IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 21 May


Physical exercise doesnt slow down dementia once it appears, study shows "IndyWatch Feed Tech"

Physical exercise is a key piece of the brain health puzzle, but certainly not a magic pill.

___ Exercise doesnt slow progression of dementia (NHS Choices): A trial in which people with dementia took part in a moderately intense exercise programme for 4 months found their mental decline did not slow and may even have worsened faster than in people who did not take part in the programmeWhile the exercise.


Fiber-reinforced hydrogel is 5 times stronger than steel "IndyWatch Feed Tech"

 Rather nice and a likely artificial ligament.  Not an obvious solution either.  This looks to be a great manufacturing solution as well as we are completely familiar with glass fiber.

Yet many materials can also be manipulated so this may well be not that unique but may still be cheap en0ugh to get market share.

All good.

Fiber-reinforced hydrogel is 5 times stronger than steel

February 26th, 2017

The newly developed fiber-reinforced hydrogel consists of polyampholyte gels and glass fiber fabric(Credit: Hokkaido University) VIEW GALLERY - 2 IMAGES



[$] Network filesystem topics "IndyWatch Feed Tech"

At the 2018 Linux Storage, Filesystem, and Memory-Management Summit (LSFMM), Steve French led a discussion of various problem areas for network filesystems. Unlike previous sessions (in 2016 and 2017), there was some good news to report because the long-awaited statx() system call was released in Linux 4.11. But there is still plenty of work to be done to better support network filesystems in Linux.


FDA Approves Drug to Prevent Migraines "IndyWatch Feed Tech"

F.D.A. Approves First Drug Designed to Prevent Migraines

The first medicine designed to prevent migraines was approved by the Food and Drug Administration on Thursday, ushering in what many experts believe will be a new era in treatment for people who suffer the most severe form of these headaches. The drug, Aimovig, made by Amgen and Novartis, is a monthly injection with a device similar to an insulin pen. The list price will be $6,900 a year, and Amgen said the drug will be available to patients within a week.

Aimovig blocks a protein fragment, CGRP, that instigates and perpetuates migraines. Three other companies Lilly, Teva and Alder have similar medicines in the final stages of study or awaiting F.D.A. approval. "The drugs will have a huge impact," said Dr. Amaal Starling, a neurologist and migraine specialist at the Mayo Clinic in Phoenix. "This is really an amazing time for my patient population and for general neurologists treating patients with migraine."

Millions of people experience severe migraines so often that they are disabled and in despair. These drugs do not prevent all migraine attacks, but can make them less severe and can reduce their frequency by 50 percent or more. As a recent editorial in the journal JAMA [DOI: 10.1001/jama.2018.4852] [DX] put it, they are "progress, but not a panacea."

Sticker shock? The price is 30% less than Wall Street expected. Meanwhile, people are self-administering psychedelics such as LSD or psilocybin to treat migraines and cluster headaches.

See also: FDA just approved the first drug to prevent migraines. Here's the story of its discoveryand its limitations

Original Submission

Read more of this story at SoylentNews.


Alexa And Particle Modernize Coffee Machine By One Iota "IndyWatch Feed Tech"

When [Steve Parker]s girlfriend got a tea kettle that takes voice commands, he suddenly saw his fancy bean-to-cup coffee machine as a technological dinosaur. It may make good coffee, but getting the DeLonghi going is inconvenient, because it runs a self-cleaning cycle each time its turned on or off.

Thus began [Steve]s adventure in trying to turn the thing on with Alexa via Particle Photon. Because of the way the machine is designed, simply adding a relay wouldnt dothe machine would just turn off and back on, only to start the self-clean again. Once inside, he found its controlled by a PIC18LF2520. Further research indicated that it is powered by an off-line switcher that combines a power MOSFET with a power supply controller. [Steve] figured out that the buttons are read via square wave and interpreted by a multiplexer.

The project went into the weeds a bit when [Steve] tried to read the signals with a knock-off Saleae. As soon as he plugged it in, the control board fried because the DeLonghi evidently has no reference to Earth ground. While waiting for a replacement board to arrive, he tried replacing the mux and shift register chips, which actually fixed the board. Then it was more or less a matter of using the DeLonghis status LEDs to determine the machines state, and then to interface with the Photon and Alexa. Cycle past the break for a ristretto-sized demonstration.

[Steve] didnt do all this to actually make coffee, just turn the machine on with a voice command. The Photon is totally capable of making coffee, though, as we saw with this closed-loop espresso machine.


All Systems Go! 2018 Conference Announced For The End Of September "IndyWatch Feed Tech"

Lennart Poettering has announced the call for presentations of this year's All Systems Go! conference, what was born out of the earlier systemd.conf conference...


FCC will take public comments on Sinclair-Tribune merger "IndyWatch Feed Tech"

The Federal Communications Commission (FCC) will take new comments from the public on Sinclair Broadcast Groups $3.9 billion bid for Tribune Media.The agency is reopening its review of the merger for public comments after the two companies proposed...


Multilingual malware hits Android devices for phishing & cryptomining "IndyWatch Feed Tech"

By Waqas

Roaming Mantis malware also targets iOS devices for phishing attacks.

This is a post from Read the original post: Multilingual malware hits Android devices for phishing & cryptomining


Roaming Mantis gang evolves and broadens its operations "IndyWatch Feed Tech"

Roaming Mantis malware initially targeting Android devices, now has broadened both its geographic range and its targets.

Security experts from Kaspersky Lab discovered that the operators behind the Roaming Mantis campaign continue to improve their malware broadening their targets, their geographic range and their functional scope.

Roaming Mantis surfaced in March 2018 when hacked routers in Japan redirecting users to compromised websites. Investigation by Kaspersky Lab indicates that the attack was targeting users in Asia with fake websites customized for English, Korean, Simplified Chinese and Japanese. Most impacted users were in Bangladesh, Japan, and South Korea.

Our research revealed that the malware (sic) contains Android application IDs for popular mobile banking and game applications in South Korea. The malware is most prevalent in South Korea, and Korean is the first language targeted in HTML and test.dex. Based on our findings, it appears the malicious app was originally distributed to South Korean targets. Support was then added for Traditional Chinese, English, and Japanese, broadening its target base in the Asian region.

The dreaded DNS hijacking malware was originally designed to steal users login credentials and the secret code for two-factor authentication from Android devices, it has evolved and recently was spotted targeting iOS devices as well as desktop users.

In April 2018, Kaspersky Lab published a blog post titled Roaming Mantis uses DNS hijacking to infect Android smartphones. Roaming Mantis uses Android malware which is designed to spread via DNS hijacking and targets Android devices. reads the analysis published by Kaspersky.

In May, while monitoring Roaming Mantis, aka MoqHao and XLoader, we observed significant changes in their M.O. The groups activity expanded geographically and they broadened their attack/evasion methods. Their landing pages and malicious apk files now support 27 languages covering Europe and the Middle East. In addition, the criminals added a phishing option for iOS devices, and crypto-mining capabilities for the PC.

Operators behind the Roaming Mantis malware recently added the support for 27 languages to broaden their operations.

The versions of the Roaming Mantis malware continue to be s...


Facebook App For Android Is Asking For Superuser Permission "IndyWatch Feed Tech"

Facebooks Android App users freak out as the app is asking for superuser privileges

Users of the official Facebook Android app are being asked something unusual from May 17th. The app is asking for Superuser permissions to the users phones. In other words, the official Facebook Android app is asking the users to grant the app full access to their devices forever. This pop-up request has created a lot of unrest among the users.

Apparently, for the past couple of days, Facebooks Android app (com.facebook.katana) has been asking for superuser access to users devices. However, if a user tries to deny this request, it still continues asking until the user grants permission. This has led to panic among users who took to various internet forums looking for an explanation for the suspicious pop-ups.

Today I was browsing Facebook when suddenly I got a superuser request popup, one user wrote on XDA developer forums. Could anyone explain why Facebook needs SU permissions?

Another user commented, Same happened to me too. Started yesterday afternoon. Facebook last updated 1 day ago, so it must have to do something with new version.

Also, users from France, Australia, and the UK confirmed in the same thread that they too received the same pop-up from Facebook to grant root access.

Several Android security researchers who spoke with Bleeping Computer believe that the pop-ups are appearing because of a coding error.

Avast mobile security researcher Nikolaos Chrysaidos who took a look at the Facebooks app source code told Bleeping Computer that it could most probably be a coding error. WhiteOps SDK, used for detecting ad fraud, is said to be the reason behind this Superuser permission.

He said, The dialog started popping up on users that are in the beta channel. Along with other various checks. Facebook is probably integrating WhiteOps SDK, and they forgot to re-implement the ROOT checki...


HBO Is Shooting Multiple Endings For The Games of Thrones Finale Season 8 "IndyWatch Feed Tech"

Game of Thrones is shooting multiple endings, actor Emilia Clarke says

Game of Thrones, one of the most popular TV show is no stranger to illegal downloads and streams on the Internet. Not only this, the TV show has also been a victim of an array of hacks and early leaks of episodes.

As a result, HBO, the popular entertainment channel that airs Games of Thrones, has worked out a strategy and decided to shoot multiple endings for the Grand Finale Season 8 of the show, mentions a report via UberGizmo. This way they hope to not only confuse hackers and prevent spoilers from leaking online (again) but also keep Game of Thrones fans guessing about what will happen next.

This was disclosed by Emilia Clarke, best known as Daenerys Targaryen on the show, who told The Hollywood Reporter, that even the cast of the show is unaware what the creators have planned. I dont know that I even do now. Im being serious. I think theyre filming a bunch of stuff and theyre not telling us. Im being serious. Im being deadly serious. I think that they dont even trust us, Clarke said.

She also added that multiple endings are being filmed so that even the cast doesnt know which one is the real ending.Theres lots of different endings that could happen; I think were doing all of them and we arent being told which is actually whats going to happen.

HBO has plans to make the Game of Thrones Season 8 finale the most remembered season of the show. And it would not be wrong on their part to adopt such a strategy considering the many plot twists and surprises that the show has, but also the fact that the entire scripts of Game of Thrones have been leaked online many times before.

The eighth and final season of Game of Thrones, will be filmed across many different countries like Northern Ireland, Spain, Croatia, and Iceland. The series will conclude with its eighth season premiering in 2019.

The post HBO Is Shooting Multiple Endings For The Games of Thrones Finale Season 8 appeared first on TechWorm.


Users of Child Surveillance App TeenSafe Suffer Data Breach "IndyWatch Feed Tech"

ZDNet reports

A server stored teenagers' Apple ID email addresses and plaintext passwords [...] At least one server used by an app for parents to monitor their teenagers' phone activity has leaked tens of thousands of accounts of both parents and children.

[...] the Los Angeles, Calif.-based company left its servers, hosted on Amazon's cloud, unprotected and accessible by anyone without a password.

[...] The database stores the parent's email address associated with TeenSafe, as well as their corresponding child's Apple ID email address. It also includes the child's device name -- which is often just their name -- and their device's unique identifier. The data contains the plaintext passwords for the child's Apple ID. Because the app requires that two-factor authentication is turned off, a malicious actor viewing this data only needs to use the credentials to break into the child's account to access their personal content data.

"Technology has brought with it a world your child might not be ready for," the company tells us in a video. "Begin a free trial today!"

TeenSafe home page (archives and more archives)

Original Submission

Read more of this story at SoylentNews.


Links 21/5/2018: Linux 4.17 RC6, GIMP 2.10.2 "IndyWatch Feed Tech"

GNOME bluefish



  • GNU/Linux vs. Unix: Whats the difference?

    If you are a software developer in your 20s or 30s, youve grown up in a world dominated by Linux. It has been a significant player in the data center for decades, and while its hard to find definitive operating system market share reports, Linuxs share of data center operating systems could be as high as 70%, with Windows variants carrying nearly all the remaining percentage. Developers using any major public cloud can expect the target system will run Linux. Evidence that Linux is everywhere has grown in recent years when you add in Android and Linux-based embedded systems in smartphones, TVs, automobiles, and many other devices.

    Even so, most software developers, even those who have grown up during this venerable Linux revolution have at least heard of Unix. It sounds similar to Linux, and youve probably heard people use these terms interchangeably. Or maybe youve heard Linux called a Unix-like operating system.

    So, what is this Unix? The caricatures speak of wizard-like graybeards sitting behind glowing green screens, writing C code and shell scripts, powered by old-fashioned, drip-brewed coffee. But Unix has a much richer history beyond those bearded C programmers from the 1970s. While articles detailing the history of Unix and Unix vs. Linux comparisons abound, this article will offer a high-level background and a list of major differences between these complementary worlds.

  • Kernel Space



Kodi-Addon Developer Gives Up Piracy Defense Due to Lack of Funds "IndyWatch Feed Tech"

Last year, American satellite and broadcast provider Dish Network targeted two well-known players in the third-party Kodi add-on ecosystem.

In a complaint filed in a federal court in Texas, add-on ZemTV and the TVAddons library were accused of copyright infringement, with both facing up to $150,000 for each offense.

While TVAddons operator Adam Lackman responded to the allegations last week, ZemTVs developer Shani decided not to reply.

Shahjahan Durrani, Shani for short, never denied that he was the driving force behind the Kodi-addons ZemTV, LiveStreamsPro, and F4MProxy. While the London-based developer had never set foot in Texas, he initially planned to put up a defense. Financially, however, this was a problem.

ZemTVs developer launched a fundraiser last fall to crowdsource the legal battle. While he was able to raise close to 1,000, the legal costs already exceeded that the case even got fully underway.

Without the ability to pay the legal costs Shani is unable to put up a proper defense. But speaking with TorrentFreak, he explains that after the motion to dismiss was denied, he didnt have much hope for a fair trial anyway.

I was shocked and disappointed, not only by reading that the court dismissed my jurisdiction appeal, they did so with just one sentence. It seems unfair and doesnt give any confidence to me that the court/judge would be fair, Shani tells us.

This left the developer with two options. Find a way to fund the legal battle, money which may never be recovered, or give up the fight and face a default judgment. Shani chose the latter option.

Shani told his attorney Erin Russel to cease all activity on the case and to take no further steps on his behalf.

I dont have enough resources to fight this case completely with four kids that I am raising and anything more I do will be seem to be submitting to the US Courts which I am not going to do unless I have enough money to fight the case, the developer wrote in an email to Russel.

The attorney informed the court of this decision late last week and withdrew from the case.

This means that the lawsuit is steering towards a default judgment, and indeed, Dish has al...


How to create FreeNAS Jails with iocage "IndyWatch Feed Tech"

How do I install and use a FreeBSD jail manage called iocage on FreeNAS server from the command line? How do I create FreeNAS jail with iocage command?

The post How to create FreeNAS Jails with iocage appeared first on nixCraft.


Parrot 4.0 is out "IndyWatch Feed Tech"

Parrot 4.0 has been released. Parrot is a security-oriented distribution aimed at penetration tests and digital forensics analysis, with additional tools to preserve privacy. "On Parrot 4.0 we decided to provide netinstall images too as we would like people to use Parrot not only as a pentest distribution, but also as a framework to build their very own working environment with ease." Docker templates are also available.


Fortnite is coming to Android, but malicious fake apps are already there "IndyWatch Feed Tech"

Android users eager to play the increasingly popular Fortnite survival game on their mobile devices are being targeted left and right with malicious apps masquerading as the game or apps related to it. What is Fortnite? Fortnite is a co-op sandbox survival game published by Epic Games. It was released for Microsoft Windows, macOS, PlayStation 4, and Xbox One in July 2017 and, more recently, for iOS. Its popularity is steadily rising and Epic has More

The post Fortnite is coming to Android, but malicious fake apps are already there appeared first on Help Net Security.


The Why Factor "IndyWatch Feed Tech"

Im excited to announce my interview on the BBC World Service is airing around the world today multiple times to millions of people. My 4-min section on #transhumanism starts at 10:50.

Why do people chase immortality? We those who believe science is close to beating death.


Theresa May: Use AI to Reduce Deaths From Cancer "IndyWatch Feed Tech"

UK Prime Minister Theresa May is urging the use of artificial intelligence to help diagnose cancer:

The diagnosis of cancer and other diseases in the UK can be transformed by using artificial intelligence, Theresa May is to say. The NHS and technology companies should use AI as a "new weapon" in research, the PM will urge in a speech later.

Experts say it can be used to help prevent 22,000 cancer deaths a year by 2033 while aiding the fight against heart disease, diabetes and dementia.

High-skilled science jobs will also be created, Mrs May is to pledge. Speaking in Macclesfield, Mrs May will say: "Late diagnosis of otherwise treatable illnesses is one of the biggest causes of avoidable deaths. "And the development of smart technologies to analyse great quantities of data quickly and with a higher degree of accuracy than is possible by human beings opens up a whole new field of medical research."

Also at The Financial Times and The Guardian.

Original Submission

Read more of this story at SoylentNews.


Investigating the Tiny Salvaged UPS from a Lightbulb "IndyWatch Feed Tech"

Recently I had the opportunity to do a teardown of a battery-backed LED bulb, and found some interesting details on how the device operated. Essentially, the bulb contained a low voltage DC uninterruptible power supply that would automatically switch between AC power and internal battery as needed. The implications of this seemed pretty exciting. For around $12 at big box retailers, this little bulb could be a cheap and convenient solution for providing fault tolerant power to microcontrollers and other low-power devices.

The teardown was a runaway success, with quite a bit of discussion of the UPS idea specifically. Some people hated it, others loved it. But as weve come to expect from Hackaday readers, the comments from both sides of the aisle contained keen observations and invaluable real-world experience. From the safety of the device to the accuracy of the manufacturers claims, it seems like every element of the product was addressed.

I had ended the teardown with a promise that Id continue experimenting with the tiny salvaged UPS, but even if I hadnt, with so much feedback it seemed revisiting the subject was all but a necessity. It this little UPS really viable? Is it too dangerous to safely implement in y...


[CVE-2018-8012] Apache ZooKeeper Quorum Peer mutual authentication "IndyWatch Feed Tech"

Posted by Patrick Hunt on May 21

CVE-2018-8012: Apache ZooKeeper Quorum Peer mutual authentication

Severity: Critical

The Apache Software Foundation

Versions Affected:
ZooKeeper prior to 3.4.10
ZooKeeper 3.5.0-alpha through 3.5.3-beta
The unsupported ZooKeeper 1.x through 3.3.x versions may be also affected

No authentication/authorization is enforced when a server attempts to join
a quorum. As a result an arbitrary end point could join the cluster and...


Japan: Directorate for Signals Intelligence "IndyWatch Feed Tech"

Via: The Intercept: The directorate has a history that dates back to the 1950s; its role is to eavesdrop on communications. But its operations remain so highly classified that the Japanese government has disclosed little about its work even the location of its headquarters. Most Japanese officials, except for a select few of the []


DragonFlyBSD 5.3 Works Towards Performance Improvements "IndyWatch Feed Tech"

Given that DragonFlyBSD recently landed some SMP performance improvements and other performance optimizations in its kernel for 5.3-DEVELOPMENT but as well finished tidying up its Spectre mitigation, this weekend I spent some time running some benchmarks on DragonFlyBSD 5.2 and 5.3-DEVELOPMENT to see how the performance has shifted for an Intel Xeon system.


Progressive groups launch petition for government to break up Facebook "IndyWatch Feed Tech"

Left-leaning groups on Monday launched a campaign advocating for the government to break up Facebook. The groups, which include the Content Creators Coalition, Demand Progress and the Open Markets Institute, are urging the Federal Trade Commission&...


Microsoft Makes Inroads With U.S. Spy Agencies "IndyWatch Feed Tech"

Microsoft has secured a potentially lucrative agreement that makes the full suite of the tech giant's cloud-computing platform available to 17 U.S. intelligence agencies, executives said recently, moving agencies' computer systems onto Office 365 applications and adding certain cloud-based applications not previously available to them.

The agreement could strengthen Microsoft's prospects for winning government business at a time when it is locked in competition with some of the world's biggest tech companies for a Pentagon cloud-computing contract that is expected to be worth billions.

For years, Amazon Web Services, a subsidiary of that provides cloud computing for businesses and government agencies, has been the primary provider of cloud services to U.S. intelligence agencies, thanks to a $600 million contract with the CIA. (Amazon founder Jeffrey Bezos also owns The Washington Post.)

That remains the case after the recent agreement. Still, executives from Microsoft framed the contract agreement as an "awakening."

"This is a huge win from a Microsoft perspective," said Dana Barnes, vice president of the company's joint and defense agencies business unit. "It's kind of an awakening as far as the intelligence community is concerned that you can't be a one-cloud community."

Original Submission

Read more of this story at SoylentNews.


Friday Free Software Directory IRC meetup time: May 25th starting at 12:00 p.m. EDT/16:00 UTC "IndyWatch Feed Tech"

Help improve the Free Software Directory by adding new entries and updating existing ones. Every Friday we meet on IRC in the #fsf channel on

When a user comes to the Directory, they know that everything in it is free software, has only free dependencies, and runs on a free OS. With over 16,000 entries, it is a massive repository of information about free software.

While the Directory has been and continues to be a great resource to the world for many years now, it has the potential to be a resource of even greater value. But it needs your help! And since it's a MediaWiki instance, it's easy for anyone to edit and contribute to the Directory.

40 years ago, American management consultant Marilyn Loden first coined the term "glass ceiling" to describe invisible career barriers for women at a panel discussion. Despite the passing of two generations, Loden notes that the matter is still very alive, which readily displays how insidious a problem we have. To honor Loden's contribution, this week's theme for the Directory meetup is business software.

If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting. To see the meeting start time in your time zone, run this in GNU bash: date --date='TZ="America/New_York" 12:00 this Fri'


How NASA Will Unlock the Secrets of Quantum Mechanics Aboard the ISS "IndyWatch Feed Tech"

An Antares rocket launched from Virginia before sunrise this morning and is on its way to the International Space Station. Its 7,400 pounds of cargo include an experiment that will chill atoms to just about absolute zerocolder than the vacuum of space itself.

The Cold Atom Laboratory (CAL) is set to create Bose-Einstein condensates on board the ISS. But whats a Bose-Einstein condensate? And why make it in space?

Essentially, its going to allow us to do different kinds of things than wed be able to do on Earth, Gretchen Campbell, co-director of the University of Marylands Joint Quantum Institute, told Gizmodo.


Microsoft buys Semantic Machines to make AI sound more human "IndyWatch Feed Tech"

Microsoft has purchased startup company Semantic Machines in an effort to make artificial intelligence bots sound more human. The Berkeley, California-based business focuses on contextual understanding of conversation.

Previously, the firm has worked with Apple on speech recognition technology for Siri. Semanitc Machines is lead by professor Dan Klein of UC Berkeley and professor Percy Liang of Standford University in addition to Apples former chief speech scientist Larry Gillick.

Microsoft has been working on speech recognition and natural language processing for nearly two decades now. As Cortana has gained a more prominent role in recent years, Redmond is aiming to improve the accuracy and fluency of its assistant.


Looking Ahead To The Linux 4.18 Kernel "IndyWatch Feed Tech"

There still are several weeks to go until the Linux 4.17 kernel will be officially released and for that to initiate the Linux 4.18 merge window, but we already know some of the features coming to this next kernel cycle as well as an idea for some other work that may potentially land...


Chrome to dynamically point out Not secure HTTP sites "IndyWatch Feed Tech"

Google expects HTTPS to become the default, and is preparing users for it by slowly moving Chrome towards showing only negative security indicators. Googles own numbers showed back in February that 68% of Chrome traffic on both Android and Windows was encrypted, as was 78% of Chrome traffic on both Chrome OS and Mac. By now, these numbers are surely even higher. Users should expect that the web is safe by default, and theyll be More

The post Chrome to dynamically point out Not secure HTTP sites appeared first on Help Net Security.


Wireless Headphone Hack Dangles Batteries Like Earrings "IndyWatch Feed Tech"

Koss Porta Pro headphones are something of a rarity in the world of audio gear: theyre widely regarded as sounding great, but dont cost an exorbitant amount of money. Since the line was introduced in 1984, theyve been the go-to headphones for those who dont subscribe to the idea that you should have to take out a loan from the bank just to enjoy your music.

The Porta Pros are easy to take apart, and removing the old wire was no problem. He then cut the buds on the Bluetooth earbuds he had, with the intention of just striping the wires and soldering it up to the pads on the Porta speakers. But things didnt quite go as expected.

What [Jake] hadnt realized was that the battery for the Bluetooth earbuds wasnt in the main housing, the power comes from a tiny battery inside each bud. That meant he needed to keep the batteries connected even though the Porta Pro obviously doesnt have a spot to mount them. In the fu...


Graphene stimulation could selectively kill off cancer cells "IndyWatch Feed Tech"

A chance lab discovery is opening up the possibility for wide-scale improvements in drug screening, application of selective painkillers, and selectively nuking cancer cells. The mystery material? Graphene, a semi-metal thats composed of a single layer of carbon atoms. Its already being used to make flexible OLED displays and reduce the energy costs of desalination, but its potential benefits for the medical field look promising too.

It began with a theory scientists at the University of California knew graphene could convert light into electricity, and wondered whether that electricity had the capacity to stimulate human cells. Graphene is extremely sensitive to light (1,000 times more than traditional digital cameras and smartphones) and after experimenting with different light intensities, Alex Savchenko and his team discovered that cells could indeed be stimulated via optical graphene stimulation.

I was looking at the microscopes computer screen and Im turning the knob for light intensity and I see the cells start beating faster, he said. I showed that to our grad students and they were yelling and jumping and asking if they could turn the knob. We had never seen this possibility of controlling cell contraction.


Blood from umbilical cord may help fix your brain after a stroke "IndyWatch Feed Tech"

Ten people have received infusions of umbilical cord blood days after having a stroke, and they seem to have recovered better than would normally be expected.


Mnuchin urges antitrust review of big tech amid Google scrutiny "IndyWatch Feed Tech"

Treasury Secretary Steven Mnuchin on Monday encouraged the Department of Justice to review major technology companies like Google over concerns related to the potential harm they pose to market competition. These issues deserve to be reviewed...


A German Team Is Now Trying to Make the Impossible EmDrive Engine "IndyWatch Feed Tech"

German physicists launched the SpaceDrive project to explore possible sources of error in EmDrive experiments. Their first experiment identified a possible source of false positives in past successful EmDrive tests.


Distribution Release: Bodhi Linux 5.0.0 Alpha1 "IndyWatch Feed Tech"

Jeff Hoogland has announced an early development snapshot of Bodhi Linux 5.0.0. The new alpha release is based on Ubuntu 18.04 LTS and runs the Moksha desktop environment, which is a fork of Enlightenment. "Some highlights about these 5.0.0 ISO images: Ubuntu 18.04 base; Moksha 0.3.0 testing release;....


DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide "IndyWatch Feed Tech"

Widespread routers' DNS hijacking malware that recently found targeting Android devices has now been upgraded its capabilities to target iOS devices as well as desktop users. Dubbed Roaming Mantis, the malware was initially found hijacking Internet routers last month to distribute Android banking malware designed to steal users' login credentials and the secret code for two-factor


USB Audio Class 3.0 Improvements Coming To Linux 4.18 "IndyWatch Feed Tech"

With the recently minted Linux 4.17 kernel there was initial USB Audio Class 3.0 support for this audio-over-USB specification while with Linux 4.18 that UA3 support will be further enhanced...


Top 5 Champions for Beginners in League of Legends "IndyWatch Feed Tech"

Do you want to play League of Legends and do not know which Champion is right for you? You have bought a lol account las but do not understand which character you need to deal with? Find out who are the best Champions to learn how to play LoL and find the character that will make you love this game.


Vastayas Monkey King is one of the most interesting Champions youll discover in League of Legends. Do not be fooled by its rugged appearance: Wukong is a ferocious warrior with unexpected talents. Wukong was mentored by Master Champion Yi and uses Wuju fighting art in his bouts. Its passive is Stone Skin, a skill that increases the Armor and Magic Resistance of this warrior. One of his best skills is the Decoy, which makes Wukong invisible for a short time. This ability can help you to escape from enemies or to initiate a surprise attack (especially if combined with the ability of Cloud Flare, a Physical Damage attack of up to 2 nearby enemies).


This is not a girl like the others. Annie is also known as the Dark Child and she has several skills that make her a very difficult enemy to face in battle. Annie is a frightening sorceress, able to make difficult the opponents game with Pyromania (her passive of stunning) or to destroy with fire all the enemies in the area. Magic Damage is with this girl, but its her stunning ability that makes her really popular. And how to forget her lethal skill called Summon: Tibbers? Tibbers is her teddy bear and Annie manages to bring her great friend to life. With this ability, Tibbers attacks and burns everyone who is close to her.


A man of honor and loyalty, Garen, is the right Champion for anyone who has always enjoyed playing as a warrior or soldier. A great choice for tank, Garen has life regeneration as a passive and his Armor and Magical Resistance increase passively with slaughter of his opponents. Judgment is a sinister ability, which causes the warrior to dance mortally with his sword, dealing damage and reducing the armor of enemies. His best skill is Demacian Justice, who can turn the game against the opposing Champion who has made more recent killings. With the power, Garen deals damage based on Life that his target has already lost.


Morgana is master of the black arts and will do anything to stop the advance of enemies. He is a specialist in causing Magical Damage, either by cursing an area with his Dreaded Solo ability or by firing black magic spheres that inflict damage and immobilize an enemy (Dark Link ability). Your Black Shield skill is useful for protecting your team members by placing a barrier that absorbs Magic Damage and prevents disarray. Morgana has Magic Vampirism and her passive reflects that t...


Security updates for Monday "IndyWatch Feed Tech"

Security updates have been issued by Arch Linux (lib32-curl, lib32-libcurl-compat, lib32-libcurl-gnutls, libcurl-compat, and libcurl-gnutls), CentOS (firefox), Debian (imagemagick), Fedora (exiv2, LibRaw, and love), Gentoo (chromium), Mageia (kernel, librelp, and miniupnpc), openSUSE (curl, enigmail, ghostscript, libvorbis, lilypond, and thunderbird), Red Hat (Red Hat OpenStack Platform director), and Ubuntu (firefox).


Study: Bitcoin Network Uses at Least 2.55 GW of Electricity "IndyWatch Feed Tech"

According to a press release carried by Eurekalert

In the first rigorously peer-reviewed article quantifying Bitcoin's energy requirements, a Commentary appearing May 16 in the journal Joule, financial economist and blockchain specialist Alex de Vries uses a new methodology to pinpoint where Bitcoin's electric energy consumption is headed and how soon it might get there.

The abstract of the article says

The Bitcoin network can be estimated to consume at least 2.55 gigawatts of electricity currently, and potentially 7.67 gigawatts in the future, making it comparable with countries such as Ireland (3.1 gigawatts) and Austria (8.2 gigawatts). [...]

The author offers a caveat:

[...] all of the methods discussed assume rational agents. There may be various reasons for an agent to mine even when this isn't profitable, and in some cases costs may not play a role at all when machines and/or electricity are stolen or abused.

[Other] reasons for an agent to mine Bitcoin at a loss might include [...] being able to obtain Bitcoin completely anonymously, libertarian ideology [...] or speculative reasons.

Original Submission

Read more of this story at SoylentNews.


Google awarded a young expert a total of $36,337 for an RCE in the Google App Engine "IndyWatch Feed Tech"

Google awarded the 18-year-old student Ezequiel Pereira a total of $36,337 for the discovery of a critical remote code execution vulnerability that affected the Google App Engine.

The Google App Engine is a framework that allows Google users to develop and host web applications on a fully managed serverless platform.

In February, Pereira gained access to a non-production Google App Engine development environment, then he discovered that it was possible to use some of Googles internal APIs.

Pereira ethically reported the issue through the Googles Vulnerability Reward Program (VRP). The experts at Google ranked the flaw as a P1 priority, a level that is assigned to vulnerabilities that could have a significant impact on a large number of users and that for this reason must be addressed as soon as possible.

Meantime Pereira continued his test and submitted a second report to Google after discovering further issues, then Google invited Pereira to stop his activities due to the risk to easily break something using these internal APIs.

Google security team discovered that the flaw reported by the youngster could led to remote code execution.

Google App Engine

Pereira published a detailed analysis of its finding after Google has fixed them and awarded him.

In early 2018 I got access to a non-production Google App Engine deployment environment, where I could use internal APIs and it was considered as Remote Code Execution due to the way Google works. Thanks to this I got a reward of $36,337 as part of Google Vulnerability Rewards Program. reads the blog post published by the researcher.

Some time ago, I noticed every Google App Engine (GAE) application replied to every HTTP request with a X-Cloud-Trace-Context header, so I assumed any website returning that header is probably running on GAE.
Thanks to that, I learned itself runs on GAE, but it can perform some actions that cannot be done anywhere else and common user applications cannot perform, so I tr...


Linux Foundation LFCE: Hugues Cloutre "IndyWatch Feed Tech"

Linux Foundation LFCE: Hugues Cloutre


Newly discovered copper and graphite combo could lead to more efficient lithium-ion batteries "IndyWatch Feed Tech"

A first-of-its-kind copper and graphite combination discovered in basic energy research at the U.S. Department of Energys Ames Laboratory could have implications for improving the energy efficiency of lithium-ion batteries, which include these components.

Were pretty excited by this, because we didnt expect it, said Pat Thiel, an Ames Laboratory scientist and Distinguished Professor of Chemistry and Materials Science and Engineering at Iowa State University. Copper doesnt seem to interact strongly or favorably with graphitic materials at all, so this was a big surprise. It really challenges us to understand the reasons and mechanisms involved.

The scientists bombarded graphite in an ultra-high vacuum environment with ions to create surface defects. Copper was then deposited on the ion-bombarded graphite while holding it at elevated temperature, at 600800 K. The synthetic route created multilayer copper islands that are completely covered by graphene layer(s).


Advanced biofuels can be produced extremely efficiently "IndyWatch Feed Tech"

A chance to switch to renewable sources for heating, electricity and fuel, while also providing new opportunities for several industries to produce large numbers of renewable products. This is the verdict of researchers from Chalmers University of Technology, Sweden, who now, after 10 years of energy research into gasification of biomass, see an array of new technological achievements.

How to implement a switch from fossil-fuels to renewables is a tricky issue for many industries. For heavy industries, such as oil refineries, or the paper and pulp industry, it is especially urgent to start moving, because investment cycles are so long. At the same time, it is important to get the investment right because you may be forced to replace boilers or facilities in advance, which means major financial costs. Thanks to long-term strategic efforts, researchers at Swedens Chalmers University of Technology have now paved the way for radical changes, which could be applied to new installations, as well as be implemented at thousands of existing plants around the globe.


See me speak at the Sunny Side Up Security breakfast event in London next month "IndyWatch Feed Tech"

If youre going to be in London in June, attending Infosec 2018, you may want to register for the Sunny Side Up Security breakfast at the Hilton Olympia (just next door to the Olympia Center where Infosec is being held).


Loss of marine habitats is threatening the global fishing industry new research "IndyWatch Feed Tech"

Seafood consumption is both a love and a necessity for hundreds of millions of people worldwide. And its supply is a key part of maintaining food security for the whole planet. But during a time of rapid population growth and increasing demand, stocks of wild fish and invertebrates (such as mussels and prawns) are declining.

The problem is that policies and plans designed to make sure there are enough fish and invertebrates almost exclusively target fishing activity. But we also need to protect the critical habitats that are essential for the sustainability of these stocks and fisheries.

Most species that are fished require more than a single to live and thrive. Atlantic cod (Gadus morhua), for example, spends its adult life shoaling in deep water where it lives, feeds and spawns. But juveniles require more stable habitat such as . So, if we want to manage fish and invertebrate stocks for sustainability reasons, it is essential to protect the supporting habitats of targeted species.


Explaining Efail and Why It Isnt the End of Email Privacy "IndyWatch Feed Tech"

Last week the PGPocalipse was all over the news Except that, well, it wasnt an apocalypse.

A team of researchers published a paper(PDF) where they describe how to decrypt a PGP encrypted email via a targeted attack. The research itself is pretty well documented and, from a security researcher perspective, its a good paper to read, especially the cryptography parts.

But we here at Hackaday were skeptical about media claims that Efail had broken PGP. Some media reports went as far as recommending everyone turn off PGP encryption on all email clients., but they werent able to back this recommendation up with firm reasoning. In fact, Efail isnt an immediate threat for the vast majority of people simply because an attacker must already have access to an encrypted email to use the exploit. Advising everyone to disable encryption all together just makes no sense.

Aside from the massive false alarm, Efail is a very interesting exploit to wrap your head around. Join me after the break as I walk through how it works, and what you can do to avoid it.

Efail Does Not  Directly Exploit PGP

In a nutshel...


Arizona Planning for Exodus of Californians to State in Event of Major Quake "IndyWatch Feed Tech"

Via: NBC: Government agencies, businesses and other organizations in Arizona plan to participate in an exercise to practice how the state would respond to a migration of 400,000 people following a catastrophic earthquake in Southern California. The Arizona Department of Emergency and Military Affairs says participants in the National Mass Care Exercise in the coming []


Zuckerberg's appearance before EU Parliament will be livestreamed "IndyWatch Feed Tech"

Mark Zuckerbergs meeting with the European Union Parliament will now be livestreamed after some legislators criticized initial plans for the hearing to be held behind closed doors.I have personally discussed with Facebook CEO Mr Zuckerberg...


Qualys Security Advisory - Procps-ng Audit Report "IndyWatch Feed Tech"

Posted by Qualys Security Advisory on May 21

Qualys Security Advisory

Procps-ng Audit Report


1. FUSE-backed /proc/PID/cmdline
2. Unprivileged process hiding
3. Local Privilege Escalation in top (Low Impact)
4. Denial of Service in ps
5. Local Privilege Escalation in libprocps (High Impact)
5.1. Vulnerability


What does rm -rf command do on a Linux or Unix "IndyWatch Feed Tech"

I am a new Linux sysadmin. What is the purpose of rm -rf command on a Linux? What does rm -rf command do on a Unix-like operating system?

The post What does rm -rf command do on a Linux or Unix appeared first on nixCraft.


Re: [ANNOUNCE] CVE-2018-1313: Apache Derby externally-controlled input vulnerability "IndyWatch Feed Tech"

Posted by Tomas Hoger on May 21

Thank you for your detailed reply. It addresses my questions.

FWIW, in this case, the change of the ping command handling is what I'd
view as the security fix. The change of the default security policy
would not be sufficient in deployments where custom security policy is
used and that policy is less restrictive than the new default policy
(even though it's maybe more restrictive than the old default).


Police use corporate 'Public Safety' apps to spy on everyone (Updated) "IndyWatch Feed Tech"

Law enforcement and more than one hundred colleges and universities have convinced their students to download 'public safety' apps that send tips to police in real-time.

The apps go by names like 'LiveSafe' and 'SafeTrek' and their selling point is, helping students feel safe.

These apps use GPS technology which allows law enforcement to monitor a students' location in real-time.

Update 5/21:

TeenSafe phone monitoring app leaked thousands of user passwords

An app called TeenSafe which lets parents spy on their child's text messages and phone calls stored their ID's and email addresses in plain text.

"TeenSafe, bills itself as a "secure" monitoring app for iOS and Android, which lets parents view their child's text messages and location, monitor who they're calling and when, access their web browsing history, and find out which apps they have installed."

"The database stores the parent's email address associated with TeenSafe, as well as their corresponding child's Apple ID email address. It also includes the child's device name -- which is often just their name -- and their device's unique identifier. The data contains the plain text passwords for the child's Apple ID. Because the app requires that two-factor authentication is turned off, a malicious actor viewing this data only needs to use the credentials to break into the child's account to access their personal content data."

As you will see from the videos below, playing to one's fear of crime and terrorism is a great marketing ploy.

Safe Trek's scare ads



Copyright May Extend to 144 Years "IndyWatch Feed Tech"

Almost exactly 20 years ago, Congress passed the Sonny Bono Copyright Term Extension Act, which extended the term of existing copyrights by 20 years. The Act was the 11th extension in the prior 40 years, timed perfectly to assure that certain famous works, including Mickey Mouse, would not pass into the public domain.

[...] Twenty years later, the fight for term extension has begun anew. Buried in an otherwise harmless act, passed by the House and now being considered in the Senate, this new bill purports to create a new digital performance rightbasically the right to control copies of recordings on any digital platform (ever hear of the internet?)for musical recordings made before 1972. These recordings would now have a new right, protected until 2067, which, for some, means a total term of protection of 144 years. The beneficiaries of this monopoly need do nothing to get the benefit of this gift. They dont have to make the work available. Nor do they have to register their claims in advance.

That this statute has nothing to do with the constitutional purpose of promot[ing] Progress is clear from its very title. The Compensating Legacy Artists for their Songs, Service, and Important Contributions to Society Act (or CLASSICS) is as blatant a gift without any public return as is conceivable. And it's not just a gift through cash; it's a gift through a monopoly regulation of speech. Archives with recordings of music from the 1930s or 1940s would now have to clear permission before streaming their musical content even if the underlying work was in the public domain.

Original Submission

Read more of this story at SoylentNews.


New Zealand: Northlanders Living in Cars as Housing Crisis Hits Hard "IndyWatch Feed Tech"

We had a couple with five children turn up to Playcentre. Theyre living in tents. They fled Wellington with a plan to build some sort of shack on a small piece of land that they bought a couple of valleys over from us. Until that happens: Tents. Both mum and dad had been in the []


Best Security Podcast: Smashing Security up for top award "IndyWatch Feed Tech"

Vote thumb

Smashing Security, the weekly cybersecurity podcast I co-host with Carole Theriault, has made the finals of the European Security Blogger Awards. Now all that we need is some people to vote for it.


[SECURITY] CVE-2018-8010: XXE vulnerability due to Apache Solr configset upload "IndyWatch Feed Tech"

Posted by Uwe Schindler on May 21

CVE-2018-8010: XXE vulnerability due to Apache Solr configset upload

Severity: High

The Apache Software Foundation

Versions Affected:
Solr 6.0.0 to 6.6.3
Solr 7.0.0 to 7.3.0

The details of this vulnerability were reported internally by one of Apache
Solr's committers.
This vulnerability relates to an XML external entity expansion (XXE) in Solr
config files (solrconfig.xml, schema.xml, managed-schema). In addition,...


Kernel prepatch 4.17-rc6 "IndyWatch Feed Tech"

The 4.17-rc6 kernel prepatch is out. "So nothing special to report. Go read the shortlog, pull the changes, build, and test. It should all be good and pretty stable by this point."


Hacked Drupal sites involved in mining campaigns, RATs distributions, scams "IndyWatch Feed Tech"

Crooks are exploiting known vulnerabilities in the popular Drupal CMS such as Drupalgeddon2 and Drupalgeddon3 to deliver cryptocurrency miners, remote administration tools (RATs) and tech support scams.

Security experts at Malwarebytes reported that compromised Drupal websites are used to deliver cryptocurrency miners, remote administration tools (RATs) and tech support scams.

Crooks are exploiting known vulnerabilities in the popular Drupal CMS such as Drupalgeddon2 and Drupalgeddon3 to deliver cryptocurrency miners, remote administration tools (RATs) and tech support scams.

The two remote code execution security vulnerabilities, tracked as CVE-2018-7600 and CVE-2018-7602 have been already fixed by Drupal developers.

At the end of March, the Drupal Security Team confirmed that a highly critical vulnerability (dubbed Drupalgeddon2), tracked as CVE-2018-7600, was affecting Drupal 7 and 8 core and announced the availability of security updates on March 28th.

The vulnerability was discovered by the Drupal developers Jasper Mattsson.

Both Drupal 8.3.x and 8.4.x are no more supported, but due to the severity of the flaw, the Drupal Security Team decided to address it with specific security updates and experts called it Drupalgeddon2.

The development team released the security update in time to address CVE-2018-7600.

After the publication of a working Proof-Of-Concept for Drupalgeddon2 on GitHub for educational or information purposes, experts started observing bad actors attempting to exploit the flaw.

A week after the release of the security update, the experts at security firm Check Point along with Drupal experts at Dofinity analyzed the CMS to analyzed the Drupalgeddon2 vulnerability and published a technical report on the flaw.

After the publication of the report. the expert Vitalii Rudnykh shared a working...


The ethical and legal dilemmas of threat researchers "IndyWatch Feed Tech"

Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter threat researchers, the advanced scouts of cybersecurity. They are becoming more numerous and conspicuous as more intelligence on illicit hacker activity is demanded. Threat researchers trawl through the dark web, pick apart malware, reverse engineer exploits, track outbreaks across the Internet, and set up honeypots to surveil attacker activity. They also More

The post The ethical and legal dilemmas of threat researchers appeared first on Help Net Security.


Are you ready for the GDPR deadline? "IndyWatch Feed Tech"

The General Data Protection Regulation (GDPR) compliance deadline looms four days away, but only 29 percent of companies will be ready, according to a new global survey by ISACA. Not only are most unprepared for the deadline, but only around half of the companies surveyed (52 percent) expect to be compliant by end-of-year 2018, and 31 percent do not know when they will be fully compliant. Top GDPR challenges According to the research, the top More

The post Are you ready for the GDPR deadline? appeared first on Help Net Security.


Simulating a Medical Device Interaction with a Biological System "IndyWatch Feed Tech"

Join this webinar to learn how to model a medical device interacting with physiology

If you are interested in learning how to model a medical device interacting with physiology, then tune into this webinar featuring guest speaker Paul Belk from Abbott Medical.

Modeling physiologic systems uses the same principles applied to other multiphysics applications, but it is often complicated by the challenges in characterizing the properties of the biological tissues and processes involved. These challenges make it even more important to be able to analyze quantitatively through numerical simulation the interactions between the variable biological phenomena and the device.

In this webinar, we will present a model of catheter ablation from a large vessel. We will begin by setting up the coupled physics, including electric currents, laminar flow of blood, and heat transfer by conduction and convection. We will then show how to characterize the properties of the tissues involved and how the COMSOL Multiphysics software can be used to simulate a closed-loop control system to stabilize the energy flow delivered to the surrounding tissues. The simulation results will be used to characterize how intended physiologic results can be affected by uncontrolled physiologic changes and which control systems are most robust.

You can ask questions at the end of the webinar during the Q&A session. 

Localized heating of biological tissue due to catheter ablation

Paul Belk, Abbott Corporation

Paul Belk has a PhD in medical physics and is a principal engineer at Abbott Corporation, where he works on the development of diagnostic and therapeutic medical devices. He has been using simulation of all types for more than 20 years as an integral part of the research and development process. For the past four years, he has been using the COMSOL Multphys...


Dont let attackers worm their way in: Increase password security "IndyWatch Feed Tech"

Passwords are inherently the weakest form of authentication, yet they remain the most prevalent. Many organizations realize that moving beyond this single point of vulnerability is required but replacing passwords or adding multi-factor authentication (MFA) to all use cases can be daunting if not impossible. As such, it is undoubtedly important to enforce strong password policies to ensure that this first and often times only line of defense can withstand common attacks. In recent years, More

The post Dont let attackers worm their way in: Increase password security appeared first on Help Net Security.


Ditch The Tapes, Put An Android In Your Deck "IndyWatch Feed Tech"

While we here at Hackaday never question why an individual took on a particular project, it surely doesnt stop our beloved readers from grabbing their pitchforks and demanding such answers in the comments. Perhaps no posts generate more of this sort of furore than the ones which feature old audio gear infused with modern hardware. In almost every case the answer is the same: the person liked the look and feel of vintage hardware, but didnt want to be limited to antiquated media.

That sentiment is perhaps perfectly personified by the TapeLess Deck Project, created by [Artur Mynarz]. His creations combine vintage cassette decks with an Android phone small enough to fit behind the tape door. An Android application which mimics the look of a playing tape, complete with hand written track info, completes the illusion.

The output from the phone is tied into the deck where the audio signal from the tape head would have been, so the volume controls and VU meters still work as expected. Watching the meters bounce around while the animated tape plays on the screen really does look incredibly slick...

Ryzen 7 2700 / Ryzen 7 2700X / Core i7 8700K Linux Gaming Performance With RX Vega 64, GTX 1080 Ti "IndyWatch Feed Tech"

With the Linux benchmarks of the Ryzen 7 2700 last week I included a few Linux gaming benchmarks, but for those evaluating CPU options for your next Intel/AMD Linux gaming system upgrade, here is a much more thorough set of benchmarks from a wide variety of OpenGL and Vulkan powered Linux games. The Ryzen 7 2700, Ryzen 7 2700X, and Core i7 8700K processors were tested for this Ubuntu gaming comparison while testing with both a Radeon RX Vega 64 and GeForce GTX 1080 Ti.


Can a Quantum Drum Vibrate and Stand Still at the Same Time? "IndyWatch Feed Tech"

Submitted via IRC for Fnord666

Researchers have studied how a 'drumstick' made of light could make a microscopic 'drum' vibrate and stand still at the same time.

A team of researchers from the UK and Australia have made a key step towards understanding the boundary between the quantum world and our everyday classical world.

Quantum mechanics is truly weird. Objects can behave like both particles and waves, and can be both here and there at the same time, defying our common sense. Such counterintuitive behaviour is typically confined to the microscopic realm and the question "why don't we see such behaviour in everyday objects?" challenges many scientists today.

Now, a team of researchers have developed a new technique to generate this type of quantum behaviour in the motion of a tiny drum just visible to the naked eye. The details of their research are published today in New Journal of Physics.

Project principal investigator, Dr Michael Vanner from the Quantum Measurement Lab at Imperial College London, said: "Such systems offer significant potential for the development of powerful new quantum-enhanced technologies, such as ultra-precise sensors, and new types of transducers.

[...] In the quantum world, a drum can vibrate and stand still at the same time. However, generating such quantum motion is very challenging. lead author of the project Dr Martin Ringbauer from the University of Queensland node of the Australian Research Council Centre for Engineered Quantum Systems, said: "You need a special kind of drumstick to make such a quantum vibration with our tiny drum."

In recent years, the emerging field of quantum optomechanics has made great progress towards the goal of a quantum drum using laser light as a type of drumstick. However, many challenges remain, so the authors' present study takes an unconventional approach.


Generation of Mechanical Interference Fringes by Multi-Photon Counting by M Ringbauer, T J Weinhold, L A Howard, A G White & M R Vanner is published in New Journal of Physics 20, 053042 (2018)



The Prominent Changes Of Phoronix Test Suite 8.0 "IndyWatch Feed Tech"

With development on Phoronix Test Suite 8.0 wrapping up for release in the coming weeks, here is a recap of some of the prominent changes for this huge update to our open-source, cross-platform benchmarking software...


Hands-On with First Lubuntu 18.10 Build Featuring the LXQt Desktop by Default "IndyWatch Feed Tech"

The Lubuntu development team promised to finally switch from LXDE (Lightweight X11 Desktop Environment) to the more modern and actively maintained LXQt (Lightweight Qt Desktop Environment), and the switch is now official.


IWOCL OpenCL 2018 Videos Start Appearing Online "IndyWatch Feed Tech"

Taking place last week in Oxford, UK was IWOCL 2018: the International Workshop on OpenCL. For those that couldn't make this compute conference, session videos have begun appearing online...


[SECURITY] [DSA 4205-1] Advance notification for upcoming end-of-life for "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on May 21

Debian Security Advisory DSA-4205-1 security () debian org Moritz Muehlenhoff
May 18, 2018

This is an advance notice that regular security support for Debian


Inside the training camp where Google shares its A.I. secrets with companies Alphabet invested in "IndyWatch Feed Tech"

The chairs were filled not with Gerards fellow Google employees but, instead, more than 100 engineers from about a dozen big privately held companies that Googles Alphabet had invested in.

As it battles to stand out in late-stage investing, Alphabets CapitalG is throwing a new machine learning marathon for its portfolio companies.


[SECURITY] [DSA 4204-1] imagemagick security update "IndyWatch Feed Tech"

Posted by Sebastien Delafond on May 21

Debian Security Advisory DSA-4204-1 security () debian org Sebastien Delafond
May 18, 2018

Package : imagemagick
CVE ID : CVE-2017-10995 CVE-2017-11533...


[SYSS-2018-007] ILIAS e-Learning - Reflected Cross-Site-Scripting "IndyWatch Feed Tech"

Posted by Moritz Bechler on May 21

Advisory ID: SYSS-2018-007
Product: ILIAS
Affected Version(s): 5.3.2, 5.2.14, 5.1.25
Tested Version(s): 5.3.2, 5.2.12
Vulnerability Type: Reflected Cross-Site-Scripting
Risk Level: MEDIUM
Solution Status: Fixed
Manufacturer Notification: 2018-03-29
Solution Date: 2018-04-25
Public Disclosure: 2018-05-18
CVE Reference: CVE-2018-10428
Author of Advisory: Moritz Bechler, SySS GmbH...


Tesla Partially Complies With GPL After Years of Complete Noncompliance "IndyWatch Feed Tech"

Electrek reports that Tesla is beginning compliance efforts with respect to their GPL redistribution of components such as Linux, Busybox, Buildroot, QT, and other components:

Tesla has been taking some flak for years now in the software community for using open source software without complying with the licenses. In a step toward compliance, Tesla is now releasing some parts of its software, which is going to be useful to Tesla hackers and security researchers.

Some of the copyright holders have been complaining that Tesla hasn't been complying with their licenses. Software Freedom Conservancy, a not-for-profit organization pushing for open source software, has been on Tesla's case for a while over the issue.

We had received multiple reports of a GPL violation regarding Tesla's Model S. Customers who purchased Tesla's Model S received on-board system(s) that contained BusyBox and Linux, but did not receive any source code, nor an offer for the source... We know that Tesla received useful GPL compliance advice from multiple organizations, in addition to us, over these years."

"Currently the material that is there is representative of the 2018.12 release, but it will be updated with new versions corresponding to new releases over time. Work is underway on preparing sources in other areas as well, together with a more coordinated information page. We wanted to let you know about this material as it is available now while work continues on the other parts. For further questions, please contact"

With the brilliance of Mr. Musk and his ample staff, one would think that they would have figured out their license obligations without literally years of outside help--many small all-volunteer projects do it seemingly effortlessly as a matter of course--but in that, one would be wrong.

Also submitted by canopic jug.



Want to Debug Latency? "IndyWatch Feed Tech"

Measuring latency and being able to react to latency issues are getting equally complex as our systems got more complex. This article will help you how to navigate yourself at a latency problem and what you need to put in place to effectively do so.


So, what is latency? Latency is how long it takes to do something. How long does it take to have a response back? How long does it take to process a message in a queue?


Singapore ISPs Block 53 Pirate Sites Following MPAA Legal Action "IndyWatch Feed Tech"

Under increasing pressure from copyright holders, in 2014 Singapore passed amendments to copyright law that allow ISPs to block pirate sites.

The prevalence of online piracy in Singapore turns customers away from legitimate content and adversely affects Singapores creative sector, said then Senior Minister of State for Law Indranee Rajah.

It can also undermine our reputation as a society that respects the protection of intellectual property.

After the amendments took effect in December 2014, there was a considerable pause before any websites were targeted. However, in September 2016, at the request of the MPA(A), became the first website ordered to be blocked under Singapores amended Copyright Act. The High Court subsequently ordering several major ISPs to disable access to the site.

A new wave of blocks announced this morning are the countrys most significant so far, with dozens of pirate sites targeted following a successful application by the MPAA earlier this year.

In total, 53 sites across 154 domains including those operated by The Pirate Bay plus KickassTorrents and Solarmovie variants have been rendered inaccessible by ISPs including Singtel, StarHub, M1, MyRepublic and ViewQwest.

In Singapore, these sites are responsible for a major portion of copyright infringement of films and television shows, an MPAA spokesman told The Straits Times (paywall).

This action by rights owners is necessary to protect the creative industry, enabling creators to create and keep their jobs, protect their works, and ensure the continued provision of high-quality content to audiences.

Before granting a blocking injunction, the High Court must satisfy itself that the proposed online locations meet the threshold of being flagrantly infringing. This means that a site like YouTube, which carries a lot of infringing content but is not dedicated to infringement, would not ordinarily get caught up in the dragnet.

Sites considered for blocking must have a primary purpose to infringe, a threshold that is tipped in copyright holders favor when the sites operators display a lack of respect for copyright law and have already had their domains blocked in other jurisdictions.

The Court also weighs a number of addit...


Almost Half of US Families Can't Afford Basics Like Rent and Food "IndyWatch Feed Tech"

"Nearly 51 million households don't earn enough to afford a monthly budget that includes housing, food, child care, health care, transportation and a cell phone, according to a study released Thursday by the United Way ALICE Project. That's 43% of households in the United States."

The figure includes the 16.1 million households living in poverty, as well as the 34.7 million families that the United Way has dubbed ALICE -- Asset Limited, Income Constrained, Employed. This group makes less than what's needed "to survive in the modern economy."

"Despite seemingly positive economic signs, the ALICE data shows that financial hardship is still a pervasive problem," said Stephanie Hoopes, the project's director.

California, New Mexico and Hawaii have the largest share of struggling families, at 49% each. North Dakota has the lowest at 32%.

Many of these folks are the nation's child care workers, home health aides, office assistants and store clerks, who work low-paying jobs and have little savings, the study noted. Some 66% of jobs in the US pay less than $20 an hour.

See also:

Original Submission

Read more of this story at SoylentNews.


Orbital ATK's OA-9E Resupply Mission to the ISS Set to Launch "IndyWatch Feed Tech"

Orbital ATK is launching its OA-9E Commercial Resupply Services mission to the International Space Station:

Early risers on the US East Coast might get a bit of a show tomorrow morning: private space company Orbital ATK will launch its Antares rocket with a Cygnus spacecraft at 4:39 AM EDT [08:39 UTC] from NASA's Wallops Flight Facility in Virginia.

The mission is the company's ninth flight for NASA, and is headed to the International Space Station, where it will drop off a 7,400 pounds of scientific equipment and supplies when it docks on Thursday, May 24th.

Alongside CubeSats, the Cold Atom Laboratory, and other cargo, the rocket will carry seeds for Plant Habitat-01, which will evaluate several types of Arabidopsis:

This time, the astronauts will plant six different types of Arabidopsis, a flowering plant that's closely related to cabbage and mustard. Five of the plant varieties have been genetically altered, either to affect they way the plants capture carbon or affect their ability to produce lignin, a fibrous substance that provides structural support for plants. The same varieties will be grown under Earth-gravity conditions at NASA's Kennedy Space Center in Florida.

After several weeks of growth, the zero-G plants will be harvested and shipped back to Earth for comparison. The plants' proteins will be analyzed at Pacific Northwest National Laboratory to see whether a particular genetic mix is better-suited for cultivation in space.

Live coverage at Spaceflight Now. Update: Launch has been pushed back 5 minutes (to the end of its launch window) at 4:44 AM EDT, 08:44 UTC. Update 2: Payload successfully separated around 08:51 UTC. NASA-TV coverage will include the solar panels being unfurled around 09:45 UTC, and a post-launch press conference.

Original Submission



RoMeLas Sideways Walking Robot Has Evolved More Limbs "IndyWatch Feed Tech"

Despite the success shown in prototypes from groups like Boston Dynamics, bipedal walking is still really hard to implement. When the robot lifts one leg, it has to shift its center of gravity over the other leg to avoid falling sideways.

The Autonomous Legged Personal Helper Robot with Enhanced Dynamics (ALPHRED) is getting around this problem by coming at it from a different angle. ALPHRED walks sideways and throws away the distinction between arms and legs.

The bot is RoMeLa at UCLAs latest evolution in their approach to traditional bipedal roadblocks. Sideways walking is something we covered when we talked about their previous version, NABi, which had only two legs. ALPHRED expands that to four limbs. As the video below shows, all four limbs can be used for walking using either a wide, stable sprawl or the limbs can reorient to a narrower dog or horse-like stance for faster running.

Beyond walking, one or two of the limbs can be put to use as hands to open a door or hand over a package, which is why they refer to them as limbs instead of legs or hands. Only an animation is shown of that configuration but RoMeLa is a robotics lab which we keep an eye on so well let you know if they demonstrate it.

The video goes on to show a neat actuator with active compliance which they call BEAR, Back-drivable Electromagnetic Actuator for Robots. A search turned up no further details but let us know in the comments if you have any. We also liked seeing how they use a speaker to give a rough idea of the amount of current being drawn. While its both practical and a hack, it also adds a nice sci-fi touch.


Internet Systems Consortium rolled out security updates to address 2 flaws in BIND DNS Software "IndyWatch Feed Tech"

On Friday, the Internet Systems Consortium (ISC) announced security updates for BIND DNS software that address two vulnerabilities rated with a medium severity rating.

Both vulnerabilities could be exploited by attackers to cause a denial-of-service (DoS) condition, the first issue tracked as CVE-2018-5737 can also cause severe operational problems such as degradation of the service.

A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off.  Additionally, problematic interaction between the serve-stale feature and NSEC aggressive negative caching can in some cases cause undesirable behavior from named, such as a recursion loop or excessive logging. reads the security advisory published by the ISC.

Deliberate exploitation of this condition could cause operational problems depending on the particular manifestation either degradation or denial of service. 

The flaw affects BIND 9.12.0 and 9.12.1 which permit recursion to clients and which have the max-stale-ttl parameter set to a non-zero value are at risk.

The Internet Systems Consortium (ISC) has addressed the flaw with the release of BIND 9.12.1-P2. Below the workaround provided by the organization:

  • Setting max-stalettl 0; in named.conf will prevent exploitation of this vulnerability (but will effectively disable the serve-stale feature.)
  • Setting stale-answer enable off; is not sufficient to prevent exploitation, max-stale-ttl needs to be set to zero.



China takes a critical first step toward landing on the far side of the Moon "IndyWatch Feed Tech"

Anyone home?

China takes a critical first step toward landing on the far side of the Moon.

The Queqiao spacecraft is now on its way toward L2.


Linux tail Command Tutorial for Beginners (5 Examples) "IndyWatch Feed Tech"

Sometimes you want to monitor what new information is being written to a file (think of log files), or for whatever reasons, want to access the last few lines of a file. Well, there's a command line utility that lets you do this in Linux, and it's call tail.

In this tutorial, we will discuss the basics of the tail command using some easy to understand examples. But before we do that, it's worth mentioning that all examples included in this article have been tested on Ubuntu 16.04 LTS.


What is CI/CD? Continuous Integration and Continuous Delivery Explained "IndyWatch Feed Tech"

Continuous integration (CI) and continuous delivery (CD) embody a culture, set of operating principles, and collection of practices that enable application development teams to deliver code changes more frequently and reliably. The implementation is also known as the CI/CD pipeline and is one of the best practices for devops teams to implement.


Top 10 Most Pirated Movies of The Week on BitTorrent 05/21/18 "IndyWatch Feed Tech"

Legendary Pictures/Universal Studios

This week we have two newcomers in our chart.

Pacific Rim: Uprising is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This weeks most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 () Pacific Rim: Uprising 5.8 / trailer
2 (2) Avengers: Infinity War (HDCam) 9.1 / trailer
3 () Deadpool 2 (HDTS) 8.3 / trailer
4 (1) Black Panther ...


Exclusive: Lessons From Airbnbs First Foray Into Urban Renewal "IndyWatch Feed Tech"

This is a nice start and recognizes that there is something important here that lacks successful monetization.

At its foundation, we have a natural community that has lost its fresh faces to the virtual natural communities in larger centers.  Replenishment becomes impossible.

We need a natural influx of newcomers, internal finance using the rule of twelve and fiat capital.  This would stimulate a recovery to the 150 population and support for sustainable local growing. It can be done but it will take example and education.

Exclusive: Lessons From Airbnbs First Foray Into Urban Renewal


Last year, Airbnb unveiled a community center designed to help revitalize a shrinking town in Japan. A year later, CPO Joe Gebbia shares what the company has learnedand what it has planned next. 



Global warming? The latest news tells a different story "IndyWatch Feed Tech"

Ah yes!  Just where did that global warming go when we needed it.  Yet it all fits within the expected channel for good statistical data.

What this makes clear though is that all the gains in global heat are now been lost quickly while the obvious markers will still be lagging.  It takes time to rebuild sea ice.

Right now I do expect shocks during the coming winter months and think the chance of being disappointed to be low.   The obvious shock will be suddenly frozen rivers comparable to the eighteenth century.

The scientific retreat from flawed climate dogma will be embarrassing and richly deserved.  Yet this climate cycle taught us a lot that was important to discover.  .. 

Global warming? The latest news tells a different story

May 1, 2018


Whats Worse: Unwanted Mutations or Unwanted Humans? - Facts So Romantic "IndyWatch Feed Tech"

Three of the rare Przewalskis horses that now roam the area near the Chernobyl nuclear plant.Photograph by Sergey Gaschak

After a fatal series of errors and malfunctions in the early morning of April 26, 1986, the core of the Chernobyl nuclear facility melted down and then exploded, killing 31 workers at the plant. The accident spewed massive amounts of radioactive material into the surrounding area, forcing a mass evacuation of the nearby villages. Many wild animals died from the direct toxicity of the radiation and almost 1,000 acres of the Red Forestnamed for the unusual color its trees turned after the disasterdied within months. The most radioactive human settlements were bulldozed and buried. (See the related story about the most radioactive part of the nuclear plant: Chernobyls Hot Mess, the Elephants Foot, Is Still Lethal.)

Checkpoints and fences were quickly put up around the vast contaminated region, stretching between northern Ukraine and southern Belarus. This became the exclusion zone, a region that has remained closed to most human activity for the past 28 years.

Yet the area is far from a barren wasteland. Instead it is a patchwork of hot zones of high radiation next to clean areas. Many
Read More

How a Ghanaian entrepreneur uses recycled plastic to make cheaper roads and building blocks "IndyWatch Feed Tech"

This is really promising. To start with it works.  That means we can set up a regulatory system in which all plastics made new are charged out a deposit per pound of plastic that it set to underwrite the whole underlying collection process.  We do this with glass bottles and plastic bottles and metal cans already.

Thus the processor uses the revenue from his product sales to support the manufacturing operation and pay for the equipment.

The bricks easily fits into the local building culture anywhere. There is no particular need for great strength either as the market for paving stone is unending.

How a Ghanaian entrepreneur uses recycled plastic to make cheaper roads and building block

Laying the recycled plastic-infused blocks in Ghana (Courtesy/Nelplast) 




Dolibarr XSS Injection vulnerability "IndyWatch Feed Tech"

Posted by Sysdream Labs on May 20

# [CVE-2018-10095] Dolibarr XSS Injection vulnerability

## Description

Dolibarr is an "Open Source ERP & CRM for Business" used by many
companies worldwide.

It is available through [GitHub](
or as distribution packages (e.g .deb package).


The application does not handle user input properly, allowing
client-side JavaScript code injection (XSS).


User input should...


[CVE-2018-10092] Dolibarr admin panel authenticated Remote Code Execution (RCE) vulnerability "IndyWatch Feed Tech"

Posted by Sysdream Labs on May 20

# [CVE-2018-10092] Dolibarr admin panel authenticated Remote Code
Execution (RCE) vulnerability

## Description

Dolibarr is an "Open Source ERP & CRM for Business" used by many
companies worldwide.

It is available through [GitHub](
or as distribution packages (e.g .deb package).


By tricking a logged-in admin into clicking a malicious link, or by
getting admin privileges in some...


[CVE-2018-10094] Dolibarr SQL Injection vulnerability "IndyWatch Feed Tech"

Posted by Sysdream Labs on May 20

# [CVE-2018-10094] Dolibarr SQL Injection vulnerability

## Description

Dolibarr is an "Open Source ERP & CRM for Business" used by many
companies worldwide.

It is available through [GitHub](
or as distribution packages (e.g .deb package).


The application does not handle user input properly and allows execution
of arbitrary SQL commands on the database.




Judges convict crook of operating Scan4You Counter Antivirus Service "IndyWatch Feed Tech"

Crook faces up to 35 years in prison for operating the popular Scan4You counter anti-virus (CAV) website that helped malware authors to test the evasion capabilities of their codes.

Scan4You is a familiar service for malware developers that used it as a counter anti-virus (CAV).

Scan4You allowed vxers to check their malware against as many as 40 antivirus solutions.


Scan4You was probably the largest counter anti-virus website, it went offline in May 2017 after authorities arrested two men in Latvia, the Russian national Jurijs Martisevs (36) (aka Garrik) and Ruslans Bondars (37) (aka Borland).

Both suspects were extradited by the FBI to the United States.

Jurijs Martisevs was traveling to Latvia when he was arrested by authorities and in March he pleaded guilty in a Virginia court to charges of conspiracy and aiding and abetting computer intrusion.

On Wednesday, Bondars was found guilty of conspiracy to violate the Computer Fraud and Abuse Act, conspiracy to commit wire fraud, and computer intrusion with intent to cause damage.

Ruslans Bondars helped hackers test and improve the malware they then used to inflict hundreds of millions of dollars in losses on American companies and consumers, said John P. Cronan, Acting Assistant Attorney General of the Justice Departments Criminal Division

Todays verdict should serve as a warning to those who aid and abet criminal hackers: the Criminal Division and our law enforcement partners consider you to be just as culpable as the hackers whose crimes you enableand we will work tirelessly to identify you, prosecute you, and seek stiff sentences that reflect the seriousness of your crimes.

Bondars faces a maximum penalty of 35 years in prison when sentenced on September 21, 2018.

Scan4You was launched in 2009 with the intent to offer a service that helped malware developers to check evasion capabilities of their code.

For a monthly fee, malware authors could upload their samples to the service that test their evasion capabilities against a broad...


Cambridge Analytica (US) Files for Bankruptcy Amidst Siege of Negative Attention "IndyWatch Feed Tech"

Submitted via IRC for Fnord666

"It has been determined that it is no longer viable to continue operating the business."

Cambridge Analytica LLC, the American arm of the London-based data analytics firm of the same name, filed for bankruptcy in federal court in New York on Friday.

The company submitted a voluntary formal petition for Chapter 7 bankruptcyliquidation. That document reveals the company has between $1 and $10 million in debt with very little assets. On May 2, SCL Elections Ltd. and its other British affiliates filed similar "insolvency" documents with UK authorities.

It was revealed last month that a 2014 survey app created at the behest of Cambridge Analytica required Facebook login credentials and provided the survey creator access to their friends' public profile data. In the end, this system captured data from 87 million Facebook users. This data trove wound up in the hands of Cambridge Analytica, the British data analytics firm, which worked with clients like the Donald Trump presidential campaign.

NBC News reported Friday that the company's May 2 shutdown hit employees abruptly, with many remaining employees filing out of their Fifth Avenue office in Manhattan directly to a nearby Irish pub.

[...] The Friday court document also notes that the attorney preparing the filing was paid for by Emerdata, a new data analytics firm founded by many of the same people who were formerly involved in Cambridge Analytica. Emerdata, like Cambridge Analytica, is largely funded by the Mercer family, who are well-known Republican donors and Trump supporters. Rebekah Mercer was named as a director to Emerdata in March 2018. What exactly Emerdata does or how it will operate going forward remains a bit of a mystery.

Read more of this story at SoylentNews.


Why NAD+ Declines With Age "IndyWatch Feed Tech"

Nicotinamide adenine dinucleotide (NAD+), a nucleotide, is critical for life to exist. From the most simple bacteria to complex multicellular organisms such as humans, NAD is a vital component of cellular function and thus life.

An increased level of NAD+ appears to convey health and longevity, and a decrease is associated with aging and disease. Today, we are going to look at NAD+, why it declines with age, and what science might do about it.


Slipcasting Resin Prototypes "IndyWatch Feed Tech"

[Eric Strebel] doesnt need an introduction anymore. If there is a picture of an elegantly designed part with a professional finish on our pages, there is a good chance he has a hand in it. This time he is sharing his method of making a part which looks like it is blow-molded but it is not. Blow-molded parts have a distinctive look, especially made with a transparent material and [Erics] method certainly passes for it. This could upgrade your prototyping game if you need a few custom parts that look like solidified soap bubbles.

Mold making is not covered in this video, which can also be seen below the break, but we can help you out with a tip or two. For demonstrations sake, we see the creation of a medical part which has some irregular surfaces. Resin is mixed and degassed then rolled around inside the mold. Then, the big reveal, resin is allowed to drain from the mold. Repeat to achieve the desired thickness.

This is a technique adapted from ceramics called slipcasting. For the curious, an elegant ceramic slipcasting video demonstration can be seen below as well. For an added finishing touch, watch how a laquer logo is applied to the finished part; a touch that will move the look of your build beyond that of a slapdash prototype.

More education from this prolific maker can be seen in his video on painting with a professional-looking finish and his tips for working with foam-core.

Heres a video showing how ceramic slip casting works. After watching [Eric]s video, this should make perfect sense.


NASA's TESS Receives Gravity Assist From the Moon, Snaps Test Image "IndyWatch Feed Tech"

NASA's new planet hunter snaps initial test image, swings by Moon toward final orbit

NASA's next planet hunter, the Transiting Exoplanet Survey Satellite (TESS), is one step closer to searching for new worlds after successfully completing a lunar flyby on May 17. The spacecraft passed about 5,000 miles from the Moon, which provided a gravity assist that helped TESS sail toward its final working orbit.

As part of camera commissioning, the science team snapped a two-second test exposure using one of the four TESS cameras. The image, centered on the southern constellation Centaurus, reveals more than 200,000 stars. The edge of the Coalsack Nebula is in the right upper corner and the bright star Beta Centauri is visible at the lower left edge. TESS is expected to cover more than 400 times as much sky as shown in this image with its four cameras during its initial two-year search for exoplanets. A science-quality image, also referred to as a "first light" image, is expected to be released in June.

TESS will undergo one final thruster burn on May 30 to enter its science orbit around Earth. This highly elliptical orbit will maximize the amount of sky the spacecraft can image, allowing it to continuously monitor large swaths of the sky. TESS is expected to begin science operations in mid-June after reaching this orbit and completing camera calibrations.

Normal TESS images will have up to 30 minutes of exposure time.

Also at EarthSky and TechCrunch.

Previously: NASA's TESS Mission Set to Launch on Wednesday, April 18

Original Submission

Read more of this story at SoylentNews.


The 20 Best Free Games For Kids 2018 "IndyWatch Feed Tech"

Best Free Games for kids 2018 has been an amazing year for video games across all platforms, but with the likes of Destiny 2 and Assassins Creed: Origins being big hits with all the attention, it is sometimes hard to see which games released this year are suitable for children. Top 10 Xbox Games for Kids (Video) Android []

The post The 20 Best Free Games For Kids 2018 appeared first on Trusted Hype.


The Attacks on the Patent Trial and Appeal Board (PTAB) Have Lost Momentum and the Patent Microcosm Begrudgingly Gives Up "IndyWatch Feed Tech"

Tank empty

Summary: The Patent Trial and Appeal Board (PTAB), reaffirmed by the Court of Appeals for the Federal Circuit (CAFC) and now the Supreme Court as well, carries on preventing frivolous lawsuits; options for stopping PTAB have nearly been exhausted and it shows

THERES nothing that the patent microcosm has not yet attempted in its war against PTAB. It tried to undermine the legitimacy of PTAB (to no avail), it attempted to slow PTAB down (also without success), and last year it even resorted to scams (misuse of immunity by using shell entities). The USPTO does not mind PTAB because it does not profit from litigation, unlike the patent microcosm. The USPTO just needs to grant good (valid) patents, unlike the EPO under Battistelli.

Weve noticed a considerable decrease in criticisms of PTAB; after Oil States (basically the highest court cementing PTABs role with only two dissenting Justices) it seems like the patent microcosm nearly gave up trying to tear PTAB down. Watchtroll, one of the main anti-PTAB sites, covered Altaire Pharm., Inc. v Paragon Bioteck, Inc. yesterday, but this wasnt even an anti-PTAB article. It feels as though they have learned to accept that PTAB is here to stay. This sites founder, Gene Quinn, even wrote something titled Is the pro-patent community going to continue to lose every battle?

The patent microcosm just cant stop lobbying Iancu after bullying/smearing his predecessor, Michelle Lee, showing that theyre a collective of bullies rather than legal professionals. Watchtroll now calls the patent extremists (like him) the pro-patent community as if patent rationalists are anti-patents (theyre not). Earlier this month Quinn maligned the Supreme Court, basically calling it anti-patent.

As if anyone who isnt as extreme about patents (as Quinn is) must be anti-patent. False dichotomies much? Binar...


Funding for NASA Climate Research Program Likely to be Restored by Congress "IndyWatch Feed Tech"

That NASA climate science program Trump axed? House lawmakers just moved to restore it

A U.S. House of Representatives spending panel voted today to restore a small NASA climate research program that President Donald Trump's administration had quietly axed. (Click here to read our earlier coverage.)

The House appropriations panel that oversees NASA unanimously approved an amendment to a 2019 spending bill that orders the space agency to set aside $10 million within its Earth science budget for a "climate monitoring system" that studies "biogeochemical processes to better understand the major factors driving short and long term climate change."

That sounds almost identical to the work that NASA's Carbon Monitoring System (CMS) was doing before the Trump administration targeted the program, which was getting about $10 million annually, for elimination this year. Critics of the move said it jeopardized numerous research projects and plans to verify the national emission cuts agreed to in the Paris climate accords.

"Likely" because it is part of a larger spending bill that needs to be voted on by the full House, and reconciled with the Senate's version.

Previously: Trump White House Quietly Cancels NASA Research Verifying Greenhouse Gas Cuts

Original Submission

Read more of this story at SoylentNews.


Software Patenting and Successful Litigation a Very Difficult Task Under 35 U.S.C. 101 "IndyWatch Feed Tech"

Better not bother

Solving crossword puzzle

Summary: Using loads of misleading terms or buzzwords such as AI the patent microcosm continues its software patents pursuits; but thats mostly failing, especially when courts come to assess pertinent claims made in the patents

NO MATTER what patent law firms keep claiming, software patents are hard to get at the USPTO. Theyre even harder to sell to judges and juries; expert testimonies can peel off the layers of buzzwords and demonstrate that a lot of software patents (whether theyre called cloud or IoT or whatever) boil down to algorithms or code, i.e. the domain of copyrights.

Were not done writing about software patents. The subject needs to be constantly brought up because rebuttals are necessary. Many public events and news sites are still dominated by patent law firms. They tell audiences what they want them to believe rather than what is true.

Consider this example from 24 hours ago. The patent microcosm is still trying to figure out how to get software patents which courts more so than examiners would likely reject anyway. To quote the outline of this upcoming webinar (lobbying/marketing):

Strafford will be offering a webinar entitled Functional Claiming for Software Patents: Leveraging Recent Court Treatment Surviving 112(f) and Disclosing Functional Basis for Software to Meet Heightened Standard of Review on June 5, 2018 from 1:00 to 2:30 pm (EDT). Cory C. Bell and Doris Johnson Hines of Finnegan Henderson Farabow Garrett & Dunner will guide IP counsel on functional claiming in software patents and USPTO prosecution, examine recent court treatment, and explain how to navigate the issue of functionality given the uncertainties in the prosecution and litigation contexts.

Check out whos on this panel (webinar); basically nobody that has anything to do with software. Its whats commonly known as circle-jerk.

It has become fashionable to dress up software patents as all sorts of things; the EPO likes three-letter acronyms such as ICT, CII, and 4IR. A couple o...


Card Reader Lockout Keeps Unauthorized Tool Users at Bay "IndyWatch Feed Tech"

Its a problem common to every hackerspace, university machine shop, or even the home shops of parents with serious control issues: how do you make sure that only trained personnel are running the machines? There are all kinds of ways to tackle the problem, but why not throw a little tech at it with something like this magnetic card-reader machine lockout?

[OnyxEpoch] does not reveal which of the above categories he falls into, if any, but well go out on a limb and guess that its a hackerspace because it would work really well in such an environment. Built into a sturdy steel enclosure, the guts are pretty simple an Arduino Uno with shields for USB, an SD card, and a data logger, along with an LCD display and various buttons and switches. The heart of the thing is a USB magnetic card reader, mounted to the front of the enclosure.

To unlock the machine, a user swipes his or her card, and if an administrator has previously added them to the list, a relay powers the tool up. Theres a key switch for local override, of course, and an administrative mode for programming at the point of use. Tool use is logged by date, time, and user, which should make it easy to identify mess-makers and other scofflaws.

We find it impressively complete, but imagine having a session timeout in the middle of a machine operation would be annoying at the least, and potentially dangerous at worst. Maybe the solution is a very visible alert as the timeout approaches a cherry top would do the trick!

Theres more reading if youre one seeking good ideas for hackerspace. Weve covered the basics of hackerspace safety before, as well as insurance for hackerspaces.


Antnio Campinos Will Push Toward a France-Based Unified Patent Court (UPC) "IndyWatch Feed Tech"

Michel Barnier (centre) lobbied for the UPC for many years (since the days it wasnt even called UPC)

The three Frenchmen

Summary: Frenchmen at the EPO will try hard to bring momentum if not force to the Unified Patent Court; facts, however, arent on their side (unlike Team UPC, which was always on Team Battistellis side)

YESTERDAY we wrote about the TC Heartland determination turning one. Lawyers, especially upon this decisions anniversary, still try to work their way around it. They want to make it possible to drag companies into patent courts/trials far away from where theyre based. In re HTC Corp. was recalled yesterday (Sunday) by Watchtroll. The patent venue statute does not apply to foreign corporations sued for patent infringement, it said. These foreign defendants may be sued in any judicial district where they are subject to personal jurisdiction. This is part of a pattern.

We find this quite relevant to the UPC/Brexit debate. Can British companies be sued over patent infringement in other countries (for their activities inside Britain)? With court proceedings that arent even in English? This question has been brought up in the constitutional complaint in Germany (the language and the UKs status in Europe).

Can British companies be sued over patent infringement in other countries (for their activities inside Britain)?Patent maximalists and Team UPC in their lawyers-centric sites dont seem bothered by such questions. They seem so eager to see a torrent of new patent lawsuits, so earlier this month they were in full fanboi mode for the UPC.

Max Walters, a journalist rather than a lawyer, called it the patent courts Brexit paradox. August Debouzy, boosters of Battistelli agenda,...


In Apple v Samsung Patents That Should Never Have Been Granted May Result in a Billion Dollars in Damages "IndyWatch Feed Tech"

Merely damages the credibility of the USPTO if anything

11 Cool, Funny or Just Plain Strange Patents for Back to School
Reference: 11 Cool, Funny or Just Plain Strange Patents for Back to School

Summary: A roundup of news about Apple and its patent cases (especially Apple v Samsung), including Intels role trying to intervene in Qualcomm v Apple

HERE in this Web site we prefer to focus on topics/angles which ought to be covered by mainstream media but never/rarely are. The Apple v Samsung trial is generally being covered quite a lot by big publishers, e.g. Apple v Samsung Poses Threat Beyond Just Tech and other new headlines/reports [1, 2, 3, 4, 5, 6]. It is already being mentioned quite heavily in social control media, probably because Apple is involved. Not many patent cases manage to attract quite as much public interest. We remarked on it a few times earlier this month. As Wall Street media put it last week, Apple Wants $1 Billion From Samsung at Smartphone Retrial (retrial after nearly a decade of fighting).

Apple has taken patent maximalism/lunacy to new heights in California. Its seeking billions in damages over a simple shape...


Week in review: Office 365 phishing threats, companies ditch data as GDPR approaches "IndyWatch Feed Tech"

Heres an overview of some of last weeks most interesting news, podcasts and articles: How can Office 365 phishing threats be addressed? The frequency of phishing within Office 365 is estimated to cost the average organization 1.3 compromised accounts each month via unauthorized, third-party login using stolen credentials. Personal encryption usage is increasing According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage More

The post Week in review: Office 365 phishing threats, companies ditch data as GDPR approaches appeared first on Help Net Security.


"Don't be Evil" Disappearing From Google's Code of Conduct "IndyWatch Feed Tech"

A number of soylentils have written in to let us know that Google is opening up the possibility of being evil by eliminating it from their code of conduct. You've been warned.

"Don't be Evil" Starting to Disappear From Google's Code of Conduct

Google Removes 'Don't Be Evil' Clause From Its Code of Conduct

Google's unofficial motto has long been the simple phrase "don't be evil." But that's over, according to the code of conduct that Google distributes to its employees. The phrase was removed sometime in late April or early May, archives hosted by the Wayback Machine show.

April 21 vs. May 4.

Related: Google vs Maven
Google Employees on Pentagon AI Algorithms: "Google Should Not be in the Business of War"
Google Duplex: an AI that Can Make Phone Calls on Your Behalf
About a Dozen Google Employees Have Resigned Over Project Maven

Read more of this story at SoylentNews.


DistroWatch Weekly, Issue 764 "IndyWatch Feed Tech"

This week in DistroWatch Weekly: Review: DragonFly BSD 5.2.0News: Tails works on persistent packages, Ubuntu Studio plans alternative desktops, Mageia offers massive update, Ubuntu team plans new features, GNOME removes (and restores) launching programs from NautilusTips and tricks: Finding which services were affected by an updateReleased last week:....


HPR2556: Building trust "IndyWatch Feed Tech"

What is trust? How do you get it? How can you exploit it? How can you keep from being exploited?


You are not alone; The Pirate Bay is down around the world "IndyWatch Feed Tech"

By Waqas

Another day, another irritating situation for The Pirate Bay fans.

This is a post from Read the original post: You are not alone; The Pirate Bay is down around the world


Hackaday Links: May 20, 2018 "IndyWatch Feed Tech"

One of the more interesting pieces of tech from Hollywood that never seems to become a reality is a location tracker. Remember the movement tracker in Alien that found the cat in the locker? Yeah, like that. Something that reports the direction and distance to a target, kind of like a PKE Meter from Ghostbusters. I think there was something like this in Predator. On Indiegogo, theres a device that tracks other devices. Its called the Lynq, and its a small, handheld device that tells you the distance and bearing of other paired devices. Hand them out to your friends, and youll be able to find each other at Coachella. While the device and use case is interesting, were wondering how exactly this thing works. Our best guess is that each device has a GPS module inside, and communicates with other paired devices over the 900MHz band. Its a bit pricey at $80 per unit (although you need at least two to be useful), but this is a really interesting project.

The SDRPlay SDR1 and SDR2 are as you would guess software defined radio receivers, that retail for $2-300. Problem: a few of these units were stolen from a warehouse, and are winding up on eBay. Solution: SDRPlay has decided to disable the specific receivers via the serial number. In a move just slightly reminiscent of FTDIgate, a manufacturer has decided to brick products that are stolen or infringe on IP. Its a solution, but I wouldnt want to be on the customer service team at SDRPlay.

A few years ago, [Oscar] created the PiDP-8/I, a computer kit that miniaturized the venerable PDP-8/I into a desktop form factor, complete with blinkenlights and clicky switches. Its a full simulation of a PDP-8 running on a Raspberry Pi, and if you took the PiDP-8/I back to 1975, you could, indeed, connect it to other computers. But the PDP-8/I isnt the most beautiful minicomputer ever created. That honor goes to the PDP-11/70, a beast of a machine wrapped in injection molded plastic and purple toggle switches. Now, after years of work, [Oscar] has miniaturized this beast of a machine. The PiDP-11/70 is a miniature remake of the PDP-11/70, runs a Raspberry Pi, and is everything you could ever want in a minimainframe. The price will be around $250 expensive, but have you ever tried to find a PDP-11 front panel on eBay?

The Nvidia TX2 is a credit card-sized computer with a powerful ARM p...


Someone hacked Californias live congressional debate to run gay porn "IndyWatch Feed Tech"

By Carolina

Looks like we got hacked again, well try to fix

This is a post from Read the original post: Someone hacked Californias live congressional debate to run gay porn


Linux 4.17-rc6 Kernel Released As Another "Fairly Calm" Release "IndyWatch Feed Tech"

Linux 4.17 is up to its sixth weekly release candidate ahead of the official release expected by mid-June...


PayPal Acquires iZettle for $2.2 Billion "IndyWatch Feed Tech"

PayPal to Buy iZettle for $2.2 Billion to Compete With Square

PayPal Holdings Inc. is buying Swedish small-business platform iZettle for $2.2 billion to expand in Europe and Latin America and increase its presence in brick and mortar stores.

"Small businesses increasingly want a full suite of capabilities across channels, a one-stop stop," Dan Schulman, chief executive officer of PayPal, said in an interview. "IZettle was the perfect fit in many ways."

The deal is the biggest ever for San Jose, California-based PayPal and will help it compete with Square Inc., which made a name for itself by helping small businesses and food-truck vendors conduct credit card and mobile transactions. Founded in 2010 by Jacob de Geer and Magnus Nilsson, iZettle also started out with a mobile-phone gadget for accepting credit card payments. It has since expanded into software and financing services to support small businesses.

All-cash deal = money in the (real) bank.

Also at TechCrunch.

Original Submission

Read more of this story at SoylentNews.

Sunday, 20 May


Post-Zuckerberg, tech CEOs under pressure to testify "IndyWatch Feed Tech"

Leaders of major technology companies are under increasing pressure to testify before Congress as lawmakers sound the alarm about the industrys data practices and market power.Its been a month since Facebook CEO Mark Zuckerberg appeared in a pair...


masscan, macOS, and firewall "IndyWatch Feed Tech"

One of the more useful features of masscan is the "--banners" check, which connects to the TCP port, sends some request, and gets a basic response back. However, since masscan has it's own TCP stack, it'll interfere with the operating system's TCP stack if they are sharing the same IPv4 address. The operating system will reply with a RST packet before the TCP connection can be established.

The way to fix this is to use the built-in packet-filtering firewall to block those packets in the operating-system TCP/IP stack. The masscan program still sees everything before the packet-filter, but the operating system can't see anything after the packet-filter.

Note that we are talking about the "packet-filter" firewall feature here. Remember that macOS, like most operating systems these days, has two separate firewalls: an application firewall and a packet-filter firewall. The application firewall is the one you see in System Settings labeled "Firewall", and it controls things based upon the application's identity rather than by which ports it uses. This is normally "on" by default. The packet-filter is normally "off" by default and is of little use to normal users.

What we need to filter is the source port of the packets that masscan will send, so that when replies are received, they won't reach the operating-system stack, and just go to masscan instead. To do this, we need find a range of ports that won't conflict with the operating system. Namely, when the operating system creates outgoing connections, it randomly chooses a source port within a certain range. We want to use masscan to use source ports in a different range.

To figure out the range macOS uses, we run the following command:

sysctl net.inet.ip.portrange.first net.inet.ip.portrange.last

On my laptop, which is probably the default for macOS, I get the following range. Sniffing with Wireshark confirms this is the range used for source ports for outgoing connections.

net.inet.ip.portrange.first: 4915...


12 Common Threat Intelligence Use Cases "IndyWatch Feed Tech"

12 Common Threat Intelligence Use Cases

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!

Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.

Are you using threat intelligence to its full potential?

The term threat intelligence is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner Market Guide for Security Threat Intelligence Products and Services explains the different use cases and how to best leverage threat intelligence in your organization.

You will learn how to:

  • Identify 12 common threat intelligence use cases.
  • Align these use cases to your specific requirements.
  • Implement strategies for getting value from threat intelligence.
  • Evaluate vendors based on your business needs.

Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.

If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.


GIMP 2.10.2 Released With HEIF Image Format Support "IndyWatch Feed Tech"

Just shy of one month since the long-awaited debut of GIMP 2.10, the first stable point release is now available...


Inverted Pendulum For The Control Enthusiast "IndyWatch Feed Tech"

Once you step into the world of controls, you quickly realize that controlling even simple systems isnt as easy as applying voltage to a servo. Before you start working on your own bipedal robot or scratch-built drone, though, you might want to get some practice with this intricate field of engineering. A classic problem in this area is the inverted pendulum, and [Philip] has created a great model of this which helps illustrate the basics of controls, with some AI mixed in.

Called the ZIPY, the project is a Cart Pole design that uses a movable cart on a trolley to balance a pendulum above. The pendulum is attached at one point to the cart. By moving the cart back and forth, the pendulum can be kept in a vertical position. The control uses the OpenAI Gym toolkit which is a way to easily use reinforcement learning algorithms in your own projects. With some Python, some 3D printed parts, and the toolkit, [Philip] was able to get his project to successfully balance the pendulum on the cart.

Of course, the OpenAI Gym toolkit is useful for many more projects where you might want some sort of machine learning to help out. If you want to play around with machine learning without having to build anything, though, you can also explore it in your browser.

The HackadayPrize2018 is Sponsored by:


GPU-Equipped Ryzen Pros Give AMD What it Needs to Conquer the Corporate Desktop "IndyWatch Feed Tech"

Submitted via IRC for SoyCow0245

Last year, AMD introduced Ryzen Pro, a range of processors aimed at corporate desktops rather than consumer systems. Though broadly identical to their consumer counterparts, the Pro chips offer additional guarantees around supply and availability so that corporate fleets can standardize on particular chips without risking a part being discontinued mid-way through their replacement cycle. The Pro chips also carry longer warranties and emphasize certain security and management features that may not be present or enabled in consumer systems.

The first Ryzen Pros had a major omission, however: they didn't include integrated GPUs. Corporate desktops and laptops, typically used for Office, Web browsing, and other low-intensity tasks, overwhelmingly use integrated GPUs rather than discrete ones; they simply don't need anything more powerful. The need for separate GPUs meant that the first-generation Ryzen Pros had only very limited appeal in their target corporate market.

The new processors, however, follow in the footsteps of the Ryzens with integrated Vega graphics launched in February, pairing a single core complex (CCX; a bundle of four cores/eight threads and a shared level 3 cache) with a Vega GPU. This makes them a complete solution for the corporate desktop.

Source: GPU-equipped Ryzen Pros give AMD what it needs to conquer the corporate desktop

Original Submission

Read more of this story at SoylentNews.


Fairplay Canada Discredits Pro-Piracy TorrentFreak News, Then Cites Us "IndyWatch Feed Tech"

At TorrentFreak we do our best to keep readers updated on the latest copyright and piracy news, highlighting issues from different points of view.

We report on the opinions and efforts of copyright holders when it comes to online piracy and we also make room for those who oppose them. Thats how balanced reporting works in our view.

There is probably no site on the Internet who reports on the negative consequences of piracy as much as we do, but for some reason, the term pro-piracy is sometimes attached to our reporting. This also happened in the recent reply Fairplay Canada sent to the CRTC.

The coalition of media companies and ISPs is trying to get a pirate site blocking regime implemented in Canada. As part of this effort, its countering numerous responses from the public, including one from law professor Michael Geist.

In his submission, Geist pointed out that the Mexican Supreme Court ruled that site blocking is disproportional, referring to our article on the matter. This article was entirely correct at the time it was written, but it appears that the Court later clarified its stance.

Instead of pointing that out to us, or perhaps Geist, Fairplay frames it in a different light.

Professor Geist dismisses Mexico because, relying on a third party source (the pro-piracy news site TorrentFreak), he believes its Supreme Court has ruled that the regime is disproportionate, it writes.

Fairplay does not dispute that the Supreme Court initially ruled that a site blockade should target specific content. However, it adds that the court later clarified that blockades are also allowed if a substantial majority of content on a site is infringing.

The bottom line is that, later developments aside, our original article was correct. What bothers us, however, is that the Fairplay coalition is branding us as a pro-piracy site. Thats done for a reason, most likely to discredit the accuracy of our reporting.

Pro piracy news site

Luckily we have pretty thick skin, so well get over it. If Fairplay Canada doesnt trust us, then so be it.

Amusingly, however, this was no...


Saildrones "IndyWatch Feed Tech"

Via: Bloomberg: Engineer and adventurer Richard Jenkins has made oceangoing robots that could revolutionize fishing, drilling, and environmental science. His aim: a thousand of them.


Mach64 & Rendition Drivers Now Work With X.Org Server 1.20 "IndyWatch Feed Tech"

Anyone happening to have an ATI Mach 64 graphics card from the mid-90's or a 3Dfx-competitor Rendition graphics card also from the 90's can now enjoy the benefits of the recently released X.Org Server 1.20...


The Thing Inside Your Cells That Might Determine How Long You Live "IndyWatch Feed Tech"

You may have forgotten about the nucleolus since you took biology class, but scientists think this structure inside every cell in your body may play an important role in aging.


Fingerprint Analysis Could Finally Get Scientific, Thanks to a New Tool "IndyWatch Feed Tech"

Submitted via IRC for Fnord666

[...] A landmark report published in 2009 by the National Academy of Sciences highlighted the lack of scientific foundation for fingerprint evidence, as well as other commonly used metrics in forensic science, like bite marks and bloodstain patterns. This isn't to say that fingerprints aren't useful in the justice system. But they aren't entirely reliable, and in the current practice of print analysis, there's no place to signal that uncertainty to an attorney, judge, or jury.

Using statistics and probabilities to help bolster fingerprint results and signal the weight of the evidence isn't a new idea, but this is the first time a tool has actually been put in the hands of fingerprint examiners. FRStat was developed by Henry Swofford, chief of the latent print branch at the U.S. Army Criminal Investigation Laboratory at the Department of Defense. "We're the first lab in the United States to report fingerprint evidence using a statistical foundation," Swofford said.

[...] Adding a element of quantitative analysis to fingerprint identification is positive progress for forensic science, which struggles, overall, to live up to the "science" side of its name. Implementing the program, though, requires a significant culture change for a field that's remained largely the same for decades, if not a centuryposing additional challenges for people like Swofford who pushing for progress.

Source: Fingerprint Analysis Could Finally Get Scientific, Thanks to a New Tool

Original Submission

Read more of this story at SoylentNews.


Misconfigured CalAmp server allowed hacker to take over a lot of vehicles "IndyWatch Feed Tech"

Security researchers discovered that a misconfigured server operated by the CalAmp company could allow anyone to access account data and takeover the associated vehicle.

CalAmp is a company that provides backend services for several well-known systems.

Security researchers Vangelis Stykas and George Lavdanis discovered that a  misconfigured server operated by the CalAmp company could allow anyone to access account data and takeover the associated vehicle.

The experts were searching for security vulnerabilities in the Viper SmartStart system, a device that allows users to remotely start, lock, unlock, or locate their vehicles directly using a mobile app on their smartphones.

As with many other mobile applications, it used secure connections with SSL and Certificate Pinning (Hard-code in the client the certificate is known to be used by the server) to automatically reject a connection from sites that offer bogus SSL certificates.

The experts noticed that the app was connecting to domain and also to the third party domain (, it is the Lender Outlook service.

The experts discovered that using the credentials for the user created from the viper app it was possible to login the panel.

This panel seemed to be the frontend for Lender Outlook service. We tried our user created from the viper app, to login and it worked! reads the blog post published by Stykas.

This was a different panel which seemed to be targeted to the companies that have multiple sub-accounts and a lot of vehicles so that they can manage them. 



Stretching The Definitions Of A Custom IC "IndyWatch Feed Tech"

Maker Faire is the nexus for all things new and exciting. At the Bay Area Maker Faire this weekend, zGlue introduced a new platform that stretches the definition of custom ICs. Is this custom silicon? No, not at all. zGlue is a platform allowing anyone to take off-the-shelf ICs and package them into a single module, allowing you to build a smaller PCB with a shorter BOM.

The zGlue module found in the zOrigin

The idea behind zGlue is to take all of the fun chips available today from accelerometers to tiny microcontrollers with integrated wireless and put them on a tiny, tiny board that is then encapsulated. At Maker Faire, the zGlue team was busy demonstrating their cloud-based platform that allows anyone to add off-the-shelf chips to the zGlue stack and assemble it into a custom module.

Of course, every new tech startup needs a demo, so zGlue has come up with zOrigin, a small fitness tracker that features a suite of chips crammed into one encapsulated package. The chips included in the zOrigin ZiP package are a Dialog DA14585 microcontroller with BLE, an Analo...


Terrorists Are Going to Use Artificial Intelligence "IndyWatch Feed Tech"

Machine-learning technology is growing ever more accessible. Lets not have a 9/11-style failure of imagination about it.

There is a general tendency among counterterrorism analysts to understate rather than hyperbolize terrorists technological adaptations. In 2011 and 2012, most believed that the Arab Spring revolutions would marginalize jihadist movements. But within four years, jihadists had attracted a record number of foreign fighters to the Syrian battlefield, in part by using the same social media mobilization techniques that protesters had employed to challenge dictators like Zine El Abidine Ben Ali, Hosni Mubarak, and Muammar Qaddafi.

Militant groups later combined easy accessibility to operatives via social media with new advances in encryption to create the virtual planner model of terrorism. This model allows online operatives to provide the same offerings that were once the domain of physical networks, including recruitment, coordinating the target and timing of attacks, and even providing technical assistance on topics like bomb-making.


Urban Aero moves forward with innovative VTOL aircraft "IndyWatch Feed Tech"

The development of Israel-based Urban Aeronautics Cormorant prototype is well underway, with hopes of launching a full-scale development of the aircraft in the near future.


A.I. could be the harbinger of a global socialist revolution "IndyWatch Feed Tech"

Artificial intelligence and automation stand poised to put millions out of work and make inequality even more pronounced. Is it possible to solve one problem with another?


unable to launch vmplayer 14 "IndyWatch Feed Tech"

After installing vmplayer 14 in ubuntu 18.04 player might fail to launch with vmmon modules failing to compile with errors


To get around these errors we will need to modify the code of vmmon as given in and To do the above mentioend changes, you can follow the following steps. Go to the folder

Untar the folder vmmon.tar

This will create a folder vmmon-only which will contain the code for the module vmmon.Now we can follow the changes mentioned in the above two links in the respective files.

After doing the changes recreate the vmmon.tar using the following command

Now we should be able to launch vmplayer and the modules should get compiled successfully.


20may2018 "IndyWatch Feed Tech"


Intel to Spend $5 Billion on Fab in Israel, Likely to Produce 10nm Chips "IndyWatch Feed Tech"

Intel Discloses Plans to Spend $5 Billion on Fab 28 Expansion in Israel

Intel and two Israeli ministries this week announced that the chip giant plans to invest $5 billion in its Kiryat Gat fab complex Fab 28 through 2020. Under the plan, Intel is expected to buy various products from local suppliers and hire additional personnel. In return, Israel will provide the processor maker a tax rebate and a government grant. Furthermore, Intel will receive another grant if it upgrades its manufacturing in Israel further.

Under the terms of the investment plan, Intel will invest $5 billion (NIS 18 billion) in its Kiryat Gat ventures until 2020. The chip giant is expected to buy $838 million (NIS 3 billion) worth of local goods and add 250 people to its workforce, reports The Times of Israel citing the Finance Ministry. If the plan is approved by the Israeli authorities, Intel will get a 5% tax rebate till 2027, as well as a $195.5 million (NIS 700 million) government grant. Additionally, if Intel decides to "significantly upgrade" its fab "technologically", the company will get another $195.5 million grant.

Intel's first "10nm" CPU will be the i3-8121U, a dual-core part which will be featured in the Lenovo Ideapad 330. Due to low yields on the "10nm" process, a few Cannon Lake CPUs will be released in 2018 alongside "14nm" Whiskey Lake. Both microarchitectures are considered to be "8th-generation" (hence the '8' in "i3-8121U").

Also at CTech.

Original Submission

Read more of this story at SoylentNews.


Britain introducing new laws on social media companies to tackle Wild West elements "IndyWatch Feed Tech"

The United Kingdom is planning to propose laws that would curb cyberbullying and impose restrictions on social media companies, Reuters reported Sunday. Matt Hancock, Britains digital minister, said Sunday that the government would publish a...


Internet of Laundry Let the ESP8266 Watch Your Dirty Drawers Get Clean "IndyWatch Feed Tech"

When you think of world-changing devices, you usually dont think of the washing machine. However, making laundry manageable changed not only how we dress but how much time people spent getting their clothes clean. So complaining about how laborious our laundry is today would make someone from the 1800s laugh. Still, we all hate the laundry and [Andrew Dupont], in particular, hates having to check on the machine to see if it is done. So he made Laundry Spy.

How do you sense when the machine either a washer or a dryer is done? [Andrew] thought about sensing current but didnt want to mess with house current. His machines dont have LED indicators, so using a light sensor wasnt going to work either. However, an accelerometer can detect vibrations in the machine and most washers and dryers vibrate plenty while they are running.

The four-part build log shows how he took an ESP8266 and made it sense when the washer and dryer were done so it could text his cell phone. Hed already done a similar project with an Adafruit HUZZAH. But he wanted to build in some new ideas and currently likes working with NodeMCU. While he was at it he upgraded the motion sensor to an LIS3DH which was cheaper than the original sensor.

[Andrew] already runs Node RED on a Raspberry Pi, so incorporating this project with his system...


Some weekend stable kernel updates "IndyWatch Feed Tech"

The 4.16.10, 4.14.42, and 4.9.101 stable kernel updates are available; each contains another set of important fixes.


Nautilus For GNOME 3.30 Drops Support For Launching Binaries/Programs "IndyWatch Feed Tech"

The Nautilus file manager in GNOME 3.30 will no longer allow users to double click on binary files for running them...


What Do Women Want in a Man? The Right Leg-to-Body Ratio "IndyWatch Feed Tech"

What makes a man attractive? Hint: Look at his limbs

Women prefer a man with legs that are about half his height, according to previous research; scientists believe that is an evolutionary result of women wanting to choose only healthy men. Legs that are too short, for example, have been linked to type 2 diabetes. But other proportions, such as arm length to body height or whether the elbow and knee divide a limb in half, can also relate to a person's health. Do they influence women's views as well?

To answer this, researchers collected average body proportions from roughly 9000 men in the U.S. military and used them to create computer-generated images of male models (pictured). The scientists made the model's arms and legs slightly longer or shorter, and then asked more than 800 heterosexual U.S. women to rank each model's attractiveness.

How long the model's arms were relative to his height didn't seem to matter [open, DOI: 10.1098/rsos.171790] [DX], the team reports today in Royal Society Open Science. And women cared only a little about how the elbow or knee divided a limb. But as seen in previous work, women noticed if the legs made up more or less than half his heightand they didn't like it.

Original Submission

Read more of this story at SoylentNews.


Reptile: a LKM rootkit written for evil purposes "IndyWatch Feed Tech"

Posted by nullbyte on May 20


- Supported Linux kernel versions: 2.6.x/3.x/4.x
- Give root to unprivileged users
- Hide files and directories
- Hide files contents
- Hide processes
- Hide himself
- Hidden boot persistence
- ICMP/UDP/TCP port-knocking backdoor
- Full TTY/PTY shell with file transfer
- Client to handle Reptile Shell



Links 20/5/2018: KDevelop 5.2.2 and 5.2.3, FreeBSD 11.2 Beta 2 "IndyWatch Feed Tech"

GNOME bluefish



  • Linux fragmentation The Sum of All Egos

    If Tom Clancy had been a technophile of the software kind, hed have used this title instead of the familiar one for one of his iconic blockbuster thrillers. The thing is, Linux accounts for a tiny percentage of the overall desktop market share. The perennial 1% has been around roughly since 2005, and even if the actual share is higher than that, its still a small and largely insignificant fraction. And yet, there are hundreds of Linux distributions populating this narrow, crowded arena. Why? Well, ego, of course.

    One might say: open source. Ah, well, the open-source nature of Linux has been the chief excuse to the colorful abundance of replication and duplication of the Linux desktop world, while at the same time serving as the main catalyst to the expansion of Linux in the commercial space, which makes for a dubious cause. I believe the reason is different. Let me tell you what it is.

  • Desktop


Steam Controller Kernel Driver Is Landing In The Linux 4.18 Kernel "IndyWatch Feed Tech"

The Linux 4.18 kernel will feature the initial Steam Controller kernel driver that works without having to use the Steam client or using third-party user-space applications like the SC-Controller application...


Tiny Sideways Tetris on a Business Card "IndyWatch Feed Tech"

Everyone recognizes Tetris, even when its tiny Tetris played sideways on a business card. [Michael Teeuw] designed these PCBs and they sport small OLED screens to display contact info. The Tetris game is actually a hidden easter egg; a long press on one of the buttons starts it up.

It turns out that getting a playable Tetris onto the ATtiny85 microcontroller was a challenge. Drawing lines and shapes is easy with resources like TinyOLED or Adafruits SSD1306 library, but to draw those realtime graphics onto the 12832 OLED using that method requires a buffer size that wouldnt fit the ATtiny85s available RAM.

To solve this problem, [Michael] avoids the need for a screen buffer by calculating the data to be written to the OLED on the fly. In addition, the fact that the smallest possible element is a 44 pixel square reduces the overall memory needed to track the screen contents. As a result, the usual required chunk of memory to use as a screen buffer is avoided. [Michael] also detailed the PCB design and board assembly phases for those of you interested in the process of putting together the cards using a combination of hot air reflow and hand soldering.

PCB business cards showcase all kinds of c...


The SEC Created its Own Scammy ICO to Teach Investors a Lesson "IndyWatch Feed Tech"

Submitted via IRC for SoyCow3941

In its latest effort to fend off cryptocurrency scams, the Securities and Exchange Commission launched its own fake initial coin offering website today called the Howey Coin to warn people against fraudulent cryptocurrencies. The name is a tongue-in-cheek reference to the Howey Test that the SEC uses to determine whether an investment is a security, which the Commission would therefore have legal jurisdiction over.

Click 'Buy Coins Now' on the Howey Coins site and you'll be redirected to an SEC page that states: "We created the bogus site as an educational tool to alert investors to possible fraud involving digital assets like crypto-currencies and coin offerings." The SEC uses the page to highlight red flags that customers should watch out for, including a promise of high returns (which indicates high risks), celebrity endorsements, and even false claimes that an ICO is SEC-compliant.


Original Submission

Read more of this story at SoylentNews.


FreeBSD 11.2 Beta 2 Available For Testing, Brings PTI Optimization "IndyWatch Feed Tech"

The second beta release of FreeBSD 11.2 is now available for weekend testing...


Drinking Baking Soda Could be an Inexpensive, Safe Way to Combat Autoimmune Disease "IndyWatch Feed Tech"

Warning: Nothing that appears on Cryptogon should be viewed as medical advice. Thanks to the Cryptogon reader who told me about taking sodium bicarbonate after my kidney stone disaster! Via: Agusta University: A daily dose of baking soda may help reduce the destructive inflammation of autoimmune diseases like rheumatoid arthritis, scientists say. They have []


When Thoughts Control Machines "IndyWatch Feed Tech"

Efforts to connect human brains to computers have taken big leaps forward in recent years. Melding our minds with machines could provide the biggest single upgrade to human intelligence since our species evolved. But are we ready?

Click here to subscribe to The Economist on YouTube:

Daily Watch: mind-stretching short films throughout the working week.

For more from Economist Films visit:
Check out The Economists full video catalogue:
Like The Economist on Facebook:
Follow The Economist on Twitter:
Follow us on Instagram:
Follow us on Medium:


This Is What Its Like to Be a Space Rocket Launcher in Alaska "IndyWatch Feed Tech"

After a massive explosion puts everything at risk, workers at Kodiak Islands spaceport prepare to launch a new rocket into orbit.


Astronomers Find Fastest-Growing Black Hole Known in Space "IndyWatch Feed Tech"

Astronomers at ANU have found the fastest-growing black hole known in the Universe, describing it as a monster that devours a mass equivalent to our sun every two days.

The astronomers have looked back more than 12 billion years to the early dark ages of the Universe, when this supermassive black hole was estimated to be the size of about 20 billion suns with a one per cent growth rate every one million years.

"This black hole is growing so rapidly that it's shining thousands of times more brightly than an entire galaxy, due to all of the gases it sucks in daily that cause lots of friction and heat," said Dr Wolf from the ANU Research School of Astronomy and Astrophysics.

"If we had this monster sitting at the centre of our Milky Way galaxy, it would appear 10 times brighter than a full moon. It would appear as an incredibly bright pin-point star that would almost wash out all of the stars in the sky."

[...] The discovery of the new supermassive black hole was confirmed using the spectrograph on the ANU 2.3 metre telescope to split colours into spectral lines.

"We don't know how this one grew so large, so quickly in the early days of the Universe," Dr Wolf said.

Christian Wolf, Fuyan Bian, Christopher A. Onken, Brian P. Schmidt, Patrick Tisserand, Noura Alonzi, Wei Jeat Hon, John L. Tonry. Discovery of the most ultra-luminous QSO using Gaia, SkyMapper and WISE. Publications of the Astronomical Society of Australia, 2018

Original Submission

Read more of this story at SoylentNews.


Video of the Arduino FPGA Board Demo at Maker Faire "IndyWatch Feed Tech"

This week, Arduino announced a lot of new hardware including an exceptionally interesting FPGA development board aimed at anyone wanting to dip their toes into the seas of VHDL and developing with programmable logic. We think its the most interesting bit of hardware Arduino has released since their original dev board, and everyone is wondering what the hardware actually is, and what it can do.

This weekend at Maker Faire Bay Area, Arduino was out giving demos for all their wares, and yes, the Arduino MKR Vidor 4000 was on hand, being shown off in a working demo. We have a release date and a price. Itll be out next month (June 2018) for about $60 USD.

But what about the hardware, and what can it do? From the original press releases, we couldnt even tell how many LUTs this FPGA had. There were a lot of questions about the Mini PCIe connectors, and we didnt know how this FPGA would be useful for high-performance computation like decoding video streams. Now we have the answers.



Experts propose a new variation of the Spectre attack to recover data from System Management Mode "IndyWatch Feed Tech"

Researchers from Eclypsium proposed a new variation of the Spectre attack that can allow attackers to recover data stored inside CPU System Management Mode.

Security experts from Eclypsium have devised a new variation of the Spectre attack that can allow attackers to recover data stored inside CPU System Management Mode (SMM) (aka called ring -2).

The SMM is an operating mode of x86 CPUs in which all normal execution, including the operating system, is suspended.

When a code is sent to the SMM, the operating system is suspended and a portion of the UEFI/BIOS firmware executes various commands with elevated privileges and with access to all the data and hardware.

The main benefit of SMM is that it offers a distinct and easily isolated processor environment that operates transparently to the operating system or executive and software applications. reads Wikipedia.

The SMM mode was first released with the Intel 386SL in the early 90s, Intel CPUs implements a memory protection mechanism known as a range register to protect sensitive contents of memory regions such as SMM memory.

SMM memory on Intel CPUs is protected by a special type of range registers known as System Management Range Register (SMRR).

Eclypsium experts based their study on a public proof-of-concept code for the Spectre variant 1 (CVE-2017-5753) vulnerability to bypass the SMRR mechanism and access to the content of the System Management RAM (SMRAM) that contains the SMM and where the SMM working data is executed.

Because SMM generally has privileged access to physical memory, including memory isolated from operating systems, our research demonstrates that Spectre-based attacks can reveal other secrets in memory (eg. hypervisor, operating system, or application). states the report published by Eclypsium.

These enhanced Spectre attacks allow an unprivileged attacker to read the contents of memory, including memory that should be protected by the range registers, such as SMM memory. This can expose SMM code and data that was intended to be confidential, revealing other SMM vulnerabilities as well as secrets stored in SMM, 



Interesting Space Photo "IndyWatch Feed Tech"



ISP Telenor Will Block The Pirate Bay in Sweden Without a Shot Fired "IndyWatch Feed Tech"

Back in 2014, Universal Music, Sony Music, Warner Music, Nordisk Film and the Swedish Film Industry filed a lawsuit against Bredbandsbolaget, one of Swedens largest ISPs.

The copyright holders asked the Stockholm District Court to order the ISP to block The Pirate Bay and streaming site Swefilmer, claiming that the provider knowingly facilitated access to the pirate platforms and assisted their pirating users.

Soon after the ISP fought back, refusing to block the sites in a determined response to the Court.

Bredbandsbolagets role is to provide its subscribers with access to the Internet, thereby contributing to the free flow of information and the ability for people to reach each other and communicate, the company said in a statement.

Bredbandsbolaget does not block content or services based on individual organizations requests. There is no legal obligation for operators to block either The Pirate Bay or Swefilmer.

In February 2015 the parties met in court, with Bredbandsbolaget arguing in favor of the important principle that ISPs should not be held responsible for content exchanged over the Internet, in the same way the postal service isnt responsible for the contents of an envelope.

But with TV companies SVT, TV4 Group, MTG TV, SBS Discovery and C More teaming up with the IFPI alongside Paramount, Disney, Warner and Sony in the case, Bredbandsbolaget would need to pull out all the stops to obtain victory. The company worked hard and initially the news was good.

In November 2015, the Stockholm District Court decided that the copyright holders could not force Bredbandsbolaget to block the pirate sites, ruling that the ISPs operations did not amount to participation in the copyright infringement offenses carried out by some of its pirate subscribers.

However, the case subsequently went to appeal, with the brand new Patent and Market Court of Appeal hearing arguments. In February 2017 it handed down its decision, which overruled the earlier ruling of the District Court and ordered Bredbandsbolaget to implement technical measures to prevent its customers accessing the pirate sites through a number of domain names and URLs....


Googles Selfish Ledger is an unsettling vision of Silicon Valley social engineering "IndyWatch Feed Tech"

Google has built a multibillion-dollar business out of knowing everything about its users. Now, a video produced within Google and obtained by The Verge offers a stunningly ambitious and unsettling look at how some at the company envision using that information in the future.


Are Healthcare Metrics Hurting Healthcare? - Facts So Romantic "IndyWatch Feed Tech"

Performance metrics are supposed to financially incentivize hospitals to improve the healthcare system. And this is exactly where the trouble starts. The list of misapplied performance metrics could go on and on.Photograph by Luis Molinero / Shutterstock

In 1975, the British economist Charles Goodhart pointed out that when a measure becomes a target, it ceases to be a good measure. Goodharts Law, as it came to be known, is a ubiquitous phenomenon in regulatory affairs, like healthcare. Making healthcare better requires metrics which can be measured and assessed. But measuring the right metric is sometimes the wrong choice.

In order to quantify and characterize health and healthcare, hospitals and government agencies collect massive amounts of data. Typically, this data is gathered by patient surveys, such as the Hospital Consumer Assessment of Healthcare Providers and Systems Survey (HCAHPS), or by the hospital itself (for instance regarding in-hospital mortality rate). The metrics present in these surveys are usually easy to measuretheyre partly used exactly for that reason. Government agencies, in turn, demand improvement in metrics like mortality rate or hospital readmission rate. Hospitals focus on these scores, which can be coupled to financial penalties and loss of patients. This procedure is supposed
Read More


AMD Zen CPU Microcode Added To Linux-Firmware Tree, Bulldozer Updated "IndyWatch Feed Tech"

Ensuring your CPU microcode is kept up-to-date for Zen processors is now a little bit easier with the microcode files being added to the linux-firmware.git collection...


How REM and Non-REM Sleep May Work Together to Help Us Solve Problems "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

Sleep is known to be important for creative thinking, but exactly how it helps and what role each sleep stage -- REM and non-REM -- plays remains unclear. A team of researchers have now developed a theory, outlined in an Opinion published May 15 in the journal Trends in Cognitive Sciences, to explain how the interleaving of REM and non-REM sleep might facilitate creative problem solving in different but complementary ways.

"Suppose I give you a creativity puzzle where you have all the information you need to solve it, but you can't, because you're stuck," says first author Penny Lewis, a professor at the Cardiff University School of Psychology. "You could think of that as you've got all the memories that you need already, but you need to restructure them -- make links between memories that you weren't linking, integrate things that you weren't integrating."

Studies show that this kind of restructuring often happens while we are asleep, so Lewis and her co-authors drew on that literature, as well as physiological and behavioral data, to create a model of what might be happening during each stage. Their model proposes that non-REM sleep helps us organize information into useful categories, whereas REM helps us see beyond those categories to discover unexpected connections.

[...] "So, what we propose is that, if you're stuck on some kind of problem, that problem is salient, and we know that salient things are replayed," Lewis says. "The slightly hypothetical part is that, when something else is randomly activated in the cortex that has an element that's similar, you'll form a link." These surprising links may be the creative leaps required to solve a problem.

-- submitted from IRC

Penelope A. Lewis, Gnther Knoblich, Gina Poe. How Memory Replay in Sleep Boosts Creative Problem-Solving. Trends in Cognitive Sciences, 2018; 22 (6): 491 DOI: 10.1016/j.tics.2018.03.009

Original Submission

Read more of this story at SoylentNews.


Scrapped Motors Dont Care About Direction "IndyWatch Feed Tech"

Spinners built into games of chance like roulette or tabletop board games stop on a random number after being given a good spin. There is no trick, but they eventually rest because of friction, no matter how hard your siblings wind up for a game-winning turn. What if the spinning continued forever and there was no programming because there was no controller? [Ludic Science] shows us his method of making a perpetual spinner with nothing fancier than a scrapped hard disk drive motor and a transformer. His video can also be seen below the break.

Fair warning: this involves mains power. The brushless motor inside a hard disk drive relies on three-phase current of varying frequencies, but the power coming off a single transformer is going to be single-phase AC at fifty or sixty Hz. This simplifies things considerably, but we lose the self-starting ability of the motor and direction control, but we call those features in our perpetual spinner. With two missing phases, our brushless motor limps along in whatever direction we initiate, but the circuit couldnt be much more straightforward.

This is just the latest skill on a scrapped HDD motors rsum (CV). They will run with a 9V battery, or work backwards and become an encoder. If you want to use it more like the manufacturers intent, consider this controller.

Thank you for the tip,[Itay].


The 28 Best Action Games On PC "IndyWatch Feed Tech"

Action games are the meat and potatoes of the medium. As much as we all love our complex RPGs, our patient stealth games, our impenetrable turn based strategy, sometimes you just want to bullet some git in the face with a gun that you shoot, like a proper hard bastard. The action game is perhaps []

The post The 28 Best Action Games On PC appeared first on Trusted Hype.


Learn How To Make Use Of Vulkan's New Debug Extension - VK_EXT_debug_utils "IndyWatch Feed Tech"

For those aspiring Vulkan programmers, the Vulkan experts at LunarG have published a tutorial to learn how to make use of the newest debug extension, VK_EXT_debug_utils...


The U.S. Army Is Turning to Robot Soldiers "IndyWatch Feed Tech"

Within five years, I have no doubt there will be robots in every Army formation.

From the spears hurled by Romans to the missiles launched by fighter pilots, the weapons humans use to kill each other have always been subject to improvement. Militaries seek to make each one ever-more lethal and, in doing so, better protect the soldier who wields it. But in the next evolution of combat, the U.S. Army is heading down a path that may lead humans off the battlefield entirely.

Over the next few years, the Pentagon is poised to spend almost $1 billion for a range of robots designed to complement combat troops. Beyond scouting and explosives disposal, these new machines will sniff out hazardous chemicals or other agents, perform complex reconnaissance and even carry a soldiers gear.

More from China Casts Doubt on Report of $200 Billion Trade Deficit Offer.


Forget Scanning License Plates; Cops Will Soon ID You Via Your Roof Rack "IndyWatch Feed Tech"

Submitted via IRC for SoyCow3941

On Tuesday, one of the largest LPR manufacturers, ELSAG, announced a major upgrade to "allow investigators to search by color, seven body types, 34 makes, and nine visual descriptors in addition to the standard plate number, location, and time."

Such a vast expansion of the tech now means that evading such scans will be even more difficult.

For years, Ars has been reporting on automated license plate readers (ALPRs, or simply LPRs)a specialized camera often mounted on police cars that can scan at speeds of up to 60 plates per second.

Those scans are compared against what law enforcement usually dubs a "hot list" before alerting the officer to the presence of a potentially wanted or stolen vehicle. All scans are typically kept in a police database for weeks, months, or years on end.

These devices are now in common use by cities big and small across the United States, as well as many countries around the globe, including the United Kingdom. Police at the upcoming royal wedding in London will use LPRs to monitor unauthorized vehicles.


Original Submission

Read more of this story at SoylentNews.


Aurlien Ptiauds ILO Case (EPO Appeal) an Early Sign That ILO Protects Abusers and Power, Not Workers "IndyWatch Feed Tech"

[Correction: Alain Prunier (as named below by Mrpel) is actually a mistake. It is in fact Aurlien Ptiaud in the text below.]

Alain Prunier ILO case

Summary: A famous EPO disciplinary case is recalled; its another one of those EPO-leaning rulings from AT-ILO, which not only praises Battistelli amid very serious abuses but also lies on his behalf, leaving workers with no real access to justice but a mere illusion thereof

The dismissal of SUEPO secretary Laurent Prunier a couple of years ago [1, 2, 3, 4, 5] was the subject of much debate regarding EPO scandals. It happened at the Dutch branch, not the German one. He was probably Battistellis last casualty (among many) that was a staff representative and he was fired in defiance of orders from the Administrative Council. This served to reaffirm the view that Battistelli was in charge of his supposed regulator.

Well, thankfully, owing to EPO scandals, we nowadays know that ILO too is dysfunctional.It turns out that theres another Prunier (see correction above), Alain Prunier Aurlien Ptiaud, whose case [PDF]...


LOT Network is a Wolf in Sheeps Clothing "IndyWatch Feed Tech"

LOT Network's Ken Seddon

Summary: Another reminder that the LOT is a whole lot more than it claims to be and in effect a reinforcer of the status quo

THE idea that we need to fight patent injustice by hoarding more patents was always a laughable one. The IBM-led OIN, for example, had us believing that it would somehow tackle the issue by making patents defensive (that can never be; its just not how patents actually work).

Theres an old saying along the lines of, to understand what an organisation stands for just check whos running it. At the EPO it would be Battistelli and at the USPTO Iancu, part of the patent microcosm.

Theres an old saying along the lines of, to understand what an orgnisation stands for just check whos running it.The LOT Network charm offensive and puff pieces arent over yet. Were seeing Susan Deckers Bloomberg piece licensed and reposted even more than a week later; we responded to it a couple of times before and 3 days ago we saw Wayne Williams in Beta News issuing another belated LOT Network puff piece in which he said:

Ken Seddon is the CEO of the non-profit patent protection network LOT. The organizations members include Google, Red Hat, Lenovo, Pega and other big players, as well as dozens of startups in areas such as transportation, blockchain, and software.

Startups are disproportionately impacted by patent trolls and we chatted with Ken about how a smart, assertive IP strategy can help protect their businesses.

Startups-themes nonsense is the typical thing we also hear from Battistellis EPO. Its pure marketing, trying to quell dissent from those who suffer the most. LOT Network is led by Google, which has a massive number of patents; all the ke...


Friend in Need Gets Junk Bin PC for Cramped Quarters "IndyWatch Feed Tech"

If you doubt the power of the Hackaday community, check this one out. Stalwart reader and tipster [starhawk] has pitched in to help a friend in need, someone he met through Seems this friends current living arrangements are somewhat on the cramped side, and while hes in need of a PC, even a laptop would claim too much space.

So with a quick trip to the store and a few items from the junk bin, [starhawk] whipped up an all-in-one PC the size of a tablet for his friend. As impressed as we are by the generosity, were more impressed by the quality of his junk bin. The heart of the compact machine is a motherboard from a Wintel CX-W8, scarcely larger than a Raspberry Pi model A. After the addition of a larger heatsink and fan, the board was attached via a sheet of plastic to the back of a 7-inch touchscreen, also a junk bin find. A cheap picture frame serves as the back of the all-in-one, complete with Jolly Wrencher, of course. Alas, the DC-DC converter was one of the only purchased items, bringing the cost for the build to all of $22, including the $15 for a wireless keyboard/touchpad on clearance from Walmart. After some initial power troubles, the fixes for which are described in this update, the machine was ready to ship.

Does this one seem familiar? It should [starhawk] built a similar laptop for himself a while back when he was low on funds. Now it seems like hes paying it forward, which we appreciate. For more details on how he pulled this all of, check out The Anytop, [starhawks] portable computer anyone can build. It was his 2017 Hackaday Prize entry!


Nokification in Hong Kong and China (PRC) "IndyWatch Feed Tech"

Nokia firing people
Picture by Or Cohen

Summary: Chinese firms that are struggling resort to patent litigation, in effect repeating the same misguided trajectories which became so notorious in Western nations because they act as a form of taxation, discouraging actual innovation

LAST week we wrote about how Coolpad had resorted to litigation using patents. Months prior we took note of this strategy, which basically revolved around the idea of leveraging patents rather than products. IAM, the patent trolls lobby, says about Coolpad that its patent portfolio is largely unproven (not to mention small compared to that of companies it takes on ). To quote:

Earlier this year, Coolpad filed a number of Chinese patent infringement complaints against Xiaomi. IAM reported these stories largely based on local media accounts. But last week Coolpad sought to ramp up the pressure by ensuring that the story, and key details about the accused Xiaomi products, reached the global financial press in the run-up to Xiaomis potential $10 billion Hong Kong IPO. On 10th May, one week after Xiaomi announced its flotation plans, Coolpad held a press conference in Hong Kong to update the media on its dispute with Xiaomi.

If Coolpad is attempting to build a business on top of litigation, then it wont go very far. The company is already in the red and it seems to be struggling, unlike Xiaomi.

If Coolpad is attempting to build a business on top of litigation, then it wont go very far. The company is already in the red and it seems to be struggling, unlike Xiaomi.There are similar companies in the West. After Microsoft entryism, for example, Nokia is like a patent tr...


FDA Has Named Names of Pharma Companies Blocking Cheaper Generics [Updated] "IndyWatch Feed Tech"

Submitted via IRC for Runaway1956

Update 5/17/2018: The FDA has now launched the website listing the names of brand name drugs and their makers who have stood in the way of generic drug companies trying to make more affordable alternatives. You can view the list here. It includes notable medications, such as Accutane (for acne), Methadone (used for opioid dependency), and Tracleer (to treat high blood pressure in the lungs). The brand name drug makers to be shamed includes big hitters such as Celgene Corp, GlaxoSmithKline, Pfizer, Valeant Pharmaceuticals International, Gilead Sciences Inc, and Actelion Pharmaceuticals Ltd, now a Johnson & Johnson company. Our original story, published May 16, is unedited below.

The Food and Drug Administration plans this week to effectively begin publicly shaming brand-name drug companies that stand in the way of competitors trying to develop cheaper generic drugs.

FDA Commissioner Scott Gottlieb told reporters on Monday and Tuesday that the agency will unveil a website on Thursday, May 17 that names names of such companies. More specifically, the website will publicly reveal the identity of 50 branded drugs and their makers that have blocked generic development. The website will also be updated "on a continuous basis" to list additional names.

In fielding questions from reporters, Gottlieb denied that the effort was a form of public shaming. "I don't think this is publicly shaming," Gottlieb said, according to S&P Global Market Intelligence. "I think this is providing transparency in situations where we see certain obstacles to timely generic entry."


Original Submission

Read more of this story at SoylentNews.


Stunning helicopter footage shows Hawaii volcanos fast-moving lava flow "IndyWatch Feed Tech"

A lava flow on Kilauea was moving at the speed of 300 yards per hour on Saturday.


Its Not Morning Until Green oclock "IndyWatch Feed Tech"

[JohnathonT] has a two-year-old who cant reliably tell time just yet. Every morning, he gets up before the rooster crows and barges into his parents room, ready to face the day.

In an effort to catch a few more Zs, [JohnathonT] built a simple but sanity-saving clock that tells time in a visual, kid-friendly way. Sure, this is a simple build. But if a toddler is part of your reality, who has time to make one from logic gates? The hardware is what youd expect to see: Arduino Nano, a DS1307 RTC, plus the LEDs and resistors. We think an RGB LED would be a nice way to mix up the standard stoplight hues a bit.

At a glance, little Mr. Rise and Shine can see if its time to spread cheer, or if he has to stay in his room and play a bit longer. At 6:00AM, the light powers on and glows red. At 6:50, it turns yellow for 10 minutes. At the first reasonable hour of the day, 7:00AM, it finally turns green. In reading the code, we noticed that it also goes red at 8:00PM for 45 minutes, which tells us it also functions as a go-to-sleep indicator.

When his son is a little older, maybe [JohnathonT] could build him  a clock that associates colors with activities.


ARM Mali 400/450 "Lima" DRM Driver Steps Closer To Mainline "IndyWatch Feed Tech"

When it comes to open-source ARM Mali graphics driver efforts there has been the Panfrost driver targeting the Mali T700 series that has occupied much of the limelight recently, but there has been a separate effort still working on open-source driver support for the older 400/450 series...


DDoS Attacks Leverage UPnP Protocol to Avoid Mitigation "IndyWatch Feed Tech"

Submitted via IRC for SoyCow3941

Attackers are experimenting with a new method of avoiding some DDoS mitigation solutions by employing the Universal Plug and Play (UPnP) protocol to mask the source port of network packets sent during the DDoS flood.

In a report published on Monday, DDoS mitigation firm Imperva says it observed at least two DDoS attacks employing this technique.

By masking the origin port of incoming network packets, Imperva says that older DDoS mitigation systems that rely on reading this info to block attacks will need to be updated to more complex solutions that rely on deep packet inspection (DPI), a more costly and slower solution.


Related: New DDoS Attack Method Demands a Fresh Approach to Amplification Assault Mitigation

Original Submission

Read more of this story at SoylentNews.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog