Pornhub users to purchase a premium subscription as well as other available purchases without the fear of leaving a trace on the adult website.
In an official press release on Tuesday that was accompanied by a video, Pornhub states: The future has come. In our efforts to keep current with our communitys privacy and payment preferences, Pornhub will now be accepting Verge as a means of payment for services like Pornhub Premium and more, on our platforms. Building on Verges core values of security, anonymity, and practicality, the introduction of this cryptocurrency as a means of payment Pornhub signifies an important foray into the future from the industry that is always on the cutting edge of technology.
Pornhub Vice President Corey Price said in the press release that [n]ot only is this an exciting announcement for us and the adult entertainment industry, its exciting for the crypto space. He further added, History has proven that the adult entertainment industry plays a critical role in the adoption of innovative technology. We saw that with VHS, Beta Max, credit card payment icons and, most recently, VR goggles. We expect to see widespread adoption of crypto and blockchain in short order.
In January 2018, the Pornhubs suggestion page had received close to 6,000 votes requesting the website to start accepting Verge payments.
In a statement, Pornhub said that Verge was an obvious choice when it came to a cryptocurrency partnership on its site purely for its emphasis on user anonymity. Verge is a secure and anonymous cryptocurrency, which is very near and dear to us here at Pornhub, the statement read. [Verge] provides that extra layer of security many people look for, particularly in the adult entertainment industry.
While Verges cryptocurrency transactions are available for anyone to see through its public ledger, Verge, which is built on the Bitcoin (BTC) Blockchain uses Tor and I2P networks to maintain its anonymity, the press release notes.
According to Pornhub, the currency allows for anonymous transactions by obfuscating the IP address...
Its not a pretty sight when an application dies. Error messages can be difficult to understand, and we sometimes have to put our investigator hats on to solve the mystery and find the culprit.
During the first three months of 2018, cryptominers surged to the top of detected malware incidents, displacing ransomware as the number one threat, Comodos Global Malware Report Q1 2018 has found. Another surprising finding: Altcoin Monero became the leading target for cryptominers malware, replacing Bitcoin. The surge of cryptominers For years, Comodo Cybersecurity has tracked the rise of cryptominer attacks, malware that hijacks users computers to mine cryptocurrencies for the attackers profit while remaining hidden More
The post Cryptominers displace ransomware as the number one threat appeared first on Help Net Security.
Posted by Amos Jeffries on Apr 18
This could be used for hydrogen storage.
Of the four states of matter, gases are the hardest to pin down. Gas molecules move quickly and wildly and dont like to be confined. When confined, heat and pressure build in the container, and it doesnt take long before the gas blows the lid off the place, literally. Luckily, gases are superficial. Provide them with an attractive internal surface area, and theyll pin themselves down in no time. No, its not love at first sight, its adsorption.
Adsorption is the processes of gas pinning to the surface of another materialthe inside walls of a container, for example, says Chris Wilmer, assistant professor in Pitts Department of Chemical and Petroleum Engineering. When adsorption occurs, the gas molecules stop bumping into each other, reducing pressure. So, by increasing a containers internal surface area, we can store more gas in less space.
Dr. Wilmer directs the Hypothetical Materials Lab, where he and his research group develop new ways to store, separate, and transport gases. They recently published their study Thermal Transport in Interpenetrated Metal-Organic Frameworks in the American Chemistry Society Journal Chemistry of Materials. The issues cover also featured an image designed by Kutay Sezginel, a chemical engineering graduate student in Dr. Wilmers Lab. It depicted interpenetrated metal organic frameworks or MOFs.
Posted by Siddharth Sharma on Apr 18Hi,
MIT engineers have developed a continuous manufacturing process that produces long strips of high-quality graphene.
The teams results are the first demonstration of an industrial, scalable method for manufacturing high-quality graphene that is tailored for use in membranes that filter a variety of molecules, including salts, larger ions, proteins, or nanoparticles. Such membranes should be useful for desalination, biological separation, and other applications.
For several years, researchers have thought of graphene as a potential route to ultrathin membranes, says John Hart, associate professor of mechanical engineering and director of the Laboratory for Manufacturing and Productivity at MIT. We believe this is the first study that has tailored the manufacturing of graphene toward membrane applications, which require the graphene to be seamless, cover the substrate fully, and be of high quality.
China has a found a novel way to tackle its massive air pollution problem: Putting up a giant air purifier the size of an industrial smokestack in the middle of a smog-plagued city.
Instead of pumping out billows of black smoke like the chimneys rising from factories in the northern province of Shaanxi, the 60-meter (197-foot) tall structure on the outskirts of the regional capital Xian blasts clean air.
Standing between high-rises, the device is capable of cleaning between five million and 18 million cubic meters of air each day, depending on the weather, season, and level of pollution, according to a report by the Chinese website Thecover.cn.
A KAIST research team recently developed sodium ion batteries using copper sulfide anode. This finding will contribute to advancing the commercialization of sodium ion batteries (SIBs) and reducing the production cost of any electronic products with batteries.
Professor Jong Min Yuk and Emeritus Professor Jeong Yong Lee from Department of Materials Science and Engineering developed a new anode material suitable for use in an SIB. Compared to the existing anode materials, the copper sulfide anode was measured to exhibit 1.5 times better cyclability with projected 40 percent reduction in cost.
Lithium-ion batteries (Li-ion batteries or LIBs) are widely used in mobile phones and other personal electronics. However, large-scale energy storage systems require less expensive, more abundant materials. Hence, a SIBs have attracted enormous attention for their advantage over lithium-based batteries.
If you were waiting until the last minute to pay your taxes and were depending on IRS.gov to make a payment from your checking account, there's some bad news.
For most of Tuesday, the last day to file taxes, the Direct Pay section of the Internal Revenue Service's website wasn't working. Instead, people planning to pay electronically saw a message reading, "This service is currently unavailable. We apologize for any inconvenience."
Now there's good news -- of sorts. The site is working once again. And Treasury Secretary Steve Mnuchin told reporters Tuesday that Americans who couldn't pay their taxes because of the outage will receive an extension. The IRS later said that individuals and businesses with a filing or payment due date of April 17 will now have until midnight on Wednesday, April 18. Taxpayers need do nothing to qualify for the extra time.
Read more of this story at SoylentNews.
34 global technology and security companies have pledged not to aid governments launch cyberattacks and to protect all customers regardless of nationality, geography or attack motivation. The Cybersecurity Tech Accord The Cybersecurity Tech Accord is a watershed agreement among the largest-ever group of companies agreeing to defend all customers everywhere from malicious attacks by cybercriminal enterprises and nation-states. The 34 companies include ABB, Arm, Avast, Bitdefender, BT, CA Technologies, Cisco, Cloudflare, Datastax, Dell, DocuSign, Facebook, More
The post Top tech firms pledge not to help governments launch cyberattacks appeared first on Help Net Security.
[Dhole], like the fox, isnt the first to connect his computer to a Game Boy printer but he has done a remarkable job of documenting the process so well that anyone can follow. The operation is described well enough that it isnt necessary to scrutinize his code, so dont be put off if C and Rust are not your first choices. The whole thing is written like a story in three chapters.
The first chapter is about hacking a link cable between two Game Boys. First, he explains the necessity and process of setting the speed of his microcontroller, a NUCLEO-F411RE development board by STMicroelectronics. Once the rate is set, he builds a sniffer by observing the traffic on the cable and listens in on two Game Boys playing Tetris in competition mode. We cant help but think that some 8-bit cheating would be possible if Tetris thought your opponent instantly had a screen overflowing with tetrominoes. Spying on a couple of Game Boys meant that no undue stress was put on the printer.
Chapter two built on the first chapter by using the protocol to understand how the printer expects to be spoken to. There is plenty of documentation about this already, and it is thoughtfully referenced. It becomes possible to convince a Game Boy that the connected microcontroller is a printer so it will oblige by sending an image. Since there isnt a reason to wait for printing hardware, the transfer is nearly instantaneous. In the image above, you can see a picture of [Dhole] taken by a Game Boy camera.
The final chapter, now that all the protocols are understood, is also the climax where the computer and microcontroller convince the printer they are a Game Boy that wants to print an image. In the finale, we get another lesson about measuring controller frequency without an oscilloscope. If you are looking for the hack, there it is. There is a handful of success in the form of old receipts with superimposed grayscale images since virgin thermal printer paper by Nintendo costs as much as a used printer.
Feral Interactive has just announced they will be launching Rise of the Tomb Raider for Linux tomorrow, 19 April...
A team of researchers from the National Institute of Informatics (NII) in Tokyo and NTT Basic Research Laboratories (BRL, Nippon Telegraph and Telephone Corporation) in Japan have published an explanation of how quantum systems may be able to heat up by cooling down. Their paper appeared recently in Physical Review Letters.
Heating by cooling sounds rather counterintuitive, but if the system has symmetries, decay could mean many things, says Kae Nemoto, a professor in the Principles of Informatics Research Division at NII which is part of the Inter-University Research Institute Corporation Research Organization of Information and Systems (ROIS).
Nemoto and her team examined a double subdomain system coupled to a single constant temperature reservoir. Each sub-domain contained multiple spinsa form of angular momentum carried by elementary particles such as electrons and nuclei. The researchers considered the situation in which the spins within each sub-domain are aligned with respect to each other, but the sub-domains themselves are oppositely aligned (for instance all up in one and all down in the second). This creates a certain symmetry in the system.
Carl Kasell, the longtime NPR newscaster who breathed new life into his career as the judge on the public radio station's "Wait Wait Don't Tell Me!," has died, NPR reports. He was 84.
The radio personality reportedly died Tuesday in Potomac, Md. of complications from Alzheimer's disease.
Kasell, who was known as the steady voice of the news on NPR for more than three decades, grew up in Goldsboro, N.C. with the dream of one day getting his pipes on the air.
"Before I even started to school," he told NPR in 2009, "I sometimes would hide behind the radio, which would be sitting on a table, and pretend that I was on the air, and try to fool people that came by to listen."
Read more of this story at SoylentNews.
Google has rolled out Chrome 66 to its stable channel for Linux desktop users as well as other supported desktop/mobile operating systems...
The team over at Netrunner have just announced the launch of Netrunner 18.03 Idolon for the Pinebook. This is the direct result of a year of collaboration between the Netrunner, Pine and KDE Communities in a effort to drive down memory consumption, fix glitches in the graphics stack and enabling accelerated video decode, all of which has resulted in a product that showcases the coming together of the amazing software from KDE and some brilliant hardware engineering from the folks over at Pine.
Its been quite a journey for my colleagues and I at Blue Systems in putting together this product. We have had to delve into areas where we originally did not have the expertise to fix bugs and constantly push the boundaries of our abilities. This was especially challenging in the ARM world since there are parts of the stack that were proprietary, meaning we cannot debug those parts, leading to many frustrating evenings having been spent on trying to reverse engineer buggy behaviour.
Facebook is still in the middle of a storm for its conduct and the way it approached the privacy of its users after the Cambridge Analytica case.
Now Facebook is under scrutiny after Zuckerberg testified in front of the US Congress, the social network giant disclosed more information on data collection activity that aimed to gather info related to non-Facebook users.
Yes, it is true! Facebook can track you even if you are not using it, this is possible if you visit a website or an application that uses the services of the tech giant.
The services include Social plugins (i.e. Like and Share buttons), Facebook Login, Facebook Analytics, and ads and measurement tools.
When you visit a site or app that uses our services, we receive information even if youre logged out or dont have a Facebook account. This is because other apps and sites dont know who is using Facebook. explained product management director David Baser.
Many companies offer these types of services and, like Facebook, they also get information from the apps and sites that use them. Twitter, Pinterest and LinkedIn all have similar Like and Share buttons to help people share things on their services. Google has a popular analytics service. And Amazon, Google and Twitter all offer login features.
As you can imagine, all these companies also offer targeted advertising services by leveraging the information gathered through their services.
Everytime a user visits a website, his browser shares the IP address to the website along with info about the machine (i.e. browser, operating system) and cookies. Facebook also collects data related to website or app accessed by the user.
According to Baser, the social network platform uses the information received from websites and apps, to implements its services, to target the advertising and to improve the safety and security on Facebook.
The Drupal vulnerability (CVE-2018-7600), dubbed Drupalgeddon2 that could allow attackers to completely take over vulnerable websites has now been exploited in the wild to deliver malware backdoors and cryptocurrency miners. Drupalgeddon2, a highly critical remote code execution vulnerability discovered two weeks ago in Drupal content management system software, was recently patched by the
Tuesday was a very busy release day for Oracle folks as in addition to shipping an updated Solaris 11.4 beta and Oracle Linux 7 Update 5, their compiler folks also announced the GraalVM 1.0 virtual machine release...
What is Holochain? #notblockchain
Holochain has been in the works since before the Bitcoin whitepaper and now it is being released on the world. There is no mining, no cryptocurrency and it claims to be more efficient than Blockchain. Could Holochain be the future or decentralization?
OUR CHANNEL https://www.youtube.com/user/cointelegraph
Four years after the debut of Trisquel 7.0 and a year and a half since the 8.0 Alpha, Trisquel 8.0.0 is now available for this Linux distribution that's endorsed by the Free Software Foundation...
Following last week's release of Wayland 1.15 / Weston 4.0, the development gates are once again open for new feature activity to land for Wayland and the reference Weston compositor. Weston has already landed a big patch series for what will likely become Weston 5.0...
Via: Reuters: In a telephone call with the emir of Kuwait in January, U.S. President Donald Trump pressed the Gulf monarch to move forward on a $10 billion fighter jet deal that had been stalled for more than a year. Trump was acting on behalf of Boeing Co, Americas second-largest defense contractor, which had become 
The Large Hadron Collider (LHC) is the worlds largest and most powerful particle accelerator. Its a 17-mile long circular tube thats buried 175 meters below the French-Swiss border near Geneva.
Its common knowledge that the facility has been resounding success from a scientific perspective. But the LHC is also a computing miracle.
In its first 12 months of operation, the LHC produced more than 50 petabytes of data. The team needed 170 computing centers across 42 countries to analyze it all in a timely manner. It is the largest distributed computing grid in the world.
Readers response to this post
Summary: In France, where Battistelli does not enjoy diplomatic immunity, he can be held accountable like his "padrone" recently was
It should be obvious to all and sundry by now that people who expect the EPO Administrative Council to hold Battistelli to account are barking up the wrong tree. The unfortunate fact of the matter is that it really is possible to get away with serious abuses as long as the perpetrator is protected by diplomatic immunity. In this case Battistelli enjoys diplomatic immunity as President of the EPO and he also seems to be protected by a supine Administrative Council which shows no interest in calling him to account.
In this case Battistelli enjoys diplomatic immunity as President of the EPO and he also seems to be protected by a supine Administrative Council which shows no interest in calling him to account.But what people who complain about Battistelli seem to forget is that he also wears other hats and operates in other contexts where he does not enjoy immunity. To be more precise: he is the deputy mayor in charge of culture in his home town of Saint-Germain-en-Laye.
He was appointed to this position in October 2017 after the last local elections when he succeeded Arnaud Pricard. Pricards was promoted to the position of mayor after the death of Emmanuel Lamy in May 2017. Until October 2017 Battistelli was the municipal councillor in charge of theatre. In this position he was mainly responsible for the municipal theatre which is known as the Thtre Alexandre Dumas.
Until October 2017 Battistelli was the municipal councillor in charge of theatre. In this position he was mainly responsible for the municipal theatre which is known as the Thtre Alexandre Dumas.The Thtre Alexandre Dumas (TAD) is named after the famous French writer, some of whose most illustrious works, such as The Three Musketeers, were written in Saint-Germain-en-Laye. It is a municipal institution which is directly under the management of the municipal council. Both the deputy mayor for culture and the the town councillor in charge of...
Submitted via IRC for SoyCow4408
Lea Kissner is back at her alma mater, the University of California at Berkeley, armed with a crisp gray blazer, a slide deck, and a laptop with a 'My Other Car Is A Pynchon Novel' sticker on it. Since graduating in 2002, she's earned a PhD at Carnegie Mellon in cryptography and worked her way up at Google, where she manages user privacy and tries to keep things from breaking. She's here to tell a hall of computer science students how she did itand also how to create privacy-protective systems at a scale that you won't find outside a handful of massive tech companies.
Read more of this story at SoylentNews.
Starting yesterday, Russia went to war with free cross-platform messaging app Telegram. Authorities including the FSB wanted access to Telegrams encryption keys, but the service refused to hand them over.
As a result, the service which serviced 200,000,000 people in March alone came under massive attack. Supported by a court ruling obtained last Friday, authorities ordered ISPs to block huge numbers of IP addresses in an effort to shut Telegram down.
Amazon and Google, whose services Telegram uses, were both hit with censorship measures, with around 1.8 million IP addresses belonging to the Internet giants blocked in an initial wave of action. But the government was just getting warmed up.
In an updated posted by Pavel Durov to Twitter from Switzerland late last night, the Telegram founder confirmed that Russia had massively stepped up the fight against his encrypted messaging platform.
Within the last two days, Russia blocked over 15 million IP addresses in attempts to ban Telegram on its territory. Regardless, Telegram remained available for the majority of Russias residents #digitalresistance https://t.co/2syVbVzXPg
Pavel Durov (@durov) April 17, 2018
Of course, 15 million IP addresses is a huge volume, particularly since just 14 million of Telegrams users are located in Russia thats more than one IP address for each of them. As a result, there are reports of completed unrelated services being affected by the ban, which is to be expected given its widespread nature. But Russia doesnt want to stop there.
According to Reuters, local telecoms watchdog Rozcomnadzor asked both Google and Apple [Update: and APKMirror] to remove Telegram from their app stores, to prevent local citizens from gaining access to the software itself. It is unclear whether either company intends to comply but as yet, ne...
Hi there. Im Bill LtRandolph Clark, and Im the engineering manager for the Champions team on LoL. Ive worked on several different teams on League over the past years, but one focus has been consistent: Im obsessed with tech debt. I want to find it, I want to understand it, and where possible, I want to fix it.
Through-hole chips are slowly falling by the wayside, and if you want to build something with new parts you will be using surface mount components. This means spreading paste and throwing it in the toaster oven. Of course, if you dont want to take the time to get a stencil for your solder paste, you can always lay it down by hand. For that, [owhite] has created a tiny, handheld, robotic solder paste dispenser. Its a robotic pen that dispenses just the right amount of solder paste on your pads.
The design of this solder paste dispenser is basically a syringe filled with paste and a stepper motor to push the plunger down. Devices like this already exist, and the i-extruder can be had for somewhere around two hundred bucks. Why buy when you can build, so [owhite] set out to create his own.
The key to a successful solder paste pen, it seems, is driving the plunger with a small NEMA 8 stepper motor, using a very fine pitch on the threads of the gears pushing the plunger down, and surprisingly finding a small-diameter syringe. [owhite] found the last bit in the form of a gas-tight syringe with a nylon gasket. The electronics consist of just a Teensy 3.2, DRV8825 stepper driver, footswitch, and an OLED for a UI.
With just a few parts, [owhite] managed to create a solder paste pen thats better than the commercial i-extruder, and with a bit of practice can be used to place paste on some SMD pads.
Over the past decades, computers have become faster and faster and hard disks and storage chips have reached enormous capacities. But this trend cannot continue forever: we are already running up against physical limits that will prevent silicon-based computer technology from attaining any impressive speed gains from this point on. Researchers are particularly optimistic that the next era of technological advancements will start with the development of novel information-processing materials and technologies that combine electrical circuits with optical ones. Using short laser pulses, a research team led by Misha Ivanov of the Max Born Institute in Berlin together with scientists from the Russian Quantum Center in Moscow have now shed light on the extremely rapid processes taking place within these novel materials. Their results have appeared in the journal Nature Photonics.
Read more of this story at SoylentNews.
Fourth Industrial Revolution is just code (or buzzword) for "software patents" part of the race to the bottom (of patent quality)
Summary: The EPOs status in the world has declined to the point where former French colonies and countries with zero European Patents are hailed as success stories for Battistelli
THE reputation of the EPO and by extension of European Patents (EPs) is badly damaged. It wont be able to compete with the USPTO. In fact, in IP5 its now generally seen as the most abusive; some would call it a laughing stock, especially when publicly represented by corrupt/abusive officials from France.
Its worth noting that the number of granted EPs from Saudi Arabia fell by a whopping 44.4% last year.The EPO has totally lost touch with patent quality. It just habitually misuses the word quality.
Saudi patents are laughable. People I know who work there tell me so. But the EPO, which no longer values the quality of patents, has found itself company. Yesterday Saba & Co Intellectual Property wrote about the EPO MOU:
King Abdul Aziz City of Science and Technology, where the Saudi Patent Office resides, signed a memorandum of understanding with the European Patent Office. The MOU, which aims to strengthen the patent system and increase bilateral cooperation, foresees joint activities in the areas of patent procedures, search, examination and automation, as well as use and exchange of patent data and databases.
Its worth noting that the number of granted EPs from Saudi Arabia fell by a whopping 44.4% last year.
Also yesterday there was this new article bragging about EPO va...
Facebook must face a class action lawsuit over its unlawful use of facial recognition technology on photos without user permission, a U.S. federal judge in California ruled on Monday.
According to the lawsuit, Facebook violated an Illinois state law by incorrectly using photo-scanning and face recognition technologies on users uploaded photographs and gathered biometric information without their explicit consent.
The case dates back to 2015, where three Illinois residents, Nimesh Patel, Adam Pezen, and Carlo Licata had sued Facebook for violating a state privacy law on protecting biometric privacy.
U.S. Judge James Donato in his ruling on Monday said the claims by the three plaintiffs were sufficiently cohesive to allow for a fair and efficient resolution on a class basis.
The judge also noted that there is enough proof to show that Facebook violated the Illinois Biometric Information Privacy Act (BIPA), passed in 2008, which prevents companies from collecting and storing the biometric data of people without their consent.
Under the Illinois Act, Facebook can be fined $1,000 to $5,000 each time the companys Tag Suggestions feature was used on a persons image without permission. Tag Suggestions is a feature that recommends people to tag after a Facebook user uploads a photo.
Consequently, the case will proceed with a class consisting of Facebook users located in Illinois for whom Facebook created and stored a face template after June 7, 2011, he said, according to the ruling.
However, according to Facebook, the photo tagging tool provides the option to users to turn the feature off and prevent themselves from being suggested in photo tags, which the company says is available since its inception.
Shawn Williams, the plaintiffs attorney, said its unclear as of now if the lawsuit might prompt changes in the way Facebook uses biometric data.
As more people become aware of the scope of Facebooks data collection and as consequences begin to attach to that data collection, whether economic or regulatory, Facebook will have to take a long look at its privacy practices and make changes consistent with user expectations and regulatory requirements, said Williams.
A Facebook spokeswoman said the company was reviewing Mondays ruling that certifies the class action. We continue to believe the case has no merit and will defend ourselves vigorously, she said.
Mondays ruling is certainly not good news for Facebook, as the Silicon Valley giant is currently caught in a p...
SpaceX can start building its "Big Fucking Rocket," now that it has officially found a home in LA. Mayor Eric Garcetti has announced on Twitter that the private space giant "will start production development of the Big Falcon Rocket (the spacecraft's tamer name, apparently)" at the port of Los Angeles. SpaceX designed the 348-foot-long behemoth to fly humanity to the moon, Mars and beyond. It will be able to carry up to  tons in payload, whereas Falcon Heavy can only carry [63.8] tons. "This vehicle holds the promise of taking humanity deeper into the cosmos than ever before," he added, along with an illustration of the company's massive interplanetary spacecraft.
Finally, it's worth noting just how shockingly busy the BFR tent was on both April 13th and 14th, as well as the 8th (the first day Pauline visited the facility). With upwards of 40 cars parked at the tent, it's blindingly clear that SpaceX is not simply using the tent as a temporary storage location alongside the arrival of composite fabrication materials (prepreg sheets, epoxy, etc) from Airtech International, SpaceX undeniably intends to begin initial fabrication of the first BFR prototypes in this tent, although they will likely eventually move the activities to the Berth 240 Mars rocket factory. That's certainly not a sentence I ever expected to write, but it is what it is.
The BFR's height may be elongated from its planned total of 106 meters.
Intel continues to innovate its products, the tech giant announced two new technologies, the Threat Detection Technology (TDT) and Security Essentials.
The Threat Detection Technology leverages the silicon-level telemetry and functionality to allow security products detect sophisticated threats.
The new Intel Threat Detection Technology (TDT) includes two main capabilities, the Accelerated Memory Scanning and Advanced Platform Telemetry.
The Accelerated Memory Scanning feature allows anti-malware solutions to use Intels integrated GPU to scan and detect fileless malware attacks without having any impact on performance and power consumption.
Microsoft will integrate the Accelerated Memory Scanning feature into Windows Defender Advanced Threat Protection (ATP) within a couple of weeks.
According to Intel researchers, using the GPU instead of the CPU to scan the memory will allow frequent scanning reducing the impact on performance, Intel tests revealed that the CPU usage dropped from 20 percent to as little as 2 percent.
The first new capability is Accelerated Memory Scanning. Current scanning technologies can detect system memory-based cyberattacks, but at the cost of CPU performance. reads the announcement published by Intel
With Accelerated Memory Scanning, the scanning is handled by Intels integrated graphics processor, enabling more scanning, while reducing the impact on performance and power consumption. Early benchmarking on Intel test systems show CPU utilization dropped from 20 percent to as little as 2 percent
The second Intel Threat Detection Technology is Intel Advanced Platform Telemetry that was designed to include cloud-based machine learning and endpoint data collection to improve threat detection.
The New Intel Advanced Platform Telemetry technology will first be integrated into Cisco Tetration, a solution designed to provide data center security and cloud workload protection.
Intel has announced Security Essentials, a set of cri......
[Revanth Kailashnath] writes in to tell us about an interesting project he and his team have been working on for their Real Time Embedded Programming class at the University of Glasgow. Intended to combat the harsh and dangerous winters in Glasgow, their system uses a Raspberry Pi and a suite of sensors to automatically deploy a brine solution to streets and sidewalks. While the project is still only a proof of concept and hasnt been deployed, the work the team has done so far runs the gamut from developing their own PCBs to creating a web-based user interface.
The core idea is simple. If the conditions are right for ice to form, spray salt water. Using salt water is a cheap and safe way of clearing and preventing ice as it simply drops the temperature at which water freezes. The end result is that the ice wont form until it gets down to 10F (-12C) or so. Not a perfect solution, but it can definitely help. Of course, you dont want to spray people with salt water as they pass by, so theres a bit more to it than that.
Using the venerable DHT22 sensor the team can get the current temperature and humidity, which allows them to determine when its time to start spraying. But to prevent any wet and angry pe...
The Food and Drug Administration has launched a criminal investigation into research by a Southern Illinois University professor who injected people with his unauthorized herpes vaccine, Kaiser Health News has learned. SIU professor William Halford, who died in June, injected participants with his experimental herpes vaccine in St. Kitts and Nevis in 2016 and in Illinois hotel rooms in 2013 without safety oversight that is routinely performed by the FDA or an institutional review board.
According to four people with knowledge about the inquiry, the FDA's Office of Criminal Investigations is looking into whether anyone from SIU or Halford's former company, Rational Vaccines, violated FDA regulations by helping Halford conduct unauthorized research. The probe is also looking at anyone else outside the company or university who might have been complicit, according to the sources who asked not to be identified because of the sensitivity of the matter.
The FDA rarely prosecutes research violations, usually choosing to administratively sanction or ban researchers or companies from future clinical trials, legal experts said. Even so, the agency is empowered to pursue as a crime the unauthorized development of vaccines and drugsand sometimes goes after such cases to send a message.
[...] Rational Vaccines was co-founded with Hollywood filmmaker Agustn Fernndez III, and the company received millions of dollars in private investment from investors after the Caribbean trial, including from billionaire Peter Thiel. Thiel, who for months has refused to respond to questions from KHN, contributed to President Donald Trump's campaign and is a high-profile critic of the FDA. Thiel is part of a larger libertarian movement to roll back FDA regulations to speed up medical innovation.
Three people have sued Rational Vaccines over the experimental injections.
Also at STLtoday.com.
KILAUEA VOLCANO, BIG ISLAND (HawaiiNewsNow) Scientists with the U.S.G.S. issued a Volcano Activity Notice on Tuesday, warning that the magma system beneath Kilaueas East Rift Zone had become increasingly pressurized and that a new vent could form at any time if conditions persist.
Based on data observed over the past month, the new vent could form on either the existing Puu Oo cone or on an adjacent area along the East Rift Zone, scientists say.
Magma is currently accumulating at shallow depths beneath the existing Puu Oo eruption. The last time a major vent opened in the area was June 27, 2014 the appropriately-named June 27th Flow sent lava flowing more than 12 miles into the town of Pahoa, causing minor damage to roads and structures.
As humankind continues to stare into the dark abyss of deep space in an eternal quest to understand our origins, new computational tools and technologies are needed at unprecedented scales. Gigantic datasets from advanced high resolution telescopes and huge scientific instrumentation installations are overwhelming classical computational and storage techniques.
This is the key issue with exploring the Universe it is very, very large. Combining advances in machine learning and high speed data storage are starting to provide hitherto unheard of levels of insight that were previously in the realm of pure science fiction. Using computer systems to infer knowledge from observation isnt new, but the scale at which we need to examine large data today certainly is.
Because the data are so unwieldy and complicated, new methods need to be devised to quickly annotate features that are important, sifting out valuable signals from all of the noise. Nothing is probably more difficult than finding the signal of an echo observed from the sound a pair of black holes colliding billions of light years away from Earth. This was the premise of the algorithms needed to make sense of the data from the Laser Interferometer Gravitational-Wave Observatory (LIGO) project. They need to filter out a vast array of noise from the real proton sized signal, it is an intrinsically computationally intensive process, the main reason being just the sheer size and noiseiness of the captured data.
The team has now published two papers on their methods to use AI to find gravitational waves. First up was the initial paper, Deep neural networks to enable real-time multimessenger astrophysics in Physics Review D, in February 2018, with the follow-on Deep Learning for real-time gravitational wave detection and parameter estimation: Results with Advanced LIGO data in Physics Letters B, in March 2018.
Read more of this story at SoylentNews.
A man in Paris has become the worlds first to successfully receive two facial transplants.
Jrme Hamon, 43, underwent his first face transplantation procedure in 2010 to treat neurofibromatosis, a genetic disorder characterized by the growth of tumors along nerves in the skin, brain and other parts of the body. Yet Hamons body rejected the original transplant.
In January, a team of surgeons and paramedics at Georges Pompidou European Hospital AP-HP, led by surgeon Dr. Laurent Lantieri, performed Hamons second transplant.
If its started to feel like all summer blockbuster movies are being written by robots [INSERT FORMER PRO WRESTLER, INSERT GIANT CGI ANIMAL], youll be disquieted to learn that that future may not be too far off.
The meditation app Calm teamed up with the tech team at Botnik to write a new Brothers Grimm-style fairy tale entirely through artificial intelligence. By inputting the data from existing Brothers Grimm stories and using predictive text technology (and with a few human writers stitching things together), the group at Botnik crafted The Princess and the Fox, a story about a talking fox [who] helps the lowly millers son to rescue the beautiful princess from the fate of having to marry a dreadful prince who she does not love.
Were doing for the Brothers Grimm what Jurassic Park did for dinosaurs, says Michael Acton Smith, co-founder of Calm, in a press press release. Were bringing them back from the dead, with modern science. (It perhaps bears remembering here that Jurassic Park famously did not end well.)
But the mice didnt seem any smarter than usual.
Electromagnetic actuators exert small amounts of force, but are simple and definitely have their niche. [SeanHodgins] took a design thats common in flip-dot displays as well as the lightweight RC aircraft world and decided to make his own version. He does a good job of explaining and demonstrating the basic principles behind how one of these actuators works, although the robotic application claimed is less clear.
Its a small, 3D printed lever with an embedded magnet that flips one way or another depending on the direction of current flowing through a nearby coil. Actuators of this design are capable of fast response and have no moving parts beyond the lever itself, meaning that they can be made very small. He has details on an imgur gallery as well as a video, embedded below.
As we mentioned, flip-dot displays are one example of device that use this method. Compared to things like motors, these actuators may not be capable of exerting much force but have to be quite strong relative to their size. Their simplicity also means they can be made very small, which is why they are among some of the serious tricks used by micro RC airplane builders where even the most aggressively miniaturized of servo actuators are simply not an option.
Will robots dream in ones and zeros? Can they appreciate a rose by any other name? Perhaps a new class calculus will provide us with those answers, and machines with consciousness.
Posted by Michael Catanzaro on Apr 17------------------------------------------------------------------------
Hot-air hand dryers in multiple men's and women's bathrooms in three basic science research areas in an academic health center were screened for their deposition on plates of (i) total bacteria, some of which were identified, and (ii) a kanamycin-resistant Bacillus subtilis strain, PS533, spores of which are produced in large amounts in one basic science research laboratory.
Plates exposed to hand dryer air for 30 s averaged 18 to 60 colonies/plate; but interior hand dryer nozzle surfaces had minimal bacterial levels, plates exposed to bathroom air for 2 min with hand dryers off averaged 1 colony, and plates exposed to bathroom air moved by a small fan for 20 min had averages of 15 and 12 colonies/plate in two buildings tested.
Retrofitting hand dryers with HEPA filters reduced bacterial deposition by hand dryers 4-fold, and potential human pathogens were recovered from plates exposed to hand dryer air whether or not a HEPA filter was present and from bathroom air moved by a small fan. Spore-forming colonies, identified as B. subtilis PS533, averaged 2.5 to 5% of bacteria deposited by hand dryers throughout the basic research areas examined regardless of distance from the spore-forming laboratory, and these were almost certainly deposited as spores. Comparable results were obtained when bathroom air was sampled for spores.
These results indicate that many kinds of bacteria, including potential pathogens and spores, can be deposited on hands exposed to bathroom hand dryers and that spores could be dispersed throughout buildings and deposited on hands by hand dryers.
Read more of this story at SoylentNews.
https://rmccurdy.com/scripts/videos/rmccurdy_com/HPR_ABC.mp4 more burp/android videos: https://rmccurdy.com/scripts/videos/rmccurdy_com/Star%20Wars%20Galaxy%20of%20Heroes%20Hacking%20Failsause.mp4 https://rmccurdy.com/scripts/videos/rmccurdy_com/Burp%20Suite%20SSL%20ProxyDroid%20Android%20Hacking%20Games%202017.mp4
In the wake of a damning report by the DOJ Office of Inspector General (OIG), Congress is asking questions about the FBIs handling of the locked iPhone in the San Bernardino case and its repeated claims that widespread encryption is leading to a Going Dark problem. For years, DOJ and FBI officials have claimed that encryption is thwarting law enforcement and intelligence operations, pointing to large numbers of encrypted phones that the government allegedly cannot access as part of its investigations. In the San Bernardino case specifically, the FBI maintained that only Apple could assist with unlocking the shooters phone.
But the OIG report revealed that the Bureau had other resources at its disposal, and on Friday members of the House Judiciary Committee sent a letter to FBI Director Christopher Wray that included several questions to put the FBIs talking points to the test. Not mincing words, committee members write that they have concerns that the FBI has not been forthcoming about the extent of the Going Dark problem.
In court filings, testimony to Congress, and in public comments by then-FBI Director James Comey and others, the agency claimed that it had no possible way of accessing the San Bernardino shooters iPhone. But the letter, signed by 10 representatives from both parties, notes that the OIG report undermines statements that the FBI made during the litigation and consistently since then, that only the device manufacturer could provide a solution. The letter also echoes EFFs concerns that the FBI saw the litigation as a test case: Perhaps most disturbingly, statements made by the Chief of the Cryptographic and Electronic Analysis Unit appear to indicate that the FBI was more interested in forcing Apple to comply than getting into the device.
Now, more than two years after the Apple case, the FBI continues to make similar arguments. Wray recently claimed that the FBI confronted 7,800 phones it could not unlock in 2017 alone. But as the committee letter points out, in light of recent reports about the availability of unlocking tools developed by third-parties and the OIG reports findings that the Bureau was uninterested in seeking available third-party options, these statistics appear highly questionable. For example, a recent Motherboard investigation revealed that law enforcement agencies...
Google just announced two new "AIY" (it's like DIY, but for artificial intelligence) kits that build upon the ideas the company set forth with its first-generation kits. This time around, however, the new kits ship with everything a student might need to build AI solutions, including a Raspberry Pi Zero WH board.
Also at The Verge.
Read more of this story at SoylentNews.
The RSA Conference 2018 is underway at the Moscone Center in San Francisco. Here are a few photos from the Innovation Sandbox, where the 10 finalists Acalvio Technologies, Awake Security, BigID, BluVector, CyberGRX, Fortanix, Hysolate, ReFirm Labs, ShieldX Networks, and StackRox demonstrated their technology to conference attendees as well as a judging panel. This years winner is BigID.
The post Photo gallery: RSA Conference 2018 Innovation Sandbox appeared first on Help Net Security.
In the three weeks since GIMP 2.10 finally reached the release candidate stage a lot of changes have continued to land and today marks the GIMP 2.10 RC2 availability...
What is more fun than plugging in your phone and coming back to find your battery on empty? Stepping on a LEGO block with bare feet or arriving hungry at a restaurant after closing probably qualify. [Alex Sidorenko] wont clean your floors or order you a pizza, but he can help you understand why cheap chargers wont always power expensive devices. He also shows how to build an adapter to make them work despite themselves.
The cheapest smart device chargers take electricity from your home or car and convert it to five volts of direct current. That voltage sits on the power rails of a USB socket until you plug in a cable. If youre fortunate, you might get a measly fuse.
Smart device manufacturers dont make money when you buy an off-brand charger, and they cant speak to the current protection of them, so they started to add features on their own chargers to protect their components and profit margins. In the case of dedicated chargers, a simple resistor across the data lines tells your phone it is acceptable power. Other devices are more finicky, but [Alex Sidorenko] shows how they work and provides Eagle files to build whatever flavor you want. Just be positive that your power supply is worthy of the reliability these boards promise to the device.
Overnight Tech: Dem FCC commish stepping down | Lawmakers clash over internet 'fast lanes' | Tech giants vow not to help government cyberattacks | Tax filers to get extension after IRS tech troubles "IndyWatch Feed Tech"
CLYBURN STEPPING DOWN: Democratic FCC Commissioner Mignon Clyburn announced today that she would be stepping down, ending a nine-year tenure at the agency.She made the announcement at the FCC's open meeting on Tuesday, which Clyburn said...
While some at Oracle were busy releasing Oracle Linux 7 Update 5 as their RHEL7 downstream, the remaining Solaris developers were putting out a refreshed public beta spin of Solaris 11.4...
Threat management solutions provider Anomali announced a collaboration with Microsoft to integrate threat intelligence from the Anomali ThreatStream platform with the security insights customers can obtain from the new Microsoft Graph security API. The collaboration provides Microsoft and Anomali customers with the ability to correlate cloud service and network activity with adversary threat information. As the work progresses, the integration will provide a complete view of asset and user information from Graph providers allowing for More
The post Anomali collaborates with Microsoft to integrate threat data appeared first on Help Net Security.
The DARKNESS, shorthand for "Dark-speckle Near-infrared Energy-resolved Superconducting Spectrophotometer" reads noise and dark current, small electric currents that flow through photosensitive devices.
Together, these elements can force errors in a variety of instruments, but DARKNESS, which UC Berkeley calls the "world's largest and most advanced superconducting camera," snaps thousands of frames-per-second without being affected by either. With this accuracy, scientists can determine the wavelength and arrival time of every single photon it views.
"This technology will lower the contrast floor so that we can detect fainter planets, says DARKNESS scientist Dimitri Mawet of the California Institute of Technology in a press statement. "We hope to approach the photon noise limit, which will give us contrast ratios close to 10-8, allowing us to see planets 100 million times fainter than the star. At those contrast levels, we can see some planets in reflected light, which opens up a whole new domain of planets to explore. The really exciting thing is that this is a technology pathfinder for the next generation of telescopes."
[...] According to the team's paper [DOI: 10.1088/1538-3873/aab5e7] [DX], DARKNESS is "the first of several planned integral field spectrographs." "Our hope is that one day we will be able to build an instrument for the Thirty Meter Telescope planned for Mauna Kea on the island of Hawaii or La Palma," says UC Santa Barbara physicist and team leader Ben Mazin. "With that, we'll be able to take pictures of planets in the habitable zones of nearby low mass stars and look for life in their atmospheres."
Also at Astronomy Now.
Read more of this story at SoylentNews.
GNOME 3.29.1 was released this afternoon as the first step towards what will eventually become GNOME 3.30 in September...
The Federal Communications Commission (FCC) on Tuesday proposed a new rule that would stop government programs from using agency funds to buy equipment and services from countries that pose cybersecurity risks to the United...
CIO/CISO Interchange, a new non-profit, non-commercial organization co-founded by Philippe Courtot, Chairman & CEO, Qualys, and the Cloud Security Alliance (CSA) was launched during RSA Conference 2018. The CIO/CISO Interchange is a private, invitation-only forum for discussions, debates and exchanges between CIOs, CTOs, CISOs and security experts centered around securing the digital transformation. There are no product pitches and no sales personnel, just frank talk on important security issues to help CXOs secure the digital More
The post Photo gallery: CIO/CISO Interchange inaugural event appeared first on Help Net Security.
Last week NVIDIA released their first 396 Linux driver beta that most notably introduces their new "NVVM" Vulkan SPIR-V compiler. Coming out today is a new Vulkan beta update with some continued enhancements...
Learn about how to realize the full potential of additive manufacturing, and how to employ a robust process that integrates design, engineering, manufacturing planning, and production functions.
Part manufacturers in all industries are under tremendous pressure to shorten the delivery time of high-quality products, with increasing complexity. The Electronics Industry has its own unique challenges but one theme resonates for all; in order to stay ahead in todays competitive marketplace, companies must innovate their manufacturing processes. Additive Manufacturing (AM) offers tremendous opportunities to innovate completely new levels of competitive products, manufacturing operations, and business models. However, in order to realize the full potential of additive manufacturing, companies must employ a robust process that integrates design, engineering, manufacturing planning, and production functions.
In this webinar, we take a deeper dive into meeting this challenge head on by creating a full end-to-end additive manufacturing production system:
Having an industrialized additive manufacturing process is the key to realizing the full potential of additive manufacturing.
A Facebook investor is urging other shareholders to vote to install an oversight committee for the company, arguing that more supervision is needed after a string of controversies at the social media giant.Trillium Asset Management, an activist...
The French government is looking to move officials away from popular apps such as WhatsApp and Telegram -- even if the French president likes using them.
As Facebook continues to reel from the Cambridge Analytica saga, the French government is taking precautions against the social media behemoth's WhatsApp service.
The French government is developing its own encrypted messaging service, Reuters reported Monday. The goal is to alleviate concerns about privacy breaches, which could result in the leaking of private conversations between top officials to foreign parties.
The French government's privacy concerns come amid a backlash against Facebook following a massive data leak concerning millions of users. WhatsApp, which provides encrypted messaging services, is owned by Facebook and shares user information with its parent company -- something that hasn't sat well with privacy regulators.
In December 2016, the European Union expressed concerns over Facebook's access to WhatsApp users' data. Just a month later, the popular social messaging platform was sued in German court over the issue, while French privacy watchdog CNIL warned WhatsApp in the same year to stop sharing user data with Facebook or risk a fine. Last month, Facebook agreed not to access any data from WhatsApp until its activities are considered compliant with a Europe-wide General Data Protection Regulation expected in May.
[...] While few details are available on the French-built messaging service, a ministry spokeswoman told Reuters the app is being designed by a "state-employed developer" and tested by "about 20 officials and top civil servants." It is hoped that the use of this app will become mandatory across the government by this summer before being rolled out to all French citizens, she added.
CNET has reached out to the French government for a comment.
Read more of this story at SoylentNews.
VPN Logs Lead to Capturing of an Ex-PenAir Employee Who
This is a post from HackRead.com Read the original post: Woman who hacked airline network busted through VPN logs
Cambridge Analytica reportedly planned to raise funding through an initial coin offering (ICO) before it became the subject of controversy for improperly obtaining the data of 87 million Facebook users.The British research firm, which also worked...
Apple is reportedly planning on launching a news subscription service as a part of its integration of the magazine app Texture, which it recently acquired. The new service comes as a part of a broader push at Apple to make money from premium...
Whether you need to pump water out of your basement this spring, or just want to have fun shooting water around in the yard this summer, heres a way to build a pump instead of buying one. This is a simple but ingenious build, and [NavinK30] did everything shy of machining his own hardware and making his own tools. Well, it looks as if he might have made that drill.
As youll see in his how-to after the break, this centrifugal pump is mostly acrylic, PVC, and fasteners. [Navin] cut two sides and a base for the paddles from acrylic, and joined them with a heat-formed sidewall made of PVC. We love that he cut and bent his own paddles from sheet metal. These are bolted to a round piece of acrylic that attaches to the outside with a long hex bolt. A ball bearing mounted on the drill side allows the pump to churn freely as long as the bolt is chucked into the drill, and the hose clamp is tight enough to hold down the trigger.
Have an extra drill, but dont need to pump water? Add a camping stove and use it to power a small-batch coffee roaster.
Elon Musk took to Twitter Sunday night to announce a new recovery method for an upper-stage SpaceX rocket. A balloon a "giant party balloon" to quote him directly will ferry part of a rocket to a bounce house. Seriously.
[...] This isn't the first time a balloon has been used to return a rocket. Legendary programmer John Carmack's rocket company attempted to use a ballute in 2012 to return a rocket body and nose cone. It didn't work as planned and, according to officials at the time, the rocket made a "hard landing" around the Spaceport America property in New Mexico.
SpaceX has yet to recover the entire Falcon 9 fairing despite adding a parachute and positioning a boat to catch it.
Read more of this story at SoylentNews.
Samsung and Apple ought to unite against software patents rather than waste money (legal fees) fighting one another in court
Summary: The latest stories about two of the worlds largest phone OEMs, both of which find themselves subjected to a heavy barrage of patent lawsuits and even embargoes; Samsung has meanwhile obtained an antisuit injunction against Huawei
LAST year we explained why Apple should care about software patents and work against them rather than leverage them against rivals. VirnetX has once again won a legal case against Apple, relying on questionable USPTO patents. The lawyers have just issued a press release about the ruling, which was covered in many hundreds of sites last week. We mentioned the latest ruling as well.
A week later IAM wrote about the Pantech story, which basically involved passage of many more patents to Apple. Those are USPTO patents:
Apple has acquired a portfolio of 27 US patents from Korean smartphone maker Pantech, according to assignment records filed with the USPTO. The transfer follows the iPhone manufacturers purchase last summer of a package of 11 patents from Korean NPE Goldpeak assets which were originally owned by Pantech. The latest portfolio appears to be largely focused on wireless technology and all of the grants have been made since 2012. Pantech is a Korean smartphone maker which has struggled in recent years as its local rivals LG and Samsung have thrived in the handset sector.
This isnt really a solution to Apples problems because when patent trolls like VirnetX come knocking they just dont care what patents you have (or havent). It doesnt matter to them. These cannot impact trolls. What about Apples archrival (in p...
While the major Hollywood studios are very reluctant to bring a pirate site blocking case to their home turf, they are very active abroad.
The companies are the driving force behind lawsuits in Europe, Australia, and are also active in India, where they booked a new success last week.
Website blocking is by no means a new phenomenon in India. The country is known for so-called John Doe orders, where a flurry of websites are temporarily blocked to protect the release of a specific title.
The major Hollywood studios are taking a different approach. Disney Enterprises, Twentieth Century Fox, Paramount Pictures, Columbia Pictures, Universal, and Warner Bros. are requesting blockades, accusing sites of being structural copyright infringers.
One of the most recent targets is the popular torrent site Rarbg. The Hollywood studios describe Rarbg as a habitual copyright infringer and demand that several Internet providers block access to the site.
It is submitted that the Defendant Website aids and facilitates the accessibility and availability of infringing material, and induce third parties, intentionally and/or knowingly, to infringe through their websites by various means, the movie studios allege.
The complaint filed at the High Court of Delhi lists more than 20 Internet providers as co-defendants, and also includes Indias Department of Telecommunications and Department of Electronics and Information Technology in the mix.
The two Government departments are added because they have the power to enforce blocking orders. Specifically, the Hollywood studios note that the Department of Technologys license agreement with ISPs requires these companies to ensure that copyright infringing content is not carried on their networks.
It is submitted that the DoT itself acknowledges the fact that service providers have an obligation to ensure that no violation of third party intellectual property rights takes place through their networks and that effective protection is provided to right holders of such intellectual property, the studios write.
Last week the court granted an injunction that requires local Internet providers including Bharti Airtel, Reliance Communications, Telenor, You Broadband, and Vodafone to block Rarbg.
As requested, the Department of Tel...
Word clocks, or a matrix of light-up letters that spell out the time, are a standard build for all enterprising electronics enthusiasts. The trouble is finding the right way to drive a matrix of LEDs and the significant amount of brainpower that goes into creating a matrix of letters that will spell out the time without making it look like its supposed to spell out the time.
For his Hackaday Prize entry this year, [Stephen Legge] is creating a standard toolkit that makes word clocks easier to build. Its a hardware and software project, allowing for LED matrices of any reasonable size, and the software to make a grid of letters that only spells out the words you want and not the four-letter ones you dont.
The hardware for this project is built around the IS31FL3733 LED driver from ISSI. This is an interesting chip that takes I2C in and spits out a LED matrix with very few additional support components. This chip provides [Stephen] with a 1216 single-color LED matrix, which is more than enough for a word clock.
Where this build gets slightly more interesting is the creation of a custom matrix of letters that will still spell out quarter to noon when lit in the appropriate way. This is a big challenge in creating a customized word clock; you could always borrow the layout of the letters from another word clock, but if you want customized phrases, youll either have to sit down with a pencil and graph paper, or write some software to do it automatically.
Its a great project, and since all of [Stephen]s work is being released under Open Source licenses, its a great entry to the first portion of the Hackaday Prize where were challenging hardware creators to build Open Hardware.
Summary: EPO patent quality continues to sink while EPO management lies about it (the article above is new and not satirical) and software patents are openly being promoted/advocated
THERES NO room for humour when the EPO moves further to the right (patent extremists) while the USPTO, conversely, moves to the left. The EPO has become a rather radical organisation which not only treats workers in Medieval ways/standards but also grants monopolies similarly. It is almost as though a feudal system has reasserted control.
The EPO has become a rather radical organisation which not only treats workers in Medieval ways/standards but also grants monopolies similarly.Compare the EPO to India and to China. The Chinese government has moved so far to the right (censoring almost everything) and lowered patent quality to the point where like the EPO quality of patents is no longer recognised and dissent is not tolerated. India, contrariwise perhaps, has rejected many patents. This new article (from earlier today) speaks of confusion regarding software patents in the global IT hub, but theres no confusion; theyve banned software patents in the country a long time ago. To quote the opening paragraph:
While the world eagerly watches the development of Indias software industry, the confusion regarding software patents in the global IT hub remains considerable. This is despite or perhaps because of the three attempts by the Indian Patent Office (IPO) to establish guidelines on computer-related inventions (CRIs), each of which has provoked questions, criticism and controversy. The IPO released its latest CRI examination guidelines on June 30 2017; this chapter looks into the evolution of the guidelines, from the first set to the third, as well as the effects that they have had.
These also earned India praised, but the article (sister site of...
But the current approach, which requires specialized instructive protein molecules known as growth factors, comes with risks, including the potential development of unwanted tissue, i.e., a tumor.
Researchers at Texas A&M University, however, have discovered a gentler approach.
Four virtual reality (VR) veterans from Discovery Digital, Oculus Story Studio and Lightshed officially launched their new company out of stealth mode in San Francisco this week. Dubbed Tomorrow Never Knows, the new studio aims to use virtual and augmented reality as well as other emerging technologies including artificial intelligence for groundbreaking storytelling projects, said co-founder and CEO Nathan Brown in an interview with Variety this week.
The thesis behind the company is to consistently violate the limits of storytelling, forcing the creation of new tools, methodologies and workflow and to do this intentionally so we create original creative and technology IP, he said.
Before founding Tomorrow Never Knows, Brown co-founded Discovery VR, which has become one of the most ambitious network-backed VR outlets. Also hailing from Discovery VR is Tomorrow Never Knows co-founder Tom Lofthouse. They are joined by Gabo Arora, whose previous work as the founder of Lightshed included VR documentaries like Clouds Over Sidra and Waves of Grace, as well as Oculus Story Studio co-founder Sachka Unseld, the director of the Emmy Award-winning VR animation short Henry and the Emmy-nominated VR film Dear Angelica.
NASAs Transiting Exoplanet Survey Satellite, TESS for short, will add a powerful new tool to the hunt for Earth-like planets. Heres how scientists are going about identifying habitable exoplanets.
For tech lawyers, one of the hottest questions this year is: can companies use the Computer Fraud and Abuse Act (CFAA)an imprecise and outdated criminal anti-hacking statute intended to target computer break-insto block their competitors from accessing publicly available information on their websites? The answer to this question has wide-ranging implications for everyone: it could impact the publics ability to meaningfully access publicly available information on the open web. This will impede investigative journalism and research. And in a world of algorithms and artificial intelligence, lack of access to data is a barrier to product innovation, and blocking access to data means blocking any chance for meaningful competition.
The CFAA was enacted in 1986, when there were only about 2,000 computers connected to the Internet. The law makes it a crime to access a computer connected to the Internet without authorization but fails to explain what this means. It was passed with the aim of outlawing computer break-ins, but has since metastasized in some jurisdictions into a tool to enforce computer use policies, like terms of service, which no one reads.
Efforts to use the CFAA to threaten competitors increased in 2016 following the Ninth Circuits poorly reasoned Facebook v. Power Ventures decision. The case involved a dispute between Facebook and a social media aggregator, which Facebook users had voluntarily signed up for. Facebook did not want its users engaging with this service, so it sent Power Ventures a cease and desist letter and tried to block Power Ventures IP address. The Ninth Circuit found that Power Ventures had violated the CFAA after continuing to provide its services after receipt of the cease and desist letter and having one of its IP address blocked.
After the decision was issued, companiesalmost immediatelystarted citing the case in cease and desist letters, demanding that competitors stop using automated methods to access publicly available information on their websites. Some of these disputes have made their way to court, the most high profile of which is hiQ v. LinkedIn, which involves automated access of publicly available LinkedIn data. As law professor Orin Kerr has explained, posting information on the web and then telling someone they are not autho...
Here's a month-old article from Politico Magazine about the big business of cloudscale blockchain minery in the better Washington:
Hands on the wheel, eyes squinting against the winter sun, Lauren Miehe eases his Land Rover down the main drag and tells me how he used to spot promising sites to build a bitcoin mine, back in 2013, when he was a freshly arrived techie from Seattle and had just discovered this sleepy rural community.
The attraction then, as now, was the Columbia River, which we can glimpse a few blocks to our left. Bitcoin miningthe complex process in which computers solve a complicated math puzzle to win a stack of virtual currencyuses an inordinate amount of electricity, and thanks to five hydroelectric dams that straddle this stretch of the river, about three hours east of Seattle, miners could buy that power more cheaply here than anywhere else in the nation. Long before locals had even heard the words "cryptocurrency" or "blockchain," Miehe and his peers realized that this semi-arid agricultural region known as the Mid-Columbia Basin was the best place to mine bitcoin in Americaand maybe the world.
[...] As bitcoin's soaring price has drawn in thousands of new players worldwide, the strange math at the heart of this cryptocurrency has grown steadily more complicated. Generating a single bitcoin takes a lot more servers than it used toand a lot more power. Today, a half-megawatt mine, Miehe says, "is nothing." The commercial miners now pouring into the valley are building sites with tens of thousands of servers and electrical loads of as much as 30 megawatts, or enough to power a neighborhood of 13,000 homes. And in the arms race that cryptocurrency mining has become, even these operations will soon be considered small-scale. Miehe knows of substantially larger mining projects in the basin backed by out-of-state investors from Wall Street, Europe and Asia whose prospecting strategy, as he puts it, amounts to "running around with a checkbook just trying to get in there and establish scale."
It's pretty long for an internet article but it's got pictures.
Read more of this story at SoylentNews.
Who has all those fake Russian Facebook accounts? I think I had one, at least for a couple of days Photo: Randi Klett The real Tekla Perry.
Back in the earliest days of Facebook, before you could attach a second name to your Facebook account or before businesses could set up pages, I created two Facebook accounts. I use my original name professionally and my married name for my personal life, and so it made sense to me that I would have a professional account and a personal account.
But before I really got going with Facebook, I started using Twitter for professional postings, so the Facebook account associated with my work email just gathered digital dust. For years and years.
A couple of weeks ago, however, I started getting notices via email from Facebook pointing out that the account hadnt been updated in a while. I thought that was odd; why would Facebook suddenly care about this old account? Is it really that desperate for traffic? And I also started getting notices whenever a friend on that account (which at that point was only me, that is, my other account) posted anything new. That was annoying, and given Id never gotten these notices before, I was pretty sure updates on your friends was not something for which I had created an email alert. I tried to log on to my old work-related account to turn the notices off, but the password failed. I wrote that off to bad recordkeeping on my part and I didnt have the time to fiddle with it, so I moved on to other things.Image: Tekla Perry My Facebook profile lay dormant, until it was hijacked by an unidentified person, organization, or bot. Then Tekla Perry (real photo, at top) became Martha Negron (above). Facebooks algorithms adjusted quickly in suggesting people Martha might know.
Then last week, the notification emails started referring to me as Martha. Huh? And alerted me that I had changed my profile picture. And then came more, noting that Id added two friendsone in the Ukraine, one in Tanzaniaand suggesting a long list of possible friends, most of whom were tagged in Cyrillic. It looked like my dusty little Facebook account was turning into a Russian troll. (Ironically, my actual first name is of Russian originbut I guess you cant have a Russian troll with a Russian name.)
I dug through all of Facebooks reporting mechanismsthere wasnt any option for Im a troll. I couldnt report my own profile for abuse, only report someone elses profile, or posts someone else had made. The online menus sent me through...
EPFL's FlyJacket exosuit allows you to embody a fixed-wing drone, making it feel like you're flying Photo: EPFL LIS
It takes a lot of practice to fly a drone with confidence. Whether its a multirotor or a fixed-wing drone, there are a lot of complicated things going on all at once, and most of the control systems are not even a little bit intuitive. The first-person viewpoint afforded by drone-mounted cameras and VR headsets helps, but youre still stuck with trying to use a couple of movable sticks to manage a flying robot, which takes both experience and concentration.
EPFL has developed a much better system for drone control, taking away the sticks and replacing them with intuitive and comfortable movements of your entire body. Its an upper-body soft exoskeleton called FlyJacket, and with it on, you can pilot a fixed-wing drone by embodying the droneput your arms out like wings, and pitching or rolling your body will cause the drone to pitch or roll, all while you experience it directly in immersive virtual reality.
Weve seen a few projects that explore the same basic idea as FlyJacket; the most notable is probably Birdly, which is a sort of platform that you lie down on while wearing a VR headset, flapping your arms like a bird as a fan blows air in your face. Itll make more sense if you watch the video, and people seem to like it, but its not exactly portable (or cheap) and the amount of control that you get is fine for VR but not ideal for flying a drone in real life.
FlyJacket, on the other hand, was designed to be portable and affordable. Developed at EPFLs Laboratory of Intelligent Systems, led by Professor Dario Floreano, the exosuit doesnt require much in the way of training since its inherently so intuitive. It may look a little bit awkward, but those arm supports (which are removable) make it comfortable for long-term use by offloading the weight of your outstretched arms down to your hips. Sensors in the suit detect body motion, and translate torso pitch (bending forwards and backwards) into drone pitch, and torso roll (bending sideways) into drone roll. Its worth noting that neither of these motions require your arms to be outstretched, or really for your arms to move at all, but its instinctive for people to hold their arms out when theyre pretending to fly, and theyre more comfor...
We have reported time and again about the widespread malware
This is a post from HackRead.com Read the original post: Android malware on Play Store targeting Palestinians on Facebook
The Patent Trial and Appeal Board (PTAB) might get its role cemented by months end
Summary: Ahead of WesternGeco and Oil States, following oral proceedings, its expected that the highest court in the United States will deliver more blows to patent maximalism
TECHRIGHTS attempts to simplify things and strives to put US patent news in simple terms that anyone can understand. The USPTO and US courts just like law firms that try to impress/show off by confusing like using jargon, legalese and sometimes Latin words/phrases. Its like they encrypt everything to necessitate professional legal advice while pushing away those outside the patent microcosm (excluding it from the debate).
The US Supreme Court (SCOTUS) is a bit different. When dealing with patent matters it uses more generic terms because it looks at the matters from a Constitutional perspective and Justices unlike patent judges arent experts in these particular domains (which is a positive, not just a negative). Justices can look outside the box, so to speak, and sometimes their rulings can be expected based on what they say in oral proceedings. They very often overturn the CAFC (Federal Circuit), which historically needed patent maximalism to justify its existence.
Its like they encrypt everything to necessitate professional legal advice while pushing away those outside the patent microcosm (excluding it from the debate).The other day I publicly exchanged some messages with Daniel Nazer (EFF) regarding Oil States. Its a decision that everyone in the patent world is waiting for and it has been almost exactly a year since TC Heartland. Nazer told me that Oil States will be decided before summer after he had written about WesternGeco (not so relevant to us) as follows: Thoughts on WesternGeco hearing today in S.Ct: 1) did not go well for respondent; 2) court likely to reverse Fed Cir; 3) ruling will open door to international damages in 271(a) cases (bad) but leave open possibility comity/proximate cause cuts chain of causation in those cases. [...
Federal Communications Commissioner Mignon Clyburn on Tuesday announced that she would be stepping down from her post at the agency. Her resignation follows months of anticipation that she would leave the agency. The Democratic commissioner has held...
It seems almost absurd now, but cosmologists once assumed that galaxies of a given type were all the same and didnt change. Because of this assumption, galaxies were used as a redshift or light-based yardstick to measure distances in the universe. But what if some galaxies were intrinsically redder than others? Little to no thought was given to their origins, compositions, or evolution until Beatrice Tinsley came along.
Beatrice saw galaxies as changing bodies of stars. She believed that they grew, evolved, and died because theyre made of stars, and thats what their star populations did. To lump all galaxies together and use them as a standard candle was an oversimplification. Beatrice created the first computer model of a galaxy to prove her point and in doing so, she founded the field of galaxy evolution.
If youve never heard of Beatrice, dont feel bad. Just as her career was really beginning to take off, she developed cancer and died shortly after her 40th birthday. Though her life was short, her influence on cosmology is long-reaching.Beatrice earns her PhD in 1966. Via Science Learn NZ
Beatrice Muriel Hill was born in 1941 as WWII raged in and around Chester, England,...
Jason Barnes' Kickstarter campaign aims to drum up funds to build a duplicate that's not tied to the Georgia Tech robotics lab where it was developed Photo: Georgia Tech
Because we write so much about futuristic, cutting edge technology, were often covering things that are so brand new that only one of them may exist in the world. What we dont often discuss, though, is how frustrating it must be to get to test one of these 0ne-off inventions out, only to have to give it right back after whatever research youre participating in has concluded.
Georgia Tech professor Gil Weinberg has been developing prosthetic limbs that can play music with the help of Jason Barnes, a drummer and amputee. One cyborg arm Barnes has been fitted with allows him to play faster than humanly possible. He's used it in enough performancesincluding one at the Kennedy Centerthat he considers the arm to be a part of his musical identity now. But heres the rub: The cybernetic arm is technically the property of Georgia Tech, and doesn't belong to Barnes.
Today, Weinberg and Barnes are launching a Kickstarter campaign to raise funds to build a custom prosthetic drumming arm that Jason can take on tour. It wont be cheap, but Barnes thinks itll be worth every penny. With it, hell be able to create music that no other human has ever been able to.
The Cyborg Drummer Project Kickstarter is looking to raise $90,000; of that, $70,000 will go straight to production of the new arm. A big chunk of the cost comes from trying to replace the couple of computers and a technical team that are currently required to operate the arm with components that are portable, self-contained, and user operated. The remaining $20,000 will go towards organizing concerts and making recordings so that folks who contribute will be able to hear and enjoy some of the result, potentially in person.
One of the unique things about the prosthetic that Weinberg and Barnes want to build is that it will be partially autonomous. There are two drumsticks: Barnes controls one; the other operates autonomously through its own actuator. The arm listens to the music being played (by Jason and the musicians around him...
Last year, Google had launched its AIY (Artificial Intelligence Yourself) projects also known as AI DIY to improve and create tools that will give the developers the power to build AI into their projects. Back then, the search giant had launched two do-it-yourself kits: Voice Kit and Vision Kit, which were specially designed to integrate into educational plans.
Google in a blog post said that theyve noticed continued demand for the Voice and Vision Kits especially from the STEM audience where parents and teachers alike have found the products to be great tools for the classroom.
Now, the search giant has released updated versions of its Voice Kit and Vision Kit that are not only easy to assemble but also more widely available. This will give students and educators an easy, cheap platform for developing and programming their own smart gadgets.
Previously, the Voice Kit and the Vision Kit, had to depend upon the Raspberry Pi board, which the users had to purchase separately other than the AIY kits. However, Google has decided to make it easy for you to build your own smart speaker similar to a Google Home or a smart home camera that can detect faces and expressions by including everything that you need, including the boards in the updated versions of its Voice Kit and Vision Kit. The box will also include clear instructions on how to setup.
To make setup easier, both kits have been redesigned to work with the new Raspberry Pi Zero WH, which comes included in the box, along with the USB connector cable and pre-provisioned SD card. Now users no longer need to download the software image and can get running faster. The updated AIY Vision Kit v1.1 also includes the Raspberry Pi Camera v2, Google adds.
Google is also releasing an AIY companion app for Android, available in Google Play, to make wireless setup and configuration a snap. Google is also working on releasing an AIY companion app for iOS and Chrome very soon.
You can purchase the new Vision Kit and Voice Kit at U.S. Target Stores and Target.com for $89.99 and......
I once read in a news article (can't find it now... sorry) that apparently if you overwrite data with other data on a hard drive that the previous data is unrecoverable. So, would overwriting the entire hard drive with cat videos be just as effective as all these other "professional" security protocols that are used?
janrinok: Data erasure is important when you want to prevent anyone from recovering whatever was written on the storage device in the first instance. But there are many potential problems including just how secure does the erasure have to be, what hardware is controlling the reading and writing to the disk, are you attempting to delete data on a spinning rust device, a more modern SSD , or a thumb drive, and who are you trying to prevent from reading the data? If you are just trying to prevent a regular Joe Soap from reading what you once securely stored on a hard drive then simple overwriting might be enough. However, if you are concerned that law enforcement or a government agency might be interested in the drive's contents then you will have to take more stringent precautions. Ultimately, many of the highest classifications of data can only be securely erased by full degaussing or the physical destruction of the device. The link details the various standards that are deemed as acceptable to securely erase data to meet specific documented requirements.
Read more of this story at SoylentNews.
House Democrats and Republicans are clashing over internet fast lanes, a major sticking point for the two sides in the battle over net neutrality.Since the GOP-controlled Federal Communications Commission (FCC) overturned the Obama-era net...
Today we bring you an interview with author and researcher Dr. Josh Mitteldorf who runs the aging research blog Aging Matters.
Dr. Josh Mitteldorf is an evolutionary biologist and a long-time contributor to the growing field of aging science. His work in this field has focused on theories of aging. He asks the basic question: why do we age and die? This can seem like a silly question to people encountering it for the first time because most of us would quickly respond, Because thats just how it is; all creatures age and die eventually as their bodies wear out.
Essentially, Josh is saying, Not so fast. In fact, a lot of creatures dont age and die. Humans, as well as most other animals that do age and die, are programmed to do so. So, humans are programmed to die in much the same way that salmon are programmed to die after spawning.
While the Linux 4.17 merge window officially closed yesterday with the release of Linux 4.17-rc1, FUSE maintainer Miklos Szeredi is now trying to get his changes added.
With FUSE (File-Systems in User-Space) updates being uncommon these days, Miklos forgot about sending them into the Linux 4.17 merge window but today is trying to get them added.
Global chip-maker Intel on Tuesday announced two new technologiesThreat Detection Technology (TDT) and Security Essentialsthat not only offer hardware-based built-in security features across Intel processors but also improve threat detection without compromising system performance. Intel's Threat Detection Technology (TDT) offers a new set of features that leverage hardware-level telemetry
Microsoft yesterday announced a Linux-based operating system called Azure Sphere, an ARM-based platform for the Internet of Things (IoT) with a focus on security, at the RSA 2018 security conference. The main purpose of creating Azure Sphere is to secure millions of microcontroller-based devices that come online as part of the IoT.
Azure Sphere mainly contains three components that work together to protect and power devices at the intelligent edge: certified microcontrollers (MCUs), the Azure Sphere Security Service a cloud-based security service for connecting and security IoT devices, and Azure Sphere OS a custom Linux-based operating system, which marks the first time Microsoft has basically launched its own Linux distribution.
Microsoft says the goal is to be able to offer security protection for a 10-year lifetime of the device.
The announcement was made on Microsofts Azure blog that can be read here and a description of each new component is given below:
Azure Sphere Security Service will be compatible not only with Azure, but also with other cloud infrastructure providers such as Amazon Web Services (AWS),...
More than 30 major technology firms, including Microsoft and Facebook, signed a pledge on Tuesday agreeing that they would not assist any government in launching cyberattacks, vowing to protect all customers regardless of nationality,...
The Supreme Court on Tuesday tossed out the case the government had brought against Microsoft over whether law enforcement can search and seize data stored overseas. In a three-page order, the court said the dispute is resolved...
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog