IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Friday, 16 November


GNOME 3.31.2 Desktop Released "IndyWatch Feed Tech"

GNOME 3.31.2 is out this Friday as the latest development release in the trek towards next March's GNOME 3.32 release...


Hillicon Valley: Russian-linked hackers may have impersonated US officials | Trump signs DHS cyber bill | Prosecutors inadvertently reveal charges against Assange | Accenture workers protest border enforcement work | App mines crypto for bail bonds "IndyWatch Feed Tech"

Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...


Destroying nuclear waste to create clean energy? It can be done "IndyWatch Feed Tech"

If not for long-term radioactive waste, then nuclear power would be the ultimate green energy. The alternative to uranium is thorium, a radioactive ore whose natural decay is responsible for half of our geothermal energy, which we think of as green energy. More than 20 years of research at the European Centre for Nuclear Research (CERN), the birthplace of the internet and where Higgs boson was discovered, demonstrate that thorium could become a radically disruptive source of clean energy providing bountiful electricity any place and at any time.

Coal and gas remain by far the largest sources of electricity worldwide, threatening our climate equilibrium. Non-fossil alternatives, such as solar power, use up a forbidding amount of land, even in sunny California, plus the decommissioning will pose a serious recycling challenge within 20 years. Solar is best used on an individual household basis, rather than centralized plants. Wind requires an even larger surface area than solar.

As Michael Shellenberger, a Time magazine Hero of the Environment, recently wrote: Had California and Germany invested $680 billion into nuclear power plants instead of renewables like solar and wind farms, the two would already be generating 100% or more of their electricity from clean energy sources. Correct, but the disturbing issue of long-term nuclear waste produced by conventional, uranium based, nuclear plants still remains.


Video Friday: Japanese Child Robot Affetto, and More "IndyWatch Feed Tech"

Your weekly selection of awesome robot videos

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; here's what we have so far (send us your events!):

EU Robotics Week  November 16-25, 2018  Europe
ICSR 2018  November 28-30, 2018  Qingdao, China
RoboDEX  January 16-18, 2019  Tokyo, Japan

Let us know if you have suggestions for next week, and enjoy today's videos.

Weve missed you, Affetto.

A trio of researchers at Osaka University has now found a method for identifying and quantitatively evaluating facial movements on their android robot child head. Named Affetto, the android's first-generation model was reported in a 2011 publication. The researchers have now found a system to make the second-generation Affetto more expressive. Their findings offer a path for androids to express greater ranges of emotion, and ultimately have deeper interaction with humans.

[ Osaka University ]

Vector is getting a brain update and will be able to respond to Alexa voice commands.

Next month, Vector owners in the U.S. and Canada will be able to access the knowledge and utility of Amazons voice service. Simply talk to Vector like youd talk to Alexa and schedule reminders, search for information, control smart home devices, and more. Well also launch this feature early next year in other countries where Vector is available. Check out some footage of our engineers testing the integration below.

[ Vector ]

A new jumping robot is in the works at the University of Cape Town.



Micron: Espionage by China "IndyWatch Feed Tech"

A Micron buddy told me about this when the story broke, and I was sure someone would pick it up here. So though it's a bit late, I hope you enjoy it.

WASHINGTON (Reuters) - The U.S. Justice Department on Thursday unveiled an indictment against two companies based in China and Taiwan and three individuals, saying they conspired to steal trade secrets from U.S. semiconductor company Micron Technology Inc relating to its research and development of memory storage devices.

The charges against Taiwan-based United Microelectronics Corp, China state-owned Fujian Jinhua Integrated Circuit Co Ltd and three individuals who once worked for a unit of Micron mark the fourth case brought by the Justice Department since September as part of a broader crackdown against alleged Chinese espionage on U.S. companies.

Increasing the scary factor was that one guy was a Director at Micron. So he probably had access to far more intel than the average molerat.

Reuters and Engadget, among others.

Original Submission

Read more of this story at SoylentNews.


App uses cryptocurrency to help detainees pay ICE bail money "IndyWatch Feed Tech"

A new app mines cryptocurrency and uses the funds garnered to help pay bail for individuals detained by Immigration and Customs Enforcement (ICE).The app, called Bail Bloc, lets users donate their computer memory towards mining the...


The Kilogramme Will Cease To Be A Physical Entity "IndyWatch Feed Tech"

One of the most illuminating high school courses no doubt for many readers as much as for your scribe, was the series of physics lessons during which the SI units were explained. That glorious sense of having the order of the universe unlocked into an interlocking series of units whose definitions could all be derived in terms of a series of base units was mind-blowing in those early teen years, and even though the explanations might have been at a for-the-children level that has been blown out of the water by later tiers of learning its still a bedrock that will serve an engineer or scientist life-long.

The definitions of the SI base units have evolved with scientific advancement to the point at which they are no longer tied to their original physical entity definitions. Of all the base units though there is still one that has resisted the urge to move away from the physical: the kilogramme (giving it its French spelling to preserve context) is still defined in terms of a metal cylinder in a laboratory just outside Paris. Kg diehards have not much time left to cling onto their platinum-iridium alloy though, for a new definition has been adopted in which it is derived from Plancks Constant. From next May this will become the official kilogram, at which point concerns over microscopic erosion of the metal standard become irrelevant, and an SI kilogram can be replicated by any laboratory with the means to do so.

The piece of apparatus that makes this definition possible is the Kibble balance, a balance in which the force required to overcome the effect of gravitational force on a given mass is measured in terms of the electrical power required to do so. The gravitational force at a given point can be measured accurately and is defined in terms of the other SI units, while the electrical power can be derived from a Josephson junction, a superconducting junction whose current is defined in terms of Plancks constant. As a result, the kilogram can be measured solely in terms of the constant and other SI units, consigning the metal cylinder to history.

This high-end metrology and physics make for interesting reading, but its fairly obvious that the de facto kilogram we all use will not change. Our everyday measures of everything from sugar to PLA filament will be the same today as they will be next May. But thats not the point, everyday measurements do not need the extreme accuracy and reproducibility of a laboratory. The point of it all comes in as yet unforseen applications, as an example would the ability to synchronise timing to create GPS or......


Mozilla Report Ranks Holiday Tech Gifts by Considering Privacy and Security "IndyWatch Feed Tech"

Mozilla releases privacy report on which holiday gadgets are too creepy

Just in time for the holiday shopping season, Mozilla has released a privacy report on some popular gift options, which tells you if a gadget meets basic security standards like encrypting data and offering a clear privacy policy.

While the list isn't comprehensive, it looked at 70 popular items and found that a little over 25 of them meet Mozilla's minimum security standards. The most secure gadgets: the Nintendo Switch, a Harry Potter Kano Coding Kit that mixes wand magic and teaching kids how to code, and an open-source smart speaker called Mycroft Mark 1.

[...] According to Mozilla, the creepiest gadget out there is the FREDI Baby Monitor, which has a history of easily being hacked and a default password of 123 that youre not prompted to change. The FREDI Baby Monitor also lacks a privacy policy, and its company doesnt push out security updates to its devices.

Also at Engadget.

Original Submission

Read more of this story at SoylentNews.


Bisected: The Unfortunate Reason Linux 4.20 Is Running Slower "IndyWatch Feed Tech"

After running a lot of tests and then bisecting the Linux 4.20 kernel merge window, the reason for the significant slowdowns in the Linux 4.20 kernel for many real-world workloads is now known...


Dems demand answers from AT&T, Verizon and Sprint on internet throttling claims "IndyWatch Feed Tech"

A trio of Democratic senators are pressing mobile carriers to answer questions about their throttling practices following a study that shows them slowing down their networks. The study they cited, conducted by the app WeHe, found that...


DIY Telepresence Robot Built From Off-The-Shelf Parts "IndyWatch Feed Tech"

Petite, but it does the job. Note the huge LED headlight in the center.

Telepresence hasnt taken off in a big way just yet; it may take some time for society to adjust to robotic simulacra standing in for humans in face-to-face communications. Regardless, its an area of continuous development, and [MakerMan] has weighed in with a tidy DIY build that does the job.

Its a build that relies on an assemblage of off-the-shelf parts to quickly put together a telepresence robot. Real-time video and audio communications are easily handled by a Huawei smartphone running Skype, set up to automatically answer video calls at all times. The phone is placed onto the robotic chassis using a car cell phone holder, attached to the body with a suction cup. The drive is a typical two-motor skid steer system with rear caster, controlled by a microcontroller connected to the phone.

Operation is simple. The user runs a custom app on a remote phone, which handles video calling of the robots phone, and provides touchscreen controls for movement. While the robot is a swift mover, its really only sized for tabletop operation unless you wish to talk to your contacts feet. However, we can imagine there has to be some charm in driving a pint-sized bot up and down the conference table when Sales and Marketing need to be whipped back into shape.

Its a build that shows t...


Q&A: Can Sci-fi Movies Help Us Avoid Technological Disaster? "IndyWatch Feed Tech"

In a new book, a renowned expert on the risks of emerging technologies uses sci-fi films as a roadmap for mitigating harm

Science fiction (sci-fi) has served as both an ethical and moral gauge of human scientific endeavors since at least Mary Shelleys Frankenstein in literature and Fritz Langs Metropolis in film.

A number of books have looked at how science is portrayed in the movies with all of them bringing a unique perspective to the issue (In fact, IEEE Spectrums own Stephen Cass co-authored such a book just last year).

Now, a new book written by one of the preeminent experts on how to recognize and prevent risks in emerging technologies brings a new perspective to the topic, and asks: Can we use sci-fi films as a roadmap to avoid the pitfalls of new technologies?

Andrew Maynard, who is director of the Risk Innovation Lab in the School for the Future of Innovation in Society at Arizona State University, picks up on sci-fis long tradition of providing cautionary tales of hubris, or critiques of todays social ills, and looks to see what both the science professional and the layperson can glean in order to forge a better path going forward.

Andrew Maynard Photo: Andrew Maynard

Maynards new book Films from the Future: The Technology and Morality of Sci-Fi Movies is not a list of a scientists favorite sci-fi movies, or what he considers the most realistic portrayals of science in movies. Instead, Maynard examines whether sci-films can provide us with actionable insights and tools to address the big moral challenges we face in emerging technologies, including AI and artificially upgrading our brains.

We spoke with Maynard ahead of the release of his book to ask how he approached it and how he hopes the book will be used. This interview has been edited and condensed.

This book joins a number of titles that have examined the intersection of sci-fi m...


Using Microsoft Powerpoint as Malware Dropper "IndyWatch Feed Tech"

Marco Ramilli, founder and CEO at cyber security firm Yoroi has explained how to use Microsoft Powerpoint as Malware Dropper

Nowadays Microsoft office documents are often used to propagate Malware acting like dynamic droppers. Microsoft Excel embedding macros or Microsoft Word with user actions (like links or external OLE objects) are the main players in this Office Dropping Arena. When I figured out that a Microsoft Powerpoint was used to drop and to execute a Malicious payload I was amazed, its not so common (at least on my personal experiences), so I decided to write a little bit about it.
The attack-path is very close to what its observable on modern threats since years: eMail campaign with an attached document and actionable text on it. In the beginning, the Microsoft Powerpoint presentation looked like a white blank page but performing a very interesting and hidden connection to hxxps://

Analyzing the Microsoft Powerpoint structure it rises on my eyes the following slide structure

Microsoft Powerpoint dropper
Stage 1: Microsoft PowerPoint Dropping Website

An external OLEobject (compatibility 2006) was available on that value:


Decoding that string from HEX to ASCII is much more readable:




Inadvertent Court Filing Suggests that the U.S. DoJ is Preparing to Indict Julian Assange "IndyWatch Feed Tech"

Inadvertent Court Filing Suggests that the U.S. DoJ is Preparing to Indict Julian Assange

Prosecutors Have Prepared Indictment of Julian Assange, a Filing Reveals

The Justice Department has prepared an indictment against the WikiLeaks founder, Julian Assange, marking a drastic escalation of the government's yearslong battle with him and his anti-secrecy group. It was not clear if prosecutors have filed charges against Mr. Assange. The indictment came to light late Thursday through an unrelated court filing in which prosecutors inadvertently mentioned charges against him. "The court filing was made in error," said Joshua Stueve, a spokesman for the United States attorney's office for the Eastern District of Virginia. "That was not the intended name for this filing."

[...] Seamus Hughes, a terrorism expert at George Washington University who closely tracks court cases, uncovered the filing and posted it on Twitter.

A Justice Department spokesman declined to say on Thursday what led to the inadvertent disclosure. It was made in a recently unsealed filing in an apparently unrelated sex-crimes case charging a man named Seitu Sulayman Kokayi with coercing and enticing an underage person to engage in unlawful sexual activity. Mr. Kokayi was charged in early August, and on Aug. 22, prosecutors filed a three-page document laying out boilerplate arguments for why his case at that time needed to remain sealed.

While the filing started out referencing Mr. Kokayi, federal prosecutors abruptly switched on its second page to discussing the fact that someone named "Assange" had been secretly indicted, and went on to make clear that this person was the subject of significant publicity, lived abroad and would need to be extradited suggesting that prosecutors had inadvertently pasted text from a similar court filing into the wrong document and then filed it.

"Another procedure short of sealing will not adequately protect the needs of law enforcement at this time because, due to the sophistication of the defendant and the publicity surrounding the case, no other procedure is likely to keep confidential the fact that Assange has been charged," prosecutors wrote. They added, "The complaint, supporting affidavit, and arrest...


Langlands/Frenkel and Some Other Things "IndyWatch Feed Tech"

The Canadian publication The Walrus today has a wonderful article about Robert Langlands, focusing on his attitude towards the geometric Langlands program and its talented proponent Edward Frenkel. I watched Frenkels talk at the ongoing Minnesota conference via streaming video (hopefully the video will be posted soon), and it was an amazing performance on multiple levels. A large part of it was a beautiful explanation of the history and basic conception of what has come to be known as geometric Langlands. He then went on to explain carefully some of the ideas in the recent Russian paper by Langlands, basically saying that they worked in the Abelian case, but could not work in the non-Abelian case. He ended by describing some alternate ideas that he is working on with David Kazhdan. Langlands was in the audience and at the end of the talk rose to comment extensively, but I couldnt hear his side of this since he had no microphone (that Frenkel was sticking to his guns though was clear).

The conference is finishing up right now, with final remarks by Langlands coming up later this afternoon.

A few more items, mostly involving my Columbia math department colleagues:

  • If you connect quickly to the streaming video from Minnesota, you may be able to catch Michael Harriss talk on local Langlands.
  • Quanta magazine has an article about a recent proof of an old conjecture by Dorian Goldfeld about ranks of elliptic curves. This is due to Alexander Smith, now a third year graduate student at Harvard (he started working on this while an undergrad at Princeton, with Shouwu Zhang). His twin brother Geoffrey is also a math grad student at Harvard.
  • For those more interested in physics than m...


FPGA Testbenches Made Easier "IndyWatch Feed Tech"

You finally finish writing the Verilog for that amazing new DSP function that will revolutionize human society and make you rich. Does it work? Your first instinct, of course, is to blow it into your FPGA of choice and see if it works. If it does, that was a great idea. If it doesnt, it was a terrible idea because typically it is hard to look inside the FPGA. Thats why youll typical simulate your logic on a desktop computer before you commit it to the FPGA. But that means you have to delay gratification long enough to write a testbench a piece of hardware description language (HDL) code that exercises the function you wrote. In this post Ill show you a small piece of software that can read your Verilog module and automatically create most of a testbench for you. The code originally came from GitHub, but I wanted to make some changes to it, so I forked it and Ill tell you about the changes I made. This isnt specific to a particular FPGA. Any Verilog project can use the tool to generate a simple starter testbench.

Writing a testbench isnt that hard. You usually use the same language you wrote the original code in but since it wont reside in silicon, you can do things in the simulator that you cant get away with in code that youll synthesize. However, it is a bit painful to have to always write more or less the same code, especially if you have a lot of modules you want to test. But it is a good idea to test small modules before linking them together and then test them linked together, too. With this little Python script, it is very easy to generate a simple testbench and then further elaborate it. It isnt life-changing, but it does save some time. If you want to try this out, youll need something to run the Python script on, of course. You also need a Verilog simulator or you can use EDA Playground to try all this out in your browser.

Anatomy of a Testbench

A Verilog testbench usually had a few major sections:

  1. A module with no inputs or outputs. This is like the main function of a C program.
  2. Reg variables for all the inputs you want to feed to the device or devices under test.
  3. Wire variables for all the outputs you want to monitor for the device or devices under test.
  4. An initial section that initializes all the reg variables.
  5. Since the device under test probably needs a clock, an always block or a forever loop will create the clock in one of the reg variables.
  6. Since the device under test probably needs a reset, youll frequently start out by generating a re...


Senators push bipartisan bill to crack down on robocalls "IndyWatch Feed Tech"

Two senators are pushing a new bipartisan bill to crack down on illegal robocall scams, raising the maximum civil fine for violators to $10,000 per call.Sens. John Thune (R-S.D.), the current chairman of the Senate Commerce Committee, and Ed Markey...


Windows 10 October 2018 Update Rolls Out Again, Still Full Of Flaws "IndyWatch Feed Tech"

Windows 10 October Update Still Incompatible With Some AMD GPUs

Mapped drives may fail to reconnect after starting and logging onto a Windows device, Microsoft says, noting that symptoms include a red X on the mapped network drives in File Explorer.

Date Current Status Affected Platforms Details
November 14, 2018, 6:00 PM PT Known Issue
  • Windows Server 2019
Mapped drives may fail to reconnect after starting and logging onto a Windows device.

Symptoms include:

  • In File Explorer, a red X appears on the mapped network drives.
  • Mapped network drives show as Unavailable when you run the net use command from a command prompt.
  • In the notification area, a notification displays, Could not reconnect all network drives.

Workaround: See KB4471218 for workaround scripts to automatically reconnect a mapped network drive when you log on to the device.

Next Steps: Microsoft is working on a resolution and will provide updates in the 2019 timeframe.


US Court Lists DNS and Routing Services in Broad Anti-Piracy Order "IndyWatch Feed Tech"

In recent years, a wide variety of companies have filed lawsuits against sellers of pirate set-top boxes.

Several of these cases target devices that cater to the Asian market and havent received a lot of press, but a recent order against the company behind the BTV set-top box caught our eye.

The case in question was filed by a group of rightsholders including Asia TV, Star India, Viacom18, and Dish Network. In their complaint, they accuse Hong Kong-based Dibia Networks Limited of running a pirate broadcasting network by retransmitting copyrighted channels.

Dibia has built its business model around blatant copyright infringement, brazenly advertising and promoting the capability of the BTV device to provide users with infringing streams of the Copyrighted Programs, it reads.

As is often the case in piracy-related lawsuits, Dibia did not defend itself. As a result, the rightsholders moved for a default judgment which includes a rather broad permanent injunction.

The companies requested the maximum statutory damages for 44 separate TV episodes and that is exactly what they got. In a recent order, New York District Court Judge George Daniels awarded a total of $6.6 million in damages.

Its questionable whether the rightsholders will ever see a penny, but an associated permanent junction gives them a lot of options to make sure that the BTV set-top boxes remain offline.

Aside from restraining Dibia from engaging in any infringing activities, it directs domain name registrars and registries to disable BTVs websites, and transfer the domains to the rightsholders. This includes, which has been signed over to Dish Network.

These domain takeovers are not new but the injunction goes further than that, mentioning various third-party intermediaries who are compelled to cut their ties with servers or sites that are linked to BTV the boxes or apps.

This includes companies that are involved in sales, distribution, shipping or logistics services, for the set-top boxes, but also back-end service providers, service providers routing traffic or providing bandwidth, content delivery networks, and domain name server systems, for the associated sites.

This order is rather broad, particularly in respect of the companies that route traffic, which could include the Tier1 networks that form the Internets backbone. The term DNS systems can be interpreted broadly as well, adding virtually every ISP into the mix.

Whether this is the intention of the rightsholders is unclear, as they list CloudFlare, Incapsula, and DNSPod as examples. The latter two dont o...


Personal Cheques Still Alive and Well in the United Kingdom in 2018 "IndyWatch Feed Tech"

Paper cheques didnt finally disappear last month as hoped in 2009

Back in December 2009, the board of the United Kingdom Payments Council set 31 October 2018 as the date when paper cheques (or checks) would be totally phased out in the UK. The Payments Council believed [PDF] that with the public using fewer cheques every year, with most major retailers refusing to accept cheques, and with the advent of mobile checking and other electronic forms of transferring money promising to appear in the next few years, cheques could easily be eliminated within a decade.

But things didnt go quite according to plan.

The Payments Councils announcement was soon met with opposition from various groups, especially those representing the elderly. They wanted a guaranteed paper-based alternative, which would defeat one of the main purposes of getting rid of cheques in the first place: their high processing cost (about 1 per cheque). Charities were also unhappy, fearing a major reduction in donations if cheques were eliminated because of what they said was an ingrained UK culture of charity cheque giving.

It didnt help that soon after the announcement, stories like this one in The Telegraph appeared, claiming that the elimination of cheques meant a cashless society was just over the horizon. These stories further heightened the concerns of the elderly and charity groups. By the end of February 2010, the ruckus was such that the House of Commons Treasury Committee opened up an inquiry into the proposed cheque abolition plan.

It quickly became obvious to the Payments Council that their plan to eliminate cheques by 2018 did not have either public or political support. In July 2011, the Council withdrew [PDF] its 2018 date, proclaiming that cheques will continue for as long as customers need them. The Council also indicated that it would st...


Secret Charges Against Julian Assange Revealed Due to "Cut-Paste" Error "IndyWatch Feed Tech"

Has Wikileaks founder Julian Assange officially been charged with any unspecified criminal offense in the United States? YES United States prosecutors have accidentally revealed the existence of criminal charges against Wikileaks founder Julian Assange in a recently unsealed court filing in an unrelated ongoing sex crime case in the Eastern District of Virginia. Assistant US Attorney Kellen


Shoddy security of popular smartwatch lets hackers access your childs location "IndyWatch Feed Tech"

By Waqas

Smartwatches are generally considered safe to keep track of your kids when they are outside the home. However, there is a scary new revelation about this seemingly reliable gadget that it is possible to hack GPS-enabled smartwatches. Probably a majority of children wear smartwatches these days, and the fact that one of the most popular []

This is a post from Read the original post: Shoddy security of popular smartwatch lets hackers access your childs location


Nvidia Just Can't Grab a Break. Revenues up, Profit Nearly Doubles... and Stock Down 20% "IndyWatch Feed Tech"

Nvidia Just Can't Grab a Break. Revenues up, Profit Nearly Doubles... and Stock Down 20% :

Ongoing Bitcoin woes left the channel holding all the cards, and that's not a good thing

Nvidia has turned in growth in revenue and profit, but has been punished for missing its guidance in the third quarter of its fiscal 2019, all amid a continuing sharp drop in demand from crypto-currency miners.

Its stock fell as much as 20 per cent after it reported on Thursday:

  • Revenue of $3.18bn, up 21 per cent year-on-year, during the three months to the end of October.
  • Net income of $1.23bn in that quarter, up 47 per cent year-on-year.
  • GAAP diluted earnings per share of $1.97, up 48 per cent year-on-year.

Nvidia missed forecasts because of a decline in what was formerly one of its most important growth markets cryptocurrency mining rigs. With Bitcoin and Ethereum declining in value, big mining rigs are less economic.

As CEO and cofounder Jensen Huang said in the company's media announcement: "Our near-term results reflect excess channel inventory post the crypto-currency boom, which will be corrected."

CFO Colette Kress told analysts on a conference call that GaaP gross margins grew 90 basis points year-on-year, reflecting "our continued shift towards higher-value platforms", but the crypto collapse meant Nvidia suffered a "$57mn charge for prior architecture and chips."

[...] The company's announcement noted that in the last year, there was "a 48 per cent jump over last year in the number of systems using NVIDIA GPU accelerators, climbing to 127, including the fastest in the world, No 1 in the US, No 1 in Europe and No 1 in Japan".

Was nice while it lasted. Now that Bitcoin has dropped from $19,500 to $5,500 over the past 11 months and other cryptocurrencies like Ethereum and Litecoin have seen drops of 80-90%, a one-time bright spot in NVIDIA's revenue stream has passed. How much of an opportunity is this for AMD?

Original Submission

Read more of this stor...


By solving a mystery of gene repair, scientists uncover an exception to biologys rules "IndyWatch Feed Tech"

About 15 years ago, UNC Linebergers Dale Ramsden, Ph.D., was looking through a textbook with one of his students when they stumbled upon a scientific mystery.

A small line in the book indicated that a protein that helps major breaks in our did so by adding DNA, or deoxyribonucleic acid, as expected. However, there were hints that it could also add RNA, or ribonucleic acid, at least in a test tube. It seemed unlikely that this would occur during repair of DNA in living , since RNA is normally used only as a messenger to carry information from the genetic code to make proteins.

You would think they must only add DNA during repair of our genetic code, because thats the core of the central dogma of life; genetic information has to be DNA all the time, said Ramsden, who is a professor in the UNC School of Medicine Department of Biochemistry and Biophysics. Thats the way its supposed to be. Thats what were taught in school.


Turning A Rotary Tool Into A CNC "IndyWatch Feed Tech"

Now that 3D printers are everywhere, electronics are cheap, and open source software is extremely capable, just about anyone can build a CNC machine. Thats exactly what [Nikodem] did by turning a Dremel tool into an extremely capable CNC machine thats able to cut MDF and acrylic and can engrave aluminum.

The electronics for the build are just an Arduino Uno, a motor driver sheld running GRBL, a relay for the Dremel, a few motor drivers, and a big ol 30 A power supply. The build uses NEMA 17 motors, two on the Y-axis and one each on the X and Z. The CNC has a fantastically strong frame despite the 3D printed parts. It is constructed out of aluminum extrusion, with the carriages riding on some nice straight rods.

As for how well this CNC machine works, its pretty good. With the Gcode to cut an 80mm diameter circle out of MDF, this machine managed to cut a circle that was 80.02 mm in diameter. Thats pretty good, and getting into the territory that the error is probably in the cheap set of calipers, not the finished part itself. Its an awesome build, and [Nikodem] has everything documented in his four-part video series. You can check the end of that out below.


Total War: WARHAMMER II Launching For Linux Next Week "IndyWatch Feed Tech"

Feral Interactive has just announced that Total War: WARHAMMER II will be released for Linux (and macOS) next week...


A Day in the World of the LSAF "IndyWatch Feed Tech"

Thought experiments can be really useful tools to better understand the implications of abstract ideasespecially ideas that are accepted at face value as self-evident truths. In some cases, they resemble proofs by contradiction in that they allow us to see that, if said ideas were true, they would end up clashing with other ideas accepted as non-negotiable principles. What were going to try today is something like that.

Crossing into another dimension

Every long-standing rejuvenation advocate has had to put up with people claiming that aging is a good thing on the questionable grounds that it may help to prevent overpopulation, cultural stagnation, the rise of immortal dictators, getting bored of far too long lives, and so on. (I was even told by a friend of minea truly stalwart advocate whos anything but afraid of bringing the topic up whenever he gets the chancethat a man once briskly dismissed rejuvenation nonchalantly by saying, Come on, a little bit of death is all right. Its hard not to wonder if hed think the same if the people close to him were dying.)


Mesa 18.3-RC3 Released With RADV Fixes, Drops Zen L3 Thread Pinning "IndyWatch Feed Tech"

Mesa release manager Emil Velikov has announced the latest weekly release candidate of the upcoming Mesa 18.3...


A dark matter hurricane that we cant see or hear is blasting past Earth, and its one of the universes biggest conundrums "IndyWatch Feed Tech"

If astronomers calculations are correct, the Solar System is right in the middle of a turbulent space event.

The mysterious hurricane of dark matter leaves astronomers puzzled, but the remnants of dwarf galaxies could help prove this phenomenons existence.


Security updates for Friday "IndyWatch Feed Tech"

Security updates have been issued by Fedora (lldpad, pdns, and php), Mageia (flash-player-plugin, gdal, mutt, patch, php-pear-CAS, postgresql9.4|6, ruby-rack, and teeworlds), SUSE (kernel-rt, postgresql10, and squid), and Ubuntu (openjdk-7).


We Are NASA "IndyWatch Feed Tech"

Its time to take the next great leap in exploration. We are NASA.


5 Easy Tips for Linux Web Browser Security "IndyWatch Feed Tech"

5 Easy Tips for Linux Web Browser Security


BlackBerry to Acquire Cylance for $1.4 Billion in Cash "IndyWatch Feed Tech"

BlackBerry to Acquire Cylance for $1.4 Billion in Cash:

BlackBerry on Friday announced that it has agreed to acquire next-generation endpoint security firm Cylance for US $1.4 billion in cash.

In addition to the cash payment, BlackBerry will assume unvested Cylance employee incentive awards.

The deal is expected to close before the end of BlackBerry's current fiscal year (February 2019), and Cylance will operate as a separate business unit within BlackBerry.

Cylance, which has raised nearly $300 million in funding, currently has more than 4,000 customers, including more than 20% of the Fortune 500. The company previously said that it had annual revenues over $130 million for fiscal year 2018, and over 90% year-over-year growth.

Cylance's flagship endpoint security product, CylancePROTECT, takes a mathematical and machine learning approach to identifying and containing zero day and advanced attacks. The company has been utilizing artificial intelligence and machine learning as part of its core marketing message since the company was founded in 2012.

"We plan on immediately expanding the capabilities across BlackBerry's 'chip-to-edge' portfolio, including QNX, our safety-certified embedded OS that is deployed in more than 120 million vehicles, robot dogs, medical devices, and more," a BlackBerry company spokesperson told SecurityWeek. "Over time, we plan to integrate Cylance technology with our Spark platform, which is at the center of our strategy to ensure data flowing between endpoints (in a car, business, or smart city) is secured, private, and trusted."

Loved the keyboard on my now-long-since-dead BlackBerry Curve. Saw their struggles with bringing out an Android handset and am quite frankly very much surprised that they had this large of a war chest to invest in such an acquisition. Anybody here still using a BlackBerry? Which one?

Original Submission

Read more of this story at SoylentNews.


Leonid meteor shower peaks this weekend: How to watch "IndyWatch Feed Tech"

The best time to see the meteor showers will be between midnight and dawn on both mornings, wherever you are in the world. If you live in an urban area, you may want to drive to a place that isnt littered with city lights that will obstruct your view.

Find an open area with a wide view of the sky, and dont forget to bundle up. If you want to photograph the Leonid meteor shower, NASA suggests using a camera with manual focus on a tripod with a shutter release cable or built-in timer, fitted with a wide-angle lens.


Supercon: Designing Your Own Diffractive Optics "IndyWatch Feed Tech"

Kelly Peng is an electrical and optical engineer, and founder of Kura AR. Shes built a fusion reactor, a Raman spectrometer, a DIY structured light camera, a linear particle accelerator, and emotional classifiers for likes and dislikes. In short, we have someone who can do anything, and she came in to talk about one of the dark arts (pun obviously intended): optics.

The entire idea of Kura AR is to build an immersive augmented reality experience, and when it comes to AR glasses, there are two ways of doing it. You could go the Google Glass route and use a small OLED and lenses, but these displays arent very bright. Alternatively, you could use a diffractive waveguide, like the Hololens. This is a lot more difficult to manufacture, but the payoff will be a much larger field of view and a much more immersive experience.

The lens that Kelly is using in her AR headset is basically a diffraction grating, or a series of parallel lines on a piece of plastic. These diffraction gratings reflect light, but its dependent on the wavelength. Therefore, for a full-color system, you need three layers, one for red, one for blue, and another for green. The trick here is how to manufacture this. Kelly took a Hololens lens apart and took a look at it with an electron microscope, which appears to be made via fancy, and expensive, photolithography.

There is another way, though. The feature sizes on this diffraction grating arent too small, and this could conceivably be done through injection molding. With a lot of coding, simulation, and testing, Kelly realized this was manufacturable with somewhat standard injection molding processes, would cost only about $60,000 upfront, and would produce a part for one dollar. Thats much better than whatever process is going into the Hololens, and an amazing technical feat thats bring the future of AR closer than ever before.

This talk gets deep into diffractive optics. Its jam-packed with the kind of technical detail youll need to know if youre going to hack together your own AR / VR system. In short, its the kind of real-world technical talk that we love. Sit back with some popcorn and your notepad.

The HackadayPrize2018 is Sponsored by:


Group-IB presented latest cybercrime and nation-state hacking trends in Asia "IndyWatch Feed Tech"

According to Group-IBs report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends.

Hong Kong, 16.11.2018 Group-IB, an international company that specializes in preventing cyber attacks, presented the findings of its latest Hi-Tech Crime Trends 2018 report at the FinTech Security Conference in Hong Kong organized by Binary Solutions Limited in partnership with Group-IB.

According to Group-IBs report findings, Asia is one of the most actively attacked regions in the world. Over the past year, 21 state-sponsored groups were detected in the area, which is more than in Europe and the US combined. Hong Kong, Singapore, Seoul, and Shanghai, and many other financial powerhouses in Asia are likely to become primary targets of financially motivated hacker groups in the near future.

Cyber trends and threats that we identified in the world are likely to occur in Asia. Asias rapid economic growth has ramped up the interest of financially motivated hackers and state-sponsored hacker groups. Local banks have already been attacked by advanced hacker groups several times; we expect this trend to increase,  comments Dmitry Volkov, Group-IB CTO.

The threats that are notable for the Asian region are represented by a significant number of attacks aimed at manufacturing of chips, microprocessors and system control boards of different IT vendors, whose principal manufacturing operations are located in Asia. The attackers research vector is now shifting from software vulnerabilities to those located at the hardware and firmware level. To exploit certain hardware vulnerabilities, hackers can simply run a JavaScript code, as in the case of Glitch vulnerability. It is very difficult, if not impossible to eliminate these vulnerabilities with software updates and as such they create new opportunities for cybercriminals. It is likely that in the space of a few years they will seriously affect the cyber security market.

Since the beginning of 2018, Group-IB experts detected that cybercriminals were seeking to get access to the user databases of Hong Kong state Internet portals responsible for taxes, trade, procurement, logistics, innovations and hi-tech infrastructure.

Espionage as one of the main APT groups goa...


T-Mobile predicts Sprint merger to close in early 2019 "IndyWatch Feed Tech"

T-Mobile predicted that its $26 billion merger with Sprint could close as early as the first quarter of next year, despite significant opposition to the deal from consumer and labor groups.The merger must win approval from both the Department...


A Vote of Mass Importance: Historic SI Unit Overhaul Redefines Kilogram, Ampere, and More "IndyWatch Feed Tech"

The International Bureau of Weights and Measures will redefine four base units in terms of fundamental constants in nature

Our standards of measurement seem, well, standard. A meter is a meter. A second is a second. The units by which we measure our world simply arethey feel as immutable as an ocean wave.

But these longtime standards are set to change. A governing body unanimously voted Friday for the biggest ever overhaul of the international system of units (SI), which will redefine four base units: the ampere, kelvin, kilogram, and mole.

Its a moment of quite major significance in our obsessive little world of metrology, says Jon Pratt, chief of the National Institute of Standards and Technology (NIST)s Quantum Measurement Division of the Physical Measurement Laboratory, who managed a team that has worked for eight years on equipment and projects related to the SI unit overhaul.

Were achieving the completion of an arc that started when the French were first thinking up the metric system, Pratt adds. They were striving for a universal measurement system. And now we are basing units on the fabric of the universe.

The vote of the International Bureau of Weights and Measures (BIPM, based on the groups French initials) at a Versailles conference was an inevitability, the culmination of decades of discussion and debate. Pratt credits a complex mix of metrology funding and the progress of sciencenamely, agreement on the measurement of Plancks constantfor finally making the vote, and the redefinition, a reality. More than 50 BIPM member-states voted for the redefinitions.

The overhauled system, which will take effect in May 2019, links every unit to a fixed figure: a fundamental constant in nature. And many of the units definitions will reference one another.

As BIPM put it in a statement [PDF] before the vote, for the first time, all the definitions will be separate from their realizations: instead of definitions becoming outdated as we find better ways to realize units, definitions will remain constant and future-proof.

Le Grand K Photo: BIPM Le Grand K

Perhaps the biggestand certainly the buzziestchange is to the...


10 Best Anime Torrent Websites In 2018 "IndyWatch Feed Tech"

All forms of animated media or often referred to as Anime has millions of fans across the globe.

Anime is possibly the most well developed and true to life animated content that is either available in the form of episodes based series or movies.

Well if you want to watch Anime online using torrent, you are reading the right article. So these are some of the best anime torrent sites that are worth checking out.

In many major countries and regions like Saudi Arabia, India, Portugal, Denmark, United Kingdom, and Morroco these anime torrent websites are completely blocked. Well, you can use VPN services for accessing anime torrent sites in these regions. In fact, you can check out our list of the Best VPNs for torrenting in 2018.

If you still face any issue do check out How To Unblock Torrent Sites.

NOTE: Techworm does not condone using torrents to illegally obtain content. Using the following torrent websites for illegal purposes is done entirely at your own risk. Techworm takes no responsibility for any legal problems you encounter.

Top 10 Best Anime Torrent Websites


The first best anime torrent site on the list is Animetosho. Using Animetosho you can easily download some of the most popular anime series.

A majority of torrents on Animetoscho are verified. Animetosho has a simple and easy to navigate UI and this anime torrent site also displays the newest anime content on its homepage.

As for downsides, its somewhat difficult to find English dubbed anime shows on the platform. Overall, Animetosho is a reliable anime torrent website.

VISIT Animetosho


1337X is another popular anime torrent website that has g...


Distribution Release: Raspbian 2018-11-13 "IndyWatch Feed Tech"

Simon Long has announced the availability of a new release of Raspbian, a Debian-based distribution for the Raspberry Pi single-board computers. One major change in this release is the addition of the VLC media player: "When I first joined Raspberry Pi, back in the dim and distant past....


Google's Waymo Plans to Launch a Self-Driving Car Service in December "IndyWatch Feed Tech"

Waymo to Start First Driverless Car Service Next Month

In just a few weeks, humanity may take its first paid ride into the age of driverless cars. Waymo, the secretive subsidiary of Google's parent company, Alphabet Inc., is planning to launch the world's first commercial driverless car service in early December, according to a person familiar with the plans. It will operate under a new brand and compete directly with Uber and Lyft.

Waymo is keeping the new name a closely guarded secret until the formal announcement, said the person, who asked not to be identified because the plans haven't been made public.

"Waymo has been working on self-driving technology for nearly a decade, with safety at the core of everything we do," the company said in an emailed statement. A Waymo spokesperson declined to comment on the name of the new service or timing of the launch.

It's a big milestone for self-driving cars, but it won't exactly be a "flip-the-switch" moment. Waymo isn't planning a splashy media event, and the service won't be appearing in an app store anytime soon, according to the person familiar with the program. Instead, things will start smallperhaps dozens or hundreds of authorized riders in the suburbs around Phoenix, covering about 100 square miles.

The first wave of customers will likely draw from Waymo's Early Rider Programa test group of 400 volunteer families who have been riding Waymos for more than a year. The customers who move to the new service will be released from their non-disclosure agreements, which means they'll be free to talk about it, snap selfies, and take friends or even members of the media along for rides. New customers in the Phoenix area will be gradually phased in as Waymo adds more vehicles to its fleet to ensure a balance of supply and demand.

Related: Google Waymo Vehicles to Hit the Road This Month
Waymo Orders Thousands More Chrysler Pacifica Minivans for Driverless Fleet
Walmart and Waymo to Trial Driverless Shuttle Service in Phoenix for Grocery Pickups

Original Submission

Read more of th...


Cybaze ZLab- Yoroi team spotted a new variant of the APT28 Lojax rootkit "IndyWatch Feed Tech"

Malware researchers at the Cybaze ZLab- Yoroi team spotted a new variant of the dangerous APT28 Lojax rootkit.

The behavior of the Lojax sample seems to be similar to the previous versions and exploits the legitimate Absolute Lojack software to grant its persistence on the infected system. Lojack is an anti-theft and localization software developed by Absolute Software Corporation and it is pre-installed in the BIOS image of several Lenovo, HP, Dell, Fujitsu, Panasonic, Toshiba, and Asus machines. In the past, this software was known as Computrace.

Despite its legitimate purposes, the Absolute Lojack software acts like a rootkit (more precisely as a bootkit): its BIOS component forces the writing of a small agent named rpcnetp.exe into the system folder. The agent periodically contacts the Absolute server and sends to it the current machines position.

The control flow of the Lojack software is detailed in the following figure:

APT28 Lojax

Figure 1. Lojack control flow (Source:ESET)


Technical Analysis

The size of the malicious artifact is the same as the legitimate one, so the only manipulation seems to the modification of the C2C address, in according with other firms that previously analyzed the malware.

Hash Sha256: 6d626c7f661b8cc477569e8e89bfe578770fca332beefea1ee49c20def97226e
Names rp......


Raspbian 2018-11-13 Brings Hardware-Accelerated VLC Media Player "IndyWatch Feed Tech"

After releasing the Raspberry Pi 3 Model A+ yesterday, the Raspberry Pi Foundation today announced Raspbian 2018-11-13 as the latest update to their Debian-based Linux distribution for these low-cost ARM SBCs...


Fasting Molecule Delays Vascular Aging "IndyWatch Feed Tech"

A molecule produced during fasting or calorie restriction has anti-aging effects on the vascular system, which could reduce the occurrence and severity of human diseases related to blood vessels, such as cardiovascular disease, according to a study led by Georgia State University.



Electric unicycle: Fun toys or serious commuter personal electric vehicles? "IndyWatch Feed Tech"

Youve probably heard a lot about electric bicycles and electric scooters by now. These small personal electric vehicles (PEVs) are often touted as last mile vehicles that can help commuters travel short distances between home or work to other mass transit hubs, or as complete commuting alternatives in cities.

But one PEV you might not have heard about yet are electric unicycles. These odd-looking little EVs consist of just a single wheel that a rider straddles. They self balance like a Segway or hoverboard, but are much more narrow and nimble. Though they look like a toy, electric unicycles might be a more serious transportation alternative than many people think. Read on to learn why.


What Is the MEAN Stack? JavaScript Web Applications "IndyWatch Feed Tech"

Most anyone who has developed web applications knows the acronym LAMP, which is used to describe web stacks made with Linux, Apache (web server), MySQL (database server), and PHP, Perl, or Python (programming language).

Another web-stack acronym has come to prominence in the last few years: MEANsignifying a stack that uses MongoDB (database server), Express (server-side JavaScript framework), Angular (client-side JavaScript framework), and Node.js (JavaScript runtime).


The Amazing Ways Artificial Intelligence Is Transforming Genomics and Gene Editing "IndyWatch Feed Tech"

It is predicted that artificial intelligence (AI) will transform many aspects of our life including healthcare and genomics. AI and machine learning have helped us to understand the genome of organisms and will potentially change the way we treat disease, determine effective drugs and edit genes.


Lab-Grown Mini Kidneys Go Rouge, Sprout Brain and Muscle Cells "IndyWatch Feed Tech"

Kidney organoids miniature organs grown in the lab recently went rogue, producing brain cells and muscle cells alongside the expected kidney cells.


These DNA Startups Want to Put All of You on the Blockchain "IndyWatch Feed Tech"

Two different marketplaces for genetic data, Nebula and EncrypGen, recently launched with the promise of better protections for their users.


tRat is a new modular RAT used by the threat actor TA505 "IndyWatch Feed Tech"

The threat actor TA505 behind many Dridex and Locky campaigns have been using a new Remote Access Trojan (RAT) dubbed tRat.

Researchers at Proofpoint warns that the threat actor TA505 have been using a new Remote Access Trojan (RAT) dubbed tRat that implements a modular structure that was written in Delphi.

The TA505 operates on a large scale, it was behind other major campaigns leveraging the Necurs botnet to deliver other malware, including the Locky ransomware, the Jaff ransomware, and the Dridex banking Trojan.

The new strain of malware was first discovered at the end of September when it was distributed through weaponized Word documents that download the RAT.

Attackers used documents that abused the Norton brand, subject lines on the messages reinforced the social engineering, stating I have securely shared file(s) with you.

At the time of the discovery, the experts did not attribute it to a specific threat actor, but in October researchers found evidence of use made by TA505.

More recently, the group has been distributing a variety of remote access Trojans (RATs), among other information gathering, loading, and reconnaissance tools, including a previously undescribed malware we have dubbed tRat. reads the analysis published by Proofpoint.

tRat is a modular RAT written in Delphi and has appeared in campaigns in September and October of this year (one of them by TA505). 

Researchers noticed it was involved in a spam campaign on October 11, attackers used both Microsoft Word and Microsoft Publisher files for spread the malicious code.



Radeon ROCm 1.9.2 Released - Brings SDMA/RDMA Support For Vega 20, HIP/HCC Improvements "IndyWatch Feed Tech"

While we know ROCm 2.0 is coming out before year's end and that will have many improvements like complete OpenCL 2.0 support, ROCm 1.9.2 is out today as the latest stable release for this Radeon Open Compute stack...


You cant characterize human nature if studies overlook 85 percent of people on Earth "IndyWatch Feed Tech"

Ninety percent of psychology studies come from countries representing less than 15 percent of the worlds population. Researchers are realizing that universalizing those findings might not make sense.


Canada Faces Cannabis Shortages "IndyWatch Feed Tech"

Why is Canada running out of marijuana?

Cannabis retailers in Canada began to run low on supplies from the very first day of legalisation a month ago. How long are shortages expected to continue as the new market for recreational cannabis finds its feet?

In the early days of legalisation, James Burns was confident his company had enough product on the shelves of its five new cannabis retail stores, even though they only received half of their order from the provincial supplier. Now, he has had staff refreshing the government supply website in the early hours to snap up scarce new stock as soon as it's available, and is considering restricting store hours.

"While there was product to order we were very comfortably getting a large amount of it," says Burns, the CEO of Alcanna, a company that owns a chain of private liquor stores in Canada and the US and, now, cannabis stores in the province of Alberta. "But obviously, when there's literally none there, it doesn't matter how big you are, there's just none there. If the government warehouse is empty, it's empty. There's nothing you can do."

[...] A report released in early October by the CD Howe Institute, a Toronto-based economic think tank, estimates that the current legal supply will meet about 30% to 60% of total demand in the first months of legalisation. But people in the industry say the scarcity is worse than expected. "Everybody knew this was going to happen," says Burns. "Probably, frankly, not this quick and this starkly."

Patrick Wallace, owner of Waldo 420 in Medicine Hat, Alberta, predicts it will be a year to 18 months before supply matches demand. "We're riding on our initial investment of stock from a few weeks back," he says. "So we're OK now but it's not sustainable."

Previously: Canada Becomes the Second Nation to Legalize Cannabis
Peter Thiel's Cannabis Company Was Briefly Worth More Than Twitter
Hostage to NAFTA? Canada Signs on to War on Drugs Despite Recent Cannabis Legalization
Cannabis Becomes Legal in Canada



Delta Bot Plucks Out Tunes on a Mandolin "IndyWatch Feed Tech"

Is there no occupation safe from the scourge of robotic replacement? First it was the automobile assemblers, then fast food workers, and now its the mandolin players?

Probably not, unless [Clayton Darwin]s mandolin playing pluck-bot has anything to say about it. The pick-wielding delta-ish robot can be seen in action in the video below, plucking out the iconic opening measures of that 70s prom-theme favorite, Colour My World. The robot consists of two stepper motors connected to a hinged wooden arm by two pushrods. We had to slow the video down to catch the motion, but it looks like [Clayton] has worked out the kinematics so that the pick can be positioned in front of any of the mandolins eight strings. A quick move of the lower stepper then flicks the pick across a string and plucks it. [Clayton] goes into some detail about how he built the motion-control part in an earlier video; he also proves that steppers are better musicians than well ever be with a little Axel F break.

Its only a beginning, of course, but the complexity of the kinematics just goes to show how simple playing an instrument isnt. Unless, of course, you unleash an endless waterfall of marbles on the problem.

Thanks for the tip, [baldpower].


More Benchmarks Of The Performance Pullback In Linux 4.20 "IndyWatch Feed Tech"

Last night I published some benchmarks after finding Linux 4.20 is regressing in several workloads compared to Linux 4.18/4.19 and at least was affecting Intel Core i9 "HEDT" boxes. Here are more affected workloads regressing on Linux 4.20 and it's not just limited to high-end hardware...


The Great "DevOps Engineer" Title Debate "IndyWatch Feed Tech"

At the DevOps Enterprise Summit in Las Vegas last month, DevOps author and researcher Gene Kim unveiled his latest definition of DevOps:


Another Micro-ATX Haswell Era Motherboard Working With Coreboot But Needs Tiny Blob "IndyWatch Feed Tech"

There are many Sandy Bridge era motherboards that have been freed by Coreboot while if you are looking for more options on something (slightly) newer, a micro-ATX Haswell-era motherboard from ASRock now works under this open-source BIOS implementation...


Pentagon Fails Its First-Ever Audit "IndyWatch Feed Tech"

Shocker. Via: Reuters: The Pentagon has failed what is being called its first-ever comprehensive audit, a senior official said on Thursday, finding U.S. Defense Department accounting discrepancies that could take years to resolve. Results of the inspection conducted by some 1,200 auditors and examining financial accounting on a wide range of spending including on []


Leaks Show Europe's Attempts to Fix the Copyright Directive Are Failing "IndyWatch Feed Tech"

The EUs Copyright in the Digital Single Market Directive is closer than ever to becoming law in 28 European countries, and the deep structural flaws in its most controversial clauses have never been more evident.

Some background: the European Union had long planned on introducing a new copyright directive in 2018, updating the previous directive from 2001. The EU's experts weighed a number of proposals, producing official recommendations on what should (and shouldn't) be included in the new directive, and meeting with stakeholders to draft language suitable for adoption into the EU member states' national laws.

Two proposals were firmly rejected by the EU's experts: Article 11, which would limit who could link to news articles and under which circumstances; and Article 13, which would force online platforms to censor their users' text, video, audio, code, still images, etc., based on a crowdsourced database of allegedly copyrighted works.

But despite the EU's expert advice, these clauses were re-introduced at the last minute, at a stage in the directive's progress where they would be unlikely to receive scrutiny or debate. Thankfully, after news of the articles spread across the Internet, Europes own voters took action and one million Europeans wrote to their MEPs to demand additional debate. When that debate took place in September, a divided opposition to the proposals allowed them to continue on to the next phase.

Now, the directive is in the final leg of its journey into law: the "trilogues," where the national governments of Europe negotiate with the EU's officials to produce a final draft that will be presented to the Parliament for a vote.

The trilogues over the new directive are the first in EU history where the public are allowed some insight into the process, thanks to a European Court of Justice ruling that allows members of the European Parliament to publicly disclose the details of the trilogues. German Pirate Party MEP Julia Reda has been publishing regular updates from behind the trilogues' closed doors.

It's anything but an orderly process. A change in the Italian government prompted the country to withdraw its support for the directive. Together with those natio...


Qt 5.12 Lowering The QML Memory Consumption, Better JavaScript Performance "IndyWatch Feed Tech"

As part of The Qt Company's ongoing improvements to their tool-kit and with Qt 5.12 being an LTS release, this cycle they focused a lot on improving the performance...


Uber Posts $1 Billion Loss in Quarter as Growth in Bookings Slows "IndyWatch Feed Tech"

Uber Technologies Inc said on Wednesday that growth in bookings for its ride-hailing and delivery services rose 6 percent in the latest quarter, the third quarter in a row that growth has remained in the single digits after double-digit growth for all of last year.

The San Francisco-based firm lost $1.07 billion for the three months ending Sept. 30, a 20 percent increase from the previous quarter but down 27 percent from a year ago, when the company posted its biggest publicly reported quarterly loss on the heels of the departure of Uber co-founder and former Chief Executive Travis Kalanick.

Uber is seeking to expand in freight hauling, food delivery and electric bikes and scooters as growth in its now decade-old ride-hailing business dwindles. The company, valued at $76 billion, faces pressure to show it can still grow enough to become profitable and satisfy investors in an initial public offering planned for some time next year. ADVERTISEMENT

Its adjusted loss before interest, taxes, depreciation and amortization was $592 million, down from $614 million last quarter and $1.02 billion a year ago.

We may lose money on every transaction but we'll make it up in volume?

But seriously, I find it interesting there was absolutely no mention of their plans with self-driving vehicles.

Original Submission

Read more of this story at SoylentNews.


When the Fork Forks: What You Need to Know as Bitcoin Cash Goes to War "IndyWatch Feed Tech"

Bitcoin seems largely a psychological currency whose value oscillates mostly in response to changes in folks opinions rather than shifts in some real underlying store of value, imo

Heres what you need to know to get up to speed.

As a quick reminder, what is Bitcoin Cash again?

Bitcoin Cash (sometimes referred to as Bcash or BCH) is a cryptocurrency that split off from the main Bitcoin blockchain in August 2017. Culminating from Bitcoins years-long scaling dispute, the spinoff project most notably increased its block size limit through a contentious hard fork upgrade, forking off to become its own coin though some of its proponents see it as the real Bitcoin. While currently trading at a fraction of bitcoins value around $480 at the time of writing Bitcoin Cash is the fourth biggest cryptocurrency by market cap and has garnered support from big names in the cryptocurrency space like CEO Roger Ver and Bitmain co-founder Jihan Wu.


Mozilla Now Ships Firefox Nightly Builds With Wayland Enabled "IndyWatch Feed Tech"

After what feels like an eternity in waiting years for Mozilla to ship their Firefox web-browser with native Wayland support enabled, their latest Firefox Nightly builds have achieved this milestone...


Ruby in Containers "IndyWatch Feed Tech"

Ruby in Containers


Links 16/11/2018: Red Hat Enterprise Linux 8 Beta, Mesa 18.2.5, VirtualBox 6.0 Beta 2 "IndyWatch Feed Tech"

GNOME bluefish




Google Meets Russian Govt Body to Discuss Ongoing Piracy Issues "IndyWatch Feed Tech"

On November 1, 2018, Russias most powerful technology and entertainment companies signed a Memorandum of Cooperation to tackle online piracy.

The agreement, designed to rid all major platforms of infringing content, saw movie, television, and Internet companies agree to the formation of a central database of infringing sites, which will provide information on what content should be deleted.

While Channel One, the National Media Group, Gazprom-Media, the Internet Video Association, the Association of Film and Television Producers, Yandex, Rambler Group, Mail.Ru Group, vKontakte, and RuTube signed up, Google did not. However, telecoms watchdog Roscomnadzor suggested that Google would be welcome to join, when the time is right.

To that end, discussions continued in Moscow Wednesday, with Deputy Head of Roscomnadzor Vadim Subbotin meeting with Doron Avni, Googles Director of Public Policy & Government Relations for Europe, Middle East & Africa Emerging Markets.

During the meeting, Google was officially invited to join the anti-piracy memorandum, which in some respects is already aligned with the requirements of the DMCA. However, instead of Google receiving complaints directly from copyright holders, the memorandum requires that details of infringing content are held in a database administered by Roscomnadzor.

The plan is for the database to be queried every five minutes by the signatories, who will use the data to remove infringing content from search results and hosting services. No further information in respect of Google has been released by Roscomnadzor so it remains unclear whether the US-based company is prepared to deviate from its current takedown notice procedure under the DMCA.

Another topic of discussion was Googles failure to connect its systems to another centralized database that contains a list of permanently blocked websites. Search engines operating in Russia are obliged to connect to the resource but to date, Google has not.

Several weeks ago, Roscomnadzor contacted Google with a demand that it begins filtering its search results using data obtained from the countrys FGIS blacklist. Google did not comply, which led the telecoms watchdog to declare that the search giant is in breach of federal law.

That left Google vulnerable to an administrative fine of between 500,000 and 700,000 rubles (US$7,611 to US$10,656). While insignific...


What a massive database of retracted papers reveals about science publishings death penalty "IndyWatch Feed Tech"

Still, the data trove has enabled Science, working with Retraction Watch, to gain unusual insight into one of scientific publishings most consequential but shrouded practices. Our analysis of about 10,500 retracted journal articles shows the number of retractions has continued to grow, but it also challenges some worrying perceptions that continue today. The rise of retractions seems to reflect not so much an epidemic of fraud as a community trying to police itself.

Better editorial oversight, not more flawed papers, might explain a flood of retractions.


Why Sleep Apnea Patients Rely on a CPAP Machine Hacker "IndyWatch Feed Tech"

Via: Vice: An Australian hacker has spent thousands of hours hacking the DRM that medical device manufacturers put on CPAP machines to create a free tool that lets patients modify their treatment.


All about that tank "IndyWatch Feed Tech"

Composite tank fabrication signals next step to completing Phantom Express.


Smooth Moves from Cheap Motors "IndyWatch Feed Tech"

Building an electric motor isnt hard or technically challenging, but these motors have very little in the way of control. A stepper motor is usually employed in applications that need precision, but adding this feature to a motor adds complexity and therefore cost. There is a small $3 stepper motor available, but the downside to this motor is that its not exactly the Cadillac of motors, nor was it intended to be. With some coaxing, though, [T-Kuhn] was able to get a lot out of this small, cheap motor.

To test out the motors, [T-Kuhn] built a small robotic arm. He began by programming his own pulse generating algorithm that mimics a sine wave in order to smooth out the movement of the motor. An Arduino isnt fast enough to do these computations, though, so he upgraded to using the ESP32. He also was able to implement the inverse kinematics on his own. The result of all this work for a specific platform and motor type is a robotic arm that has a very low cost but delivers performance of much more expensive hardware.

The robot arm was built by [T-Kuhn] too, and all of the details on that build, as well as all the schematics and code, are available on the project site if you need a low-cost robot arm or a good stepper motor controller for a low cost. There are many other ways of getting the most out of other types of low-cost motors as well.


PS3 Other OS Settlement Check Delivered "IndyWatch Feed Tech"

I received my PS3 "OtherOS" class action lawsuit settlement payment yesterday: $10.07.

Have other members received settlements yet? More, less, or the same amount?

[We previously covered this in PlayStation 3 "OtherOS" Class Action Settlement Claims End on April 15 . Whatever happened to the $65 settlement that was mentioned there? --Ed.]

Original Submission

Read more of this story at SoylentNews.


Cars without drivers still need a moral compass. But what kind? "IndyWatch Feed Tech"

We must prepare for tough choices as we subcontract ethical decision making to machines, says author David Edmonds.


Licorice is a potential treatment for ischemia-induced brain damage "IndyWatch Feed Tech"

Turns out that we hardly ever actually eat licorice at all but use anise oil instead.  that clearly needs to change.  It is noteworthy that most TCM concoctions add licorice in order to improve flavor.   That is two things we all should be aware of.  

The fact is that this informs us that using a licorice in our tea will help protect us against strokes. This needs to be thought out and applied.  Perhaps even in coffee.


Delicious remedy: Licorice is a potential treatment for ischemia-induced brain damage

Sunday, November 11, 2018 by: Ralph Flores

Tags: brain damage, brain health, Brain Injury, caries, food as medicine, Glycyrrhiza uralensis, goodfood, goodhealth, goodmedicine, Herbs, ischemia, licorice, licorice root, natural cures, natural health, natural medicine,...


Vegan Cheese is made with DAIRY protein "IndyWatch Feed Tech"

 What we discover here once again is that you cannot make cheese without using casein.  Yet they lie about it all and call the stuff vegan.  There is no such thing.  Or if there is, it is obscure and not exactly on your local grocery shelf.

I do think that Vegan is a fad that mostly misses the science involved.  A high vegetable diet is known to be beneficial but not exclusively so.  Our digestive system has three groups of intestinal flora one of which deals with meats.  Our real problem is eating them to excess which is much harder with grains and vegetable.

This debate will obviously grind on and if it leads folks to paying attention to what they are eating, we are all better off.

Dear vegans: your vegan cheese is made with DAIRY protein
Sunday, November 11, 2018 by: Ethan Huff
Tags: badfood, buyer beware, canola, casein, deception, GMO, GMOs, grocery, herbicides, ingredients, lies, milk protein, pesticides, soy, toxins, vegan, vegans, vegetarian, veggie cheese

Natural News) Marketing is one of the keys to maintaining consumer demand. But sometimes marketers go a wee-bit overboard, stretching the truth about whatever good and service theyre trying to sell...


Emergent Voter fraud investigation. "IndyWatch Feed Tech"


  You must understand that this time around, the government had set up an evidence gathering operation.  The map informs us of the obvious targets.  It really takes a slew of motivated folks to simply break the law and you have it with illegal immigrants. The DEMS were allowed to run their shell game this time around and are now completely caught.  The evidence will come out soon and all compromised winners will be blocked from been seated until we have a special election.
The end result will be voter ID and a secure voting system.  It may also be the demise of the DEM party, certainly as constituted.  I would like to see a grass roots clean out of the DEMs.  That is presently happening in the Catholic Church as the hiearchy is now withering on the vine there. Republican control will soon see the whole progressive taint cleansed from our suystem of education as well... 
  Q !!mG7VJxZNCI No.446
Nov 10 2018 13:56:59 (EST)
We knew then.
We know now.

California fires "IndyWatch Feed Tech"

This pretty well spells out that California chose to not spend on fire prevention. That it was handled at the State level is concerning as well.  Dry land fire maintenance needs to be managed locally.  In fact property taxes need to reflect real fire risk, just as we do in flood zones by now allowing building in the first place.

Trying to dump all the costs up to the federal level is nonsensical and it is obviously killing people.

It does not address the big problem and that is building there in the first place.  I recall visiting a chap down in Denver who had a home perched on top of a high ridge.  I could look down that same ridge through thousands of feet of dryland brush.  One spark and that hillside would explode upward into his house in minutes following the already rising airflow.

The problem is now repeating annually obviously because all the dry-land has an ample buildup of brush and it is been used to blackmail the Federal Government for funds.

Self-induced DISASTER: California fires the direct result of shortsighted environmentalist policies that prohibit forest management 
Saturday, November 10, 2018 by: Mike Adams


Two hacker groups attacked Russian banks posing as the Central Bank of Russia "IndyWatch Feed Tech"

Group-IB has detected massive campaigns targeting Russian financial institutions posing as the Central Bank of Russia.

The emails were disguised to look as if they come from the Central Bank of Russia and FinCERT, the Financial Sector Computer Emergency Response Team. Group-IB experts have discovered that the attack on 15 November could have been carried out by the hacker group Silence, and the one on 23 October by MoneyTaker. Group-IB considers both cybercriminal groups among the most dangerous to Russian and international financial organisations.                                                                                  

November attack: Silence

In the morning of 15 November, Group-IB detected a malicious mass email campaign sent to Russian banks from a fake email address purporting to belong to the Central Bank of Russia (CBR). Of course, the CBR does not have anything to do with the phishing campaign the hackers faked the senders address. SSL certificates were not used for DKIM verification. Emails with the subject line Information from the Central Bank of the Russian Federation asked recipients to review the regulators decision On the standardisation of the format of CBRs electronic communications and to immediately implement the changes. The documents in question were supposedly contained in the zipped files attached, however by uncompressing these files users downloaded Silence.Downloader the tool used by Silence hackers.



Mikhail S. Shchepinov joins our Life Extension Board. "IndyWatch Feed Tech"

Mikhail S. Shchepinov joins our Life Extension Board. Misha is Cofounder at Retrotope. Retrotope is changing aging as we know it, so that people do not have to suffer the savages of many degenerative diseases. They are a pharmaceutical company startup that is leading the advance of a revolutionary new unified theory of cellular degeneration that can result in dramatically new approaches to therapy.


Linux kernel: broken uid/gid mapping for nested user namespaces with >5 ranges (CVE-2018-18955; since 4.15; fixed in 4.18.19 and 4.19.2) "IndyWatch Feed Tech"

Posted by Jann Horn on Nov 15

NOTE: I have requested a CVE identifier, and I'm sending this message,
to make tracking of the fix easier; however, to avoid missing security
fixes without CVE identifiers, you should *NOT* be cherry-picking a
specific patch in response to a notification about a kernel security

In Linux kernel versions since 4.15, map_write() in
kernel/user_namespace.c handles nested user namespaces with more than
5 UID or GID ranges incorrectly. This...


Julie K. Andersen joins our Life Extension Board. "IndyWatch Feed Tech"

Julie K. Andersen joins our Life Extension Board. Her lab concentrates on understanding the underlying age-related processes that drive neurodegenerative diseases like Parkinson's.


How 'Miniature Suns' Could Provide Cheap, Clean Energy "IndyWatch Feed Tech"

How 'Miniature Suns' Could Provide Cheap, Clean Energy:

Nuclear fusion has long been heralded as a potential answer to our prayers. But it's always been "thirty years away", according to the industry joke.

Now several start-ups are saying they can make fusion a commercial reality much sooner.

[...] A major challenge is how to build a structure strong enough to contain the plasma - the very high-temperature nuclear soup in which the fusion reactions take place - under the huge pressures required.

Exhaust systems will "have to withstand levels of heat and power akin to those experienced by a spaceship re-entering orbit," says Prof Ian Chapman, chief executive of the UK Atomic Energy Authority (UKAEA),

Robotic maintenance systems will also be needed, as well as systems for breeding, recovering and storing the fuel.

"UKAEA is looking into all these issues, and is building new research facilities at Culham Science Centre near Oxford to work with industry to develop solutions," says Prof Chapman.

Read more of this story at SoylentNews.


New infosec products of the week: November 16, 2018 "IndyWatch Feed Tech"

Cequence Security announces application security platform to stop bot attacks Cequence ASP is an application security platform that provides a scalable defense against the growing number of bot attacks affecting todays hyper-connected organizations. Cequence ASP was built not only as a distributed, extensible, open software platform, but also as automated solution leveraging a patent-pending analytics engine (CQAI), which combines applied artificial intelligence, machine learning, and behavioral analysis. Cryptowerk introduces blockchain-based technology to certify data integrity More

The post New infosec products of the week: November 16, 2018 appeared first on Help Net Security.


Vaporworms: New breed of self-propagating fileless malware to emerge in 2019 "IndyWatch Feed Tech"

WatchGuard Technologies information security predictions for 2019 include the emergence of vaporworms, a new breed of fileless malware with wormlike properties to self-propagate through vulnerable systems, along with a takedown of the internet itself and ransomware targeting utilities and industrial control systems. Cyber criminals are continuing to reshape the threat landscape as they update their tactics and escalate their attacks against businesses, governments and even the infrastructure of the internet itself, said Corey Nachreiner, CTO More

The post Vaporworms: New breed of self-propagating fileless malware to emerge in 2019 appeared first on Help Net Security.


Trust us, this is worth the wait "IndyWatch Feed Tech"

Due to unfavorable weather conditions, the launch of Northrop Grumman Corporations #Antares rocket with #Cygnus cargo spacecraft is now targeted for 4:01 a.m. EST on Saturday, Nov. 17 from NASAs Wallops Flight Facility. The spacecraft will deliver more than 7,400 pounds of science & research, crew supplies and hardware to the International Space Station. Get the latest updates:...


Online shoppers continue to engage in risky behavior "IndyWatch Feed Tech"

Findings from a new McAfee survey reveal the risky habits of online shoppers, including using unsecured Wi-Fi for online shopping and purchasing items from online retailers they are not fully confident are genuine (51 percent). This highlights the need for consumers to slow down and consider the risks of unsafe purchasing behavior that could lead to identity theft or financial loss. Last year consumers spent $453.46 billion on the web for retail purchases, which was More

The post Online shoppers continue to engage in risky behavior appeared first on Help Net Security.


Hows a Gyro Work? "IndyWatch Feed Tech"

It wasnt long ago that a gyro or gyroscope was an exotic piece of electronics gear. Most of us only saw them as childrens toys that would balance on your finger. Thats changed, though, thanks to microelectronics. Now your game controller, your phone, and your drone all probably use little ICs that are actually three-axis gyroscopes. Ever wonder how they work and what they do? [RCModelReviews] has a video that covers three kinds of gyros: old mechanical gyros, modern MEMS gyros, and even an exotic laser-based gyro. (YouTube, embedded below.)

Gyroscopes allow you to detect orientation by detecting linear forces on a rotating element. They are used in everything from spacecraft to submarines. The device has many origins dating back to antiquity. But the modern gyro showed up around 1800 or so. The childrens toy appeared in 1917 and is still made today.

Gyroscopes combined with accelerometers can give you a lot of information about a vehicles orientation and motion. Combine it with magnetic field sensors and you can even tell your absolute orientation in the Earths magnetic field.

Of course, given the source, the video talks mostly about how gyros have changed flying RC vehicles including quadcopters and helicopters. If you ever wondered how they got a spinning disk into those little MEMS gyros, this video will fill you in.

Hard to imagine, but having a gyro in your phone could be a security risk. If you want to see what a $15,000 gyro from the 1960s looked like, you can see that in an earlier post.


Smartphones, tablets causing mental health issues in kids as young as two "IndyWatch Feed Tech"

Open a book kids!

Smartphones and tablets are causing issues for kids as young as two years old.


What senior finance executives think about payments security "IndyWatch Feed Tech"

A WEX survey of more than 1,000 CFOs and senior financial executives from the U.S., Europe and Asia/Oceana revealed that for this group, security is paramount in payments solutions or platforms. Security both of information and settlements is raised by executives as a concern in multiple aspects of payments processing. In fact, according to those surveyed, security of transactions is the single most important attribute of payments. More than half of American executives53 More

The post What senior finance executives think about payments security appeared first on Help Net Security.


Ranked-Choice Voting Delivers a House Seat in Maine "IndyWatch Feed Tech"

NPR is reporting that Democrat Jared Golden has been declared the winner of Maine House District 2 after ranked-choice voting (RCV) boosted his vote count over Republican Bruce Poliquin. Poliquin had received more initial votes than Golden, but did not receive the requisite 50% of the vote.

Maine's new ranked-choice system of voting allows voters to rank candidates in their order of preference and to transfer their votes if no candidate gets more than 50 percent.

Local newspaper Portland Press Herald fills in some details:

Golden captured 50.5 percent of the vote to Poliquins 49.5 percent to become the first challenger to defeat an incumbent in Maines sprawling 2nd District in a century. The Marine Corps veteran and Lewiston lawmaker also made history by winning the nations first congressional election to utilize ranked-choice voting, enabling him to erase an initial deficit by securing the second- and third-choice votes of people who cast their ballots for two independents.

The final vote tally was 139,231 votes for Golden versus 136,326 votes for Poliquin a margin of 2,905 votes.

Read more of this story at SoylentNews.


Cloud interoperability and app mobility outrank cost and security for primary hybrid cloud benefits "IndyWatch Feed Tech"

Enterprises plan to increase hybrid cloud usage, with 91% stating hybrid cloud as the ideal IT model, but only 18% stating they have that model today, according to Nutanix. Application mobility across any cloud is a top priority for 97% of respondents with 88% of respondents saying it would solve a lot of my problems. IT decision makers ranked matching applications to the right cloud environment as a critical capability, and 35% of organizations More

The post Cloud interoperability and app mobility outrank cost and security for primary hybrid cloud benefits appeared first on Help Net Security.


Organizations unable to achieve business resilience against cyber threats "IndyWatch Feed Tech"

The Resilience Gap study, which surveyed over 4,000 business decision makers across the United States, United Kingdom, France, Germany and Japan found that while 96% of the global business decision makers believe that making technology resilient to business disruptions should be core to their firms wider business strategy, the reality is very different. In fact, only 54% of respondents claim that it definitely is. Barriers to achieving business resilience Despite 96% of respondents claiming that More

The post Organizations unable to achieve business resilience against cyber threats appeared first on Help Net Security.


Law firms are increasingly investing in cybersecurity programs "IndyWatch Feed Tech"

Logicforce released the results of its most recent Law Firm Cybersecurity Scorecard, a periodic study designed to assess cybersecurity preparedness across the legal industry and educate law firms on data protection best practices. Results of the study indicate that law firms are increasingly investing in cybersecurity programs, but most law firms are not implementing many of the protocols that will comprehensively protect them and their clients over time. Many firms clients and potential clients are More

The post Law firms are increasingly investing in cybersecurity programs appeared first on Help Net Security.


Senate Report on CIA Torture is One Step Closer to Disappearing "IndyWatch Feed Tech"

Senate Report on CIA Torture is one Step Closer to Disappearing:

The CIA inspector generals office the spy agencys internal watchdog has acknowledged it mistakenly destroyed its only copy of a mammoth Senate torture report at the same time lawyers for the Justice Department were assuring a federal judge that copies of the document were being preserved, Yahoo News has learned.

While another copy of the report exists elsewhere at the CIA, the erasure of the controversial document by the office charged with policing agency conduct has alarmed the U.S. senator who oversaw the torture investigation and reignited a behind-the-scenes battle over whether the full unabridged report should ever be released, according to multiple intelligence community sources familiar with the incident.

The deletion of the document has been portrayed by agency officials to Senate investigators as an inadvertent foul-up by the inspector general. In what one intelligence community source described as a series of errors straight out of the Keystone Cops, CIA inspector general officials deleted an uploaded computer file with the report and then accidentally destroyed a disk that also contained the document, filled with thousands of secret files about the CIAs use of enhanced interrogation methods.

[...] The 6,700-page report, the product of years of work by the Senate Intelligence Committee, contains meticulous details, including original CIA cables and memos, on the agencys use of waterboarding, sleep deprivation and other aggressive interrogation methods at black site prisons overseas. A 500-page executive summary was released in December 2014 by Democratic Sen. Dianne Feinstein, the committees outgoing chair. It concluded that the CIAs interrogations were far more brutal than the agency had publicly acknowledged and produced often unreliable intelligence. The findings drew sharp dissents from Republicans on the panel and from four former CIA directors.

But the full three-volume report, which formed the basis for the executive summary, has never been released. In light of a U.S. Court of Appeals ruling last week that the document is not subject to the Freedom of Information Act, there are new questions about whether it will ever be made public, or even be preserved.

Original Submission

Read more of this story...


The U.S. Military Testing Stratospheric Balloons That Never Have to Come Down "IndyWatch Feed Tech"

Via: MIT Technology Review: DARPA, the US militarys research arm, thinks it may have cracked the problem. It is currently testing a wind sensor that could allow devices in its Adaptable Lighter-Than-Air (ALTA) balloon program to spot wind speed and direction from a great distance and then make the necessary adjustments to stay in one []


FCC Approves SpaceX Application for Massive Satellite Constellation "IndyWatch Feed Tech"

Via: Ars Technica: SpaceX today received US approval to deploy 7,518 broadband satellites, in addition to the 4,425 satellites that were approved eight months ago. The Federal Communications Commission voted to let SpaceX launch 4,425 low-Earth orbit satellites in March of this year. SpaceX separately sought approval for 7,518 satellites operating even closer to the []


Flaws in industry-funded pesticide evaluation "IndyWatch Feed Tech"

The company-funded animal test was performed to ascertain how neural development is affected by the pesticide chlorpyrifos, which is used on a wide variety of crops around the world, including some 20 EU countries. The test laboratory concluded that there was no such effect, even at high doses.

Academic researchers have examined raw data from a company-funded safety evaluation of the pesticide chlorpyrifos. They discovered an effect on the brain architecture of the exposed laboratory animals at all tested doses, which was not included in the reported conclusions. Karolinska Institutet in Sweden led this independent study, which is published in the scientific journal Environmental Health.

All pesticides must be evaluated in terms of their safety and potential risks for human health before they can officially be approved. Normally the companies that manufacture the products cover the cost of such evaluations and commission test laboratories to perform the necessary animal tests.

Assistant professor Axel Mie at Karolinska Institutet, Christina Rudn at Stockholm University and Philippe Grandjean at Harvard School of Public Health have examined a case in which independent research and company-funded tests deviated, at least in terms of the conclusions drawn in the industry-funded study.


More realistic research needed on substances that enter the environment "IndyWatch Feed Tech"

Chemical substances and nanomaterials are processed on a massive scale in diverse products, while their risks have not been properly assessed. Time and again synthesised substances have been shown to pollute the environment more than lab tests predicted. This is the warning given by Professor of Ecotoxicology Martina Vijver from Leiden University in her inaugural lecture on 16 November.

Laboratory tests are inadequate, according to Vijver, because they do not imitate a complete ecosystem. In her inaugural lecture she will discuss in greater detail two examples of substances where more realistic research is needed: agricultural toxins and nanoparticles. But the same can be said for many other groups of substances, such as antibiotics, plasticizers and GenX.


Magnets and Printed Parts Make Quick-Disconnect Terminals "IndyWatch Feed Tech"

The Apple MagSafe power connector is long gone from their product line, but that doesnt mean that magnetic connectors arent without their charms. It just takes the right application, and finding one might be easier with these homebrew magnetic connectors.

Well admit that the application that [Wesley Lee] found for his magnetic connectors is perhaps a little odd. Hes building something called Linobyte, a hybrid art and electronics project that pays homage to computing history with very high-style, interactive core memory modules. The connectors are for the sense wire that is weaved through the eight toroids on each module, to program it with a single byte. Each connector has a 3D-printed boot that holds a small, gold-plated neodymium magnet with the sense wire soldered to it. A socket holds another magnet to the underside of a PCB. The magnet in the boot sticks to the PCB and makes contact with pads, completing the circuit. We know what youre thinking: heating a magnet past the Curie point is a great way to ruin it. [Wesley] admits that happens, but it just makes the connection a little weaker, which works for his application. The short video below shows how he puts them together.

We can think of a couple of ways these connectors would be useful, and we really like the look of the whole project. Itll be interesting to see where it goes, but in the meantime, brushing up on how magnets work could be fun.

[via r/electronics]


Tripwire Enterprise now collects digital forensic data to support incident response "IndyWatch Feed Tech"

Tripwire Enterprise now features the ability to collect digital forensic data in the event of a data breach. Tripwire Enterprise monitors systems in real-time for changes that could be indicative of a breach, said Tim Erlin, vice president of product management and strategy at Tripwire. When a security breach is suspected, Tripwire Enterprises new Incident Response Rules can be used to collect in-depth data on what happened on a system to speed and support incident More

The post Tripwire Enterprise now collects digital forensic data to support incident response appeared first on Help Net Security.


Google AI better than doctors at detecting breast cancer "IndyWatch Feed Tech"

Googles deep learning AI called LYNA able to correctly identify tumorous regions in lymph nodes 99 per cent of the time.


USB form neural compute stick makes debut at developer event "IndyWatch Feed Tech"

Intel has unveiled the Intel Neural Compute Stick 2. It looks like a standard USB thumb drive, and it runs on a USB 3.0 port, but is oh-more-special. CNET said the new AI brain sticks into the side of your PC.

Andrew Tarantola in Engadget summed up its significance. Intels NCS2 is essentially a self-contained neural network on a thumbdrive and should make developing those sorts of devices faster and easier by offloading much of the processing power required to train them to its onboard Movidius Myriad X vision processing unit (VPU).

The debut took place Wednesday, Nov. 14, at the Intel AI Devcon in Beijing.


'Remarkable' Decline in Fertility Rates "IndyWatch Feed Tech"

'Remarkable' decline in fertility rates

There has been a remarkable global decline in the number of children women are having, say researchers.

Their report found fertility rate falls meant nearly half of countries were now facing a "baby bust" - meaning there are insufficient children to maintain their population size.

The researchers said the findings were a "huge surprise".

And there would be profound consequences for societies with "more grandparents than grandchildren".

Original Submission

Read more of this story at SoylentNews.


Accenture workers join tech protests of contracts with U.S. border enforcement "IndyWatch Feed Tech"

Accenture staff are circulating letter urging company leadership to end its contract with U.S. border enforcement, following reports earlier this year of harsh treatment of detained families at the U.S.-Mexican border. The technology we provide is...


Dragos Announces $37M in Series B funding for ICS cybersecurity threat detection and response "IndyWatch Feed Tech"

Dragos raised $37M in Series B funding. The new investment comes at a time of growth in the ICS cybersecurity market, and demand for Dragos asset identification and threat detection software. The round was led by Canaan, with participation from existing investors as well as Emerson, National Grid Partners and Schweitzer Engineering Laboratories (SEL). With the investment, Joydeep Bhattacharyya, Partner at Canaan, joins the companys board of directors. Industrial equipment is one of the last More

The post Dragos Announces $37M in Series B funding for ICS cybersecurity threat detection and response appeared first on Help Net Security.


EZShield launches Mobile Defense Suite "IndyWatch Feed Tech"

EZShield protects Personally Identifiable Information (PII) through the Mobile Defense Suite. Mobile devices positively influence and impact our personal and business lives, but they are also a gateway to identity theft and corporate data breaches, said Rich Scott, Chief Commercial Officer at EZShield + IdentityForce. Today, we are redefining how we all think about identity protection. And, how Information Technology (IT) and Information Security (InfoSec) stakeholders can further pave the way to drive and defend More

The post EZShield launches Mobile Defense Suite appeared first on Help Net Security.


Organisms found on hike in the woods are like no other life on Earth News "IndyWatch Feed Tech"

Canadian researchers have discovered a new kind of organism thats so different from other living things that it doesnt fit into the plant kingdom, the animal kingdom, or any other kingdom used to classify known organisms.

Two species of the microscopic organisms, called hemimastigotes, were found in dirt collected on a whim during a hike in Nova Scotia by Dalhousie University graduate student Yana Eglit.

A genetic analysis shows theyre more different from other organisms than animals and fungi (which are in different kingdoms) are from each other, representing a completely new part of the tree of life, Eglit and her colleagues report this week in the journal Nature.


Sixgill backstops security with blockchain data integrity for IoE applications "IndyWatch Feed Tech"

Sixgill unveiled its blockchain or distributed ledger-based solution for sensor network data integrity. Sixgill Integrity is a ledger-agnostic solution and is designed from the ground up to solve the fundamental need for an end-to-end, real-time sensor data authenticity system. With Integrity, organizations are assured that their emitted data, transmitted data, ingested data, and acted-upon data are the same. Sixgill is taking a fresh approach to fundamental industry challenges of data security and authenticity: Cloud processing More

The post Sixgill backstops security with blockchain data integrity for IoE applications appeared first on Help Net Security.


Eurofins Digital Testing launches Cyber Security Division "IndyWatch Feed Tech"

Eurofins Digital Testing launched a new Cyber Security Division to serve the media and entertainment industry, Internet of Things providers, and other key markets. Concurrently, the company announced the appointments of Marcel Mangel, Erik Rutkens, and Sean Walls as Managing Directors of Cyber Security, overseeing a team of nearly 100 security experts around the globe. Today, media and entertainment companies in particular face numerous security threats. These span their internal enterprise software applications and hardware, More

The post Eurofins Digital Testing launches Cyber Security Division appeared first on Help Net Security.


FCC tells SpaceX it can deploy up to 11,943 broadband satellites "IndyWatch Feed Tech"

SpaceX today received US approval to deploy 7,518 broadband satellites, in addition to the 4,425 satellites that were approved eight months ago.

The Federal Communications Commission voted to let SpaceX launch 4,425 low-Earth orbit satellites in March of this year. SpaceX separately sought approval for 7,518 satellites operating even closer to the ground, saying that these will boost capacity and reduce latency in heavily populated areas. That amounts to 11,943 satellites in total for SpaceXs Starlink broadband service.

SpaceX proposes to add a very-low Earth orbit (VLEO) NGSO [non-geostationary satellite orbit] constellation, consisting of 7,518 satellites operating at altitudes from 335km to 346km, the FCC said in the draft of the order that it approved unanimously today. The newly approved satellites would use frequencies between 37.5 and 42GHz for space-to-Earth transmissions and frequencies between 47.2 and 51.4GHz for Earth-to-space transmissions, the FCC said.


Australian MyHealthRecord Opt Out Period Extended Until January 31, 2019 "IndyWatch Feed Tech"

When the Australian government originally announced that the online health care record system would change from "opt in" to "opt out", there was a backlash from the community over privacy and security concerns. After several months an opt out period was started where people could contact the government to declare that they do not want their medical data stored on the system. The surge in numbers to opt out initially caused long delays and system crashes as the Australian Digital Health Agency tried to keep up with demand to opt out. After the first few weeks the demand dropped, until last week where in the final days of the opt out period large numbers of people decided to opt out at the last minute. Due to concerns with system security and issues with last minute opt out requests the My Health Record opt out period has been extended to January 2019. So far, 1 in 25 people have decided to opt out of the online electronic health record system.

Original Submission

Read more of this story at SoylentNews.


ThreatConnect expands TIP capabilities with new automation "IndyWatch Feed Tech"

In an effort to address the growing threat intelligence market need for automation, ThreatConnect has extended its product offering to include Playbooks in its TC Analyze product. Built for analysts, by analysts, TC Analyze provides a place to see teams tasks, analyze data, and connect all available security tools. TC Analyze with the Playbooks feature increases threat intelligence platform (TIP) flexibility by adding automation to formerly disconnected security tools. Customers now have the ability to More

The post ThreatConnect expands TIP capabilities with new automation appeared first on Help Net Security.


Hillicon Valley: Facebook reeling after NYT report | Dems want DOJ probe | HQ2 brings new scrutiny on Amazon | Judge upholds Russian troll farm indictments | Cyber moonshot panel unveils recommendations "IndyWatch Feed Tech"

Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...


iPhone X, Xiaomi Mi 6 & Samsung Galaxy S9 hacked at Pwn2Own "IndyWatch Feed Tech"

By Waqas

White hat hackers and IT security researchers have once again proved their elite skills at Pwn2Own 2018 after exposing critical security vulnerabilities in products developed by popular vendors like Apple, Samsung, and Xiaomi. Pwn2Own is organized by cybersecurity giant Trend Micros Zero Day Initiative in Tokyo where hackers took part in exploiting zero-day flaws in products developed by []

This is a post from Read the original post: iPhone X, Xiaomi Mi 6 & Samsung Galaxy S9 hacked at Pwn2Own


Measuring The Cooling Effect Of Transformer Oil "IndyWatch Feed Tech"

Transformer oil has long served two purposes, cooling and insulating. The large, steel encased transformers we see connected to the electrical grid are filled with transformer oil which is circulated through radiator fins for dumping heat to the surrounding air. In the hacker world, we use transformer oil for cooling RF dummy loads and insulating high voltage components. [GreatScott] decided to do some tests of his own to see just how good it is for cooling circuits.

Thermal measurement resultsHe started with testing canola oil but found that it breaks down from contact with air and becomes rancid. So he purchased some transformer oil. First, testing its suitability for submerging circuits, he found that he couldnt see any current above his meters 0.0 A limit when applying 15 V no matter how close together he brought his contacts. At 1 cm he got around 2 A with 230 VAC, likely from parasitic capacitance, for a resistance of 115 Mohm/cm.

Moving on to thermal testing, he purchased a 4.7 ohm, 100 watt, heatsink encased resistor and attached a temperature probe to it with Kapton tape. Submerging it in transformer oil and applying 25 watts through it continuously, he measured a temperature of 46.8C after seven minutes. The same test with distilled water reached 35.3C. Waters heat capacity is 4187 J/kgK, not surprisingly much better than the transformer oil...


HPR2685: Scientific and Medical Reports "IndyWatch Feed Tech"

We get bombarded with breathless news stories about medical breakthroughs that may not be as reliable as they are presented. This begins our look at what is reliable and what you need to watch out for.


Dems press Justice Department to probe Facebook over political attacks "IndyWatch Feed Tech"

A group of Democratic senators on Thursday urged the Department of Justice (DOJ) to investigate Facebook following allegations that it attempted to discredit critics who pushed for the company to be regulated.Sen. Amy Klobuchar (D-Minn.)...


VirtualBox 6.0 Beta 2 Adds File Manager For Host/Guest File Copies, OS/2 Shared Folder "IndyWatch Feed Tech"

Last month Oracle rolled out the public beta of VirtualBox 6.0 though didn't include many user-facing changes. They have now rolled out a second beta that does add in a few more features...


Russia's Keldysh Research Center Plans Nuclear-Powered Rocket "IndyWatch Feed Tech"

Russia says it's going to beat Elon Musk and SpaceX's 'old tech' with a nuclear rocket

Elon Musk and SpaceX won't be leading the reusable rocket space race long, at least not if Russia has anything to say about it. Russia's Keldysh Research Center has been working on a reusable rocket solution for nearly a decade now, and now it's ramping up the hype with a new concept video showing how its spacecraft works.

Speaking with reporters, Vladimir Koshlakov explained that Elon Musk and SpaceX pose no real threat to the group's plans. Musk, Koshlakov says, is relying on technology that will soon be antiquated, while Russia is looking towards shaping the future of spaceflight.

The Russian researchers say that their nuclear-powered rocket platform will be able to make it to Mars seven months after launch, and that its reusable rocket stages can be put back into service after just 48 hours.

"Reusability is the priority," Koshlakov reportedly said. "We must develop engines that do not need to be fine-tuned or repaired more than once every ten flights. Also, 48 hours after the rocket returns from space, it must be ready to go again. This is what the market demands."

Original Submission

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 15 November


Blog post by jcs@ on reverse engineering audio drivers "IndyWatch Feed Tech"

On his blog, joshua stein (jcs@) has a description of the hoops he jumped through to get stereo sound out of his Huawei Matebook X under OpenBSD (something that only worked under Windows with special drivers).

His approach involves logging all PCI device accesses by running Windows in QEMU under Linux with VFIO, parsing that, and making the OpenBSD azalia(4) driver do the same.

Thanks to joshua for the interesting write-up!


Facebook reeling after damning NYT report "IndyWatch Feed Tech"

Facebook is being hit with fresh criticism from Capitol Hill as lawmakers reacted harshly Thursday to a New York Times investigation that detailed the companys efforts to wield influence in Washington after becoming aware of Russia-linked...


Measuring the stability of a TCXO "IndyWatch Feed Tech"

Lately, I have been testing the GPSDO that I will use to discipline my Eshail 2 groundstation. One of the tests I have done is to measure the frequency of the TCXO that I use in my Hermes-Lite 2.0beta2 over a few days. Here I show the details of the measurement process and how to process the data in Python.

The GPSDO in question is a DF9NP 10MHz GPSDO that I use to drive a 27 MHz PLL, also made by Dieter DF9NP. The 27MHz signal is used as an external reference for a Ku-band LNBF.

Since the 27MHz signal is quite strong, it leaks considerably into my Hermes-Lite HF transceiver. By measuring the frequency of this signal, as received in the Hermes-Lite, I can derive the frequency of the TCXO used in the Hermes-Lite. The TCXO in question is an Abracon ASTXR-12-38.400MHZ-514054-T, which is rated for a stability of 500ppb over a temperature range of -40 to 85C.

To measure the frequency of the 27MHz signal, I have used WSJT-X 2.0.0-rc3 in frequency measurement mode. This produces frequency measurements with a measurement interval of a few seconds (for some reason the measurement interval is irregular, usually ranging from 2 to 5 seconds). The measurements are stored into a text file called fmt.all.

I have made a Jupyter notebook to read this file and do some plots. The notebook can be found in fmt.ipynb, together with the fmt.all file I have used. I am using xarray, a library I have discovered recently and which provides a good way to handle most of the data Im typically using.

The plot below shows the frequency offset in ppb of the 38.4MHz TCXO. The measurements have been done over the course of almost eight days, from 2018-11-06 to 2018-11-14.

The graph shows some daily variations, mostly due to temperature variations in the house. An overall decreasing trend is also observed. The rate of change is about 1.8 ppm/day.

As I have already mentioned in the past, crystals usually go down in frequency when t...


Genes linked to being gay may help straight people get more sex "IndyWatch Feed Tech"

The largest-ever study of genetics and sexual orientation offers a theory about the longevity of genes that influence homosexuality.


Albert Einstein, Holograms and Quantum Gravity "IndyWatch Feed Tech"

In the latest campaign to reconcile Einsteins theory of gravity with quantum mechanics, many physicists are studying how a higher dimensional space that includes gravity arises like a hologram from a lower dimensional particle theory.


Elon Musks Boring Company is launching DIY watchtowers with bricks from tunnel dirt "IndyWatch Feed Tech"

Getting rid of dirt is one of the largest costs of digging tunnels and Elon Musks Boring Company is exploring some creative ways to do that.

They are launching DIY watchtowers with bricks made of dirt from their tunnels.

They estimate that the cost of moving the dirt can represent up to 15% of the total cost of a tunnel, which is why they want to turn the dirt into a product itself.


Distribution Release: Slax 9.6.0 "IndyWatch Feed Tech"

Tom Matjek has announced the availability of a new release of Slax, a distribution formerly based on Slackware Linux, but recently re-designed and built on top of Debian's stable branch. The new version, Slax 9.6.0, is the latest build; it brings the usual round of security and bug-fix....


Congress passes bill that create new Cybersecurity and Infrastructure Security Agency at DHS "IndyWatch Feed Tech"

The U.S. House of Representatives passed the CISA bill that creates a new cybersecurity agency at the Department of Homeland Security (DHS).

The U.S. House of Representatives passed the CISA bill that creates a new cybersecurity agency at the Department of Homeland Security (DHS).

In October, the Senate passed the Cybersecurity and Infrastructure Security Agency (CISA) Act (H.R. 3359), now the Congress passed the legislation unanimously and it is going to be signed by the President.

When the bill will be signed the National Protection and Programs Directorate (NPPD) will become the Cybersecurity and Infrastructure Security Agency (CISA) with the responsibility for cyber and physical infrastructure security.

The National Protection and Programs Directorate of the Department shall, on and after the date of the enactment of this subtitle, be known as the `Cybersecurity and Infrastructure Security Agency (in this subtitle referred to as the `Agency). reads the bill.

Todays vote is a significant step to stand up a federal government cybersecurity agency, said Secretary Kirstjen M. Nielsen. The cyber threat landscape is constantly evolving, and we need to ensure were properly positioned to defend Americas infrastructure from threats digital and physical.  It was time to reorganize and operationalize NPPD into the Cybersecurity and Infrastructure Security Agency.  I thank Chairman Michael McCaul and Ranking Member Bennie Thompson for recognizing our critical role and both starting and completing this transformation in the House of Representatives.  I also thank Chairman Ron Johnson and Ranking Member Claire McCaskill for their tireless support of the CISA Act in the Senate.

The bill aims at securing federal networks and protecting critical infrastructure from cyber and physical threats. 

The CISA Act passing Congress represents real progress in the national effort to improve our collective efforts in cybersecurity, said NPPD Under Secretary Christopher Krebs. Elevating the cybersecurity mission within the Department of Homeland Security, streamlining our operations, and giving NPPD a name that reflects what it actually does will help better secure the nations critical infrastructure and cyber platforms.  The changes will also improve the Departments ability to engage with industry and government stakeholders and recruit top cybersecurity talent.



Nio deploys 18 battery swap stations covering 2,000+ km expressway "IndyWatch Feed Tech"

No one in the electric vehicle space has managed to make battery swapping work yet, but Nio is trying big time with 18 new battery swap stations covering a 2,000+ km expressway in China.

Several companies tried and failed at battery swapping. Tesla had a battery swap system that they seemingly abandoned and Better Place went bankrupt.

But you could say Tesla didnt try that hard and has instead bet on fast-charging and Better Place was a little too ahead of its time.


Robots Finally Learning to Clean the Bathroom "IndyWatch Feed Tech"

Team Homer teaches TIAGo to autonomously clean a toilet, and it's about time

A useful general home robot, as far as Im concerned, needs to be able to do three things: fold laundry, wash dishes, and clean toilets. Thats all it would take to make me happy. Weve seen some attempts at both laundry folding and washing dishes, but not a lot of bathroom cleaning. Now, thanks to the World Robot Summit (WRS) in Japan, robots are finally tackling this task. As part of a competition held at the event, robots had to clean water from around a toilet and clean trash off the floor. Team Homer at the University of Koblenz-Landau, Germany, managed to get things done with a TIAGo mobile manipulator that you could (almost) picture cleaning up your bathroom as well. 

During the competition, judges randomly sprinkled water on and around a toilet. Teams had to clean at least 80 percent of the liquid and remove trash from the floor in order to get full points. The video below shows Team Homers run with a PAL Robotics TIAGo:

First the robot approaches the toilette, then he detects the toilet seat to clean it. The toilet seat is assumed to be planar and then estimated in the RGB-D data. The resulting segment is closed and thinned using morphology. The resulting line then serves as input for the end effector positions. We proposed the use of an sponge end effector. With this end effector we can soak up the liquid on the toilet seat and the ground, at the same time we are able to pick up small pieces of toilet paper as well as empty paper rolls. The picked trash is stored in a bin mounted at the side of the robot. In the end the robot cleans the floor.

Tiago robot cleaning toilet Photo: Team Homer/University of Koblenz-Landau

There were a variety of different approaches that teams used for this challenge at the WRC, including building a robotic system around the entire bathroom to handle the cleaning tasks. Honestly, thats probably a faster and more reliable way to solve the problem, but its also far less practical, which is why were much more impressed with Team Homers use of a mobile manipulator that was modified only with a sponge.

Were still a very long w...


Intel CPU Shortages to Continue into 2Q19, says Asustek CEO "IndyWatch Feed Tech"

Asustek Computer has seen its shipments to the DIY sector and related motherboards affected by Intel's supply strategy for CPUs, with the prospects that the CPU shortages, particularly those for desktop PCs, will continue into the second quarter of 2019, according to company CEO Jerry Shen.

The continued CPU supply crunch, escalating US-China trade disputes, and increasing competition in the notebook segment in Europe have pressed down Asustek's "operational visibility" for the fourth quarter of 2018 to the lowest level of 20% compared to an over 50% seen in previous years, Shen said.

Although Intel has pledged to address the supply issues since September and has continued to pour investments to ramp up output from its 10nm process, the tight CPU supplies have not been solved as the US chipmaker has given the priority to the production of high-end Xeon and Core series CPUs, instead of CPUs for the entry-level or other consumer models, Shen indicated.

CPU shortages to continue into 2Q19, says Asustek CEO

This intel "shortage" remains unexplained.

Original Submission

Read more of this story at SoylentNews.


The most incredible technology youve never seen "IndyWatch Feed Tech"

Theres money to be made and lives to be saved with the tiny stuff thats all around us.

Saving the world (or some subset of people in it) is in vogue among the worlds wealthiest.

Jeff Bezos has a rocket company, Blue Origin. Bezos believes our future is extraterrestrial, and his rocket company exists because he thinks the price for getting anything off this rock is too damn high.


Foam Airboat is Cheap RC Fun "IndyWatch Feed Tech"

The hull is built on a sheet of foam, which is cheap, readily available, and suitably buoyant for the task. Its then kitted out with a brushless motor to run the prop and a servo to control the rudder. Lace it up with a radio receiver and speed controller and youre good to go.

The build could readily be completed in well under a couple of hours, and is a great one to tackle with kids due to its mechanical simplicity. Theres room for extra creativity too you can always substitute a watermelon if youre feeling peckish. Video after the break.


How to Hack Off Hackers "IndyWatch Feed Tech"

By Carolina

Websites are essentially your businesss storefront. They display to passing visitors the products and services your business is offering: they offer a window into your business. Similar to traditional stores, your website is also prone to theft and random acts of destruction. A live website is a game hunting ground for cybercriminals. Not securing your []

This is a post from Read the original post: How to Hack Off Hackers


Former Facebook security chief: 'I failed to prepare my employer' on Russian disinformation "IndyWatch Feed Tech"

Former Facebook chief security officer Alex Stamos on Thursday took part of the blame for not doing enough at Facebook to stop nascent political misinformation campaigns in 2016, following a scathing New York Times report about the companys...


Zuckerberg says he learned of Definers through NYT story "IndyWatch Feed Tech"

Facebook CEO Mark Zuckerberg said Thursday that he was unaware that his company hired a right-leaning political consulting firm to stave off its opponents while voicing his respect for Democratic mega-donor George Soros....


Article 13: YouTube CEO is Now Lobbying FOR Upload Filters "IndyWatch Feed Tech"

As the heated debate over the EUs controversial Article 13 proposals continues, YouTube is becoming ever more vocal.

Relatively silent in the run-up to the September vote which saw the European Parliament vote in favor of proposals put forward by Axel Voss EPP group, YouTube now seems very concerned over the possibility of being held liable for infringing content uploaded to its platform.

While we support the goals of article 13, the European Parliaments current proposal will create unintended consequences that will have a profound impact on the livelihoods of hundreds of thousands of people, Wojcicki wrote in blog post earlier this week.

Wojcickis statement carried a stark warning that liability for YouTube under Article 13 could force the platform to block content from EU citizens. No company could take on such a financial risk, she said.

Thus far, the Article 13 debate has been polarized, with the entertainment industries hugely in favor and companies like YouTube and pro-Internet freedom groups strongly against. Now, however, a new development has created an interesting split in the ranks, with Julia Reda, MEP for the Pirate Party, warning that YouTube is now lobbying in favor of upload filters.

As detailed in a release from Redas office this morning, YouTube CEO Susan Wojcicki has made a number of statements in recent weeks that indicate that the video hosting platform is in favor of pre-filtering content before its made available to the public.

Of course, Google has its ContentID filtering system already in place, meaning that it would be in pole position to further dominate the video hosting space, if the filtering option is adopted by the EU.

The fact that Youtube is now publicly lobbying for mandatory upload filters is not surprising in the least. By introducing ContentID, YouTube has already proven that is is very much capable of developing filters for certain types of content, such as music, Reda explains.

If the entire market was obliged to install such filters, YouTube would not only be miles ahead in of its competitors in the development of such technologies, it would also be in a position to sell its filters to smaller platforms. Large platforms such as YouTube would grow further and be presented with an entirely new business model. The significantly smaller EU competition would be left behind.

In common with many activists, Reda is passionately against the idea of content being filtered...


Facebook expanding ability for users to appeal content decisions "IndyWatch Feed Tech"

Facebook will implement a system allowing users to appeal content decisions made by the company to an independent body of experts for adjudication, Facebook founder Mark Zuckerberg said Thursday.In a blog post, Zuckerberg announced that an "...


[$] Bringing the Android kernel back to the mainline "IndyWatch Feed Tech"

Android devices are based on the Linux kernel but, since the beginning, those devices have not run mainline kernels. The amount of out-of-tree code shipped on those devices has been seen as a problem for most of this time, and significant resources have been dedicated to reducing it. At the 2018 Linux Plumbers Conference, Sandeep Patil talked about this problem and what is being done to address it. The dream of running mainline kernels on Android devices has not yet been achieved, but it may be closer than many people think.


Kaspersky Lab opens first Transparency Center in Zurich "IndyWatch Feed Tech"

Kaspersky Lab starts data processing for European users in Zurich and also launched the first Transparency Cente under the announced Transparency Initiative

From today, malicious and suspicious files shared by users of Kaspersky Lab products in Europe will start to be processed in data centers in Zurich, initiating the first part of a relocation commitment made by the company in late 2017 under its Global Transparency Initiative. The move reflects Kaspersky Labs determination to assure the integrity and trustworthiness of its products and is accompanied by the opening of the companys first Transparency Center, also in Zurich.

The relocation of data processing is part of a major infrastructure move designed to increase the resilience of the companys IT infrastructure to risks of data breaches and supply-chain attacks, and to further prove the trustworthiness of its products, services and internal processes.

Kaspersky Zurich Transparency Center

From November 13, threat-related data coming from European users will start to be processed in two datacenters. These provide world-class facilities in compliance with industry standards to ensure the highest levels of security.

The data, which users have actively chosen to share with Kaspersky Lab, includes suspicious or previously unknown malicious files and corresponding meta-data that the companys products send to Kaspersky Security Network (KSN) for automated malware analysis.

Files comprise only part of the data processed by Kaspersky Lab technologies, yet the most important one. Protection of customers data, together with the safety and integrity of infrastructure is a top priority for Kaspersky Lab, and that is why the file processing relocation comes first and is expected to be fully accomplished by the end of 2019. The relocation of other types of data processed by Kaspersky Lab products, consisting of several kinds of anonymized threat and usage statistics, is planned to be conducted during later phases of the Global Transparency Initiative.

Today also marks the opening of Kaspersky Labs first Transparency Center in Zurich, enabli...


Rand Paul: Facebook must 'convince conservatives they're not the enemy' "IndyWatch Feed Tech"

Sen. Rand Paul (R-Ky.) said Thursday that Facebook must convince conservatives they are not censoring them if it wants to keep making money."I think if it gets so bad that they don't allow conservative viewpoints on Facebook, I think you will get to...


Tell the FDA to identify and punish law breakers "IndyWatch Feed Tech"

Tell the FDA to identify and punish organisations who have broken US law by not reporting clinical trial results.

The USs Food and Drug Administration has at last published its plan to identify and punish the organisations and people who have broken the law by not reporting clinical trial results. The FDA now wants to hear what we think about the plan.

The FDA Amendment Act 2007 says that lots of clinical trials in the US should be registered on and report results information there within 12 months of the end of the trial. AllTrialss FDAAA TrialsTracker shows that 628 clinical trials have broken this law since the first trials became due in January this year. We have written to the FDA every week to update them on the trials that have breached the law and shared with them a rolling estimation of the amount in fines the Agency could levy on the law breakers. The FDA has the power to fine people up to $10,000 a day and we have assessed that they could have raised $904,499,127 nearly a billion dollars but no one has ever been fined. That the FDA is now seriously considering how to start doing this is a long-awaited step forward.

These are the draft guidelines. The FDA is asking for comments on them to be submitted here. You dont have to be a US citizen to comment.


Japan's Olympics and Cybersecurity Minister Doesn't Use Computers "IndyWatch Feed Tech"

System error: Japan cybersecurity minister admits he has never used a computer

A Japanese minister in charge of cybersecurity has provoked astonishment by admitting he has never used a computer in his professional life, and appearing confused by the concept of a USB drive. Yoshitaka Sakurada, 68, is the deputy chief of the government's cybersecurity strategy office and also the minister in charge of the Olympic and Paralympic Games that Tokyo will host in 2020.

In parliament on Wednesday however, he admitted he doesn't use computers. "Since the age of 25, I have instructed my employees and secretaries, so I don't use computers myself," he said in a response to an opposition question in a lower house session, local media reported.

He also appeared confused by the question when asked about whether USB drives were in use at Japanese nuclear facilities. His comments were met with incredulity by opposition lawmakers. "It's unbelievable that someone who has not touched computers is responsible for cybersecurity policies," said opposition lawmaker Masato Imai.

And his comments provoked a firestorm online. "Doesn't he feel ashamed?" wrote one Twitter user. "Today any company president uses a PC. He doesn't even know what a USB is. Holy cow."

Another joked that perhaps Sakurada was simply engaged in his own kind of cybersecurity. "If a hacker targets this Minister Sakurada, they wouldn't be able to steal any information. Indeed it might be the strongest kind of security!"

Also at NYT, The Register, and Reuters.

Original Submission

Read more of this story at SoylentNews.

NVIDIA 410.78 Linux Driver Fixes Vulkan Corruption, Adds Quadro RTX 4000 Support "IndyWatch Feed Tech"

For those using the NVIDIA long-lived 410 Linux driver series over the in-beta 415.xx driver series, the 410.78 driver release is out today as the newest stable binary driver build...


Researchers Seek to Create the Digital Smell Interface "IndyWatch Feed Tech"

We hear digital audio, we see digital video, and we feel digital haptic feedback. However, we dont have an analog for the sense of smell. [Kasun] and his team of researchers from the Imagineering Institute in Malaysia are in the midst of changing that reality. Their project aims to transmit fragrances via electronic stimulation. Though its really more of a step toward creating a multi-sensory internet.

The teams electric smell machine consists of a variable power supply connected to silver electrodes wrapped around an endoscopic camera. The camera is necessary to ensure contact with the users olfactory bulb as electric current pulses through the electrodes. The current values vary based upon the scent being replicated and are in the 0.2mA neighborhood. Early trials of the machine have revealed that around one-quarter of test subjects are able to identify the smells being replicated. They reported smells being fruity, sweet, and woody though all had a chemical-like odor attached.

The concept of smell-o-vision is not a new one, as it has been around longer than motion pictures with sound. Previous attempts at accompanying film and television with scent have been a result of chemical reactions. Devices from these types of experiments typically involved cartridges that would need to be replaced when the chemical substances were depleted. [Kasun]s team approach is to avoid the chemical approach in favor of directly stimulating the olfactory receptors. Those interested in the gritty details can read the research paper on digitizing smell.

[Kasun] and his team uploaded a video on the project that you can view below. Its all a work in progress at this point, but sign me up for a trial when they pinpoint the true essence of new car smell.

Of course if you were hoping to outsource some of the not so great smells in your life to the cloud, theres this feature on using IOT devices to sniff out spoiled foods.


Raspberry Pi 3 Model A+ Released For $25 USD "IndyWatch Feed Tech"

The Raspberry Pi Foundation today unveiled the Raspberry Pi 3 Model A+ ARM SBC that costs just $25 and offers Bluetooth, dual-band 802.11ac WiFi, and a 1.4GHz Cortex-A53 processor...


iPhone X, Samsung Galaxy S9, Xiaomi Mi 6 Hacked At Pwn2Own Tokyo 2018 "IndyWatch Feed Tech"

iPhone X, Samsung Galaxy S9, and Xiaomi Mi 6 fall prey to hacking in the Pwn2Own hacking competition in Tokyo

Trend Micro-sponsored Pwn2Own, the annual hacking contest, that took place at the PacSec security conference in Tokyo, saw hackers successfully exploit iPhone X, Samsung Galaxy S9, and Xiaomi Mi6. Other handsets such as Google Pixel 2 and Huawei P20 too were involved in the contest.

For those unaware, Trend Micro, a global leader in cyber-security solutions, hosts Pwn2Own in an effort to promote its Zero Day Initiative (ZDI) program, that is designed to reward security researchers to exploit the latest and most popular mobile devices and demonstrate and disclose major zero-day vulnerabilities to tech companies. Following the contest, vendors will have 90 days to produce patches for these bugs.

Day 1 at the Pwn2Own Tokyo 2018

At the start of day one, Amat Cama and Richard Zhu from the Fluoroacetate team were the first to hack Xiaomi Mi 6 with the help of NFC component.

They used the touch-to-connect feature to force-open the web browser on the phone and navigate to their specially crafted webpage following which the webpage exploited an Out-Of-Bounds write in WebAssembly to get code execution. This hack earned them $30,000 USD and 6 Master of Pwn points.

During the demonstration, we didnt even realize that action was occurring until it was too late. In other words, a user would have no chance to prevent this action from happening in the real world, ZDI reports in a blog post.

Later, the Fluoroacetate team went on to exploit another handset, Samsung Galaxy S9. They used a heap overflow in the baseband component to get code execution on the device. This hack earned the team another $50,000 USD and 15 more points towards Master of Pwn. Fluoroacetate also hacked iPhone X via Wi-Fi using a pair of bugs a JIT (Just-In-Time) vulnerability in the web browser followed by an Out-Of-Bounds write for the sandbox escape and escalation. This hack fetched them another $60,000 USD and 10 additional Master of Pwn points.

Besides the Fluoroacetate team, another team MWR Labs (Georgi Geshev, F...


SpaceX Seeks to Tie its Record (18) for Most Launches in a Year Today (20:46 UTC; 15:46 EST) "IndyWatch Feed Tech"

SpaceX Seeks to tie its Record for Most Launches in a Year on Thursday:

This year the company has had a lot on its plate. It flew the large Falcon Heavy rocket for the first time in February. It introduced a brand-new, potentially highly reusable variant of the Falcon 9 rocket in May. And all throughout the year, the company's engineers have been scrambling to finalize development of the Dragon spacecraft to meet NASA's needs to get its astronauts to the International Space Station.

Even so, the company has maintained a steady launch cadence, and on Thursday the company will attempt its 18th mission of this year from Launch Complex-39A at Kennedy Space Center in Florida. The Thursday launch window for the Eshail-2 satellite mission opens at 3:46pm ET (20:46 UTC) and lasts until 5:29pm ET (22:29 UTC). Weather conditions are 60 percent favorable, and a back-up launch window exists for Friday afternoon.

The Eshail-2 satellite will provide telecommunications services for the Middle East and North Africa regions as well as providing the first amateur radio geostationary communication capability. The three-ton satellite will be delivered to a geostationary transfer orbit.

[...] The first stage of this Falcon 9 rocket, a Block 5 variant of the booster, first flew on July 22 to launch the Telstar 19V mission. The company will attempt to land the first stage on the Of Course I Still Love You drone ship that will be located offshore, in the Atlantic Ocean. This landing will come about eight minutes after liftoff, and the satellite is scheduled to be deployed into its transfer orbit a little more than 32 minutes into the flight.

Up to 4 more flights are planned for this year; the next possibly as soon as Monday would be Spaceflight Industries' SSO-A flight-sharing mission. That flight is slated to deliver 64 spacecraft from 34 organizations into Sun-Synchronous Low Earth Orbit.

Live stream on YouTube should start about 15 minutes before launch.



AI in the Real World "IndyWatch Feed Tech"

AI in the Real World


Microsoft Releases The New Light Theme In Windows 10 19H1 Insider Build 18282 "IndyWatch Feed Tech"

Microsoft rolls out Windows 10 19H1 build 18282 to Insiders with a new light theme

Microsoft released Windows 10 Insider Preview Build 18282 (19H1) to Windows Insiders in the Fast Ring on November 14. While the next Windows 10 iteration 19H1 includes several improvements and bug fixes, it also introduces a true Light theme for the Taskbar, Start menu, Action Center, touch keyboard, and more.

Also Read-

Previously, if elements like the Taskbar, Start menu, Action Center, touch keyboard, etc., would be left out if one selected the Light theme. However, this changes with the new build.

Ever since we introduced the ability to choose between light and dark in Windows 10, weve heard feedback asking for a truer separation between the two options, Microsoft said in a blog post.

To enable light theme in Windows 10, you need to go to Settings > Personalization > Colors. Then, click the drop-down under Choose your color and select Light. The new theme changes many elements of the OS UI, including the taskbar, Start menu, Action Center, touch keyboard and more. If you select the Light mode in the Settings app, all system UI elements will look lighter.

When you update to this build, your system color wont automatically change to the new light system color. This is because we want everything to be exactly as you left it before you did the update. Were leaving the choice up to you, Microsoft added.

As part of this new Light theme, Microsoft is also adding a new default wallpaper highlighting Windows Light. Go to Settings > Personalization > Themes and select Windows Light to apply it. This will change your PC to be light themed.

The UI change to Light theme is not ready yet. Microsoft is likely to introduce the new Light theme in the upcoming Windows 10 19H1 feature update due in Spring 2019.

The other notable changes in Windows 10 19H1 update are improved Action Center, dark themed OneDrive and more. Furthermore, there is also a new window snip option for Snip & Sketch, improvements to the printing experience, and more. Check out the general changes, improvements, and fixes for...


An In-Depth Look at Dexter, the Robotic Arm "IndyWatch Feed Tech"

Dexter isnt the only robotic arm in town, by any means. But in terms of hobbyist-level robotics, its by far the most complete robot arm that weve seen, and it includes a couple of design features that make both its positional accuracy and overall usability stand out above the rest. This is a robot arm with many of the bells and whistles of a hundred-thousand dollar robot, but on a couple-thousand dollar budget.



Why Noviosense's In-Eye Glucose Monitor Might Work Better Than Google's "IndyWatch Feed Tech"

Noviosense takes a different approach to glucose sensing in tears, with promising results

For decades, researchers have clamored to build a wearable, noninvasive glucose monitor. Such a device could help the millions of people living with diabetes track their glucose levels more closely, without the pain of pricking their skin with needles.

Scientists have tried tracking glucose in sweat, saliva, breath, and urine. Theyve tried to measure it in blood from outside the skin using spectroscopy. And lately, several groups, including Google, have proposed measuring glucose in tears using smart contact lenses.

But so far, no one has succeeded. The quest for a noninvasive, wearable glucose monitor has mostly left in its wake a trail of dead companies and jaded researchers.

Now, theres a glimmer of hope. Last month, a startup company in the Netherlands called Noviosense quietly published data on human testing of its tear glucose sensor. The study was smallonly six participantsbut the results, published October 12 in the journal Biomacromolecules, look promising.

These are the best results I have seen yet on tear glucose, says John L. Smith, a former executive for blood glucose meter maker LifeScan, who has devoted the latter part of his career to evaluating noninvasive glucose-sensing technologies as a consultant. But substantial improvement is still needed for it to be good enough for monitoring. 

Coming from Smith, that is high praise. Smith is a well-known skeptic of wearable, needle-free glucose monitors. In fact, in the 2018 edition of his book The Pursuit of Noninvasive Glucose: Hunting the Deceitful Turkey, Smith all but says the technology will never come to fruition: This [book] may be the final update this subject needs. He continues, Many participants and observers are beginning to feel this is an idea whose time never came and which may soon be gone without ever seeing success. 

It helps that Noviosense has taken a different approach to measuring glucose in tears. Instead of putting a sensor in a contact lens, Noviosenses device is pl....


Microsoft finally re-releases Windows 10 October 2018 Update "IndyWatch Feed Tech"

Based on (telemetry) data, today we are beginning the re-release of the October Update by making it available via media and to advanced users who seek to manually check for updates, John Cable, Director of Program Management, Windows Servicing and Delivery, said in an announcement in a new blog post.

According to Microsoft, the so-called October 2018 Update that was delayed due to data destroying bug has been thoroughly investigated and all related issues have been resolved. The decision to re-release the update was reached after the careful study of diagnostic data from millions of Windows Insiders showed no further evidence of data loss.

Unlike the April Update which had the fastest Windows 10 update rollout rate, the company is taking a more measured approach with the Windows 10 October Update. The update is available to download for advanced users straight away via media and manual updates. However, those who receive the update automatically through Windows Update will see a slower rollout.

The update will be offered to users via Windows Update when data shows their device is ready. However, the update might not get installed in a users system if an issue is detected.

We will offer the October Update to users via Windows Update when data shows your device is ready and you will have a great experience, Cable continued.

If we detect that your device may have an issue, such as an application incompatibility, we will not install the update until that issue is resolved, even if you Check for updates, so you avoid encountering any known problems.

Microsoft has promised a renewed focus in the way it approaches quality issues, including better communication with customers.

Michael Fortin, Windows corporate Vice President said: While we do see positive trends, we also hear clearly the voices of our users who are facing frustrating issues, and we pledge to do more.

The post Microsoft finally re-releases Windows 10 October 2018 Update appeared first on...


iPhone X explodes after iOS 12.1 Update "IndyWatch Feed Tech"

Recently Apple Support has responded to a report of an exploding iPhone X, where the victim is claiming that while he was installing the new iOS 12.1 update the phone went hot and exploded.

The news is from the city of Federal Way (Washington) where a guy named Rahel Mohamad twitted about the incident.

He said that This year early January I bought the iPhone and have been using it normally. The iPhone X was in process of getting new iOS 12.1 update and when Mohamad put it on charging at a later stage, he observed a Dark grey smoke started coming from the phone.

The update was completed and as soon as the phone turned on it immediately started to smoke and caught fire.

He also said that he was using the official bundled Apple Lightning cable and a wall adapter to charge his iPhone(see the image below).

iphone x

However due to some reason he had to stop the charging of his iPhone which is just before the explosion.

Mohamad said, When I held the phone it was very hot and I drop the phone immediately on the floor. Then it started to smoke. he added.

He reached out Apple which wishes to investigate the incident further by getting Mohamad to ship the iPhone X to them. In reply to his tweet, Apple Support also said that this is definitely not expected behavior and would wish to resolve it soon.

This is not the first incident of smartphones exploding. A few years back Samsung had to recall its Galaxy Note 7 after several of its units exploded while in use.

Just to recall, Apples iPhone X was launched last year and its design change marked the tenth anniversary of the companys legendary iPhone range. Now, lets see how soon they respond with the report of the actual reason for the incident.

Stay tuned for more. 

The post...


Berkheimer or No Berkheimer, Software Patents Remain Mostly Unenforceable in the United States and the Supreme Court is Fine With That "IndyWatch Feed Tech"

Summary: 35 U.S.C. 101, which is based on cases like Alice and Mayo, offers the perfect storm against software patents; it doesnt look like any of that will change any time soon (if ever)

THE NEW management of the U.S. Patent and Trademark Office (USPTO) is rather hostile towards 35 U.S.C. 101, which it is hoping to change in complete defiance of caselaw or by cherry-picking Federal Circuit decisions (only those which suit the Directors bias). The USPTO must raise patent quality, not lower it.

They try to overturn or at least override Alice. 4.5 years later theyre still not successful.A few days ago Watchtrolls Steve Brachmann said that the Supreme Court Refuses Another 101 Patent Eligibility Appeal (this was the headline. Yes, Alice is here to stay. SCOTUS gives the middle finger to software patents, even after Trump added a couple of new Justices. On Monday, November 5th, Brachmann noted, the U.S. Supreme Court denied a petition asking the Court to take up Real Estate Alliance Ltd. v. Move, Inc., et. al. on appeal from the Court of Appeals for the Federal Circuit (CAFC). The case becomes just another example in a long line of patent appeals involving questions of patent eligibility the Supreme Court has decided to sidestep instead of offering clarity for what some believe has become an unintelligible test for patent eligibility.

They will carry on trying; each time theres a petition like this sites like Watchtroll, IAM, Patently-O and so on try hard to solicit briefs. They try to overturn or at least override Alice. 4.5 years later theyre still not successful. Chasing shadows.

Then theres the Berkheimer case, which the above sites boosted for almost half a year before they finally gave up. As we noted several times before, citing relevant/supporting data, Berkheimer has not really changed invalidation rates of abstract software patents; it could, in theory, but it did not (or barely did, if at all, for reasons we explained before). Weaker pate...


This video is the sixth in a multi-part series discussing computing "IndyWatch Feed Tech"

Click on photo to start video.

The Rise of GPU Computing (+ What is Volta, Titan V, RTX)

In this video, well be discussing the rise of GPU computing and the role it will play in AI computational tasks.

[0:225:26] Starting off well look at, the origins of GPU computing and the reason(s) for their mass adoption today.

[5:268:13] Following that well discuss, the use of GPU computing for artificial intelligence (AI) computing.

[8:139:38] To conclude well discuss, general purpose GPU (GPGPU) computing.


DarkGate: New password stealer & cryptomining malware hits Windows devices "IndyWatch Feed Tech"

By Waqas

DarkGate malware uses Akamai, AWS DNS records and multiple payloads for cryptomining, credential theft and endpoint takeover. A sophisticated malware campaign has been identified by an enSilo researcher that hasnt been detected before and is quite advanced than many of the malware identified before. It has been dubbed as DarkGate by the developer, reports researcher []

This is a post from Read the original post: DarkGate: New password stealer & cryptomining malware hits Windows devices


New Raspberry Pi 3 Model A+ Unveiled "IndyWatch Feed Tech"

The Raspberry Pi Foundation has unveiled a smaller, cheaper, lower-powered Pi 3, the Raspberry Pi 3 Model A+. The new model will sell for $25 USD and has lower power requirements with less RAM than the 3B+ (512 MB DDR2), only a single USB port, and no Ethernet port. However, it has the same BCM2837B0 quad core processor running at 1.4 GHz, a dual band WIFI networking, Bluetooth 4.2 Low Energy connectivity, the normal 40-pin GPIO header, and audio and video output. : New Raspberry Pi 3 Model A+ unveiled
TechRepublic : Raspberry Pi 3 Model A+: A closer look at the new $25 board
CNX Software : Compact Raspberry Pi 3 Model A+ Launched for $25

Original Submission

Read more of this story at SoylentNews.


National bike share data program allows DOT's to identify scooter and bike share users in real-time "IndyWatch Feed Tech"

A recent article in Smart Cities Dive revealed that the Los Angeles Department of Transportation (DOT) will be partnering with Remix, Lime and Spin to create a mobility data standard for ride shares.

A 'mobility data standard' is just a fancy way of saying a real-time scooter and bicycle tracking standard.

The LADOT will be "receiving data from the companies that are providing the new mobility services in real-time."  Let that sink in for a minute, DOT's are receiving real-time data about scooter and bike share users.

A City of Los Angeles inter-departmental correspondence mentions the need for the DOT to track ride share users in real-time twenty times.

An article in PR Web was a little more revealing, calling the partnership a "data sharing agreement."

Are DOT's being used to spy on bicycles and scooters?

Earlier this year I warned everyone that Uber has been tracking ride share users in real-time and sending personal information to governments. And last year I warned people that Spin bicycles equipped with Tomes Software can be used to identify everyone.

If you still need more convincing, remember ride share companies have a close relationship with Smart City surveillance.

What kind of data do ride share companies keep?



Why you need to know about Penetration Testing and Compliance Audits? "IndyWatch Feed Tech"

We live in an age where data flows like water, becoming the new life source of our everyday ventures. As such, you can just imagine what all of that entails and the weight that data receive, especially when it comes to a decision making on how to handle this fairly new and arguably invaluable resource. Of course, we are well aware from a very young age that our water needs to be pure, filtered


Adding Linux To A PDP-11 "IndyWatch Feed Tech"

The UNIBUS architecture for DECs PDPs and Vaxxen was a stroke of genius. If you wanted more memory in your minicomputer, just add another card. Need a drive? Plug it into the backplane. Of course, with all those weird cards, these old UNIBUS PDPs are hard to keep running. The UniBone is the solution to this problem. It puts Linux on a UNIBUS bridge, allowing this card to serve as a memory emulator, a test console, a disk emulator, or any other hardware you can think of.

The key to this build is the BeagleBone, everyones second-favorite single board computer that has one feature the other one doesnt: PRUs, or a programmable real-time unit, that allows you to blink a lot of pins very, very fast. Weve seen the BeagleBone be used as Linux in a terminal, as the rest of the computer for an old PDP-10 front panel and as the front end for a PDP-11/03.

In this build, the Beaglebones PRU takes care of interfacing to the UNIBUS backplane, sending everything to a device emulator running as an application. The UniBone can be configured as memory or...


Google Open-Sources "Amber" Multi-API Shader Test Framework "IndyWatch Feed Tech"

The newest open-source graphics project out of Google is called Amber and it's a multi-API shader testing framework focused on capturing and communicating of shader bugs...


Thoughts on the 2018 Eurosymposium on Healthy Ageing "IndyWatch Feed Tech"

Thoughts on the Eurosymposium on Healthy Ageing held by Heales in Brussels.

When I first learned about the possibility of achieving human rejuvenation through biotechnological means, little did I know that this would lead me to meet many of the central figures in the field during a conference some seven years laterlet alone that I would be speaking at the very same event. Yet, Ive had the privilege to attend the Fourth Eurosymposium on Healthy Ageing (EHA) held in Brussels on November 810, an experience that gave me a feel of just how real the prospect of human rejuvenation is.

A friendly, welcoming environment

As EHA was the first conference Ive ever attended, I didnt quite know what to expect; given that researchers, activists, and investors from all around the world were invited, I had imagined it would probably be a posh, formal event with violins playing on the background and people in suits and formal dresses discussing topics beyond my comprehension while enjoying champagne. Thankfully, the atmosphere was much more relaxed and informal, elegant but not intimidating, which favored the interaction among participants regardless of their backgroundsthough, alas, the topics discussed were indeed mostly beyond my comprehension, as they involved high-level biochemistry with which Im nowhere near sufficiently familiar (yet).


Amazon's New York headquarters will displace hundreds of public school employees: report "IndyWatch Feed Tech"

Amazon's incoming New York City headquarters is expected to displace hundreds of public school employees, according to a New York Daily News report. The tech giant is slated to take over a building in Long Island...


Ignoring and Bashing Courts: Is This the Future of Patent Offices in the West? "IndyWatch Feed Tech"

President Battistelli went as far as publicly attacking and threatening judges the hallmark of President Donald Trump

Trump and Iancu

Summary: Andrei Iancu, who is trying to water down 35 U.S.C. 101 while Trump waters down SCOTUS (which delivered Alice), isnt alone; Antnio Campinos, the new President of the EPO, is constantly promoting software patents (which European courts reject, citing the EPC) and even Australias litigation industry is dissenting against Australian courts that stubbornly reject software patents

BOTH the European Patent Office (EPO) and the U.S. Patent and Trademark Office (USPTO) have been granting software patents in spite of 35 U.S.C. 101 and in spite of software patents in Europe being de facto banned (bar loopholes that Antnio Campinos is happy to exploit and even expand).

This merely lowers confidence in US patents and, accordingly, lowers their collective worth.Mr. Iancu, the American Battistelli, will soon be a speaker at the IP Awareness Summit (IPAS), which is an indoctrination/lobbying campaign set up by parasites who cause as much litigation as possible, making themselves necessary. IPAS is promoted by various sites of patent lawyers this week. Heres one that takes note of Iancus participation:

US Under Secretary of Commerce for Intellectual Property and Director of the US Patent and Trademark Office (USPTO), Andrei Iancu, will speak at the event.

Looking at the past weeks news regarding...


Unveils ST-42 for Scalable Manufacturing in Space for Earth-Based Applications "IndyWatch Feed Tech"

LEXINGTON, Ky. (NOVEMBER 15, 2018) Space Tango, a leader in the commercialization of space through R&D, bioengineering and manufacturing in microgravity, today announced ST-42, a fully autonomous robotic orbital platform designed specifically for scalable manufacturing in space. Launching in the mid 2020s, ST-42 aims to harness the unique environment of microgravity to produce high value products across industries; from patient therapeutics to advanced technology products that have the potential to revolutionize industries here on Earth. ST-42 is an extension of the International Space Stations (ISS) capabilities, and NASAs creation of a robust commercial marketplace in low Earth orbit (LEO).

ST-42 will bring the economics of production in orbit into reality coupling autonomy with the reduced cost and larger number of launch vehicle providers. Space Tango expects the platform to be at the forefront of new breakthroughs in knowledge discovery, therapeutic solutions and manufacturing, and to provide the required capabilities for creation of new biomedical and technology product sectors in the commercial Space economy.


The Case Against Quantum Computing "IndyWatch Feed Tech"

The proposed strategy relies on manipulating with high precision an unimaginably huge number of variables

Illustration: Christian Gralingen

Quantum computing is all the rage. It seems like hardly a day goes by without some news outlet describing the extraordinary things this technology promises. Most commentators forget, or just gloss over, the fact that people have been working on quantum computing for decadesand without any practical results to show for it.

Weve been told that quantum computers could provide breakthroughs in many disciplines, including materials and drug discovery, the optimization of complex manmade systems, and artificial intelligence. Weve been assured that quantum computers will forever alter our economic, industrial, academic, and societal landscape. Weve even been told that the encryption that protects the worlds most sensitive data may soon be broken by quantum computers. It has gotten to the point where many researchers in various fields of physics feel obliged to justify whatever work they are doing by claiming that it has some relevance to quantum computing.

Meanwhile, government research agencies, academic departments (many of them funded by government agencies), and corporate laboratories are spending billions of dollars a year developing quantum computers. On Wall Street, Morgan Stanley and other financial giants expect quantum computing to mature soon and are keen to figure out how this technology can help them.

Its become something of a self-perpetuating arms race, with many organizations seemingly staying in the race if only to avoid being left behind. Some of the worlds top technical talent, at places like Google, IBM, and Microsoft, are working hard, and with lavish resources in state-of-the-art laboratories, to realize their vision of a quantum-computing future.

In light of all this, its natural to wonder: When will useful quantum computers be constructed? The most optimistic experts estimate it will take 5 to 10 years. More cautious ones predict 20 to 30 years. (Similar predictions have been voiced, by the way, for the last 20 years.) I belong to a tiny minority that answers...


Security updates for Thursday "IndyWatch Feed Tech"

Security updates have been issued by Fedora (kde-connect, mingw-SDL2_image, SDL2_image, and subscription-manager), Red Hat (flash-plugin), SUSE (openssh-openssl1, systemd, and thunderbird), and Ubuntu (kernel, linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2, linux, linux-aws, linux-gcp, linux-kvm, linux-raspi2, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-azure, linux-hwe, linux-azure, linux-gcp, linux-lts-trusty, linux-lts-xenial, linux-aws, postgresql-10, and python2.7).


Film Group Asks Court to Stop Arrests of Theater Owners Over Piracy "IndyWatch Feed Tech"

While Hollywood has its own problems with movie piracy, the position in India is arguably more pressing.

Many of the countrys top movie titles are immediately pirated and placed online, much to the disappointment of film companies nationwide. Aggressive site-blocking appears to have little effect so, in association with the authorities, the problem is being tackled at the source.

Many leaks happen when individuals or groups illegally record movies in cinemas, which is often simply a case of finding a screen and pointing a camcorder or phone towards it. In tandem, there are concerns that in some cases, theater owners themselves may be part of the piracy conspiracy. That, however, is leading to what appears to be overzealous policing.

When movies are shown, its common for watermarks to be embedded in the performance, which allows content security companies to trace where recordings take place. Armed with this information, copyright holders are then filing complaints against theater owners, who are reportedly being arrested by police, in the absence of evidence theyre even involved.

This has led to a plea to the Madras High Court by the Film Exhibitors Association (FEA), requesting that police are restrained from making arrests without evidence that theater owners are directly involved with unauthorized camming of theatrical performances.

The film producers were filing complaints against theater owners falsely accusing the latter as being responsible for such piracy and the resulting losses caused to the film producers, the Times of India reports, citing the FEA.

Police were arresting or attempting to arrest the theater owners merely on the basis of such complaints, without any inquiry. This makes the theater owner to run from pillar to post to obtain appropriate bail or anticipatory bail. The theater owners cannot be made responsible for all cases of piracy.

The FEA added that its impossible to search all members of an audience for hidden cameras, whether theyre present in phones, pens, or even spectacles. Public prosecutor A Natarajan countered, telling the court that calls for a blanket ban on arrests cant be entertained and should be denied.

With that, Justice Puspha Sathyanarayana issued an interim direction, ordering the Tamil Nadu Home Secretary and the Director General of Police to organize a meeting of affected stakeholders (film companies, distributors, exhibitors) to try and reach an amicable solution.



Development Release: Red Hat Enterprise Linux 8.0 Beta "IndyWatch Feed Tech"

Red Hat has announced the availability of a beta release for the distribution's upcoming major release - Red Hat Enterprise Linux (RHEL) 8. The beta release focuses on security, Application Streams and Linux container technologies: "Red Hat Enterprise Linux 8 beta introduces the concept of Application Streams to....


New IoT Security Regulations "IndyWatch Feed Tech"

It falls upon lawmakers to create laws that protect consumers. While the US government is largely absent in this area of consumer protection, the state of California has recently stepped in and started regulating the Internet of Things, or "IoT" devices sold in the state -- and the effects will soon be felt worldwide.


Too much mTOR is Linked to Diabetes and Aging "IndyWatch Feed Tech"

A new study takes a look at the relationship between metabolism, aging, and type 2 diabetes and in particular the mTORC1 protein complex, part of the mTOR pathway.

The mTOR pathway

The mechanistic target of rapamycin (mTOR) pathway is a major part of metabolism and is one of four major pathways that control it; collectively, the four pathways are part of deregulated nutrient sensing, which is one of the aging processes.


Popular AMP Plugin for WordPress Patches Critical Flaw Update Now "IndyWatch Feed Tech"

A security researcher has disclosed details of a critical vulnerability in one of the popular and widely active plugins for WordPress that could allow a low-privileged attacker to inject malicious code on AMP pages of the targeted website. The vulnerable WordPress plugin in question is "AMP for WP Accelerated Mobile Pages" that lets websites automatically generate valid accelerated mobile


Japans Cyber-Security Minister Has Never Used a Computer "IndyWatch Feed Tech"

Via: BBC: Japans new cyber-security minister has dumbfounded his country by saying he has never used a computer. Yoshitaka Sakurada made the admission to a committee of lawmakers. Since I was 25 years old and independent I have instructed my staff and secretaries. I have never used a computer in my life, he said, according []


Gillibrand criticizes financial incentives for Amazon "IndyWatch Feed Tech"

Sen. Kirsten Gillibrand (D-N.Y.) on Wednesday voiced reservations about the package of incentives New York offered Amazon to locate part of its new headquarters in Queens, echoing criticism from some progressives about the deal."While Im...


Archaeologists Find Possible Ruins of Ancient Greek City of Tenea "IndyWatch Feed Tech"

Ancient Greek city Tenea found by archaeologists

Archaeologists in Greece believe they have found the lost city of Tenea, thought to have been founded by captives of the legendary Trojan War.

They said they had discovered the remains of a housing settlement, jewellery, coins and several burial sites in the southern Peloponnese area.

Until now, archaeologists had a rough idea of where the city might have been located but had no tangible proof.

The items date from 4th Century BC to Roman times.

Excavation work around the modern-day village of Chiliomodi began in 2013, and "proof of the existence" of Tenea emerged in work carried out in September and early October this year, officials said.


Original Submission

Read more of this story at SoylentNews.


20% of MageCart-compromised merchants get reinfected within days "IndyWatch Feed Tech"

20% of MageCart-compromised merchants get reinfected within days

MageCart, the notorious malware that has been haunting online stores by stealing payment card details from online shoppers at checkout, is reinfecting the same websites time and time again.

Read more in my article on the Tripwire State of Security blog.


EFF and MuckRock Release Records and Data from 200 Law Enforcement Agencies' Automated License Plate Reader Programs "IndyWatch Feed Tech"

EFF and MuckRock have filed hundreds of public records requests with law enforcement agencies around the country to reveal how data collected from automated license plate readers (ALPR) is used to track the travel patterns of drivers. We focused exclusively on departments that contract with surveillance vendor Vigilant Solutions to share data between their ALPR systems.

Today we are releasing records obtained from 200 agencies, accounting for more than 2.5-billion license plate scans in 2016 and 2017. This data is collected regardless of whether the vehicle or its owner or driver are suspected of being involved in a crime. In fact, the information shows that 99.5% of the license plates scanned were not under suspicion at the time the vehicles plates were collected.

On average, agencies are sharing data with a minimum of 160 other agencies through Vigilant Solutions LEARN system, though many agencies are sharing data with over 800 separate entities.

Click below to explore EFF and MuckRocks dataset and learn how much data these agencies are collecting and how they are sharing it. We've made the information searchable and downloadable as a CSV file. You can also read the source documents on DocumentCloud or track our ongoing requests. 

Read the Report and Explore the datA  



CNCF Survey: Cloud Usage in Asia Has Grown 135% Since March 2018 "IndyWatch Feed Tech"

The bi-annual CNCF survey takes a pulse of the community to better understand the adoption of cloud native technologies. This is the second time CNCF has conducted its cloud native survey in Mandarin to better gauge how Asian companies are adopting open source and cloud native technologies. The previous Mandarin survey was conducted in March 2018.


Choosing Cell Modems: The Drama Queen of Hardware Design "IndyWatch Feed Tech"

So you went to a tradeshow and heard about this cool new idea called the Internet Of Things; now its time to build an IoT product of your own. You know that to be IoT, your Widget Dlux has to have a network connection but which to choose?

You could use WiFi or Bluetooth but that would be gauche. Maybe LoRaWAN? All the cool kids are using LoRa for medium or long range wireless these days, but that still requires a base station and Widget Dlux will be a worldwide phenomenon. Or at least a phenomenon past your bedroom walls. And you know how much users hate setting things up. So a cell modem it is! But what do you have to do to legally include one in your product? Well thats a little complicated.

Weve talked about government certification testing before (seriously, go read that article. Bob did a great job!) and its entirely relevant here but cell modems add a couple layers to that onion. There are a bunch of entry points to this discussion so lets pick one and dive in.

Certification: Intentional, Unintentional, Multiple

So what kind of government certification will you need before you can ship your product? There are a few. If you plan to turn your cell radio on the entire device will need to be certified for intentional radiation to make sure that the radios you intend to use are well-behaved (dont emit too much energy for given frequency bands). If you plan to turn on Widget Dlux at all than it will also need to be checked for unintentional emissions to make sure there isnt too much electromagnetic energy you didnt mean to transmit. If you want to add another radio like Bluetooth or WiFi theres also multi-radiator certification to look for problems caused by multiple radios operating at once.

Fortunately there are some tricks which might make that process easier. Testing and certification for multiple radiators is only relevant when more than one is on at once. Maybe the application can be adjusted so that you dont actually need, say, Bluetooth at the same time as the cell connection? Or only turn the WiFi radio on when the cell signal falls below a certain strength and the radio is subsequently disabled? As long as theres only ever one transmitter on at a time then you shouldnt need to pursue additional certification. Though if there is ever a case where they can both be on at once it needs to be appropriately certified.

An even more specific exception is using WiFi to gather access ESSIDs and MACs to help with geolocation. Actively scanning for APs might be faster but if you stick to a...


Civil rights group accuses Facebook of anti-Semitic smear campaign "IndyWatch Feed Tech"

A civil rights group that a PR firm working for Facebook reportedly tried to tie to the billionaire financier George Soros accused the social media company on Thursday of trafficking in racist and anti-Semitic extremist far-right conspiracy...


Are Killer Robots the Future of War? Parsing the Facts on Autonomous Weapons "IndyWatch Feed Tech"

Under what circumstances should militaries delegate the decision to take a human life to machines? Its a moral leap that the international community is grappling with.


How California Needs to Adapt to Survive Future Fires "IndyWatch Feed Tech"

California is burning for very good reasons, like climate change and population growth. But it doesnt have to be this way.


Scouting out bacterial defences to find new ways to counter-attack antibiotic resistance "IndyWatch Feed Tech"

Research led by the University of Bristol has begun to unpick an important mechanism of antibiotic resistance and suggest approaches to block this resistance.

Antibiotic resistance is the ability of bacteria to defend against antibiotic attack, and the spread of these resistance mechanisms amongst bacteria is a global public health concern. A form of resistance caused by a family of bacterial proteins, the Verona Imipenemase (VIM) beta-lactamases, is of acute clinical concern because it can inactivate (penicillins and related agents) that comprise over half of the global antibacterial market.

A team of researchers led by the University of Bristol have uncovered near-atomic level structural detail of VIM proteins. The research is published today [Thursday 15 November] in The FEBS Journal.


Reprogrammed Stem Cells Implanted into Patient with Parkinsons Disease "IndyWatch Feed Tech"

A man in his 50s is the first of seven patients to receive the experimental therapy.


Facebook cuts ties from firm that linked its critics to George Soros "IndyWatch Feed Tech"

Facebook has cut ties to a political consulting group, Definers Public Affairs, that it hired to discredit its critics and opponents in the wake of scrutiny its received over the past year. The companys decision follows a New York Times story...


How algae could sustainably reduce the carbon dioxide concentration in the atmosphere "IndyWatch Feed Tech"

In collaboration with fellow researchers, chemists at the Technical University of Munich (TUM) have developed a process that, according to initial calculations, can facilitate economically removing the greenhouse gas carbon dioxide from the atmosphere. The latest World Climate Report (IPCC Special Report on Global Warming of 1.5 C) acknowledges the global relevance of the process.


Patent Maximalists Are Still Trying to Figure Out How to Stop PTAB or Prevent US Patent Quality From Ever Improving "IndyWatch Feed Tech"

Older: Trumps USPTO Nominee is a Supporter of Software Patents

Andrei IancuSummary: Improvements are being made to US patents because of the Patent Trial and Appeal Board (PTAB), which amends/culls/pro-actively rejects (at application phases) bad patents; but the likes of Andrei Iancu cannot stand that because theyre patent maximalists, who personally gain from an over-saturation of patents

Photo credit: The American Lawyer

THE U.S. Patent and Trademark Office (USPTO) is grappling if not struggling with the fact that many of the patents it grants are worthless, useless, toothless in courts. Its like theyre just a pile of papers, claiming some idea to be owned by someone when in reality its as good as a pupils note from mommy, saying something along the lines of the dog ate my homework!

The coordinated (albeit at times sporadic and disorganised) attack on PTAB almost always comes from litigation industry insiders.Patent Trial and Appeal Board (PTAB) inter partes reviews (IPRs) are upsetting Iancu, a patent litigation insider if not mole whom Donald Trump made Director of the Office (they had worked together before Trump became President). We warned about him from the very start (early nomination stages [1, 2, 3, 4]).

The coordinated (albeit at times sporadic and disorganised) attack on PTAB almost always comes from litigation industry insiders. IAM, Watch...


Lost Continents Beneath Antarctica Unveiled in Dead Satellites Data "IndyWatch Feed Tech"

Ancient continents were found under Antarctic ice, thanks to old data from a now-dead European satellite.

New analysis of data from the Gravity Field and Steady-State Ocean Circulation Explorer (GOCE) mission has revealed rocky zones called cratons in the Earths lithosphere, a zone between our planets crust and mantle. GOCE plunged into Earths atmosphere five years ago this month after the craft ran out of orbital-maneuvering fuel. While scientists were unable to predict exactly where GOCE would fall, no debris dropped into populated areas.


Chinas Artificial Sun Is Now Hot Enough for Nuclear Fusion "IndyWatch Feed Tech"

Tokamaks like EAST could help us do just that. Theyre devices that use magnetic fields to control plasma in a way that could support stable nuclear fusion, and its this plasma that EAST heated to such an incredible temperature.

Going Nuclear

Not only is EASTs new plasma temperature milestone remarkable because, wow, its really hot, its also the minimum temperature scientists believe is needed to produce a self-sustaining nuclear fusion reaction on Earth.


Red Hat Enterprise Linux 8 Beta Released With Stratis, Yum 4, Application Streams "IndyWatch Feed Tech"

The long-awaited public beta of Red Hat Enterprise Linux 8 is finally available!..


AMD Radeon RX 590 Launches, Linux Support Presumably Okay "IndyWatch Feed Tech"

While it comes as no surprise given all the leaks in recent weeks, today AMD officially announced the Radeon RX 590 graphics card as another update to Polaris...


University Researchers Publish Paper On GPU Side-Channel Attacks "IndyWatch Feed Tech"

University researchers out of University of California Riverside have published a paper this week detailing vulnerabilities in current GPU architectures making them vulnerable to side-channel attacks akin to Spectre and Meltdown...


Mesa 18.2.5 Brings Fixes For Direct3D 9 State Tracker, RADV Vulkan Driver "IndyWatch Feed Tech"

For those sticking to the Mesa stable release train, Mesa 18.2.5 is now available ahead of the Mesa 18.3 quarterly feature release due out in the weeks ahead...


Chinese Automaker Zotye Plans 2020 Entrance into the U.S. Market "IndyWatch Feed Tech"

Ford's China partner planning to sell in U.S. in 2020

Ford Motor Co.'s newest Chinese partner, Zotye Automobile, is preparing to launch at least two SUVs in the Blue Oval's backyard.

The relatively small Chinese automaker Zotye Automobile International Co. is partnering with California-based HAAH Automotive Holdings to look beyond its home market and form a new sales distribution company in the United States known as Zotye USA (pronounced ZOH-tay) a tie-up that would sell direct competitors to some of Ford's most lucrative SUVs.

"We're facing a new reality where the Chinese domestic market is slowing for the first time in recent memory," said Michael Dunne, CEO of Hong Kong-based ZoZo Go, a firm that advises automakers on the Chinese market. "Now that things have gone soft, automakers are finding themselves in a situation where they have to export and find new markets. Zotye is possibly the first, but they won't be the last."

Also at MarketWatch and CNET.

Original Submission

Read more of this story at SoylentNews.


Inventors of spinning wind turbine win James Dyson award "IndyWatch Feed Tech"

Lancaster students win 30,000 prize for O-Wind turbine after scooping UK equivalent.


Experts visualise what life on Mars would be like for humans "IndyWatch Feed Tech"

The team produced particulars for three distinct dwellings; an apartment aimed at young professionals, a family home and a luxury mansion.


Links 15/11/2018: Zentyal 6.0, Deepin 15.8, Thunderbird Project Hiring "IndyWatch Feed Tech"

GNOME bluefish



  • Desktop

  • Server

    • Getting Clarity on the Private vs. Public Cloud Decision

      News flash: Private cloud economics can offer more cost efficiency than public cloud pricing structures.

      Private (or on-premises) cloud solutions can be more cost-effective than public cloud options, according to Busting the Myths of Private Cloud Economics, a report 451 Research and Canonical released Wednesday. That conclusion counters the notion that public cloud platforms traditionally are more cost-efficient than private infrastructures.

      Half of the enterprise IT decision-makers who participated in the study identified cost as the No. 1 pain point associated with the public cloud. Forty percent mentioned cost-savings as a key driver of cloud migration.



CCCB: Larque on the Wing "IndyWatch Feed Tech"

Like everybody, Ive got a bookcase of unread books, but perhaps weirdly, mine is organised along a simple principle: Older books sink towards the bottom. That is, as I read books, I compact the rest and move them towards the bottom left.

Its a sedimental journey.

The last couple of years Ive read very few books, and have instead been reading comics and comics and comics, and Im totally burned out on that. So what better way to get back into reading books again than to take a whack at those books that Ive been avoiding reading most of my life?



Benchmarking's Bare Metal Intel Xeon / AMD EPYC Cloud "IndyWatch Feed Tech"

With the tests earlier this week of the 16-way AMD EPYC cloud comparison the real standout of those tests across Amazon EC2, Packet, and SkySilk was Packet's bare metal cloud. For just $1.00 USD per hour it's possible to have bare metal access to an AMD EPYC 7401P 24-core / 48-thread server that offers incredible value compared to the other public cloud options for on-demand pricing. That led me to running some more benchmarks of's other bare metal cloud options to see how the Intel Xeon and AMD EPYC options compare.


Jim Carrey blasts Mark Zuckerberg in new painting, tells him f--- you in binary "IndyWatch Feed Tech"

Actor Jim Carrey delivered a profane message to Facebook CEO Mark Zuckerberg in his latest cartoon.Hey #Zuckerborg. We know who you are. And we saw what you did, Carrey tweeted, sharing his newest cartoon, which appears to be a self-portrait.Here...


Fusion breakthrough as Chinas artificial sun reaches 100 million degrees "IndyWatch Feed Tech"

The day of clean, limitless energy from nuclear fusion has taken another step closer thanks to Chinas Experimental Advanced Superconducting Tokamak (EAST). During a four-month experiment, the Chinese artificial sun reached a core plasma temperature of over 100 million degrees Celsius thats more than six times hotter than the interior of the Sun and a heating power of 10 MW, enabling the study of various aspects of practical nuclear fusion in the process.


With Help From Hydrogen, Spintronics Takes One Step Closer to Digital Logic "IndyWatch Feed Tech"

Hydrogen ions can turn magnetism on and off in a spintronic device, opening up digital logic applications

Spintronics has been in the lexicon of post-CMOS alternatives for so long, it can be easy to forget that there are still significant hurdles to clear in order for it to become the basis for new types of transistors.

In contrast to traditional transistors that operate by stopping and starting the flow of electrons to create binary logic, spintronics exploits the quantum property of spin in electrons. This property of electron spin serves as the basis for magnetism: If the spin of electrons points in one direction, then a material is magnetized.

To exploit this phenomenon in digital logic transistors, most designs have relied on electrons to accumulate at the interface between a metallic magnet and an insulator. Unfortunately, when a voltage is applied to flip the spin in such a design, theres very little effect.

Now, researchers at MIT have developed a remedy for this problem in a new approach that uses hydrogen ions for spintronics, as opposed to electron accumulation. The result is that the magnetism of the spintronic device can flip by 100 percent, as opposed to a mere 1 percent with the old design. This development marks a significant step toward using spintronics for digital logic applications.

Research in spintronic transistors has focused over the last few years on the electron accumulation design because it can work simply by applying a voltage.

In this kind of device, an electric field is generated at the interface between an electrical insulator and a magnetic layer. Because the magnetic material is only a few atoms thick, the application of an electric field (or the accumulation of charge) can change the electronic structure of the device near the interface of the magnetic field and the insulator.

This provides a way to use a voltage to control the magnetic properties. However, the problem with this approach is that it has a very small effect. The change in magnetic properties is typically only about 1 percent, making the mechanism fundamentally interesting but not practically useful.

Another approach is based on ions instead of electrons. In these designs, oxygen ions have been used to change the magnetic properties of a spintronic device. But because oxygen ions are relatively large, they deform the magnetic material and mak...

Cyborg Mushrooms "IndyWatch Feed Tech"

Of all the fictional cyborgs who turn against humanity to conquer the planet, this is as far from that possibility as you can get. These harmless mushrooms seem more interested in showing off their excellent fashion sense with a daring juxtaposition of hard grid lines with playful spirals. But the purpose of this bacteria-fungus-technology hybrid is to generate electricity. The mushrooms are there to play nurse to a layer of cyanobacteria, the green gel in the photo, while the straight black lines harvest electricity.

Cyanobacteria do not live very long under these kinds of conditions, so long-term use is out of the question, but by giving the cyanobacteria somewhere it can thrive, the usefulness grows. The interplay between bacterial and supportive organics could lead to advances in sensors and hydrogels as well. At some point, we may grow some of our hardware and a green thumb will be as useful as a degree in computer science.

Hydrogels could be the next medical revolution, and weve already made hydrogels into tattoos, used them as forms for artificial muscles, and hydrogels can be a part of soft tissue printing.

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming "IndyWatch Feed Tech"

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming

In 2016, I bought two voting machines online for less than $100 apiece. I didn't even have to search the dark web. I found them on eBay.

Surely, I thought, these machines would have strict guidelines for lifecycle control like other sensitive equipment, like medical devices. I was wrong. I was able to purchase a pair of direct-recording electronic voting machines and have them delivered to my home in just a few days. I did this again just a few months ago. Alarmingly, they are still available to buy online.

If getting voting machines delivered to my door was shockingly easy, getting inside them proved to be simpler still. The tamper-proof screws didn't work, all the computing equipment was still intact, and the hard drives had not been wiped. The information I found on the drives, including candidates, precincts, and the number of votes cast on the machine, were not encrypted. Worse, the "Property Of" government labels were still attached, meaning someone had sold government property filled with voter information and location data online, at a low cost, with no consequences. It would be the equivalent of buying a surplus police car with the logos still on it.

[...] I reverse-engineered the machines to understand how they could be manipulated. After removing the internal hard drive, I was able to access the file structure and operating system. Since the machines were not wiped after they were used in the 2012 presidential election, I got a great deal of insight into how the machines store the votes that were cast on them. Within hours, I was able to change the candidates' names to be that of anyone I wanted. When the machine printed out the official record for the votes that were cast, it showed that the candidate's name I invented had received the most votes on that particular machine.

This year, I bought two more machines to see if security had improved. To my dismay, I discovered that the newer model machinesthose that were used in the 2016 electionare running Windows CE and have USB ports, along with other components, that make them even easier to exploit than the older ones. Our voting machines, billed as "next generation," and still in use today, are worse than they were beforedispersed, disorganized, and susceptible to manipulation.



Theres a new way to hunt down exoplanets and its just made its first big discovery "IndyWatch Feed Tech"

A new planet, more than three times the mass of Earth, has been discovered orbiting our closest single star. The discovery, which took more than 20 years to make, marks a change in the way we look for new planets.

This is the first time a planet of its size, known as a super-Earth, with an orbital period of 200 days, has been found using a well-established method; by measuring the fractional changes in the speed of the star caused by the planet orbiting around it.


An Introduction to Udev: The Linux Subsystem for Managing Device Events "IndyWatch Feed Tech"

An Introduction to Udev: The Linux Subsystem for Managing Device Events


RADV Vulkan Driver To Enable Vega Primitive Binning By Default - Helps Performance "IndyWatch Feed Tech"

The RadeonSI OpenGL driver offered Vega primitive binning support the past year followed by the RADV Vulkan driver, but it hadn't been enabled by default. Those working on the RADV driver are now planning on unconditionally enabling this Vega performance optimization for up to a few percent performance boost...


Chinese TEMP.Periscope cyberespionage group was using TTPs associated with Russian APTs "IndyWatch Feed Tech"

Chinese TEMP.Periscope cyberespionage group targeted a UK-based engineering company using TTPs associated with Russia-linked APT groups.

Attribution of cyber attacks is always a hard task, in many cases attackers use false flags to masquerade their identities.

Chinese hackers have targeted a UK-based engineering company using techniques and artifacts attributed to the Russia-linked APT groups Dragonfly and APT28, according to security researchers.

Threat intelligence experts from Recorded Future discovered that Chinese threat actor TEMP.Periscope was using TTPs associated with Russian APT groups in the attempt to make hard the attribution. The same campaign that targeted the U.K.-based engineering company also hit a freelance journalist based in Cambodia, attackers used a command and control infrastructure that was used in the past by the TEMP.Periscope APT group.

Employees of a U.K.-based engineering company were among the targeted victims of a spearphishing campaign in early July 2018. The campaign also targeted an email address possibly belonging to a freelance journalist based in Cambodia who covers Cambodian politics, human rights, and Chinese development. reads the analysis published by Recorded Future.

We believe both attacks used the same infrastructure as a reported campaign by Chinese threat actor TEMP.Periscope (also known as Leviathan), which targeted Cambodian entities in the run-up to their July 2018 elections. Crucially, TEMP.Periscopes interest in the U.K. engineering company they targeted dates back to attempted intrusions in May 2017.

The attackers used the domain scsnewstoday[.]com as C2, the same that was used in a recent TEMP.Periscope campaign targeting the Cambodian government.

The spear-phishing messages were sent by using the popular Chinese email client, Foxmail.

It is interesting to note that attackers employed a unique technique used in the past by Dragonfly APT group in attacks aimed at critical infrastructure. The attackers used a file:// path in the in the spearphish calling out to a malicious C2 to steal SMB credentials.



HQ2 deal brings new scrutiny on Amazon "IndyWatch Feed Tech"

The $2 billion in taxpayer subsidies that Amazon is reaping from its new offices in New York and Virginia is bringing new scrutiny on the tech giant from public officials.Lawmakers and officials whose towns won out in the search are welcoming the...


Machine Learning for Operations "IndyWatch Feed Tech"

Managing infrastructure is a complex problem with a massive amount of signals and many actions that can be taken in response; thats the classic definition of a situation where machine learning can help. 


The Newest Mesa NIR/SPIR-V Code For Handling OpenCL Kernels "IndyWatch Feed Tech"

It's now been nearly one year since longtime Nouveau contributor Karol Herbst joined Red Hat where one of his big projects has been working on OpenCL support for this open-source NVIDIA driver by bringing up NIR/SPIR-V support and making the necessary improvements for allowing OpenCL kernels to be represented in that IR commonly used by the Mesa drivers. The work still isn't yet in Mesa Git, but Karol this week sent out his newest patches...


PHP Lands Preload Feature, Boosting Performance In Some Cases 30~50% "IndyWatch Feed Tech"

PHP developers unanimously approved and already merged support for the new "preloading" concept for this web server language. PHP preloading basically allows loading PHP code that persists as long as the web server is running and that code will always be ready for each subsequent web request, which in some cases will dramatically speed-up the PHP performance on web servers...


Raspberry $25 Pi 3 Model A+ Released Complete specs and pricing "IndyWatch Feed Tech"

The Raspberry Pi is a small single-board computer (SBC) developed by the Raspberry Pi Foundation. It supposes to promote the teaching of computer science, programming for kids and in developing countries. The new Raspberry Pi 3 Model A+ comes with 1.4GHz clock speed, 5GHz wireless networking and improved thermals of Raspberry Pi 3B+ in a smaller form factor. It costs $25.

The post Raspberry $25 Pi 3 Model A+ Released Complete specs and pricing appeared first on nixCraft.


Judge Orders Amazon to Hand Over Echo Data "IndyWatch Feed Tech"

A judge has ordered Amazon to hand over Echo records to assist with a murder investigation. When Christine Sullivan was found dead in her backyard after being stabbed multiple times, New Hampshire requested for data held by Amazon to be released to help solve the crime.

An Amazon spokesperson said earlier it would not release the recordings "without a valid and binding legal demand properly served on us."

The judge agrees.

So he issued just such a legal demand.

[...] "Amazon does not seek to obstruct any lawful investigation but rather seeks to protect the privacy rights of its customers when the government is seeking their data from Amazon, especially when that data may include expressive content protected by the First Amendment," company lawyers wrote at the time.

It is yet to respond to the New Hampshire Court order.

Original Submission

Read more of this story at SoylentNews.


Uber Joins the Linux Foundation as a Gold Member "IndyWatch Feed Tech"

Uber has been influential in the open source community for years, and were very excited to welcome them as a Gold member at the Linux Foundation, said Jim Zemlin, Executive Director of the Linux Foundation. Uber truly understands the power of open source and community collaboration, and I am honored to witness that first hand as a part of Uber Open Summit 2018.


Online shopping fraud to surge during Black Friday and Cyber Monday "IndyWatch Feed Tech"

New benchmark data from ACI Worldwide revealed a projected 14 percent increase in fraud attempts during the upcoming 2018 peak holiday season. Based on hundreds of millions of merchant transactions, the data shows that fraud attempts are going to be at their highest across the Black Friday and Cyber Monday weekend. Principal findings from the data include: Fraud attempts expected to increase 14% during 2018 peak holiday season Cross Channel fraud continues to grow: In More

The post Online shopping fraud to surge during Black Friday and Cyber Monday appeared first on Help Net Security.


A Question of Debt: Antnio Campinos, Lexology, Law Gazette, and Sam Gyimah "IndyWatch Feed Tech"

Indebted to sponsors and the likes of them (to sell lawsuits and patent wars)

Colin Powell

Summary: Ineptitude in the media which dominates if not monopolises UPC coverage means that laws detrimental to everyone but patent lawyers are nowadays being pushed even by ministers (not just those whose clandestine vote is used/bought to steal democracy overnight)

LAST NIGHT we finally saw the EPO Patent Information Conference (EPOPIC) summary (warning: link), focusing as usual on Antnio Campinos (that old Battistelli tradition of promoting his own brand and sticking his name in every page in the Web site). Prior to that we had written about the third day (yesterday), second day and the first day of the event.

courts would reject these patents. Unless the EPO can replace the courts themselves. They hope to accomplish this with the UPC.The events summary is a tad revealing. It starts by obsessing about the place/venue and the Belgian officials there. Is the Office and/or the President paying back for votes/support (the example of Belgian favours was mentioned yesterday)? It would be one heck of a way for the European Patent Office (EPO) to return favours to Brussels (lots of money flowing this way, with politicians in attendance). Battistelli was...


The Two Fastest Supercomputers on Earth Belong to the US "IndyWatch Feed Tech"

The U.S. is now home to the two fastest supercomputers in the world, according to a newly released ranking of the top 500 systems.


Senior German officials wants exclude Chinese firms from building 5G infrastructure "IndyWatch Feed Tech"

Senior German officials are making pressure on the government to exclude Chinese firms from building the countrys 5G infrastructure.

Many countries are going to build 5G infrastructure, but the approach of the government is completely different. Italian politicians seem to completely ignore the importance of 5G infrastructure for the growth of the country and the potential effects on national security, while senior German officials are planning to exclude Chinese firms such as Huawei from the tender because worried of potential compromise of national security.

Germany is not the first country to ban Chinese firms from the 5G auction, Australia and the US already announced the same decision.

There is serious concern. If it were up to me we would do what the Australians are doing, one senior German official involved in the internal 5G debate in Berlin told Reuters.

Officials in the German foreign and interior ministries were informed by Australian and American peers of the risks of using Chinese suppliers like Huawei in 5G infrastructure.

A heated debate is growing in the country and experts fear that this could cause a delay in the implementation of the infrastructure that is planned for 2019.

5G infrastructure Germany plans ban China

Officials fear possible interference of the Chinese intelligence that is also allowed under Chinas National Intelligence Law, approved in 2017, which states that Chinese organisations and citizens shall, in accordance with the law, support, cooperate with, and collaborate in national intelligence work.

Experts believe that companies like Huawei could support the Chinese government in cyber espionage activities or that Chinese intelligence may be able to compromise Huaweis equipment.

Cyber security has always been our top priority and we have a proven track record of providing secure products and solutions for our customers in Germany and around the world, A Huawei spokesman told Reuters.



New Warsaw Declaration Promises International Anti-Piracy Cooperation "IndyWatch Feed Tech"

Last month, many key players in the entertainment industries took part in the International Content Protection Summit in Warsaw, Poland.

The summit was organized by the Sygna Association, supported by the EUs Intellectual Property Office (EUIPO), with an agenda featuring the latest threats and developments in anti-piracy enforcement.

While these type of gatherings are not new, several of the participants used the opportunity to strengthen their ties. International cooperation, they believe, is a key component for successful anti-piracy enforcement efforts.

To stress their commitment to this goal, 34 participants signed a new memorandum of cooperation titled the Warsaw Declaration.

The signees, including BBC Studios, BREIN, Discovery, FACT, HBO Europe, LaLiga, MPA, NBCUniversal, Sky Deutschland, and the Spanish National Police, state that they acknowledge and understand the need for regular international involvement of major stakeholders.

According to the summits organizers, the Warsaw Declaration can help to target the major piracy threats more effectively. This includes the increasingly global reach of cybercrime, new distribution methods, and the use of cryptocurrencies as payment methods.

Piracy is currently a highly profitable undertaking with a complicated network of relations. There is proof of its connections to other types of crime. said Teresa Wierzbowska, President the Sygna Associations board.

The alarming figures concerning the scale of theft and illegal trade of audiovisual content are a motivating factor to take action, she adds.

The declaration itself doesnt include a concrete plan of action. Apart from acknowledging and understanding the need for more collaboration, theres not much more to it.

What it does say is that the signees hope to increase awareness of the negative impact of piracy on the global economy among decision-makers, opinion leaders, media and society, and persuade them to counteract this.

Speaking with TorrentFreak, Sygna Associations Anna Soboda notes that the declaration is just the first step. The next stage is to turn it into action.

For us, it was very important to let people from western and eastern Europe meet each other in one place to exchange experiences and co...


Be open about drug failures to speed up research "IndyWatch Feed Tech"

Practices to enable more-thorough, earlier analyses of failed developments should be adapted to treatments for other challenging diseases, and should be part of regulators responsibilities. This will ensure that clinical research evaluates treatments faster and with more certainty.

Access to evidence from disappointing drug-development programmes advances the whole scientific process, explain Enrica Alteri and Lorenzo Guizzaro.


The Smaller, More Powerful Raspberry Pi 3 Model A+ "IndyWatch Feed Tech"

The Raspberry Pi Model A is the weird middle child of the Raspberry Pi lineup, or maybe its the Goldilocks choice. Its not as powerful and doesnt have the USB ports or Ethernet jack found in the latest revision of the family, the Raspberry Pi Model 3 B+, and its not as small or as cheap as the Raspberry Pi Zero W. If youre running a Pi as just something that takes in power and spits out data on the GPIO pins, the Model A might be all you need.

The full specs include:

  • Broadcom BCM2837B0 Cortex A-53 running at 1.4GHz
  • 512 MB of LPDDR2 SRAM
  • 2.4 GHz and 5 GHz 802.11 b/g/n/ac wireless LAN, Bluetooth 4.2/BLE
  • Full size HDMI
  • MIPI DSI display port / CSI camera port
  • Stereo Output and composite video port


Qanon Placeholder Whitiker "IndyWatch Feed Tech"

    What we have here is a long working list of ongoing investigations that naturally trigger sealed indictments.  The tactical operation we have juust witnessed is having a placeholder stepping in as acting AG who is completely familiar with these files and has the authority to proceed without political interference.  I do believe this was the plan from the beginnuing and that Sessions is very much part of it. In this manner we have a window in which those indictments can be unsealed and those reports all released and/or declassified.  All roadblocks have been side stepped and the DEEP STATE knows this. At the same time  we have secured both the Senate and the Supreme Court and now have a window in which it is also possible to position a large number of judges as well.
This is the worst possible outcome for those who have gamed the Justice system.  It is also telling that Trump does not know this man.  He was chosen for his ability and adherence to the rule of law.  A lot of folks have lost all political cover and will not be sleeping well. .
 Q !!mG7VJxZNCI No.464
Nov 12 2018 12:36:45 (EST)

FAKE NEWS > [optics] 'FALSE' majority > BLUE WAVE
BLUE WAVE [optics] > No Voter Ir...


Oracle's JEDI Mind-Meld Doesn't Work on Uncle Sam's Auditors "IndyWatch Feed Tech"

Oracle's JEDI mind-meld doesn't work on Uncle Sam's auditors; These are not the govt droids you are looking for:

Oracle's bid to halt the Pentagon's JEDI $10bn winner-takes-all cloud IT contract has been turned down.

Uncle Sam's Government Accountability Office (GAO) issued a statement on Wednesday explaining that it would not be taking up Oracle's appeal of the US Department of Defense's stipulation that the entire JEDI technology platform be limited to a single supplier.

Considered one of the most lucrative and sought-after government contracts in recent memory, JEDI (Joint Enterprise Defense Infrastructure) will award the winning contractor a $10bn decade-long contract to overhaul the DoD's entire IT infrastructure.

Oracle filed complaints, but on Wednesday, the GAO concluded:

"GAO's decision concludes that the Defense Department's decision to pursue a single-award approach to obtain these cloud services is consistent with applicable statutes (and regulations) because the agency reasonably determined that a single-award approach is in the government's best interests for various reasons, including national security concerns, as the statute allows," the office said.

"GAO's decision also concludes that the Defense Department provided reasonable support for all of the solicitation provisions that Oracle contended exceeded the agency's needs. Finally, GAO's decision concludes that the allegations regarding conflicts of interest do not provide a basis for sustaining Oracle's protest."

[...] The decision does not mean the JEDI process is in the clear. IBM has filed a similar protest objecting to the contract's bidding and procurement process. The GAO says that it will be handling those filings separately, with a decision on the IBM appeal due to be delivered by January 18

Original Submission

Read more of th...


AST-2018-010: Remote crash vulnerability DNS SRV and NAPTR lookups "IndyWatch Feed Tech"

Posted by Asterisk Security Team on Nov 15

Asterisk Project Security Advisory - AST-2018-010

Product Asterisk
Summary Remote crash vulnerability DNS SRV and NAPTR lookups
Nature of Advisory Denial Of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate...


AST-2018-010: "IndyWatch Feed Tech"

Posted by Asterisk Security Team on Nov 15

Asterisk Project Security Advisory - AST-2018-010

Product Asterisk
Remote crash vulnerability DNS SRV and NAPTR lookups
Nature of Advisory Denial Of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate...



Yes it should be remembered.  It was a difficult fight not improved by still naive tactics.  That they won is more a measure of the reality that in early august 1918, a million man British Army was now rolling up the Western front spearheaded by the storm trooper tactics of the four division strong well equipped and trained Canadian Corps.  
German forces were seriously stretched leading into this Strategic counter attack and that made anything but defensive actions against the Marines unlikely.   However. it certainly served to bolster low French Morale which needed this badly.  It was important for that as well
The losses were far too high for the reasons explained in the item.  The cost in hard to replace highly trained soldiers cannot be ever easily replaced.  The British army did exactly the same thing in 1914 and essentially got themselves almost wiped out.  It took a long time to bring themselves back with the real millions they needed.
The USA was fortunate that they ultimately were chasing a retreating enemy.  Another year would have demanded a million ill trained soldiers at least and that would have been nasty.  In WWII, the western allies got to do the same thing after D day and avoided facing an intact million man army of veterans..



JUNE 4, 2018

Every U.S. marine kno...


Exclusive: Grave doubts over LIGOs discovery of gravitational waves "IndyWatch Feed Tech"

LIGO's detectors

First of,  General Relativity is completely accepted.  However, Black Holes come out of the derivative equations that had to make major simplifications for any mathematics to work and I have real knowledge of those equations.  After the Relativists largely left the scene, the Black hole has been used as a magic wand.
My own work leads to a deep understanding of event horizons and what happens there.   Matter as we know it is unraveled into two dimensional photonic energy which then exits the horizon at light speed carrying off huge amounts of information.  This allows reforming to take place and many particles are created far from the event horizon and a long way outside the gravity well.  It is my contention that such an object should look like a Quaser or a Blazer.  It also explains how we can even see all this as all this newly reformed matter radiates over large distances producing size without a lot of mass.
This also looks a lot like the calculations ran in the repetitive data problem of computation.  What i mean there is the limitations of computers create a rounding bias that is unavoidable.  This can bite you often with scientific computing and assuming that the team avoided that problem is naive.  It happens to be my first suspect when a pile of calculations throws up something.  And yes, your signal should be clear enough in the raw data.
 You wonder why i do not trust Global Warming Models?  No better place for this problem and it does not attract the best and brightest.  Newton does not work there.  Again too many grad students running amok.

Exclusive: Grave doubts over LIGOs discovery of gravitational waves

The news we...


We Are All Bewildered Machines - Issue 66: Clockwork "IndyWatch Feed Tech"

When did you realize you were a machine? A fancy machine, for sure. But one whose parts and operations can be described like the components of a computer. I remember a day in 2012 when this thought pierced me to the bone. I was in the lab of John Donoghue at Brown University. Donoghue is a professor of neuroscience and a pioneer in the development of brain-computer interfaces. With easygoing authority, Donoghue was detailing for me the ways he and his colleagues taught Cathy Hutchinson, a 58-year-old woman who had lost control of her limbs in a stroke, to control a robotic arm with her thoughts and sip coffee from a bottle. It was a matter of basic math and biology, Donoghue said, with, yes, some sophisticated technology.

Surgeons implanted a microelectrode array with 100 sensors in Hutchinsons motor cortex, the brains control center for movement. Donoghue then had Hutchinson watch a cursor moving across a computer screen and imagine she was moving the cursor with a mouse. As she pictured moving the cursor left and right, forward and backward, the microelectrodes picked up electrical spikes in her neurons. Donoghues team recorded the pattern of spikes associated with each direction,
Read More

The Problem with Scientific Credit - Issue 66: Clockwork "IndyWatch Feed Tech"

I first learned about Douglas Prasher three years ago, when an algorithm wed just developed made an unpredictable prediction: He should have been a recipient of the 2008 Nobel Prize.

Instead, the award had been given to three other scientists. Even more surprising was our inability to find Prasher anywhere. He wasnt on the faculty at any university. We couldnt locate him at an industrial research lab. In fact, as we started digging for him, we realized that he hadnt written a research paper in nearly a decade. It was truly puzzling. This fellow, who, according to our algorithm, deserved a Nobel Prize, had seemingly disappeared off the face of the Earth.

Douglas Prasher

In 2013, Hua-Wei Shen, an accomplished computer scientist from Beijing, joined my lab. Though new to the team, he was intimately familiar with our work. In addition to running a network science lab at his own university, he had also translated my previous book, Bursts, into Chinese. He eagerly joined our small but growing success group. Each time we begin a new project, we start with a journal cluba reading group that surveys the current scientific literature to understand what is being done in a particular area.
Read More

The Colors We Eat - Issue 66: Clockwork "IndyWatch Feed Tech"

When it comes to food, color is money. Food companies scan their products on the line with custom colorimeters to ensure mathematically consistent hues. Fruits and vegetables are shipped in chemically modified atmospheres, because better stem and fruit color gives better prices, according to the website of the delivery company TransFresh. Color is judged by a legion of standards all along the food chain. The hue of orange juice, for example, is carefully calibrated by the United States Department of Agricultures Orange Juice Color Standards (Grade-A orange juice from concentrate has to be not as good as OJ 5 but much better than OJ 6.) There are few worse fates, in the eyes of federal regulators, than for a berry to be undercolored.

Oranges and berries are just the beginning. The color matching business Munsell sells color standards for French fries, tomatoes, pumpkins, olives, molasses, honey, and cherries. Art Schmehling, a manager with Munsell, tells me a product like the maraschino cherry actually has two color standards: One for the cherry after it is bleached to a pale yellow, which is done so the cherry can be properly dyed its trademark iridescent red; and another for that red.

Read More

Sous Vide "IndyWatch Feed Tech"

We all need to know this.  This is mostly about meat which is fine, particularly as it prevents heavy water loss which is a problem for most cooking methods.

However, what about vegetables?  I ask this because I grew up with boiled vegetables and leaped gladly to steamed vegetables and some form of frying to deliver flavor.  Welcome to chinese Wok cookery.  It looks like that it may be possible to prepare a large batch of vegetables in this manner to breakdown the fibers without losing a lot of water.  Again it is then a simple transition to the fry pan to caramelize up some flavor.

I suspect that this is how restaurants delver superior results themselves.  Now we know.  By the by,  the slow cooker could deliver this result set at 130 degrees F.  I do know that a perfect prime rib is at 125 F though you would still want to sear it before or after. ..

Give your meat a break today

No matter how you chop, slice, or butcher it, meat can be kind of gross. Blood, flesh, and viscera can kill your appetite, and thats before you get to the uncertain process of searing it on a gri...


Pwn2Own Tokyo 2018 iPhone X exploits paid over $100,000 "IndyWatch Feed Tech"

The Zero Day Initiatives Pwn2Own Tokyo 2018 is a success, participants earned over $300,000 for disclosing flaws affecting iPhone X, Xiaomi Mi 6 and Samsung Galaxy S9 smartphones.

During the first day of the Pwn2Own Tokyo 2018 contest, participants hacked Apple iPhone X, Samsung Galaxy S9 and Xiaomi Mi 6 devices earning more than $225,000.

The novelty for this Pwn2Own edition was the creation of a specific session for IoT devices.

Pwn2Own Tokyo 2018

On the second day, the organizers only paid $100,000 for one iPhone and two Xiaomi hacks.

The day began with the success of the Team Fluoroacetate composed of Amat Cama and Richard Zhu, who hacked an iPhone X exploiting a Just-In-Time (JIT) bug and an out-of-bounds access flaw.

The team received $50,000 to have exfiltrate data from the device, they successfully stole a previously deleted photo from the targeted device.

Team Fluoroacetate also failed to demonstrate a baseband exploit targeting the iPhone X within the allotted time, but the experts successfully exploited an integer overflow in the JavaScript engine of the Xiaomi web browser to exfiltrate a picture from the phone.

They earned $25,000 USD and 6 Master of Pwn points.

F-Secures MWR Labs (Georgi Geshev, Fabi Beterke, and Rob Miller) also failed in hacking the iPhone X in the browser category, they were not able to use their exploit chain within the allotted time.

LaterMWR Labs hacked the Xiaomi Mi6 in the browser category using a download bug along with a silent app installation to load their custom app and exfiltrate pictures.

They earned another $25,000 USD and 6 more Master of Pwn poi...


Microsoft goes Gold for 2018! "IndyWatch Feed Tech"

Kenneth R. Westerback (krw@) writes to inform us:

Microsoft goes Gold for 2018!

The OpenBSD Foundation is happy to announce that Microsoft has increased its support level from Silver to Gold for 2018.

This is the fourth consecutive year that Microsoft has made a contribution to the OpenBSD Foundation and we are grateful for their continuing support.

Thank you, Ken for sharing the good news about the OpenBSD Foundation with the community.


IoT related security missteps cost enterprises millions "IndyWatch Feed Tech"

Enterprises have begun sustaining significant monetary losses stemming from the lack of good practices as they move forward with incorporating the IoT into their business models, according to a new study from DigiCert. Among companies surveyed that are struggling the most with IoT security, 25 percent reported IoT security-related losses of at least $34 million in the last two years. These findings come amid a ramping up of IoT focus within the typical organization. Eighty-three More

The post IoT related security missteps cost enterprises millions appeared first on Help Net Security.


Container strategies dont take security seriously enough "IndyWatch Feed Tech"

Most organizations do not feel prepared to adequately secure cloud-native applications, despite the surging adoption of containers and Kubernetes, according to StackRox. Notable findings: More than a third of organizations with concerns about their container strategy worry that their strategies dont adequately address container security An additional 15 percent believe their strategies dont take seriously enough the threat to containers and Kubernetes deployments More than one-third of respondents havent started or are just creating their More

The post Container strategies dont take security seriously enough appeared first on Help Net Security.


Major Ocean Warming Study Conclusions Walked Back "IndyWatch Feed Tech"

The San Diego Union-Tribune is one of a few sources reporting:

Researchers with UC San Diego's Scripps Institution of Oceanography and Princeton University recently walked back scientific findings published last month that showed oceans have been heating up dramatically faster than previously thought as a result of climate change.

The original paper indicated that oceans were warming 60 percent more than outlined by the IPCC and was widely published and remarked. The significantly increased warming conclusion was quickly challenged by an English mathematician looking at the methodologies used.
The authors promptly confirmed the issue thanking him for pointing it out, and have redone their calculations and submitted corrections to the journal Nature. Per one of the authors after reviewing and correcting:

"Our error margins are too big now to really weigh in on the precise amount of warming that's going on in the ocean," Keeling said. "We really muffed the error margins."

The article continues:

While papers are peer reviewed before they're published, new findings must always be reproduced before gaining widespread acceptance throughout the scientific community, said Gerald Meehl, a climate scientist at the National Center for Atmospheric Research in Boulder, Colorado.

"This is how the process works," he said. "Every paper that comes out is not bulletproof or infallible. If it doesn't stand up under scrutiny, you review the findings."

The same author indicates "the ocean is still likely warmer than the estimate used by the IPCC"

Original Submission

Read more of this story at SoylentNews.


Whats keeping Europes top infosec pros awake at night? "IndyWatch Feed Tech"

As the world adapts to GDPR and puts more attention on personal privacy and security, Europes top information security professionals still have doubts about the industrys ability to protect critical infrastructure, corporate networks, and personal information. Black Hat Europes new research report entitled, Europes Cybersecurity Challenges, details the thoughts that are keeping Europes top information security professionals awake at night. The report includes new insights directly from more than 130 survey respondents and spans topics More

The post Whats keeping Europes top infosec pros awake at night? appeared first on Help Net Security.


60% of firms believe a major security event will hit in the next few years "IndyWatch Feed Tech"

Only 30 percent of 1,250 senior executives, management and security practitioners in the U.S., U.K. and Canada are confident their business will avoid a major security event in the coming two years and 60 percent believe an attack will hit in the next few years, according to eSentire. In terms of cyberattack preparedness in global organizations, the research also uncovered gaps between the C-suite, board and technical leaders. Among CEO and board members surveyed, 77 More

The post 60% of firms believe a major security event will hit in the next few years appeared first on Help Net Security.


Employees arent taking the proper steps to keep information safe while traveling "IndyWatch Feed Tech"

Employees arent taking the proper steps to keep their organizations information safe while traveling. ObserveIT surveyed more than 1,000 U.S. employees ages 18 65+ who have traveled with corporate devices in the past year and found that the majority are putting connectivity and efficiency above security; using public Wi-Fi and unauthorized devices to access work email and/or files on the go. While they may not have malicious intent, the negligent actions of employees caused More

The post Employees arent taking the proper steps to keep information safe while traveling appeared first on Help Net Security.


Twenty-First Century Warfare: Secret and Silent Frequency Wars "IndyWatch Feed Tech"

Its imperative that Humanity understands the reality of warfare in these times when advanced and secret technologies are used against us on a daily basis.

From WiFi and cell phone frequencies to televisions and microwave ovens on up to the most exotic sonic weaponsits all disruptive and even lethal to the Human body and mind.

Because these weapons are silent and invisible, the war-loving aspects of society have been able to experiment with these methods for decades but the time for secrecy and these covert attacks on the life on our planet has come to an end.

What harm does it do? We can see the carnage if we will just look. Whales and dolphins washing up by the hundreds on beaches, bleeding from their ears, flocks of birds falling from the sky with no outward trauma, multiple forms of cancer rampant its endless.


Re-enacting TRON on the Apple IIgs "IndyWatch Feed Tech"

In the film, the characters find an escape from the light cycle game by forcing another player to crash into the walls of the play area. The resulting explosion left a hole, allowing the players to exit the light cycle game and explore the rest of the computer. Amusingly, due to a coding oversight, [Daniel] had created exactly this same flaw in his own code.

[Daniel]s game differed from the original in that players were provided with missiles to destroy enemy trails. However, these missiles did not discriminate, and due to the simplicity of the code, were able to destroy the boundary on the play area. This was discovered when the computer player tried to escape an otherwise impossible situation. Upon blowing a hole in the arena wall, the computer player proceeded to drive off the screen into invalid memory. This led to the computer crashing in short order, due to the unprotected memory space of the Apple II platform.

Its a case of code imitating art and completely by accident. The game managed to replicate the light cycle escape from the film entirely due to the unexpected behaviour of the simple missile code. [Daniel] steps through the code and how the bug happened, and covers the underlying principle behind the resulting crashes. Its an entertaining tale of the risks of coding at low level; something we dont always run into with todays modern interpreted languages.

Thirsty for more tales of hacking the Apple II? How about going back in time to fix a 37 year old bug?


Bio-tech firm develops 3D printed replacement cornea for human eyes "IndyWatch Feed Tech"

After successfully transplanting the first 3D-printed cornea in an animal, North Carolina company Precise Bio has recently announced the launch of a dedicated business for creating marketable, 3D-printed products for human eyes. Founded by scientists from the Wake Forest Institute of Regenerative Medicine, this company is developing bio-fabrication printers that can restore cells, tissues, and organs. Their proprietary technology, a 4D bio-printing platform, is said to resolve existing limitations presented by other bioprinters to enable more complex tissues to be engineered for transplants and treatments. By focusing on developing marketable products for the eye, the company aims to achieve rapid advancement in its field and move to overhaul the whole organ transplant system.

When a cornea is damaged by disease or injury, a replacement is often needed to restore vision. Transplant surgery using donated corneas is an available solution, however, it relies on a deceased donor. While the waiting list in the United States is nearly non-existent, other countries require longer wait times, some over a year, before one is available. The Eye Bank Association of America estimates that around 10 million people suffer from corneal blindness that could potentially be restored via transplant surgery. An artificially manufactured cornea would overcome supply limitations while also contributing to the knowledge base to develop more complex organs such as hearts and livers.


Unlike us, Elon Musk is using old tech: Russia shows off reusable NUKE ENGINE for Mars mission "IndyWatch Feed Tech"

A leading Russian space research center has posted a video of its nuclear-powered rocket, that will be able to land on Mars after seven months, and can be re-launched into space just 48 hours after landing.

A mission to Mars is possible in the very near future, but thats not an aim in itself. Our engines can be the foundation for a whole range of space missions that currently seem like science fiction, Vladimir Koshlakov, who heads Moscows Keldysh Research Center told Rossiyskaya Gazeta.

The institute, which is famous for developing the Katyusha rocket launched during World War II, has been working on what it says is a unique propulsion system since 2009. From past descriptions, it comprises a gas-cooled fission reactor that powers a generator, which in turn feeds a plasma thruster.


NEW 'Off The Hook' ONLINE "IndyWatch Feed Tech"

NEW 'Off The Hook' ONLINE

Posted 15 Nov, 2018 5:16:56 UTC

The new edition of Off The Hook from 14/11/2018 has been archived and is now available online.


Russia: We did not Hack the US Democrats. But *if* we Did, We're Immune From Prosecution "IndyWatch Feed Tech"

Russia: We did not hack the US Democrats. But if we did, we're immune from prosecution:

The Russian government has denied having anything to do with hacking the US Democratic party in 2016, although in a court filing this week stressed that even if it did break into the DNC's servers, it is immune from prosecution.

And furthermore the Kremlin claimed America is "one of the most prolific practitioners of cyberattacks and cyber-intrusions on the planet." So, nerr!

"The [Foreign Sovereign Immunities Act] FSIA provides that foreign sovereign states enjoy absolute jurisdictional immunity from suit unless a plaintiff can demonstrate that one of the FSIA's enumerated 'exceptions' applies," argued [PDF] the Russian government this week in a New York court in response to a lawsuit from the DNC.

The DNC claims that it was subject to a "military attack" by Kremlin intelligence, causing Russia to argue back that any act of its military is a sovereign action and so therefore it can't be sued for it.

It's an amazing defense though one the DNC foresaw. It argued in its initial court paperwork [PDF] that "Russia is not entitled to sovereign immunity because the DNC's claims arise out of Russia's trespass onto the DNC's private servers - a tort allegedly committed in the United States.

"In addition, Russia committed the trespass in order to steal trade secrets and commit economic espionage, two forms of commercial activity undertaken in and directly affecting the United States."

Of course this being 2018 and Russia, the Putin administration can't leave it at that, and takes the opportunity to troll the US government by pointing out that the immunity provision is also heavily relied upon by Uncle Sam and its officials abroad.

"The United States benefits significantly from the sovereign immunity that it enjoys (and US officials enjoy) in foreign courts around the world with respect to the United States' frequency acts of cyber intrusion and political interference," Russia's response reads. "As current and former US officials have acknowledged on many occasion, the United States - acting primarily through the National Security Agency (NSA) with the US Departm...


U.S. Has Spent Nearly $6 Trillion on War Since 9/11 "IndyWatch Feed Tech"

WAR is a racket. It always has been. It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives. A racket is best described, I believe, as []


Immunity connects gut bacteria and aging "IndyWatch Feed Tech"

EPFL scientists have discovered how a dysfunction in the immune system can cause an overload of a gut bacterium. The bacterium produces excess lactic acid, which in turn triggers the production of reactive oxygen species that cause damage to cells and many age-related pathologies.


Pioneering sociologist foresaw our current chaos 100 years ago "IndyWatch Feed Tech"

Durkheims profound insight was that despite the negative risks associated with the sacred, humans cannot live without it. He asserted that a lack of social solidarity within society would not only lead individuals to experience anomie and alienation, but might also encourage them to engage in extremist politics. Why? Because extremist politics would satiate their desperate desire to belong.

Globally, we are currently experiencing tremendous social and political turbulence. At the institutional level, liberal democracy faces the threat of rising authoritarianism and far-right extremism. At the local level, we seem to be living in an ever-increasing age of anxiety, engendered by precarious economic conditions and the gradual erosion of shared social norms. How might we navigate these difficult and disorienting times?

Emile Durkheim, one of the pioneers of the discipline of sociology, died 101 years ago this month. Although few outside of social science departments know his name, his intellectual legacy has been integral to shaping modern thought about society. His work may provide us with some assistance in diagnosing the perennial problems associated with modernity.

Whenever commentators argue that a social problem is structural in nature, they are invoking Durkheims ideas. It was Durkheim who introduced the idea that society is composed not simply of a collection of individuals, but also social and cultural structures that impose themselves upon, and even shape, individual action and thought. In his book The Rules of the Sociological Method he called these social facts.


5 Technologies Bringing Healthcare Systems into the Future "IndyWatch Feed Tech"

If you think youve got a bad case of the travel bug, get this: Dr. John Halamka travels 400,000 miles a year. Thats equivalent to fully circling the globe 16 times.

Halamka is chief information officer at Harvards Beth Israel Deaconess Medical Center, a professor at Harvard Medical School, and a practicing emergency physician. In a talk at Singularity Universitys Exponential Medicine last week, Halamka shared what he sees as the biggest healthcare problems the world is facing, and the most promising technological solutions from a systems perspective.

In traveling 400,000 miles you get to see lots of different cultures and lots of different people, he said. And the problems are really the same all over the world. Maybe the cultural context is different or the infrastructure is different, but the problems are very similar.


There is a weird new state of matter that cant be stirred or pushed "IndyWatch Feed Tech"

By Leah Crane

Theres a new state of matter and its weird. Its made from light and is somewhere between a solid and a superfluid. It cant be stirred, rotated, or even pushed.

If you have some water in a pipe and you start pushing it, it will flow a little faster, says Marzena Szymaska at University College London. Whereas this fluid is so rigid that even pushing it will not change its velocity.


Drones high-tech bike theft attempt caught on camera "IndyWatch Feed Tech"

Nov. 12 (UPI) A group of shocked cyclists captured video of the moment a drone operator nearly pulled off a high-tech bike theft.

The video, recorded in Hustopece, Moravia, Czech Republic, shows the cyclists climbing a local landmark known as Lookout Tower and taking video of a drone flying nearby.

The cyclists start scrambling down the tower when the drone lowers down to the ground and picks up one of the bicycles.


New cholesterol guidelines for heart health: What you need to know "IndyWatch Feed Tech"

Heart disease is the leading cause of death in the U.S.

The American Heart Association and the American College of Cardiology, who have medical experts from around the nation on the writing committee, have released updated guidelines on managing cholesterol to minimize the risk of heart attack, stroke, and death. The new guidelines advocate for more aggressive treatment with statin therapy and getting LDL cholesterol counts, commonly referred to as bad cholesterol to your target level - in general, less than 100mg/dL; for those with risk factors, less than 70mg/dL.


Terrifying footage shows Southern California fires nipping at a highway "IndyWatch Feed Tech"

Fires creeping in on daily life are becoming the new terrifying norm.


Bosch Boosts IOTA With New Device Connectivity For IoT Data Collection "IndyWatch Feed Tech"

Multinational engineering and electronics giant Bosch recently highlighted a new device connectivity method which will work with the Iota marketplace, among other things, for real-time IoT (Internet of Things) data collection and sales.

Data Collection for the IOTA Marketplace

In a recent blog post the firm opened with a quote from 1999 from Nobel Prize winner Milton Friedman extolling the virtues of anonymously transferring funds on the internet, way before cryptocurrencies were even conceived. It continued to elaborate on the Iota ecosystem, its advantages over Bitcoin, and why it has been chosen as a partner.


Hoverbikes are finally here, but dont expect to fly cheap "IndyWatch Feed Tech"

California firms long-anticipated flying motorcycle will set you back $150,000.

This drone-like flying motorcycle can be yours for $150,000. Hoversurf Official via YouTube.


Has a Piece of the Worlds Oldest Computer Been Found? "IndyWatch Feed Tech"

A lost piece of the worlds oldest analog computer (the Antikythera mechanism an ancient Greek device designed to calculate astronomical position) may have been discovered.


Google went down after traffic was routed through China and Russia "IndyWatch Feed Tech"

Googles services went down for an hour yesterday after its IP addresses were routed way from normal paths to Nigeria, China and Russia. Google told Ars Technica it doubted the leak was malicious, despite the fact that government-owned China Telecom was recently caught routing Western carrier traffic through mainland China. Some of Googles most sensitive data, including its corporate WAN infrastructure and VPN, were reportedly redirected.


The Genius Neuroscientist Who Might Hold the Key to True AI "IndyWatch Feed Tech"

Karl Fristons free energy principle might be the most all-encompassing idea since Charles Darwins theory of natural selection. But to understand it, you need to peer inside the mind of Friston himself.


New methane fuel cell fixes temperature issue "IndyWatch Feed Tech"

The new fuel cell could be a cheaper, more practical way to generate energy to heat homes and eventually run cars.


CDC: There Are Now 90 Cases of Acute Flaccid Myelitis in the U.S. "IndyWatch Feed Tech"

The CDC is investigating another 162 suspected cases of the rare, non-contagious infection that has baffled doctors since 2014.


Chinese fusion experiment generates an electron temperature of over 100 million degrees "IndyWatch Feed Tech"

A team of Chinese researchers has conducted an experiment that is nicknamed the Chinese artificial sun using the Experimental Advanced Superconducting Tokamak (EAST) fusion device. The EAST device has been conducting a four-month-long experiment with the goal of seeing how hot the electron temperature inside the fusion device could be. The scientists were able to achieve an electron temperature in the core plasma of over 100 million degrees.


Cases of mysterious paralyzing condition continue to increase, CDC says "IndyWatch Feed Tech"

The number of children being stricken by a mysterious paralyzing condition continues to increase, federal officials say.

At least 252 cases of acute flaccid myelitis, or AFM, have been reported to the Centers for Disease Control and Prevention so far this year from 27 states, including 90 that have been confirmed through Nov. 9, the CDC reported Tuesday.

Most of the cases have occurred among children between the ages of 2 and 8.


Double success, says PM Modi after launch of Bahubali satellite "IndyWatch Feed Tech"

Marking ISROs fifth launch for the current year, the communication satellite carries high throughput communication transponders in the Ka and Ku bands which can expand high-speed data transfer in the remote areas of India.


Tesla confirms Model 3 is getting a CCS plug in Europe, adapter coming for Model S and Model X "IndyWatch Feed Tech"

After years of speculation, Tesla finally confirmed today that Model 3 is getting a CCS Combo 2 plug in Europe and an adapter is coming for Model S and Model X.

With growing third-party fast-charging infrastructure in Europe, electric vehicle owners are starting to have many options.

Tesla owners have access to those networks on top of Teslas own Supercharger networks, but they had to use an expensive CHAdeMO adapter, which has its own limitations and isnt yet compatible with Model 3.


Russia reveals nuclear spaceship that will fly to Mars in very near future "IndyWatch Feed Tech"

Russia has revealed a spacecraft of the future that could one day put humans on Mars.

Roscosmos showed off concept designs for the sci-fi spacecraft but failed to say exactly when it would launch.

The spaceship is currently in development at Russias Keldysh Research Centre, which is racing to create the nuclear propulsion engine.


An Extremely Rare Gamma Ray Emitting Neutron Star Binary Has Been Found "IndyWatch Feed Tech"

The VERITAS collaboration recently discovered a binary system with a very high-energy gamma-ray neutron star, the rarest and most extreme known object in the Universe.


Reprogrammed cells could tackle brain damage "IndyWatch Feed Tech"

Turning astrocytes into neurons improves symptoms in preliminary mouse studies.


Lumbar MRI scan: What can it diagnose and how is it done? "IndyWatch Feed Tech"

Doctors use a lumbar MRI scan to examine a persons lower spine for problems. An MRI scan uses magnetic fields and radio waves to create an image of the inside of a persons body. It is a painless and low-risk procedure. Learn more here.


The Future of Flight: AI in the Cockpit "IndyWatch Feed Tech"

The U.S. military is investing billions of dollars each year in developing autonomous technologies that could enable planes, helicopters and drones to fly into some of the worlds most dangerous places, without a human pilot.

AI-empowered systems may soon allow autonomous flying machines to reduce the number of pilots and soldiers working in high-risk environments. Could these flying robots also be firing weapons? WSJs Jason Bellini reports, in the latest episode of Moving Upstream.


WATCH: Astronomers spot two fireballs in skies over southern Spain "IndyWatch Feed Tech"

ASTRONOMERS at an observatory in Central Spain said they spotted two pieces of debris from space falling over the skies of southern Spain yesterday (Sunday).

Scientists at the La Hita observatory in Toledo said the fireballs, one a comet and the other an asteroid, fell within around two hours of each other.

They were also sighted by observers in the Calar Alto observatory in Almeria Province and those at the Granada Province-based La Sagra.


NASA wants people on Mars within 25 years "IndyWatch Feed Tech"

The US space agency believes it can put humans on the Red Planet within 25 years, but the technological and medical hurdles are immense. Current latest trending Philippine headlines on science, technology breakthroughs, hardware devices, geeks, gaming, web/desktop applications, mobile apps, social media buzz and gadget reviews.


Apollo Astronaut claims Aliens PREVENTED a NUCLEAR WAR on Earth to ensure our existence "IndyWatch Feed Tech"

The write up provides few sources but the phone interview with Mitchell on Fox News is good

The Sixth Man to walk on the Moon Edgar Mitchell made fainting claims about alien life when he stated that the existence of the alien visitors is kept a secret from the public, not due to fear of widespread disbelief, rather, a fear that the monetized interests of big business could go into a state of irrelevance if we were given a chance to harbor the technology.

According to reports, Edgar Mitchell, the sixth man to set foot on the surface of the moon disclosed details about alien life and their presence on Earth which much considered ludicrous.

However, these claims are not coming from someone without any solid backgrounds. Edgar Mitchell has a very solid history behind him. The Former NASA astronaut graduated from the Carnegie Institute of Technology in 1952, with a degree in Industrial Management. He continued his studies while serving in the US Navy where he managed to combine his military career with improved education, studying another bachelors degree in Aeronautical Engineering within the naval postgraduate school in 1961.


The Robot Revolution Is Coming. Why Arent We Parenting For It? "IndyWatch Feed Tech"

I did an extensive interview for Fatherly, one of the most prominent sites for fathers. Give it a read to hear more about the #transhumanist future of parenting:

Transhumanist Zoltan Istvan understands the future is coming faster than many realize. And hes readying his kids for it.


Calorie Restriction Slows Age-related Leaky Gut "IndyWatch Feed Tech"

Researchers from the Kapahi Lab at the Buck Institute for Research on Aging have shown in a new study that increased intestinal permeability is caused by the age-related loss of epithelial cells that form the gut membrane [1].

As we age, the integrity of the gut membrane declines, and it becomes more permeable; this is known as leaky gut and is thought to contribute to the background of low-grade chronic inflammation known as inflammaging [2]. One emerging theory is that loss of gut membrane integrity is the origin of inflammaging, the place where age-related chronic inflammation begins. Inflammaging precedes many age-related diseases, including atherosclerosis, arthritis, hypertension, and cancer [35].

The new study suggests that caloric restriction, or caloric restriction mimetics, may help to prevent the increase of gut permeability in humans and has the potential to increase healthspan, which is the period of life we spend free from illness.


Harnessing artificial intelligence for sustainability goals "IndyWatch Feed Tech"

As ESAs -week continues to provoke and inspire participants on new ways of using Earth observation for monitoring our world to benefit the citizens of today and of the future, it is clear that artificial intelligence is set to play an important role.

Taking place at ESAs centre of Earth observation in Frascati, Italy, on 1216 November, -week has drawn hundreds of people from numerous disciplines to explore innovation, new technologies and cross disciplinary cooperation to see how satellite data coupled with new technologies such as artificial intelligence can bring benefits to science, business, the economy and society at large.

One might initially associate artificial intelligence and machine learning with robots and science fiction. However, it is, without question, seeping into our everyday lives through, for example, digital advertising, speech recognition tools and innovations such as Apples Siri and Amazons Alexa.


SC18: HPC Demand Surges, Accelerated "IndyWatch Feed Tech"

NVIDIAs playing a bigger role in high performance computing than ever, just as supercomputing itself has become central to meeting the biggest challenges of our time.

Speaking just hours ahead of the start of the annual SC18 supercomputing conference in Dallas, NVIDIA CEO Jensen Huang told 700 researchers, lab directors and execs about forces that are driving the company to push both into scale-up computing focused on large supercomputing systems as well as scale-out efforts, for researchers, data scientists and developers to harness the power of however many GPUs they need.

The HPC industry is fundamentally changing, Huang told the crowd. It started out in scientific computing, and the architecture was largely scale up. Its purpose in life was to simulate from first principles the laws of physics. In the future, we will continue to do that, but we have a new tool this tool is called machine learning.


Bullets that dont miss, weaponized insects and more: Innovations from DARPA, Americas secret lab "IndyWatch Feed Tech"

Bullets that never miss, super soldiers with extreme strength and robot warriors capable of rising up against humans may sound like the stuff of science fiction but the truth is that they have all already been developed.

A top-secret US government body called the Defense Advanced Research Projects Agency (DARPA) is behind these space-age innovations, which it has developed as part of its mission to revolutionize the way America fights the wars of the future. (Just think of Qs lab in James Bond, but for the US army).

Ever since it was established in 1958, DARPA has been the subject of conspiracy theories claiming among other things that the agency was covering up UFO landings, trying to develop mind control and working on Earth-shattering super-weapons like death rays.


An Interview With Leonid Gavrilov And Natalia Gavrilova "IndyWatch Feed Tech"

An interview with Drs. Leonid Gavrilov and Natalia Gavrilova on the demography of life extension.

Many people are concerned that vastly extended healthy lifespan might lead us to catastrophic overpopulation, and the best way to mitigate this fear is probably to talk to an experienced demographer. To learn more about this and other interesting questions related to life extension, we spoke to Drs. Leonid Gavrilov and Natalia Gavrilova, respectively Principal Investigator and Research Associate at the Center on Aging in Chicago University. Both of them have specialized in the biodemography of aging and longevity and possess nearly endless resumes.

Natalia and Leonid, your field of expertise is the biodemography of aging and longevity. What drew you to this field of research?

This is a scientific approach using demographic data and methods to get insights into the biological mechanisms of aging and longevity. We came to this research area because it allows us to obtain new interesting and meaningful scientific findings despite very limited funding.


Facebook Executives Ignored Warnings, Deflected Blame as Scandals Mounted, Report Says "IndyWatch Feed Tech"

Facebook Executives Ignored Warnings, Deflected Blame as Scandals Mounted, Report Says :

From Russian election meddling to a massive data privacy scandal, Facebook has faced a seemingly endless list of troubles. Now, a new report suggests the social network's leadership may be among its biggest challenges.

Over the past three years, CEO Mark Zuckerberg and COO Sheryl Sandberg ignored warnings, deflected blame and were distracted by other projects as the social network lurched from crisis to crisis, according to a more than 5,000-word report by The New York Times. The paper, which interviewed more than 50 people for the story, painted an unflattering portrait of two executives' handling of the series of scandals, some of which eventually promoted [Ed: prompted?] Congress to ask both of them to testify.

The piece focused on Facebook's handling of fake news posted by Russian trolls ahead of the 2016 presidential, the impact of which Zuckerberg initially dismissed as "crazy," and the company's efforts to deflect blame after data of 87 million users was harvested by political consultancy Cambridge Analytica. The story also touched on in-fighting at the highest of levels of the company.

"Bent on growth, the pair ignored warning signs and then sought to conceal them from public view," The Times wrote. "At critical moments over the last three years, they were distracted by personal projects, and passed off security and policy decisions to subordinates, according to current and former executives."

Facebook told the paper it was committed to addressing the challenges.

Honesty: The absence of the intent to deceive.

Original Submission

Read more of this story at SoylentNews.


Male and Female Brain Differences Must We Keep Doing This? "IndyWatch Feed Tech"

A recent large population study claims to conclusively prove that male and female brains are different. Of course, it does no such thing. As such, Dr Dean Burnett is quite annoyed.


Privacy concerns as Google absorbs DeepMinds health division "IndyWatch Feed Tech"

Privacy advocates have raised concerns about patients data after Google said it would take control of its subsidiary DeepMinds healthcare division.

Google, which acquired London-based artificial intelligence lab DeepMind in 2014, said on Tuesday that the DeepMind Health brand, which uses NHS patient data, will cease to exist and the team behind its medical app Streams will join Google as part of Google Health.

It comes just months after DeepMind promised never to share data with the technology giant and an ethics board raised concerns over its independence.


Ears Grown From Apples? The Promise of Plants for Engineering Human Tissue "IndyWatch Feed Tech"

Inspiration for game-changing science can seemingly come from anywhere. A moldy bacterial plate gave us the first antibiotic, penicillin. Zapping yeast with a platinum electrode led to a powerful chemotherapy drug, cisplatin.

For Dr. Andrew Pelling at the University of Ottawa, his radical idea came from a sci-fi cult classic called The Little Shop of Horrors. Specifically, he was intrigued by the movies main antagonist, a man-eating plant called Aubrey 2.

What you have here is a plant-like creature with mammalian features, said Pelling at the Exponential Medicine conference in San Diego last week. So we started wondering: can we grow this in the lab?


Designer Babies, and Their Babies: How AI and Genomics Will Impact Reproduction "IndyWatch Feed Tech"

Were going to get these massive pools of sequenced genomic data, Metzl said. The real gold will come from comparing peoples sequenced genomes to their electronic health records, and ultimately their life records. Getting people comfortable with allowing open access to their data will be another matter; Metzl mentioned that Luna DNA and others have strategies to help people get comfortable with giving consent to their private information. But this is where Chinas lack of privacy protection could end up being a significant advantage.

To compare genotypes and phenotypes at scalefirst millions, then hundreds of millions, then eventually billions, Metzl saidwere going to need AI and big data analytic tools, and algorithms far beyond what we have now. These tools will let us move from precision medicine to predictive medicine, knowing precisely when and where different diseases are going to occur and shutting them down before they start.

But, Metzl said, As we unlock the genetics of ourselves, its not going to be about just healthcare. Its ultimately going to be about who and what we are as humans. Its going to be about identity.


Detecting light in a different dimension "IndyWatch Feed Tech"

We did not expect to see such a dramatic improvement just by changing the morphology of the polymer, said co-corresponding author Mircea Cotlet, a materials scientist in the CFN Soft and Bio Nanomaterials Group.

The scientists believe that there are two explanations behind their observations.

At a certain polymer concentration, the nanowires have dimensions comparable to the wavelength of light, said Li. This size similarity has the effect of increasing light scattering and absorption. In addition, crystallization of P3HT molecules within the nanowires provides more charge carriers to transfer electricity to the layer.


Volkswagen announces 2 new factories to go electric, partners with SK Innovation for battery cells "IndyWatch Feed Tech"

Today, Volkswagen is announcing that it is converting two more factories to electric vehicle production and it is partnering with SK Innovation for battery cells.

Earlier this year, VW announced that its Zwickau factory will be the first to go all-electric.

The German automaker plans to produce 1,500 electric cars per day at the plant.


Stretchable thermoelectric coils for energy harvesting in miniature flexible wearable devices "IndyWatch Feed Tech"

Miniaturized semiconductor devices with energy harvesting features have paved the way to wearable technologies and sensors. Although thermoelectric systems have attractive features in this context, the ability to maintain large temperature differences across device terminals remains increasingly difficult to achieve with accelerated trends in device miniaturization. As a result, a group of scientists in applied sciences and engineering has developed and demonstrated a proposal on an architectural solution to the problem in which engineered thin-film active materials are integrated into flexible three-dimensional (3D) forms.

The approach enabled efficient thermal impedance matching, and multiplied heat flow through the harvester to increase efficient power conversion. In the study conducted by Kewang Nan and colleagues, interconnected arrays of 3D thermoelectric coils were built with microscale ribbons of the active material monocrystalline silicon to demonstrate the proposed concepts. Quantitative measurements and simulations were conducted thereafter to establish the basic operating principles and key design features of the strategy. The results, now published on Science Advances, suggested a scalable strategy to deploy hard thermoelectric thin-films within energy harvesters that can efficiently integrate with soft material systems including human tissue to develop wearable sensors in the future.

Thermoelectric devices provide a platform to incorporate ubiquitous thermal gradients that generate electrical power. To operate wearable sensors or the Internet of Things devices, the temperature gradient between the surrounding environment and the human body/inanimate objects should provide small-scale power supplies. Continued advances in the field focus on aggressive downscaling of power requirements for miniaturized systems to enhance their potential in thermoelectric and energy harvesting applications. Integrated processors and radio transmitters for example can operate with power in the range of subnanowatts, some recent examples are driven via ambient light-based energy harvesting and endocochlear potential. Such platforms can be paired with sensors with similar power to enable distributed, continuous and remote environmental/biochemical monitoring.



Huge impact crater found under Greenlands Hiawatha Glacier, the first known under ice "IndyWatch Feed Tech"

The first large crater ever found under ice, the discovery could possibly be linked to a controversial extinction theory.


Historic breakthrough: WVU Rockefeller Neuroscience team first to use ultrasound to treat Alzheimers "IndyWatch Feed Tech"

MORGANTOWN World-leading brain experts at West Virginia Universitys Rockefeller Neuroscience Institute are celebrating the historic breakthrough Alzheimer patients around the global have been waiting for.

For Alzheimers, theres not that many treatments available despite hundreds of clinical trials over the past two decades and billions of dollars spent, said Dr. Ali Rezai, a neurosurgeon at WVU who led the team of investigators that successfully performed a phase II trial using focused ultrasound to treat a patient with early stage Alzheimers.

The WVU team tested the innovative treatment in collaboration with INSIGHTEC, an Israeli medical technology company. Earlier this year, INSIGHTEC was approved by the U.S. Food and Drug Administration to begin a phase II clinical trial of the procedure and selected the WVU Rockefeller Neuroscience Institute as the first site in the United States for the trial.


Engineered natural killer cells may be the next great cancer immunotherapy "IndyWatch Feed Tech"

Inspired by success with T cells, scientists equip other immune cells with cancer-homing protein.


Vade Secure launches IsItPhishing Threat Detection to help SOCs identify phishing URLs "IndyWatch Feed Tech"

Vade Secure launched IsItPhishing Threat Detection, an anti-phishing solution that helps Security Operations Centers (SOCs) identify and block targeted phishing attacks. Easily integrating with existing SIEM and SOAR solutions through a lightweight API, IsItPhishing Threat Detection delivers a real-time verdict on whether a suspicious URL is phishing or not. These verdicts can be leveraged in SOC workflows to accelerate phishing detection, response and resolution. Real-time phishing detection powered by machine learning To detect unknown, targeted More

The post Vade Secure launches IsItPhishing Threat Detection to help SOCs identify phishing URLs appeared first on Help Net Security.


Centurion Bridge Layer, Now In RC "IndyWatch Feed Tech"

Radio controlled models are great fun. Most of us have had a few RC cars as children and maybe dabbled with the occasional helicopter or drone. Its a rare breed of modeler, however, that gets to drive a radio-controlled bridge laying tank.

The lads prepare to fight the good fight.

The build shows other smart techniques of the enterprising modeler. Rather than start from scratch, the Centurion is built on a modified KV tank hull. After the modifications were complete, the tank received a lick of paint in the requisite British Army green. The final result is rather impressive.

It goes to show what can be achieved with some off-the-shelf parts and ingenuity. Weve seen other impressive RC tanks before ...


Black Friday/Cyber Monday Offers Are Just Around the Corner! "IndyWatch Feed Tech"

Greetings from LowEndBox!

We have reached that special time of the year, which is Black Friday and Cyber Monday and we have some amazing offers in store for you!

LowEndBox has been dedicated to working with its providers to offer our users the best hosting deals. We are excited to announce that we will be releasing Black Friday and Cyber Monday deals from 11/23 to 11/27! There will be a great mix of offers with amazing monthly/yearly pricing for OpenVZ, KVM, Storage VPS, Bare Metal Dedicated, and much more! In addition to the EXCLUSIVE BLACK FRIDAY AND CYBER MONDAY offers, were going to have a few exclusive offers posted during Black Friday, Cyber Monday, and the days in between so keep an eye out for those as well!

Lastly 1 lucky person is going to be selected to win a $50 Amazon Gift Card! Enter the form below for a chance to win!

As always be sure to check the deals posted on LowEndTalk:
Follow us on Facebook to include the deals in your feed:
You can follow the deal stream for LowEnd Box on Twitter at @LowEndNetwork

Good luck and we are sure you are going to love all the Black Friday offers! See you then!


OpenStack Foundation board expands mission to host new open source projects "IndyWatch Feed Tech"

The board of directors of the OpenStack Foundation (OSF) adopted a resolution advancing a new governance framework supporting the organizations investment in emerging use cases for OpenStack and open infrastructure. These include continuous integration and continuous delivery (CI/CD), container infrastructure, edge computing, datacenter and, newly added, artificial intelligence/machine learning (AI/ML). The board resolution authorizes the officers of the OSF to select and incubate Pilot projects. This new governance framework broadens the OSFs mission to serve More

The post OpenStack Foundation board expands mission to host new open source projects appeared first on Help Net Security.


Testing the GDPR Where it Counts "IndyWatch Feed Tech"

Under the EU's General Data Protection Regulation (GDPR) any ordinary online Joe or Jeanette has the right to know which data are gathered about his/her activities. What's more, if a site wants to share those data with a third-party, it also has to clearly inform ya about those other companies, who in turn have to inform you about which personal data they're processing, with whom they're sharing those data and so on.

In short, turtles all the way down.

Yet that's a concept that apparently has zoomed right past the well-educated heads of such obscure companies like Oracle, Acxiom, Criteo, Equifax, Experian, Quantcast and Tapiad: just some of the data processors at the heart of the commercialized Internet.

Let's take a look at just two of them: Oracle and Acxiom.

Read more of this story at SoylentNews.


Cequence Security announces application security platform to stop bot attacks "IndyWatch Feed Tech"

Cequence Security released Cequence ASP, an application security platform that provides a scalable defense against the growing number of bot attacks affecting todays hyper-connected organizations. These financially-motivated attacks target externally-facing web and mobile apps, as well as API services that provide connections to other applications across their digital ecosystem. Attack objectives can include account takeover, content scraping, distributed denial of service, and much more. From a bad actors perspective, geo-distributed bot attacks are relatively easy More

The post Cequence Security announces application security platform to stop bot attacks appeared first on Help Net Security.


Dem rep slams Facebook: It 'cannot be trusted to regulate itself' "IndyWatch Feed Tech"

Rhode Island Rep. David Cicilline (D) sharply criticized tech giant Facebook on Twitter on Wednesday evening, arguing that the social media company can't be trusted any longer to regulate itself.In a series of tweets, the lawmaker ripped into...


Cryptowerk introduces blockchain-based technology to certify data integrity of digital assets "IndyWatch Feed Tech"

Cryptowerk introduced Cryptowerk Seal, a blockchain-as-a-service (BaaS) solution that creates a seal for any form of digital assets. The cloud service writes digital seals or fingerprints of the data to one or more blockchains at speeds of up to one million times per second, creating a tamper-proof chain of custody that can be used in large-scale enterprise applications. With the digital seal, every product, process and transaction can now be matched to its original to More

The post Cryptowerk introduces blockchain-based technology to certify data integrity of digital assets appeared first on Help Net Security.


[$] Weekly Edition for November 15, 2018 "IndyWatch Feed Tech"

The Weekly Edition for November 15, 2018 is available.


Citco launches new SaaS xeo Treasury solution on Amazon Web Services "IndyWatch Feed Tech"

The Citco Group of Companies (Citco) launched xeo Treasury, a Software-as-a-Service (SaaS) offering. The new product is a solution that gives alternative fund managers a method of managing treasury functions through a SaaS tool running on Amazon Web Services (AWS). It adds value by improving operational efficiencies and workflows, and provides a secure, centralized module for treasury operations. xeo Treasury is a stand-alone solution that enables firms to centralize their treasury functions, including funding investments, More

The post Citco launches new SaaS xeo Treasury solution on Amazon Web Services appeared first on Help Net Security.


Volkswagen to Devote 3 German Plants to Electric Car Push "IndyWatch Feed Tech"

Via: AP: German automaker Volkswagen will convert three factories in Germany to manufacture electric cars, ramping up production of zero-local emission cars ahead of tougher European emissions standards, the company said Wednesday. Wolfsburg-based Volkswagen said Wednesday that it would begin local production of electric-powered vehicles at its facilities in Emden and Hannover in 2022. A []


Smashing Security #104: The worlds most evil phishing test, and cyborgs in the workplace "IndyWatch Feed Tech"

Does your employer want to turn you into a cyborg? Was this phishing test devised by an evil genius? And how did a cinema chain get scammed out of millions, time and time again?

All this and much more is discussed in the latest edition of the award-winning Smashing Security podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Scott Helme.


Hillicon Valley: DHS cyber unit gets makeover | Russia wants DNC hacking suit dismissed | Facebook paid group that linked critics to Soros | Panel warns of threat from Chinese tech | Koch groups criticize incentives to corporations after Amazon deal "IndyWatch Feed Tech"

Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...


JPL and Autodesk Design Spider-Like Interplanetary Lander "IndyWatch Feed Tech"

AI software helped NASA dream up this spider-like interplanetary lander

Using an AI design process, engineers at software company Autodesk and NASA's Jet Propulsion Laboratory came up with a new interplanetary lander concept that could explore distant moons like Europa and Enceladus. Its slim design weighs less than most of the landers that NASA has already sent to other planets and moons.

Autodesk announced its new innovative lander design today at the company's conference in Las Vegas revealing a spacecraft that looks like a spider woven from metal. The company says the idea to create the vehicle was sparked when Autodesk approached NASA to validate a lander prototype it had been working on. After looking at Autodesk's work, JPL and the company decided to form a design team comprised of five engineers from Autodesk and five from JPL to come up with a new way to design landers.

See also: These Organic-Inspired Planetary Landers Could Help NASA Reach Other Worlds

Original Submission

Read more of this story at SoylentNews.


AMD Is Hiring Another Mesa/RadeonSI Driver Developer "IndyWatch Feed Tech"

AMD is hiring another open-source Linux graphics driver developer with a focus on the Mesa/RadeonSI driver stack...


Rock Out to the Written Word with BookSound "IndyWatch Feed Tech"

[Roni Bandini] has given the world a new type of music with, BookSound. As the name implies, it takes the written word and turns it into electronic music.

Youre no doubt familiar with audiobooks, which are basically the adult equivalent of having somebody read you a bedtime story. Theyre an easy way to boast to your friends that as a matter of fact, you have read that popular new novel when in all likelihood you were probably just half listening to it while you drove to work. But for all the advantages audiobooks have over their traditional pulp-based brethren, they still have one glaring downside: with precious few exceptions, theyre no good to dance to.

BookSound creates electronic music from regular books. Well, electronic sounds at the very least. He says hes still working on perfecting the word to music mapping, so the results shown in the video after the break are still a bit rough. But even in these early stages theres no denying this is an exceptionally unique project, and were excited to see where it goes from here.

Inside the classy looking 3D printed enclosure is a Raspberry Pi, an OLED display, and the button and switch which make up the extent of the devices controls....


HPR2684: Making a remote control visible "IndyWatch Feed Tech"

The problem A black remote control on a black couch. The solution Cover it in Earth Insulating Tape. Links


Uber posts $1B loss in third quarter as growth in bookings slows "IndyWatch Feed Tech"

Ride-sharing company Uber on Wednesday announced losses of $1.07 billion for the third quarter of 2018 as the company faced a third financial quarter in a row of single-digit gains in bookings and deliveries.Reuters reports that the...


HostBRZ Reseller Hosting, OpenVZ SSD VPS, KVM SSD VPS starting from $12/year in Los Angeles & New York! "IndyWatch Feed Tech"

Elliot from HostBRZ has submitted a fresh offer for us today. HostBRZ has great deals on SSD Powered OpenVZ + KVM VPSs as well as Reseller Hosting based out of Los Angeles and New York, check out the great deals below!

Their WHOIS is public, and you can find their ToS/Legal Docs here. They accept PayPal, Bitcoin, Litecoin, Ethereum ZCash and all major Credit Cards as payment methods.

Heres what they had to say: 

HostBRZ is a SSD hosting company that enjoys building long term partnerships with our clients by unmatched service and customer support. It is our goal to service clients at the highest level possible and accept nothing less than that.

All of our servers are powered by SSDs protected by RAID technology ensuring the highest performance and redundancy possible. With HostBRZ, your websites will load faster than your competition because of our enterprise hardware and rapid Samsung SSD performance!

Heres the offers: 

Reseller 30GB

  • 30GB SSD Space
  • 1000GB Bandwidth
  • Dedicated IP Address
  • Unlimited cPanel Accounts
  • Unlimited Databases
  • Unlimited Email Accounts
  • Unlimited FTP Accounts
  • Unlimited Subdomains
  • cPanel & WHM Control Panel
  • Softaculous Script Installer
  • LiteSpeed Web Server Powered
  • East Coast Datacenter (NY)
  • DDoS Protected Servers
  • $12/yr
  • [ORDER]

Reseller 100GB

  • 100GB SSD Space
  • ...

Wednesday, 14 November


Boffins discovered seven new Meltdown and Spectre attacks "IndyWatch Feed Tech"

Researchers who devised the original Meltdown and Spectre attacks disclosed seven new variants that leverage on a technique known as transient execution.

In January, white hackers from Google Project Zero disclosed the vulnerabilities that potentially impact all major CPUs, including the ones manufactured by AMD, ARM, and Intel.

The expert devised two attacks dubbed Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715), which could be conducted to sensitive data processed by the CPU.

The Meltdown attack could allow attackers to read the entire physical memory of the target machines stealing credentials, personal information, and more.

The Spectre attack allows user-mode applications to extract information from other processes running on the same system. It can also be exploited to extract information from its own process via code, for example, a malicious JavaScript can be used to extract login cookies for other sites from the browsers memory.

Both attacks leverage the speculative execution technique used by most modern CPUs to optimize performance.

In the following months, experts discovered many other attacks leveraging the speculative execution technique, such as Spectre-NG, NetSpectre, SpectreRSB, Spectre 1.1, Spectre1.2, Lazy FP, and Foreshadow.

Now, researchers from Graz University of Technology, imec-DistriNet, KU Leuven, and
College of William and Mary along with some of the experts who devised the original Meltdown and Spectre attacks have disclosed seven new variants that leverage on a technique known as transient execution.

Modern processor optimizations such as branch prediction and out-of-order execution are crucial for performance. Recent research on transient execution attacks including Spectre and Meltdown showed, however, that exception or branch misprediction events may leave secret-dependent trac...


Schumer told Warner to back off of Facebook: report "IndyWatch Feed Tech"

Senate Minority Leader Charles Schumer (D-N.Y.) reportedly told Sen. Mark Warner (Va.), the top Democrat on the Intelligence Committee, to back off of investigating Facebook and its role in enabling Russias misinformation campaign in the...


Exoplanet Detected Around Barnard's Star, 6 Light Years Away "IndyWatch Feed Tech"

Exoplanet discovered around neighbouring star

Astronomers have discovered a planet around one of the closest stars to our Sun.

Nearby planets like this are likely to be prime targets in the search for signatures of life, using the next generation of telescopes.

The planet's mass is thought to be more than three times that of our own, placing it in a category of world know as "super-Earths".

It orbits Barnard's star, which sits "just" six light-years away.

Writing in the journal Nature [DOI: 10.1038/s41586-018-0677-y] [DX], Guillem Anglada Escud and colleagues say this newly discovered world has a mass 3.2 times bigger than the Earth's.

Barnard's Star.

Also at

Original Submission

Read more of this story at SoylentNews.


Facebook-paid firm linked company critics to Soros: report "IndyWatch Feed Tech"

Facebook hired a Republican opposition research firm that linked the companys detractors to Democratic donor and hedge fund billionaire George Soros, according to a report in The New York Times. Facebook hired the right-leaning consultancy...


[$] A report from the Automated Testing Summit "IndyWatch Feed Tech"

In the first session of the Testing & Fuzzing microconference at the 2018 Linux Plumbers Conference (LPC), Kevin Hilman gave a report on the recently held Automated Testing Summit (ATS). Since the summit was an invitation-only gathering of 35 people, there were many at LPC who were not at ATS but had a keen interest in what was discussed. The summit came out of a realization that there is a lot of kernel testing going on in various places, but not a lot of collaboration between those efforts, Hilman said.


Intel Publishes Whitepaper On New BFloat16 Floating-Point Format For Future CPUs "IndyWatch Feed Tech"

Intel has published their initial whitepaper on BF16/BFloat16, a new floating point format to be supported by future Intel processors...


Honoring the 2018 Pioneer Award Winners and John Perry Barlow "IndyWatch Feed Tech"

EFFs annual Pioneer Awards Ceremony recognizes extraordinary individuals for their commitment and leadership in extending freedom and innovation on the electronic frontier. At this years event held on September 27 in San Francisco, EFF rededicated the Pioneer Awards to EFF co-founder and Grateful Dead lyricist John Perry Barlow. Barlows commitment to online freedom was commemorated by dubbing the Pioneer Awards statuette the Barlow. EFF welcomed keynote speaker Daniel Ellsberg, known for his work in releasing the Pentagon papers, to help award the very first Barlows. This year's honorees were fair use champion Stephanie Lenz, European Digital Rights leader Joe McNamee, and groundbreaking content moderation researcher Sarah T. Roberts.

Read the transcript of the full 2018 Pioneer Awards Ceremony here.

The evening kicked off with EFF Executive Director Cindy Cohn who had the honor of renaming the Pioneer Award as the Barlow to pay tribute to Barlows work creating EFF and his role in establishing the movement for Internet freedom. Barlow was one of the first people to see the potential of the Internet as a place of freedom where voices long silenced could find an audience and people could connect, regardless of physical distance, Cohn said. (If youre an award winner and reading this, youll be happy to know she also gave the green light to previous award winners to retroactively call their awards the Barlow.)

Picture of screen and raised dias with podium. To the left, is a projected image of our co-founder, John Perry Barlow. At the poduim on the right is our Executive Director Cindy Cohn, opening the

Cindy Cohn dedicates the Pioneer Awards to EFF co-founder John Perry Barlow.

Cohn introduced two of his daughters, Anna and Amelia Barlow (known affectionately as the Barlowettes), to the stage to share some words. Anna paid tribute to her fathers talents and his ability to weave two worlds together, and shared a video of him speaking about the necessity of the physical...


What Tech Companies Hired Big in 2018? "IndyWatch Feed Tech"

Amazon still leads the pack nationally, while Apple tops the list for Silicon Valley, says job search firm Indeed

What tech companies have tried to hire the most engineers in 2018? Job search firm took a look at job postings from January through November and found Amazon and Microsoft were at the front of the pack for the United States as a whole, while Apple and Amazon ranked one and two, respectively, for Silicon Valley.

While the leaders in both roundups didnt change from 2017, there was a fair amount of movement down in the ranks. Cisco, No. 2 for Silicon Valley, dropped to four in 2018, while Facebook climbed. Tesla, No. 15 in 2017, didnt make the Silicon Valley chart in 2018, and neither did Intel or Intuit. Meanwhile, Walmart eCommerce climbed dramatically and Walmart proper made the list for the first time. Nationally, United Health Group and Microsoft were among the companies that moved up significantly, while IBM moved down.

For a closer look at tech hiring trends, see the charts below.

Companies with the highest share of job postings for tech roles in the United States, according to Indeed:


Rank (2018)

Company name

Share of postings in 2018 (percent)

Rank (2017)

Share of postings in 2017 (percent)






3D Print Springs With Hacked GCode "IndyWatch Feed Tech"

If youve used a desktop 3D printer in the past, youre almost certainly done battle with strings. These are the wispy bits of filament that harden in the air, usually as the printers nozzle moves quickly between points in open air. Depending on the severity and the material youre printing with, these stringy interlopers can range from being an unsightly annoyance to triggering a heartbreaking failed print. But where most see an annoying reality of pushing melted plastic around, [Adam Kumpf] of Makefast Workshop sees inspiration.

Noticing that the nozzle of their printer left strings behind, [Adam] wondered if it would be possible to induce these mid-air printing artifacts on demand. Even better, would it be possible to tame them into producing a useful object? As it turns out it is, and now weve got the web-based tool to prove it.

As [Adam] explains, you cant just load up a 3D model of a spring in your normal slicer and expect your printer to churn out a useful object. The software will, as its designed to do, recognize the object cant be printed without extensive support material. Now you could in theory go ahead and print such a spring, but good luck getting the support material out.

The trick is to throw away the traditional slicer entirely, as the layer-by-layer approach simply wont work here. By manually creating GCode using carefully tuned parameters, [Adam] found it was possible to get the printer to extrude plastic at the precise rate at which the part cooling fan would instantly solidify it. Then it was just a matter of taking that concept and applying it to a slow spiral motion. The end result are functional, albeit n...


Clip-On L'Oral Sensor Measures Exposure to Ultraviolet Radiation "IndyWatch Feed Tech"

L'Oral's wearable sensor will track your UV exposure throughout the day

L'Oral has announced a wearable device that measures your exposure to ultraviolet radiation that can seriously damage your skin and eyes and potentially cause skin cancer. The La Roche-Posay My Skin Track UV sensor is designed to clip onto your clothes or bag, and it relies on NFC rather than Bluetooth to transmit its data, meaning it doesn't require a battery to function. L'Oreal previously introduced a similar sensor that attached to your fingernail.

Despite the dangers of UV radiation, it can be very difficult to know exactly how much you're being exposed to. UVA rays can penetrate clouds and glass, which means you're probably exposed to them more than you think. L'Oral's sensor has the potential to educate people about how often they're being exposed, although it won't solve the problem of people not using enough sunscreen in response.

Once your phone has the UV data, it can integrate it into Apple's HealthKit if you're using an iOS device. There will also be shortcuts to purchase skincare products from L'Oral's skincare brand La Roche-Posay within the app.

Love the skin you're in. Especially if you're a vampire.

Original Submission

Read more of this story at SoylentNews.


The Supreme Court Should Confirm, Again, that Abstract Software Patents Dont Need a Trial to be Proved Invalid "IndyWatch Feed Tech"

This year, we celebrated the fourth anniversary of the Supreme Courts landmark ruling in Alice v. CLS Bank. Alice made clear that generic computers do not make abstract ideas eligible for patent protection. Following the decision, district courts across the country started rejecting ineligible abstract patents at early stages of litigation. That has enabled independent software developers and small businesses to fight meritless infringement allegations without taking on the staggering costs and risks of patent litigation. In other words, Alice has made the patent system better at doing what it is supposed to do: promote technological innovation and economic growth.

Unfortunately, Alices pro-innovation effects are already in danger. As weve explained before, the Federal Circuits decision in Berkheimer v. HP Inc. turns Alice upside-down by treating the legal question of patent eligibility as a factual question based on the patent owners uncorroborated assertions. That will just make patent litigation take longer and cost more because factual questions generally require expensive discovery and trial before they can be resolved.

Even worse, Berkheimer gives patent owners free rein to actually create factual questions because of its emphasis on a patents specification. The specification is the part of the patent that describes the invention and the background state of the art. The Patent Office generally does not have the time or resources to verify whether every statement in the specification is accurate. This means that, in effect, the Berkheimer ruling will allow patent owners to create factual disputes and defeat summary judgment by inserting convenient facts into their patent applications.

If permitted to stand, the decision will embolden trolls with software patents to use the ruinous cost of litigation to extract settlement payments for invalid patentsjust as they did before Alice. Unfortunately, district courts and patent examiners are already relying on Berkheimer to allow patents...


5 Privacy Mistakes that Leave You Vulnerable Online "IndyWatch Feed Tech"

By John Mason

When news broke about Cambridge Analytica, the Internet went into a frenzy: How could Facebook do this! Facebook should be made accountable! Besides the fact that I think the whole Cambridge Analytica issue was blown out of proportion, I believe bigger issue is the fact that very few people are willing to be responsible for their []

This is a post from Read the original post: 5 Privacy Mistakes that Leave You Vulnerable Online


Videographer sues Adobe after losing $250k worth of data through Premiere Pro bug "IndyWatch Feed Tech"

By Waqas

A class action lawsuit has been filed by Dave Cooper, a freelance videographer, against Adobe for a bug in its video-editing software Premiere Pro that deleted years of his work within no time. Cooper software watched in horror as his important videos and clips got permanently deleted. In the lawsuit, Cooper has alleged that the []

This is a post from Read the original post: Videographer sues Adobe after losing $250k worth of data through Premiere Pro bug


White Paper: How to optimize measurement and transactional speed of your DAQ "IndyWatch Feed Tech"

Optimize your measurement and transaction speed

Get fast, quality measurements without a large data acquisition (DAQ) mainframe system. Read tips about how to select the right hardware and how to configure it to increase your reading speed. Optimize your DAQ system for throughput, scanning speed, and accuracy with help from this white paper. An optimized DAQ test solution can help you to realize cost savings in the long run, higher throughput, higher sales revenue, and better equipment utilization.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog