|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Intel's growing graphics team recently hosted a "Ask You Anything" on Reddit as they solicit more feedback and ideas from the community about their discrete graphics plans. From that, interest in their Linux graphics driver/software stack came in second for popularity...
Back in August, TV companies under the Gazprom-Media umbrella filed complaints at the Moscow City Court, demanding that Yandex remove links to infringing content. Yandex initially refused to comply but under threat of ISP blocking, eventually took preventative action.
In September, the TV channels filed another four lawsuits against Yandex. The companies asked the Court to order the search provider to stop creating technical conditions that ensure the placement of [infringing] works on the Yandex.ru website.
At the time, it was reported that the underlying aim of Gazprom Media was to reach a settlement agreement with Yandex, which would see the search company take action against infringing content. That aim, it seems, is well on the way to being achieved.
The press service of Gazprom reports that settlement agreements have been reached in four lawsuits, two featuring TV3 and Super TV and another two featuring TNT and 22.
The settlements are directly linked to the landmark Memorandum of Cooperation signed by Russias most powerful tech companies and several major media companies early November.
The agreement will see the formation of a central database of infringing sites which will provide information on what content tech companies should remove from their indexes. The database will be queried every few minutes, with search platforms removing infringing links visible in Russia within six hours.
Commenting on the settlements, Gazprom Media said that the cooperation agreement signed last month represents another important step towards the development of civilized content consumption.
Reports circulating mid-November indicated that Yandex had already started to comply with the memorandums terms by deleting links to infringing content.
With DragonFlyBSD 5.4 having been recently released, development is back onto full-swing in Git master. DragonFlyBSD/HAMMER2 lead developer Matthew Dillon has been landing HAMMER2 file-system improvements that he hopes to back-port to stable in the coming weeks...
Over the years, there has been considerable discussion of Google's "filter bubble" problem. Put simply, it's the manipulation of your search results based on your personal data. In practice this means links are moved up or down or added to your Google search results, necessitating the filtering of other search results altogether. These editorialized results are informed by the personal information Google has on you (like your search, browsing, and purchase history), and puts you in a bubble based on what Google's algorithms think you're most likely to click on.
The filter bubble is particularly pernicious when searching for political topics. That's because undecided and inquisitive voters turn to search engines to conduct basic research on candidates and issues in the critical time when they are forming their opinions on them. If theyre getting information that is swayed to one side because of their personal filter bubbles, then this can have a significant effect on political outcomes in aggregate.
This is a moderately long read, as web pages go. IMO, it's well worth the time.
Read more of this story at SoylentNews.
For the most serious devotees, immortality-seeking is a full-time commitment to keeping abreast of the latest innovationsthey speak of these modalities with the same reverence a Christian would of a blessing. A $250 billion industry of antiaging products and services is there for the collectionand many of their offerings are for sale at RAADfest.
Ivan Apers, center, surrounded by participants in the RAAD Challenge, a yearlong health and fitness regimen culminating at RAADfest. Members showed off their results with a choreographed workout set to music.
Are we ready to open the doors? an event producer in a skintight catsuit asked into a headset.
Being a top athlete in this modern age is a full-time job. No longer do athletes simply practice at their nominated sport of choice. They undergo strength training, full nutritional programs, cardio, and even reflex training.
Reflex training involves a series of nodes that an athlete must identify when lit up, and touch them to switch them off. By triggering them in a fast sequence, the athlete must work hard to both identify the lit node and then move to switch it off. TrainerLights is just such a system, built around the NodeMCU platform.
The system consists of a minimum of four lights one acting as a server, the others as nodes. The lights each contain a nodeMCU board which communicates over WiFi, while the server has an additional board acting as a WiFi hotspot that controls the system.
With the lights switched on, the coach connects to the server with a smartphone, and configures the lighting sequence and timings depending on the desired excercise regime. The server then communicates with the lighting nodes, which light their LEDs at specified intervals. The athlete must clear the lights by swiping at the nodes, which detect the athletes hand via an ultrasonic proximity sensor. The sensitivity is configurable, to allow the system to trigger from a distant wave or a direct touch from the athlete. This allows a variety of training uses, from tennis to taekwondo.
With a 3D printed case and parts readily available from any good maker supplier, its a project you could tackle in a weekend to add to your own training regime.
We see plenty of athletic hacks in these parts like this line-following robot for training sprinters. Video after the break.
[Thanks to Baldpower for the tip!]
With the rise of A.I., and studies that repeatedly suggest that workers productivity actually increases during shorter work days, the work week is poised to undergo a major transformation in the coming years.
The billionaire entrepreneur predicts the rise of technology will soon force society to rethink the modern work week.
The sole difference between the 'MAN' and a slave has always been a handful of cash. Claiming otherwise is utter rubbish whatever racist meme you buy into.
Let me show you ECONOMICS 101. This is not taught at the best schools. Approximately one fifth of society is not sufficiently monetized. They are called poor. Yet the per capita income is less than that of the next fifth and up. Paying direct attention just to that fifth to ensure monetization and internal success will flush cash up into the top four fifths.
My central point is that making sure that the so called poor are doing fine will cause the rest to do just dandy.
Now simply handing over cash is not that efficient but considering that intelligent decision making is generally impossible at the level of so called government it may be the only way in most countries.
Everyone now becomes the MAN and invests in himself which rapidly expands the economy.
[...] Assuming these electric aircraft could be built, would they actually lower emissions? At present, no. Given the average emissions involved with powering the US grid, the emissions involved with powering an electric aircraft (including losses during transmission) would be about 20 percent higher than those generated by a modern, efficient jet engine. That doesn't mean they'd be entirely useless from a climate perspective, though. Once the additional warming effects of aircraft are taken into consideration, the electric aircraft comes out ahead by about 30 percent.
Future considerations complicate things pretty quickly, though. The price of renewable energy is expected to keep dropping, which will make renewables a larger part of the grid, lowering the emissions. The authors estimate that the vast majority of charging will take place during daylight hoursthe peak of solar productionas well. Assuming future solar production leads to a discount on electric use during the day, it could help the economics of electric aircraft; currently, they only make sense economically with fuel at about $100/barrel.
How all of this would affect air travel is very sensitive to the capacity of future batteries. The authors estimate that an effective range of about 1,100 kilometers would allow electric aircraft to cover 15 percent of the total air miles (and corresponding fuel use) and nearly half the total flights. That would raise the total electricity demand by about one percent globally, although most of that would affect industrialized nations. Upping the range to 2,200 kilometers would allow 80 percent of the global flight total to be handled by electric aircraft.
Zeppelins still don't seem to figure into the answer.
Read more of this story at SoylentNews.
Raj Meel has announced the availability of the fourth service pack for SUSE Linux Enterprise 12, the current legacy branch of the company's commercial, enterprise-class distribution with long-term support of over 10 years: "SUSE Linux Enterprise 12 Service Pack 4 is now generally available. Service Pack 4 marks....
Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as 'Magellan' by Tencent's Blade security team, the newly discovered SQLite flaw could allow remote attackers to execute arbitrary or malicious code on affected devices, leak program memory or crash applications. SQLite is a
Miguel Aznar, Director of Education at the Foresight Institute, joins our Nanotechnology Board.
For professional-level sound recording, youll need professional-level equipment. Microphones and mixing gear are the obvious necessities, as well as a good computer with the right software on it. But once you have those things covered, youll also need a place to record. Without a good acoustic space, youll have all kinds of reflections and artefacts in your sound recordings, and if you cant rent a studio you can always build your anechoic chamber.
While it is possible to carpet the walls of a room or randomly glue egg crate foam to your walls, [Tech Ingredients] tests some homemade panels of various shapes, sizes, and materials against commercially available solutions. To do this he uses a special enclosed speaker pointed at the material, and a microphone to measure the sound reflections. The tests show promising results for the homemade acoustic-absorbing panels, at a fraction of the cost of ready-made panels.
From there, we are shown how to make and assemble these panels in order to get the best performance from them. When dealing with acoustics, even the glue used to hold everything together can change the properties of the materials. We also see a few other cost saving methods in construction that can help when building the panels themselves as well. And, while this build focuses on acoustic anechoic chambers, dont forget that there are anechoic chambers for electromagnetic radiation that use the same principles as well.
Thanks to [jafinch78] for the tip!
The Khronos Group is looking for feedback on its KTX2 specification that is used for storing textures for OpenGL (including GLES) and Vulkan while being a simple format and an extension of the original KTX with improvements for Vulkan and other graphics APIs...
Via: Reuters: A federal judge in Texas on Friday ruled the Affordable Care Act, commonly known as Obamacare, was unconstitutional based on its mandate requiring that people buy health insurance, a decision in a case that could reach the U.S. Supreme Court. U.S. District Judge Reed OConnor in Fort Worth agreed with a coalition of 
[...] only 17% of their [elderly] clients currently access the internet. As Jack explains: "Family and friends often use technology to find out things for me when I am stuck. However, most of my friends do not have internet access. They did not use technology in their working lives, as they were either farmers or manual workers. They still just ring people up or ask their children or grandchildren to use technology for them."
Technology can help, as long as it focuses on helping older people with overcoming the concerns that hold them back from meeting people outside the house. Using the insights from the research, we developed an app that draws on open data about events and volunteering opportunities nearby.
Older people can create user profiles to set their preferences for events according to cost and location. They can then review the transport options and routes to the event on an age-friendly map which includes the location of bus stops and car parks as well as nearby toilets and benches. If they select an event they want to attend, it's recorded in a calendar. The app can also be accessed by family, friends or carers who can search and plan on their behalf. This allows for the app to also be beneficial to older adults that do not have internet access.
But, even with this support, it's striking how few listings of events and transport options were available for older people over the festive period. Without more efforts to remedy the crisis of loneliness and isolation in the elderly, the festive season may still be anything but a season of cheer for many.
If kids and grandkids can't go to grandma's house, an app can help grandma come to them?
Read more of this story at SoylentNews.
Seneca Valley virus sounds like the last bug youd want to catch, but it could be the next breakthrough cancer therapy. Now, scientists at the Okinawa Institute of Science and Technology (OIST) and the University of Otago have described exactly how the virus interacts with tumorsand why it leaves healthy tissues alone.
The study, published in the Proceedings of the National Academy of Sciences on October 29, 2018, provides the first detailed images of how the complex Seneca Valley virus forms with its preferred receptor. The researchers used cryo-electron microscopy to capture images of over 7000 particles and rendered the structure in high resolution. They predict their results will help scientists develop the virus, and other viral drug candidates, for clinical use.
If you have a virus that targets cancer cells and nothing else, thats the ultimate cancer fighting tool, said Prof. Matthias Wolf, principal investigator of the Molecular Cryo-Electron Microscopy Unit at OIST and co-senior author of the study. I expect this study will lead to efforts to design viruses for cancer therapy.
And how to build a time machine.
The concept of time travel has always captured the imagination of physicists and laypersons alike. But is it really possible? Of course it is. Were doing it right now, arent we? We are all traveling into the future one second at a time.
But that was not what you were thinking. Can we travel much further into the future? Absolutely.
If we could travel close to the speed of light, or in the proximity of a black hole, time would slow down enabling us to travel arbitrarily far into the future. The really interesting question is whether we can travel back into the past.
The innovators and discoverers of tomorrow took centre stage in Chesterfield Inlet when Victor Sammurtok School (VSS) hosted its Elementary Science Fair on Dec. 4. Local fairs in schools across the region led up to the Kivalliq Science Educators Communitys (KSEC) Kivalliq Regional Science Fair, where students were vying for the right to represent the
Scientists have detected a so-called Hot Neptune losing atmosphere extremely quickly, possibly explaining why we find so few of them in the first place.
To tackle widespread scientific misconduct, the Chinese government has expanded its controversial social credit system to include infractions made by research scientists. The plan could scare some scientists straightbut the potential for abuse is very real.
Researchers in China who commit scientific misconduct could soon be prevented from getting a bank loan, running a company or applying for a public-service job, reports science writer David Cyranoski at Nature News.
Ethan Siegel, author of "Treknology: The Science of Star Trek from Tricorders to Warp Drive", joins our Cosmology Board.
Many people hear fungus and think of mushrooms. This is akin to hearing trees and thinking of apples. Fungus makes up 2% of earths total biomass or 10% of the non-plant biomass, and ranges from the deadly to the delicious. This lecture by [Justin Atkin] of [The Thought Emporium] is slightly shorter than a college class period but is like a whole semesters worth of tidbits, and the lab section is about growing something (potentially) edible rather than a mere demonstration. The video can also be found below the break.
Lets start with the lab where we learn to grow fungus in a mason jar on purpose for a change. The ingredient list is simple.
Combine, sterilize, cool, inoculate, and wait. We get distracted when cool things are happening so shopping around for these items was definitely hampered by listening to the lecture portion of the video.
We made a huge list of notes from the video, and they are the refined tidbits from years of research. Here is the top of our list, so this is the double-distilled list. Mushrooms are only the fruiting portion of a fungus. A fungus is the largest single organism on the planet at three-and-a-half kilometers across. Fungi are analogous to natures digestive system and were the first things to digest wood, which went untouched for fifty-million years. If there is something a fungus cannot eat, it will focus its nuclei there, and if it figures out a solution, the genetic information is passed to the rest of the organism. Certain strains hunt, for example Cordyceps turn insects into zombies, drive them like a Huffy to someplace tall before sprouting from the head of the creature to distribute spores. That somewhat grizzly example is also highly prized for its medicinal value.
Microbes could become key allies in global efforts to curb carbon emissions and avoid dangerous climate change. A group of microbes called chemolithoautotrophs consume CO2 through their natural metabolism, spitting out small organic molecules as a byproduct. These microbes could be enlisted to convert industrial CO2 emissions into valuable chemicals, thanks to a new concept developed by Pascal Saikaly and his team at KAUST.
[...] To harness chemolithoautotroph capabilities for recycling CO2 emissions into useful chemicals, researchers supply electrons to the microbes in a process called microbial electrosynthesis (MES). Typically, MES reactors have grown chemolithoautotrophs on a submerged flat-sheet cathode and bubbled CO2 gas into the solution, but this setup has two key limitations, explains Manal Alqahtani, also a Ph.D student in the team. Flat-sheet cathodes are difficult to scale up and CO2 gas has poor solubility.
The team developed an alternative MES reactor using cathodes made from stackable, cylindrical porous nickel fibers that Saikaly's group had previously applied to recover water and energy from wastewater. CO2 is pumped through each cylinder, and electrons flow along it. "Using this architecture, we directly deliver CO2 gas to chemolithoautotrophs through the pores in the hollow fibers," Alqahtani says. "We provided electrons and CO2 simultaneously to chemolithoautotrophs on the cathode surface."
Will the microbes demand minimum wage for remediating our excess carbon dioxide?
Read more of this story at SoylentNews.
Virgin Galactic just brought human spaceflight back to American soil after a seven-year hiatus, and other private companies are poised to make some giant leaps of their own.
Virgins VSS Unity suborbital spaceliner soared to a maximum altitude of 51.4 miles (82.7 kilometers) during a rocket-powered test flight over Californias Mojave Desert yesterday (Dec. 13).
The milestone marked the first U.S.-based crewed trip to the final frontier since NASA grounded its space shuttle fleet in July 2011. And it was the first spaceflight ever by a private vehicle designed to carry commercial passengers. (By one measure, anyway: Though many people place the boundary of outer space 62 miles, or 100 km, up at the Karman Line, the U.S. Air Force awards astronaut wings to personnel who reach an altitude of 50 miles, or 80 km.) [In Photos: Virgin Galactics SpaceShipTwo Unity Soars to Space].
Submitted via IRC for SoyCow1984
You're probably used to the presence of facial recognition cameras at airports and other transport hubs, but what about at concerts? That's the step Taylor Swift's team took at her May 18th show at the Rose Bowl, in a bid to identify her stalkers. According to Rolling Stone, the camera was hidden inside a display kiosk at the event, and sent images of anyone who stopped to look at the display to a "command post" in Nashville, where they were cross-referenced with other photos of the star's known stalkers.
As the target of numerous death and rape threats, Swift arguably has a valid motivation for leveraging such technology. However, it's unclear who has ownership of the photos of her concertgoers, or how long they will remain on file. Her representatives have also not yet responded to queries as to whether fans knew about the cameras.
Read more of this story at SoylentNews.
[ByTechLab] needed an enclosure for his R820T2 based RTL-SDR, which sports an SMA connector. Resolving to design and 3D print one in less than a day, he learned a few things about practical design for 3D printing and shared them online along with his CAD files.
The RTL-SDR is a family of economical software defined radio receivers, and [ByTechLab]s enclosure (CAD files available on GrabCAD and STL on Thingiverse) is specific to his model. However, the lessons he learned are applicable to enclosure design in general, and a few of them specifically apply to 3D printing.
He started by making a basic model of the PCB and being sure to include all large components. With that, he could model the right voids inside the enclosure to ensure a minimum of wasted space. The PCB lacks any sort of mounting holes, so the model was also useful to choose where to place some tabs to h...
Nearly two years before the U.S. government's first known inquiry into the activities of Reddit co-founder and famed digital activist Aaron Swartz, the FBI swept up his email data in a counterterrorism investigation that also ensnared students at an American university, according to a once-secret document first published by Gizmodo.
The email data belonging to Swartz, who was likely not the target of the counterterrorism investigation, was cataloged by the FBI and accessed more than a year later as it weighed potential charges against him for something wholly unrelated. The legal practice of storing data on Americans who are not suspected of crimes, so that it may be used against them later on, has long been denounced by civil liberties experts, who've called on courts and lawmakers to curtail the FBI's "radically" expansive search procedures.
The government does store information indefinitely that can be used against you later at a more convenient time.
Read more of this story at SoylentNews.
Florida residents, you have a new neighbor and it has the body of an eel and the spots of a leopard. It also has two small arms with gills sticking out of its body, and lives in the swamps of the Panhandle.
The creature is actually a new species of legless salamander or siren. It is being officially called Siren reticulata, or the Reticulated Siren, and its discovery was published in the journal PLOS One journal last week.
Scientists say the two-foot-long Reticulated Siren is among the largest species discovered in the United States in over 100 years.
Another day, another privacy breach This time, the social media giant Facebook has announced that a bug in its Photo API exposed private photos of over 6.8 million users to third-party app developers. The breach took place from September 13 to September 25, 2018, which means for 12 days straight some developers could view your 
This is a post from HackRead.com Read the original post: Facebook bug exposed private photos of 6.8M users to third-party developers
Inspired by the man who showed the way to modern computing, tech-minded experts shared ideas for how to tackle climate change, nuclear proliferation, and broken political systems
Fifty years ago this month Doug Engelbart demonstrated what weve come to know as computingthe mouse, hypertext, and windows. His goal wasnt to revolutionize computing per se, it was to give people better tools for collaboration, which he hoped would lead to better ways to fix the real problems of society. (Moving a cursor around a display, while sometimes challenging before the mouse, was not a real societal problem.)
He thought the single greatest existential challenge of our time was to raise the curve on our ability to collectively solve problems, said Christina Engelbart, Doug Engelbarts daughter, who spoke at the Computer History Museum in Mountain View, Calif., this week, along with a group of tech execs, futurists, and other people interested in tackling todays big problems.
How are we doing in terms of meeting that challenge? According to Christina, her father, who died in 2013, would say, Great effort guys, but there is one problem. That problem involves technology evolving on a much faster path than the organizations that have to manage it. The explosion of digital technology unchecked is a threat multiplier, and that gap is a cause for concern, she said.
Christina remains hopeful that organizations can catch up, and finally realize her fathers vision of using technology to find answers to critical problems.
To get there, said futurist Paul Saffo, We need more Engelbarts, more people who are long distance thinkers, long distance doers, tackling the greatest challenges that lay ahead.
Saffo then brought three people on stage who hope to tackle big issuesclimate change, political dysfunction, and nuclear proliferationwith a long term perspective. Heres what those would-be Engelbarts are doing:Photo: Douglas Fairbairn/CHM Paul Saffo (left), Erika Gregory, Ben Rattray, and Erika Woolsey discuss how Doug Englebart's approach of using technology to augment human capabilities can help address today's toughest problems.
On climate change:
Stanford marine biologist...
Mars Reconnaissance Orbiter may not have managed to spot InSight under its parachute, but it has finally spotted the lander, its parachute, and its heat shield resting on the Martian surface. The images confirm the location of InSights landing site, a little to the north and west of the center of the landing ellipse.
First, the fantastic hardware images:
Hillicon Valley Presented by AT&T Facebook bug exposed photos of up to 6.8M users | Canada warns Trump not to intervene in Huawei case | Tech giant accused of providing cybersecurity to terror groups "IndyWatch Feed Tech"
Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...
Indirect function calls calls to a function whose address is stored in a pointer variable have never been blindingly fast, but the Spectre hardware vulnerabilities have made things far worse. The indirect branch predictor used to speed up indirect calls in the CPU can no longer be used, and performance has suffered accordingly. The "retpoline" mechanism was a brilliant hack that proved faster than the hardware-based solutions that were tried at the beginning. While retpolines took a lot of the pain out of Spectre mitigation, experience over the last year has made it clear that they still hurt. It is thus not surprising that developers have been looking for alternatives to retpolines; several of them have shown up on the kernel lists recently.
EFF doesnt endorse products. But as Internet-connected products proliferate, ads for them bombard holiday shoppers with promises of a more streamlined life. And they do so without always divulging that theyre tracking you more than a jolly fat man who sees when youre sleeping and knows when youre awake.
So, we are taking a different approach to the holiday gift guide: highlighting products that raise red flags for us, as privacy-conscious digital advocates. Here are some gifts being pushed this year that, from a privacy or security standpoint, are on our naughty list.
Youve probably seen the ads for Facebooks in-home camera, Portal, which its advertising as a way to keep in touch via video call with friends and loved ones wherever they are. If you cant be there, feel there, is the maudlin tagline for the camerawhich can follow you around the room during video-conferences.
Facebook has made some nods to privacy with this product, namely including a camera cover and a promise that its not using the companys facial recognition technology to identify you. And Portal itself doesnt serve you ads.
Still, Facebook has already had to change its tune about the extent to which it uses Portal data for advertising, first saying that no data would be used to serve Facebook users ads, and then being forced to clarify.
Data from Portal does, in fact, inform ads. This includes the fact that you logged into your account or how often you use a feature or app. What does that mean? Facebook offers the example that if you make a lot of video calls, you may see ads related to video calling.
Its also collecting everything that Messenger collects, including usage data such as length of calls, frequency of calls, along with aggregate usage of ads, which could also inform your advertising profile.
Facebook has a history of changing the terms of how it uses your data, which is worth keeping in mind as you consider giving it a place in your home. The companys practices have drawn its fair share of trust issues this year, to say the least, and have shown a certain disregard for notifying people of how its using their data....
Submitted via IRC for SoyCow1984
Last week, the Australian government passed the country's controversial Access and Assistance Bill 2018 into law, legislation that allows government agencies to demand access to encrypted communications. Companies that don't comply with the new law could face fines of up to AU$10 million ($7.3 million). A number of companies that stand to be affected have spoken out about the legislation, and Signal has now joined in, explaining that it won't be able to fulfill such requests if asked.
"By design, Signal does not have a record of your contacts, social graph, conversation list, location, user avatar, user profile name, group memberships, group titles or group avatars," Signal's Joshua Lund wrote in a blog post. "The end-to-end encrypted contents of every message and voice/video call are protected by keys that are entirely inaccessible to us." Lund added that Signal is open source, meaning anyone can "verify or examine the code for each release." "People often use Signal to share secrets with their friends, but we can't hide secrets in our software," he wrote. "We can't include a backdoor in Signal."
Read more of this story at SoylentNews.
Over the past two decades, the Software Alliance (BSA) has represented major software companies including Adobe, Apple, Microsoft and Oracle, in their fight against under-licensed businesses.
This has resulted in audits at thousands of companies worldwide, whose computers are carefully inspected to see if the business owner has failed to pay his or her dues.
Some of these audits have been controversial and the evidence collection process has raised eyebrows as well. Especially BSAs explicit attempts to convince people to report companies in exchange for hard cash.
In recent years, the industry group has actively solicited such tips from the public. Legitimate leads are then followed up with a thorough investigation or audit, something many companies are contractually obliged to agree to.
If unlicensed software is found during an audit, BSA tries to negotiate a settlement. This is what happened with an unnamed Australian manufacturing company, CRN reports.
Its not clear what type of software was used improperly. What we do know is that the tip came from an anonymous informant who presumably works or worked at the company in question.
We work in a competitive industry and while were all trying to get ahead, it didnt feel right using infringing copies of software to give the business an unfair competitive advantage, the informant reportedly told BSA.
The decision to report the business ultimately came down to my personal morals and ethics. I dont believe its right to use software without paying for it.
Its unclear whether the informant also raised the issue internally, but that doesnt matter anymore. The BSA followed up the lead which eventually led to a significant AU$160,000 settlement.
The whistleblower, tipster, or rat, depending on which side youre on, fared well too.
BSA says that the information it receives from informants is invaluable. It plays a critical role in identifying misbehaving companies and holding them accountable, so its worth a reward.
BSA is grateful to the informant for doing the right thing, and have provided the informant with a reward of AU$10,000 for his assistance in this mat...
Facebook co-founder Chris Hughes a millionaire many, many times over is behind this big idea.
Chris Hughes earned nearly half a billion dollars after co-founding Facebook. Now hes arguing for fairer wages in the form of a $500 monthly social dividend for low- and middle-class Americans.
T-Mobile and Sprint are close to getting a national security panel to sign off on their $26 billion merger after their parent companies agreed to consider cutting back on buying telecommunications equipment from Huawei, Reuters reported Friday....
Its brilliant and insidious!
These assassins could help in the fight against antibiotic resistance.
Fruit can be a tricky thing: if you buy it ripe youll be racing against time to eat the pieces before they turn into a mushy mess, but if you buy the ones which are a bit before their prime its not always easy to tell when theyre ready to eat. Do you smell it? Squeeze it? Toss it on the counter to see if it bounces? In the end you forget about them and they go bad anyway. Thats why here at Hackaday we sustain ourselves with only collected rainwater and thermo-stabilized military rations.
But thankfully Cornell students [Christina Chang], [Michelle Feng], and [Russell Silva] have come up with a delightfully high-tech solution to this decidedly low-tech problem. Rather than rely on human senses to determine when a counter full of fruit has ripened, they propose an automated system which uses a motorized spectrometer to scan an arrangement of fruit. The device measures the fruits reflectance at 678 nm, which can be used to determine the surface concentration of chloroph...
In news that nobody could have foreseen and will be a shock to everyone:
The on-paper assessment represents a realization that Verizon's online ad strategy, called Oath, is a bust.
Only a year and a half after it built Oath from the assets of the communications giants Yahoo and AOL, Verizon now says they're virtually worthless. In a filing Tuesday with the Securities and Exchange Commission, or SEC, Verizon Communications Inc. said it was taking a $4.6 billion charge on the goodwill balance of Oath, the division it created in June 2017 after it spent billions of dollars to buy Yahoo Inc. and AOL Inc.
[...] Oath was supposed to be Verizon's big push into web-driven advertising, a bid to compete with behemoths like Google LLC and Facebook Inc. in the U.S. online ad market, which the Internet Advertising Bureau projects could top $100 billion this year. But rather than eat into Google's and Facebook's market shares, Oath's ad revenue fell by 7 percent in the third quarter, which ended Sept. 30, to just $1.8 billion.
Google's parent company, Alphabet Inc., by comparison, hoovered up $29 billion in ad revenue in the same three months, a rise of more than 10 percent over the previous quarter. [...] Meanwhile, the growth of another player, Amazon Advertising which outpaced Oath with $2.5 billion in ad sales in the third quarter has pushed Oath even lower down the food chain.
[...] Writing off 96 percent of its value is like "ripping off the Oath band-aid," Fritzsche wrote. [...] Verizon bought AOL for $4.4 billion in 2015, and it bought Yahoo for $4.5 billion in 2017. It then merged them into a new venture called Oath.
Who could possibly have imagined that with big names like AOL and Yahoo! this venture wouldn't compete well against the mere likes of Google, Facebook, and Amazon.
Submitted via IRC for SoyCow1984
Verizon's Oath division failing in ad market, and it could get even worse.
Six teams won US $750,000 each by showing that their AIs could responsibly manage spectrum
Its not clear which is more challenging: constructing AIs that can collaboratively learn to manage radio spectrum more effectively than humans can, or presenting the results in a way that isnt snooze-inducing. Yet both were accomplished during Phase 2 of the U.S. Defense Advanced Research Projects Agencys (DARPA) Spectrum Collaboration Challenge (SC2), held on 12 December at the Johns Hopkins University Applied Physics Lab.
For three hours, presenters cracked jokes and gave a play-by-play rundown of test results, complete with hand-drawn circles and arrows, that would have made any sportscaster proud. While watching replays of the most high-stakes tests, the audience gasped and cheered and shouted encouragement at the AI programs.
AI-managed spectrum allocation might not seem important enough to celebrate with such zeal. But bandwidth is a finite resource, and engineers are searching for ways to squeeze as many bits as possible out of every hertz. One way to avoid a spectrum crunch is to teach machines to be better at managing bandwidth than humans could ever hope to be. That idea is important enough that DARPA has dedicated a Grand Challenge to it, which completed its Phase 1 competition in December 2017.
Rather than regulators chopping spectrum into defined, rigidly-allocated bands, the hope is that devices can learn to autonomously manage their own spectrum use. That means training devices to listen for gaps in transmissions on viable frequencies, broadcast which frequencies they intend to use ahead of time, and perhaps most importantly, negotiate with nearby devices that also need to send and receive signals.
DARPA tested those skills in a series of matches representing scenarios that such an AI might encounter in the real world, like managing transmissions from squads of soldiers deployed in an urban environment, or from Wi-Fi routers trying to deliver service despite a nearby radio jammer.
Each AI scored points based on the number of connections it was able to deliver using the available spectrumspectrum it was sharing with two, three, or four other AIs at a time. The kicker is that all the participating AIs in each match only earned as many points as the lowest-scoring AI in the group, to ensure the AIs were sharing resources fairly rather than battling for spectrum supremacy.
DARPA tallied the points each AI earned across the more than 400 ma...
Facebook announced that photos of 6.8 Million users might have
been exposed by a bug in the Photo API allowing third-party apps to
The bug impacted up over 870 developers, only apps granted access to photos by the user could have exploited the bug.
According to Facebook, the flaw exposed user photos for 12 days, between September 13 and September 25, 2018.
The flaw was discovered by the Facebook internal team and impacted users who had utilized Facebook Login and allowed third-party apps to access their photos.
Our internal team discovered a photo API bug that may have affected people who used Facebook Login and granted permission to third-party apps to access their photos. We have fixed the issue but, because of this bug, some third-party apps may have had access to a broader set of photos than usual for 12 days between September 13 to September 25, 2018. reads a post published by Facebook.
Theoretically, applications that are granted access to photos could access only images shared on a users timeline. The bug could have exposed also other photos, including ones shared on Facebook Marketplace or via Stories, and even photos that were only uploaded but not posted.
Currently, we believe this may have affected up to 6.8 million users and up to 1,500 apps built by 876 developers. The only apps affected by this bug were ones that Facebook approved to access the photos API and that individuals had authorized to access their photos. continues the post.
Facebook is notifying impacted people via an alert in their account.
Were sorry this happened. Early next week we will be rolling out tools for app developers that will allow them to determine which people using their app might be impacted by this bug. We will be working with those developers to delete the photos from impacted users. concludes Facebook.
We will also notify the people potentially impacted by this bug via an alert on Facebook. The notification will direct them to a Help Center link where theyll be able to see if theyve used any apps that were affected by the bug.
Will AI transform or replace the Humanities?
Artificial Intelligence has the potential to revolutionize the Humanities by transforming how we analyze texts.
Kelly Robson, author of "A Human Stain", joins our Futurists Board. This story won the Nebula Award for Best Novelette.
With FreeBSD 12.0 running great on the Dell PowerEdge R7425 server with dual AMD EPYC 7601 processors, I couldn't resist using the twenty Samsung SSDs in that 2U server for running some fresh FreeBSD ZFS RAID benchmarks as well as some reference figures from Ubuntu Linux with the native Btrfs RAID capabilities and then using EXT4 atop MD-RAID.
A startup based in Maryland has released and tested an impressive new quantum computer that demonstrates the power of an occasionally overlooked quantum computing architecture.
Companies like IBM, Google, and Rigetti are developing new kinds of computer processors that rely on the mathematics of subatomic particles to potentially perform calculations difficult for classical computers to do. These devices use superconductors as the basis for their qubits. A company called IonQ, however, has now announced a state-of-the-art system that relies on the quantum nature of atoms themselves, and its one of the best-performing quantum computers yet.
Mariea five-foot-one, fifteen-pound 3D printed bodycould be used to help create better radiation treatments for cancer.
There will be no New Years Eve revelry for those working on NASAs New Horizons space probe. They will need to be stone cold sober with their wits about them when, on New Years Day 2019, it whizzes past one of the fossil building blocks of the planets and one of the most primitive bodies in the Solar System.
If youre into amateur rocketry, you pretty quickly outgrow the dinky little Estes motors that they sell in the toy stores. Many hobbyists move on to building their own homebrew solid rocket motors and experimenting with propellant mixtures, but its difficult to know if youre on the right track unless you have a way to quantify the thrust youre getting. [ElementalMaker] decided hed finally hit the point where he needed to put together a low-cost test stand for his motors, and luckily for us decided to document the process and the results.
The heart of the stand is a common load cell (the sort of thing youd find in a digital scale) coupled with a HX711 amplifier board mounted between two plates, with a small section of vertical PVC pipe attached to the topmost plate to serve as a motor mount. This configuration is capable of measuring up to 10 kilograms with an 80Hz sample rate, which is critically important as these type of rocket motors only burn for a few seconds to begin with. The sensor produces hundreds of data points during the short duration of the burn, which is perfect for graphing the motors thrust curve over time.
Given such a small window in which to make measurements, [ElementalMaker] didn̵...
Yalda Mousavinia, Cofounder of the Space Cooperative, joins our Space Settlement Board.
Submitted via IRC for SoyCow1984
Virgin Galactic has come a long way since its tragic 2014 crash. The company's SpaceShipTwo has reached space after months of testing, flying to an altitude of 271,268 feet before returning to Earth. The stay was brief (SST fired its rocket for all of a minute), but it was enough to both verify the spacecraft as well as conduct four NASA-backed scientific experiments that studied the effects of microgravity and devices that could handle life support and counteract vibration.
[...] Actual passenger flights aren't likely to happen for some time. Virgin stressed that it wanted to finish its tests "safely," not just quickly. The successful visit to space makes that more a question of when than if, though, and suggests that Richard Branson might be vaguely realistic when he talks about hopping aboard his own flight within months.
Read more of this story at SoylentNews.
AlphaRacks own Julian is back with with some exclusive holiday promotions on SSD KVM VPS and Hybrid Dedicated Servers, located within the QuadraNet Los Angeles datacenter. They have been operating since 2013, and are one of the original LEB hosting providers! We have featured them on LowEndBox numerous times in the past, and look forward to sharing their new offers with you today as it is something new!
Their WHOIS is public and you can find their ToS/Legal Docs here. They accept PayPal, Credit Cards (via 2Checkout), Bitcoin, and Alipay. as payment methods.
Heres what they had to say:
AlphaRacks is a premium web hosting provider based in Los Angeles, CA. Initially started in 2006 as an on-site IT consultancy firm providing support to local businesses, the AlphaRacks brand was launched in 2013 offering mainstream premium hosting services to both web start-ups and large enterprises. We currently support over 40,000 clients of all sizes in over 100 countries worldwide. Support is provided 24x7x365 by our in-house dedicated staff; services are provided by leveraging strategic partnerships of top tier facility and network providers, ensuring the services we deliver are highly available; which is backed by our service level promise agreement to you.
Heres the offers:
**Docker, Custom ISOs, and kernels are fully supported with the below offers!**
1GB SSD KVM VPS
2GB SSD KVM VPS
American tech giant Cloudflare is providing cybersecurity to at least seven terrorist organizations and militant groups, HuffPost reported Friday.Cloudflare has more server traffic than Twitter, Amazon, Apple, Instagram, Bing and Wikipedia...
The attack was carried out by Iran-backed charming kitten hackers and victims include dozens of US government officials. Private emails of US sanctions officials and nuclear scientists have been breached by Iranian state-sponsored hackers. As per the data obtained by Certfa, a cybersecurity firm based in London, the hacking group Charming Kitten is responsible for the 
This is a post from HackRead.com Read the original post: Hackers bypassed Gmail & Yahoos 2FA to target US officials
Posted by Dmitri Shuralyov on Dec 14Hello,
Implanted electronics are typically large, require batteries, and sometimes need replacementbut new technology could change that.
Some of the devices even dissolve in the body once their work is done.
If you were to invent a time machine and transport a typical hardware hacker of the 1970s into 2018 and sit them at a bench alongside their modern counterpart, youd expect them to be faced with a pile of new things, novel experiences, and exciting possibilities. The Internet for all, desktop computing fulfilling its potential, cheap single-board computers, even ubiquitous surface-mount components.
What you might not expect though is that the 2018 hacker might discover a whole field of equivalent unfamiliarity while being very relevant from their grizzled guest. Its something Scott Swaaley touches upon in his Superconference talk: Lessons Learned in Designing High Power Line Voltage Circuits in which he describes his quest for an electronic motor brake, and how his experiences had left him with a gap in his knowledge when it came to working with AC mains voltage.
If you think about it, the AC supply has become something we rarely encounter for several reasons. Our 1970s hacker would have been used to wiring in mains transformers, to repairing tube-driven equipment or CRT televisions with live chassis, and to working with lighting that was almost exclusively provided by mains-driven incandescent bulbs. A common project of the day would have been a lighting dimmer with a triac, by contrast we work in a world of microcontroller-PWM-driven LEDs and off-the-shelf switch-mode power supplies in which we have no need to see the high voltages. It may be no bad thing that we are rarely exposed to high-voltage risk, but along the way we may have lost a part of our collective skillset.
Scotts path to gaining his mains voltage experience started in a school workshop, with a bandsaw. Inertia in the saw kept the blade moving after the power had been withdrawn, and while that might be something many of us are used to it was inappropriate in that setting as kids are better remaining attached to their fingers. He looked at brakes and electrical loads as the solution to stopping the motor, but finally settled on something far simpler. An induction motor can be stopped very quickly indeed by applying a DC voltage to it, and his quest to achieve this led along the path of working with the AC supply. Eventually he had a working prototype, which he further developed to become the MakeSafe power tool brake.
The full talk is embedded below the break, and gives a very good introduction to the topic of switching AC power. If youve never encountered a thryristor, a triac, or even a diac, these once-ubiquitous components make an entrance. We learn...
Facebook's latest screw-up a programming bug in Facebook website accidentally gave 1,500 third-party apps access to the unposted Facebook photos of as many as 6.8 million users. Facebook today quietly announced that it discovered a new API bug in its photo-sharing system that let 876 developers access users' private photos which they never shared on their timeline, including images uploaded
Authorities in the United States, Canada, Australia, and New Zealand are said to be investigating a wave of bogus bomb threats that have been sent to a variety of organisations late on Thursday.
But if the hoaxer thought they were going to make a lot of money through the scam, theyre going to be disappointed.
Posted by Hacker Fantastic on Dec 14I have revised the original advisory for this issue due to discovery of a
Hamid Anbari, CEO and Cofounder of IKAP Robotics, joins our Robotics/AI Board.
Posted by Solar Designer on Dec 14I agree, assuming it's likely also unknown to at least a subset of
Some folks at NVIDIA have developed a "style-based generator architecture for generative adversarial networks", borrowing from "style transfer literature". It has been demonstrated to generate remarkably realistic (and fictitious) human faces. As impressive as it is, it's not obvious the extent to which the demonstration of this architecture is like a little old lady who only drove it to church on Sundays. Regardless, it looks like the AI overlords can now have alleged supermodel girlfriends in Canada too:
The video demonstration is at https://www.youtube.com/
Their explanation/description is at https://arxiv.org/pdf/1812.04948.pdf
Read more of this story at SoylentNews.
Fedora developers are working on trying to figure out the best default behavior moving forward for their I/O scheduler selection...
Your weekly selection of awesome robot videos
Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; heres what we have so far (send us your events!):
Let us know if you have suggestions for next week, and enjoy todays videos.
The bar has now been set for robot holiday videos, thanks to FZI. Happy ROS-lidays!
Still waiting for a robot with a cookie to show up at my door. Any time now, Im sure.
[ FZI ]
Looks like Honda will be showing a new mobile robot at CES next month:
Honda PATHBot is a robot equipped with AI that recognizes surrounding situations and moves with the optimum route to the destination while avoiding people and obstacles. Honda aims at a society in which robotic devices coexist and cooperate with people and expand the possibilities of people. PATHBot has a function to smoothly move public space where people go, without giving anxiety to people, which is essential for utilizing robotics devices in real society.
Berkshire Grey is helping customers radically change the essential way they do business by delivering game-changing technology that combines AI and robotics to automate omni-channel fulfillment. Berkshire Grey solutions are a fundamental engine of change that moves you forward by transforming pick, pack and sort operations to deliver competitive advantage for enterprises serving todays connected consumers.
Researchers from the Rutgers New Jersey Medical School are attempting to defy and reverse the biological aging process by developing a therapeutic vaccine that would bolster the essential repair and regeneration processes of cells.
This is potentially important research since the current life expectancy at birth is around 78.8 years in the USA.
In the United States, about 46 million people are above the age of 65. This number is expected to double by 2060, therefore increasing age-related health issues, reports Census.org.
Android is possibly the most popular Smartphone OS with more than 2 billion monthly active devices.
There might be times when you are looking for how to take screenshots on Android smartphone?
Here in this article, we are providing you with the best easiest ways to take a screenshot on android devices.
A screenshot is an image taken of whatevers on your screen. The process of taking screenshots on Android smartphones might sound obvious to many users but still, its good to learn some new stuff.
So these are the three best ways to capture and share a screenshot on Android smartphones.
The most basic way to capture a screenshot on Android smartphones is by pressing the volume down and power button at the same time. This will instantly capture a screenshot of whatevers on your screen.
A screenshot captured by using the above-mentioned process is generally verified by a screenshot capture sound, screen flash, or a notification.
The next best way to capture screenshots on Android is by using third-party applications. These Screenshot applications eliminate the need of pressing physical buttons to capture a screenshot.
Furthermore, using screenshot capturing applications you can even use gestures to capture screenshots. Third-party screenshot capturing applications also offer photo editing tools.
You can find an extensive collection of applications to capture screenshots on Playstore.
Facebook said on Friday that up 6.8 million people may have been affected by a software bug exposing their photos to third-party app developers who did not have permission to view them.Tomer Bar, Facebooks engineering director, said in a blog post...
Apple the most valuable brand in the world produces some of the best Hardware & Software products and Mac OS is just one of them.
If you dont know what is it? then you came at right place because here, in this article, we are providing you with everything you need to know about MacOs.
The term Mac OS stands for Macintosh Operating System.
In the market of Desktops, Laptops, and Home Computers its the second most widely used desktop OS after Windows.
After the departure of Steve Jobs from Apple, the company suffered a huge loss and board of directors at Apple decided to bring Steve back from NEXT and lead the company on an interim basis.
This really made Steve and his team work harder on Mac Os and soon they proved that Apple really has a potential.
The first initial Release of Mac Os was on March 24, 2001, which is nearly 17 years ago from now.
And till now Mac OS is improving with every new release.
Many of you might have heard that Mac Os is more secure than windows. But thats not true.
The market share of Mac is less than 10% which results in less malware and spyware attacks.
Actually, the main reason behind this is iMac and Macbook.
These two products running on Mac OS which is a bit expensive as compared to windows. So this automatically results in less damage.
Mac Os comes with lots of built-in creative and useful tools as compared to Windows.
Posted by Solar Designer on Dec 14Definitely. But relatively few people build their own per-machine
One of the interesting benefits of the 3D printing revolution is the dramatic increase in availability of prosthetics for people with virtually any need. With a little bit of research, a 3D printer, and some trial and error, virtually anyone can build a prototype prosthetic to fit them specifically rather than spend thousands of dollars for one from a medical professional. [Dominick Scalise] is attempting to flesh out this idea with a prosthetic hand that he hopes will be a useful prosthetic in itself, but also a platform for others to build on or take ideas from.
His hand is explained in great detail in a series of videos on YouTube. The idea that sets this prosthetic apart from others, however, is its impressive configurability while not relying on servos or other electronics to control the device. The wearer would use their other hand to set the dexterity hand up for whatever task they need to perform, and then perform that task. Its versatility is thanks to a unique style of locks and tensioners which allow the hand to be positioned in various ways, and then squeezed to operate the hand. It seems like a skilled user can configure the hand rapidly, although they must have a way to squeeze the hand to operate it, or someone will need to develop an interface of some sort for people without needing to squeeze it.
To that end, the files for making your own hand are available on Thingiverse. [Dominick] hopes that his project will spark some collaboration and development, using this hand as a basis for building other low-cost 3D printed prosthetics. There are many good ideas from this project that could translate well into other areas of prosthetics, and putting it all out there will hopefully spur more growth in this area. Weve already seen similar-looking hands that have different methods of actuation, and both projects could benefit from sharing ideas with each other.
Thanks to [mmemetea] for the tip!
My bash shell script read a config file line-by-line using a bash while loop. I need to check if a string stored in $var starts with some value such as # character. If so I need to ignore that value and read the next line from my config file. How do I check if variable begins with # in bash shell scripting running on a Linux or Unix-like operating systems?
The post Bash check if string starts with character such as # appeared first on nixCraft.
Were sorry this happened, Facebook said in a statement after disclosing yet another privacy failing.
Facebook said on Friday in a developer-focused blog post that it had discovered a nasty bug in its photo software.
The bug allowed authorized app programmers to access photos that people had uploaded to Facebook but not publicly shared, as well as those posted on Facebooks Marketplace software or Facebook Stories, the post said.
There are several cases in which someone might have uploaded a photo but didnt share it, Facebook explained.
Shamoon is back one of the most destructive malware families that caused damage to Saudi Arabia's largest oil producer in 2012 and this time it has targeted energy sector organizations primarily operating in the Middle East. Earlier this week, Italian oil drilling company Saipem was attacked and sensitive files on about 10 percent of its servers were destroyed, mainly in the Middle East,
Unilever, the multinational consumer goods manufacturer, uses artificial intelligence and machine learning to help with recruiting and onboarding of new employees. The algorithms help to sift through CVs and even conduct and analyze video interviews.
Cytomegalovirus (CMV) is a -herpesvirus that infects the majority of people in the world. It lies dormant in the body, waiting for an opportunity to strike when the immune system is weakened. This persistent virus infects people for their entire lives, and now researchers have discovered how the virus spreads, opening the door to ways to destroy it.
What is cytomegalovirus?
CMV is part of the -subfamily of herpesviruses, which are believed to have been co-evolving with their hosts for around 180 million years . CMV infection is asymptomatic; this means it causes no symptoms and is a latent infection; in other words, it lies dormant in the cell, awaiting activation under certain conditions .
Security updates have been issued by CentOS (ghostscript, git, java-1.7.0-openjdk, java-11-openjdk, kernel, NetworkManager, python-paramiko, ruby, sos-collector, thunderbird, and xorg-x11-server), Debian (gcc-4.9), and SUSE (amanda, ntfs-3g_ntfsprogs, and tiff).
Via: Reuters: A Reuters examination of many of those documents, as well as deposition and trial testimony, shows that from at least 1971 to the early 2000s, the companys raw talc and finished powders sometimes tested positive for small amounts of asbestos, and that company executives, mine managers, scientists, doctors and lawyers fretted over the 
ESET researchers discovered a set of previously undocumented Linux malware families based on OpenSSH. In the white paper, The Dark Side of the ForSSHe, they release analysis of 21 malware families to improve the prevention, detection and remediation of such threats
[...] Something that wasnt originally discussed in the Operation Windigo paper, but that ESET researchers have talked about at conferences, is how those attackers try to detect other OpenSSH backdoors prior to deploying their own (Ebury). They use a Perl script they have developed that contains more than 40 signatures for different backdoors.
Read more of this story at SoylentNews.
Posted by Solar Designer on Dec 14I thought you'd say something like this. Thanks. What I did here is
The Cadastro de Pessoas Fsicas (CPFs) is a taxpayer registry identification for Brazilians In this case, 120 million CPFs were exposed online. The IT security researchers at InfoArmors Advanced Threat Intelligence team discovered a treasure trove of personal sensitive data belonging to over 120 million Brazilians exposed on an unprotected AWS (Amazon Web Service) S3 cloud 
This is a post from HackRead.com Read the original post: Personal & banking data of 120 million Brazilians leaked online
The upload filters topic has been widely debated in the European Parliament this year.
While most attention has been focused on copyright-infringing material and Article 13, another filtering discussion has been going on at the same time.
This summer the EU Commission pushed forward a plan to require content hosting platforms including Google, Twitter, and Facebook to swiftly remove terrorist content when a national authority points it out to them.
The proposed regulation was accepted by the EU member states at a Council meeting earlier this week.
According to the published report, the EU countries in favor believe that there is a need to achieve automatic detection and systematic, fast, permanent and full removal of terrorist content.
This terrorist content can be reported by local police, for example, or another designated private authority. No court has to be involved in the process. What has many activists worried is that, like Article 13, the proposal can enable automated upload filters.
The proposed terrorist content filters will go further than Article 13 in the sense that they require services to remove reported content within one hour. In addition, services will have to prevent this content from reappearing on their platforms.
If they fail to do so, the companies could face hefty fines and criminal liability.
Its worth noting that the proposal is not restricted to large Internet platforms. It will apply to all hosting service providers that do business in the EU. This includes many smaller companies.
The French civil rights group La Quadrature notes that while its easy for large tech giants to comply, smaller competitors will be severely disadvantaged. These would all need a point of contact thats available 24/7.
The other actors will have no other choice but to close down their hosting services or (less likely but just as serious) to outsource the execution of their obligations to the giants, the group writes.
The proposed legislation has triggered opposition from more sides, including...
If you are under a certain age, you probably associate Radio Shack with cellphones. While Radio Shack never gave us access to the variety and economy of parts we have today, they did have one thing that I wish we could get again: P-Box kits. The obvious questions are: Whats a P-Box and why do I want one? But the kit wasnt to make a P-Box. P-Box was the kind of box the kit came in. It was like a piece of perfboard, but made of plastic, built into a plastic box. So you bought the kit which might be a radio or a metal detector opened the box and then built the kit using the box as the chassis.
The perfboard was pretty coarse, too, because the components were all big discrete components. There was at least one that had an IC, but that came premounted on a PC board that you treated like a big component. One of my favorites was a three-transistor regenerative shortwave receiver. In those days, you could pick up a lot of stations on shortwave and it was one of the best ways at the time to learn more about the world.
On the left, you can see a picture of the radio from the 1975 catalog. You might think $7.95 is crazy cheap, but that was at least a tank full of gas or four movie tickets in those days, and most of us didnt have a lot of money as kids, so you probably saved your allowance for a few weeks, did chores, or delivered papers to make $8.
The kits changed over the years. In 1975 there were twenty of them, but over the years there were about thirty different kits. In fact, the shortwave radio was a few bucks more than most of them, although there were a few that were even more, but in 1975, at least none of them were over $9.
The 64-bit ARM architecture code (a.k.a ARM64 / AArch64) with the Linux 4.21 kernel is seeing pointer authentication added as a new security feature...
Posted by Jann Horn on Dec 14I think one additional aspect here is the kernel config. From what
Posted by Brad Spengler on Dec 14I really wish such statistics would stop being cited as evidence of anything,
Sharp Imaging and Information Company of America (SIICA), a division of Sharp Electronics Corporation (SEC), introduced a new line of Advanced and Essentials Series color document systems for the technology-driven workplace. The eleven new models include seven that are available now, and four models that will be available in early summer 2019. All the new models offer Sharps touchscreen display, which is common across 30+ models in Sharps multifunction printer lineup, and add new features More
The post Sharp introduces multifunction printers that include firmware attack prevention appeared first on Help Net Security.
Threat Stack unveiled its plan to export cloud infrastructure security telemetry directly to its customers Amazon S3 accounts in order to enhance security observability. With access to contextualized runtime and behavioral analysis data from the Threat Stack Cloud Security Platform through Amazon S3, Threat Stack customers will be able to achieve full stack security observability of their cloud infrastructure. With a direct data export to Amazon S3, Threat Stack helps customers unlock the true value More
The post Threat Stack announces contextualized data export to Amazon S3 for cloud security observability appeared first on Help Net Security.
Cylance released its virtual chief information security officer (vCISO) service, a program designed to provide organizations with technology and security resources that support next-generation security architectures and offer staff augmentation. Cylance vCISO enables customers at organizations large and small tackle the cybersecurity skills shortage that has long been a problem for CISOs. In fact, a recent study notes that the skills gapup by more than 50% in the last three yearsis expected to grow by More
The post Cylance narrows the cybersecurity skills gap with virtual CISO appeared first on Help Net Security.
Scientists believe that quark-gluon plasma filled the entire Universe during the first few microseconds after the Big Bang when the Universe was still too hot for particles to come together to make atoms.
[...] The scientists discovered that, by carefully controlling conditions, they could generate droplets of quark-gluon plasma that expanded to form three different geometric patterns.
[...] The results, published in the journal Nature Physics, could help theorists better understand how the Universes original quark-gluon plasma cooled over milliseconds, giving birth to the first atoms in existence.
Read more of this story at SoylentNews.
Over a period of time, Google Search has become a lifeline for many of us and the go-to-place to find answers for any kind of queries ranging from food, health, entertainment, weather, and much more. Not only this, it also serves as a platform for us to learn new things.
Google is always looking to better its services and make it more user-friendly. And one such service is its Search feature. Apparently, Google is testing a new feature that will help users learn how to pronounce words in different accents and speeds, reports Android Police.Image: Android Police
The new Learn to Pronounce feature will help users to correctly pronounce a word, which will be played in both American and British accents. Also, it allows managing the speed of pronunciation for a word for those users who have trouble in understanding the accent.
For the unaware, when a user searches for the definition of a particular word in Google Search, it displays the meaning of the word in question along with a small speaker icon next to the said word to hear how it is pronounced.
The introduction of the new feature will pop up the Learn To Pronounce box below the word, which when tapped will open up a new search card. For instance, if you search for onomatopoeia, a box will reportedly appear that directs to a new search for how to pronounce that will have the written pronunciation of the word along with a small speaker icon placed next to it.
It will then give a drop-down option, which will have the British or American pronunciation of the given word that the user needs to choose from. Additionally, there is also an option to slow down the speed of the audio pronunciation in case it is not understandable.
Google has yet to officially confirm the release or testing of the new feature. However, the feature is already displaying for some users, according to Android Police. This could mean that Google may slowly roll out the feature to users in coming weeks. Keep watching this for more updates!
Source: Android Police
The post Google Search is testing Learn To Pronounce feature in different speeds and accents appeared first on...
Theres a positive correlation of assisted reproductive technologies with arterial hypertension. Epigenetics and hormone treatments with IVF are probable causes.
Assisted reproductive technologies (ART) have been shown to induce premature vascular aging in apparently healthy children. In mice, ART-induced premature vascular aging evolves into arterial hypertension. Given the young age of the human ART group, long-term sequelae of ART-induced alterations of the cardiovascular phenotype are unknown.
This study hypothesized that vascular alterations persist in adolescents and young adults conceived by ART and that arterial hypertension possibly represents the first detectable clinically relevant endpoint in this group.
Five years after the initial assessment, the study investigators reassessed vascular function and performed 24-h ambulatory blood pressure (BP) monitoring (ABPM) in 54 young, apparently healthy participants conceived through ART and 43 age- and sex-matched controls.
I read that Let's Encrypt is a free, automated, and open certificate for web server and other usages. How do I secure Apache with Let's Encrypt Certificates on RHEL 8?
The post How to secure Apache with Lets Encrypt Certificates on RHEL 8 appeared first on nixCraft.
Posted by Solar Designer on Dec 14Important correction:
The Researcher Tim Coen discovered several cross-site scripting
(XSS) vulnerabilities in the CMS. One of the flaws is caused by the
ability of contributors to edit new comments from users with higher
Coen also discovered that it is possible to trigger XSS flaws by using specially crafted URL input against some plugins.
Coen along with the researcher Slavco Mihajloski discovered an XSS vulnerability that allows authors on websites running on Apache servers to upload specially crafted files that bypass the MIME verification.
Prior to 5.0.1, WordPress did not require uploaded files to pass MIME type verification, so files could be uploaded even if the contents didnt match the file extension. For example, a binary file could be uploaded with a .jpg extension, wrote WordPress developer Ian Dunn. This is no longer the case, and the content of uploaded files must now match their extension. Most valid files should be unaffected, but there may be cases when a file needs to be renamed to its correct extension (e.g., an OpenOffice doc going from .pptx to .ppxs).
Another flaw discovered by experts at Yoast affects some uncommon configurations and causes the user activation screen being indexed by search engines. This could lead the exposure of email addresses and some default passwords in some rare cases.
Karim El Ouerghemmi discovered that security issues allows authors to alter metadata and delete files that they normally would not be authorized to delete.
Security expert Sam Thomas discovered that contributors could use specially crafted metadata for PHP object injection.
The last flaw was discovered by Simon Scannell from RIPS Technologies, il could be exploited by authors using specially crafted input to create posts of unauthorized types.
Security updates that addressed the above flaws have been released for WordPress 4.9 and older releases. Version 5.0 already includes the fixes.
Posted by Solar Designer on Dec 14Thanks! Slide 4 says average lifetime among 3 critical issues is 5.3
About the dinosaur wars? Somehow I find this whole discussion to be debated in a pretty narrow-minded fashion and it renders it, at least to me, fairly useless.
Environmental influences are important, too, but they are largely unsystematic, unstable and idiosyncratic.
NASAs newly arrived Mars lander has been spotted by one its orbiting cousins.
The space agencys Mars Reconnaissance Orbiter used its supersharp High Resolution Imaging Science Experiment camera (HiRISE) to photograph the InSight lander, as well as the hardware that helped the stationary robot ace its Nov. 26 touchdown on the equatorial plain known as Elysium Planitia.
It looks like the heat shield (upper right) has its dark outside facing down, since it is so bright (saturated, probably a specular reflection), HiRISE principal investigator Alfred McEwen, of the University of Arizona, wrote in an image description today (Dec. 13). [Mars InSight in Photos: NASAs Mission to Probe Core of the Red Planet].
"Pay $20,000 worth of bitcoin, or a bomb will detonate in your building" A massive number of businesses, schools, government offices and individuals across the US, New Zealand and Canada on Thursday received bomb threats via emails that caused nationwide chaos, forcing widespread evacuations and police response. The bomb threat emails were apparently sent by spammers, threatening people that
The Linux Foundations Open Network Automation Platform (ONAP) is well into its third 6-month release (Casablanca came out in Dec 18), and while the project has evolved since its first release, there is still some confusion about what it is and how its architected. This blogs takes a closer look at ONAP, under-the-hood, to clarify how it works.
Intel and eSports organizer and production company ESL have announced this week a commitment to invest at least $100 million to "shape the future landscape of eSports through innovative technology, tournaments and events" through 2021 in what the companies described as "the biggest brand and technology eSports partnership in history." That's a lot of money, but it almost doesn't seem like it when you consider the duo's belief that eSports will become a billion-dollar industry. Almost.
This partnership isn't new. Intel and ESL have worked together on the Intel Extreme Masters tournament series for Counter Strike: Global Offensive (CS:GO) and other titles since 2006. Intel also sponsors the ESL One circuit for CS:GO and Dota 2, the ESL Pro League for CS:GO and the multi-tourney Intel Grand Slam that challenged CS:GO teams to win four of 10 events in 2018 in exchange for $1 million and gold bars engraved with their names.
Also at CNBC.
Read more of this story at SoylentNews.
LEDs are now a mature technology, with all manner of colors and flavors available. However, back in the 1970s, it was early days for this fledgling display tech, and things looked very different. [IMSAI Guy] happened to work at the optoelectronics division of Hewlett-Packard during their development of LED displays, and has a handful of prototypes from those heady days.
The video is a great look at not only vintage display hardware, but also rarely seen prototypes that seldom left the HP offices. Matrix, 7-segment and even 16-segment devices are all in attendance here. Theres great macro photography of the packages, including the now-forgotten bubble displays as well as hermetically sealed glass packages. The parts all have a uniquely 1970s look, drenched in gold plating and otherwise just looking very expensive.
The followup video breaks out the microscope and powers up the displays. [IMSAI Guy] shares some useful tips on how to best tinker with unknown LED parts, as well as knowledge about the chemical compounds and manufacturing processes involved in LED production. If you dont know your III-V compounds from your II-VI compounds, prepare to learn.
Its always interesting to take a look back, and even better to get a peek at the experiments of engineers of the past.
Youll love this one. Via: The Intercept: Facial recognition has quickly shifted from techno-novelty to fact of life for many, with millions around the world at least willing to put up with their faces scanned by software at the airport, their iPhones, or Facebooks server farms. But researchers at New York Universitys AI Now Institute 
Via: ACLU: Recently, a patent application from Amazon became public that would pair face surveillance like Rekognition, the product that the company is aggressively marketing to police and Immigration and Customs Enforcement with Ring, a doorbell camera company that Amazon bought earlier this year. While the details are sketchy, the application describes a 
This week's KubeCon + CloudNativeCon North America 2018 in Seattle was the biggest ever! This sold-out event featured four days of information on Kubernetes, Prometheus, Envoy, OpenTracing, Fluentd, gRPC, containerd, and rkt, along with many other exciting projects and topics.
More than 100 lightning talks, keynotes, and technical sessions from the event have already been posted.
Researchers have developed a new device that can measure and control a nanoparticle trapped in a laser beam with unprecedented sensitivity. The new technology could help scientists study a macroscopic particle's motion with subatomic resolution, a scale governed by the rules of quantum mechanics rather than classical physics.
The researchers from the University of Vienna in Austria and the Delft University of Technology in the Netherlands report their new device in Optica, The Optical Society's journal for high impact research. Although the approach has been used with trapped atoms, the team is the first to use it to precisely measure the motion of an optically trapped nanoparticle made of billions of atoms.
[...] The new method uses a light-guiding nanoscale device called a photonic crystal cavity to monitor the position of a nanoparticle levitating in a traditional optical trap. Optical trapping uses a focused laser beam to exert a force on an object to hold it in place. The technique was recognized by the award of the 2018 Nobel Prize in Physics to pioneer, Arthur Ashkin.
[...] The new device accomplishes a high level of sensitivity by using a long photonic crystal cavity that is narrower than the wavelength of the light. This means that when light enters and travels down the nanoscale cavity, some of it leaks out and forms what is called an evanescent field. The evanescent field changes when an object is placed close to the photonic crystal, which in turn changes how the light propagates through the photonic crystal in a measurable way.
Near-field coupling of a levitated nanoparticle to a photonic crystal cavity (open, DOI: 10.1364/OPTICA.5.001597) (DX)
Read more of this story at SoylentNews.
Tech and cybersecurity are poised to be at the forefront of Congresss agenda in 2019.Lawmakers have increasingly set their sights on Silicon Valley, demanding a crackdown on tech giants like Facebook and Twitter. At the same time, cybersecurity...
With the end of the year quickly approaching, it's time for our annual look at how the Linux performance has evolved over the past year from graphics drivers to distributions. This year was a particularly volatile year for Linux performance due to Spectre and Meltdown mitigations, some of which have at least partially recovered thanks to continued optimizations landing in subsequent kernel releases. But on the plus side, new releases of Python, PHP, GCC 8, and other new software releases have helped out the performance. For kicking off our year-end benchmark comparisons, first up is a look at how Intel's performance-optimized Clear Linux distribution evolved this year.
The state of open source in 2018, and especially, the IBMs Red Hat purchase, were discussed in this podcast with Rachel Stephens, an analyst with of RedMonk, and Michael Cot, director, marketing, at Pivotal Software, hosted by Libby Clark, editorial director, and Alex Williams, founder and editor-in-chief, of The New Stack.
"Password" will never be a good password. Period.
[...] It doesn't look like we're getting any smarter about our passwords.
On Thursday, software company SplashData released its annual list of the Top 100 worst passwords, and it includes some pretty obvious blunders. Coming in at No. 1 is, you guessed it, "123456," and in second place is, yup, "password." This is the fifth year in a row these passwords have held the top two spots.
Newcomers to the list include "666666" (No. 14), "princess" (No. 11) and "donald" (No. 23).
[...] To compile its list, SplashData evaluated more than 5 million leaked passwords, mostly from users in North America and Western Europe. The company estimates that about 10 percent of people have used at least one of the Top 25 worst passwords, and about 3 percent have used "123456."
Read more of this story at SoylentNews.
Whether we will ever find a way to overcome the physiological trade offs that hold back immortality, or whether we will really be able to replicate human consciousness in a computer are questions too difficult for us yet to answer. But are those leading the charge against death at least inspiring us to lead healthy lives, or are they simply rallying against an inevitable fate?
Long read: How nature is fighting our attempts to use biohacking to live forever.
Initially during the Linux 4.20 kernel merge window with the STIBP addition for cross-hyperthread Spectre V2 mitigation it was turned on by default for all processes. But that turned out to have a sizable performance hit so the behavior was changed to only turn it on for processes under SECCOMP or when requested via the PRCTL interface. However, AMD is landing a patch that for select CPUs will have an always-on mode as evidently that's preferred for some AMD processors...
[Andrew Rossignol] has a slightly unusual plug-in hybrid vehicle, a Cadillac ELR, and his latest project for the car sees him building a battery-powered portable mains charging pack for it in an attempt to increase its range. If this seems to be a rather cumbersome exercise, his write-up details the work he put in trying to hook up directly to the cars internal battery, and how a 4 kW mains inverter and an off-the-shelf mains charging station were the most practical alternative.
His first impulse was to hook a second supply to the cars high voltage bus from a supplementary battery pack and inverter, but in this aim he was thwarted by a protection diode and his not wanting to modify the car to bypass it. So the unlikely solution was to take his battery pack from a second-hand Toyota Prius upgrade kit and build it into a frame along with the inverter and charger. The result is something akin to a portable generator without the small gasoline engine, and while it is hardly the most efficient way to transfer energy from a wall socket into a car it does offer the ELR a significant range upgrade.
The cost involved has probably kept away many readers who would like to hack their hybrid cars, so weve seen surprisingly few. This home made Geo Metro supplements its forklift motor with a small gasoline generator. Meanwhile [Andrew] is no stranger to these pages, among the several times his work has appeared here are his rundown on OBD sniffing the ELR, and from a while back, displaying graphics on an oscilloscope including a Wrencher.
Grand Duchy already offers free trains and buses to young people.
Russian Cyber espionage group Sofacy (aka APT28, Pawn Storm, Fancy Bear, Sednit, Tsar Team, and Strontium)) carried out a new cyber campaign aimed at government agencies in four continents in an attempt to infect them with malware.
The campaign has been focusing on Ukraine and NATO members like it has done in past attacks.
Earlier December the group used Brexit-themed bait documents on the same day the UK Prime Minister Theresa May announced the initial BREXIT draft agreement with the European Union (EU). In November experts at Palo Alto Networks documents a new malware, dubbed Cannon in attacks on government entities worlwide.
The latest campaign documented by Palo Alto Networks was carried
out from mid-October through mid-November, attackers used both
Zebrocy backdoor and Cannon Trojan.
Researchers noticed that in all the attacks threat actors used decoy documents that have the same author name Joohn.
The delivery documents used in the October and November waves shared a large number of similarities, which allowed us to cluster the activity together. Most notably, the author name Joohn was used repeatedly in each delivery document. reads the...
Virtual reality (VR) has made massive bounds in recent years. Were now seeing VR as an innovative and creative experience catered to customers.
To find out about t he creative ways entrepreneurs are using VR and which methods have true applicability I asked a panel of entrepreneurs from Young Entrepreneur Council the following question:
This September, the European Parliament backed the controversial Article 13 proposals, something that was met with a chorus of support from the entertainment industries, the music sector in particular.
The final text of Article 13 is yet to be finalized so the EU Parliament will need to vote again, once thats completed. However, as Article 13 mutates to address the concerns of opponents, rightsholders have been expressing concern that the changes will actually strengthen the position of major online content sharing service providers (OCSSPs) such as YouTube.
Last week, major rightsholders including the MPA and the Premier League warned that as it stands, Article 13 will create a new safe harbor for services that take measures to prevent infringement. Now, even more dissenting voices are making their opinions known.
In an open letter to the European Commission, Parliament and Council, more rightsholders and content groups including IFPI a previously staunch supporter of Article 13 say the proposals are going in the wrong direction.
We have reviewed the European Commission text/non-papers on article 13 and we have serious concerns about the direction of travel, the groups write.
As we reach the very final stages of this process, and negotiators seek to finalize a compromise text, we urge you to remember that the overall aim of the original European Commission proposal was to correct the distortion of the digital market place caused by User Upload Content (UUC) services, which enable users to upload content onto their sites and then profit from the availability of creative content without returning fair revenues to rightsholders, who create and invest in such content.
The groups say that the solution to the so-called Value Gap lies in holding OCSSPs liable for communication to the public when copyrighted works are made available from their platforms while excluding them from the safe harbors available in Article 14 of the E-Commerce Directive.
We continue to believe that only a solution that stays within these principles meaningfully addresses the Value Gap/Transfer of Value. Moreover, licensing needs to be encouraged where the rightsholders are willing to do so but at the same time not be forced upon rightsholders, the groups write, noting that proposals that deviate from the above should be dismissed.
As things stand, the current proposal tex...
About 2.6 million years ago, an oddly bright light arrived in the prehistoric sky and lingered there for weeks or months. It was a supernova some 150 light years away from Earth. Within a few hundred years, long after the strange light in the sky had dwindled, a tsunami of cosmic energy from that same shattering star explosion could have reached our planet and pummeled the atmosphere, touching off climate change and triggering mass extinctions of large ocean animals, including a shark species that was the size of a school bus.
[...] The effects of such a supernova and possibly more than one on large ocean life are detailed in a paper just published in Astrobiology.
[...] A supernova 2.6 million years ago may be related to a marine megafaunal extinction at the Pliocene-Pleistocene boundary where 36 percent of the genera were estimated to become extinct. The extinction was concentrated in coastal waters, where larger organisms would catch a greater radiation dose from the muons.
According to the authors of the new paper, damage from muons would extend down hundreds of yards into ocean waters, becoming less severe at greater depths: "High energy muons can reach deeper in the oceans being the more relevant agent of biological damage as depth increases," they write.
Indeed, a famously large and fierce marine animal inhabiting shallower waters may have been doomed by the supernova radiation.
"One of the extinctions that happened 2.6 million years ago was Megalodon," Melott said. "Imagine the Great White Shark in 'Jaws,' which was enormous and that's Megalodon, but it was about the size of a school bus. They just disappeared about that time. So, we can speculate it might have something to do with the muons. Basically, the bigger the creature is the bigger the increase in radiation would have been."
Megalodon (Carcharocles megalodon).
Hypothesis: Muon Radiation Dose and Marine Megafaunal Extinction at the End-Pliocene Supernova (DOI: 10.1089/ast.2018.1902) (DX)
A new framework queued for introduction with the Linux 4.21 kernel is the ARM-developed Energy Model Management Framework...
Attackers looking to add IoT devices to their botnets are increasingly adding vulnerability exploitation to their attack arsenal, Netscout researchers warn. Instead on just relying on a list of common or default passwords or brute-forcing attacks, they are taking advantage of the fact that IoT devices are rarely updated and manufacturers take a lot of time to push out fixes for known flaws. Currently under exploitation In November 2018, the company detected many exploitation attempts More
The post Attackers increasingly exploiting vulnerabilities to enlarge their IoT botnets appeared first on Help Net Security.
Attivo Networks surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and whats on their 2019 security wish list. Overall, the survey highlighted that the battle to keep cyber attackers from successfully compromising networks is not working. Over 50% of respondents reported that 100 days of dwell time or more was representative of their organization, while nearly half of respondents indicated that their More
The post Most concerning security controls for cyberattackers? Deception and IDS appeared first on Help Net Security.
Heavy.com reports that there have been a number of email bomb threats sent out demanding blackmail payments in bitcoin. An example of one message follows:
"Good day. My mercenary has carried the bomb (lead azide) into the building where your business is conducted. My mercenary built the explosive device under my direction. It can be hidden anywhere because of its small size, it is impossible to destroy the supporting building structure by this explosive device, but if it denotates there will be many wounded people.
My recruited person is watching the situation around the building. If he notices any suspicious activity, panic or cops the device will be blown up.
I can call off my man if you make a transfer 20,000 usd is the price for your safety and business. Transfer it to me in Bitcoin and I assure that I have to withdraw my mercenary and the bomb will not detonate. But do not try to deceive me my guarantee will become valid only after 3 confirmations in blockchain."
So does this sound like somebody who speaks English natively? Can you predict where this is coming from? Can you predict what kind of person sent this? Can you predict what kind of mess this is going to create? Who are you betting is really behind this?
Read more of this story at SoylentNews.
A study conducted by Ponemon Institute found that 60 percent of organizations globally had suffered two or more business-disrupting cyber events defined as cyber attacks causing data breaches or significant disruption and downtime to business operations, plant and operational equipment in the last 24 months. Further, 91 percent of respondents had suffered at least one such cyber event in the same time period. Despite this documented history of damaging attacks, the study found More
The post Most organizations suffered a business-disrupting cyber event appeared first on Help Net Security.
New data from HackerRank reveals the technical skills, learning preferences and career motivators of collegiate software engineers. The findings provide a playbook for corporate recruiters and hiring managers looking to improve how they identify, attract and retain the upcoming generation of skilled developers. In the U.S. alone, there are nearly 580,000 open computing jobs with less than 50,000 computer science graduates entering the workforce thats over 11 job postings for every Computer Science (CS) More
The post How students learn to code, evaluate job opportunities appeared first on Help Net Security.
The Radeon Software for Linux 18.50 driver release (a.k.a. "AMDGPU-PRO" 18.50) is now officially available..
Its getting ever harder to build a truly unique digital clock. From electronic displays to the flip-dots and flip-cards, everything seems to have been done to death. But this pinball scoring reel clock manages to keep the unique clock ball in play, as it were.
Its not entirely clear whom to credit with this build, but the article was written by [Lucky]. Nor do they mention which pinball machine gave up its electromechanical scoring display for the build. Our guess would be a machine from the 60s, before the era of score inflation that required more than the four digits used. And indeed, the driver for the display is designed so that a scoring unit from any pinball machine from the electromechanical era can be used. An ESP8266 keeps the time with the help of an RTC and drives the coils of the scoring unit through a bunch of MOSFETs. The video below shows that it wouldnt make a great clock for the nightstand; thankfully, it has a user-configured quiet time to limit the not inconsiderable noise to waking hours. It also flashes the date every half hour, rings solenoid operated chimes, and as a bonus, it can be used to keep score in a pinball game built right into the software.
We like the idea of honoring the old pinball machines with clock builds like this. Weve seen a word clock built from the back-glass of an old machine, and one that uses a four-player back to display the date and alarm time too.
Thanks to [Emma Lovelace] for the tip.
According to the IDC Worldwide Quarterly Enterprise Storage Systems Tracker, vendor revenue in the worldwide enterprise storage systems market increased 19.4% year over year to $14.0 billion during the third quarter of 2018 (3Q18). Total capacity shipments were up 57.3% year over year to 113.9 exabytes during the quarter. Revenue generated by the group of original design manufacturers (ODMs) selling directly to hyperscale datacenters increased 45.8% year over year in 3Q18 to $3.9 billion. This More
The post Worldwide enterprise storage systems market revenue reached $14 billion during 3Q18 appeared first on Help Net Security.
Posted by Michael Catanzaro on Dec 13------------------------------------------------------------------------
Buzz to Steph Curry on the Moon landings: Go ask the Russians Priceless. #buzzaldrin #Moon #NASA #MadhuThangavelu https://losangeles.cbslocal.com/2018/12/12/buzz-aldrin-stephsBqDDiE-k4
LOS ANGELES (CBSLA) The second man to walk on the moon doesnt want to talk about NBA superstar Steph Currys theory that it never happened.
Former astronaut Buzz Aldrin, one of three men who took part in the Apollo 11 moon landing mission, was at USC Tuesday night to hear presentations by students on why the U.S. should attempt to return to the moon.
The event came hours after Curry raised doubts over whether humans ever landed on the moon during an appearance with other NBA players on the Winging It podcast.
Thinking of trying something new today? How does discovering new planets while sitting comfortably at home sound? Learn how ordinary citizens can make a WORLD of difference in the ongoing hunt for exoplanets.
Have you ever wondered what it would be like to discover new planets? Learn how Planet Hunters TESS shows us how to find new worlds far away from our Sun.
A second Canadian has been detained in China on accusations of harming national security, as tension continues between the two countries. It was confirmed on Thursday that Michael Spavor, a businessman, had been detained in addition to former diplomat Michael Kovrig.
Canada drew Chinese protests after it arrested an executive at telecoms giant Huawei at the request of the US. Meng Wanzhou has been bailed but may face extradition for fraud.
[...] Michael Spavor is a businessman based in Dandong, near the Chinese border with North Korea. He has ties to the North Korean government and has met its leader Kim Jong-un many times.
Ex-diplomat Michael Kovrig currently works for a think tank, the International Crisis Group (ICG), which has said it is concerned for his health and safety. He is being held officially "on suspicion of engaging in activities that harm China's state security".
However, a Chinese foreign ministry spokesman, Lu Kang, suggested another reason, saying the ICG had not been registered as a non-governmental organisation (NGO) in China and therefore it was unlawful for its staff to work there. Checks by Reuters news agency did not turn up a registration for ICG on government databases for NGOs or social enterprises.
Canadian Foreign Minister Chrystia Freeland has said Mr Kovrig's case was raised directly with Chinese officials.
The article has a photo of Spavor standing with Dennis Rodman.
Arrests Huawei's Global Chief Financial Officer in
Arrest of Huawei Executive Causing Discontent Among Chinese Elites
China Arrests Former Canadian Diplomat; Chinese Companies Ban iPhones, Require Huawei Phones
Read more of this story at SoylentNews.
Via: CBS: Virgin Galactics rocket-powered SpaceShipTwo carried two test pilots out of the discernible atmosphere Thursday, the companys first piloted flight to the edge of space and a major milestone for Richard Bransons plans to eventually launch tourists on brief, sub-orbital trips to space. It was the fourth non-government, purely commercial flight to carry pilots 
Non-tracking search engine, DuckDuckGo, is now a little easier to find online after the company acquired the premium generic domain name duck.com thereby shaving a few letters off its usual URL. This means browsing to duck.com now automatically redirects to DuckDuckGo.com.
The twist in this tale is that duck.com's prior owner was Google. And DDG had accused the search giant of anti-competitive behavior by pointing duck.com to its own search engine, Google.com, and thus "consistently" confusing DDG users (duck.co having long pointed to the DDG community page.)...
[...] [Calls] for antitrust scrutiny of tech giants have been rising in the US. And Google's dominant position in Internet search and smartphone platforms, along with its pincer grip (along with Facebook) on the online ad market, position it for some special attention on that front. So the company quietly passing off duck.com now after using it to redirect to Google.com for close to a decade to a pro-privacy search rival smacks of concern over competition optics, at the very least.
Also at Gizmodo.
Read more of this story at SoylentNews.
A tiny piece of 3D-printed tech could foreshadow the future of medicine.
A team from MIT, Draper, and Brigham and Womens Hospital has created a 3D-printed smart pill that can release medications in the stomach and monitor temperature for up to a month at a time and they believe theyve only scratched the surface of its capabilities.
The seeds of Alzheimers disease can be transmitted through medical procedures, scientists have found, leading experts to call for the monitoring of blood transfusions from the elderly and those with a family history of dementia.
In 2015, researchers at University College London discovered that people who developed Creutzfeldt-Jakob disease (CJD) following treatments with human growth hormone also showed signs of Alzheimers in their brains after death.
The scientists tracked down vials of the same hormone and found that it did indeed contain misfolded amyloid-beta proteins, capable of setting off the deadly chain reaction which can lead to dementia.
Earlier today, Virgin Galactic sent its SpaceShipTwo commercial aircraft into space, a historic first for the private company. But at a maximum altitude of 51.4 miles (82.68 kilometers), the spaceplane fell 10.6 miles (17.32 kilometers) short of the Karman linethe internationally recognized boundary separating the atmosphere from space. Prompting the inevitable question: What the hell is space, anyway?
Before we nitpick Virgin Galactics achievement, lets give credit where its due.
A disease-carrying, newly invasive tick to the United States, the Asian longhorned tick, is poised to spread across much of North America, suggests a new study published Thursday in the Journal of Medical Entomology. According to the study, the tick might be able to live anywhere from Southeastern Canada to most of the eastern half of the U.S. and even parts of the West Coast.
The Asian longhorned tick, or Haemaphysalis longicornis, made an unwelcome splash last year, when researchers and health officials discovered it on a pet sheep in New Jersey. Any hopes that the discovery was an isolated incident faded away this year, with sightings of the tick popping up again in New Jersey and eight other states this past spring and summer (Arkansas, Connecticut, Maryland, New York, North Carolina, Pennsylvania, Virginia, and West Virginia). Since 2017, the tick has been found on pets, farm animals, and at least two people in the U.S., and its possible that it might have made its way here at least as early as 2010.
[Brendan Herger] was warned that the process of publishing a Python package would be challenging. He relishes a challenge, however, and so he went at it with gusto. The exhausting process led him to share a cheat sheet for publishing Python packages with the goal of making the next time smoother, while also letting other people benefit from his experience and get a running start.
[Brendan] describes publishing a Python package as tying together many different solutions with brittle interchanges. His cheat sheet takes the form of an ordered workflow for getting everything in place, with some important decisions and suggestions about things like formatting and continuous integration (CI) made up-front.
The guide is brief, but [Brendan] has made errors and hit dead ends in the hopes that others wont have to. The whole thing came about from his work in deep learning, and his desire to create a package that allows rapid building and iterating on deep learning models.
Deep learning is a type of machine learning that involves finding representations in large amounts of data. [Brendan] used it in a project to automatically decide whether a Reddit post contains Star Wars plot spoilers, and we recently saw it featured in a method of capturing video footage only if a hummingbird is present.
Cymulate partnered with Symantec to provide an Attacker-Defender collaboration to share the research into the latest email-based threats. Cymulates Breach & Attack Simulation (BAS) platform enables organizations to launch simulations of multi-vector cyberattacks against their networks, exposing vulnerabilities and providing mitigation suggestions to close each found gap. One of the attack vectors is email, which is one of the most common attack vectors. The partnership allows Cymulate and Symantec to share the information of how More
The post Cymulate and Symantec announce shared research of email-based attacks appeared first on Help Net Security.
Pulse Secure revealed a Technical Alliance Partnership with BNT Pro to jointly sell and support a solution that offers SecTrail, an Identity Control and Management Platform developed by BNT Pro, as part of an integrated solution with Pulse Secure Connect Secure VPN appliances. The agreement will ensure that joint customers benefit from compatibility, enhanced features and simplified support and upgrades. The SecTrail suite includes a One-Time-Password (OTP) and Two-Factor-Authentication (2FA) solution with support for mobile More
The post Pulse Secure and BNT Pro sign Technical Alliance Partnership to deliver identity control appeared first on Help Net Security.
Intel has announced new developments at its Architecture Day 2018:
Sunny Cove, built on 10nm, will come to market in 2019 and offer increased single-threaded performance, new instructions, and 'improved scalability'. Intel went into more detail about the Sunny Cove microarchitecture, which is in the next part of this article. To avoid doubt, Sunny Cove will have AVX-512. We believe that these cores, when paired with Gen11 graphics, will be called Ice Lake.
Willow Cove looks like it will be a 2020 core design, most likely also on 10nm. Intel lists the highlights here as a cache redesign (which might mean L1/L2 adjustments), new transistor optimizations (manufacturing based), and additional security features, likely referring to further enhancements from new classes of side-channel attacks. Golden Cove rounds out the trio, and is firmly in that 2021 segment in the graph. Process node here is a question mark, but we're likely to see it on 10nm and or 7nm. Golden Cove is where Intel adds another slice of the serious pie onto its plate, with an increase in single threaded performance, a focus on AI performance, and potential networking and AI additions to the core design. Security features also look like they get a boost.
Intel's upcoming discrete graphics cards, planned for release around 2020, will be branded Xe. Xe will cover configurations from integrated and entry-level cards all the way up to datacenter-oriented products.
Like AMD, Intel will also organize cores into "chiplets". But it also announced FOVEROS, a 3D packaging technology that will allow it to mix chips from different process nodes, stack DRAM on top of components, etc. A related development is Inte...
Arctic Wolf Networks acquired RootSecure. RootSecure provides risk-based vulnerability assessment solutions that probe networks, discover connected devices, and test an organizations social engineering resilience. The acquisition enables enterprises to assess and manage their cybersecurity risk in addition to leveraging Arctic Wolfs AWN CyberSOC service to detect and respond to cyber threats. As customers embrace SOC-as-a-service, they also want to understand their vulnerabilities, said Brian NeSmith, CEO and co-founder of Arctic Wolf. This acquisition augments our More
Webroot received ISO 27001 certification, one of the highest internationally recognized standards for information security management systems. This achievement highlights Webroots ongoing commitment to providing the highest standard in security protection. Established by the International Organization for Standardization (ISO), this process-based standard specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of More
The post Webroot strengthens leadership in security and data protection with ISO 27001 certification appeared first on Help Net Security.
Entersekt has gained EMVCo certification for its 3-D Secure 2 access control server. EMVCo is a payments industry consortium managing global specifications for secure card-based e-commerce transactions. Entersekt has offered a 3-D Secure access control server (ACS) for many years. Its mobile-optimized solution was accredited by Visa, Mastercard, and American Express. It has proved popular among consumers in Europe and South Africa, who continue to enjoy the password-free, one-touch experience it makes possible. Several years More
The post Entersekt gains certification for e-commerce authentication solution appeared first on Help Net Security.
Fentanyl is now the most commonly used drug involved in drug overdoses, according to a new government report. The latest numbers from the US Centers for Disease Control and Prevention's National Center for Health Statistics say that the rate of drug overdoses involving the synthetic opioid skyrocketed by about 113% each year from 2013 through 2016.
The number of total drug overdoses jumped 54% each year between 2011 and 2016. In 2016, there were 63,632 drug overdose deaths.
[...] In 2016, over 18,000 overdose deaths involved fentanyl, and 16,000 fatalities were due to heroin.
Also at CBS.
Related: U.S. Life
Expectancy Continues to Decline Due to Opioid Crisis
Senate Investigators Google Their Way to $766 Million of Fentanyl
"Synthetic Opioids" Now Kill More People than Prescription Opioids in the U.S.
120 Pounds (54 kg) of Fentanyl Seized in Nebraska
U.S. House of Representatives Passes Opioid Legislation; China Will Step Up Cooperation
The Dutch Supply Heroin Addicts With Dope and Get Better Results Than USA
U.S. Opioid Deaths May be Plateauing
Read more of this story at SoylentNews.
Today, EU negotiators in Strasbourg struggled to craft the final language of the Copyright in the Single Digital Market Directive, in their last possible meeting for 2019. They failed, thanks in large part to the Directives two most controversial clauses: Article 11, which requires paid licenses for linking to news stories while including more than a word or two; and Article 13, which will lead to the creation of error-prone copyright censorship algorithms that will block users from posting anything that has been identified as a copyrighted work -- even if that posting is lawful. This means that the Directive will not be completed, as was expected, under Austrias presidency of the European Union. The negotiations between the European Parliament, representatives of the member states, and the European Commission (called trilogues) will continue under the Romanian presidency, in late January.
The controversy over Article 13 and Article 11 has not diminished since millions of Europeans voiced their opposition to the proposals and their effect on the Internet earlier this year. Even supporters and notional beneficiaries have now grown critical of the proposals. An open letter signed by major rightsholder groups, including movie companies and sports leagues, asks the EU to exempt their products from Article 13 altogether, and suggest it should only apply to the music industrys works. Meanwhile, the music industry wrote their own open letter, saying that he latest proposed text on Article 13 wont solve their problems. These rightsholders join the world's most eminent computer scientists, including the inventors of the Internet and the Web, who denounced the whole approach and warned of the irreparable harm it will do to free expression and the hope of a fair, open Internet. More than four million Europeans have signed a petition opposing Article 13.
The collective opposition is unsurprising. Months of closed-door negotiations and corporate lobbying have actually made the proposals worse: even less coherent, and more riddled with irreconcilable contradictions. The way that the system apportions liability (with stiff penalties for...
Researchers from the University of Science and Technology of China and the Dalian Institute of Chemical Physics carried out a combined experimental and theoretical investigation of the H+HD to H2+D reaction. They got first look at geometric phase effect in a chemical reaction.
For decades after the discovery of DNA, researchers mostly thought of genetics in terms of genes, the pieces or sequences of DNA that encode instructions for building proteins in cells. Then scientists discovered that genes make up just 2 percent of our DNA and that most genetic complexity stems from the vast non-gene code, which influences when genes are turned on or off. Further, half of that non-gene code was found to come from insertions of viral DNA. Consequently, say the authors, genetic variation, and the potential for disease-causing mistakes, occurs in transposons as well as in genes.
New laboratory techniques can identify which of our genes are influenced by DNA snippets that are left behind in our genetic code by viruses, a new study finds.
The vacuum tube is largely ignored in modern electronic design, save for a few audio applications such as guitar and headphone amps. The transistor is smaller, cheaper, and inordinately easier to manufacture. By comparison, showing us just how much goes into the manufacture of a tube, [glasslinger] decided to make a wire-element pilotron from scratch!
To say this is an involved build is an understatement. Simply creating the glass tube itself takes significant time and skill. [glasslinger] shows off the skills of a master, however steadily working through the initial construction, before showing off advanced techniques necessary to seal in electrodes, produce the delicate wire grid, and finally pull vacuum and seal the tube completely.
The project video is an hour long, and no detail is skipped. From 2% thoriated tungsten wire to annealing torches and grades of glass, its all there. Its enough that an amateur could reproduce the results, given enough attempts and a complete shop of glassworking equipment.
The pilotron may be a forgotten design, but in 2018 it once again gets its day in the sun. Overall, its a testament to [glasslinger]s skill and ability to be able to produce such a device that not only looks the part, but is fully functional on an electronic level, as well.
Theres a few people out there still building valves the old fashioned way, and wed love to see more tip em if you got em. Video after the break.
[Thanks to Morris for the tip!]
Basing medical care and treatment on the scientific evidence should be the norm, but frequently it is not. Doctors may treat based on how they have always done it, or how other doctors do it (i.e. best practices), but there is a movement now to reorient medicine to follow the best scientific guidelines. https://en.wikipedia.org/wiki/Evidence-based_medicine https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3789163/ https://en.wikipedia.org/wiki/N_ray https://www.palain.com/?page_id=360
Posted by Nicholas Luedtke on Dec 13We have also been compiling and presenting the CVEs on a per stream
OPAQ has received a patent from the United States Patent & Trademark Office for its software-defined network segmentation technology that monitors connection requests on endpoint devices and enforces security policies to prevent lateral attacks on corporate networks (Patent # 10,122,760). The patented approach is part of the OPAQ Cloud, a platform-as-a-service that enables managed service providers to deliver Fortune 100-grade security to midsize enterprises. With this technology, OPAQ can offer enforcement of security policies at More
The post OPAQ awarded patent for software-defined network segmentation appeared first on Help Net Security.
The latest test flight by Sir Richard Bransons Virgin Galactic successfully rocketed to the edge of space and back.
The firms SpaceShipTwo passenger rocket ship reached a height of 82.7km, beyond the altitude at which US agencies have awarded astronaut wings.
It marked the planes fourth test flight and followed earlier setbacks in the firms space programme.
Poor IT governance prevented the IRS from making progress on a long-term effort to migrate 141 legacy applications from proprietary vendor software to open source Linux operating systems, according to an audit by the Treasury Inspector General for Tax Administration.
Under a migration plan developed in 2014, two-thirds of targeted applications and databases were supposed to have been successfully migrated by December 2016.
However, only eight of the 141 applications targeted have successfully transitioned to Linux as of February 2018. More than one third have not even started.
The IRS hosts 190 applications on the Solaris Sun Sparc system, with 141 of those targeted for migration to the open-sourced Linux operating system. The audit found that the project staff lacked the technical skills and training required to carry out the migration.
In 2013, an IRS analysis found that migrating their E-file system to Linux would save costs on paying $12 million in licensing fees over five years with Solaris. The plan was to migrate 33 percent of the target applications to Linux by the end of the 2015 fiscal year, and 66 percent by the end of the 2016...
A storm of criticism met the claimed creation of the first genome-edited children in China last month. One reason is that the twin girls have unpredicted new mutations whose effects are unknown. But it now appears there's a really easy way to ensure the CRISPR genome editing technique makes far more precise, predictable mutations.
The term "CRISPR genome editing" is really a bit of a misnomer. The method is most commonly used to disable genes by cutting the DNA in a specific site. When the cell repairs the cut, it typically adds or removes one or more DNA letters. But Paola Scaffidi of the Francis Crick Institute in London suspected that these mutations might not be as random as they appear. To find out, her team induced mutations in 1500 target sites in human cells growing in a dish.
They found a stunningly simple pattern. "We started with machine learning but we did not need it," Scaffidi says. It appears the sequence of the RNA that guides the CRISPR Cas9 protein to its target is crucial. If the fourth DNA letter from the end is a G, the resulting mutation is indeed relatively random. But if it's an A, T or C the outcome is more predictable. If it's a T, for instance, in 9 out of 10 cells a single extra T will be inserted at the target site.
If the findings are confirmed, it means the thousands of biologists around the world using CRISPR for research can make it far more precise and powerful simply by altering the guide RNAs they use. It also greatly boosts the prospects for using CRISPR to treat all kinds of disorders by correcting disease-causing mutations inside the body.
Also at The Francis Crick Institute.
Target-Specific Precision of CRISPR-Mediated Genome Editing (open, DOI: 10.1016/j.molcel.2018.11.031) (DX)
Hillicon Valley Presented by AT&T New momentum for privacy legislation | YouTube purges spam videos | Apple plans $1B Austin campus | Iranian hackers targeted Treasury officials | FEC to let lawmakers use campaign funds for cyber "IndyWatch Feed Tech"
Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...
The family of ZVS Regulators enables unsurpassed flexibility by delivering power at higher temperatures, at higher efficiency, in a smaller size, and in the first layout.
EFF is honored to announced that Gigi Sohn, a leading public advocate for the concept that broadband Internet should be open, affordable, and competitive, has joined our board of directors. A lawyer and innovator who has both counseled and stood up to the Federal Communications Commissionalbeit not always at the same timeSohn has fearlessly worked for over 30 years to make U.S. communications networks accessible to all consumers and protective of user privacy.
Gigi has focused throughout her career on
defending competition and innovation policies to advance net
neutrality and broadband access and affordability. As
counselor to former FCC commissioner Tom Wheeler from 2013 to 2016, Gigi played a
big role in the FCCs adoption of the strongest-ever net neutrality
rules, earning recognition in the tech press as one of the Heroes Who Saved the Internet.
Gigi helped co-found Public Knowledge (PK), the nations leading nonprofit representing consumer interests in telecommunications policy, and served as its president from 2001 to 2013. At PK Gigi stood up for fair use and consumer rights in the face of entertainment industry attacks, warned Congress and policymakers that AT&Ts planned merger with T-Mobile would greatly reduce competition while driving up prices for customers, and pushed the FCC to strengthen its net neutrality proposal in 2010.
Gigi has been a close collaborator with EFF for nearly 20 years, said EFF Executive Director Cindy Cohn. During her time leading Public Knowledge we worked together on too many issues to count, including stopping SOPA/PIPA in Congress. Gigi then helped make tremendous things happen on Network Neutrality and IS...
Posted by Michael Catanzaro on Dec 13------------------------------------------------------------------------
In addition to AMD's year-end Radeon driver updates issued today, their GPUOpen crew has also carried out some new open-source software releases...
Chinese cyber espionage and theft of intellectual property from U.S. companies is increasing and poses a dire threat to the country's security and economic competitiveness, Trump administration officials told senators on Wednesday.
"What hangs in the balance is not just the future of the United States, but the future of the world," Bill Priestap, assistant director of the FBI's counterintelligence division, told the Senate Judiciary Committee.
[...] John Demers, assistant attorney general for national security, said Chinese espionage against U.S. targets has steadily increased and China has stolen technology ranging from autonomous drones to chemical compounds. "We cannot tolerate a nation that steals the fruits of our brain power," Demers said, "and that is just what China is doing."
The Chinese espionage campaign extends beond[sic] government agents to encompass tourists, technology workers, students and academic researchers, they said. For example, the Chinese government's payment of students' tuition provides leverage to pressure them to bring home intellectual property, Priestap said.
Also at The Hill.
Read more of this story at SoylentNews.
Sen. Joe Manchin (D-W.Va.) has placed a hold on a Republican nomination to the Federal Communications Commission (FCC) in response to the agencys decision to pause a program that would fund wireless internet expansion in rural areas.Manchin...
This video is the tenth in a multi-part series discussing computing. In this video, well be discussing what cloud computing is and the fundamental change it brings in how we view and think about computing.
[0:272:19] Starting off well discuss, the revolution the cloud computing paradigm, computing as a utility, brings to the field of computing, and similar transformations seen when electricity became a utility.
[2:195:24] Following that well discuss, what exactly cloud computing is and the types of cloud computing: Infrastructure As A Service (IaaS), Platform As A Service (PaaS) and Software As A Service (SaaS) further extending to serverless architecture, Functions As A Service (FaaS).
In the era of touch screens and capacitive buttons, wed be lying if we said we didnt have the occasional pang of nostalgia for the good old days when interfacing with devices had a bit more heft to it. The physical clunk and snap of switches never seems to get old, and while you can always pick up a mechanical keyboard for your computer if you want to hear that beautiful staccato sound while firing off your angry Tweets, theres a definite dearth of mechanical interface devices otherwise.
[Jeremy Cook] decided to take matters into his own hands (literally and figuratively) by designing his own multipurpose USB rotary input device. Its not a replacement for the mouse or keyboard, but a third pillar of the desktop which offers a unique way of controlling software. Its naturally suited to controlling things like volume or any other variable which would benefit from some fine tuning, but as demonstrated in the video after the break even has some gaming applications. No doubt the good readers of Hackaday could think of even more potential applications for a gadget like this.
The device is built around the diminutive Arduino-compatible PICO board by MellBell, which features a ATmega32u4 and native USB. This allowed him to very rapidly spin up a USB Human Interface Device (HID) with minimal headaches, all he had to do was hang his buttons and rotary encod...
As Andrei Iancu does
Summary: Contrary to what the Director of the U.S. Patent and Trademark Office (on the left) has claimed, PTAB is liked by companies that actually create things and opposition to PTAB comes from power brokers of the Koch brothers, law firms, and trolls (including those who foolishly repeat them)
On December 12, 2018, Mr. Jain wrote on the same day (yesterday), Unified filed a petition for inter partes review (IPR) against U.S. Patent 6,697,730, owned and asserted by RideApp, Inc., an NPE. The 730 patent, directed to a transit system based on cellular communication, GPS locating technology, and digital computers, has been asserted in district court litigation against Lyft and Juno.
IPRs filed at the Patent Trial and Appeal Board (PTAB) are very powerful means by which to invalidate software patents, usually by citing 35 U.S.C. 101. Appeals to the Federal Circuit then put growing pressure on the USPTO to no longer grant such patents. RideApp, the patent troll, might soon have nothing at all. Its not a business, its a litigation pipeline that might soon have no patents left.
Its not difficult to see who opposes PTAB and why. Consider what happened earlier this year in Oil States (SCOTUS). We must express disappointment at Camilla Alexandra Hrdy, who has just ignorantly promoted Koch-funded lies (scholars funded by Big Oil) that call patents rights (that's a lie). The misleading term Public Rights is even used in her title and perhaps she fails to realise that the person shes boosting has put these words in Gorsuch's mouth (and even bragged about it in public). Here is what she said:...
A new email extortion scam is making the rounds, threatening that someone has planted bombs within the recipients building that will be detonated unless a hefty bitcoin ransom is paid by the end of the business day.
Sources at multiple U.S. based financial institutions reported receiving the threats, which included the subject line, I advise you not to call the police.
The email reads:
My man carried a bomb (Hexogen) into the building where your company is located. It is constructed under my direction. It can be hidden anywhere because of its small size, it is not able to damage the supporting building structure, but in the case of its detonation you will get many victims.
My mercenary keeps the building under the control. If he notices any unusual behavior or emergency he will blow up the bomb.
I can withdraw my mercenary if you pay. You pay me 20.000 $ in Bitcoin and the bomb will not explode, but dont try to cheat -I warrant you that I will withdraw my mercenary only after 3 confirmations in blockchain network.
Here is my Bitcoin address : 1GHKDgQX7hqTM7mMmiiUvgihGMHtvNJqTv
You have to solve problems with the transfer by the end of the workday. If you are late with the money explosive will explode.
This is just a business, if you dont send me the money and the explosive device detonates, other commercial enterprises will transfer me more money, because this isnt a one-time action.
I wont visit this email. I check my Bitcoin wallet every 35 min and after seeing the money I will order my recruited person to get away.
If the explosive device explodes and the authorities notice this letter:
We are not terrorists and dont assume any responsibility for explosions in other buildings.
The bitcoin address included in the email was different in each message forwarded to KrebsOnSecurity. In that respect, this scam is reminiscent of the various email sextortion campaigns that went viral earlier this year, which led with a password the recipient used at some point in the past and threatened to release embarrassing videos of the recipient unless a bitcoin ransom was paid.
I could see this spam campaign being extremely disruptive in the short run. There is little doubt that some businesses receiving this extortion email will treat it as a credible threat. This is exactly what happened today at one of the banks that forwarded me their copy of this email. Also, KrebsOnSecurity has received reports that numerous school districts across the country have closed schools early today in respons...
Join me for a quick review of the spikes & dips in the Bitcoin exchange rate. This time, its all about one very simple chart. [continue below graphic]
The chart below shows a history of BTC price spikes, dips and recovery. Click to enlarge, then start at the topand move down.
The table at right illustrates why I do not get too worked up over the plunge in the BTC exchange rate. There are no fundamental flaws in Bitcoin math or mechanisms, the market need for benefits conveyed by Bitcoin is terrific, and popular arguments against Bitcoin are severely flawed. Skeptics and Critics typically say this:
Even if blockchain currencies are beneficial and inevitable, Bitcoin can be displaced by another, better cryptocurrency.
A viable crypto may emergebut it will be one that is backed by a tangible asset or issued/sanctioned by government.
These arguments are false. They are made by individuals who dont yet fully appreciate a distributed, consensus mechanism and, especially, its relationship with trust, value, government and free markets.
What Bitcoin currently lacks is education, familiarity, standards, simple commercial tools (built upon clear analogies), definitive best practices, a widespread understanding of multisig & security, and limited recourse for certain commercial & retail transactions. But Bitcoin is still an infant, just like the early TV or the early telephone. All of these are under developmentwithout a hint of significant obstacles. Even the messy process of democracy among the various stakeholders is heading toward harmony (miners, developers, vendors, exchanges and consumers).
Of course, I am bullish on Bitcoin, and this may color my analysis. But, I try hard to keep an open mind. There have been moments in its history where I have questioned the market need or the potential for a setback in politics, legislation, or the mechanism itself. Tho...
At the start of the year the infamous hacking group Team Xecutor announced an unstoppable Nintendo Switch hack.
This made it possible to load pirated games onto the popular console, an opportunity many people have taken advantage of.
Some have taken it a step further by offering Nintendo Switch modifications for sale, specifically mentioning the Team Xecuter hack. This is what California resident Mikel Euskaldunak did, according to Nintendo.
In a complaint filed at a federal court this week, Nintendo of America accuses the man and several unnamed accomplices of various counts of copyright and trademark infringement.
The defendants allegedly offered modification devices and physical chips for the Nintendo Switch which bypass Nintendos anti-piracy protections.
This modification is installed in a users Nintendo Switch in the form of a circumvention tool along with unauthorized custom firmware. This exploit allows the playing of pirated Nintendo Console Games, the company writes.
Euskaldunak sold the mods in public through a profile at OfferUp.com. According to the advert, the Team Xecuter mod would allow buyers to play any Switch games they want.
Just load and play! In connection with the purchase of Nintendo Switch Mod Play Switch Games Team Xecuter, Defendants will give [the buyer] a free game of [his or her] choice, it reads.
In addition, the defendant also offered a 64GB SD card containing pirated games which could be loaded through Team Xecuters dongle.
These SD cards will come with any 4-6 (depending on the game size) released Nintendo Switch games of your choice. That is less than the price of a single Switch game.
Nintendo believes that the defendants modified more than 100 Switch game systems. In addition, they are suspected of having access to a large library of Switch games, including dozens of titles that havent been released in the US yet.
Interestingly, the sellers are aware that pirating games does not come without challenges. They explicitly warn that games downloaded from the Internet might be tracked...
Posted by Yves-Alexis Perez on Dec 13Data collected by Kees and regularly updated might help here. See
And dont forget what David Kappos is doing
Photo credit: Esteban Minero
Summary: IBMs hardheaded attitude and patent aggression unaffected by its strategic acquisition of a company that at least claimed to oppose software patents (whilst at the same time pursuing them)
As IBM takes over Red Hat (not finalised yet) Red Hat could use a reminder that IBM is hostile to software freedom, free software, sharing etc. because it's a propagandist for software patents and it's aligned with 'IP' extremists' front groups. Its funding them and its leading them.
Less than a day ago this article from a site of patent propagandists (pro-patent trolls, pro-UPC, pro-software patents and so on) was published with this summary: IBMs Manny Schecter believes public awareness of intellectual property has increased but there has not been a corresponding increase in understanding (patents are not property).
He mentioned patents specifically:
On the patent side, people often get confused about various aspects of patents, such as the difference between filing and grant date. All understandable, noted Schecter.
Those who are intimately familiar with IP do not necessarily help the situation: a second area of confusion, according to Schecter, comes from the public debate around IP. We argue vigorously for positions in the intellectual property world, and we have a tendency to use a lot of rhetoric and take a lot of extreme positions in trying to make our point, said Schecter. Sometimes we actually want that extreme position and sometimes we are just trying to get our point across.
Schecter urged the audience to close the gap be...
That lightning-bolt of a charger needs cooling for the cable and the battery
A consortium including BMW and Porsche has unveiled a fast charger that can deliver enough juice to an electric cars batteries in 3 minutes for it to travel 100 kilometers. The new charger can put the batteries state of charge above 80 percent in 15 minuteshalf the time that Teslas vaunted supercharger needs.
The chargers 450 kilowatts would fry anything but a specially modified car: Both the batteries and the charging cables themselves need to be cooled. Thats why the first station, which has just been opened to the public in the state of Bavaria, will have to pull its punches. Itll feed just 50 kW to the BMW i3, for instance. The companys iX3, due out in 2020, will take 150 kW.
The consortium, funded by the Bavarian government, also includes Allego GmbH, the operator; Phoenix Contact E-Mobility, which provided charging technology; and Siemens, which handled engineering.
EVs make up just a small fraction of all road vehicles, and offering ultra-fast-charging to the fraction of those EVs that can take it should be no big problem for utilities. But the grid might buckle under the strain of topping off a vast fleet of EVs, when we finally amass one.
Some people in the industry argue that wed do better with a slow-charging system that makes up for its lack of speed with heightened convenience. Wireless charging, once its widely available in garages, could provide such an alternative, argues Witricity, which develops such systems. Today, Witricity and Honda said they were working on a project to allow EVs to trade electric power with the grid, making such vehicles a load-bearing asset to utilities rather than just another burden.
Fast chargers? Itll be like the gas lines of the 70s, queuing up for your spot, Witricitys CEO, Alex Gruzen, told IEEE Spectrum back in April.
Submitted via IRC for Bytram
A feature introduced in the April 2018 Update of Windows 10 may have set off a privacy landmine within the bowels of Redmond as users have discovered that their data was still flowing into the intestines of the Windows giant, even with the thing apparently turned off. In what is likely to be more cock-up than conspiracy, it appears that Microsoft is continuing to collect data on recent user activities even when the user has explicitly said NO, DAMMIT!
First noted in an increasingly shouty thread over on Reddit, the issue is related to Activity History, which is needed to make the much-vaunted and little-used Timeline feature work in Windows 10.
Introduced in what had previously been regarded as one of Microsoft's flakiest updates prior to the glory of the October 2018 Update, of course Timeline allows users to go back through apps as well as websites to get back to what they were doing at a given point. Use a Microsoft account, and a user can view this over multiple PCs and mobile devices (as long[sic] you are signed in with that same Microsoft account). The key setting is that "Send my activity history to Microsoft" check box. Uncheck it and you'd be forgiven for thinking your activity would not be sent Redmondwards. Right?
Except, er, the slurping appears to be carrying on unabated. The Redditors reported that if one takes a look at the Activity History in the Privacy Dashboard lurking within their account, apps and sites are still showing up.
Read more of this story at SoylentNews.
This quadrotor can alter its shape in flight depending on where it needs to go
Quadrotors are fast, cheap, and capable, and theyre getting smarter all the time. Where they struggle a little bit is with adaptation. Many other kinds of robots can change their structure to better perform different tasks: Humanoids do it all the time, with all those conveniently placed limbs. Hey, wouldnt it be cool if drones had movable limbs too? Yes, it would. Someone should figure out how to do that.
Weve seen some drones in the past that can alter their shape in flight, but this Folding Drone (developed by roboticists from University of Zurich and EPFL) is different in several important ways. Each of its four arms has a servo motor at the base that can rotate one propeller independently, with some height differences between the arms making sure that the Folding Drone doesnt immediately blenderize itself. While there are some arm location combinations that are particularly handy, like completely unfolded (X morphology), completely folded (O), straight line (H), and partly folded (T), the drone isnt limited to those shapes, and it remains fully stable and controllable wherever its arms happen to be, even if the configuration is asymmetric. Its not easy to do thisit requires an adaptive control scheme able to cope in real-time with the dynamic morphology of the vehicle.We exploit the morphing to adapt the vehicles size to tasks such as traversing gaps, inspecting surfaces, or transporting objects. However, we believe that a morphing quadrotor can tailor its shape to more dynamic tasks, like for example flying at high speed, where it can improve its performance by folding to change its aerodynamic properties. This would allow very fast flight in time-critical scenarios. Davide Scaramuzza, University of Zurich
While the Folding Drone doesnt have quite as many degrees of freedom as that crazy flying dragon robot from ICRA, its much less complex and expensive, and can transform very quickly, as you can see in the video. It may not be able to wrap itself around anyones neck and slowly strangle them, but well let that slide just this once. The (relatively) simple design helps the Folding Drone maintain both efficiency and versatility, allowing it to operate autonomously with onboard sensing and computing. It doesnt sound like the drone can autonomously decide how to reconfigure itself to get past an obstacle yet, but the researchers are definitely working on that.
Theyre also working o...
When asking the question Do humans dream of machines?, its natural to think of the feverish excitement ahead of an iPhone or Playstation launch, followed by lines around the block of enthusiastic campers, eager to get their hands on the latest hardware as soon as is humanly possible. However, its also the title of an art piece by [Jonghong Park], and is deserving of further contemplation. (Video after the break.)
The art piece consists of a series of eight tiny harmonicas, which are in turn, played by eight fans, which appear to have been cribbed from a low-power graphics card design. Each harmonica in turn has a microphone fitted, which, when it picks up a loud enough signal, causes an Arduino Nano to actuate a mechanical finger which slows the fan down until the noise stops. Its the mechanical equivalent of a stern look from a parent to a noisy child. Then, the cycle begins again.
The build is very much of the type we see in the art world put together as simply as possible, with eight Arduinos running the eight harmonicas, whereas an engineering approach may focus more on efficiency and cost. Between the squeaks from the toy harmonicas and the noise from the servos entrusted to quiet them, the machine makes quite the mechanical racket. [Jonghong] indicates that the piece speaks to the interaction of machine (robot harmonica) and humanity (the finger which quells the noise).
Its a tidily executed build which would be at home in any modern art gallery. It recalls memories of another such installation, which combines fans and lasers into a musical machine.
Virgin Galactics tourism space shuttle on Thursday flew more than 50 miles above the earths surface, reaching a height considered by the U.S. Air Force and other government agencies to be the boundary of space.The ship reached a height of 51...
When we send astronauts to the surface of the Moon in the next decade, it will be in a sustainable fashion, says NASA Administrator Jim Bridenstinee. Learn how well expand partnerships with industry and other nations to explore the Moon and advance our exploration missions to even farther destinations, such as Mars: https://go.nasa.gov/2GeqhZL
Ransomware has become a persistent threat to users globally but for cybercriminals, it is a lucrative business. Recently, IT security researchers at Check Point unearthed a sophisticated ransomware decryption scam in which a Russian IT consultant company has been caught scamming ransomware victims. The company according to Check Point researchers calls itself Dr. Shifro and claims to provide 
This is a post from HackRead.com Read the original post: IT consultancy firm caught running ransomware decryption scam
And as many granted European Patents as it can get away with
Summary: Patent quality is a concept no longer recognisable at the European Patent Office; all that the management understands is speed and PACE, which it conflates with quality in order to register as much cash as possible before the whole thing comes crashing down (bubbles always implode at the end)
THE European Patent Office (EPO) does not intend to improve patent quality. It does not even acknowledge such an issue. Antnio Campinos is happy enough to personally promote software patents in Europe (even in his blog) and tell concerned stakeholders such as law firms that he just wants to remove the cause/source of criticism rather than properly tackle the issue. Kluwer Patent Blog wrote about it last month and commenters were understandably upset. Who does todays EPO serve? As we put it some weeks ago, "Antnio Campinos is Working for Patent Trolls at the Expense of Science and Technology" (the original purpose of the Office was to advance science).
Just more than a day ago the EPO was retweeting epi as saying: Visit us at the EPO Vienna, 5 Feb 19 for the Opposition & Appeal seminar supported by the EPO. You get an intensive and practical overview of all relevant legal & practical issues concerning opposition and appeal proceedings before the @EPOorg. https://patentepi.com/r/Opposition_Appeal_seminar
After years of claiming self-regulation would keep them in line, big tech companies spooked by new state data privacy safeguards are now calling for a national privacy lawone that would roll back these vital state protections.
We are one of sixteen consumer privacy and civil rights groups to remind Congress that while we support federal baseline data privacy legislation that provides basic protection for all Americans, such a law must not come at the price of dismantling (or as lawyers say, preempting) the legal rights of people who live in states with stronger data privacy protections.
State governments across the country have stepped up in the fight to strengthen privacy, with laws that grant their citizens important protectionssuch as a right to know what personal information companies collect about them (California), the right to decide whether to share biometric information with companies (Illinois), and protection from fraudulent collection of their data (Vermont).
As our coalition says in our letter:
We urge you to focus intently on the rights and dignity of your constituents by actively opposing any proposals to preempt stronger state laws in federal privacy legislation, so that existing state protectionsboth regulatory standards and liability rulesare maintained and so that states are free to adopt new protections.
While EFF would welcome sensible nationwide legislation that increases everyones protections for data privacy, a uniform federal law is counterproductive if it blocks something stronger. We will oppose any federal legislation that preempts hard-fought state privacy rules that provide stronger protection.
As we said in our ...
AMD today released their Radeon Software Adrenalin 2019 Edition geared for Windows gamers while Linux users should have AMDGPU-PRO 18.50 available shortly for those wanting to use this hybrid Vulkan/OpenGL driver component that does also feature the AMDGPU-Open components too in their stable but dated composition...
Forbes journalist Thomas Brewster wanted to find out just how well a variety of Android phones and a top-of-the-range Apple iPhone would fare against a determined attempt to break facial recognition. And he did that by having a 3D-model printed of his head.
Read more in my article on the Tripwire State of Security blog.
And the brand new management is still a censorship operation
Summary: The European Patent Organisation expects us to believe that Josef Kratochvl will keep the Office honest while his predecessor, the German who failed to do anything about Battistellis abuses, becomes officially subservient to Antnio Campinos
EARLIER THIS week the European Patent Organisation (EPO) made the decision to choose a particular new Chairman of the Administrative Council, seeing that in a matter of weeks Antnio Campinos turns his 'boss' into his assistant. Its just as ludicrous as that sounds and it says a lot about the lack of oversight at the EPO.
Suffice to say, the European Patent
Office wont be bossed by him but will boss him, as usual, as its a
rogue institution where Campinos, according to insiders, seeks to
have even greater powers than Battistelli.They wrote in
Twitter that Josef Kratochv [is] elected Chairman of the
Administrative Council of the European Patent Organisation,
a page from the prior day (warning:
Suffice to say, the European Patent Office wont be bossed by him but will boss him, as usual, as its a rogue institution where Campinos, according to insiders, seeks to have even greater powers than Battistelli. Look no further than the fact that his former boss will be bossed by him very shortly; but there are other aspects to this power grab, other than this uttertly gross reversal of roles.
Next month well have a lot to say about the Croat who made corruption at the EPO not only banal; it encouraged the Office to aggressively block and punish anything and anyone who dared bring up the subject.To quote the EPO: The Administrative Council of the European Patent Organisation today elected Josef Kratochvl (CZ) as its Chairman. Mr Kratochvl succeeds Christoph Erns...
Itll be 7.2 million miles away, but that still might be close enough to see with the naked eye heres when to catch it.
Jeremy Hong knows a secret or two about things you shouldnt do with radio frequency (RF), but hes not sharing.
That seems an odd foundation upon which to build ones 2018 Hackaday Superconference talk, but its for good reason. Jeremy knows how to do things like build GPS and radar jammers, which are federal crimes. Even he hasnt put his knowledge to practical use, having built only devices that never actually emitted any RF.
So what does one talk about when circumspection is the order of the day? As it turns out, quite a lot. Jeremy focused on how the military leverages the power of radio frequency jamming to turn the tables on enemies, and how civilian police forces are fielding electronic countermeasures as well. Its interesting stuff, and Jeremy proved to be an engaging guide on a whirlwind tour into the world of electronic warfare.
Jeremy comes to this field more as an informed enthusiast than as an employee or contractor for one of the many alphabet agencies or defense contractors who jealously guard such secrets. A recent EE grad from Wright State University, where courses on electronic warfare (EW) are offered, Jeremy not only developed an interest in the field but has been able to observe some of the systems in action, thanks to nearby Wright-Patterson Air Force Base....
Way back in 2010, we launched our popular browser
Everywhere as part of our effort to
web. At the time, the need for HTTPS Everywhere to
protect browsing sessions was as obvious as the threats were
ever-present. The threats may not be as clear now, but HTTPS
Everywhere is still as important to users as ever.
Could this be the end of underage drinking in New Orleans bars?
This is a scene likely to become more common in Louisiana pubs in the coming months as residents adopt the states new digital drivers license app LA Wallet. Next week, Louisianas Office of Alcohol and Tobacco Control is expected to announce that bars, restaurants, grocery stores and other retailers are allowed accept LA Wallet as proof of age, according to the apps developer, Envoc.
Louisianas Office of Alcohol and Tobacco Control did not immediately respond to Spectrums request for confirmation of the planned announcement.
The Baton Rouge-based company launched LA Wallet in June, after two years of collaboration with state officials. But so far only law enforcement officers making routine traffic stops are required to accept the digital drivers license. Next weeks announcement would greatly broaden the scope of the apps use.
About 71,000 people have downloaded LA Wallet so far, says Calvin Fabre, founder and president of Envoc. The app costs $5.99 in the Google Play and Apple App stores.
Users buy it, create an account with some basic information from their physical drivers license, and create a password. Thats it. No biometric securitylike iris scans or facial recognitionrequired.
The app links back to Louisianas Office of Motor Vehicles database, which completes the digital license with the users photo and additional information. Any changes to the license, like a suspension or renewal, are updated immediately in the app with a wireless network connection.
To present the licensesay, to a cop during a traffic stopthe driver (hoping his phone battery isnt dead) opens the app with a password, shows the cop the digital license image, and authenticates it by pressing and holding the screen to reveal a security seal. The license can be flipped over to show a scannable bar code on the back.
Theres also a handy security feature that allows anyone with the LA Wallet app to authenticate anothe...
With gigabit expanding across the nation, fixed broadband speeds in the United States are rapidly increasing. Speedtest data reveals a 35.8% increase in mean download speed during the last year and a 22.0% increase in upload speed. As a result, the U.S. ranks 7th in the world for download speed, between Hungary and Switzerland. The U.S. ranks 27th for upload, between Bulgaria and Canada, during Q2-Q3 2018. Though 5G looms on the mobile horizon, fixed broadband speeds in the U.S. continue to outpace those on mobile showing both faster speeds and greater increases in speed.
During Q2-Q3 2018, the average download speed over fixed broadband in the U.S. was 95.25 Mbps. Average upload speed was 32.88 Mbps. [...] According to Speedtest Intelligence data for Q2-Q3 2018, Comcast was the fastest provider in the U.S. with their XFINITY Internet receiving a Speed Score of 104.67.
Mean download speeds varied widely across the U.S. during Q2-Q3 2018 with the fastest state (New Jersey) coming in 139.8% faster than the slowest (Maine). The East Coast fared well with 5 states (New Jersey, Massachusetts, Maryland, Delaware and Rhode Island) and the District of Columbia ranking in the top ten. [...] Kansas City, Missouri topped the fixed chart as the fastest city in the U.S. during Q2-Q3 2018 with an average download speed of 159.19 Mbps. [...] Memphis, Tennessee came in last with an average download of 44.86 Mbps and Laredo, Texas was second to last at 55.37.
On average, U.S. consumers should have few complaints about recent increases in internet speeds. [...] As ISPs continue to build out their fiber networks and gigabit-level speeds expand we only expect to see internet speeds increase across the U.S. We'll check back in next year to see if all parts of the nation are experiencing the same improvements or if some states fall even farther behind.
Should consumers look forward to hitting their data caps now faster than ever, or are data caps being rolled back on gigabit connections?
Read more of this story at SoylentNews.
YouTube's "Rewind 2018" video this week surpassed Justin Bieber's "Baby" to become the most disliked video in the site's history."YouTube Rewind 2018: Everyone Controls Rewind," which was created to showcase the past year on the...
YouTube removed 58 million videos between July and September this year because they broke community guidelines.More than 7.8 million of those videos were taken down because they violated community guidelines. The other 50.2 million were taken down...
The Linux kernel is generally seen as a poor fit for safety-critical systems; it was never designed to provide realtime response guarantees or to be certifiable for such uses. But the systems that can be used in such settings lack the features needed to support complex applications. This problem is often solved by deploying a mix of computers running different operating systems. But what if you want to support a mixture of tasks, some safety-critical and some not, on the same system? At a talk given at LinuxLab 2018, Claudio Scordino described an effort to support this type of mixed-criticality system.
Posted by P J P on Dec 13Hello,
Sensor based monitoring is becoming popular among the aging population. Heres how to select a sensor to fit your application and parameters.
With the ever growing and aging population, patient auto-monitoring systems are becoming more and more popular. Their popularity stems from being both consistent and repeatable in addition to being low cost. Sensor-studded monitoring instruments in this category are also versatile because they can be used both in hospitals and at home. Selecting a sensor can be simple if the application and the parameters that need to be monitored are clearly understood. The most complicated sensors are implantables, followed by sensors used in catheters (through incision) and sensors used in body cavities, sensors that are external but come in contact with body fluids and sensors for external applications.
Implantable sensors need to be small, lightweight, and compatible with body mass as well as require very little power to operate. Most importantly, they must not decay over time. Since they are Class III medical devices, they automatically require FDA approval. Implantable sensors typically require two to four years for development and implementation before moving on to production. Generally, they are more expensive and require a specialist to surgically implant them. The power requirement is one of the major challenges for implantable sensors. Sensors that can function with no power are ideal, but these are few and rare in the market. Piezoelectric polymer sensors are well suited for vibration detection since they are small, reliable, durable, and require no power. Such sensors can be used in pacemakers that monitor activities of the patient.
This Piezo sensor is in the shape of a tiny cantilever beam with weight attached on one end that flops with body movement. Every time the patient moves, the sensor generates a signal. Using a pacemaker as an example, the pacemaker then receives this signal and makes the heart beat at the desired pace. The sensor can differentiate between various activities such as walking, running, or other physical activities. For instance, if the patient is resting, the signal will be zero and the pacemaker will make the heart beat at a minimal rate. In this way, the sensor signal is proportional to the level of activity. A miniature Piezo film vibration sensor is 15/100 of an inch in length including the pacemaker which houses it. Implanted sensors can also be powered by external sources. For example, a Radio Frequency (RF) energy wand when placed near a sensor located inside the body will power the sensor up. The sensor will then record patient measurements, transmit the data ba...
Looks like [Sam Zeloof] got bored on his Thanksgiving break, and things got a little weird in his garage. Of course when your garage contains a scanning electron microscope, the definition of weird can include experimenting with electron-beam lithography, resulting in tiny images etched into silicon.
Youll probably remember [Sam] from his 2018 Hackaday Superconference talk on his DIY semiconductor fab lab, which he used to create a real integrated circuit. That chip, a PMOS dual-channel differential amp, was produced by photolithography using a modified DLP projector. Photolithography imposes limits to how small a feature can be created on silicon, based on the wavelength of light.
[Sam] is now looking into using the electron beam of his SEM as a sort of CNC laser engraver to produce much finer features. The process involves spin-coating silicon wafers with SU-8, an epoxy photoresist normally used with UV light but that also turns out to be sensitive to electron beams. He had to modify his SEM to control the X- and Y-axis deflection with a 12-bit DAC and provide a custom beam blanker. With a coated wafer in the vacuum chamber, standard laser engraving software generates the G-code to trace his test images on the resist. A very quick dip in acetone develops the exposed chip.
[Sam] says these first test images are not too dainty; the bears are about 2.5 mm high, and the line width is about 10 m. His system is currently capable of resolving down to 100 nm, while commercial electron beam lithography can get down to 5 nm or so. He says that adding a Faraday cage to the setup might help him get there. Sounds like a project for Christmas break.
Following the GeForce RTX 2080 Linux gaming benchmarks last week with now having that non-Ti variant, I carried out some fresh GPU compute benchmarks of the higher-end NVIDIA GeForce and AMD Radeon graphics cards. Here's a look at the OpenCL performance between the competing vendors plus some fresh CUDA benchmarks as well as NVIDIA GPU Cloud TensorFlow Docker benchmarks.
The KDE community is out with an early holiday presents for its users: KDE Applications 18.12 is shipping today...
Posted by Hacker Fantastic on Dec 13Morning coffee not fully consumed, I meant to write NetBSD (stack overflow,
For those not yet prepared to move over to the Mesa 18.3 series, Mesa 18.2.7 is out today with the latest batch of fixes...
The French foreign ministry confirmed tha hackers breached
the Ariane system, its travel alert registry website, and personal data of citizens could be misused.
The Ariane system provides security alerts to registered users when traveling abroad. At the time there arent technical details about the intrusion or the number of affected people.
Users reported receiving emails notifying them that their names, cellphone numbers and email addresses may have been stolen, but the ministry said none of the data was sensitive or of a financial nature. reported the AFP press.
statement did not indicate who might be behind the attack.
The ministry started notifying the incident to the affected users, it also informed media to have taken necessary measures to avoid similar incidents in the future.
We immediately took the necessary measures to ensure this type of incident would not happen again, it said.
The Ministry confirmed that the site was now secured.
(Security Affairs Travel Alert Registry, hacking)
In 1973, Bowmar/ALI was the biggest calculator company in the world. In 1976, it went out of business
The creation of the Bowmar Brain was a desperation move. In 1968, Monsanto created the first numeric LED display cheap enough to be used in consumer products. Several other companies followed Monsanto into the market, among them Bowmar/ALI, then a tiny defense-industry subcontractor in Acton, Mass.
At first, all Bowmar/ALI intended to do was make and sell LED displays. They were novel, but at the time they were also small and faint, and there werent many commercial uses for them. One possible application would have been in the compact calculators that had only recently begun to appear, but Bowmar was having trouble cracking that new and growing market.
The very earliest battery-powered calculators, which appeared in Japan around 1970 from Canon, Sharp, and Sanyo, used unwieldy fluorescent or gas-discharge displays, or even tiny thermal-paper printers. Could Bowmar succeed with a handheld calculator that used LED displays? In 1970, the company decided to find out. Thus the 901B was born.Photo: Division of Medicine and Science/National Museum of American History/Smithsonian Institution Handy Guide:...
Posted by Hacker Fantastic on Dec 13Hi, I do not believe this is either CVE-2005-0469 or CVE-2005-0468. The
Aides have advised President Trump to stay out of the case involving a top Chinese technology executive, a source told The Wall Street Journal.Some of Trump's advisers have warned him that it would not be productive for the White House to intervene...
Submitted via IRC for SoyCow1984
A dramatic automatic abort 7.5 seconds before the planned liftoff of a United Launch Alliance Delta 4-Heavy rocket Saturday night kept the towering launcher on the pad at Vandenberg Air Force Base, California, with a top secret spy payload for the National Reconnaissance Office.
The 233-foot-tall (71-meter) rocket was counting down to launch at 8:15 p.m. PST Saturday (11:15 p.m. EST; 0415 GMT Sunday), but an automated sequencer detected a technical issue and triggered an abort. "Hold hold hold," a member of the ULA launch team declared on the countdown net.
[...] In the statement, ULA said the abort was "due to an unexpected condition during terminal count at approximately 7.5 seconds before liftoff. "The team is currently reviewing all data and will determine the path forward. A new launch date will be provided when available," ULA said.
takyon: A new date has not been chosen yet.
Read more of this story at SoylentNews.
Unity Tech is ending out the year with their Unity 2018.3 game engine update that brings a number of new features and improvements to its many supported platforms...
NBA superstar Steph Curry said he was kidding when he said he doesnt believe humans landed on the moon.
Obviously I was joking when I was talking on the podcast, the Golden State Warriors guard told ESPN on Wednesday. I was silently protesting how stupid it was that people actually took that quote and made it law.
While appearing on an episode of the podcast Winging It, which posted Monday, Curry asked fellow NBA players Vince Carter, Kent Bazemore and Andre Iguodala We ever been to the moon?
Payloads on the flight will collect valuable data to improve technologies for future exploration missions. This flight will be specifically be used to study how dust disperses in microgravity. Understanding dust dynamics can help abate the damage that is caused by particles contaminating hardware and habitats. Swoop in: https://go.nasa.gov/2Gr79YT
In November, Dr. Aubrey de Grey, a graduate of the University of Cambridge, was in Spain to attend the Longevity World Forum in the city of Valencia, and he gave a press conference organized by his friend, MIT engineer Jos Luis Cordeiro.
Dr. Aubrey de Grey is the scientific director (CSO) and founder of the SENS Research Foundation. In Madrid and Valencia, Dr. de Grey reaffirmed for Tendencias21 one of his most striking statements of 2018: In the future, there will be many different medicines to reverse aging. In five years, we will have many of them working in early clinical trials.
The Longevity World Forum is a congress on longevity and genomics in Europe. It is heir to the first congress in Spain, the International Longevity and Cryopreservation Summit, which was held at the CSIC headquarters in Madrid in May 2017, and Dr. de Grey also participated in that event. In Valencia, his presentation was recieved with interest, and Dr. de Grey explained to this select audience that aging will be treated as a medical problem in the near future. Rather than treating its symptoms using the infectious disease model, the root causes of aging will themselves be treated.
Since its advent in 2003, Skype has become an industry standard when it comes to video calling on Windows PC. In addition to video calls, Skype is also a full-fledged messaging and voice calling application that is available for smartphones as well.
Even after its immense popularity, Skype is still not the most feature-rich and secure video calling application.
So these are some of the best alternatives to Skype that will definitely enhance your video calling experience.
The first Skype alternative for PC that you are probably already using is WhatsApp. This immensely popular messaging application also doubles up as a reliable video-calling application. WhatsApp is available for both smartphones and computers.
A majority of your friends and family members are already using WhatsApp, which eliminates the need for signing up for new services.
WhatsApp now supports group video calls, using which you can communicate with up to four friends at once. Overall WhatsApp is a reliable Skype alternative.
Google Hangouts is another popular video calling service that is mainly used by various organizations to interact with co-workers. Similar to WhatsApp Google Hangouts is also available for smartphones and computers.
Using Google Hangouts you can hold a video call with up to 25 participants. So as to invite and connect with different users you only need their email address or phone number.
During calls, Google Hangouts offers impressive audio and video quality and the connection is secure as well.
Indigo Ag, known for its microbe-coated seeds, is acquiring geospatial data startup TellusLabs to use satellites to learn every last thing about its farmers fields.
Security experts at McAfee uncovered a hacking campaign, tracked as Operation Sharpshooter, aimed at infrastructure companies worldwide. The threat actors are using malware associated with Lazarus APT group that carried out Sony Pictures attack back in 2014.
The current campaign os targeting nuclear, defense, energy, and financial companies, experts believe attackers are gather intelligence to prepare future attacks.
In October and November 2018, the Rising Sun implant has appeared in 87 organizations across the globe, predominantly in the United States, based on McAfee telemetry and our analysis. reads the analysis published by McAfee.
Based on other campaigns with similar behavior, most of the targeted organizations are English speaking or have an English-speaking regional office. This actor has used recruiting as a lure to collect information about targeted individuals of interest or organizations that manage data related to the industries of interest.
Threat actors are carrying out spear phishing attacks with a link poining to weaponized Word documents purporting to be sent by a job recruiter. The messages are in English and include descriptions for jobs at unknown companies, URLs associated with the documents belongs to a US-based IP address and to the Dropbox service....
The greatest hardware hacks of all time were simply the result of finding software keys in memory. The AACS encryption debacle the 09 F9 key that allowed us to decrypt HD DVDs was the result of encryption keys just sitting in main memory, where it could be read by any other program. DeCSS, the hack that gave us all access to DVDs was again the result of encryption keys sitting out in the open.
Because encryption doesnt work if your keys are just sitting out in the open, system designers have come up with ingenious solutions to prevent evil hackers form accessing these keys. One of the best solutions is the hardware enclave, a tiny bit of silicon that protects keys and other bits of information. Apple has an entire line of chips, Intel has hardware extensions, and all of these are black box solutions. They do work, but we have no idea if there are any vulnerabilities. If you cant study it, its just an article of faith that these hardware enclaves will keep working.
Now, there might be another option. RISC-V researchers are busy creating an Open Source hardware enclave. This is an Open Source project to build secure hardware enclaves to store cryptographic keys and other secret information, and theyre doing it in a way that can be accessed and studied. Trust but verify, yes, and thats why this is the most innovative hardware development in the last decade.
Although as a somewhat new technology, processor enclaves have been around for ages. The first one to reach the public consciousness would be the Secure Enclave Processor (SEP) found in the iPhone 5S. This generation of iPhone introduced several important technological advancements, including Touch ID, the innovative and revolutionary M7 motion coprocessor, and the SEP security coprocessor itself. The iPhone 5S was a technological milestone, and the new at the time SEP stored fingerprint data and cryptographic keys beyond the reach of the actual SOC found in the iPhone.
The iPhone 5S SEP was designed to perform secure services for the rest of the SOC, primarily relating to the Touch ID functionality. Apples revolutionary use of a secure enclave processor was extended with the 2016 release of the Touch Bar MacBook Pro and the use of the Apple T1 chip. The T1 chip was again used for TouchID functionality, and demonstrates that Apple is the king of vertical integration.
But Apple isnt the only company working on secure enclaves for their computing products. Intel has developed the SGX extension which allows for hardware-assisted security enclaves. These enclaves give developers the ability to hide cryptographic keys and the components for digital rig...
The original action camera started as a home-sewn strap that secured a disposable camera to the users wrist
There are entrepreneurs who set out wanting to be entrepreneurs, and they dont really care how they do it. And then there are entrepreneurs driven by a vision so compelling that entrepreneurship becomes a means to an end. Nick Woodman was in that latter category.
After failing with two successive startups, he just wanted to take some time off and travel and surf. While bumming around and riding waves in Indonesia, it occurred to him that it might be cool to take some point-of-view pictures while surfing. Hardly any such photos existed, mainly because, news flash: It is virtually impossible to handle a camera while surfing. Wanting to rectify this situation, Woodman took a busted surfboard leash and a rubber band and jury-rigged a strap that would hold a disposable waterproof film camera from Kodak securely on his wrist.Photo: GoPro Camera, Action: The original Hero had a hook mechanism that held the camera flat on the users wrist when the device wasnt being used to take photos.
Woodman thought other surfers might be interested in documenting their exploits, and he figured he might make a little cash selling straps. He bought some blocks of plastic, found a Dremel tool, borrowed his moms sewing machine, and went to work. He combined some some...
Iranian-backed hackers targeted the personal email accounts of U.S. Treasury officials around the time President Trump reimposed sanctions on the country, according to an Associated Press report.The news outlet on Thursday reported that the...
Cancer research is an area of medical science that, rightfully, gets considerable attention. There are nearly 14.5 million Americans with a history of cancer and with more than 13 million estimated new cancer cases each year. Its no wonder even artificial intelligence (AI) has gotten into the field. Researchers from the University of Michigan are not getting left behind, with a groundbreaking method that has the potential to eliminate tumors.
This new technology uses nano-sized discs, about 10 nm to be exact, to teach the body to kill cancer cells. We are basically educating the immune system with these nanodiscs so that immune cells can attack cancer cells in a personalized manner, said James Moon from the University of Michigan.
Each of these nanodiscs is full of neoantigens (tumor-specific mutations) that teach the immune systems T-cells to recognize each neoantigen and kill them. These work hand-in-hand with immune checkpoint inhibitors that boost the responses of T-cells forming an anti-cancer system in the body that wipes out tumors and potentially keeps them from reemerging.
Via: Fortune: Harvard Universitys endowment is reportedly buying up vineyards in Californias wine country, along with the water rights belonging to those properties. Instead of making the land purchases in its own name, Harvard is using a wholly owned subsidiarynamed Brodiaea after the scientific name for the cluster lilyto buy vineyards. Harvard created Brodiaea in 
Via: Of Two Minds: The elites clever exploitation of politically correct cover stories has enthralled the comatose, uncritical Left, but not those who see their living standards in a free-fall.
Evolutionary genetic theory shows that genetic variation can be maintained when selection favors different versions of the same genes in males and femalesan inevitable outcome of having separate sexes. That is, for many genes, there may not be a universally best version, but rather one is best for males and one is best for females. This is known as sexually antagonistic genetic variation, but it might only be maintained under a narrow set of conditions, limiting its prevalence in nature. However, a new study by Dr. Karl Grieshop and Professor Gran Arnqvist, published in PLoS Biology, may change this view.
New test proposal Do you experience stress, entropy, decoherence? Yes? Ofcourse you do. Well, I declare you self- aware .
A report that a fish can pass the mirror test for self-awareness reignites debates about how to define and measure that elusive quality.
Posted by Greg KH on Dec 13Which is better, to be running a system with unkown or known bugs? :)
This odd hybrid camera had a mechanical shutter and a 6.1-megapixel image sensor
Starting in the 1940s and for the next 30 years or so, rangefinder cameras were de rigueur for those who wanted professional-looking photographs. But in the 1970s, single-lens reflex cameras were introduced, later followed by digital SLRs, which made it easy for even the most unskilled amateurs to consistently take decent photos. As digital SLRs soared in popularity, rangefinders became curiosmainly suitable, it seemed, for occasional use by professionals and serious hobbyists. Then Epson introduced the R-D1, the first digital rangefinder, which single-handedly returned rangefinders to combined commercial and artistic relevance.
Rangefinder cameras use two optical pathsone through the lens, one through a separate rangefinderto get two slightly different angles on the same view, which are then superimposed. The photographer turns the lens focus ring, and when the two images align, the object is in focus.
SLRs, on the other hand, use mirrors and prisms to project an image coming through the lens onto a viewfinder, thereby allowing the user to focus it. When the shutter-release button is pressed, the main mirror is physically flipped up and out of the pathway between lens and film (or image sensor). Because the images that photographers see in their viewfinders come through the lens, what they see is what they get. For that reason, the arrangement lends itself well to a system in which the lenses can be changed. By the end of the 1970s, SLRs were outselling rangefinders by a big margin....
Product management, reliability, and security jobs pay the most in Silicon Valley, says job search firm Indeed
Job-search site Indeed crunched its Silicon Valley hiring numbers for 2018, looking at tech job searches, salaries, and employers, and found that engineers who combine tech skills with business skills as directors of product management earn the most, with an average salary of US $186,766. Last year, the gig came in as number two, at $173,556.
Also climbing up the ranks, and now in the number two spot with an average annual salary of $181,100, is senior reliability engineer. Application security engineer is third at $173,903. Neither made the top 20 in 2017.
And while it seems that machine learning engineers have been getting all the love in 2018, those jobs came in eighth place, at $159,230. Thats still a bit of a leap from last year, when the job made its first appearance on Indeeds top 20 highest-paying jobs in the 13th spot at $149,519. This years top 20 is below; last years numbers are here.
Highest-paying tech jobs in Silicon Valley (January through October, 2018):...
Director of product management
Senior reliability engineer...
Submitted via IRC for Bytram
Apple will build a $1 billion campus in Austin, Texas, and establish smaller new locations in Seattle, San Diego and Culver City, California, the company said Thursday. The tech giant based in Cupertino, California, says the new campus in Austin will start with 5,000 employees working in engineering, research and development, operations, finance, sales and customer support. It will be less than a mile from existing Apple facilities.
The other new locations will have more than 1,000 employees each.
Austin already is home to more than 6,000 Apple employees, representing the largest population of the company's workers outside of Apple's Cupertino headquarters, where most of its roughly 37,000 California employees work.
[...] The company also said it plans to expand in Pittsburgh, New York and Colorado over the next three years.
Read more of this story at SoylentNews.
Via: CBS: Californians may or may not type OMG at the news, but texting may soon come with an extra fee on their mobile phone bills. State regulators are weighing a tax on text messaging to help fund a program that makes phone service available to low-income residents. A texting surcharge could help sustain the 
Posted by Salva Peir on Dec 13I totally agree its a robustness bug, not a vulnerability,
Abstract: The term blockchain has caused much confusion and damage due to its failure to accurately capture the core characteristics of decentralized byzantine fault tolerant systems. In this article, a restoration of an older term is proposed as replacement.
The idea for the Walkman came from Sonys opera-loving cofounder
Roughly half of all the people alive today were born after the Walkman was introduced. Thanks to Guardians of the Galaxy, though, almost everyone knows what a Walkman is. But if you werent there in 197980, you dont know what a head-spinning revelation the thing was, how radically it changed the way music was played and consumed, or the stunning speed with which it became seemingly ubiquitous.
Back in the 70s there were plenty of cassette tape decks, but the prevailing trend was to make them bigger, not smaller. Bragging rights went to whoever could pump out the most sound. The prestige player was a boom box, and in 1979, the biggest of them were about as big as a Fiat 128 and had more sophisticated lighting. (Okay, that size comparison is pure exaggeration. But on some of them, the lighting really was dazzling.)
Then Sony starts selling this little player, small enough to put in a large pocket, and inexpensive. You could take it anywhere. Today, with smartphones and earbuds nearly as commonplace as socks, young folk will have a hard time understanding how crazily revolutionary this was: You used headphones to listen to your own music privately. Nobody would know you were listening to Captain & Tennille or Air Supply unless you told them.
In fact, the Walkman came about because one guy wanted to listen to opera on airplanes without annoying his fellow passengers. This one guy, Masaru I...
GEO Satellites business globally make roughly 80% of the overall Space market business with $270B revenues claimed in 2017. How a Space Industry of such kind level of business can disappear is not an argument for many years to come but how a transformation of the Satellite configuration can impact the Space Industry this represents a real topic.
I already discussed in my previous article of how the advancement of A.I. bringing to autonomous missions for satellites, 3D printing permitting on-orbit Manufacturing and Robotic Assembly are not far away technologies, with the mature advancements achieved in on-Ground applications, to be applied to Space Satellites. Already today recently born Startups are working on Satellites on-board software/hardware permitting more autonomous tasks with decision making capability without being piloted from remote on-Ground Stations, significantly reducing operative costs.
Arriving to build fully autonomous Satellites is just a matter of time, with remotely controlled operations to be applied only for safety contingencies. The foreseen growth in the number of small satellites by order of magnitudes push the market this way.
WASHINGTON When a blazing fireball from space exploded over Earth on July 25, scientists captured the first-ever seismic recordings of a meteor impact on ice in Greenland.
At approximately 8 p.m. local time on that day, residents of the town of Qaanaaq on Greenlands northwestern coast reported seeing a bright light in the sky and feeling the ground shake as a meteor combusted over the nearby Thule Air Base.
But the fleeting event was detected by more than just human observers, according to unpublished research presented Dec. 12 here at the annual conference of the American Geophysical Union (AGU).
Complementing all of the AMDGPU feature work already staged for the upcoming Linux 4.21 kernel, another (small) batch of material was sent out on Wednesday...
The first cellphone with an AMOLED screen fizzled in the marketplace, despite combining several very advanced technologies
The Nokia N85 isnt on anyones list of best phones of all time. Heck, it didnt even make the list of top five best-selling Nokia phones released in 2008. What makes it special is that it was the first cellular handset to incorporate what would come to be the ne plus ultra of smartphone screens: an active-matrix organic light emitting diode (AMOLED) display.
Most phones in those days incorporated TFT (thin-film transistor) screens, though a few had OLED displays. AMOLEDs provided a much richer color palette and better color contrast than TFTs. Battery capacity has never not been an issue with smartphones, and AMOLEDs drew less power than OLEDs and significantly less power than TFTs. They have a wider viewing angle than TFTs. AMOLEDs are also flexible, a trait of little consequence 10 years ago, but the key enabler of the curved screens that some phone manufacturers are experimenting with today. AMOLED displays did not start out as touch screens; that capability would be created later by putting a touch-sensitive layer on top of the AMOLED screen....
When we think of physics experiments, we tend to envision cavernous rooms filled with things like optical benches, huge coils in vacuum chambers, and rack after rack of amplifiers and data acquisition hardware. But it doesnt have to be that way you can actually perform laser interferometry with a single component and measure sub-micron displacements and more.
The astute viewer of [Ben Krasnow]s video below will note that in order to use the one component, a laser diode, as an interferometer, he needed a whole bunch of support gear, like power supplies, a signal generator, and a really, really nice mixed-signal oscilloscope. But the principle of the experiment is the important bit, which uses a laser diode with a built-in monitoring photodiode. Brought out to a third lead, older laser diodes often used these photodiodes to control the light emitted by the laser junction. But they also respond to light reflected back into the laser diode, and thanks to constructive and destructive interference, can actually generate a signal that corresponds to very slight displacements of a reflector. [Ben] used it to measure the vibrations of a small speaker, the rotation of a motor shaft, and with a slight change in setup, to measure the range to a fixed target with sub-micron precision. Its fascinating stuff, and the fact you can extract so much information from a single component is pretty cool.
We really like [Ben]s style of presentation, and the interesting little nooks and crannies of physics that he finds a way to explore. He recently looked at how helium can kill a MEMS sensor, an equally fascinating topic.
[baldpower] sent in this tip. Thanks!
At Intels recent Architecture Day, Raja Koduri, Intels senior vice president of Core and Visual Computing, outlined a strategic shift for the companys design and engineering model. This shift combines a series of foundational building blocks that leverage a world-class portfolio of technologies and intellectual property (IP) within the company.
Architecture Day Fact Sheet: New Intel Architectures and Technologies Target Expanded Market Opportunities
This approach is designed to allow Intel to drive an accelerated pace of innovation and leadership, and will be anchored across six strategic pillars:
Kanye West is the worst password offender of 2018, according to Dashlane. When visiting the White House, the famous rapper was sprotted unlocking his iPhone with the passcode 000000. The Pentagon made second place: an audit by the Government Accountability Office revealed easy-to-guess admin passwords and default passwords for multiple weapons systems. Other offenders on the list include: Italian company Ferrero, who offered spectacularly bad password advice to users (they suggested the use of Nutella More
In March 2018, security experts at InfoArmor discovered a misconfigured server online that contained taxpayer identification numbers, or Cadastro de Pessoas Fsicas (CPFs), for 120 million Brazilian nationals. It is not clear how long data remained exposed online or who accessed them.
Every Brazilian national has assigned a taxpayer identification number that allows him to perform ordinary operations, such as opening a bank account, paying taxes, or getting a loan.
Experts discovered the file index.html_bkp on the Apache server (likely a backup of the index.html), which caused the web server to display the list of the files and folder stored in that folder and download them.
The folder included data archives ranging in size from 27 megabytes to 82 gigabytes.
Experts at InfoArmor discovered that one of the archive contained data related to Cadastro de Pessoas Fsicas (CPFs), personal information, military info, telephone, loans, and addresses.
CPFsare an identification number issued by the Brazilian Federal Reserve to Brazilian citizens and tax-paying residentaliens, and each exposed CFP linked to an individuals banks, loans, repayments, credit and debit history, voting history, full name, emails, residential addresses, phone numbers, date of birth, family contacts, employment, voting registration numbers, contract numbers, and contract amounts. reads the report published by InfoArmor....
How do I set up a LAMP stack on RHEL 8 cloud server or VPS or bare metal server? How can I install Linux, Apache, MySQL/MariaDB, PHP (LAMP) stack On RHEL (Red Hat Enterprise Linux) 8?
The post How To Install Linux, Apache, MySQL, PHP (LAMP) stack On RHEL 8 appeared first on nixCraft.
Congress is seeing a new flurry of activity toward drafting a national privacy law as major breaches mount and the publics anger over companies data policies grows.The calls for a privacy bill have been growing louder in recent months. And for...
Samuel Pitoiset of Valve's Linux graphics driver team has landed some fresh patches in Mesa 19.0 (and also marked for back-porting to the stable branch) to help out the DXVK gaming experience for Windows games using Direct3D 11 that are re-mapped to run on top of the Vulkan graphics API...
Last week, Sony released PlayStation Classic with 20 officially preinstalled games, which includes games such as Metal Gear Solid, Final Fantasy VII, Grand Theft Auto, and Resident Evil Directors Cut. The list of games left out many countless classic games from the 90s leaving fans disappointed. Moreover, the gaming console does not have any built-in machine to add more unofficial games.
However, this did not stop the members of the console hacking community to find a way out to unofficially add games to the mini-console. Just one week after its launch, hackers have apparently found a method to run games and software on the PlayStation Classic via a USB flash drive, reports Ars Technica.
Popular console hackers, yifanlu and madmonkey1907 have managed to successfully sideload the PlayStation Classics code via the systems UART serial port. Thanks to the weak cryptography in the PlayStation Classic, which was discovered by these console hackers while dumping the PlayStation Classic system code onto an external machine.
According to the hackers, the most sensitive parts of the PlayStation Classics codes were signed and encrypted using a key that had been mistakenly left behind on the console instead of being held by Sony.
YifanLu took to Twitter and documented the process in real-time of hacking the PlayStation Classics security. He was able to successfully run Crash Bandicoot on the console via a USB thumb drive (see video below).
YifanLu stated, One key is, Hey am I Sony?The other key is saying, Hey I am Sony. They distributed the key that identifies [themselves] uniquely and this key doesnt expire for another 50 years or so.
Basically, consoles have encrypted codes that run in the system to prevent people from making any changes. However, on the PlayStation Classic, the necessary tool to decrypt the systems codes is already available in the consoles system and all a user has to do is copy it to their PC.
In order to hack the mini-console, yifanlu and madmonkey1907 used an open-source tool called BleemSync, which is available on GitHub for PlayStation Classic owners w...
Rocket Lab is set to launch their second mission in just over a month on Thursday (local time), in a window opening at 04:07 UTC and lasting until 08:00. The Electron rocket will carry a host of CubeSats for NASA's Educational Launch of Nanosatellites (ELaNa) program.
The 19th such mission to deploy educational CubeSats into orbit will also be the first mission procured under NASA's Venture Class Launch Services (VCLS) program. Rocket Lab, Virgin Orbit, and Firefly Aerospace were selected to provide dedicated smallsat launch vehicles to support the increasing role of CubeSats in NASA's research.
Thursday's launch was scrubbed and moved to Friday (early hours UTC).
Read more of this story at SoylentNews.
With no official copies on the market, entertainment companies are unable to compete in what would ordinarily be the most profitable window of opportunity for sales. Thats why, year after year, individuals who leak content early become targets for law enforcement.
Yesterday the Department of Justice revealed that a federal grand jury has indicted five men in four countries on charges that they distributed or offered for sale hundreds of movies and TV shows in advance of their official release. It appears to be one of the most important prosecutions in recent memory.
Malik Luqman Farooq, 30, of the UK, is alleged to have sold access to more than a dozen stolen pre-release or contemporaneous-release films over a period of two years. He is alleged to have used online aliases including dark999, codex, and Lucky.
Aditya Raj, an assumed resident of India, allegedly released pirated movies online and was involved in camming in India.
Sam Nhance, believed to live in Dubai, United Arab Emirates, allegedly maintained a server on which other members of the group stored and manipulated videos for distribution. He used online aliases including SamNhaNc3
Ghobhirajah Selvarajah, who is claimed to live in Malaysia, owned a PayPal account which was used to accept payments from people accessing the movies and to pay server bills. He used aliases including Hunter and Hunter X.
Jitesh Jadhav, another presumed resident of India, was allegedly involved in camcording films in India, including The Amazing Spider-Man 2, X-Men: Days of Future Past, and Dawn of the Planet of the Apes.
Of the five indicted men, only one Malik Luqman Farooq has been physically detained by authorities. He was reportedly arrested by City of London Police and is currently awaiting trial in the UK.
None are in U.S. custody but face a seven-count indictment listing conspiracy to commit computer fraud, unauthorized access to a computer, aggravated identity theft, and copyright infringement.
According to the indictment, the group began offending prior to May 5, 2013 and continued to May 20, 2015.
Its alleged that Farooq, Raj, Nhance, and Selvarajah rented servers from companies including OVH which they used to store pirated copies of movies which had been illegally obtained from servers operated by movie, distribution, and other third-party companies.
Farooq and Jadhav are further accused of obta...
A more flexible alternative called Graph Query Language, developed by Facebook, is spreading fast and has won over companies ranging from GitHub to Audi.
GraphQL is heavily inspired by another language called Facebook Query Language, which in turn was based on Structured Query Language, the well-established lingua franca of database software supported by Oracle, Microsoft, and other database makers. That makes the structure and syntax of GraphQL familiar to many developers.
Posted by Solar Designer on Dec 13Hi,
The curious case of George Duke-Cohan, Huaweis CFO finds herself in hot water, and the crazy world of mobile phone mental health apps.
All this and much more is discussed in the latest edition of the award-winning Smashing Security podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guests Mikko Hyppnen from F-Secure and technology journalist Geoff White.
Posted by P J P on Dec 13Hello,
Its a problem that has many academics here worried. As India becomes increasingly polarised, coordinated efforts to popularise pseudoscientific theories, and to aggrandise the nations own scientific past, have begun to gain ground, they say. Its a worrying mash-up of nationalism, religion, and scientific bunkum that appears to be an increasingly easy selland one that leaves the population both misinformed and perennially at odds with itself. That is why our leaders and scientists talk about how evolution is wrong, said Aniket Sule, an astrophysicist and colleague of Karandikar at HBCSE, or how Indians were first to invent plane or atomic theory, or how cow worship is scientific.
A wave of superstitions is being promoted as legitimate science.
I believe it is likely that we will have 10,000 qubit quantum computers within 5 to 10 years. There is rapidly advancing work by IonQ with trapped ion quantum computers and a range of superconducting quantum computer systems by Google, IBM, Intel, Rigetti and 20005000 qubit quantum annealing computers by D-Wave Systems.
10,000 qubit quantum computers should have computing capabilities far beyond any conventional computer for certain classes of problems. They will be beyond not just any regular computer today but any non-quantum computer ever for those kinds of problems.
Those quantum computers will help improve artificial intelligence systems. How certain is this development? What will it mean for humans and our world?
Posted by Salva Peir on Dec 13Hi there,
Two Russian cosmonauts have removed samples from a Soyuz spacecraft docked at the International Space Station during a spacewalk. They used knives and shears to cut around the now-sealed 2mm hole in the Soyuz MS-09:
Expedition 57 flight engineers Oleg Kononenko and Sergey Prokopyev of the Russian federal space agency Roscosmos conducted the 7-hour and 45-minute spacewalk. The two cosmonauts worked on the exterior of the Russian Soyuz MS-09 spacecraft, where the space station's crew had earlier found and repaired the leak from the inside.
[...] Today, Prokopyev joined Kononenko on a spacewalk to inspect the repair area from the outside in an effort to discover what caused the leak and to collect a sample of the epoxy that had extruded through the hole from the inside. To reach the area needed to perform the inspection, Kononenko rode at the end of two Russian Strela booms, translating from the Pirs docking compartment where the spacewalk began to the Zarya functional cargo block (FGB) and then up alongside the Soyuz. Prokopyev controlled the booms' motion from the opposite end, moving Kononenko into place, before shimmying up the second boom himself.
At the worksite, Kononenko and Prokopyev took turns using a knife and a pair of long-arm scissors to stab at and cut away layers of brown, gold and silvery insulation. As they cut into the spacecraft, small fragments of the material floated away and formed a cloud of debris. The two cosmonauts then used the same tools to cut into and peel away a thin metal orbital debris shield to expose the hole in the Soyuz MS-09's orbital compartment. [...] Kononenko used a pair of forceps and a swab to collect samples of the dark epoxy. The residue, stowed inside a bag, was brought back inside the space station and will be returned to Earth for analysis.
Also at BBC.
Space Chief Vows to Find "Full Name" of Technician Who Caused ISS
NASA and Roscosmos Release Joint Statement on ISS Leak Amid Rumors
Controversy Over ISS Leak Continues, Spacewalk Planned for November
Posted by Hacker Fantastic on Dec 13Please see the below proof of concept in triggering the heap overflow using
The Hackaday Superconference is over, which is a shame, but one of the great things about our conference is the people who manage to trek out to Pasadena every year to show us all the cool stuff theyre working on. One of those people was [Piotr Esden-Tempski], founder of 1 Bit Squared, and he brought some goodies that would soon be launched on a few crowdfunding platforms. The coolest of these was the iCEBreaker, an FPGA development kit that makes it easy to learn FPGAs with an Open Source toolchain.
The hardware for the iCEBreaker includes the iCE40UP5K fpga with 5280 logic cells,, 120 kbit of dual-port RAM, 1 Mbit of single-port RAM, and a PLL, two SPIs and two I2Cs. Because the most interesting FPGA applications include sending bits out over pins really, really fast, theres also 16 Megabytes of SPI Flash that allows you to stream video to a LED matrix. There are enough logic cells here to synthesize a CPU, too, and already the iCEBreaker can handle the PicoRV32, and some of the RISC-V cores. Extensibility is through PMOD connectors, and yes, theres also an HDMI output for your vintage computing projects.
If youre looking to get into FPGA development, theres no better time. Joe Fitzs WTFpga workshop from the 2018 Hackaday Superconference has already been converted to this iCEBreaker board, and yes, the seven-segment display and DIP switches are available. Between this and the Open Source iCE toolchain, youve got a complete development system thats ready to go, fun to play with, and extremely capable.
You can find Lynda Woods Cleary playing Scrabble every Tuesday at a Panera in Princeton, NJ. Cleary, a 68-year-old retired financial consultant, has been playing every week for 20 years since founding the Princeton Scrabble Club in 1998. When I asked her if shes ever disappointed to draw certain tiles, she looked surprised, even hurt. Oh no, she said with an Alabama twang. I want each and every one.
Its a sweet sentiment, but according to a 2014 statistical program written by Joshua Lewis, then a Ph.D. candidate at the University of California, San Diego, it isnt a sensible one. His study showed that there are lucky tiles in Scrabble: A Q is harder to place on a board than a Z, and yet both are worth 10 points. Therefore, its luckier to draw a Z than a Q. Lewis argued that the traditional values associated with each letter diminish the role of skill in the game, and recommended changing them to make Scrabble scores more indicative of skill.Pueri / Wikimedia
The suggestion was picked up by the BBC, the Huffington
Post, and TIME, among others. As you can imagine,
traditionalists like Cleary were dismissive of Lewis
Revelation comes in different forms for different people. A biblical verse. A flash of recognition in a lovers eyes. A Nietzschean proverb. A classical sonata. A childs embrace. Any moment of profundity, really, where time stops and the divine reveals itself, if only for an instant, and the world makes sense.
For me, revelation came in the form of ape knuckles.
When I first met her, Noelle was a 6-month-old chimp whod just been surrendered to a sanctuary in south Florida, where she was to be raised by human caregivers along with half a dozen other orphans like her until they were old enough to live in a more natural captive environment. As one of those lucky caregivers, I volunteered at the sanctuary between classes and spent nights there on the weekends.LizBridgesTravel / Shutterstock
Over the next few years, Noelle and I developed, not exactly a
daddy-daughter bond, but I suppose something similar to it. One
night, as she lay hiccupping on my chest, a belly full of warm
formula and drunk with sleepiness, I took her small hairy hand in
mine and studied it in detail ... the crescent-shaped lunulae of
her nails, the follicles of coarse black hair
I have a secret to tell you about my city, she says. It has to do with what Eve Ensler calls the feminine cell.
It was the autumn of 2016. Id met her in Quito, Ecuador, at the United Nations Habitat III, the biggest global urban development conference in two decades. After a week spent pondering cities, we found ourselves talking to each other like strangers often do in the tired, busy evenings that follow a days hustle.
Whats the feminine cell? I ask.
Its empathy. Its respect for the human experience. Its being aware of the space you take up in the world and how that relates to the commons.1iofoto / Shutterstock
Outside the colors of Quito were drenched in rain as the bars filled with eager conference attendees and locals alike. In the second year of a post-doc studying energy footprint reduction in cities, I was just about beginning to see the connections between social justice, the urban experience, and what makes a city tick.
My city is always looking for solutions, she continued. There is no place in my city. There are only points and routes that connect those points.
America is having a bit of
This article is the second in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of the central role that authenticity plays in the establishment of deception as a practical defense and cyber risk reduction measure. Requirements for authenticity in deception The over-arching goal for any cyber deception system is to create target computing and networking systems and infrastructure that More
The post Deception technology: Authenticity and why it matters appeared first on Help Net Security.
Two fire technicians at the National Science Foundation's McMurdo Station in Antarctica have been pronounced dead following an incident at a generator building that powers a radio transmitter near the station.
The incident, which still is under investigation, occurred on Dec. 12 local time (McMurdo Station keeps New Zealand time).
NSF is not releasing any personal information about the deceased at this time. Their next of kin have been notified.
The workers were performing preventative maintenance on the building's fire suppression system. They were found unconscious on the building's floor by a helicopter pilot, who landed after seeing what appeared to be smoke coming from the structure. They were removed from the building and CPR was administered. One person was pronounced dead at the scene by medical personnel who arrived from the McMurdo clinic. The other was flown to the McMurdo clinic and pronounced dead there a short time later.
Read more of this story at SoylentNews.
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog