|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Physical exercise is a key piece of the brain health puzzle, but certainly not a magic pill.
___ Exercise doesnt slow progression of dementia (NHS Choices): A trial in which people with dementia took part in a moderately intense exercise programme for 4 months found their mental decline did not slow and may even have worsened faster than in people who did not take part in the programmeWhile the exercise.
At the 2018 Linux Storage, Filesystem, and Memory-Management Summit (LSFMM), Steve French led a discussion of various problem areas for network filesystems. Unlike previous sessions (in 2016 and 2017), there was some good news to report because the long-awaited statx() system call was released in Linux 4.11. But there is still plenty of work to be done to better support network filesystems in Linux.
The first medicine designed to prevent migraines was approved by the Food and Drug Administration on Thursday, ushering in what many experts believe will be a new era in treatment for people who suffer the most severe form of these headaches. The drug, Aimovig, made by Amgen and Novartis, is a monthly injection with a device similar to an insulin pen. The list price will be $6,900 a year, and Amgen said the drug will be available to patients within a week.
Aimovig blocks a protein fragment, CGRP, that instigates and perpetuates migraines. Three other companies Lilly, Teva and Alder have similar medicines in the final stages of study or awaiting F.D.A. approval. "The drugs will have a huge impact," said Dr. Amaal Starling, a neurologist and migraine specialist at the Mayo Clinic in Phoenix. "This is really an amazing time for my patient population and for general neurologists treating patients with migraine."
Millions of people experience severe migraines so often that they are disabled and in despair. These drugs do not prevent all migraine attacks, but can make them less severe and can reduce their frequency by 50 percent or more. As a recent editorial in the journal JAMA [DOI: 10.1001/jama.2018.4852] [DX] put it, they are "progress, but not a panacea."
Read more of this story at SoylentNews.
When [Steve Parker]s girlfriend got a tea kettle that takes voice commands, he suddenly saw his fancy bean-to-cup coffee machine as a technological dinosaur. It may make good coffee, but getting the DeLonghi going is inconvenient, because it runs a self-cleaning cycle each time its turned on or off.
Thus began [Steve]s adventure in trying to turn the thing on with Alexa via Particle Photon. Because of the way the machine is designed, simply adding a relay wouldnt dothe machine would just turn off and back on, only to start the self-clean again. Once inside, he found its controlled by a PIC18LF2520. Further research indicated that it is powered by an off-line switcher that combines a power MOSFET with a power supply controller. [Steve] figured out that the buttons are read via square wave and interpreted by a multiplexer.
The project went into the weeds a bit when [Steve] tried to read the signals with a knock-off Saleae. As soon as he plugged it in, the control board fried because the DeLonghi evidently has no reference to Earth ground. While waiting for a replacement board to arrive, he tried replacing the mux and shift register chips, which actually fixed the board. Then it was more or less a matter of using the DeLonghis status LEDs to determine the machines state, and then to interface with the Photon and Alexa. Cycle past the break for a ristretto-sized demonstration.
[Steve] didnt do all this to actually make coffee, just turn the machine on with a voice command. The Photon is totally capable of making coffee, though, as we saw with this closed-loop espresso machine.
Lennart Poettering has announced the call for presentations of this year's All Systems Go! conference, what was born out of the earlier systemd.conf conference...
The Federal Communications Commission (FCC) will take new comments from the public on Sinclair Broadcast Groups $3.9 billion bid for Tribune Media.The agency is reopening its review of the merger for public comments after the two companies proposed...
Roaming Mantis malware also targets iOS devices for phishing attacks.
This is a post from HackRead.com Read the original post: Multilingual malware hits Android devices for phishing & cryptomining
Security experts from Kaspersky Lab discovered that the operators behind the Roaming Mantis campaign continue to improve their malware broadening their targets, their geographic range and their functional scope.
Roaming Mantis surfaced in March 2018 when hacked routers in Japan redirecting users to compromised websites. Investigation by Kaspersky Lab indicates that the attack was targeting users in Asia with fake websites customized for English, Korean, Simplified Chinese and Japanese. Most impacted users were in Bangladesh, Japan, and South Korea.
Our research revealed that the malware (sic) contains Android application IDs for popular mobile banking and game applications in South Korea. The malware is most prevalent in South Korea, and Korean is the first language targeted in HTML and test.dex. Based on our findings, it appears the malicious app was originally distributed to South Korean targets. Support was then added for Traditional Chinese, English, and Japanese, broadening its target base in the Asian region.
The dreaded DNS hijacking malware was originally designed to steal users login credentials and the secret code for two-factor authentication from Android devices, it has evolved and recently was spotted targeting iOS devices as well as desktop users.
In April 2018, Kaspersky Lab published a blog post titled Roaming Mantis uses DNS hijacking to infect Android smartphones. Roaming Mantis uses Android malware which is designed to spread via DNS hijacking and targets Android devices. reads the analysis published by Kaspersky.
In May, while monitoring Roaming Mantis, aka MoqHao and XLoader, we observed significant changes in their M.O. The groups activity expanded geographically and they broadened their attack/evasion methods. Their landing pages and malicious apk files now support 27 languages covering Europe and the Middle East. In addition, the criminals added a phishing option for iOS devices, and crypto-mining capabilities for the PC.
Operators behind the Roaming Mantis malware recently added the support for 27 languages to broaden their operations.
The versions of the Roaming Mantis malware continue to be s...
Users of the official Facebook Android app are being asked something unusual from May 17th. The app is asking for Superuser permissions to the users phones. In other words, the official Facebook Android app is asking the users to grant the app full access to their devices forever. This pop-up request has created a lot of unrest among the users.
Apparently, for the past couple of days, Facebooks Android app (com.facebook.katana) has been asking for superuser access to users devices. However, if a user tries to deny this request, it still continues asking until the user grants permission. This has led to panic among users who took to various internet forums looking for an explanation for the suspicious pop-ups.
Today I was browsing Facebook when suddenly I got a superuser request popup, one user wrote on XDA developer forums. Could anyone explain why Facebook needs SU permissions?
Another user commented, Same happened to me too. Started yesterday afternoon. Facebook last updated 1 day ago, so it must have to do something with new version.
Also, users from France, Australia, and the UK confirmed in the same thread that they too received the same pop-up from Facebook to grant root access.
Same here. I denied it, kept getting toast messages that access was denied, even after closing the app. What gives, @facebook? This is shady as hell!
Jasper Roos (@JasperRoos) May 17, 2018
Several Android security researchers who spoke with Bleeping Computer believe that the pop-ups are appearing because of a coding error.
Avast mobile security researcher Nikolaos Chrysaidos who took a look at the Facebooks app source code told Bleeping Computer that it could most probably be a coding error. WhiteOps SDK, used for detecting ad fraud, is said to be the reason behind this Superuser permission.
He said, The dialog started popping up on users that are in the beta channel. Along with other various checks. Facebook is probably integrating WhiteOps SDK, and they forgot to re-implement the ROOT checki...
Game of Thrones, one of the most popular TV show is no stranger to illegal downloads and streams on the Internet. Not only this, the TV show has also been a victim of an array of hacks and early leaks of episodes.
As a result, HBO, the popular entertainment channel that airs Games of Thrones, has worked out a strategy and decided to shoot multiple endings for the Grand Finale Season 8 of the show, mentions a report via UberGizmo. This way they hope to not only confuse hackers and prevent spoilers from leaking online (again) but also keep Game of Thrones fans guessing about what will happen next.
This was disclosed by Emilia Clarke, best known as Daenerys Targaryen on the show, who told The Hollywood Reporter, that even the cast of the show is unaware what the creators have planned. I dont know that I even do now. Im being serious. I think theyre filming a bunch of stuff and theyre not telling us. Im being serious. Im being deadly serious. I think that they dont even trust us, Clarke said.
She also added that multiple endings are being filmed so that even the cast doesnt know which one is the real ending.Theres lots of different endings that could happen; I think were doing all of them and we arent being told which is actually whats going to happen.
HBO has plans to make the Game of Thrones Season 8 finale the most remembered season of the show. And it would not be wrong on their part to adopt such a strategy considering the many plot twists and surprises that the show has, but also the fact that the entire scripts of Game of Thrones have been leaked online many times before.
The eighth and final season of Game of Thrones, will be filmed across many different countries like Northern Ireland, Spain, Croatia, and Iceland. The series will conclude with its eighth season premiering in 2019.
The post HBO Is Shooting Multiple Endings For The Games of Thrones Finale Season 8 appeared first on TechWorm.
A server stored teenagers' Apple ID email addresses and plaintext passwords [...] At least one server used by an app for parents to monitor their teenagers' phone activity has leaked tens of thousands of accounts of both parents and children.
[...] the Los Angeles, Calif.-based company left its servers, hosted on Amazon's cloud, unprotected and accessible by anyone without a password.
[...] The database stores the parent's email address associated with TeenSafe, as well as their corresponding child's Apple ID email address. It also includes the child's device name -- which is often just their name -- and their device's unique identifier. The data contains the plaintext passwords for the child's Apple ID. Because the app requires that two-factor authentication is turned off, a malicious actor viewing this data only needs to use the credentials to break into the child's account to access their personal content data.
"Technology has brought with it a world your child might not be ready for," the company tells us in a video. "Begin a free trial today!"
Read more of this story at SoylentNews.
If you are a software developer in your 20s or 30s, youve grown up in a world dominated by Linux. It has been a significant player in the data center for decades, and while its hard to find definitive operating system market share reports, Linuxs share of data center operating systems could be as high as 70%, with Windows variants carrying nearly all the remaining percentage. Developers using any major public cloud can expect the target system will run Linux. Evidence that Linux is everywhere has grown in recent years when you add in Android and Linux-based embedded systems in smartphones, TVs, automobiles, and many other devices.
Even so, most software developers, even those who have grown up during this venerable Linux revolution have at least heard of Unix. It sounds similar to Linux, and youve probably heard people use these terms interchangeably. Or maybe youve heard Linux called a Unix-like operating system.
So, what is this Unix? The caricatures speak of wizard-like graybeards sitting behind glowing green screens, writing C code and shell scripts, powered by old-fashioned, drip-brewed coffee. But Unix has a much richer history beyond those bearded C programmers from the 1970s. While articles detailing the history of Unix and Unix vs. Linux comparisons abound, this article will offer a high-level background and a list of major differences between these complementary worlds.
Last year, American satellite and broadcast provider Dish Network targeted two well-known players in the third-party Kodi add-on ecosystem.
In a complaint filed in a federal court in Texas, add-on ZemTV and the TVAddons library were accused of copyright infringement, with both facing up to $150,000 for each offense.
While TVAddons operator Adam Lackman responded to the allegations last week, ZemTVs developer Shani decided not to reply.
Shahjahan Durrani, Shani for short, never denied that he was the driving force behind the Kodi-addons ZemTV, LiveStreamsPro, and F4MProxy. While the London-based developer had never set foot in Texas, he initially planned to put up a defense. Financially, however, this was a problem.
ZemTVs developer launched a fundraiser last fall to crowdsource the legal battle. While he was able to raise close to 1,000, the legal costs already exceeded that the case even got fully underway.
Without the ability to pay the legal costs Shani is unable to put up a proper defense. But speaking with TorrentFreak, he explains that after the motion to dismiss was denied, he didnt have much hope for a fair trial anyway.
I was shocked and disappointed, not only by reading that the court dismissed my jurisdiction appeal, they did so with just one sentence. It seems unfair and doesnt give any confidence to me that the court/judge would be fair, Shani tells us.
This left the developer with two options. Find a way to fund the legal battle, money which may never be recovered, or give up the fight and face a default judgment. Shani chose the latter option.
Shani told his attorney Erin Russel to cease all activity on the case and to take no further steps on his behalf.
I dont have enough resources to fight this case completely with four kids that I am raising and anything more I do will be seem to be submitting to the US Courts which I am not going to do unless I have enough money to fight the case, the developer wrote in an email to Russel.
The attorney informed the court of this decision late last week and withdrew from the case.
This means that the lawsuit is steering towards a default judgment, and indeed, Dish has al...
Parrot 4.0 has been released. Parrot is a security-oriented distribution aimed at penetration tests and digital forensics analysis, with additional tools to preserve privacy. "On Parrot 4.0 we decided to provide netinstall images too as we would like people to use Parrot not only as a pentest distribution, but also as a framework to build their very own working environment with ease." Docker templates are also available.
Android users eager to play the increasingly popular Fortnite survival game on their mobile devices are being targeted left and right with malicious apps masquerading as the game or apps related to it. What is Fortnite? Fortnite is a co-op sandbox survival game published by Epic Games. It was released for Microsoft Windows, macOS, PlayStation 4, and Xbox One in July 2017 and, more recently, for iOS. Its popularity is steadily rising and Epic has More
The post Fortnite is coming to Android, but malicious fake apps are already there appeared first on Help Net Security.
Im excited to announce my interview on the BBC World Service is airing around the world today multiple times to millions of people. My 4-min section on #transhumanism starts at 10:50.
Why do people chase immortality? We those who believe science is close to beating death.
UK Prime Minister Theresa May is urging the use of artificial intelligence to help diagnose cancer:
The diagnosis of cancer and other diseases in the UK can be transformed by using artificial intelligence, Theresa May is to say. The NHS and technology companies should use AI as a "new weapon" in research, the PM will urge in a speech later.
Experts say it can be used to help prevent 22,000 cancer deaths a year by 2033 while aiding the fight against heart disease, diabetes and dementia.
High-skilled science jobs will also be created, Mrs May is to pledge. Speaking in Macclesfield, Mrs May will say: "Late diagnosis of otherwise treatable illnesses is one of the biggest causes of avoidable deaths. "And the development of smart technologies to analyse great quantities of data quickly and with a higher degree of accuracy than is possible by human beings opens up a whole new field of medical research."
Read more of this story at SoylentNews.
Recently I had the opportunity to do a teardown of a battery-backed LED bulb, and found some interesting details on how the device operated. Essentially, the bulb contained a low voltage DC uninterruptible power supply that would automatically switch between AC power and internal battery as needed. The implications of this seemed pretty exciting. For around $12 at big box retailers, this little bulb could be a cheap and convenient solution for providing fault tolerant power to microcontrollers and other low-power devices.
The teardown was a runaway success, with quite a bit of discussion of the UPS idea specifically. Some people hated it, others loved it. But as weve come to expect from Hackaday readers, the comments from both sides of the aisle contained keen observations and invaluable real-world experience. From the safety of the device to the accuracy of the manufacturers claims, it seems like every element of the product was addressed.
I had ended the teardown with a promise that Id continue experimenting with the tiny salvaged UPS, but even if I hadnt, with so much feedback it seemed revisiting the subject was all but a necessity. It this little UPS really viable? Is it too dangerous to safely implement in y...
Posted by Patrick Hunt on May 21CVE-2018-8012: Apache ZooKeeper Quorum Peer mutual authentication
Via: The Intercept: The directorate has a history that dates back to the 1950s; its role is to eavesdrop on communications. But its operations remain so highly classified that the Japanese government has disclosed little about its work even the location of its headquarters. Most Japanese officials, except for a select few of the 
Given that DragonFlyBSD recently landed some SMP performance improvements and other performance optimizations in its kernel for 5.3-DEVELOPMENT but as well finished tidying up its Spectre mitigation, this weekend I spent some time running some benchmarks on DragonFlyBSD 5.2 and 5.3-DEVELOPMENT to see how the performance has shifted for an Intel Xeon system.
Left-leaning groups on Monday launched a campaign advocating for the government to break up Facebook. The groups, which include the Content Creators Coalition, Demand Progress and the Open Markets Institute, are urging the Federal Trade Commission&...
Microsoft has secured a potentially lucrative agreement that makes the full suite of the tech giant's cloud-computing platform available to 17 U.S. intelligence agencies, executives said recently, moving agencies' computer systems onto Office 365 applications and adding certain cloud-based applications not previously available to them.
The agreement could strengthen Microsoft's prospects for winning government business at a time when it is locked in competition with some of the world's biggest tech companies for a Pentagon cloud-computing contract that is expected to be worth billions.
For years, Amazon Web Services, a subsidiary of Amazon.com that provides cloud computing for businesses and government agencies, has been the primary provider of cloud services to U.S. intelligence agencies, thanks to a $600 million contract with the CIA. (Amazon founder Jeffrey Bezos also owns The Washington Post.)
That remains the case after the recent agreement. Still, executives from Microsoft framed the contract agreement as an "awakening."
"This is a huge win from a Microsoft perspective," said Dana Barnes, vice president of the company's joint and defense agencies business unit. "It's kind of an awakening as far as the intelligence community is concerned that you can't be a one-cloud community."
Read more of this story at SoylentNews.
When a user comes to the Directory, they know that everything in it is free software, has only free dependencies, and runs on a free OS. With over 16,000 entries, it is a massive repository of information about free software.
While the Directory has been and continues to be a great resource to the world for many years now, it has the potential to be a resource of even greater value. But it needs your help! And since it's a MediaWiki instance, it's easy for anyone to edit and contribute to the Directory.
40 years ago, American management consultant Marilyn Loden first coined the term "glass ceiling" to describe invisible career barriers for women at a panel discussion. Despite the passing of two generations, Loden notes that the matter is still very alive, which readily displays how insidious a problem we have. To honor Loden's contribution, this week's theme for the Directory meetup is business software.
If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting. To see the meeting start time in your time zone, run this in GNU bash: date --date='TZ="America/New_York" 12:00 this Fri'
An Antares rocket launched from Virginia before sunrise this morning and is on its way to the International Space Station. Its 7,400 pounds of cargo include an experiment that will chill atoms to just about absolute zerocolder than the vacuum of space itself.
The Cold Atom Laboratory (CAL) is set to create Bose-Einstein condensates on board the ISS. But whats a Bose-Einstein condensate? And why make it in space?
Essentially, its going to allow us to do different kinds of things than wed be able to do on Earth, Gretchen Campbell, co-director of the University of Marylands Joint Quantum Institute, told Gizmodo.
Microsoft has purchased startup company Semantic Machines in an effort to make artificial intelligence bots sound more human. The Berkeley, California-based business focuses on contextual understanding of conversation.
Previously, the firm has worked with Apple on speech recognition technology for Siri. Semanitc Machines is lead by professor Dan Klein of UC Berkeley and professor Percy Liang of Standford University in addition to Apples former chief speech scientist Larry Gillick.
Microsoft has been working on speech recognition and natural language processing for nearly two decades now. As Cortana has gained a more prominent role in recent years, Redmond is aiming to improve the accuracy and fluency of its assistant.
There still are several weeks to go until the Linux 4.17 kernel will be officially released and for that to initiate the Linux 4.18 merge window, but we already know some of the features coming to this next kernel cycle as well as an idea for some other work that may potentially land...
Google expects HTTPS to become the default, and is preparing users for it by slowly moving Chrome towards showing only negative security indicators. Googles own numbers showed back in February that 68% of Chrome traffic on both Android and Windows was encrypted, as was 78% of Chrome traffic on both Chrome OS and Mac. By now, these numbers are surely even higher. Users should expect that the web is safe by default, and theyll be More
The post Chrome to dynamically point out Not secure HTTP sites appeared first on Help Net Security.
Koss Porta Pro headphones are something of a rarity in the world of audio gear: theyre widely regarded as sounding great, but dont cost an exorbitant amount of money. Since the line was introduced in 1984, theyve been the go-to headphones for those who dont subscribe to the idea that you should have to take out a loan from the bank just to enjoy your music.
The Porta Pros are easy to take apart, and removing the old wire was no problem. He then cut the buds on the Bluetooth earbuds he had, with the intention of just striping the wires and soldering it up to the pads on the Porta speakers. But things didnt quite go as expected.
What [Jake] hadnt realized was that the battery for the Bluetooth earbuds wasnt in the main housing, the power comes from a tiny battery inside each bud. That meant he needed to keep the batteries connected even though the Porta Pro obviously doesnt have a spot to mount them. In the fu...
A chance lab discovery is opening up the possibility for wide-scale improvements in drug screening, application of selective painkillers, and selectively nuking cancer cells. The mystery material? Graphene, a semi-metal thats composed of a single layer of carbon atoms. Its already being used to make flexible OLED displays and reduce the energy costs of desalination, but its potential benefits for the medical field look promising too.
It began with a theory scientists at the University of California knew graphene could convert light into electricity, and wondered whether that electricity had the capacity to stimulate human cells. Graphene is extremely sensitive to light (1,000 times more than traditional digital cameras and smartphones) and after experimenting with different light intensities, Alex Savchenko and his team discovered that cells could indeed be stimulated via optical graphene stimulation.
I was looking at the microscopes computer screen and Im turning the knob for light intensity and I see the cells start beating faster, he said. I showed that to our grad students and they were yelling and jumping and asking if they could turn the knob. We had never seen this possibility of controlling cell contraction.
Ten people have received infusions of umbilical cord blood days after having a stroke, and they seem to have recovered better than would normally be expected.
Treasury Secretary Steven Mnuchin on Monday encouraged the Department of Justice to review major technology companies like Google over concerns related to the potential harm they pose to market competition. These issues deserve to be reviewed...
German physicists launched the SpaceDrive project to explore possible sources of error in EmDrive experiments. Their first experiment identified a possible source of false positives in past successful EmDrive tests.
Jeff Hoogland has announced an early development snapshot of Bodhi Linux 5.0.0. The new alpha release is based on Ubuntu 18.04 LTS and runs the Moksha desktop environment, which is a fork of Enlightenment. "Some highlights about these 5.0.0 ISO images: Ubuntu 18.04 base; Moksha 0.3.0 testing release;....
Widespread routers' DNS hijacking malware that recently found targeting Android devices has now been upgraded its capabilities to target iOS devices as well as desktop users. Dubbed Roaming Mantis, the malware was initially found hijacking Internet routers last month to distribute Android banking malware designed to steal users' login credentials and the secret code for two-factor
With the recently minted Linux 4.17 kernel there was initial USB Audio Class 3.0 support for this audio-over-USB specification while with Linux 4.18 that UA3 support will be further enhanced...
Do you want to play League of Legends and do not know which Champion is right for you? You have bought a lol account las but do not understand which character you need to deal with? Find out who are the best Champions to learn how to play LoL and find the character that will make you love this game.
Vastayas Monkey King is one of the most interesting Champions youll discover in League of Legends. Do not be fooled by its rugged appearance: Wukong is a ferocious warrior with unexpected talents. Wukong was mentored by Master Champion Yi and uses Wuju fighting art in his bouts. Its passive is Stone Skin, a skill that increases the Armor and Magic Resistance of this warrior. One of his best skills is the Decoy, which makes Wukong invisible for a short time. This ability can help you to escape from enemies or to initiate a surprise attack (especially if combined with the ability of Cloud Flare, a Physical Damage attack of up to 2 nearby enemies).
This is not a girl like the others. Annie is also known as the Dark Child and she has several skills that make her a very difficult enemy to face in battle. Annie is a frightening sorceress, able to make difficult the opponents game with Pyromania (her passive of stunning) or to destroy with fire all the enemies in the area. Magic Damage is with this girl, but its her stunning ability that makes her really popular. And how to forget her lethal skill called Summon: Tibbers? Tibbers is her teddy bear and Annie manages to bring her great friend to life. With this ability, Tibbers attacks and burns everyone who is close to her.
A man of honor and loyalty, Garen, is the right Champion for anyone who has always enjoyed playing as a warrior or soldier. A great choice for tank, Garen has life regeneration as a passive and his Armor and Magical Resistance increase passively with slaughter of his opponents. Judgment is a sinister ability, which causes the warrior to dance mortally with his sword, dealing damage and reducing the armor of enemies. His best skill is Demacian Justice, who can turn the game against the opposing Champion who has made more recent killings. With the power, Garen deals damage based on Life that his target has already lost.
Morgana is master of the black arts and will do anything to stop the advance of enemies. He is a specialist in causing Magical Damage, either by cursing an area with his Dreaded Solo ability or by firing black magic spheres that inflict damage and immobilize an enemy (Dark Link ability). Your Black Shield skill is useful for protecting your team members by placing a barrier that absorbs Magic Damage and prevents disarray. Morgana has Magic Vampirism and her passive reflects that t...
Security updates have been issued by Arch Linux (lib32-curl, lib32-libcurl-compat, lib32-libcurl-gnutls, libcurl-compat, and libcurl-gnutls), CentOS (firefox), Debian (imagemagick), Fedora (exiv2, LibRaw, and love), Gentoo (chromium), Mageia (kernel, librelp, and miniupnpc), openSUSE (curl, enigmail, ghostscript, libvorbis, lilypond, and thunderbird), Red Hat (Red Hat OpenStack Platform director), and Ubuntu (firefox).
According to a press release carried by Eurekalert
In the first rigorously peer-reviewed article quantifying Bitcoin's energy requirements, a Commentary appearing May 16 in the journal Joule, financial economist and blockchain specialist Alex de Vries uses a new methodology to pinpoint where Bitcoin's electric energy consumption is headed and how soon it might get there.
The abstract of the article says
The Bitcoin network can be estimated to consume at least 2.55 gigawatts of electricity currently, and potentially 7.67 gigawatts in the future, making it comparable with countries such as Ireland (3.1 gigawatts) and Austria (8.2 gigawatts). [...]
The author offers a caveat:
[...] all of the methods discussed assume rational agents. There may be various reasons for an agent to mine even when this isn't profitable, and in some cases costs may not play a role at all when machines and/or electricity are stolen or abused.
[Other] reasons for an agent to mine Bitcoin at a loss might include [...] being able to obtain Bitcoin completely anonymously, libertarian ideology [...] or speculative reasons.
Read more of this story at SoylentNews.
The Google App Engine is a framework that allows Google users to develop and host web applications on a fully managed serverless platform.
In February, Pereira gained access to a non-production Google App Engine development environment, then he discovered that it was possible to use some of Googles internal APIs.
Pereira ethically reported the issue through the Googles Vulnerability Reward Program (VRP). The experts at Google ranked the flaw as a P1 priority, a level that is assigned to vulnerabilities that could have a significant impact on a large number of users and that for this reason must be addressed as soon as possible.
Meantime Pereira continued his test and submitted a second report to Google after discovering further issues, then Google invited Pereira to stop his activities due to the risk to easily break something using these internal APIs.
Google security team discovered that the flaw reported by the youngster could led to remote code execution.
Pereira published a detailed analysis of its finding after Google has fixed them and awarded him.
In early 2018 I got access to a non-production Google App Engine deployment environment, where I could use internal APIs and it was considered as Remote Code Execution due to the way Google works. Thanks to this I got a reward of $36,337 as part of Google Vulnerability Rewards Program. reads the blog post published by the researcher.
Some time ago, I noticed every Google App
Engine (GAE) application replied to every HTTP request
with a X-Cloud-Trace-Context header, so I assumed any
website returning that header is probably running on GAE.
Thanks to that, I learned appengine.google.com itself runs on GAE, but it can perform some actions that cannot be done anywhere else and common user applications cannot perform, so I tr...
A first-of-its-kind copper and graphite combination discovered in basic energy research at the U.S. Department of Energys Ames Laboratory could have implications for improving the energy efficiency of lithium-ion batteries, which include these components.
Were pretty excited by this, because we didnt expect it, said Pat Thiel, an Ames Laboratory scientist and Distinguished Professor of Chemistry and Materials Science and Engineering at Iowa State University. Copper doesnt seem to interact strongly or favorably with graphitic materials at all, so this was a big surprise. It really challenges us to understand the reasons and mechanisms involved.
The scientists bombarded graphite in an ultra-high vacuum environment with ions to create surface defects. Copper was then deposited on the ion-bombarded graphite while holding it at elevated temperature, at 600800 K. The synthetic route created multilayer copper islands that are completely covered by graphene layer(s).
A chance to switch to renewable sources for heating, electricity and fuel, while also providing new opportunities for several industries to produce large numbers of renewable products. This is the verdict of researchers from Chalmers University of Technology, Sweden, who now, after 10 years of energy research into gasification of biomass, see an array of new technological achievements.
How to implement a switch from fossil-fuels to renewables is a tricky issue for many industries. For heavy industries, such as oil refineries, or the paper and pulp industry, it is especially urgent to start moving, because investment cycles are so long. At the same time, it is important to get the investment right because you may be forced to replace boilers or facilities in advance, which means major financial costs. Thanks to long-term strategic efforts, researchers at Swedens Chalmers University of Technology have now paved the way for radical changes, which could be applied to new installations, as well as be implemented at thousands of existing plants around the globe.
Seafood consumption is both a love and a necessity for hundreds of millions of people worldwide. And its supply is a key part of maintaining food security for the whole planet. But during a time of rapid population growth and increasing demand, stocks of wild fish and invertebrates (such as mussels and prawns) are declining.
The problem is that policies and plans designed to make sure there are enough fish and invertebrates almost exclusively target fishing activity. But we also need to protect the critical habitats that are essential for the sustainability of these stocks and fisheries.
Most species that are fished require more than a single habitat to live and thrive. Atlantic cod (Gadus morhua), for example, spends its adult life shoaling in deep water where it lives, feeds and spawns. But juveniles require more stable habitat such as seagrass meadows. So, if we want to manage fish and invertebrate stocks for sustainability reasons, it is essential to protect the supporting habitats of targeted species.
Last week the PGPocalipse was all over the news Except that, well, it wasnt an apocalypse.
A team of researchers published a paper(PDF) where they describe how to decrypt a PGP encrypted email via a targeted attack. The research itself is pretty well documented and, from a security researcher perspective, its a good paper to read, especially the cryptography parts.
But we here at Hackaday were skeptical about media claims that Efail had broken PGP. Some media reports went as far as recommending everyone turn off PGP encryption on all email clients., but they werent able to back this recommendation up with firm reasoning. In fact, Efail isnt an immediate threat for the vast majority of people simply because an attacker must already have access to an encrypted email to use the exploit. Advising everyone to disable encryption all together just makes no sense.
Aside from the massive false alarm, Efail is a very interesting exploit to wrap your head around. Join me after the break as I walk through how it works, and what you can do to avoid it.
In a nutshel...
Via: NBC: Government agencies, businesses and other organizations in Arizona plan to participate in an exercise to practice how the state would respond to a migration of 400,000 people following a catastrophic earthquake in Southern California. The Arizona Department of Emergency and Military Affairs says participants in the National Mass Care Exercise in the coming 
Mark Zuckerbergs meeting with the European Union Parliament will now be livestreamed after some legislators criticized initial plans for the hearing to be held behind closed doors.I have personally discussed with Facebook CEO Mr Zuckerberg...
Posted by Qualys Security Advisory on May 21Qualys Security Advisory
Posted by Tomas Hoger on May 21Thank you for your detailed reply. It addresses my questions.
Almost exactly 20 years ago, Congress passed the Sonny Bono Copyright Term Extension Act, which extended the term of existing copyrights by 20 years. The Act was the 11th extension in the prior 40 years, timed perfectly to assure that certain famous works, including Mickey Mouse, would not pass into the public domain.
[...] Twenty years later, the fight for term extension has begun anew. Buried in an otherwise harmless act, passed by the House and now being considered in the Senate, this new bill purports to create a new digital performance rightbasically the right to control copies of recordings on any digital platform (ever hear of the internet?)for musical recordings made before 1972. These recordings would now have a new right, protected until 2067, which, for some, means a total term of protection of 144 years. The beneficiaries of this monopoly need do nothing to get the benefit of this gift. They dont have to make the work available. Nor do they have to register their claims in advance.
That this statute has nothing to do with the constitutional purpose of promot[ing] Progress is clear from its very title. The Compensating Legacy Artists for their Songs, Service, and Important Contributions to Society Act (or CLASSICS) is as blatant a gift without any public return as is conceivable. And it's not just a gift through cash; it's a gift through a monopoly regulation of speech. Archives with recordings of music from the 1930s or 1940s would now have to clear permission before streaming their musical content even if the underlying work was in the public domain.
Read more of this story at SoylentNews.
We had a couple with five children turn up to Playcentre. Theyre living in tents. They fled Wellington with a plan to build some sort of shack on a small piece of land that they bought a couple of valleys over from us. Until that happens: Tents. Both mum and dad had been in the 
Posted by Uwe Schindler on May 21CVE-2018-8010: XXE vulnerability due to Apache Solr configset upload
Security experts at Malwarebytes reported that compromised Drupal websites are used to deliver cryptocurrency miners, remote administration tools (RATs) and tech support scams.
Crooks are exploiting known vulnerabilities in the popular Drupal CMS such as Drupalgeddon2 and Drupalgeddon3 to deliver cryptocurrency miners, remote administration tools (RATs) and tech support scams.
The two remote code execution security vulnerabilities, tracked as CVE-2018-7600 and CVE-2018-7602 have been already fixed by Drupal developers.
At the end of March, the Drupal Security Team confirmed that a highly critical vulnerability (dubbed Drupalgeddon2), tracked as CVE-2018-7600, was affecting Drupal 7 and 8 core and announced the availability of security updates on March 28th.
The vulnerability was discovered by the Drupal developers Jasper Mattsson.
Both Drupal 8.3.x and 8.4.x are no more supported, but due to the severity of the flaw, the Drupal Security Team decided to address it with specific security updates and experts called it Drupalgeddon2.
The development team released the security update in time to address CVE-2018-7600.
After the publication of a working Proof-Of-Concept for Drupalgeddon2 on GitHub for educational or information purposes, experts started observing bad actors attempting to exploit the flaw.
A week after the release of the security update, the experts at security firm Check Point along with Drupal experts at Dofinity analyzed the CMS to analyzed the Drupalgeddon2 vulnerability and published a technical report on the flaw.
After the publication of the report. the expert Vitalii Rudnykh shared a working...
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter threat researchers, the advanced scouts of cybersecurity. They are becoming more numerous and conspicuous as more intelligence on illicit hacker activity is demanded. Threat researchers trawl through the dark web, pick apart malware, reverse engineer exploits, track outbreaks across the Internet, and set up honeypots to surveil attacker activity. They also More
The post The ethical and legal dilemmas of threat researchers appeared first on Help Net Security.
The General Data Protection Regulation (GDPR) compliance deadline looms four days away, but only 29 percent of companies will be ready, according to a new global survey by ISACA. Not only are most unprepared for the deadline, but only around half of the companies surveyed (52 percent) expect to be compliant by end-of-year 2018, and 31 percent do not know when they will be fully compliant. Top GDPR challenges According to the research, the top More
Join this webinar to learn how to model a medical device interacting with physiology
If you are interested in learning how to model a medical device interacting with physiology, then tune into this webinar featuring guest speaker Paul Belk from Abbott Medical.
Modeling physiologic systems uses the same principles applied to other multiphysics applications, but it is often complicated by the challenges in characterizing the properties of the biological tissues and processes involved. These challenges make it even more important to be able to analyze quantitatively through numerical simulation the interactions between the variable biological phenomena and the device.
In this webinar, we will present a model of catheter ablation from a large vessel. We will begin by setting up the coupled physics, including electric currents, laminar flow of blood, and heat transfer by conduction and convection. We will then show how to characterize the properties of the tissues involved and how the COMSOL Multiphysics software can be used to simulate a closed-loop control system to stabilize the energy flow delivered to the surrounding tissues. The simulation results will be used to characterize how intended physiologic results can be affected by uncontrolled physiologic changes and which control systems are most robust.
You can ask questions at the end of the webinar during the Q&A session.
Paul Belk, Abbott Corporation
Paul Belk has a PhD in medical physics and is a principal engineer at Abbott Corporation, where he works on the development of diagnostic and therapeutic medical devices. He has been using simulation of all types for more than 20 years as an integral part of the research and development process. For the past four years, he has been using the COMSOL Multphys...
Passwords are inherently the weakest form of authentication, yet they remain the most prevalent. Many organizations realize that moving beyond this single point of vulnerability is required but replacing passwords or adding multi-factor authentication (MFA) to all use cases can be daunting if not impossible. As such, it is undoubtedly important to enforce strong password policies to ensure that this first and often times only line of defense can withstand common attacks. In recent years, More
The post Dont let attackers worm their way in: Increase password security appeared first on Help Net Security.
While we here at Hackaday never question why an individual took on a particular project, it surely doesnt stop our beloved readers from grabbing their pitchforks and demanding such answers in the comments. Perhaps no posts generate more of this sort of furore than the ones which feature old audio gear infused with modern hardware. In almost every case the answer is the same: the person liked the look and feel of vintage hardware, but didnt want to be limited to antiquated media.
That sentiment is perhaps perfectly personified by the TapeLess Deck Project, created by [Artur Mynarz]. His creations combine vintage cassette decks with an Android phone small enough to fit behind the tape door. An Android application which mimics the look of a playing tape, complete with hand written track info, completes the illusion.
The output from the phone is tied into the deck where the audio signal from the tape head would have been, so the volume controls and VU meters still work as expected. Watching the meters bounce around while the animated tape plays on the screen really does look incredibly slick...
With the Linux benchmarks of the Ryzen 7 2700 last week I included a few Linux gaming benchmarks, but for those evaluating CPU options for your next Intel/AMD Linux gaming system upgrade, here is a much more thorough set of benchmarks from a wide variety of OpenGL and Vulkan powered Linux games. The Ryzen 7 2700, Ryzen 7 2700X, and Core i7 8700K processors were tested for this Ubuntu gaming comparison while testing with both a Radeon RX Vega 64 and GeForce GTX 1080 Ti.
Submitted via IRC for Fnord666
Researchers have studied how a 'drumstick' made of light could make a microscopic 'drum' vibrate and stand still at the same time.
A team of researchers from the UK and Australia have made a key step towards understanding the boundary between the quantum world and our everyday classical world.
Quantum mechanics is truly weird. Objects can behave like both particles and waves, and can be both here and there at the same time, defying our common sense. Such counterintuitive behaviour is typically confined to the microscopic realm and the question "why don't we see such behaviour in everyday objects?" challenges many scientists today.
Now, a team of researchers have developed a new technique to generate this type of quantum behaviour in the motion of a tiny drum just visible to the naked eye. The details of their research are published today in New Journal of Physics.
Project principal investigator, Dr Michael Vanner from the Quantum Measurement Lab at Imperial College London, said: "Such systems offer significant potential for the development of powerful new quantum-enhanced technologies, such as ultra-precise sensors, and new types of transducers.
[...] In the quantum world, a drum can vibrate and stand still at the same time. However, generating such quantum motion is very challenging. lead author of the project Dr Martin Ringbauer from the University of Queensland node of the Australian Research Council Centre for Engineered Quantum Systems, said: "You need a special kind of drumstick to make such a quantum vibration with our tiny drum."
In recent years, the emerging field of quantum optomechanics has made great progress towards the goal of a quantum drum using laser light as a type of drumstick. However, many challenges remain, so the authors' present study takes an unconventional approach.
Generation of Mechanical Interference Fringes by Multi-Photon Counting by M Ringbauer, T J Weinhold, L A Howard, A G White & M R Vanner is published in New Journal of Physics 20, 053042 (2018)
The Lubuntu development team promised to finally switch from LXDE (Lightweight X11 Desktop Environment) to the more modern and actively maintained LXQt (Lightweight Qt Desktop Environment), and the switch is now official.
Posted by Moritz Muehlenhoff on May 21-------------------------------------------------------------------------
The chairs were filled not with Gerards fellow Google employees but, instead, more than 100 engineers from about a dozen big privately held companies that Googles Alphabet had invested in.
As it battles to stand out in late-stage investing, Alphabets CapitalG is throwing a new machine learning marathon for its portfolio companies.
Posted by Sebastien Delafond on May 21-------------------------------------------------------------------------
Posted by Moritz Bechler on May 21Advisory ID: SYSS-2018-007
Electrek reports that Tesla is beginning compliance efforts with respect to their GPL redistribution of components such as Linux, Busybox, Buildroot, QT, and other components:
Tesla has been taking some flak for years now in the software community for using open source software without complying with the licenses. In a step toward compliance, Tesla is now releasing some parts of its software, which is going to be useful to Tesla hackers and security researchers.
Some of the copyright holders have been complaining that Tesla hasn't been complying with their licenses. Software Freedom Conservancy, a not-for-profit organization pushing for open source software, has been on Tesla's case for a while over the issue.
We had received multiple reports of a GPL violation regarding Tesla's Model S. Customers who purchased Tesla's Model S received on-board system(s) that contained BusyBox and Linux, but did not receive any source code, nor an offer for the source... We know that Tesla received useful GPL compliance advice from multiple organizations, in addition to us, over these years."
"Currently the material that is there is representative of the 2018.12 release, but it will be updated with new versions corresponding to new releases over time. Work is underway on preparing sources in other areas as well, together with a more coordinated information page. We wanted to let you know about this material as it is available now while work continues on the other parts. For further questions, please contact firstname.lastname@example.org."
With the brilliance of Mr. Musk and his ample staff, one would think that they would have figured out their license obligations without literally years of outside help--many small all-volunteer projects do it seemingly effortlessly as a matter of course--but in that, one would be wrong.
Also submitted by canopic jug.
Measuring latency and being able to react to latency issues are getting equally complex as our systems got more complex. This article will help you how to navigate yourself at a latency problem and what you need to put in place to effectively do so.
So, what is latency? Latency is how long it takes to do something. How long does it take to have a response back? How long does it take to process a message in a queue?
Under increasing pressure from copyright holders, in 2014 Singapore passed amendments to copyright law that allow ISPs to block pirate sites.
The prevalence of online piracy in Singapore turns customers away from legitimate content and adversely affects Singapores creative sector, said then Senior Minister of State for Law Indranee Rajah.
It can also undermine our reputation as a society that respects the protection of intellectual property.
After the amendments took effect in December 2014, there was a considerable pause before any websites were targeted. However, in September 2016, at the request of the MPA(A), Solarmovie.ph became the first website ordered to be blocked under Singapores amended Copyright Act. The High Court subsequently ordering several major ISPs to disable access to the site.
A new wave of blocks announced this morning are the countrys most significant so far, with dozens of pirate sites targeted following a successful application by the MPAA earlier this year.
In total, 53 sites across 154 domains including those operated by The Pirate Bay plus KickassTorrents and Solarmovie variants have been rendered inaccessible by ISPs including Singtel, StarHub, M1, MyRepublic and ViewQwest.
In Singapore, these sites are responsible for a major portion of copyright infringement of films and television shows, an MPAA spokesman told The Straits Times (paywall).
This action by rights owners is necessary to protect the creative industry, enabling creators to create and keep their jobs, protect their works, and ensure the continued provision of high-quality content to audiences.
Before granting a blocking injunction, the High Court must satisfy itself that the proposed online locations meet the threshold of being flagrantly infringing. This means that a site like YouTube, which carries a lot of infringing content but is not dedicated to infringement, would not ordinarily get caught up in the dragnet.
Sites considered for blocking must have a primary purpose to infringe, a threshold that is tipped in copyright holders favor when the sites operators display a lack of respect for copyright law and have already had their domains blocked in other jurisdictions.
The Court also weighs a number of addit...
"Nearly 51 million households don't earn enough to afford a monthly budget that includes housing, food, child care, health care, transportation and a cell phone, according to a study released Thursday by the United Way ALICE Project. That's 43% of households in the United States."
The figure includes the 16.1 million households living in poverty, as well as the 34.7 million families that the United Way has dubbed ALICE -- Asset Limited, Income Constrained, Employed. This group makes less than what's needed "to survive in the modern economy."
"Despite seemingly positive economic signs, the ALICE data shows that financial hardship is still a pervasive problem," said Stephanie Hoopes, the project's director.
California, New Mexico and Hawaii have the largest share of struggling families, at 49% each. North Dakota has the lowest at 32%.
Many of these folks are the nation's child care workers, home health aides, office assistants and store clerks, who work low-paying jobs and have little savings, the study noted. Some 66% of jobs in the US pay less than $20 an hour.
Read more of this story at SoylentNews.
Early risers on the US East Coast might get a bit of a show tomorrow morning: private space company Orbital ATK will launch its Antares rocket with a Cygnus spacecraft at 4:39 AM EDT [08:39 UTC] from NASA's Wallops Flight Facility in Virginia.
The mission is the company's ninth flight for NASA, and is headed to the International Space Station, where it will drop off a 7,400 pounds of scientific equipment and supplies when it docks on Thursday, May 24th.
This time, the astronauts will plant six different types of Arabidopsis, a flowering plant that's closely related to cabbage and mustard. Five of the plant varieties have been genetically altered, either to affect they way the plants capture carbon or affect their ability to produce lignin, a fibrous substance that provides structural support for plants. The same varieties will be grown under Earth-gravity conditions at NASA's Kennedy Space Center in Florida.
After several weeks of growth, the zero-G plants will be harvested and shipped back to Earth for comparison. The plants' proteins will be analyzed at Pacific Northwest National Laboratory to see whether a particular genetic mix is better-suited for cultivation in space.
Live coverage at Spaceflight Now. Update: Launch has been pushed back 5 minutes (to the end of its launch window) at 4:44 AM EDT, 08:44 UTC. Update 2: Payload successfully separated around 08:51 UTC. NASA-TV coverage will include the solar panels being unfurled around 09:45 UTC, and a post-launch press conference.
Despite the success shown in prototypes from groups like Boston Dynamics, bipedal walking is still really hard to implement. When the robot lifts one leg, it has to shift its center of gravity over the other leg to avoid falling sideways.
The Autonomous Legged Personal Helper Robot with Enhanced Dynamics (ALPHRED) is getting around this problem by coming at it from a different angle. ALPHRED walks sideways and throws away the distinction between arms and legs.
The bot is RoMeLa at UCLAs latest evolution in their approach to traditional bipedal roadblocks. Sideways walking is something we covered when we talked about their previous version, NABi, which had only two legs. ALPHRED expands that to four limbs. As the video below shows, all four limbs can be used for walking using either a wide, stable sprawl or the limbs can reorient to a narrower dog or horse-like stance for faster running.
Beyond walking, one or two of the limbs can be put to use as hands to open a door or hand over a package, which is why they refer to them as limbs instead of legs or hands. Only an animation is shown of that configuration but RoMeLa is a robotics lab which we keep an eye on so well let you know if they demonstrate it.
The video goes on to show a neat actuator with active compliance which they call BEAR, Back-drivable Electromagnetic Actuator for Robots. A search turned up no further details but let us know in the comments if you have any. We also liked seeing how they use a speaker to give a rough idea of the amount of current being drawn. While its both practical and a hack, it also adds a nice sci-fi touch.
Both vulnerabilities could be exploited by attackers to cause a denial-of-service (DoS) condition, the first issue tracked as CVE-2018-5737 can also cause severe operational problems such as degradation of the service.
A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive negative caching can in some cases cause undesirable behavior from named, such as a recursion loop or excessive logging. reads the security advisory published by the ISC.
Deliberate exploitation of this condition could cause operational problems depending on the particular manifestation either degradation or denial of service.
The flaw affects BIND 9.12.0 and 9.12.1 which permit recursion to clients and which have the max-stale-ttl parameter set to a non-zero value are at risk.
The Internet Systems Consortium (ISC) has addressed the flaw with the release of BIND 9.12.1-P2. Below the workaround provided by the organization:
China takes a critical first step toward landing on the far side of the Moon.
The Queqiao spacecraft is now on its way toward L2.
Sometimes you want to monitor what new information is being written to a file (think of log files), or for whatever reasons, want to access the last few lines of a file. Well, there's a command line utility that lets you do this in Linux, and it's call tail.
In this tutorial, we will discuss the basics of the tail command using some easy to understand examples. But before we do that, it's worth mentioning that all examples included in this article have been tested on Ubuntu 16.04 LTS.
Continuous integration (CI) and continuous delivery (CD) embody a culture, set of operating principles, and collection of practices that enable application development teams to deliver code changes more frequently and reliably. The implementation is also known as the CI/CD pipeline and is one of the best practices for devops teams to implement.
Legendary Pictures/Universal Studios
This week we have two newcomers in our chart.
Pacific Rim: Uprising is the most downloaded movie.
The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.
RSS feed for the weekly movie download chart.
|Movie Rank||Rank last week||Movie name||IMDb Rating / Trailer|
|Most downloaded movies via torrents|
|1||()||Pacific Rim: Uprising||5.8 / trailer|
|2||(2)||Avengers: Infinity War (HDCam)||9.1 / trailer|
|3||()||Deadpool 2 (HDTS)||8.3 / trailer|
Three of the rare Przewalskis horses that now roam the area near the Chernobyl nuclear plant.Photograph by Sergey Gaschak
After a fatal series of errors and malfunctions in the early morning of April 26, 1986, the core of the Chernobyl nuclear facility melted down and then exploded, killing 31 workers at the plant. The accident spewed massive amounts of radioactive material into the surrounding area, forcing a mass evacuation of the nearby villages. Many wild animals died from the direct toxicity of the radiation and almost 1,000 acres of the Red Forestnamed for the unusual color its trees turned after the disasterdied within months. The most radioactive human settlements were bulldozed and buried. (See the related story about the most radioactive part of the nuclear plant: Chernobyls Hot Mess, the Elephants Foot, Is Still Lethal.)
Checkpoints and fences were quickly put up around the vast contaminated region, stretching between northern Ukraine and southern Belarus. This became the exclusion zone, a region that has remained closed to most human activity for the past 28 years.
Yet the area is far from a barren wasteland. Instead it is a
patchwork of hot zones of high radiation next to clean areas.
Posted by Sysdream Labs on May 20# [CVE-2018-10095] Dolibarr XSS Injection vulnerability
Posted by Sysdream Labs on May 20# [CVE-2018-10092] Dolibarr admin panel authenticated Remote Code
Posted by Sysdream Labs on May 20# [CVE-2018-10094] Dolibarr SQL Injection vulnerability
Scan4You is a familiar service for malware developers that used it as a counter anti-virus (CAV).
Scan4You allowed vxers to check their malware against as many as 40 antivirus solutions.
Scan4You was probably the largest counter anti-virus website, it went offline in May 2017 after authorities arrested two men in Latvia, the Russian national Jurijs Martisevs (36) (aka Garrik) and Ruslans Bondars (37) (aka Borland).
Both suspects were extradited by the FBI to the United States.
Jurijs Martisevs was traveling to Latvia when he was arrested by authorities and in March he pleaded guilty in a Virginia court to charges of conspiracy and aiding and abetting computer intrusion.
On Wednesday, Bondars was found guilty of conspiracy to violate the Computer Fraud and Abuse Act, conspiracy to commit wire fraud, and computer intrusion with intent to cause damage.
Ruslans Bondars helped hackers test and improve the malware they then used to inflict hundreds of millions of dollars in losses on American companies and consumers, said John P. Cronan, Acting Assistant Attorney General of the Justice Departments Criminal Division.
Todays verdict should serve as a warning to those who aid and abet criminal hackers: the Criminal Division and our law enforcement partners consider you to be just as culpable as the hackers whose crimes you enableand we will work tirelessly to identify you, prosecute you, and seek stiff sentences that reflect the seriousness of your crimes.
Bondars faces a maximum penalty of 35 years in prison when sentenced on September 21, 2018.
Scan4You was launched in 2009 with the intent to offer a service that helped malware developers to check evasion capabilities of their code.
For a monthly fee, malware authors could upload their samples to the service that test their evasion capabilities against a broad...
Submitted via IRC for Fnord666
"It has been determined that it is no longer viable to continue operating the business."
Cambridge Analytica LLC, the American arm of the London-based data analytics firm of the same name, filed for bankruptcy in federal court in New York on Friday.
The company submitted a voluntary formal petition for Chapter 7 bankruptcyliquidation. That document reveals the company has between $1 and $10 million in debt with very little assets. On May 2, SCL Elections Ltd. and its other British affiliates filed similar "insolvency" documents with UK authorities.
It was revealed last month that a 2014 survey app created at the behest of Cambridge Analytica required Facebook login credentials and provided the survey creator access to their friends' public profile data. In the end, this system captured data from 87 million Facebook users. This data trove wound up in the hands of Cambridge Analytica, the British data analytics firm, which worked with clients like the Donald Trump presidential campaign.
NBC News reported Friday that the company's May 2 shutdown hit employees abruptly, with many remaining employees filing out of their Fifth Avenue office in Manhattan directly to a nearby Irish pub.
[...] The Friday court document also notes that the attorney preparing the filing was paid for by Emerdata, a new data analytics firm founded by many of the same people who were formerly involved in Cambridge Analytica. Emerdata, like Cambridge Analytica, is largely funded by the Mercer family, who are well-known Republican donors and Trump supporters. Rebekah Mercer was named as a director to Emerdata in March 2018. What exactly Emerdata does or how it will operate going forward remains a bit of a mystery.
Read more of this story at SoylentNews.
Nicotinamide adenine dinucleotide (NAD+), a nucleotide, is critical for life to exist. From the most simple bacteria to complex multicellular organisms such as humans, NAD is a vital component of cellular function and thus life.
An increased level of NAD+ appears to convey health and longevity, and a decrease is associated with aging and disease. Today, we are going to look at NAD+, why it declines with age, and what science might do about it.
[Eric Strebel] doesnt need an introduction anymore. If there is a picture of an elegantly designed part with a professional finish on our pages, there is a good chance he has a hand in it. This time he is sharing his method of making a part which looks like it is blow-molded but it is not. Blow-molded parts have a distinctive look, especially made with a transparent material and [Erics] method certainly passes for it. This could upgrade your prototyping game if you need a few custom parts that look like solidified soap bubbles.
Mold making is not covered in this video, which can also be seen below the break, but we can help you out with a tip or two. For demonstrations sake, we see the creation of a medical part which has some irregular surfaces. Resin is mixed and degassed then rolled around inside the mold. Then, the big reveal, resin is allowed to drain from the mold. Repeat to achieve the desired thickness.
This is a technique adapted from ceramics called slipcasting. For the curious, an elegant ceramic slipcasting video demonstration can be seen below as well. For an added finishing touch, watch how a laquer logo is applied to the finished part; a touch that will move the look of your build beyond that of a slapdash prototype.
Heres a video showing how ceramic slip casting works. After watching [Eric]s video, this should make perfect sense.
NASA's next planet hunter, the Transiting Exoplanet Survey Satellite (TESS), is one step closer to searching for new worlds after successfully completing a lunar flyby on May 17. The spacecraft passed about 5,000 miles from the Moon, which provided a gravity assist that helped TESS sail toward its final working orbit.
As part of camera commissioning, the science team snapped a two-second test exposure using one of the four TESS cameras. The image, centered on the southern constellation Centaurus, reveals more than 200,000 stars. The edge of the Coalsack Nebula is in the right upper corner and the bright star Beta Centauri is visible at the lower left edge. TESS is expected to cover more than 400 times as much sky as shown in this image with its four cameras during its initial two-year search for exoplanets. A science-quality image, also referred to as a "first light" image, is expected to be released in June.
TESS will undergo one final thruster burn on May 30 to enter its science orbit around Earth. This highly elliptical orbit will maximize the amount of sky the spacecraft can image, allowing it to continuously monitor large swaths of the sky. TESS is expected to begin science operations in mid-June after reaching this orbit and completing camera calibrations.
Normal TESS images will have up to 30 minutes of exposure time.
Read more of this story at SoylentNews.
Best Free Games for kids 2018 has been an amazing year for video games across all platforms, but with the likes of Destiny 2 and Assassins Creed: Origins being big hits with all the attention, it is sometimes hard to see which games released this year are suitable for children. Top 10 Xbox Games for Kids (Video) Android 
Summary: The Patent Trial and Appeal Board (PTAB), reaffirmed by the Court of Appeals for the Federal Circuit (CAFC) and now the Supreme Court as well, carries on preventing frivolous lawsuits; options for stopping PTAB have nearly been exhausted and it shows
THERES nothing that the patent microcosm has not yet attempted in its war against PTAB. It tried to undermine the legitimacy of PTAB (to no avail), it attempted to slow PTAB down (also without success), and last year it even resorted to scams (misuse of immunity by using shell entities). The USPTO does not mind PTAB because it does not profit from litigation, unlike the patent microcosm. The USPTO just needs to grant good (valid) patents, unlike the EPO under Battistelli.
Weve noticed a considerable decrease in criticisms of PTAB; after Oil States (basically the highest court cementing PTABs role with only two dissenting Justices) it seems like the patent microcosm nearly gave up trying to tear PTAB down. Watchtroll, one of the main anti-PTAB sites, covered Altaire Pharm., Inc. v Paragon Bioteck, Inc. yesterday, but this wasnt even an anti-PTAB article. It feels as though they have learned to accept that PTAB is here to stay. This sites founder, Gene Quinn, even wrote something titled Is the pro-patent community going to continue to lose every battle?
The patent microcosm just cant stop lobbying Iancu after bullying/smearing his predecessor, Michelle Lee, showing that theyre a collective of bullies rather than legal professionals. Watchtroll now calls the patent extremists (like him) the pro-patent community as if patent rationalists are anti-patents (theyre not). Earlier this month Quinn maligned the Supreme Court, basically calling it anti-patent.
As if anyone who isnt as extreme about patents (as Quinn is) must be anti-patent. False dichotomies much? Binar...
A U.S. House of Representatives spending panel voted today to restore a small NASA climate research program that President Donald Trump's administration had quietly axed. (Click here to read our earlier coverage.)
The House appropriations panel that oversees NASA unanimously approved an amendment to a 2019 spending bill that orders the space agency to set aside $10 million within its Earth science budget for a "climate monitoring system" that studies "biogeochemical processes to better understand the major factors driving short and long term climate change."
That sounds almost identical to the work that NASA's Carbon Monitoring System (CMS) was doing before the Trump administration targeted the program, which was getting about $10 million annually, for elimination this year. Critics of the move said it jeopardized numerous research projects and plans to verify the national emission cuts agreed to in the Paris climate accords.
"Likely" because it is part of a larger spending bill that needs to be voted on by the full House, and reconciled with the Senate's version.
Read more of this story at SoylentNews.
Better not bother
Summary: Using loads of misleading terms or buzzwords such as AI the patent microcosm continues its software patents pursuits; but thats mostly failing, especially when courts come to assess pertinent claims made in the patents
NO MATTER what patent law firms keep claiming, software patents are hard to get at the USPTO. Theyre even harder to sell to judges and juries; expert testimonies can peel off the layers of buzzwords and demonstrate that a lot of software patents (whether theyre called cloud or IoT or whatever) boil down to algorithms or code, i.e. the domain of copyrights.
Were not done writing about software patents. The subject needs to be constantly brought up because rebuttals are necessary. Many public events and news sites are still dominated by patent law firms. They tell audiences what they want them to believe rather than what is true.
Consider this example from 24 hours ago. The patent microcosm is still trying to figure out how to get software patents which courts more so than examiners would likely reject anyway. To quote the outline of this upcoming webinar (lobbying/marketing):
Strafford will be offering a webinar entitled Functional Claiming for Software Patents: Leveraging Recent Court Treatment Surviving 112(f) and Disclosing Functional Basis for Software to Meet Heightened Standard of Review on June 5, 2018 from 1:00 to 2:30 pm (EDT). Cory C. Bell and Doris Johnson Hines of Finnegan Henderson Farabow Garrett & Dunner will guide IP counsel on functional claiming in software patents and USPTO prosecution, examine recent court treatment, and explain how to navigate the issue of functionality given the uncertainties in the prosecution and litigation contexts.
Check out whos on this panel (webinar); basically nobody that has anything to do with software. Its whats commonly known as circle-jerk.
It has become fashionable to dress up software patents as all sorts of things; the EPO likes three-letter acronyms such as ICT, CII, and 4IR. A couple o...
Its a problem common to every hackerspace, university machine shop, or even the home shops of parents with serious control issues: how do you make sure that only trained personnel are running the machines? There are all kinds of ways to tackle the problem, but why not throw a little tech at it with something like this magnetic card-reader machine lockout?
[OnyxEpoch] does not reveal which of the above categories he falls into, if any, but well go out on a limb and guess that its a hackerspace because it would work really well in such an environment. Built into a sturdy steel enclosure, the guts are pretty simple an Arduino Uno with shields for USB, an SD card, and a data logger, along with an LCD display and various buttons and switches. The heart of the thing is a USB magnetic card reader, mounted to the front of the enclosure.
To unlock the machine, a user swipes his or her card, and if an administrator has previously added them to the list, a relay powers the tool up. Theres a key switch for local override, of course, and an administrative mode for programming at the point of use. Tool use is logged by date, time, and user, which should make it easy to identify mess-makers and other scofflaws.
We find it impressively complete, but imagine having a session timeout in the middle of a machine operation would be annoying at the least, and potentially dangerous at worst. Maybe the solution is a very visible alert as the timeout approaches a cherry top would do the trick!
Michel Barnier (centre) lobbied for the UPC for many years (since the days it wasnt even called UPC)
Summary: Frenchmen at the EPO will try hard to bring momentum if not force to the Unified Patent Court; facts, however, arent on their side (unlike Team UPC, which was always on Team Battistellis side)
YESTERDAY we wrote about the TC Heartland determination turning one. Lawyers, especially upon this decisions anniversary, still try to work their way around it. They want to make it possible to drag companies into patent courts/trials far away from where theyre based. In re HTC Corp. was recalled yesterday (Sunday) by Watchtroll. The patent venue statute does not apply to foreign corporations sued for patent infringement, it said. These foreign defendants may be sued in any judicial district where they are subject to personal jurisdiction. This is part of a pattern.
We find this quite relevant to the UPC/Brexit debate. Can British companies be sued over patent infringement in other countries (for their activities inside Britain)? With court proceedings that arent even in English? This question has been brought up in the constitutional complaint in Germany (the language and the UKs status in Europe).
Can British companies be sued over patent infringement in other countries (for their activities inside Britain)?Patent maximalists and Team UPC in their lawyers-centric sites dont seem bothered by such questions. They seem so eager to see a torrent of new patent lawsuits, so earlier this month they were in full fanboi mode for the UPC.
Max Walters, a journalist rather than a lawyer, called it the patent courts Brexit paradox. August Debouzy, boosters of Battistelli agenda,...
Merely damages the credibility of the USPTO if anything
Summary: A roundup of news about Apple and its patent cases (especially Apple v Samsung), including Intels role trying to intervene in Qualcomm v Apple
HERE in this Web site we prefer to focus on topics/angles which ought to be covered by mainstream media but never/rarely are. The Apple v Samsung trial is generally being covered quite a lot by big publishers, e.g. Apple v Samsung Poses Threat Beyond Just Tech and other new headlines/reports [1, 2, 3, 4, 5, 6]. It is already being mentioned quite heavily in social control media, probably because Apple is involved. Not many patent cases manage to attract quite as much public interest. We remarked on it a few times earlier this month. As Wall Street media put it last week, Apple Wants $1 Billion From Samsung at Smartphone Retrial (retrial after nearly a decade of fighting).
Apple has taken patent maximalism/lunacy to new heights in California. Its seeking billions in damages over a simple shape...
Heres an overview of some of last weeks most interesting news, podcasts and articles: How can Office 365 phishing threats be addressed? The frequency of phishing within Office 365 is estimated to cost the average organization 1.3 compromised accounts each month via unauthorized, third-party login using stolen credentials. Personal encryption usage is increasing According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage More
The post Week in review: Office 365 phishing threats, companies ditch data as GDPR approaches appeared first on Help Net Security.
A number of soylentils have written in to let us know that Google is opening up the possibility of being evil by eliminating it from their code of conduct. You've been warned.
Google's unofficial motto has long been the simple phrase "don't be evil." But that's over, according to the code of conduct that Google distributes to its employees. The phrase was removed sometime in late April or early May, archives hosted by the Wayback Machine show.
Related: Google vs
Google Employees on Pentagon AI Algorithms: "Google Should Not be in the Business of War"
Google Duplex: an AI that Can Make Phone Calls on Your Behalf
About a Dozen Google Employees Have Resigned Over Project Maven
Read more of this story at SoylentNews.
This week in DistroWatch Weekly: Review: DragonFly BSD 5.2.0News: Tails works on persistent packages, Ubuntu Studio plans alternative desktops, Mageia offers massive update, Ubuntu team plans new features, GNOME removes (and restores) launching programs from NautilusTips and tricks: Finding which services were affected by an updateReleased last week:....
Another day, another irritating situation for The Pirate Bay fans.
This is a post from HackRead.com Read the original post: You are not alone; The Pirate Bay is down around the world
One of the more interesting pieces of tech from Hollywood that never seems to become a reality is a location tracker. Remember the movement tracker in Alien that found the cat in the locker? Yeah, like that. Something that reports the direction and distance to a target, kind of like a PKE Meter from Ghostbusters. I think there was something like this in Predator. On Indiegogo, theres a device that tracks other devices. Its called the Lynq, and its a small, handheld device that tells you the distance and bearing of other paired devices. Hand them out to your friends, and youll be able to find each other at Coachella. While the device and use case is interesting, were wondering how exactly this thing works. Our best guess is that each device has a GPS module inside, and communicates with other paired devices over the 900MHz band. Its a bit pricey at $80 per unit (although you need at least two to be useful), but this is a really interesting project.
The SDRPlay SDR1 and SDR2 are as you would guess software defined radio receivers, that retail for $2-300. Problem: a few of these units were stolen from a warehouse, and are winding up on eBay. Solution: SDRPlay has decided to disable the specific receivers via the serial number. In a move just slightly reminiscent of FTDIgate, a manufacturer has decided to brick products that are stolen or infringe on IP. Its a solution, but I wouldnt want to be on the customer service team at SDRPlay.
A few years ago, [Oscar] created the PiDP-8/I, a computer kit that miniaturized the venerable PDP-8/I into a desktop form factor, complete with blinkenlights and clicky switches. Its a full simulation of a PDP-8 running on a Raspberry Pi, and if you took the PiDP-8/I back to 1975, you could, indeed, connect it to other computers. But the PDP-8/I isnt the most beautiful minicomputer ever created. That honor goes to the PDP-11/70, a beast of a machine wrapped in injection molded plastic and purple toggle switches. Now, after years of work, [Oscar] has miniaturized this beast of a machine. The PiDP-11/70 is a miniature remake of the PDP-11/70, runs a Raspberry Pi, and is everything you could ever want in a minimainframe. The price will be around $250 expensive, but have you ever tried to find a PDP-11 front panel on eBay?
The Nvidia TX2 is a credit card-sized computer with a powerful ARM p...
Looks like we got hacked again, well try to fix
This is a post from HackRead.com Read the original post: Someone hacked Californias live congressional debate to run gay porn
Linux 4.17 is up to its sixth weekly release candidate ahead of the official release expected by mid-June...
PayPal Holdings Inc. is buying Swedish small-business platform iZettle for $2.2 billion to expand in Europe and Latin America and increase its presence in brick and mortar stores.
"Small businesses increasingly want a full suite of capabilities across channels, a one-stop stop," Dan Schulman, chief executive officer of PayPal, said in an interview. "IZettle was the perfect fit in many ways."
The deal is the biggest ever for San Jose, California-based PayPal and will help it compete with Square Inc., which made a name for itself by helping small businesses and food-truck vendors conduct credit card and mobile transactions. Founded in 2010 by Jacob de Geer and Magnus Nilsson, iZettle also started out with a mobile-phone gadget for accepting credit card payments. It has since expanded into software and financing services to support small businesses.
All-cash deal = money in the (real) bank.
Also at TechCrunch.
Read more of this story at SoylentNews.
Leaders of major technology companies are under increasing pressure to testify before Congress as lawmakers sound the alarm about the industrys data practices and market power.Its been a month since Facebook CEO Mark Zuckerberg appeared in a pair...
One of the more useful features of masscan is the
"--banners" check, which connects to the
TCP port, sends some request, and gets a basic response back.
However, since masscan has it's own TCP stack, it'll
interfere with the operating system's TCP stack if they are sharing
the same IPv4 address. The operating system will reply with a RST
packet before the TCP connection can be established.
The way to fix this is to use the built-in packet-filtering firewall to block those packets in the operating-system TCP/IP stack. The masscan program still sees everything before the packet-filter, but the operating system can't see anything after the packet-filter.
Note that we are talking about the "packet-filter" firewall feature here. Remember that macOS, like most operating systems these days, has two separate firewalls: an application firewall and a packet-filter firewall. The application firewall is the one you see in System Settings labeled "Firewall", and it controls things based upon the application's identity rather than by which ports it uses. This is normally "on" by default. The packet-filter is normally "off" by default and is of little use to normal users.
What we need to filter is the source port of the packets that masscan will send, so that when replies are received, they won't reach the operating-system stack, and just go to masscan instead. To do this, we need find a range of ports that won't conflict with the operating system. Namely, when the operating system creates outgoing connections, it randomly chooses a source port within a certain range. We want to use masscan to use source ports in a different range.
To figure out the range macOS uses, we run the following command:
sysctl net.inet.ip.portrange.first net.inet.ip.portrange.last
On my laptop, which is probably the default for macOS, I get the following range. Sniffing with Wireshark confirms this is the range used for source ports for outgoing connections.
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.
Are you using threat intelligence to its full potential?
The term threat intelligence is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner Market Guide for Security Threat Intelligence Products and Services explains the different use cases and how to best leverage threat intelligence in your organization.
You will learn how to:
Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.
If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
Just shy of one month since the long-awaited debut of GIMP 2.10, the first stable point release is now available...
Once you step into the world of controls, you quickly realize that controlling even simple systems isnt as easy as applying voltage to a servo. Before you start working on your own bipedal robot or scratch-built drone, though, you might want to get some practice with this intricate field of engineering. A classic problem in this area is the inverted pendulum, and [Philip] has created a great model of this which helps illustrate the basics of controls, with some AI mixed in.
Called the ZIPY, the project is a Cart Pole design that uses a movable cart on a trolley to balance a pendulum above. The pendulum is attached at one point to the cart. By moving the cart back and forth, the pendulum can be kept in a vertical position. The control uses the OpenAI Gym toolkit which is a way to easily use reinforcement learning algorithms in your own projects. With some Python, some 3D printed parts, and the toolkit, [Philip] was able to get his project to successfully balance the pendulum on the cart.
Of course, the OpenAI Gym toolkit is useful for many more projects where you might want some sort of machine learning to help out. If you want to play around with machine learning without having to build anything, though, you can also explore it in your browser.
Submitted via IRC for SoyCow0245
Last year, AMD introduced Ryzen Pro, a range of processors aimed at corporate desktops rather than consumer systems. Though broadly identical to their consumer counterparts, the Pro chips offer additional guarantees around supply and availability so that corporate fleets can standardize on particular chips without risking a part being discontinued mid-way through their replacement cycle. The Pro chips also carry longer warranties and emphasize certain security and management features that may not be present or enabled in consumer systems.
The first Ryzen Pros had a major omission, however: they didn't include integrated GPUs. Corporate desktops and laptops, typically used for Office, Web browsing, and other low-intensity tasks, overwhelmingly use integrated GPUs rather than discrete ones; they simply don't need anything more powerful. The need for separate GPUs meant that the first-generation Ryzen Pros had only very limited appeal in their target corporate market.
The new processors, however, follow in the footsteps of the Ryzens with integrated Vega graphics launched in February, pairing a single core complex (CCX; a bundle of four cores/eight threads and a shared level 3 cache) with a Vega GPU. This makes them a complete solution for the corporate desktop.
Read more of this story at SoylentNews.
The best news of the week with Security Affairs.
Let me inform you that my new book, Digging in the Deep Web is online
Once again thank you!
|A new flaw in Electron poses a risk to apps based on the framework|
|Malicious package containing Bytecoin cryptocurrency miner found on the Ubuntu Snap Store|
|UK mobile operator EE left a critical code system exposed with a default password|
|Chilis restaurant chain is the last victim of a Payment Card Breach|
|Critical Flaws in PGP and S/MIME Tools Immediately disable tools that automatically decrypt PGP-encrypted email|
|Nigelthorn malware infected over 100,000 systems abusing Chrome extensions|
At TorrentFreak we do our best to keep readers updated on the latest copyright and piracy news, highlighting issues from different points of view.
We report on the opinions and efforts of copyright holders when it comes to online piracy and we also make room for those who oppose them. Thats how balanced reporting works in our view.
There is probably no site on the Internet who reports on the negative consequences of piracy as much as we do, but for some reason, the term pro-piracy is sometimes attached to our reporting. This also happened in the recent reply Fairplay Canada sent to the CRTC.
The coalition of media companies and ISPs is trying to get a pirate site blocking regime implemented in Canada. As part of this effort, its countering numerous responses from the public, including one from law professor Michael Geist.
In his submission, Geist pointed out that the Mexican Supreme Court ruled that site blocking is disproportional, referring to our article on the matter. This article was entirely correct at the time it was written, but it appears that the Court later clarified its stance.
Instead of pointing that out to us, or perhaps Geist, Fairplay frames it in a different light.
Professor Geist dismisses Mexico because, relying on a third party source (the pro-piracy news site TorrentFreak), he believes its Supreme Court has ruled that the regime is disproportionate, it writes.
Fairplay does not dispute that the Supreme Court initially ruled that a site blockade should target specific content. However, it adds that the court later clarified that blockades are also allowed if a substantial majority of content on a site is infringing.
The bottom line is that, later developments aside, our original article was correct. What bothers us, however, is that the Fairplay coalition is branding us as a pro-piracy site. Thats done for a reason, most likely to discredit the accuracy of our reporting.
Luckily we have pretty thick skin, so well get over it. If Fairplay Canada doesnt trust us, then so be it.
Amusingly, however, this was no...
Anyone happening to have an ATI Mach 64 graphics card from the mid-90's or a 3Dfx-competitor Rendition graphics card also from the 90's can now enjoy the benefits of the recently released X.Org Server 1.20...
You may have forgotten about the nucleolus since you took biology class, but scientists think this structure inside every cell in your body may play an important role in aging.
Submitted via IRC for Fnord666
[...] A landmark report published in 2009 by the National Academy of Sciences highlighted the lack of scientific foundation for fingerprint evidence, as well as other commonly used metrics in forensic science, like bite marks and bloodstain patterns. This isn't to say that fingerprints aren't useful in the justice system. But they aren't entirely reliable, and in the current practice of print analysis, there's no place to signal that uncertainty to an attorney, judge, or jury.
Using statistics and probabilities to help bolster fingerprint results and signal the weight of the evidence isn't a new idea, but this is the first time a tool has actually been put in the hands of fingerprint examiners. FRStat was developed by Henry Swofford, chief of the latent print branch at the U.S. Army Criminal Investigation Laboratory at the Department of Defense. "We're the first lab in the United States to report fingerprint evidence using a statistical foundation," Swofford said.
[...] Adding a element of quantitative analysis to fingerprint identification is positive progress for forensic science, which struggles, overall, to live up to the "science" side of its name. Implementing the program, though, requires a significant culture change for a field that's remained largely the same for decades, if not a centuryposing additional challenges for people like Swofford who pushing for progress.
Read more of this story at SoylentNews.
CalAmp is a company that provides backend services for several well-known systems.
Security researchers Vangelis Stykas and George Lavdanis discovered that a misconfigured server operated by the CalAmp company could allow anyone to access account data and takeover the associated vehicle.
The experts were searching for security vulnerabilities in the Viper SmartStart system, a device that allows users to remotely start, lock, unlock, or locate their vehicles directly using a mobile app on their smartphones.
As with many other mobile applications, it used secure connections with SSL and Certificate Pinning (Hard-code in the client the certificate is known to be used by the server) to automatically reject a connection from sites that offer bogus SSL certificates.
The experts noticed that the app was connecting to mysmartstart.com domain and also to the third party domain (https://colt.calamp-ts.com/), it is the Calamp.com Lender Outlook service.
The experts discovered that using the credentials for the user created from the viper app it was possible to login the panel.
This was a different panel which seemed to be targeted to the companies that have multiple sub-accounts and a lot of vehicles so that they can manage them.
Maker Faire is the nexus for all things new and exciting. At the Bay Area Maker Faire this weekend, zGlue introduced a new platform that stretches the definition of custom ICs. Is this custom silicon? No, not at all. zGlue is a platform allowing anyone to take off-the-shelf ICs and package them into a single module, allowing you to build a smaller PCB with a shorter BOM.The zGlue module found in the zOrigin
The idea behind zGlue is to take all of the fun chips available today from accelerometers to tiny microcontrollers with integrated wireless and put them on a tiny, tiny board that is then encapsulated. At Maker Faire, the zGlue team was busy demonstrating their cloud-based platform that allows anyone to add off-the-shelf chips to the zGlue stack and assemble it into a custom module.
Of course, every new tech startup needs a demo, so zGlue has come up with zOrigin, a small fitness tracker that features a suite of chips crammed into one encapsulated package. The chips included in the zOrigin ZiP package are a Dialog DA14585 microcontroller with BLE, an Analo...
Machine-learning technology is growing ever more accessible. Lets not have a 9/11-style failure of imagination about it.
There is a general tendency among counterterrorism analysts to understate rather than hyperbolize terrorists technological adaptations. In 2011 and 2012, most believed that the Arab Spring revolutions would marginalize jihadist movements. But within four years, jihadists had attracted a record number of foreign fighters to the Syrian battlefield, in part by using the same social media mobilization techniques that protesters had employed to challenge dictators like Zine El Abidine Ben Ali, Hosni Mubarak, and Muammar Qaddafi.
Militant groups later combined easy accessibility to operatives via social media with new advances in encryption to create the virtual planner model of terrorism. This model allows online operatives to provide the same offerings that were once the domain of physical networks, including recruitment, coordinating the target and timing of attacks, and even providing technical assistance on topics like bomb-making.
The development of Israel-based Urban Aeronautics Cormorant prototype is well underway, with hopes of launching a full-scale development of the aircraft in the near future.
Artificial intelligence and automation stand poised to put millions out of work and make inequality even more pronounced. Is it possible to solve one problem with another?
Intel and two Israeli ministries this week announced that the chip giant plans to invest $5 billion in its Kiryat Gat fab complex Fab 28 through 2020. Under the plan, Intel is expected to buy various products from local suppliers and hire additional personnel. In return, Israel will provide the processor maker a tax rebate and a government grant. Furthermore, Intel will receive another grant if it upgrades its manufacturing in Israel further.
Under the terms of the investment plan, Intel will invest $5 billion (NIS 18 billion) in its Kiryat Gat ventures until 2020. The chip giant is expected to buy $838 million (NIS 3 billion) worth of local goods and add 250 people to its workforce, reports The Times of Israel citing the Finance Ministry. If the plan is approved by the Israeli authorities, Intel will get a 5% tax rebate till 2027, as well as a $195.5 million (NIS 700 million) government grant. Additionally, if Intel decides to "significantly upgrade" its fab "technologically", the company will get another $195.5 million grant.
Intel's first "10nm" CPU will be the i3-8121U, a dual-core part which will be featured in the Lenovo Ideapad 330. Due to low yields on the "10nm" process, a few Cannon Lake CPUs will be released in 2018 alongside "14nm" Whiskey Lake. Both microarchitectures are considered to be "8th-generation" (hence the '8' in "i3-8121U").
Also at CTech.
Read more of this story at SoylentNews.
The United Kingdom is planning to propose laws that would curb cyberbullying and impose restrictions on social media companies, Reuters reported Sunday. Matt Hancock, Britains digital minister, said Sunday that the government would publish a...
When you think of world-changing devices, you usually dont think of the washing machine. However, making laundry manageable changed not only how we dress but how much time people spent getting their clothes clean. So complaining about how laborious our laundry is today would make someone from the 1800s laugh. Still, we all hate the laundry and [Andrew Dupont], in particular, hates having to check on the machine to see if it is done. So he made Laundry Spy.
How do you sense when the machine either a washer or a dryer is done? [Andrew] thought about sensing current but didnt want to mess with house current. His machines dont have LED indicators, so using a light sensor wasnt going to work either. However, an accelerometer can detect vibrations in the machine and most washers and dryers vibrate plenty while they are running.
The four-part build log shows how he took an ESP8266 and made it sense when the washer and dryer were done so it could text his cell phone. Hed already done a similar project with an Adafruit HUZZAH. But he wanted to build in some new ideas and currently likes working with NodeMCU. While he was at it he upgraded the motion sensor to an LIS3DH which was cheaper than the original sensor.
[Andrew] already runs Node RED on a Raspberry Pi, so incorporating this project with his system...
The Nautilus file manager in GNOME 3.30 will no longer allow users to double click on binary files for running them...
Women prefer a man with legs that are about half his height, according to previous research; scientists believe that is an evolutionary result of women wanting to choose only healthy men. Legs that are too short, for example, have been linked to type 2 diabetes. But other proportions, such as arm length to body height or whether the elbow and knee divide a limb in half, can also relate to a person's health. Do they influence women's views as well?
To answer this, researchers collected average body proportions from roughly 9000 men in the U.S. military and used them to create computer-generated images of male models (pictured). The scientists made the model's arms and legs slightly longer or shorter, and then asked more than 800 heterosexual U.S. women to rank each model's attractiveness.
How long the model's arms were relative to his height didn't seem to matter [open, DOI: 10.1098/rsos.171790] [DX], the team reports today in Royal Society Open Science. And women cared only a little about how the elbow or knee divided a limb. But as seen in previous work, women noticed if the legs made up more or less than half his heightand they didn't like it.
Read more of this story at SoylentNews.
Posted by nullbyte on May 20Features:
If Tom Clancy had been a technophile of the software kind, hed have used this title instead of the familiar one for one of his iconic blockbuster thrillers. The thing is, Linux accounts for a tiny percentage of the overall desktop market share. The perennial 1% has been around roughly since 2005, and even if the actual share is higher than that, its still a small and largely insignificant fraction. And yet, there are hundreds of Linux distributions populating this narrow, crowded arena. Why? Well, ego, of course.
One might say: open source. Ah, well, the open-source nature of Linux has been the chief excuse to the colorful abundance of replication and duplication of the Linux desktop world, while at the same time serving as the main catalyst to the expansion of Linux in the commercial space, which makes for a dubious cause. I believe the reason is different. Let me tell you what it is.
The then-23-year-old giant, which ruled the personal computer market with a despotic zeal, stood accused of using monopoly power to bully collaborators and squelch competitors. Its most famous victim was Net...
The Linux 4.18 kernel will feature the initial Steam Controller kernel driver that works without having to use the Steam client or using third-party user-space applications like the SC-Controller application...
Everyone recognizes Tetris, even when its tiny Tetris played sideways on a business card. [Michael Teeuw] designed these PCBs and they sport small OLED screens to display contact info. The Tetris game is actually a hidden easter egg; a long press on one of the buttons starts it up.
It turns out that getting a playable Tetris onto the ATtiny85 microcontroller was a challenge. Drawing lines and shapes is easy with resources like TinyOLED or Adafruits SSD1306 library, but to draw those realtime graphics onto the 12832 OLED using that method requires a buffer size that wouldnt fit the ATtiny85s available RAM.
To solve this problem, [Michael] avoids the need for a screen buffer by calculating the data to be written to the OLED on the fly. In addition, the fact that the smallest possible element is a 44 pixel square reduces the overall memory needed to track the screen contents. As a result, the usual required chunk of memory to use as a screen buffer is avoided. [Michael] also detailed the PCB design and board assembly phases for those of you interested in the process of putting together the cards using a combination of hot air reflow and hand soldering.
PCB business cards showcase all kinds of c...
Submitted via IRC for SoyCow3941
In its latest effort to fend off cryptocurrency scams, the Securities and Exchange Commission launched its own fake initial coin offering website today called the Howey Coin to warn people against fraudulent cryptocurrencies. The name is a tongue-in-cheek reference to the Howey Test that the SEC uses to determine whether an investment is a security, which the Commission would therefore have legal jurisdiction over.
Click 'Buy Coins Now' on the Howey Coins site and you'll be redirected to an SEC page that states: "We created the bogus HoweyCoins.com site as an educational tool to alert investors to possible fraud involving digital assets like crypto-currencies and coin offerings." The SEC uses the page to highlight red flags that customers should watch out for, including a promise of high returns (which indicates high risks), celebrity endorsements, and even false claimes that an ICO is SEC-compliant.
Read more of this story at SoylentNews.
The second beta release of FreeBSD 11.2 is now available for weekend testing...
Warning: Nothing that appears on Cryptogon should be viewed as medical advice. Thanks to the Cryptogon reader who told me about taking sodium bicarbonate after my kidney stone disaster! Via: Agusta University: A daily dose of baking soda may help reduce the destructive inflammation of autoimmune diseases like rheumatoid arthritis, scientists say. They have 
Efforts to connect human brains to computers have taken big leaps forward in recent years. Melding our minds with machines could provide the biggest single upgrade to human intelligence since our species evolved. But are we ready?
Click here to subscribe to The Economist on YouTube: https://econ.st/2Fzn4ON
Daily Watch: mind-stretching short films throughout the working week.
For more from Economist Films visit: https://econ.st/2Fzez6w
Check out The Economists full video catalogue: http://econ.st/20IehQk
Like The Economist on Facebook: https://econ.st/2FBxRIp
Follow The Economist on Twitter: https://econ.st/2FBdYRC
Follow us on Instagram: https://econ.st/2FCDEgK
Follow us on Medium: https://econ.st/2FByz8v
After a massive explosion puts everything at risk, workers at Kodiak Islands spaceport prepare to launch a new rocket into orbit.
Astronomers at ANU have found the fastest-growing black hole known in the Universe, describing it as a monster that devours a mass equivalent to our sun every two days.
The astronomers have looked back more than 12 billion years to the early dark ages of the Universe, when this supermassive black hole was estimated to be the size of about 20 billion suns with a one per cent growth rate every one million years.
"This black hole is growing so rapidly that it's shining thousands of times more brightly than an entire galaxy, due to all of the gases it sucks in daily that cause lots of friction and heat," said Dr Wolf from the ANU Research School of Astronomy and Astrophysics.
"If we had this monster sitting at the centre of our Milky Way galaxy, it would appear 10 times brighter than a full moon. It would appear as an incredibly bright pin-point star that would almost wash out all of the stars in the sky."
[...] The discovery of the new supermassive black hole was confirmed using the spectrograph on the ANU 2.3 metre telescope to split colours into spectral lines.
"We don't know how this one grew so large, so quickly in the early days of the Universe," Dr Wolf said.
Christian Wolf, Fuyan Bian, Christopher A. Onken, Brian P. Schmidt, Patrick Tisserand, Noura Alonzi, Wei Jeat Hon, John L. Tonry. Discovery of the most ultra-luminous QSO using Gaia, SkyMapper and WISE. Publications of the Astronomical Society of Australia, 2018
Read more of this story at SoylentNews.
This week, Arduino announced a lot of new hardware including an exceptionally interesting FPGA development board aimed at anyone wanting to dip their toes into the seas of VHDL and developing with programmable logic. We think its the most interesting bit of hardware Arduino has released since their original dev board, and everyone is wondering what the hardware actually is, and what it can do.
This weekend at Maker Faire Bay Area, Arduino was out giving demos for all their wares, and yes, the Arduino MKR Vidor 4000 was on hand, being shown off in a working demo. We have a release date and a price. Itll be out next month (June 2018) for about $60 USD.
But what about the hardware, and what can it do? From the original press releases, we couldnt even tell how many LUTs this FPGA had. There were a lot of questions about the Mini PCIe connectors, and we didnt know how this FPGA would be useful for high-performance computation like decoding video streams. Now we have the answers....
Security experts from Eclypsium have devised a new variation of the Spectre attack that can allow attackers to recover data stored inside CPU System Management Mode (SMM) (aka called ring -2).
The SMM is an operating mode of x86 CPUs in which all normal execution, including the operating system, is suspended.
When a code is sent to the SMM, the operating system is suspended and a portion of the UEFI/BIOS firmware executes various commands with elevated privileges and with access to all the data and hardware.
The main benefit of SMM is that it offers a distinct and easily isolated processor environment that operates transparently to the operating system or executive and software applications. reads Wikipedia.
The SMM mode was first released with the Intel 386SL in the early 90s, Intel CPUs implements a memory protection mechanism known as a range register to protect sensitive contents of memory regions such as SMM memory.
SMM memory on Intel CPUs is protected by a special type of range registers known as System Management Range Register (SMRR).
Eclypsium experts based their study on a public proof-of-concept code for the Spectre variant 1 (CVE-2017-5753) vulnerability to bypass the SMRR mechanism and access to the content of the System Management RAM (SMRAM) that contains the SMM and where the SMM working data is executed.
Because SMM generally has privileged access to physical memory, including memory isolated from operating systems, our research demonstrates that Spectre-based attacks can reveal other secrets in memory (eg. hypervisor, operating system, or application). states the report published by Eclypsium.
These enhanced Spectre attacks allow an unprivileged attacker to read the contents of memory, including memory that should be protected by the range registers, such as SMM memory. This can expose SMM code and data that was intended to be confidential, revealing other SMM vulnerabilities as well as secrets stored in SMM,
Back in 2014, Universal Music, Sony Music, Warner Music, Nordisk Film and the Swedish Film Industry filed a lawsuit against Bredbandsbolaget, one of Swedens largest ISPs.
The copyright holders asked the Stockholm District Court to order the ISP to block The Pirate Bay and streaming site Swefilmer, claiming that the provider knowingly facilitated access to the pirate platforms and assisted their pirating users.
Soon after the ISP fought back, refusing to block the sites in a determined response to the Court.
Bredbandsbolagets role is to provide its subscribers with access to the Internet, thereby contributing to the free flow of information and the ability for people to reach each other and communicate, the company said in a statement.
Bredbandsbolaget does not block content or services based on individual organizations requests. There is no legal obligation for operators to block either The Pirate Bay or Swefilmer.
In February 2015 the parties met in court, with Bredbandsbolaget arguing in favor of the important principle that ISPs should not be held responsible for content exchanged over the Internet, in the same way the postal service isnt responsible for the contents of an envelope.
But with TV companies SVT, TV4 Group, MTG TV, SBS Discovery and C More teaming up with the IFPI alongside Paramount, Disney, Warner and Sony in the case, Bredbandsbolaget would need to pull out all the stops to obtain victory. The company worked hard and initially the news was good.
In November 2015, the Stockholm District Court decided that the copyright holders could not force Bredbandsbolaget to block the pirate sites, ruling that the ISPs operations did not amount to participation in the copyright infringement offenses carried out by some of its pirate subscribers.
However, the case subsequently went to appeal, with the brand new Patent and Market Court of Appeal hearing arguments. In February 2017 it handed down its decision, which overruled the earlier ruling of the District Court and ordered Bredbandsbolaget to implement technical measures to prevent its customers accessing the pirate sites through a number of domain names and URLs....
Google has built a multibillion-dollar business out of knowing everything about its users. Now, a video produced within Google and obtained by The Verge offers a stunningly ambitious and unsettling look at how some at the company envision using that information in the future.
Performance metrics are supposed to financially incentivize hospitals to improve the healthcare system. And this is exactly where the trouble starts. The list of misapplied performance metrics could go on and on.Photograph by Luis Molinero / Shutterstock
In 1975, the British economist Charles Goodhart pointed out that when a measure becomes a target, it ceases to be a good measure. Goodharts Law, as it came to be known, is a ubiquitous phenomenon in regulatory affairs, like healthcare. Making healthcare better requires metrics which can be measured and assessed. But measuring the right metric is sometimes the wrong choice.
In order to quantify and characterize health and healthcare,
hospitals and government agencies collect massive amounts of data.
Typically, this data is gathered by patient surveys, such as the
Hospital Consumer Assessment of Healthcare Providers and Systems
Survey (HCAHPS), or by the hospital itself (for instance regarding
in-hospital mortality rate). The metrics present in these surveys
are usually easy to measuretheyre partly used exactly for that
reason. Government agencies, in turn, demand improvement in
metrics like mortality rate or hospital
readmission rate. Hospitals focus on these scores, which can be
coupled to financial penalties and loss of patients. This procedure
Ensuring your CPU microcode is kept up-to-date for Zen processors is now a little bit easier with the microcode files being added to the linux-firmware.git collection...
Arthur T Knackerbracket has found the following story:
Sleep is known to be important for creative thinking, but exactly how it helps and what role each sleep stage -- REM and non-REM -- plays remains unclear. A team of researchers have now developed a theory, outlined in an Opinion published May 15 in the journal Trends in Cognitive Sciences, to explain how the interleaving of REM and non-REM sleep might facilitate creative problem solving in different but complementary ways.
"Suppose I give you a creativity puzzle where you have all the information you need to solve it, but you can't, because you're stuck," says first author Penny Lewis, a professor at the Cardiff University School of Psychology. "You could think of that as you've got all the memories that you need already, but you need to restructure them -- make links between memories that you weren't linking, integrate things that you weren't integrating."
Studies show that this kind of restructuring often happens while we are asleep, so Lewis and her co-authors drew on that literature, as well as physiological and behavioral data, to create a model of what might be happening during each stage. Their model proposes that non-REM sleep helps us organize information into useful categories, whereas REM helps us see beyond those categories to discover unexpected connections.
[...] "So, what we propose is that, if you're stuck on some kind of problem, that problem is salient, and we know that salient things are replayed," Lewis says. "The slightly hypothetical part is that, when something else is randomly activated in the cortex that has an element that's similar, you'll form a link." These surprising links may be the creative leaps required to solve a problem.
-- submitted from IRC
Penelope A. Lewis, Gnther Knoblich, Gina Poe. How Memory Replay in Sleep Boosts Creative Problem-Solving. Trends in Cognitive Sciences, 2018; 22 (6): 491 DOI: 10.1016/j.tics.2018.03.009
Read more of this story at SoylentNews.
Spinners built into games of chance like roulette or tabletop board games stop on a random number after being given a good spin. There is no trick, but they eventually rest because of friction, no matter how hard your siblings wind up for a game-winning turn. What if the spinning continued forever and there was no programming because there was no controller? [Ludic Science] shows us his method of making a perpetual spinner with nothing fancier than a scrapped hard disk drive motor and a transformer. His video can also be seen below the break.
Fair warning: this involves mains power. The brushless motor inside a hard disk drive relies on three-phase current of varying frequencies, but the power coming off a single transformer is going to be single-phase AC at fifty or sixty Hz. This simplifies things considerably, but we lose the self-starting ability of the motor and direction control, but we call those features in our perpetual spinner. With two missing phases, our brushless motor limps along in whatever direction we initiate, but the circuit couldnt be much more straightforward.
This is just the latest skill on a scrapped HDD motors rsum (CV). They will run with a 9V battery, or work backwards and become an encoder. If you want to use it more like the manufacturers intent, consider this controller.
Thank you for the tip,[Itay].
Action games are the meat and potatoes of the medium. As much as we all love our complex RPGs, our patient stealth games, our impenetrable turn based strategy, sometimes you just want to bullet some git in the face with a gun that you shoot, like a proper hard bastard. The action game is perhaps 
For those aspiring Vulkan programmers, the Vulkan experts at LunarG have published a tutorial to learn how to make use of the newest debug extension, VK_EXT_debug_utils...
Within five years, I have no doubt there will be robots in every Army formation.
From the spears hurled by Romans to the missiles launched by fighter pilots, the weapons humans use to kill each other have always been subject to improvement. Militaries seek to make each one ever-more lethal and, in doing so, better protect the soldier who wields it. But in the next evolution of combat, the U.S. Army is heading down a path that may lead humans off the battlefield entirely.
Over the next few years, the Pentagon is poised to spend almost $1 billion for a range of robots designed to complement combat troops. Beyond scouting and explosives disposal, these new machines will sniff out hazardous chemicals or other agents, perform complex reconnaissance and even carry a soldiers gear.
Submitted via IRC for SoyCow3941
On Tuesday, one of the largest LPR manufacturers, ELSAG, announced a major upgrade to "allow investigators to search by color, seven body types, 34 makes, and nine visual descriptors in addition to the standard plate number, location, and time."
Such a vast expansion of the tech now means that evading such scans will be even more difficult.
For years, Ars has been reporting on automated license plate readers (ALPRs, or simply LPRs)a specialized camera often mounted on police cars that can scan at speeds of up to 60 plates per second.
Those scans are compared against what law enforcement usually dubs a "hot list" before alerting the officer to the presence of a potentially wanted or stolen vehicle. All scans are typically kept in a police database for weeks, months, or years on end.
These devices are now in common use by cities big and small across the United States, as well as many countries around the globe, including the United Kingdom. Police at the upcoming royal wedding in London will use LPRs to monitor unauthorized vehicles.
Read more of this story at SoylentNews.
[Correction: Alain Prunier (as named below by Mrpel) is actually a mistake. It is in fact Aurlien Ptiaud in the text below.]
Summary: A famous EPO disciplinary case is recalled; its another one of those EPO-leaning rulings from AT-ILO, which not only praises Battistelli amid very serious abuses but also lies on his behalf, leaving workers with no real access to justice but a mere illusion thereof
The dismissal of SUEPO secretary Laurent Prunier a couple of years ago [1, 2, 3, 4, 5] was the subject of much debate regarding EPO scandals. It happened at the Dutch branch, not the German one. He was probably Battistellis last casualty (among many) that was a staff representative and he was fired in defiance of orders from the Administrative Council. This served to reaffirm the view that Battistelli was in charge of his supposed regulator.
Well, thankfully, owing to EPO
scandals, we nowadays know that ILO too is
dysfunctional.It turns out that theres another Prunier
(see correction above), Alain
Prunier Aurlien Ptiaud, whose
Summary: Another reminder that the LOT is a whole lot more than it claims to be and in effect a reinforcer of the status quo
THE idea that we need to fight patent injustice by hoarding more patents was always a laughable one. The IBM-led OIN, for example, had us believing that it would somehow tackle the issue by making patents defensive (that can never be; its just not how patents actually work).
Theres an old saying along the lines of, to understand what an organisation stands for just check whos running it. At the EPO it would be Battistelli and at the USPTO Iancu, part of the patent microcosm.
Theres an old saying along the lines of, to understand what an orgnisation stands for just check whos running it.The LOT Network charm offensive and puff pieces arent over yet. Were seeing Susan Deckers Bloomberg piece licensed and reposted even more than a week later; we responded to it a couple of times before and 3 days ago we saw Wayne Williams in Beta News issuing another belated LOT Network puff piece in which he said:
Ken Seddon is the CEO of the non-profit patent protection network LOT. The organizations members include Google, Red Hat, Lenovo, Pega and other big players, as well as dozens of startups in areas such as transportation, blockchain, and software.
Startups are disproportionately impacted by patent trolls and we chatted with Ken about how a smart, assertive IP strategy can help protect their businesses.
Startups-themes nonsense is the typical thing we also hear from Battistellis EPO. Its pure marketing, trying to quell dissent from those who suffer the most. LOT Network is led by Google, which has a massive number of patents; all the ke...
If you doubt the power of the Hackaday community, check this one out. Stalwart reader and tipster [starhawk] has pitched in to help a friend in need, someone he met through Hackaday.io. Seems this friends current living arrangements are somewhat on the cramped side, and while hes in need of a PC, even a laptop would claim too much space.
So with a quick trip to the store and a few items from the junk bin, [starhawk] whipped up an all-in-one PC the size of a tablet for his friend. As impressed as we are by the generosity, were more impressed by the quality of his junk bin. The heart of the compact machine is a motherboard from a Wintel CX-W8, scarcely larger than a Raspberry Pi model A. After the addition of a larger heatsink and fan, the board was attached via a sheet of plastic to the back of a 7-inch touchscreen, also a junk bin find. A cheap picture frame serves as the back of the all-in-one, complete with Jolly Wrencher, of course. Alas, the DC-DC converter was one of the only purchased items, bringing the cost for the build to all of $22, including the $15 for a wireless keyboard/touchpad on clearance from Walmart. After some initial power troubles, the fixes for which are described in this update, the machine was ready to ship.
Does this one seem familiar? It should [starhawk] built a similar laptop for himself a while back when he was low on funds. Now it seems like hes paying it forward, which we appreciate. For more details on how he pulled this all of, check out The Anytop, [starhawks] portable computer anyone can build. It was his 2017 Hackaday Prize entry!
Summary: Chinese firms that are struggling resort to patent litigation, in effect repeating the same misguided trajectories which became so notorious in Western nations because they act as a form of taxation, discouraging actual innovation
LAST week we wrote about how Coolpad had resorted to litigation using patents. Months prior we took note of this strategy, which basically revolved around the idea of leveraging patents rather than products. IAM, the patent trolls lobby, says about Coolpad that its patent portfolio is largely unproven (not to mention small compared to that of companies it takes on ). To quote:
Earlier this year, Coolpad filed a number of Chinese patent infringement complaints against Xiaomi. IAM reported these stories largely based on local media accounts. But last week Coolpad sought to ramp up the pressure by ensuring that the story, and key details about the accused Xiaomi products, reached the global financial press in the run-up to Xiaomis potential $10 billion Hong Kong IPO. On 10th May, one week after Xiaomi announced its flotation plans, Coolpad held a press conference in Hong Kong to update the media on its dispute with Xiaomi.
If Coolpad is attempting to build a business on top of litigation, then it wont go very far. The company is already in the red and it seems to be struggling, unlike Xiaomi.
If Coolpad is attempting to build a business on top of litigation, then it wont go very far. The company is already in the red and it seems to be struggling, unlike Xiaomi.There are similar companies in the West. After Microsoft entryism, for example, Nokia is like a patent tr...
Submitted via IRC for Runaway1956
Update 5/17/2018: The FDA has now launched the website listing the names of brand name drugs and their makers who have stood in the way of generic drug companies trying to make more affordable alternatives. You can view the list here. It includes notable medications, such as Accutane (for acne), Methadone (used for opioid dependency), and Tracleer (to treat high blood pressure in the lungs). The brand name drug makers to be shamed includes big hitters such as Celgene Corp, GlaxoSmithKline, Pfizer, Valeant Pharmaceuticals International, Gilead Sciences Inc, and Actelion Pharmaceuticals Ltd, now a Johnson & Johnson company. Our original story, published May 16, is unedited below.
The Food and Drug Administration plans this week to effectively begin publicly shaming brand-name drug companies that stand in the way of competitors trying to develop cheaper generic drugs.
FDA Commissioner Scott Gottlieb told reporters on Monday and Tuesday that the agency will unveil a website on Thursday, May 17 that names names of such companies. More specifically, the website will publicly reveal the identity of 50 branded drugs and their makers that have blocked generic development. The website will also be updated "on a continuous basis" to list additional names.
In fielding questions from reporters, Gottlieb denied that the effort was a form of public shaming. "I don't think this is publicly shaming," Gottlieb said, according to S&P Global Market Intelligence. "I think this is providing transparency in situations where we see certain obstacles to timely generic entry."
Read more of this story at SoylentNews.
A lava flow on Kilauea was moving at the speed of 300 yards per hour on Saturday.
[JohnathonT] has a two-year-old who cant reliably tell time just yet. Every morning, he gets up before the rooster crows and barges into his parents room, ready to face the day.
In an effort to catch a few more Zs, [JohnathonT] built a simple but sanity-saving clock that tells time in a visual, kid-friendly way. Sure, this is a simple build. But if a toddler is part of your reality, who has time to make one from logic gates? The hardware is what youd expect to see: Arduino Nano, a DS1307 RTC, plus the LEDs and resistors. We think an RGB LED would be a nice way to mix up the standard stoplight hues a bit.
At a glance, little Mr. Rise and Shine can see if its time to spread cheer, or if he has to stay in his room and play a bit longer. At 6:00AM, the light powers on and glows red. At 6:50, it turns yellow for 10 minutes. At the first reasonable hour of the day, 7:00AM, it finally turns green. In reading the code, we noticed that it also goes red at 8:00PM for 45 minutes, which tells us it also functions as a go-to-sleep indicator.
When his son is a little older, maybe [JohnathonT] could build him a clock that associates colors with activities.
When it comes to open-source ARM Mali graphics driver efforts there has been the Panfrost driver targeting the Mali T700 series that has occupied much of the limelight recently, but there has been a separate effort still working on open-source driver support for the older 400/450 series...
Submitted via IRC for SoyCow3941
Attackers are experimenting with a new method of avoiding some DDoS mitigation solutions by employing the Universal Plug and Play (UPnP) protocol to mask the source port of network packets sent during the DDoS flood.
In a report published on Monday, DDoS mitigation firm Imperva says it observed at least two DDoS attacks employing this technique.
By masking the origin port of incoming network packets, Imperva says that older DDoS mitigation systems that rely on reading this info to block attacks will need to be updated to more complex solutions that rely on deep packet inspection (DPI), a more costly and slower solution.
Read more of this story at SoylentNews.
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog