IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Sunday, 18 February

01:00

Help Keep The Bombe At Bletchley "IndyWatch Feed Tech"

Fans of vintage codebreaking machinery might be interested to hear that the only working reconstruction of a Turing-Welchman Bombe is likely to soon be on the move. The electromechanical device, a replica of those used on the Second World War Enigma codes, is housed at Bletchley Park, the former codebreaking center established before the outbreak of war to house British and Polish codebreakers.

Bletchley Park itself is now a tourist attraction. The news is that a display reorganization has caused the Turing Welchman Bombe Rebuild Trust that owns the Bombe to approach the neighboring National Museum Of Computing with a view to housing it alongside their reconstruction of the Colossus electronic computer. The Colossus was famously used on the Lorenz cipher. This is an exciting development for the museum, but as an organization reliant on donations they face the task of finding the resources to create a new gallery for the arrival. To that end, they have launched a crowdfunding campaign with a target of 50000 (69358.50), and they need your donations to it for the project to succeed. They have raised over 4500 in the few days it has already been open and there is most of a month still to go, so we hope they achieve their goal.

The Bletchley Park site is now surrounded by the post-war new town of Milton Keynes, and is easy enough to get to should you find yourself in the UK. We visited The National Museum Of Computing a couple of years ago and spent a very happy day touring its extensive and fascinating collection. If you want to read more about the Bombe you might like to read our review, and also our impression of Colossus.

As part of their campaign, the museum has produced a promotional video, which we have placed after the break.

Bombe picture: Antoine Taveneaux [CC BY-SA 3.0].

00:59

Three Photons Linked Together "IndyWatch Feed Tech"

Scientists Create a New Form of Light by Linking Photons

It's a glimpse of science fiction made fact: Scientists have created a new form of light that could someday be used to build light crystals. But before would-be Jedis start demanding their sabers, the advance is far more likely to lead to intriguing new ways of communicating and computing, researchers report this week in Science [DOI: 10.1126/science.aao7293] [DX].

Light is made up of photonsspeedy, tiny packets of energy. Typically, photons do not interact with each other at all, which is why when using flashlights "you don't see the light beams bounce off each other, you see them go through each other," explains Sergio Cantu, a Ph.D. candidate in atomic physics at the Massachusetts Institute of Technology. In new experiments, however, the physicists coaxed individual photons to cozy up to each other and link, similar to the way individual atoms stick together in molecules.

[...] [Vaporizing] rubidium with a laser and keeping it ultracold creates a cloud the researchers contain in a small tube and magnetize. This keeps the rubidium atoms diffuse, slow moving and in a highly excited state. Then the team fires a weak laser at the cloud. The laser is so weak that just a handful of photons enter the cloud, a press release from MIT explains. The physicists measure the photons when they exit the other side of the cloud and that is when things get weird.

Normally the photons would be traveling at the speed of lightor almost 300,000 kilometers per second. But after passing through the cloud, the photons creep along 100,000 times slower than normal. Also, instead of exiting the cloud randomly, the photons come through in pairs or triplets. These pairs and triplets also give off a different energy signature, a phase shift, that tells the researchers the photons are interacting.

Also at Newsweek.


Original Submission

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 17 February

23:44

Multiplexing Input or Output on a Raspberry Pi Part 2: Port Expanders "IndyWatch Feed Tech"

In the previous article I talked about Multiplexing input/output using shift registers for a music keyboard project. I ended up with three CD4021 8-bit shift registers cascaded. It worked; but I found that I was spending all my time in the delays between polling each bit serially. I wanted a way to read those bits faster. So I ordered some I/O expander chips.

[Keyboard wired to Raspberry Pi with two MCP23017 port expanders] I/O expander, or port expander, chips take a lot of the hassle out of multiplexing. Instead of writing code to read bits serially, you can use I2C. Some chips also have built-in pullup resistors, so you don't need all those extra wires for pullups or pulldowns. There are lots of options, but two common chips are the MCP23017, which controls 16 lines, and the MCP23008 and PCF8574p, which each handle 8. I'll only discuss the MCP23017 here, because if eight is good, surely sixteen is better! But the MCP23008 is basically the same thing with fewer I/O lines.

A good tutorial to get you started is How To Use A MCP23017 I2C Port Expander With The Raspberry Pi - 2013 Part 1 along with part 2, Python and part 3, reading input.

I'm not going to try to repeat what's in those tutorials, just fill in some gaps I found. For instance, I didn't find I needed sudo for all those I2C commands in Part 1 since my user is already in the i2c group.

Using Python smbus

Part 2 of that tutorial uses Python smbus, but it doesn't really explain all the magic numbers it uses, so it wasn't obvious how to generalize it when I added a second expander chip. It uses this code:

DEVICE = 0x20 # Device address (A0-A2)
IODIRA = 0x00 # Pin direction register
OLATA  = 0x14 # Register for outputs
GPIOA  = 0x12 # Register for inputs

# Set all GPA pins as outputs by setting
# all bits of IODIRA register to 0
bus.write_byte_data(DEVICE,IODIRA,0x00)

# Set output all 7 output bits to 0
bus.write_byte_data(DEVICE,OLATA,0)

DEVICE is the address on the I2C bus, the one you see with i2cdetect -y 1 (20, initially).

IODIRA is the direction: when you call

bus.write_byte_data(DEVICE, IODIRA, 0x00)
you're saying that all eight bits in GPA should be used for output. Zero specifies output,...

23:43

Austria seek Interpols help to bust Bitcoin scammers who stole $115M "IndyWatch Feed Tech"

By Waqas

Another day another Bitcoin scam in which unsuspected users have

This is a post from HackRead.com Read the original post: Austria seek Interpols help to bust Bitcoin scammers who stole $115M

23:22

New CRISPR Innovations Coming: DETECTR, CAMERA, and SHERLOCK "IndyWatch Feed Tech"

With new CRISPR inventions, its pioneers say, you ain't seen nothin' yet

[...] Some of the world's leading CRISPR labs have, independently, tweaked CRISPR adding bursts of light here and rings of DNA there in ways that could make it even more of a research powerhouse and, possibly, a valuable medical sleuth, able to detect Zika, Ebola, and cancer-causing viruses, or a cell's history of, say, exposure to toxins.

The inventions, which, like CRISPR itself, have been given clever acronyms DETECTR, CAMERA, and SHERLOCK show that scientists have yet to exhaust CRISPR's talents. The technology is beginning to look like a Swiss army knife (we told you that was the best metaphor) rather than a mere Word editor.

In fact, its potential utility and profitability as a molecular diagnostic tool and biosensor are enticing enough that the inventors of the three new uses of CRISPR have all filed for patents on them, and a fourth lab scrambled to post its own CRISPR-based biosensor invention on the bioRxiv preprint server at the exact second that the others were reported in the journal Science.

Also at Science Magazine (for CAMERA).


Original Submission

Read more of this story at SoylentNews.

23:02

New CRISPR method strategically targets gene mutations to correct DMD heart defect "IndyWatch Feed Tech"

Researchers at UT Southwestern Medical Center have developed a CRISPR technique to efficiently correct the function of heart cells in patients with Duchenne muscular dystrophy (DMD). It involves making a single cut at strategic points along patients DNA, with the team claiming their new approach has the potential to correct most of the 3,000 mutations that cause DMD.

Duchenne muscular dystrophy (DMD) is one of nine neuromuscular disorders that affect the strength of muscles and nerves, specifically caused by defects in the gene that makes the dystrophin protein. Typically, one in every 3,500 boys born will be diagnosed with the disease at around three to four years of age, with their ability to walk gradually decreasing until they reach young adolescence. Most patients live until their 30s, but will require a wheelchair and respirator as the muscles in vital organs deteriorate over time.

23:01

Game Companies Oppose DMCA Exemption for Abandoned Online Games "IndyWatch Feed Tech"

There are a lot of things people are not allowed to do under US copyright law, but perhaps just as importantly there are exemptions.

The U.S. Copyright Office is currently considering whether or not to loosen the DMCAs anti-circumvention provisions, which prevent the public from tinkering with DRM-protected content and devices.

These provisions are renewed every three years after the Office hears various arguments from the public. One of the major topics on the agenda this year is the preservation of abandoned games.

The Copyright Office previously included game preservation exemptions to keep these games accessible. This means that libraries, archives, and museums can use emulators and other circumvention tools to make old classics playable.

Late last year several gaming fans including the Museum of Art and Digital Entertainment (the MADE), a nonprofit organization operating in California, argued for an expansion of this exemption to also cover online games. This includes games in the widely popular multiplayer genre, which require a connection to an online server.

Although the Current Exemption does not cover it, preservation of online video games is now critical, MADE wrote in its comment to the Copyright Office.

Online games have become ubiquitous and are only growing in popularity. For example, an estimated fifty-three percent of gamers play multiplayer games at least once a week, and spend, on average, six hours a week playing with others online.

This week, the Entertainment Software Association (ESA), which acts on behalf of prominent members including Electonic Arts, Nintendo and Ubisoft, opposed the request.

While they are fine with the current game-preservation exemption, expanding it to online games goes too far, they say. This would allow outsiders to recreate online game environments using server code that was never published in public.

It would also allow a broad category of affiliates to help with this which, according to the ESA, could include members of the public

The proponents characterize these as slight modifications to the existing exemption. However they are nothing of the sort. The proponents request permission to engage in forms of circumvention that will enable the complete recreation of a hosted video game-service environment and make the video game available for play by a public audience.

Worse yet, proponents seek permission to deputize a...

22:22

The Quantum Internet Has Arrived (and It Hasnt) "IndyWatch Feed Tech"

Networks that harness entanglement and teleportation could enable leaps in security, computing and science.

22:13

FreeBSD Finally Gets Mitigated For Spectre & Meltdown "IndyWatch Feed Tech"

Landing in FreeBSD today was the mitigation work for the Meltdown and Spectre CPU vulnerabilities...

22:00

Repairs You Can Print: A Turn Signal Switch For A Chevy Corvair "IndyWatch Feed Tech"

Running a classic car is often an easier prospect than a more recent model, as the mechanical parts have a tendency towards commonality between models, simplicity, and maintenance using basic tools. However assuming some level of parts availability for your model it is not usually the running gear that causes headaches. Instead, it is the smaller and less durable parts, the little plastic pieces that formed vital components but have not been manufactured for decades. These are the parts for which the advent of accessible 3D printing has been a revelation, suddenly the owner of a wreck need only to have basic CAD skills to deliver the goods.

A Chevy Corvair (not [Ken]'s one). Greg Gjerdingen [CC BY 2.0].A Chevy Corvair like [Kens]....

21:47

Trump retweets Facebook exec comments on Russia meddling to criticize 'Fake News Media' "IndyWatch Feed Tech"

President Trump on Saturday invoked the words of a Facebook executive in criticizing the medias reporting on the new Russian indictments.Rob Goldman, Facebooks vice president of ads, posted a series of tweets reiterating what the social media...

21:02

Im absoulately thrilled to tell you Friday 23rd February 8pm "IndyWatch Feed Tech"

I will be doing a facebook live with my good friend Professor Ian Hale. If you would like to hear from the main man comnent below.

21:01

Cuban Embassy Victims Experiencing Neurological Symptoms "IndyWatch Feed Tech"

Diplomats and other victims of mysterious "sonic attacks" at the American embassy in Havana, Cuba are experiencing neurological symptoms months after being affected:

A preliminary case report on the victims of mysterious "health attacks" in Havana, Cuba details the results of extensive clinical evaluations, concluding that the individuals appear to have sustained "injury to widespread brain networks without an associated history of head trauma."

The report offers the first medical glimpse of the victimsUS government personnel and their families who were serving on diplomatic assignment in Havana. From late 2016 to August 2017, they reported experiencing bizarre and inexplicable sonic and sensory episodes. The episodes tended to include directional, irritating sounds, such as buzzing and piercing squeals, as well as pressure and vibrations. Afterward, the victims developed a constellation of neurological symptoms.

In clinical evaluations of 21 of 24 individuals affected, an interdisciplinary team of doctors at University of Pennsylvania's Perelman School of Medicine retrospectively pieced together symptomsan average of 203 days after individuals were exposed. They found that the most common issues persisting more than three months after exposure were cognitive impairment (17/21); balance issues (15/21); visual (18/21) and hearing (15/21) problems; sleep impairment (18/21); and headaches (16/21).

Previously: U.S. State Department Pulls Employees From Cuba, Issues Travel Warning Due to "Sonic Attacks"
A 'Sonic Attack' on Diplomats in Cuba? These Scientists Doubt It


Original Submission

Read more of this story at SoylentNews.

20:27

An optimistic future "IndyWatch Feed Tech"

This is my personal vision for an event called Optimistic Futures to explore what we could be aiming for and figure out the possible roles for government in future.

Technology is both an enabler and a disruptor in our lives. It has ushered in an age of surplus, with decentralised systems enabled by highly empowered global citizens, all creating increasing complexity. It is imperative that we transition into a more open, collaborative, resilient and digitally enabled society that can respond exponentially to exponential change whilst empowering all our people to thrive. We have the means now by which to overcome our greatest challenges including poverty, hunger, inequity and shifting job markets but we must be bold in collectively designing a better future, otherwise we may unintentionally reinvent past paradigms and inequities with shiny new things.

Technology is only as useful as it affects actual people, so my vision starts, perhaps surprisingly for some, with people. After all, if people suffer, the system suffers, so the well being of people is the first and foremost priority for any sustainable vision. But we also need to look at what all sectors and communities across society need and what part they can play:

  • People: I dream of a future where the uniqueness of local communities, cultures and individuals is amplified, where diversity is embraced as a strength, and where all people are empowered with the skills, capacity and confidence to thrive locally and internationally. A future where everyone shares in the benefits and opportunities of a modern, digital and surplus society/economy with resilience, and where everyone can meaningfully contribute to the future of work, local communities and the national/global good.
  • Public sectors: I dream of strong, independent, bold and highly accountable public sectors that lead, inform, collaborate, engage meaningfully and are effective enablers for society and the economy. A future where we invest as much time and effort on transformational digital public infrastructure and skills as we do on other public infrastructure like roads, health and traditional education, so that we can all build on top of government as a platform. Where everyone can have confidence in government as a stabilising force of integrity that provides a minimum quality of life upon which everyone can thrive.
  • The media: I dream of a highly effective fourth estate which is motivated systemically with resilient business models that incentivise behaviours to both serve the public and hold power to account, especially as news is also arguably becoming exponential. Actionable accountability that doesnt rely on the linearity and personal incentives of individuals to respond will be critical with the changing pace of news and with more decisions being made by...

20:02

Yandex Self-Driving Car. Moscow streets after a heavy snowfall "IndyWatch Feed Tech"

Yandex. Taxi self-driving car safely navigates the streets of Moscow after a recent snowstorm managing interactions with traffic, pedestrians, parked vehicles and other road hazards on snowy streets.

. . , , , , .

19:54

Learn Ethical Hacking Online 9 Courses At Lowest Price Ever "IndyWatch Feed Tech"

How to become a Professional Hacker? This is one of the most frequently asked queries we came across on a daily basis. Do you also want to learn real-world hacking techniques but dont know where to start? This week's THN deal is for you. Today THN Deal Store has announced a new Super-Sized Ethical Hacking Bundle that let you get started your career in hacking and penetration testing

19:42

Kepler scientists discover almost 100 new exoplanets "IndyWatch Feed Tech"

Based on data from NASAs K2 mission, an international team of scientists has confirmed nearly 100 new exoplanets. This brings the total number of new exoplanets found with the K2 mission up to almost 300.

We started out analyzing 275 candidates, of which 149 were validated as real exoplanets. In turn, 95 of these planets have proved to be new discoveries, said U.S. doctoral student Andrew Mayo at the National Space Institute (DTU Space) at the Technical University of Denmark. This research has been underway since the first K2 data release in 2014. Mayo is the main author of the work being presented in the Astronomical Journal.

The research was conducted partly as a senior project during his undergraduate studies at Harvard College. It also involved a team of international colleagues from institutions such as NASA, Caltech, UC Berkeley, the University of Copenhagen, and the University of Tokyo. The Kepler spacecraft was launched in 2009 to hunt for exoplanets in a single patch of sky, but in 2013, a mechanical failure crippled the telescope. However, astronomers and engineers devised a way to repurpose and save the space telescope by changing its field of view periodically. This solution paved the way for the follow-up K2 , which is still ongoing as the spacecraft searches for exoplanet transits.

19:42

Lab-Grown Meat Is Coming, Whether You Like It or Not "IndyWatch Feed Tech"

Scientists have been culturing meat in labs for years, but Just and other startups like Finless Foods, which is growing fish meat, have been feverishly pursuing this so-called clean meat of late. Just is chasing a cultured chorizo and a cultured nugget in addition to the foie gras. And Tetrick claims his startup has finally made the process cost-effective enough to take to market: At the end of this year, he says, Just will officially introduce an as yet undisclosed lab-grown meat, the first time the stuff will hit shelves.

The challenges of engineering meat in the lab is one thing, but convincing consumers to turn away from the storied kill-it-and-grill-it method of eating is another. And while its easy to imagine how lab-grown meat would be better for the planet, theres actually little data to back that up.

Whether or not Just makes it to market this year, and whether or not their meat tastes and smells and feels like meat, the era of clean meat is approaching. (Just declined to let us taste their food, saying it wasnt ready for public consumption.) Soon enough, burgers will grow not just in fields, but in vats. Farther down the line, your T-bones may not come from a cow, at least not in the traditional sense. If the sound of that bothers you, know that youre not alone.

19:22

D.C. has given Elon Musk a permit to do a little digging for the Hyperloop "IndyWatch Feed Tech"

The man who brought the world Teslas can start excavating along the citys New York Avenue, an early step in his plans to develop a new mode of transportation.

19:01

Monero Mining Malware Infecting Android Smart TVs & Smartphones "IndyWatch Feed Tech"

By Waqas

The malicious Monero mining campaign is spreading fast through ADB.miner

This is a post from HackRead.com Read the original post: Monero Mining Malware Infecting Android Smart TVs & Smartphones

19:00

The Fine Art of Acid Etching Brass "IndyWatch Feed Tech"

If you were building a recreation of the James Watt micrometer, where would you start? If youre [rasp], the answer would be: Spend a year trying to find the best way to make etched brass discs. Luckily for us, hes ready to share that information with the rest of the world. While its rather unlikely anyone else is working on this specific project, the methods he details for getting museum-quality results on brass are absolutely fascinating.

The process starts with sanding down the bare brass and applying a layer of clear packing tape to the metal. [rasp] then covers the piece with LaserTape, which is a special tape designed to make laser-cut masks for sandblasting. But the masking principle works just as well for painting or chemical etching.

With the LaserTape in place, the piece is then put into the laser and the mask is cut out. Once cut, theres the tedious task of peeling off all the cut pieces of tape, which [rasp] does with a dental pick. Once the pieces are pulled off, the brass is ready for its acid bath.

Anyone whos etched their own PCB with ferric chloride will recognize these next steps. The piece is put into the acid bath and agitated every 10 minutes or so. Its interesting to note that [rasp] places the piece in the bath upside-down, using little 3D...

18:40

Transgender Woman Breastfeeds Baby After Hormone Treatment Regimen "IndyWatch Feed Tech"

Transgender woman is first to be able to breastfeed her baby

A 30-year-old transgender woman has become the first officially recorded to breastfeed her baby. An experimental three-and-a-half-month treatment regimen, which included hormones, a nausea drug and breast stimulation, enabled the woman to produce 227 grams of milk a day.

"This is a very big deal," says Joshua Safer of Boston Medical Center, who was not involved with the treatment. "Many transgender women are looking to have as many of the experiences of non-transgender women as they can, so I can see this will be extremely popular."

The transgender woman had been receiving feminising hormonal treatments for several years before she started the lactation treatment. These included spironolactone, which is thought to block the effects of testosterone, and progesterone and a type of oestrogen. This regimen enabled her to develop breasts that looked fully grown, according to a medical scale that assesses breast development based on appearance. She had not had any breast augmentation surgery.

When her partner was five-and-a-half-months pregnant, the woman sought medical treatment from Tamar Reisman and Zil Goldstein at Mount Sinai's Center for Transgender Medicine and Surgery in New York City. Her partner had no interest in breastfeeding, she explained, so she would like to take on that role instead.

The milk produced was supplemented by formula because a baby typically needs 500 grams of milk per day at 5 days old.

Related: President of the American Society for Reproductive Medicine Says Transgender Women Could Give Birth


Original Submission

Read more of this story at SoylentNews.

18:28

Useful Consumer Review "IndyWatch Feed Tech"

You know when youre measuring out things for baking? So you put a mixing bowl on the kitchen scale and then measure out 300g of sugar, and then you tare it back to zero, and then youre going to pour 500g flour into the bowl, but after pouring some flour, the flour bag is empty, so you start looking through the cupboard for more flour, and just when youre about to start pouring the rest of the flour, and then the scale auto-switches itself off? And then you cry and cry because your life is ruined forever and ever?

Nothing like that has happened to me, but heres the solution:

The Soehnle Page Profi.

It does have auto-off functionality, but according to my rigorous testing, it waits until ten minutes of inactivity before doing that. Which should be enough to look through several kitchens worth of cupboards for that bag of flour.

And it takes AAA batteries, which is convenient, and it has a max range of 15kg, which is 3x more than most kitchen scales.

...

18:25

With Stambler v Mastercard, Patent Maximalists Are Hoping to Prop Up Software Patents and Damage PTAB "IndyWatch Feed Tech"

patents for some technical sectors have been somewhat deprecatorily called by Mark Lemley and Carl Shapiro, a lottery ticket, Neil Wilkof wrote before the weekend.

Gambling
Summary: The patent industry is hoping to persuade the highest US court to weaken the Patent Trial and Appeal Board (PTAB), for PTAB is making patent lawsuits a lot harder and raises the threshold for patent eligibility

THE patent maximalists in the United States want us to believe that the more patents are granted and the more lawsuits are filed, the greater the innovation will be (they just cant help misusing such buzzwords*). The USPTO uses similar claims to justify never-ending expansion (e.g. number of granted patents). Suffice to say, thats just a bubble.

Found via several patent maximalists such as this one was this new post in which Dennis Crouch (part of the patent microcosm) said: The case relates to Stamblers U.S. Patent No. 5,793,302 (authentication system and method). The patent has been asserted in dozens of cases and upheld in several court decisions prior to the PTAB finding it invalid.

Oil States is an anti-PTAB case which we expect to see ruled in favour of PTAB some time later this year.This is about Stambler v Mastercard, a case which the patent maximalists will be trying to bring to the Justices. Why? Because its a potentially anti-PTAB case. Groups such as the EFF will hopefully submit oppositions if possible. From the petition: The first question is substantially similar to that presented in Oil States Energy Servs., LLC v. Greenes Energy Grp., LLC, No. 16-712 (June 12, 2017), which has been argued and is awaiting decision by the Court. The second question is identical to that presented by the Petition for writ of certiorari in Celgard, LLC v. Matal (No. 16-1526) (question #2, petition pending).

Oil States is an anti-PTAB case which we expect to see ruled in favour of PTAB some time later this year. Well say a lot more about PTAB tomorrow and on Monday. Oppositions to...

17:53

Mesa Git Lands RadeonSI 32-bit Pointers Support "IndyWatch Feed Tech"

At the start of the new year Marek Olk of AMD posted a set of patches for 32-bit GPU pointers in RadeonSI. That work has now landed in mainline Mesa Git...

17:40

Apple Discovers That Its Patent Disputes Are a Losing Battle Which Only Lawyers Win (Profit From) "IndyWatch Feed Tech"

Playing cardsRelated: In Apple/Samsung Patent Lawsuits Over Android/Linux, Only Patent Lawyers Are Winning (Again)

Summary: By pouring a lot of money and energy into the litigation card Apple lost focus and its also losing some key cases, as its patents are simply not strong enough

THE USPTO can grant however many patents it wants, but judges are under no obligation to honour these patents. As scholars recently noted, many patents are granted erroneously in order to inflate patent numbers (this became a problem at the EPO as well in recent years).

Yesterday we stumbled upon this new report from a reliable news site which said:

A federal judge handed a minor but significant legal defeat to Apple in its long-simmering patent dispute with Samsung on Thursday evening.

U.S. District Judge Lucy Koh agreed with Samsung that the South Korea smartphone manufacturer owes Apple about $6.4 million, but not the ongoing royalties to which Apple claimed it was entitled.

The order only settles a sliver of the overall patent fight, parts of which have climbed all the way to the U.S. Supreme Court.

This is about software patents and the award is without a shadow of a doubt exceeded by the legal bills; things become a lot more expensive when these cases reach the US Supreme Court something which may happen for design patents [1, 2]. As...

17:38

A Life Lesson in Mishandling SMTP Sender Verification "IndyWatch Feed Tech"

An attempt to report spam to a mail service provider's abuse address reveals how incompetence is sometimes indistinguishable from malice.

It all started with one of those rare spam mails that got through.

This one was hawking address lists, much like the ones I occasionally receive to addresses that I can not turn into spamtraps. The message was addressed to, of all things, root@skapet.bsdly.net. (The message with full headers has been preserved here for reference).

Yes, that's right, they sent their spam to root@. And a quick peek at the headers revealed that like most of those attempts at hawking address lists for spamming that actually make it to a mailbox here, this one had been sent by an outlook.com customer.

The problem with spam delivered via outlook.com is that you can't usefully blacklist the sending server, since the largish chunk of the world that uses some sort of Microsoft hosted email solution (Office365 and its ilk) have their usually legitimate mail delivered via the very same infrastructure.

And since outlook.com is one of the mail providers that doesn't play well with greylisting (it spreads its retries across no less than 81 subnets (the output of 'echo outlook.com | doas smtpctl spf walk' is preserved here), it's fairly common practice to just whitelist all those networks and avoid hassle of lost or delayed mail to and from Microsoft customers.

I was going to just ignore this message too, but we've seen an increasing number of spammy outfits taking advantage of outlook.com's seeming right of way to innocent third parties' mail boxes.

So I decided to try both to do my best at demoralizing this particular sender and alert outlook.com to their problem. I wrote a messsage (preserved here) with a Cc: to abuse@outlook.com where the meat is,

Ms Farell,

The address root@skapet.bsdly.net has never been subscribed to any
mailing list, for obvious reasons. Whoever sold you an address list with
that address on it are criminals and you should at least demand your
money back.

Whoever handles abuse@outlook.com will appreciate th...

17:07

TrickBot Variant Steals Bitcoin by Hijacking Cryptocurrency Transactions "IndyWatch Feed Tech"

By Waqas

Another day, another malware This time TrickBots variant is

This is a post from HackRead.com Read the original post: TrickBot Variant Steals Bitcoin by Hijacking Cryptocurrency Transactions

16:54

The Patent Microcosm Takes Berkheimer v HP Out of Context to Pretend PTAB Disregards Fact-Finding Process "IndyWatch Feed Tech"

Berkheimer v HP
The original decision

Summary: In view or in light of a recent decision (excerpt above), patent maximalists who are afraid of the Patent Trial and Appeal Board (PTAB) try to paint it as inherently unjust and uncaring for facts

EARLIER this month we wrote about Berkheimer, a decision that had been distorted somewhat by the patent microcosm (as usual).

This distortion continues unfortunately (but expectedly), with sites such as Watchtroll writing about it yesterday. Dennis Crouch too panders to patent extremists with their false allegations that PTAB ignores/overlooks facts. Here is what he wrote:

Following upon its February 8 decision in Berkheimer, the Federal Circuit has again sided with the Patentee on eligibility grounds holding here that the lower courts judgment on the pleadings failed to consider disputed issues of material fact. Prior to this pair of cases, it was unclear whether eligibility analysis involved factual questions. Although pair of cases indicate a precedential sea-change, both opinions were written by Judge Moore and joined by Judge Taranto (Berkheimer was also joined by Judge Stoll).

Like we said before, this isnt necessarily about Section 101 and it does not imply what many patent extremists are trying to insinuate. Managing IP framed it as a Section 101 thing and also called it a blockbuster (in the headline even). Its only a blockbuster for those who want it to be. There was nothing fascinating about it. To quote the outline:

...

16:53

Man admits hacking former employers computer system for revenge "IndyWatch Feed Tech"

By Waqas

In October 2017, Gavin Paul Prince, 37, chief executive of

This is a post from HackRead.com Read the original post: Man admits hacking former employers computer system for revenge

16:28

Effective Tips for Internet Safety for Kids You Must Read "IndyWatch Feed Tech"

Online safety for your kids is very important.  However, that doesnt necessarily mean that it needs to be hard work.

The key thing is to learn how to get parental controls set up properly so that you wont have to worry as much about online safety when your kids start to use the internet for both school projects and entertainment.

There are also sophisticated software that is available for sale that you can invest in if you feel the need for a more advanced solution.

In order to determine which is best for you, we will be covering some of the major parental control options that are available to you.

In this article, we will be discussing various parent control options that are available to you.  However, keep in mind, that although there are some very useful parental control tools that are available it is still important for you to watch what your children are doing when they are online as much as you can.  There is no substitute when it comes to parental supervision of children.

Content filters

All of the major UK broadband providers, including EE, Virgin Media, TalkTalk, Sky, and BT offer content filters as a standard feature.

They block off sites that contain material that is inappropriate for children, like self-harming, pornography, and other nasty material. Access to sites that are known to contain malware and viruses are also restricted. The best internet packages will have this as standard nowadays.

Which broadband providers offer the best security? 

You will need to decide whether or not you want to use the filters when you are getting your broadband first set up.  The settings can be changed at any time by simply logging into your account.  So you can always change your mind on whether you want to use the filters or not.

Software

Some broadband providers offer parental control software as part of their broadband packages. This type of software is widely available. Content filters are network-level filters and are applied to anyone who uses the connection.

By contrast, parental control software affects only the device that it is installed on.  So for example, if you install parent control software on your desktop computer, it will not affect what your children are doing when they are using their tablets and phones.

In addition to filtering inappropriate conten...

16:19

U.S. Rejects Chinese Takeover of the Chicago Stock Exchange "IndyWatch Feed Tech"

US rejects China-led bid for Chicago Stock Exchange

The US has rejected a proposed merger between the Chicago Stock Exchange and a Chinese-linked investor group. The decision comes after more than two years of reviews by officials.

The tie-up was initially approved by the Committee on Foreign Investment in the United States, pending further approval by the Securities and Exchange Commission (SEC). But US politicians, including President Trump, have said letting a Chinese firm invest in a US exchange was a bad idea.

Under the proposal, the Chinese-led North America Casin Holdings group would have bought CHX Holdings, which owns the Chicago Stock Exchange. The exchange, which handles just 0.5% of US stock trades, had said the deal would have provided the exchange with "vital capital". That funding would have been used "to boost numerous initiatives designed to benefit the city of Chicago, the US economy and market structure as a whole".

Also at Bloomberg, NYT, Reuters, and CNN.


Original Submission

Read more of this story at SoylentNews.

16:01

Great Beginnings for Vintage Computing in Seattle; VCF PNW "IndyWatch Feed Tech"

The pitch to my wife was simple: Feel like spending the weekend in Seattle? Thats how I ended up at the inaugural Vintage Computer Festival Pacific Northwest last weekend, and Im glad we made the five-hour drive into The Big City to check it out. Hackaday is a VCF sponsor, after all, so it seemed like a great excuse to make the trip. That it ended up being two consecutive days of great Seattle weather was only icing on the cake of being able to spend time with fellow retro computer aficionados and their dearest bits of old hardware, in a great museum dedicated to keeping computer history alive and accessible.

The fact that Seattle, home of Microsoft, Amazon, and dozens of other tech companies, has until now been left out of the loop in favor of VCF East in New Jersey and VCF West in Mountain View seems strange, but judging by the reception, VCF PNW is here to stay and poised to grow. There were 20 exhibitors for this go around, showing off everything from reanimated PDP-11 and Altair 8800 control panels to TRS-80s from Model 1 through to the CoCo. Almost every class of reasonably transportable retro hardware was represented, as well as some that pushed the portability envelope, like a working PDP-8 and a huge Symbolics 3640 LISP workstation.

At some points onlookers outnumbered exhibitors three-fold, cramming the aisles between displays and making it tough to get up close to chat. Almost every exhibitor was swarmed with people asking questions, pecking commands into keyboards, or taking selfies with the hardware. I only got the chance to talk to a few exhibitors, like David Cooper with his impressive collection from the TRS-80 ecosystem. My first programs were typed into a Model 1 at the kind forbearance of the manager of my local Radio Shack, and playing Sea Dragon with my son on a machine I havent touched since the 1970s was a real treat.

...

15:48

Microsoft Has Left RPX, But RPX Now Pays a Microsoft Patent Troll, Intellectual Ventures "IndyWatch Feed Tech"

RPXSummary: The patent/litigation arms race keeps getting a little more complicated, as the arms are being passed around to new and old entities that do nothing but shake-downs

LAST month we wrote about RPX, which might soon be bought by trolls, paying extraordinary amounts of money to patent trolls, such as Acacia (Microsoft-connected troll).

It bought a lot of patents from Intellectual Ventures, which is more or less a Microsoft proxy.As it turns out, based on this blog post from yesterday, RPX also buys USPTO patents from Microsoft patent trolls like Intellectual Ventures. To quote:

RPX has acquired a tranche of patent assets from the Intellectual Ventures Invention Science Fund in what is the first such deal between the firms. So far two sets of rights have shown up on the USPTO assignment database one for 35 granted patents and applications and another for 22 and a spokesperson for RPX confirmed that 66 assets had changed hands in total.

[...]

RPX has done plenty of deals with NPEs such as Acacia and WiLAN in the past, but hasnt bought any assets from IV. The pair did work together on the $525 million acquisition of the Kodak portfolio in 2012 which saw IV and a group of 12 licensees including Apple, Google and Samsung stump up much of the cash for the deal. Most of those patents are now held by Dominion Harbor and as more former IV assets end up in the courts we may see more acquisitions by RPX as it looks to mitigate patent risk for its clients.

Dominion Harbor...

15:39

Outreachy Is Now Accepting Applications For Their Summer 2018 Internships "IndyWatch Feed Tech"

This week Google announced the participating organizations for GSoC 2018 for students wishing to get involved with open-source/Linux development. Also happening this week is the application period opened for those wishing to participate in the summer 2018 paid internship program...

15:29

Linux 4.14 & 4.15 Get KPTI Protection For 64-bit ARM "IndyWatch Feed Tech"

Greg Kroah-Hartman released a slew of stable point releases today to supported Linux kernel series. For the 4.14 and 4.15 branches this includes Kernel Page Table Isolation (KPTI) for AArch64 hardware...

15:14

UPC Has Done Nothing for Europe Except Destruction of the EPO and Imminent Layoffs Due to Lack of Applications and Lowered Value of European Patents "IndyWatch Feed Tech"

Lots of fake news lately from those who stand to benefit from UPC (at the expense of everybody else)

UPC fake news

Summary: The Unified Patent Court (UPC) is merely a distant dream or a fantasy for litigators; to everyone else the UPC lobby has done nothing but damage, including potentially irreparable damage to the European Patent Office, which is declining very sharply

THE UPC is not going anywhere; except away. Maybe. The EPO barely mentions it any longer and Team UPC seems to have been reduced to just Bristows (almost nobody else mentions it anymore). Just before the weekend Mathieu Klos from JUVE wrote: UPC challenge Germany I: According to constitutional court spokesman: as yet no date for oral hearing or judgement. If there were an oral hearing, press release to be published in advance. Next Wednesday (21.02.) the Court publishes list of cases it intends to decide in 2018.

No word about the UPC from Team UPC for at least two days now, so we can safely assume that the UK has once again said no to unitary nonsense (patent maximalism disguised as unity, EU, harmony, community and so on).And later on this: UPC challenge Germany II: According to constitutional court spokesman: Court received all amicus briefs, no further institution got deadline extension. All paperwork is done, now judges can read and decide.

No word about the UPC from Team UPC for at least two days now, so we can safely assume that the UK has once again said no to unitary nonsense (patent maximalism disguised as unity, EU, harmony, community and so on). Waste of effort is all it boils down to; they should improve actual patent quality, but theres no money in it for lawyers. In fact, it would render many of them redundant.

Was the gamble on UPC (massive headache for European companies but boon to litigators worldwide) worth it?And speaking of redundancies, its regretful and uncomfortable to say, but a lot of EPO workers can already envision themselves losing their jobs. See some of the latest comments here.

One reader of our...

14:49

ACE launches a crackdown on illegal Kodi plugins "IndyWatch Feed Tech"

ACE sends out cease-and-desist letters to pirate Kodi add-on developers and distributors

The Alliance for Creativity and Entertainment (ACE) has started sending out cease and desist letters as a new offensive against Kodi box manufacturers, developers and several individuals of the Kodi add-on community for facilitating piracy.

For those unaware, ACE is an anti-piracy coalition formed by the likes of Amazon, Disney, Netflix, 20th Century Fox, Warner Bros, HBO, CBS, Sony Pictures, Canal + and several major Hollywood studios to combat the pirate distribution of their content.

According to TorrentFreak, ACE has sent cease and desist letters to developers, distributors and several individuals asking them to stop their illegal activities such as development of extensions or their hosting on the internet or maintaining builds and repositories on YouTube that explains how to access protected content from Kodi.

Several sites have closed their doors, which includes NoobsAndNerds, a repository specialized in extensions for Kodi, is currently down, reports TVAddons who were the first to notice it. The sites Twitter account has also been disabled.

SpinzTV, who offers unofficial Kodi builds and an associated repository, is also under the scanner.

Many netizens have started posting the letter received from ACE on Twitter. However, no one seems to care, for instance, like the developer, Teverz and YouTuber, Doggmatic (see their tweets below).

14:38

VESA X.Org Driver Sees First Update In Three Years "IndyWatch Feed Tech"

Should you find yourself using the xf86-video-vesa DDX for one reason or another, a new release is now available and it's the first in three years...

14:37

Prosecutor Robert Mueller indicted 13 Russians for a massive operation aimed to influence Presidential election "IndyWatch Feed Tech"

The special prosecutor Robert Mueller has accused thirteen Russian nationals of tampering with the 2016 presidential election and charged them with conspiring against the United States.

Thirteen Russian nationals and three Russian entities have been indicted for a massive operation aimed to influence the 2016 Presidential election.

The special prosecutor Robert Mueller has accused the defendants of tampering with the 2016 US presidential election and charged them with conspiring against the United States.

According to the results of the investigation conducted by the prosecutor, the Internet Research Agency, a Russian organization, and the 13 Russians began targeting the United States back in 2014.

Russian nationals used stolen American identities and local computer infrastructure to influence the 2016 Presidential election, the group deliberately denigrate the candidate Clinton to support Trump.

Certain Defendants traveled to the United States under false pretenses for the purpose of
collecting intelligence to inform Defendants operations. Defendants also procured and used
computer infrastructure, based partly in the United States, to hide the Russian origin of their
activities and to avoid detection by U.S. regulators and law enforcement. reads the Muellers indictment.

Defendant ORGANIZATION had a strategic goal to sow discord in the U.S. political
system, including the 2016 U.S. presidential election. Defendants posted derogatory information
about a number of candidates, and by early to mid-2016, Defendants operations included
supporting the presidential campaign of then-candidate Donald J. Trump (Trump Campaign) and
disparaging Hillary Clinton.

...

14:22

OpenIndiana Has Upgraded To The GCC 6 Compiler "IndyWatch Feed Tech"

The OpenSolaris/Illumos-based OpenIndiana operating system has finally moved past GCC 4.9 as its base user-land compiler and is now using GCC 6.4...

13:58

Judge Dismisses Playboy's Copyright Lawsuit Against BoingBoing "IndyWatch Feed Tech"

Recently, Playboy sued BoingBoing about hyperlinking. The court has made the decision to dismiss the case.

TechDirt has written about the decision:

Well, that was incredibly quick. The district court judge hearing the case that Playboy filed against BoingBoing back in November has already dismissed it, though without prejudice, leaving it open for Playboy to try again. The judge noted that, given the facts before the court so far, it wasn't even necessary to hold a hearing, since BoingBoing was so clearly in the right and Playboy so clearly had no case. While the ruling does note that Playboy and its legal team can try again, it warns them that it's hard to see how there's a case here [...]

TorrentFreak also covers the decision:

Sources:
Judge Dismisses Playboy's Dumb Copyright Lawsuit Against BoingBoing
Court Dismisses Playboy's Copyright Claims Against Boing Boing


Original Submission

Read more of this story at SoylentNews.

13:44

DOJ: Trumps dislike of CNN didnt bias AT&T-Time Warner merger "IndyWatch Feed Tech"

The Justice Department (DOJ) on Friday acknowledged that while President Trump doesnt like CNN, his unhappiness with the media outlet did not influence a federal antitrust case.The president is unhappy with CNN. We dont dispute that, Justice...

13:00

This Boxing Bell is a Trip "IndyWatch Feed Tech"

[MeasuredWorkshop] wanted to know how a boxing bell mechanism worked. The best way to learn is by doing, so he jumped right in and built one! Boxing bells are a rare surviving example of the trip bell mechanism. Trip bells were used in schools and public buildings as fire alarms. Theyve since been replaced by modern electric systems.

The mechanical linkage behind the trip bell is a one-way lever. This is the arm you pull on. It has a hinged section which stays rigid when the arm is pulled down, but rotates away when the arm is released. [Measured Workshop] built the mechanics of his bell using rather basic tools. The brunt of the work was handled by an angle grinder and a drill press.

The sounder for this boxing bell came from an old school bell. The industrial grey paint was chemically stripped, and the metal cleaned up for a nice brushed finish. The metal stands out nicely against the wood board [Measured Workshop] used as a base.

The finished product looks and sounds the part now he just has to find a boxing gym in need of a bell!

Were really becoming fond of the wordless workshop style videos that have been popping up on YouTube. [Jimmy DiResta] has been doing it for years, and relative newcomers [HandToolRescue] and [Measured Workshop] are both producing some great content!

12:57

Subtitle Heroes: Fansubbing Movie Criticized For Piracy Promotion "IndyWatch Feed Tech"

With many thousands of movies and TV shows being made available illegally online every year, a significant number will be enjoyed by speakers of languages other than that presented in the original production.

When Hollywood blockbusters appear online, small armies of individuals around the world spring into action, translating the dialog into Chinese and Czech, Dutch and Danish, French and Farsi, Russian and Romanian, plus a dozen languages in between. TV shows, particularly those produced in the US, get the same immediate treatment.

For many years, subtitling (fansubbing) communities have provided an incredible service to citizens around the globe, from those seeking to experience new culture and languages to the hard of hearing and profoundly deaf. Now, following in the footsteps of movies like TPB:AFK and Kim Dotcom: Caught in the Web, a new movie has premiered in Italy which celebrates this extraordinary movement.

Subs Heroes from writer and director Franco Dipietro hit cinemas at the end of January. It documents the contribution fansubbing has made to Italian culture in a country that under fascism in 1934 banned the use of foreign languages in films, books, newspapers and everyday speech.

The movie centers on the large subtitle site ItalianSubs.net. Founded by a group of teenagers in 2006, it is now run by a team of men and women who maintain their identities as regular citizens during the day but transform into superheroes of fansubbing at night.

Needless to say, not everyone is pleased with this depiction of the people behind the now-infamous 500,000 member site.

For many years, fansubbing attracted very little heat but over time anti-piracy groups have been turning up the pressure, accusing subtitling teams of fueling piracy. This notion is shared by local anti-piracy outfit FAPAV (Federation for the Protection of Audiovisual and Multimedia Content), which has accused Dipietros movie of glamorizing criminal activity.

In a statement following the release of Subs Heroes, FAPAV made its position crystal clear: sites like ItalianSubs do not contribute to the development of the audiovisual market in Italy.

It is necessary to clarify: when a protected work is subtitled and there is no right to do so, a crime is committed, the anti-piracy group says.

[Italiansubs] translates and makes available subtitles of audiovisual works (films and television series) in many cases not yet distributed on the Italian market. All this without having r...

11:37

Apple Employees Reportedly Walking Into Glass Walls at New HQ "IndyWatch Feed Tech"

Employees are injuring themselves by walking into the glass walls of Apple's fancy new headquarters:

The centerpiece of Apple Inc.'s new headquarters is a massive, ring-shaped office overflowing with panes of glass, a testament to the company's famed design-obsessed aesthetic.

There's been one hiccup since it opened last year: Apple employees keep smacking into the glass.

Surrounding the Cupertino, California-based building are 45-foot tall curved panels of safety glass. Inside are work spaces, dubbed "pods," also made with a lot of glass. Apple staff are often glued to the iPhones they helped popularize. That's resulted in repeated cases of distracted employees walking into the panes, according to people familiar with the incidents.

Some staff started to stick Post-It notes on the glass doors to mark their presence. However, the notes were removed because they detracted from the building's design, the people said. They asked not to be identified discussing anything related to Apple. Another person familiar with the situation said there are other markings to identify the glass.

What kind of markings? Bloodstains?

Also at TechCrunch and MarketWatch.


Original Submission

Read more of this story at SoylentNews.

10:48

Outernet LDPC code revisited "IndyWatch Feed Tech"

I have been preparing the slides for my future talk about reverse-engineering Outernet at FAQin 2018. While doing this, I have been re-reading some of the material about the work done on LDPC code and FEC in Outernet by George Hopkins in January 2017. One of the things I didn't do back then was to read carefully the LDPC decoding function implemented by George.

In my post I explained that the LDPC code used in Outernet followed RFC5170, and I wondered whether it used the staircase scheme or the triangle scheme. I also commented that erasure decoding with an LDPC code (or any other linear code, actually) was mathematically equivalent to solving a linear system where the unknowns correspond to the erased symbols. I observed that the decoding function looked very different from this mathematical procedure, but should do more or less the same thing. Now I have read the decoder implementation carefully and I have the answer to both questions.

Recall that an LDPC code following RFC5170 is an (n,k) linear code over a field F whose parity check matrix is of the form

H = (L | R),

where L is (n-k) \times k and ...

10:00

Catching the (PCIe) Bus "IndyWatch Feed Tech"

If you are trying to learn about FPGAs, there is only so far you can go with the usual blinking lights and VGA outputs. Eventually, you want to do something more. Although not terribly cheap, you can get FPGA boards in a PCIe form-factor and use them directly with PC software. Is it easy? Well, it isnt flashing an LED, but there are tools to help. [Angelos Kyriakos] did a Masters thesis on the very subject and used a project known as RIFFA to help with the task.

RIFFA (Reusable Integration Framework for FPGA Accelerators) is a simple framework for communicating data from a host CPU to an FPGA via a PCI Express bus. The framework requires a PCIe enabled workstation and an FPGA on a board with a PCIe connector. RIFFA supports Windows and Linux, Altera and Xilinx, with bindings for C/C++, Python, MATLAB, and Java. With proper design, RIFFA can transfer quite a bit of data in a short period of time between your computer and your FPGA.

Of course, the catch is finding a proper FPGA board, and these are not cheap. Also, RIFFA relies on the vendors PCIe endpoint block. In some cases, these are licensed with the development tool but in other cases, youll have to pay for that, too, so be sure you understand the situation with the FPGA and board you select.

Of course, RIFFA isnt the only option. There are several PCIe cores on OpenCores, although your mileage may vary on what hardware support or how general-purpose or complete they are.

You can only hope the cost of hardware will come down. Right now the examples for RIFFA use a Xilinx board that goes for about $2,000. Numato has some boards in the $300-500 range. This board looks promising, although they dont seem to be readily available in the United States, as far as we can tell. Speaking of outside the United States, theres always Raggedstone. However, none of these boards are in the under $100 range, so be prepared to shell out some money.

Dont let this put you off though. Weve talked before about how you can do a lot with FPGAs with very little investment. Besides, you can talk to a PC without using the PCIe interface. Use serial, or Ethernet, or...

09:36

Researchers spotted a new malware in the wild, the Saturn Ransomware "IndyWatch Feed Tech"

Researchers at the MalwareHunterTeam spotted a new strain of ransomware called Saturn Ransomware, the name derives from the .saturn extension it appends to the name of the encrypted files.

Currently, the malware requests victims of $300 USD payment that doubles after 7 days.

Once infected a system, the Saturn Ransomware checks if it is running in a virtual environment and eventually it halts the execution to avoid being analyzed by researchers.

Then it performs a series of actions to make impossible for the victims restoring the encrypted files, it deletes shadow volume copies, disables Windows startup repair, and to clear the Windows backup catalog.

Below the command executed by the malicious code:



At this point, the Saturn ransomware is ready to encrypt files having certain file types.

The ransomware such as many other threats uses a Tor payment site that is reported in the ransom note dropped on the machine while the Saturn ransomware is encrypting the files.

While encrypting the computer, Saturn Ransomware will drop ransom notes named #DECRYPT_MY_FILES#.html and #DECRYPT_MY_FILES#.txt and a key file named #KEY-[id].KEY in each folder that it encrypts a file. The key file is used to login to the TOR ransom site, while the ransom note contains brief information on what has happened to the victims files and a link to the TOR payment site at su34pwhpcafeiztt.onion. wrote Larwrence Abrams from Bleeping Computer.

09:34

Links 17/2/2018: Mesa 17.3.4, Wine 3.2, Go 1.10 "IndyWatch Feed Tech"

GNOME bluefish

Contents

GNU/Linux

  • Better Know a Blogger: SJVN on Linux, Microsoft, space roadsters, and more

    I have known Steven for more than a decade. Not only is he a top technology journalist and a consummate professional, he is a role model of mine.

    Steven, well known by his initials SJVN, stands out not just because hes a good journalist. He stands out because hes a great explainer. When I want to understand a networking, operating systems, or Linux-related topic, I often turn to Steven or his articles.

  • Desktop

    • Samsung Launch Linux on Galaxy Survey

      Samsung has launched a survey to find out what users want and expect from the Linux on Galaxy idea.

      The Linux on Galaxy project allows a regular desktop Linux distro to run on select Samsung smartphones by sharing the same Linux kernel used in Android.

      Users can then connect their smartphone to a Samsung DeX dock to convert their Samsung smartphone in to a normal desktop PC with an external monitor, bluetooth keyboard, mouse and so on.

    • ...

09:16

FCC Investigates Ajit Pai Over Corruption "IndyWatch Feed Tech"

https://motherboard.vice.com/en_us/article/mb53jn/fcc-inspector-general-investigation-ajit-pai-corruption

FCC boss Ajit Pai is being investigated by his own agency over potential corruption allegations.

The already-unpopular agency boss has been on a tear in recent months gutting decades old media-consolidation rules designed to protect consumers and the nation's media markets from any one broadcaster becoming too powerful.

Pai's efforts arrived, not coincidentally, at the same time Sinclair Broadcasting Group is attempting to acquire Tribune Media as part of a $3.9 billion dollar megamerger. It's a deal a bipartisan chorus of critics say would demolish media diversity, resulting in Sinclair owning more than 230 local stations across 72 percent of the United States.

Given criticism of Sinclair for its often distorted and inaccurate news reporting, consumer advocates say the deal would have a profoundly negative impact on the quality and diversity of media discourse, as well as already dwindling competition in the space.

Without Pai's assistance on this front, the Sinclair merger would have been impossible.

Now the New York Times indicates that the FCC's Inspector General has launched an investigation into whether Pai acted inappropriately as he rushed to dismantle media consolidation rules.

Also at CNN, Gizmodo and The Verge.


Original Submission

...

09:00

The Irish, Scottish and Sami Indians of the Southeastern United States "IndyWatch Feed Tech"

The Irish, Scottish and Sami Indians of the Southeastern United States

 

The missing detail in understanding history is that Lewis and Glastonbury ( Tin mines ) along with the Grand Maan copper mine in Wales were the  Eastern anchors for the great circle route that connected to Georgia at least and further north to New England as well.

The Bronze Age from 2500 BC through 1159 BC brought metal from the Americas to Bimini for assembly for the run to Lewis along the great circle route.    The Great circle route continued to operate effectively to the present.  The Norse and the Templar dominated during the several centuries before contact.

With this background it is then possible to understand the material here as it does not exist in splendid isolation at all as we have been stubbornly taught..

The Irish, Scottish and Sami Indians of the Southeastern United States

09:00

Atlantis against Mu "IndyWatch Feed Tech"





The names are essentially wrong but this does not matter.  The narrative is similar to Indian scriptures as well.

I do think that our future will be much different than this as we will empower the natural community and the true wisdom of humanity were all strive for true wisdom and mastery.

Otherwise a cycle of continuing human folly is not to be recommended.

Most important do observe the passing of these narratives and the limits in what can be shared.  What is science and a spaceship except loan words to confuse us?





ATLANTIS AGAINST MU

Testimony of a Hopi Indian on MU and its fall

"Survivors of Mu"


There exists little information about the continent of Mu and practically no serious reporting about the war opposing this continent of the Pacific to the inhabitants of the island of Atlantis The lines which follow are likely to touch a fair number among you. It is about the testimony of an Indian Hopi (Polar Bear) who reports with much generosity the history of his ancestors that was transmitted from generation to generation and this during thousands of years Polar Bear tells the history of its people the Hopis and the relations which he succeeded to keep with the celestial creator and his auxiliaries the different Kachinas. It reveals us the absurd war which opposed his ancestors who lived on Mu (Ksskara) with the people of Atlantis (Talawaitichqua) and the destruction of these two worlds. The world of Atlantis is described like a society in full decline. 


Polar Bear reports this way the painful exiles of its people towards the American continent 80.000 years ago which fully discredits the thesis of the arrival of the Indians there 10 to 12.000 years ago by the Bering Strait 

Here thus a remarkable testimony in many regards! This document has never been translated in English. It comes from a German book published in 1979 and entitled Ksskara und die Sieben Welten (Ksskara and the Seven Worlds). We translated for you only the pa...

09:00

Chinese traditional medicine gains popularity at home and abroad "IndyWatch Feed Tech"

 



What Chinese traditional medicine needs mostly is a modern marketing solution.  The science is purportedly empirical in its origins and certainly its longevity is supported by empirical results.

The actual original discovery process though was surely channeled in the same way we are seeing discoveries been channeled in the amazon using ayahuasca.

This process invalidates nothing because that demands empirical means which four thousand years of practice has provided.

The real challenge is to understand best practice and that has been limited by diagnostic skill and the human mind.  support all that with computer power and we can go there..
 
Chinese traditional medicine gains popularity at home and abroad


by Rob McBride


28 Jan 2018

http://www.aljazeera.com/news/2018/01/chinese-traditional-medicine-gains-popularity-home-180128095449563.html


Some scientists in the West have long disputed the therapeutic value of traditional Chinese medicine, but it seems the ancient craft is gaining popularity at home and abroad.

It's even been hailed by Xi Jinping's government as "the gem of Chinese science".

Al Jazeera's Rob McBride reports from China's biggest traditional medicine market in the city of Bozhou.
 
 





09:00

From bean to bar "IndyWatch Feed Tech"

 

 

 

 

 

None of this can truly change until we master the resolution of poverty itself.  That must include the natural availability of the four hour shift directly tied to Community needs.  Education itself needs to stop been a mere warehouse and a directed experience aimed at optimizing results. 
 
Yet way more important, we need to correctly support the agricultural enterprise with robots.  Grass must be cut back and machetes can be operated by robots as easily as kids. Our problem is that it is either or.  That is going to change out over the next generation.
 
Yet for all the complaining in this article, this has been the superior alternative to the past.  Recall surplus children were sold directly into the slave trade as happens today in SE Asia and elsewhere.
 
Children need to expect to work or contribute safely and also master their schoolwork as all those American farm boys and girls of our past..  . 
 
.
 
From bean to bar
...

08:30

Jenny (Morawska-Ahearn Morawska, Director of Research Australia, joins our Business Board. "IndyWatch Feed Tech"

Jenny (Morawska-Ahearn) Morawska, Director of Research Australia, joins our Business Board.

07:31

Unknown hackers stole $6 million from a Russian bank via SWIFT system last year "IndyWatch Feed Tech"

A new attack against the SWIFT system made the headlines again, unknown hackers have stolen 339.5 million roubles (roughly $6 million) from a Russian bank last year.

The news of the attack against the international payments messaging system was reported on Friday by the Russian central bank, this is the last incident of a long string of cyber heists.

The volume of unsanctioned operations as a result of this attack amounted to 339.5 million roubles, states the Russian central bank.

The central bank said it had been sent information about one successful attack on the work place of a SWIFT system operator. reported the Reuters agency.

The spokesman did not provide details about the attack, he quoted Artem Sychev, deputy head of the central banks security department, as saying the hackers implemented a common scheme.

When a case of potential fraud is reported to us, we offer our assistance to the affected user to help secure its environment, said Natasha de Teran, a spokeswoman for SWIFT.

SWIFT Taiwan bank hach

SWIFT highlighted that its own systems have never been compromised by attackers in past attacks.

Brussels-based SWIFT said late last year digital heists were becoming increasingly prominent as hackers use more sophisticated tools and techniques to laun...

07:27

Google Removes View Image Button From Its Image Search Results "IndyWatch Feed Tech"

You Will Not Able To View Image In Google Image Search Anymore

Do you download images from Google to set it as a wallpaper on your PC, or use it for your projects, etc.? Well, if you did, you will not be able to anymore, as Google has removed the View Image button from its image search results to protect copyrighted images on its platform.

Today were launching some changes on Google Images to help connect users and useful websites. This will include removing the View Image button. The Visit button remains, so users can see images in the context of the webpages theyre on, Google SearchLiaison tweeted on Thursday. Basically, the change done by the search giant is to help connect users and useful websites, according to a series of tweets by Googles Search Liaison.

The View Image feature allowed the users to quickly find the image they are searching for without having to open the source website. With the change, users will now have to click the visit button instead to view the image on the website. Basically, Google now wants users to visit the original website of the image that they are looking to download from the Internet, and bring revenue to their pages, thus helping their businesses. The change is also supposed to help protect copyrights and licenses of professional photographers and publishers.

For those asking, yes, these changes came about in part due to our settlement with Getty Images this week, the SearchLiaison tweeted. They are designed to strike a balance between serving user needs and publisher concerns, both stakeholders we value.

It further added, Ultimately, Google Images is a way for people to discover information in cases where browsing images is a better experience than text. Having a single button that takes people to actionable information about the image is good for users, web publishers and copyright holders.

The removal of the View Image button in Google Image search is due to the licensing deal between Google and Getty Images multi-year global licensing deal announced earlier this month. This deal allows Google to use Gettys content within its various products and services.

This agreement between Getty Images and Google sets the stage for a very productive, collaborative relationship between our companies, said Dawn Airey, CEO, Getty Images. We will license our market leading content to Google, working closely with them to improve attribution of our contributors work and thereby growing the ecosystem.

In addition to removing the View Image button, Google has also removed the Search by Image button. However, a reverse image search can still be done, though, by dragging an image to t...

07:00

Resurrecting An Amiga CD32 "IndyWatch Feed Tech"

As an editor on Amiga magazines in a previous life, this is kind of bittersweet. [RetroManCave] was donated an Amiga CD32 games system, and it is trying to resurrect it. If youve not heard of it, the CD32 was a 1993 games console based on the Amiga home computer system. It was the last gasp for Commodore, the beleaguered company behind the Amiga. In this first video of a series, they take the system apart, take you through whats inside and boot it up. The system boots, but there is some sort of problem with the video sync, and they will be taking a closer look at fixing that next. We have featured a couple of similar projects from [RetroManCave] before, such as their brain transplant on a Big Trak toy and Commodore 64 fix. This video (after the break) is worth a watch if you are curious about old systems like this, want some tips on resurrecting old hardware or just want to shed a tear as your misspent youth is torn apart before your eyes.

06:55

FCC Approves SpaceX Satellite Broadband Internet Plan "IndyWatch Feed Tech"

SpaceX gets U.S. regulator to back satellite internet plan

Elon Musk's SpaceX, fresh off the successful launch this month of the world's most powerful rocket, won an endorsement on Wednesday from the top U.S. communications regulator to build a broadband network using satellites.

Federal Communications Commission Chairman Ajit Pai proposed the approval of an application by SpaceX to provide broadband services using satellites in the United States and worldwide. "Satellite technology can help reach Americans who live in rural or hard-to-serve places where fiber optic cables and cell towers do not reach," Pai said in a statement.

SpaceX told the FCC in a Feb. 1 letter that it plans to launch a pair of experimental satellites on one of its Falcon 9 rockets. That launch, already approved by the FCC, is set for Saturday in California. The rocket will carry the PAZ satellite for Hisdesat of Madrid, Spain and multiple smaller secondary payloads.

Previously: SpaceX to Launch Broadband Satellites With Latency as Low as 25ms in 2019


Original Submission

Read more of this story at SoylentNews.

06:40

Stephanie Dainow, Client Success Manager at Singularity University, joins our Education Board. "IndyWatch Feed Tech"

Stephanie Dainow, Client Success Manager at Singularity University, joins our Education Board.

06:23

AR Eye Implant "IndyWatch Feed Tech"

AR and human integration is no longer a possibility its a REALITY.

04:42

Dont Panic! "IndyWatch Feed Tech"

By Calum Chase

First Published on Pandoras Brain

Franklin D Roosevelt was inaugurated as US President in March 1933, in the depth of the Great Depression. His famous comment that The only thing we have to fear is fear itself was reassuring to his troubled countrymen, and has resonated down the years. If and when it turns out that machines will make it impossible for many people to earn a living, fear will not be our only problem. But it may well turn out to be our first very serious problem.

Fully autonomous, self-driving vehicles will start to be sold during the coming decade perhaps within five years. Because of the substantial cost saving to the operators of commercial fleets, the humans driving taxis, lorries, vans and buses will be laid off quickly during the decade which follows. Within fifteen or twenty years from now, it is likely there will be very few professional drivers left.

Well before this process is complete, though, people will understand that it is happening, and that it is inevitable. Most of us will have a friend, acquaintance or family member who used to be a professional driver. And the technology that destroyed their job will be very evident. One of the interesting and important things about self-driving cars is they are not invisible, like Google Translate, or Facebooks facial recognition AI systems. They are tangible, physical things which cannot be ignored.

Most people are not thinking about the possibility of technological unemployment today. They see reports about it in the media, and they hear some people saying it is coming and others saying it cannot happen. They shrug perhaps shudder and get on with their lives. This response will no longer be possible when robots are driving around freely, and human drivers are losing their jobs. This cannot fail to strike people as remarkable. Learning to drive is a difficult process, a rite of passage which humans are only allowed to undertake on public roads when they are virtually adult. The fact that robots can suddenly do it better than humans is not something you can ignore.

No doubt some will try to dismiss the phenomenon by explaining that driving wasnt evidence of intelligence after all: like chess, it is mere computation. Teslers Theorem the definiti...

04:34

UK's Royal Society of Arts Proposes 10,000, 2-Year Basic Income "IndyWatch Feed Tech"

10,000 proposed for everyone under 55

The government should give 10,000 to every citizen under 55, a report suggests.

The Royal Society for the encouragement of the Arts, Manufactures and Commerce (RSA) said it could pave the way to everyone getting a basic state wage.

The idea sees two payments of 5,000 paid over two years, but certain state benefits and tax reliefs would be removed at the same time.

The RSA said it would compensate workers for the way jobs are changing.

The money would help to steer UK citizens through the 2020s, "as automation replaces many jobs, climate change hits and more people face balancing employment with social care", the report said.

Royal Society of Arts.

Also at The Guardian and CNBC.


Original Submission

Read more of this story at SoylentNews.

04:05

Twitter pledges to continue working with Mueller after indictments "IndyWatch Feed Tech"

Twitter pledged on Friday to continue assisting in the federal Russia probe after special counsel Robert Mueller's team charged 13 Russian nationals for operating false Twitter accounts to influence U.S. voters.In a statement obtained by...

04:00

Underwater Logging for Science "IndyWatch Feed Tech"

Logging data with an Arduino is old-hat for most Hackaday readers. However, [Patricia Beddows] and [Edward Mallon] had some pretty daunting requirements. Their sensors were going underground and underwater as part of an effort to study conditions underwater and in caves. They needed to be accessible, yet rugged. They didnt want to use batteries that would be difficult to take on airplanes, but also wanted more than a year of run time. You can buy all that, of course, if you are willing to pay the price.

Instead, they used off-the-shelf Arduino boards connected together inside PVC housings. Three alkaline AA batteries are compact and give them more than a year of run time. They wrote a journal paper to help other scientists use the same techniques for the Sensors journal published by the Multidisciplinary Digital Publishing Institute.

If you regularly read Hackaday, you probably wont find the electronic part of the build remarkable. However, thats kind of the point, as this is all off-the-shelf and inexpensive. They do however modify the boards in some cases to allow the controller to power them down, for example.

In fact, they put a lot of thought into reducing power requirements. Since your eye is more sensitive to green, for example, they use green LEDs with very low currents as indicators. They also speed up the serial bus going to sensors because they found that the increased power required was more than offset by finishing the transaction faster (and, thus, going back to sleep sooner).

The PVC enclosures are also interesting. The paper shows some practical deployments in some very harsh conditions. If you want more practical details, the Cave Pearl project has been blogging about their development of these loggers for a while. They have a good how to page, as well.

If an Arduino seems too last-year for you, weve seen long-duration logging done with ESP8266s and ESP32s. However, they did use lithium-ion cells. Spoiler alert: The ESP8266 lasts longer than the ESP32. If you want to minimize power when sending things out over a network connection, consider MQTT.

03:30

Destruction! "IndyWatch Feed Tech"

I got a letter with this insert:

Received damaged from abroad.

...

02:13

"FREE from Chains!": Eskinder Nega is Released from Jail "IndyWatch Feed Tech"

Eskinder Nega, one of Ethiopia's most prominent online writers, winner of the Golden Pen of Freedom in 2014, the International Press Institute's World Press Freedom Hero for 2017, and PEN International's 2012 Freedom to Write Award, has been finally set free.

Eskinder is greeted by well-wishers on his release. Picture by Befekadu Hailu

Eskinder has been detained in Ethiopian jails since September 2011. He was accused and convicted of violating the country's Anti-Terrorism Proclamation, primarily by virtue of his warnings in online articles that if Ethiopia's government continued on its authoritarian path, it might face an Arab Spring-like revolt.

Ethiopia's leaders refused to listen to Eskinder's message. Instead they decided the solution was to silence its messenger. Now, within the last few months, that refusal to engage with the challenges of democracy has led to the inevitable result. For two years, protests against the government have risen in frequency and size. A new Prime Minister, Hailemariam Desalegn, sought to reduce tensions by introducing reforms and releasing political prisoners like Eskinder. Despite thousands of prisoner releases, and the closure of one of the country's more notorious detention facilities, the protests continue. A day after Eskinder's release, Desalegn was forced to resign from his position. A day later, and the government has declared a new state of emergency.

Even as it comes face-to-face with the consequences of suppressing critics like Eskinder, the Ethiopian authorities pushed back against the truth. Eskinder's release was...

02:13

Google Removes Image Search Buttons to Appease Getty Images "IndyWatch Feed Tech"

Google is making a change to image search today that sounds small but will have a big impact: it's removing the "view image" button that appeared when you clicked on a picture, which allowed you to open the image alone. The button was extremely useful for users, since when you're searching for a picture, there's a very good chance that you want to take it and use it for something. Now, you'll have to take additional steps to save an image.

The change is essentially meant to frustrate users. Google has long been under fire from photographers and publishers who felt that image search allowed people to steal their pictures, and the removal of the view image button is one of many changes being made in response. A deal to show copyright information and improve attribution of Getty photos was announced last week and included these changes.

Google is also removing "Search by Image" buttons, requiring users to drag an image into the search bar instead.

Also at Search Engine Land and 9to5Google.


Original Submission

Read more of this story at SoylentNews.

01:06

Researchers create first superatomic 2-D semiconductor "IndyWatch Feed Tech"

(Left) Superatomic structure and (right) exfoliated 15-nm-thick flakes of the material Re6Se8Cl2. Credit: Zhong et al. 2018 American Chemical Society Atoms are the basic building blocks of all matterat least, that is the conventional picture. In a new study, researchers have fabricated the first superatomic 2-D semiconductor, a material whose basic units arent atoms but superatomsatomic clusters that exhibit some of the properties of one or more individual atoms. The researchers expect that the new material is just the first member of what will become a new family of 2-D semiconductors

01:06

New CRISPR-Cas9 tool edits both RNA and DNA precisely "IndyWatch Feed Tech"

A tool that has already revolutionized disease research may soon get even better, thanks to an accidental discovery in the bacteria that cause many of the worst cases of meningitis.

01:05

Authorities deactivate transit pass implanted in biohackers hand "IndyWatch Feed Tech"

Meow-Ludo Disco Gamma Meow-Meow couldnt just toss away his New South Wales transit pass even after he found out that it got deactivated while he was on a trip to the USee, Meow-Meow (yes, that is his legal name) cut the chip out of the travel card, encased it in biocompatible plastic and had it implanted under the skin on his left hand. The biohacker now plans to file a lawsuit against New South Wales transport authorities, not just to fight the decision, but also to help create laws around body-hacking tech. In addition to the transit pass chip, Meow-Meow has two other implanted elect

01:05

First glimpse of how genes may cause mental health problems "IndyWatch Feed Tech"

Geneticists are starting to unpick what causes psychiatric conditions like schizophrenia and bipolar disorder, and even some autism-like developmental conditions.

01:05

Scientists find nearly 100 new exoplanets in hunt for life in space "IndyWatch Feed Tech"

Scientists have discovered nearly 100 new exoplanets in the search for Earth-like planets that could support life.

Its a major breakthrough that reveals new planets that range in size from smaller than Earth to celestial bodies even bigger than Jupiter.

The findings were made by a team of international colleagues from the University of Denmark, NASA, the University of Tokyo and others.

01:04

Amateur Astronauts Flock to The Starfighters as Space Travel Becomes Reality "IndyWatch Feed Tech"

The Starfighters are lobbying to become the first certified astronaut training fleet endorsed by NASA.

01:04

Hubble sees Neptunes mysterious shrinking storm "IndyWatch Feed Tech"

Three billion miles away on the farthest known major planet in our solar system, an ominous, dark storm once big enough to stretch across the Atlantic Ocean from Boston to Portugal is shrinking out of existence as seen in pictures of Neptune taken by NASAs Hubble Space Telescope.

01:04

A Scientific Search For A Ghost (Particle) "IndyWatch Feed Tech"

Scientists put a lot of effort into uncovering the history of these tiny bits of matter, in the hopes that it will tell us something about the universe, says astrophysicist Marcelo Gleiser.

01:04

One in four of worlds largest cities under water stress "IndyWatch Feed Tech"

With Cape Town in the news, its important to understand many other major cities around the world are also at risk.

01:04

UAE seeks brilliant minds for latest space project "IndyWatch Feed Tech"

The United Arab Emirates is seeking ideas from around the world that explore the possibilities of space settlement and habitation.

01:04

Dubai space center is joining the race to Mars "IndyWatch Feed Tech"

The United Arab Emirates plans to launch a satellite this year, send a probe to Mars by 2021 and put people on the planet by 2117.

01:03

Thinking Outside the Quantum Box "IndyWatch Feed Tech"

How the mind can make sense of quantum physics in more ways than one.

01:03

Breakthrough Brings Personal DNA Sequencing Closer Than Ever "IndyWatch Feed Tech"

A new breakthrough will make DNA sequencing much more accurate and accessible, meaning its only a matter of time before your doctor starts doing it.

Getty Images alanphillips

Imagine youre visiting your doctor for a checkup. Your doctor takes all the usual measurements like your height, weight, heart rate, and blood pressure, and then tells you shes going to sequence your DNA.

01:03

CRISPR Isnt Just for Gene Editing Anymore "IndyWatch Feed Tech"

A scientist cuts a DNA fragment under UV light for DNA sequencing. Image: AP Five years ago, when researchers first discovered that bacterial immune systems could be hijacked to edit DNA in living creatures, it was big news. The technology, called CRISPR, allowed scientists to more easily than ever cut and paste all those As, Cs, Ts, and Gs that make up the base pairs of DNA and encode the worlds living things. With CRISPR, scientists could use genetic engineering to tackle problems from disease to famine. But gene editing with CRISPR is so 2017. Recently, scientists have begun exploring n

01:03

Fragile X syndrome neurons can be restored, study shows "IndyWatch Feed Tech"

New Whitehead Institute research may prove to be a useful paradigm for targeting diseases caused by abnormal methylation. Credit: Steven Lee/Whitehead Institute Fragile X syndrome is the most frequent cause of intellectual disability in males, affecting one out of every 3,600 boys born. The syndrome can also cause autistic traits, such as social and communication deficits, as well as attention problems and hyperactivity. Currently, there is no cure for this disorder. Fragile X syndrome is caused by mutations in the FMR1 gene on the X chromosome, which prevent the genes expression. This abs

01:02

CRISPR-Cas9 may be a double-edged sword for bacteria "IndyWatch Feed Tech"

CRISPR-associated protein Cas9 (white) from Staphylococcus aureus based on Protein Database ID 5AXW. Credit: Thomas Splettstoesser (Wikipedia, CC BY-SA 4.0) A team of researchers with the Catholic University of America has found evidence that suggests a defense mechanism used by bacteria to ward off phage attacks might also be benefiting the phages. In their paper published on the open access site Science Advances, the group describes testing the impact of CRISPR-Cas9 on phages that infect Escherichia coli and what they found. In nature, CRISPR-Cas9 is a defense mechanism used by bacteria t

01:02

Lab-grown human cerebellar cells yield clues to autism "IndyWatch Feed Tech"

This Purkinje neuron was derived from patients with tuberous sclerosis and model properties of the disease at the cellular and molecular level. Sundberg and colleagues first created induced pluripotent stem cells (iPSCs) from patients blood cells or skin cells, then differentiated them into neural progenitor cells and finally Purkinje cells. Credit: Courtesy Maria Sundberg, PhD, Sahin Laboratory, Boston Childrens Hospital Increasing evidence has linked autism spectrum disorder (ASD) with dysfunction of the brains cerebellum, but the details have been unclear. In a new study, researchers

01:00

Analyzing Hobby Motors with an Oscilloscope "IndyWatch Feed Tech"

We always like finding new excuses reasons to use our test equipment, so we couldnt help but be intrigued by this tip from [Joe Mosfet]. He uses the ever-popular Rigol DS1054Z to demonstrate the differences between a handful of brushless motors when rotated by his handheld drill at a constant RPM. Not only is he able to identify a blown motor, but it allows him to visualize their specifications which can otherwise seem a bit mystifying.

One wire from each motor is used as the ground, and channels one and two are connected to the remaining wires. Despite the DS1054Z having four channels, [Joe] is actually only using two of them here. The third channel being displayed is a virtual channel created by a math function on the scope.

After wiring them up, each motor got put into the chuck of his drill and spun up to 1430 RPM. The resulting waveforms were captured, and [Joe] walks us through each one explaining what were seeing on the scope.

The bad motor is easy to identify: the phases are out of alignment and in general the output looks erratic. Between the good motors, the higher the Kv rating of the motor, the lower voltage is seen on the scope. That...

00:47

Major New IOS Bug Can Crash iPhones and Disable Access to Apps and IMessages "IndyWatch Feed Tech"

Apple had a shockingly bad week of software problems just before the end of 2017, and it looks like 2018 isn't starting so well either. A new bug has been discovered in iOS 11 that lets people send a specific character that will crash an iPhone and block access to the Messages app in iOS and popular apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail. Italian Blog Mobile World spotted the bug, and we've tested it successfully on multiple iPhones running iOS 11.2.5, and found it also works on the macOS versions of Safari and Messages. Apple plans to fix the problem in an iOS update before the release of iOS 11.3 this spring.

The bug itself involves sending an Indian language (Telugu) character to devices, and Apple's iOS Springboard will crash once the message has been received. Messages will no longer open as the app is trying and failing to load the character, and it appears that the only way to regain access to your iMessages is to have another friend send you a message and try to delete the thread that contained the bad character.

We've also tested the bug on third-party apps like Facebook Messenger, WhatsApp, Gmail, and Outlook for iOS and found that these apps can become disabled once a message is received.

[...] Update, 3:30PM ET: Apple plans to fix the issue in an update before the iOS 11.3 release this spring.

Source: The Verge


Original Submission

Read more of this story at SoylentNews.

00:11

Labor board: Google firing of anti-diversity memo writer was legal "IndyWatch Feed Tech"

Google's decision to fire a programmer who wrote a controversial memo on diversity did not violate the law, a lawyer for a federal agency found.Jayme Sophir, an associate general counsel for the National Labor Relations Board (NLRB), concluded that...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 16 February

23:35

Mueller indictment reveals sophisticated Russian manipulation effort "IndyWatch Feed Tech"

Special counsel Robert Muellers new indictment against Russians accused of meddling in the 2016 presidential race revealed a highly organized, sophisticated operation aimed at manipulating voters, stealing identities and sowing...

23:18

Facebook 'grateful' for Mueller indictments 'against those who abused our service' "IndyWatch Feed Tech"

Facebook on Friday praised special counsel Robert Mueller's decision to indict a Russian troll farm and 13 foreign nationals over an alleged campaign to influence the outcome of the 2016 election an effort that relied heavily on the social...

23:12

Positive Result in Mice as Alzheimer's Drug Trials Fail and Regulatory Barriers Are Rolled Back "IndyWatch Feed Tech"

Merck has ended a trial for the experimental Alzheimer's treatment verubecestat, a BACE1 inhibitor, after it was found to be ineffective. Biogen has increased the sample size of a trial for aducanumab, worrying some investors. The news comes after the failure of drugs such as solanezumab and intepirdine to treat Alzheimer's and dementia.

The FDA has proposed new guidelines that would make it easier to treat Alzheimer's by lowering the bar for clinical success:

In proposed new guidelines released on Thursday, the FDA appears open to trial goals that better match early patient populations, including people who have yet to display memory loss or functional impairment, such as the ability to wash or dress themselves or cook meals.

The draft guidelines suggest that improvement in biomarkers, such as amount of beta amyloid in the brain, a protein linked to the disease, may be an acceptable goal for deeming a drug successful in patients with no symptoms. FDA guidelines used in prior studies demanded that a drug demonstrate both cognitive and functional improvements.

A bipartisan group of Senators and Congressman have introduced the Concentrating on High-Value Alzheimer's Needs to Get to an End (CHANGE) Act, which would also reduce regulatory barriers faced by clinical trials. The annual cost of Alzheimer's and dementia care in the U.S. is projected to rise to $1.1 trillion by 2050.

Meanwhile, a group of researchers has found that targeting BACE1 enzymes could remove existing amyloid plaques (in mice):

Knocking back an e...

22:44

Major US Sports Leagues Report Top Piracy Nations to Government "IndyWatch Feed Tech"

While pirated Hollywood blockbusters often score the big headlines, there are several other industries that have been battling with piracy over the years. This includes sports organizations.

Many of the major US leagues including the NBA, NFL, NHL, MLB and the Tennis Association, are bundling their powers in the Sports Coalition, to try and curb the availability of pirated streams and videos.

A few days ago the Sports Coalition put the piracy problem on the agenda of the United States Trade Representative (USTR).

Sports organizations, including Sports Coalition members, are heavily affected by live sports telecast piracy, including the unauthorized live retransmission of sports telecasts over the Internet, the Sports Coalition wrote.

The Internet piracy of live sports telecasts is not only a persistent problem, but also a global one, often involving bad actors in more than one nation.

The USTR asked the public for comments on which countries play a central role in copyright infringement issues. In its response, the Sports Coalition stresses that piracy is a global issue but singles out several nations as particularly problematic.

The coalition recommends that the USTR should put the Netherlands and Switzerland on the Priority Watch List of its 2018 Special 301 Report, followed by Russia, Saudi Arabia, Seychelles and Sweden, which get a regular Watch List recommendation.

The main problem with these countries is that hosting providers and content distribution networks dont do enough to curb piracy.

In the Netherlands, sawlive.tv, strikezoneme, wizlnet, AltusHost, Host Palace, Quasi Networks and SNEL pirated or provided services contributing to sports piracy, the coalition writes. In Switzerland, mlbstreamme, robinwidgetorg, strikeoutmobi, BlackHOST, Private Layer and Solar Communications are doing the same.

According to the major sports leagues, the US Government should encourage these countries to step up their anti-piracy game. This is not only important for US copyright holders, but also for licensees in other countries.

Clearly, there is common ground both in terms of shared economic interests and legal obligations to protect and enforce intellectual property and related rights for the United States and the nations with which it engages in international trade to work cooperatively to stop Internet piracy of sports programming.

Whether any of these countries will make it into the USTRs final list has yet to be seen. For Switzerland it wouldnt be the first time but for the Netherl...

22:24

119,000 FedEx users passports, security ID & driving licenses exposed "IndyWatch Feed Tech"

By Waqas

It is just another day with just another privacy invasion

This is a post from HackRead.com Read the original post: 119,000 FedEx users passports, security ID & driving licenses exposed

22:04

New National Academy of Sciences Report on Encryption Asks the Wrong Questions "IndyWatch Feed Tech"

The National Academy of Sciences (NAS) released a much-anticipated report yesterday that attempts to influence the encryption debate by proposing a framework for decisionmakers. At best, the report is unhelpful. At worst, its framing makes the task of defending encryption harder.

The report collapses the question of whether the government should mandate exceptional access to the contents of encrypted communications with how the government could accomplish this mandate. We wish the report gave as much weight to the benefits of encryption and risks that exceptional access poses to everyones civil liberties as it does to the needsreal and professedof law enforcement and the intelligence community.

From its outset two years ago, the NAS encryption study was not intended to reach any conclusions about the wisdom of exceptional access, but instead to provide an authoritative analysis of options and trade-offs. This would seem to be a fitting task for the National Academy of Sciences, which is a non-profit, non-governmental organization, chartered by Congress to provide objective, science-based advice on critical issues affecting the nation. The committee that authored the report included well-respected cryptographers and technologists, lawyers, members of law enforcement, and representatives from the tech industry. It also held two public meetings and solicited input from a range of outside stakeholders, EFF among them.

EFFs Seth Schoen and Andrew Crocker presented at the committees meeting at Stanford University in January 2017. We described what we saw as three truths about the encryption debate: First, there is no substitute for strong encryption, i.e. encryption without any intentionally included method for any party (other than the intended recipient/device holder) to access plaintext to allow decryption on demand by the government. Second, an exceptional access mandate will help law enforcement and intelligence investigations in certain cases. Third, strong encryption cannot be successfully fully outlawed, given its proliferation, the fact that a large proportion of encryption systems are open-source, and the fact that U.S. law has limited reach on the global stage. We wish the report had made a concerted attempt to gra...

22:00

How To Control the Lights with a TV Remote "IndyWatch Feed Tech"

In this day and age of the Internet of Things and controlling appliances over the internet, the idea of using an old-fashioned television remote to do anything feels distinctly 2005. That doesnt mean its not a valid way to control the lights at home, and [Atakan] is here to show us how its done.

To the experienced electronics maker, this is yesterdays jam, but [Atakan] goes to great lengths to hash out the whole process from start to finish, from building the circuitry to switch the lights through to the code necessary to make a PIC do your bidding. Its rare to see such a project done with a non-Arduino platform, but rest assured, such things do exist. Theres even some SPICE simulation thrown in for good measure, if you really want to get down to the nitty-gritty.

Perhaps the only thing missing from the writeup is a primer on how to execute the project safely, given that its used with a direct connection to live mains wiring. Wed love to hear in the comments about any changes or modifications that would be necessary to ensure this project doesnt hurt anyone or burn an apartment complex down. Sometimes you can switch lights without a direct connection to the mains, however like this project that interfaces mechanically with a standard light switch.

22:00

Graphene Nanoribbons Reach Out to the Molecular World "IndyWatch Feed Tech"

For the first time, the magnetic porphyrin molecule critical to animal and plant life has been directly connected to an electronic circuit Credit: Jingcheng Li, Nanogune

A collaboration among Spanish research institutesled by the nanoGUNE Cooperative Research Center (CIC)has made a significant breakthrough in so-called molecular electronics by devising a way to connect magnetic porphyrin molecules to graphene nanoribbons. These connections may be another example of how graphene could enable the potential of molecular electronics.

Porphyrin is a hemogloblin-like molecule that is responsible for making photosynthesis possible in plants and transporting oxygen in our blood. But recently, researchers have been experimenting with so-called magnetic porphyrins and discovered that they can form the basis of spintronic devices.

Spintronics involves manipulating the spin of electrons and in this way differs from conventional electronics that manipulates their movement. It is this spin that is responsible for magnetism: When a majority of electrons in a material have their spins pointing in the same direction, the material is magnetized. If you can move all the spins up or down and can read that direction, you can create the foundation of the 0 and 1 of digital logic.

Spintronic devices based on the porphyrin molecule exploit the magnetic atomtypically iron, which has spin-polarized statesthat is in the middle of each molecule. There are a number of ways of exploiting the spin of these magnetic atoms to polarize the transported current. If magnetic molecules with a larger spin are usedthe so-called a single-molecule magneta 1 or 0 state could be stabilized by a magnetic field and read by currents.

The Spanish researchers have taken a unique approach to setting this up. Theyve created direct connections to the molecules with atomically precise graphene wires, which covalently bond to specific sites of the molecules.

This allows the injection of electronic currents into the molecule, says Nacho...

21:39

Dark Matter Generates Tachyons in SN1987A "IndyWatch Feed Tech"

Dark matter, neutrinos and tachyons in the same abstract? Oh yes:

According to conventional wisdom the 5-hour early Mont Blanc burst probably was not associated with SN 1987A, but if it was genuine, some exotic physics explanation had to be responsible. Here we consider one truly exotic explanation, namely faster-than-light neutrinos having sourcem2=0.38keV2. It is shown that the Mont Blanc burst is consistent with the distinctive signature of that explanation i.e., an 8 MeV antineutrino line from SN 1987A. It is further shown that a model of core collapse supernovae involving dark matter particles of mass 8 MeV would in fact yield an 8 MeV antineutrino line

Journal paper: https://www.sciencedirect.com/science/article/pii/S0927650517303341
arxiv: https://arxiv.org/abs/1701.00488v8


Original Submission

Read more of this story at SoylentNews.

21:24

Golang 1.10 Offers Many Smaller Changes, Restores NetBSD Support "IndyWatch Feed Tech"

Not only is there a new Rust release this week but the Google developers have put out the Go 1.10 update...

20:50

Wine 3.2 Released With HID Gamepad Support, D3D Multi-Sample Textures "IndyWatch Feed Tech"

The latest bi-weekly Wine development release is now available...

20:45

Video Friday: Boston Dynamics, Autonomous Drone, and Robot Drum Man "IndyWatch Feed Tech"

Your weekly selection of awesome robot videos Photo: Boston Dynamics

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; heres what we have so far (send us your events!):

International Symposium on Medical Robotics  March 1-3, 2018  Atlanta, Ga., USA
HRI 2018  March 5-8, 2018  Chicago, Ill., USA
US National Robotics Week  April 7-17, 2018  United States
Xconomy Robo Madness  April 12, 2018  Bedford, Mass., USA
NASA Swarmathon  April 17-19, 2018  Kennedy Space Center, Fla., USA
RoboSoft 2018  April 24-28, 2018  Livorno, Italy
ICARSC 2018  April 25-27, 2018  Torres Vedras, Portugal
NASA Robotic Mining Competition  May 14-18, 2018  Kennedy Space Center, Fla., USA
ICRA 2018  May 21-25, 2018  Brisbane, Australia

Let us know if you have suggestions for next week, and enjoy todays videos.


Awww, a SpotMini using its face-arm to help a buddy...adorable!

Now, its starting to get a bit frustrating that every new Boston Dynamics video makes the Internet blow up with OMG-ROBOTS-ARE-GOING-TO-KILL-US  headlines and tweets. Perhaps Boston Dynamics could release some behind-the-scenes footage (or outtakes!) to show whats going on here? Theres an appearance of autonomy, and if its actually autonomous, BD should say so, but if its remote controlled by a human, they should make that clear. A bit more context for thes...

20:34

Initial Intel Icelake Support Lands In Mesa OpenGL Driver, Vulkan Support Started "IndyWatch Feed Tech"

A few days back I reported on Intel Icelake patches for the i965 Mesa driver in bringing up the OpenGL support now that several kernel patch series have been published for enabling these "Gen 11" graphics within the Direct Rendering Manager driver. This Icelake support has been quick to materialize even with Cannonlake hardware not yet being available...

20:30

Identity theft at center of new Mueller indictment "IndyWatch Feed Tech"

Russian nationals stole the identities of six people in the United States to interfere with the 2016 presidential election, the Justice Department alleged Friday.Special counsel Robert Mueller has brought charges of aggravated identity theft against...

20:30

Repairs You Can Print: Better Cable Splicing With 3D Printed Parts "IndyWatch Feed Tech"

A while back, [Marius] was faced with a problem. A friend of his lives in the middle of a rainforest, and a microphone was attacked by a dirty, greasy rat. The cable was gnawed in half, and with it went a vital means of communication with the outside world. The usual way of fixing a five- or six-conductor cable is with heat shrink, linemans splices, insulating tape, and luck. [Marius] needed something better than that, so he turned to his 3D printer and crafted his own wire splice enclosure.

The microphone in question is a fancy Jenal jobbie with a half-dozen or so conductors in the cable. A junction box was the obvious solution to this problem, and a few prototypes, ranging from rectangular to fancy oval boxes embossed with a logo were spat out on a 3D printer. These junction boxes have holes on either end, and when the cable ends are threaded through these holes, the wires can be spliced, soldered, and insulated from each other.

This microphone had to hold up to the rigors of the rainforest and rats, so [Marius] had to include some provisions for waterproofing. This came in the form of a hot glue gun; just fill the junction box with melted hot glue, pop the cover on, and just wait for it to cool. Like all good repairs, it works, and by the time this repair finally gives out, something else in the microphone is sure to go bad.

Its a great repair, and an excellent example of how a 3D printer can make repairs easy, simple, cheap, and almost as good as the stock part. You can check out a few videos of the repair below.

20:19

119,000 Scanned IDs of FedEx-owned company Bongo Internationals customers exposed online "IndyWatch Feed Tech"

Researchers discovered an Amazon S3 bucket contains personal information and scans of IDs of some 119,000 US and international citizens.

It has happened again, researchers discovered another unsecured Amazon S3 bucket holding a huge trove of data that was exposed online. The Amazon S3 bucket contains personal information and scans of IDs of some 119,000 US and international citizens, the discovered was made once again by Kromtech security experts earlier this month.

The data belongs to the FedEx-owned company Bongo International that provides support the online sales of North American retailers and brands to consumers in abroad. Bongo was acquired in 2014 by FedEx and was operating with the name FedEx Cross-Border International until it went out of the business in April 2017.

The AWS bucket contained more than 112,000 files, unencrypted information and ID scans of customers from many countries, including the US, Mexico, Canada, various EU countries, Saudi Arabia, Kuwait, Japan, Malaysia, China, Australia.

Among other stuff, it contained more than 119 thousands of scanned documents of US and international citizens, such as passports, driving licenses, security IDs etc. IDs were accompanied by scanned Applications for Delivery of Mail Through Agent forms (PS Form 1583) which also contained names, home addresses, phone numbers and zip codes. reads the blog post published by the company.

ZDNet analyzed the documents and found scans of drivers licenses, national ID cards, work ID cards, voting cards, utility bills, vehicle registration forms, medical insurance cards, firearms licences, US military identification cards, and credit cards that customers used to verify their identity with the FedEx division.

Among the exposed files, ZDNet confirmed drivers licenses, national ID cards, and work ID cards, voting cards, and utility bills. We also found resumes, vehicle registration forms, medical insurance cards, firearms licences, a few US military identification cards, and even a handful of credit cards that customers used to verify their identity with the FedEx division. wrote Zack Whittaker on ZDNet.

One identity card, when we checked, revealed the details of a senior official at the Netherlands Ministry of Defense.

It seems that the Amazon S3 bucket includes data related to anybody who used Bongo Int...

20:09

Subnautica Dev Fired Over Controversial Twitter Comments "IndyWatch Feed Tech"

Submitted via IRC for TheMightyBuzzard

A Subnautica developer has reportedly been fired over controversial comments he previously posted to Twitter, with the game's sound designer Simon Chylinski tweeting that he has been ousted from his position at Unknown Worlds Entertainment.

Chylinski has come under fire recently after a number of recent comments he posted to Twitter were placed under the spotlight. The sound designer took to Twitter yesterday to post an update on his status with Unknown Worlds Entertainment, tweeting: "so. i just got fired.. :("

Isn't it illegal to fire someone for their political views in California? Unknown Worlds Entertainment may be in for one hell of an uncapped damages lawsuit.

Source: http://www.gamerevolution.com/news/366749-subnautica-dev-fired-controversial-twitter-comments


Original Submission

Read more of this story at SoylentNews.

20:07

Law enforcement uses smart meter parking apps to spy on everyone (Updated) "IndyWatch Feed Tech"


As more and more cities and towns privatize everything, the use of Smart Meter Parking Apps (SMPA) continues to grow.

Which is a good thing right?

Wrong, cities and towns are using SMPA's like ParkMobile, StreetLineParkMe, Park Smarter, ParkBudPassport ParkingMPay2Park and SmartParking to collect all kinds of personal information.

According to numerous privacy policies, SMPA's collect much more information than most people realize..

A look at ParkMobile's privacy policy reveals the types of personal information SMPA's collect.

"Personal Information consisting of, at a minimum, your name, email address, mobile phone number, vehicle license tag number and issuing jurisdiction, Payment Method, Payment Information, Username and password. Over the course of your Use of the Platform, we may collect additional Personal Information such as: your mailing address, billing address, Transaction data; GPS data; information that you voluntarily provide like User Content; information received from your credit card provider, digital wallet, or financial institution".

Did you catch that?

SMPA's at a minimum, are collecting tons of personal information and creating a huge database of where and when you park.

Updated 2/16:

Transit Authorities are using mobile ticketing (tracking) apps

The Utah Transit Authority is using Passport Transit (PT) to track millions of commuters.

According to PT, their app is used by more than 200 million riders. Which also means they are tracking more than 200 million commuters!

...

20:00

AI-Aided Cameras Mean No More Car Mirrors, No More Blind Spots "IndyWatch Feed Tech"

Mitsubishi Electric believes its AI-enhanced camera systems will make mirrors on cars obsolete and help make a dent in the annual roadway death toll Image: Mitsubishi Electric

According to the World Health Organization, more than 1.25 million people around the world die from road accidents each year. Consequently, the United Nations has set a target of halving this number by 2020. A new technology being readied for its debut could be a step forward in achieving that ambitious goal: greatly improved automotive video cameras meant to replace mirrors on vehicles.  

In its annual R&D Open House on 14 February, Mitsubishi Electric described the development of what it believes is the industrys highest-performance rendition of mirrorless car technology. According to the company, todays conventional camera-based systems featuring motion detection technology can detect objects up to about 30 meters away and identify them with a low accuracy of 14 percent. By comparison, Mitsubishis new mirrorless technology extends the recognition distance to 100 meters with an 81 percent accuracy.

Motion detection cant see objects if they are a long distance away, says Kazuo Sugimoto, Senior Manager, at Mitsubishi Electrics Image Analytics and Processing Technology Group, Information Technology R&D Center in Kamakura, 55 km south of Tokyo. So we have developed an AI-based object-recognition technology that can instantly detect objects up to about 100 meters away.

To achieve this, the Mitsubishi system uses two technology processes consecutively. A computational visual-cognition model first mimics how humans focus on relevant regions and extract object information from the background even when the objects are distant from the viewer.

The extracted object data is then fed to Mitsubishi's compact deep learning AI technology dubbed Maisart. The AI has been taught to classify objects into distinct categories: trucks; cars; and other objects such as lane markings. The detected results are then superimposed onto video that appears on a monitor for the driver to view. 

Currently, this superimposing results in objects being displayed with colored rectangles surrounding them. For instance, a blue rectangle designates an approaching truck, a yellow rectangle an oncoming car. But this can be done in a number of ways, says Sugimoto. We are now testing out various ideas to find the best method for drivers.

He emphasizes that the modeling employs relatively simple algorithms so that even when combined with the processing of the compact AI system, detection takes place in real-time. And because drivers get advance warning of approaching vehicles in real time, they can make better decisions on...

19:57

[$] The boot-constraint subsystem "IndyWatch Feed Tech"

The fifth version of the patch series adding the boot-constraint subsystem is under review on the linux-kernel mailing list. The purpose of this subsystem is to honor the constraints put on devices by the bootloader before those devices are handed over to the operating system (OS) Linux in our case. If these constraints are violated, devices may fail to work properly once the kernel starts reconfiguring the hardware; by tracking and enforcing those constraints, instead, we can ensure that hardware continues to work properly until the kernel is fully operational.

19:32

Dell EMC plugs critical bugs in VMAX enterprise storage offerings "IndyWatch Feed Tech"

Dell EMC has patched two critical flaws in vApp Manager, the management interface for its VMAX enterprise storage systems, and is urging all customers to implement fixes as soon as possible. About the VMAX enterprise storage vulnerabilities The flaws were discovered and reported by Tenables director of reverse engineering Carlos Perez. The graver of the two is CVE-2018-1216, which marks the existence of a hard-coded password vulnerability. The vApp Manager contains an undocumented default account More

19:28

EFF and MuckRock Are Filing a Thousand Public Records Requests About ALPR Data Sharing "IndyWatch Feed Tech"

EFF and MuckRock have a launched a new public records campaign to reveal how much data law enforcement agencies have collected using automated license plate readers (ALPRs) and are sharing with each other.

Over the next few weeks, the two organizations are filing approximately 1,000 public records requests with agencies that have deals with Vigilant Solutions, one of the nations largest vendors of ALPR surveillance technology and software services. Were seeking documentation showing whos sharing ALPR data with whom. We are also requesting information on how many plates each agency scanned in 2016 and 2017 and how many of those plates were on predetermined hot lists of vehicles suspected of being connected to crimes.

You can see the full list of agencies and track the progress of each request through the Street-Level Surveillance: ALPR Campaign page on MuckRock.

As Easy As Adding a Friend on Facebook

Joining the largest law enforcement LPR sharing network is as easy as adding a friend on your favorite social media platform.

Thats a direct quote from Vigilant Solutions in its promotional materials for its ALPR technology. Through its LEARN system, Vigilant Solutions has made it possible for government agenciesparticularly sheriffs offices and police departmentsto grant 24-7, unrestricted database access to hundreds of other agencies around the country.

ALPRs are camera systems that scan every license plate that passes in order to create enormous databases of where people drive and park their cars both historically and in real time. Collected en masse by ALPRs mounted on roadways and vehicles, this data can reveal sensitive information about people, such as where they work, socialize, worship, shop, sleep at night, and seek medical care or other services. ALPR allows your license plate to be used as a tracking beacon and a way to map your social networks.

Heres the question: who is on your local police departments and sheriff offices ALPR friend lists?

Perhaps you live in a sanctuary city. Theres a very real chance local police are sharing ALPR data with Immigration & Customs Enforcement, Customs & Border Patrol, or one of their subdivis...

19:15

LunarG's Vulkan Layer Factory Aims To Make Writing Vulkan Layers Easier "IndyWatch Feed Tech"

Introduced as part of LunarG's recent Vulkan SDK update is the VLF, the Vulkan Layer Factory...

19:01

Retrotechtacular: AM Radios, Core Memory, And Color TV, What Was Hot In Chips In 73 "IndyWatch Feed Tech"

As part of writing tech stories such as those we feature here at Hackaday, there is a huge amount of research to be done.  We trawl through pages and pages of obscure blogs, videos, and data sheets. Sometimes we turn up resources interesting enough that we file them away, convinced that they contain the nucleus of another story at some point in the future.

Todays topic of entertainment is just such a resource, courtesy of the Internet Archive. Its not a video as wed often provide you in a Retrotechtacular piece, instead its the February 1973 edition of the Fairchild Semiconductor Linear Integrated Circuits Catalog. Books like this one that could be had from company sales representatives were highly prized in the days before universal Internet access to data sheets, and the ink-on-paper datasheets within it provide a fascinating snapshot of the integrated electronics industry as it was 45 years ago.

The first obvious difference between then and now is one of scale, this is a single volume containing Fairchilds entire range. At 548 pages it wouldnt have been a slim volume by any means, but given that Fairchild were at the time one of the big players in the field it is unimaginable that the entire range of a 2018 equivalent manufacturer could be contained i...

18:44

Re: XSS vulnerability in Tiki < 18 "IndyWatch Feed Tech"

Posted by chbi on Feb 16

CVE-2018-7188 has been assigned.

18:35

Kepler's K2 Mission Going Strong With Another 95 New Exoplanets Confirmed "IndyWatch Feed Tech"

Data from the Kepler spacecraft's extended mission has been used to confirm 95 new exoplanet discoveries:

"We started out analyzing 275 candidates of which 149 were validated as real exoplanets. In turn 95 of these planets have proved to be new discoveries," said American PhD student Andrew Mayo at the National Space Institute (DTU Space) at the Technical University of Denmark.

[...] The Kepler spacecraft was launched in 2009 to hunt for exoplanets in a single patch of sky, but in 2013 a mechanical failure crippled the telescope. However, astronomers and engineers devised a way to repurpose and save the space telescope by changing its field of view periodically. This solution paved the way for the follow up K2 mission, which is still ongoing as the spacecraft searches for exoplanet transits.

[...] One of the planets detected was orbiting a very bright star. "We validated a planet on a 10 day orbit around a star called HD 212657, which is now the brightest star found by either the Kepler or K2 missions to host a validated planet. Planets around bright stars are important because astronomers can learn a lot about them from ground-based observatories," said Mayo.

275 candidates and 149 validated planets orbiting bright stars in K2 campaigns 0-10 (open, DOI: 10.3847/1538-3881/aaadff) (DX)

This work, in addition to increasing the population of validated K2 planets by more than 50% and providing new targets for follow-up observations, will also serve as a framework for validating candidates from upcoming K2 campaigns and the Transiting Exoplanet Survey Satellite (TESS), expected to launch in 2018.


Original Submission

Read more of this story at SoylentNews.

18:30

Automotive: Reshaping Semiconductor Test "IndyWatch Feed Tech"

This webinar will review new and evolving semiconductor test quality and reliability solutions aimed at addressing these evolving functional safety requirements.

We are at the beginning of an automotive electronics explosion. The combined move towards electric vehicles and autonomous driving is resulting in a rapid increase in both the number and complexity of electronic components integrated within a car. This rapid change is creating challenges for both device suppliers and integrators as they scramble to understand and define critical quality and reliability requirements and implementation solutions driven largely by the ISO 26262 standard. This webinar will review new and evolving semiconductor test quality and reliability solutions aimed at addressing these evolving functional safety requirements.

PRESENTERS:
 
 

Stephen Pateras, Mentor Graphics

Stephen Pateras is product marketing director within Mentors Tessent group and has responsibility for the companys BIST and automotive semiconductor test solutions. His previous position was VP Marketing at LogicVision where he was instrumental in defining and bringing to market several generations of LogicVisions semiconductor test products. From 1991 to 1995, Dr. Pateras held various engineering lead positions within IBMs mainframe test group.

Dr. Pateras received his Ph.D. in Electrical Engineering from McGill University in semiconductor test and has spent his entire career in positions related to the usage or specification of semiconductor test solutions. He has written and has had published numerous articles and papers in the semiconductor test field and regularly speaks and sits on panels at different semiconductor test conferences around the world.

Attendance is free. To access the event please register.
NOTE: By registering for this webinar you understand and agree that IE...

18:13

New IoT Botnet DoubleDoor Bypass Firewall to Drop Backdoor "IndyWatch Feed Tech"

By Waqas

A new Internet of Things (IoT) botnet campaign dubbed as

This is a post from HackRead.com Read the original post: New IoT Botnet DoubleDoor Bypass Firewall to Drop Backdoor

18:00

ExtraVM KVM plans powered by NVMe SSDs and more! "IndyWatch Feed Tech"

Mike has sent in their very first official LowEndBox offer from ExtraVM! They have been around nearly 4 years now and are a registered entity based out of Dallas, TX (802515270) offering services today in Canada, France and Singapore! We look forward to our readers feedback on this new provider to us here at LEB and would like to also note that Mike is an active member of our community over at LET as well (MikeA)!

In their own words:
ExtraVM was started in 2014, originally providing game servers, but quickly expanding to VPS with uptime and affordability in mind. At the time ExtraVM started, DDoS attacks were more of a constant problem with not too many cheaper and stable solutions. All of our services are DDoS protected, and we give clients tools to manage protection. Besides that, we try to open our services up to individuals anywhere in the world. We accept numerous different payment methods and dozens of local e-wallets and currencies in Asia, the middle east, and Europe via one of our payment partners. No beating around the bush here, just search online for reviews, we even pay out affiliates in the same hour!

They offer PayPal, Stripe, BitPay, PaymentWall (50+ regional gateways, bank transfers, etc) as payment methods. Please see the ToS for further information before ordering.

Offer:

KVM VPS, NVMe SSD
  • 512MB RAM
  • 1x vCPU
  • 7GB NVMe SSD
  • 1TB Transfer
  • 500Mbps Uplink
  • 1x IPv4, IPv6
  • KVM/SolusVM
  • Coupon: LEBTRY (30% off first month)
  • $3.00/month OR $32.76/yr
  • Order here (Canada, France)
KVM VPS
  • 1GB RAM
  • 1x vCPU
  • 14GB NVMe SSD
  • 200GB Transfer
  • 250Mbps Uplink
  • 1x IPv4, IPv6
  • KVM/SolusVM
  • ...

17:41

XSS vulnerability in Tiki < 18 "IndyWatch Feed Tech"

Posted by chbi on Feb 16

Hi,

I've discovered a security issue in Tiki < 18 (https://tiki.org)

A XSS vulnerability via SVG image allows an authenticated user to gain
administrator privileges if an administrator opens a wiki page with a
malicious SVG image, related to filegallib.php.

Fix:
https://sourceforge.net/p/tikiwiki/code/65327

The issue is fixed in Tiki 18.

I've requested a CVE ID (MITRE).

17:30

Linux Weather Forecast "IndyWatch Feed Tech"

Welcome to the Linux Weather Forecast

This page is an attempt to track ongoing developments in the Linux development community that have a good chance of appearing in a mainline kernel and/or major distributions sometime in the near future. Your "chief meteorologist" is Jonathan Corbet, Executive Editor at LWN.net. If you have suggestions on improving the forecast (and particularly if you have a project or patchset that you think should be tracked), please add your comments below. 

17:30

3D-Printed Punch and Die Stand up to Steel "IndyWatch Feed Tech"

When you think of machine tooling, what comes to mind might be an endmill made of tungsten carbide or a punch and die made of high-speed steel. But surely theres no room in the machine tool world for 3D-printed plastic tools, especially for the demanding needs of punching parts from sheet metal.

As it turns out, it is possible to make a 3D-printed punch and die set that will stand up to repeated use in a press brake. [Phil Vickery] decided to push the tooling envelope to test this, and came away pleasantly surprised by the results. In fairness, the die he used ended up being more of a composite between the carbon-fiber nylon filament and some embedded metal to reinforce stress points in the die block. It looks like the punch is just plastic, though, and both were printed on a Markforged Mark 2, a printer specifically designed for high-strength parts. The punch and die set were strong enough to form 14-gauge sheet steel in a press brake, which is pretty impressive. The tool wasnt used to cut the metal; the blanks were precut with a laser before heading to the press. But still, having any 3D-printed tool stand up to metal opens up possibilities for rapid prototyping and short production runs.

No matter what material you make your tooling out of, theres a lot to know about bending metal. Check out the basics in our guide to the art and science of bending metal.

Thanks for the tip, [Oahu].

17:13

Scanned IDs of 119,000 FedEx customers exposed online "IndyWatch Feed Tech"

An unsecured Amazon Web Services bucket holding personal information and scans of IDs of some 119,000 US and international citizens has been found sitting online by Kromtech security researchers earlier this month. The stored data had been stockpiled by Bongo International, a company that specialized in helping North American retailers and brands sell online to consumers in other countries. Bongo was acquired by FedEx in 2014, relaunched as FedEx Cross-Border International, and ultimately shuttered in More

17:01

dtrace for Linux; Oracle Does the Right Thing "IndyWatch Feed Tech"

Mark J. Wielaard has written a brief blog post about a crucial license change for the dtrace performance analysis and troubleshooting tool. It has been available for most other systems, notably Solaris derivatives, FreeBSD, and OS X, but not for Linux. That may change soon, or at least have the possibility to change.

At Fosdem we had a talk on dtrace for linux in the Debugging Tools devroom.

Not explicitly mentioned in that talk, but certainly the most exciting thing, is that Oracle is doing a proper linux kernel port:

commit e1744f50ee9bc1978d41db7cc93bcf30687853e6

Author: Tomas Jedlicka
Date: Tue Aug 1 09:15:44 2017 -0400

dtrace: Integrate DTrace Modules into kernel proper

This changeset integrates DTrace module sources into the main kernel source tree under the GPLv2 license. Sources have been moved to appropriate locations in the kernel tree.

That is right, dtrace dropped the CDDL and switched to the GPL!

This change improves the utility of dtrace and gives a badly needed boost to Oracle's image. So will the license for ZFS be corrected next?

Source : dtrace for linux; Oracle does the right thing.


Original Submission

Read more of this story at SoylentNews.

17:00

AI Diagnostics Move Into The Clinic "IndyWatch Feed Tech"

Some algorithms assist specialists; others may take their place Image: IDx

True to form, artificial intelligence continues to equal and even surpass doctors in the prediction and diagnosis of condition after condition. Most of this work, however, has occurred in carefully controlled laboratory experiments, with clean databases and images acquired and reviewed by experts.

Now, companies are making a concerted push to bring AI into real healthcare settings, where things are messier and far less controlled.

Last year, the U.S. Food and Drug Administration (FDA) approved the first machine learning application for healthcare: The Arterys Cardio DL. It uses a deep learning algorithm to analyze MRI images of the heart. The tool assists doctors in recognizing a problem and making a diagnosis, but other AI applications seek to flag disease without specialists overseeing the process.

Recently, Iowa City-based IDx announced that the FDA has expedited the review of the companys autonomous AI system for early detection of diabetic retinopathy, a leading cause of blindness in diabetics. The IDx-DR system, developed by IEEE Senior Member Michael Abramoff over the past 21 years, is designed to work without the help of an eye specialist, which could make a big difference for patients. Currently, individuals often wait weeks or months to see a eye specialist, and may not be diagnosed in time to prevent blindness.

IDx founder Dr. Michael Abramoff discussing a retinal image with IDx staff members. Photo: IDx

IDx founder Dr. Michael Abramoff discussing a retinal image with IDx staff members.

The autonomy of the AI system initially made regulators uncomfortable, says Abramoff. There is essentially no one looking over the shoulder of the algorithm, he says. So IDx and the FDA went back and forth for seven years over how to evaluate the system and make sure it was accurate and safe. Making the algorithm explainable to regulators was crit...

16:47

SEC halts trading of three companies promoting crypto sales "IndyWatch Feed Tech"

The Securities and Exchange Commission (SEC) on Friday suspended trading for shares of three companies that promoted plans to sell their own cryptocurrency.The SEC banned investors from trading shares of Cherubim Interests Inc., PDX Partners...

16:37

Security updates for Friday "IndyWatch Feed Tech"

Security updates have been issued by Debian (quagga), Mageia (freetype2, kernel-linus, and kernel-tmb), openSUSE (chromium, GraphicsMagick, mupdf, openssl-steam, and xen), Slackware (irssi), SUSE (glibc and quagga), and Ubuntu (quagga).

16:22

Brazil Military Takes Control of Rio de Janeiros Security "IndyWatch Feed Tech"

Via: Bloomberg: Brazils military will take control of public security in the state of Rio de Janeiro as a wave of violence rattles the population and dominates media coverage ahead of this years presidential election. President Michel Temer will issue a decree on Friday putting the military in charge of Rios security forces, his press []

16:20

Hackers who stole $300 million, hacked Citibank & Nasdaq are jailed "IndyWatch Feed Tech"

By Uzair Amir

Two Russian Hackers Charged with Running Americas Largest Credit-Card Information

This is a post from HackRead.com Read the original post: Hackers who stole $300 million, hacked Citibank & Nasdaq are jailed

16:08

Tips that will help you have a successful custom software development "IndyWatch Feed Tech"

Everybody knows that custom software can contribute to an organizations development and increase its efficiency and profitability. It can be hard to find a good developer that will provide you with adequate software and solutions for your business, therefore, when you think about custom software development, consider your organizations needs and improvement areas. Of course, your developer will bring knowledge and experience, but you will be the one who has to provide the details. If you want this operation to succeed, consider some factors while you are working on it:

Tips that will help you have a successful custom software development

The end should be your beginning

It is better if you know exactly what you want, because only in this situation the developer will know which solutions to offer you. If you have the final image in mind, everything else will come naturally. It is up to you to think about your new softwares performance and accomplishments should be and explain your ideas to the developer.

Think about how this software will integrate in your business plan

Since it is custom made, its important to know right from the beginning how this software will contribute to your businesss development. For a clear picture, check your business plan and if you dont have one, place your new investment in the organizations overall development plan. If you dont develop a strategy for the use of your new software, you will find that you have lost time and money.

Think about how the software will be useful for serving your market

Will the new software cope with your customers needs? Think about your market and how can the new acquisition help you enjoy its characteristics.

The decision should be made by one person

When we are talking about custom software development, we know that this is a job that can be done by more than one people. However, even if several members of your team will contribute to defining the final idea, only one person should be responsible for making the final decisions and communicate with the developer.

Always have the fina...

16:01

Whatever Happened To The Desktop Computer? "IndyWatch Feed Tech"

If you buy a computer today, youre probably going to end up with a laptop. Corporate drones have towers stuffed under their desks. The cool creative types have iMacs littering their open-plan offices. Look around on the online catalogs of any computer manufacturer, and youll see there are exactly three styles of computer: laptops, towers, and all-in-ones. A quick perusal of Newegg reveals an immense variety of towers; you can buy an ATX full tower, an ATX mid-tower, micro-ATX towers, and even Mini-ITX towers.

It wasnt always this way. Nerds of a sufficient vintage will remember the desktop computer. This was, effectively, a tower tilted on its side. You could put your monitor on top, negating the need for a stack of textbooks bringing your desktop up to eye level. The ports, your CD drive, and even your fancy Zip drive were right there in front of you. Now, those days of desktop computers are long gone, and the desktop computer is relegated to history. What happened to the desktop computer, and why is a case specifically designed for a horizontal orientation so hard to find?

The IBM Model 5150

Dawn of Home Computers

From the beginning of the IBM PC era,...

16:00

Q4OS Makes Linux Easy for Everyone "IndyWatch Feed Tech"

Title: 
Q4OS Makes Linux Easy for Everyone

15:35

New iOS bug can crash your iPhone, iPad or Mac by sending a single character "IndyWatch Feed Tech"

This single-character message could crash your iPhone, Apple to fix the bug soon

Looks like Apples woes doesnt seem to end. Last month, it was the malicious link dubbed as chaiOS text bomb sent through Apples Message app that could freeze the iOS or macOS operating systems and ultimately crashing the iPhone, Mac or iPad.

Now, a new security vulnerability that involves sending an Indian language character (in Telugu) to devices has been discovered in Apples latest operating system (iOS 11.2.5) that can cause your iPhone to crash and block access to apps, like iMessage, WhatsApp, Outlook for iOS, Gmail and Facebook Messenger or make them inaccessible. The iOS bug also affects built-in Messages app on macOS and the Apple Watch, as well as the App Store and Safari.

According to Italian Blog Mobile World, who first spotted the bug say that the vulnerability crashes the app in which the character appears and can send the affected device into recurring reboot. Moreover, upon restarting the devices, the users will be unable to open the Messages app, as it will try to load the character but refuse to function properly. The only way to make to your iMessages work properly is to delete the entire conversation with the bad character by having someone else send a text message to the app that is crashing.

Apple has acknowledged that the iOS 11.2.5 has a serious bug and it was working on to fix it. While iOS 11.3 fixes the problems, Apple said it is planning to release an iOS 11 update soon that will address the crashes before the iOS 11.3 release in the spring, The Verge reported late Thursday.

Until Apple releases an iOS 11 update, it is advisable not to open any message received with the symbol and delete the message.

Source: The Verge

The post New iOS bug can crash your iPhone, iPad or Mac by sending a single character appeared first on TechWorm.

15:33

Embedding a Tweet Can be Copyright Infringement, Court Rules "IndyWatch Feed Tech"

Nowadays its fairly common for blogs and news sites to embed content posted by third parties, ranging from YouTube videos to tweets.

Although these publications dont host the content themselves, they can be held liable for copyright infringement, a New York federal court has ruled.

The case in question was filed by Justin Goldman whose photo of Tom Brady went viral after he posted it on Snapchat. After being reposted on Reddit, it also made its way onto Twitter from where various news organizations picked it up.

Several of these news sites reported on the photo by embedding tweets from others. However, since Goldman never gave permission to display his photo, he went on to sue the likes of Breitbart, Time, Vox and Yahoo, for copyright infringement.

In their defense, the news organizations argued that they did nothing wrong as no content was hosted on their servers. They referred to the so-called server test that was applied in several related cases in the past, which determined that liability rests on the party that hosts the infringing content.

In an order that was just issued, US District Court Judge Katherine Forrest disagrees. She rejects the server test argument and rules that the news organizations are liable.

[W]hen defendants caused the embedded Tweets to appear on their websites, their actions violated plaintiffs exclusive display right; the fact that the image was hosted on a server owned and operated by an unrelated third party (Twitter) does not shield them from this result, Judge Forrest writes.

Judge Forrest argues that the server test was established in the Perfect 10 v. Amazon case, which dealt with the distribution of content. This case is about displaying an infringing work instead, an area where the jurisprudence is not as clear.

The Court agrees with plaintiff. The plain language of the Copyright Act, the legislative history undergirding its enactment, and subsequent Supreme Court jurisprudence provide no basis for a rule that allows the physical location or possession of an image to determine who may or may not have displayed a work within the meaning of the Copyright Act.

As a result, summary judgment was granted in favor of Goldman.

Rightsholders, including Getty Images which supported Goldman, are happy with the result. However, not everyone is pleased. The Electronic Frontier Foundation (EFF) says that if the current verdict stands it will put millions of regular Internet users at risk.

Rejecting years of settled precedent, a federal court in New York has ruled that you could infringe copyright simply by embed...

15:30

AMD Raven Ridge Graphics On Linux vs. Lower-End NVIDIA / AMD GPUs "IndyWatch Feed Tech"

This week we have delivered the first Linux benchmarks of the OpenGL/Vulkan graphics capabilities of AMD's new Raven Ridge desktop APUs with the Vega 8 on the Ryzen 3 2200G an the Vega 11 on Ryzen 5 2400G. Those tests have included comparisons to the integrated graphics capabilities of Intel processors as well as older AMD Kaveri APUs. For those interested in seeing how the Raven Ridge Vega graphics compare to lower-end Radeon and GeForce discrete graphics cards, here are those first Linux benchmarks.

15:27

Study Suggests Attacking Motives of Scientists is Just as Damaging as Attacking the Science Itself "IndyWatch Feed Tech"

Argumentum ad hominem, a well-known fallacy that involves attacking the character or motive of the person making the argument rather than arguing their claims on their merits, is frequently encountered, and despite being fallacious, it is disturbingly effective. A new study in PLOS One (open, DOI: 10.1371/journal.pone.0192025) sheds some further light on just how effective the various types of ad hominem attacks are in the context of scientific claims. An article from Psypost reports on the findings:

Ad hominem arguments attacking a person to disprove his or her claims is considered a logical fallacy. But a new study published in PLOS One suggests that some ad hominem attacks can effectively erode people's trust in scientific claims.

The research found that attacking the motives of scientists undermines the belief in a scientific claim just as much as attacking the science itself.

[...] "One key finding is that if members of the general public are aware of a conflict of interest connected to a scientific finding, then this will seriously undermine their faith in that finding," Barnes told PsyPost. "What the study does is allow us to quantitatively compare the amount of attitude change based on knowledge of conflict of interest to the amount of attitude change based on knowledge of outright research fraud and misconduct (such as faking the data)."

"What we see is that knowledge of conflict of interest is just as powerful as knowledge of research fraud."

Further commentary on the study by Orac at Respectful Insolence.


Original Submission

Read more of this story at SoylentNews.

15:00

GDPR quick guide: Why non-compliance could cost you big "IndyWatch Feed Tech"

If you conduct business in the EU, offer goods or services to, or monitor the online behavior of EU citizens, then the clock is ticking. You only have a few more months until May to make sure your organization complies with GDPR data privacy regulations. Failure to abide by GDPR means you could get hit with huge fines. Finding and investigating data breaches: Why its always too little, too late Personal data protection More

15:00

This Week in Open Source News: Google's AMP Support to Snazz Up Email, Open Source Community Continues to Do Good & More "IndyWatch Feed Tech"

Title: 
This Week in Open Source News: Google's AMP Support to Snazz Up Email, Open Source Community Continues to Do Good & More

14:30

New infosec products of the week: February 16, 2018 "IndyWatch Feed Tech"

ScramFS: Encryption system for safeguarding cloud data Scram Software has announced that ScramFS an internationally peer-reviewed encryption system for safeguarding cloud data is now available globally to SMEs, government and not-for-profit organizations, enabling encryption of sensitive data to reduce breaches and assist in ensuring legal, HIPPA and GDPR compliance. Dtex Systems updates its Advanced User Behavior Intelligence Platform Dtex Systems announced innovations to its Advanced User Behavior Intelligence Platform, designed to meet the More

14:14

Khronos Adds Draco Geometry Compression To glTF 2.0 "IndyWatch Feed Tech"

Khronos' glTF transmission format for 3D scenes and models continues getting better. This 3D format has seen adoption by countless applications and engines and even usage within Microsoft products. Khronos' latest advancement to glTF 2.0 is a compression extension...

14:00

The 4 Major Tenets of Kubernetes Security "IndyWatch Feed Tech"

In a previous article, we learned about the threats to a Kubernetes deployment that may result in a multitude of compromises and undesirable scenarios. With these threat models in mind, we can now explore Kubernetes security along four major tenets:

14:00

Intel offers to pay for Spectre-like side channel vulnerabilities "IndyWatch Feed Tech"

Intel is expanding the bug bounty program it started last March, and is raising considerably the awards it plans to give out for helpful vulnerability information. Where information about critical vulnerabilities in Intel software, firmware and hardware could have previously been rewarded with up to $7,500, $10,000 and $30,000, respectively, now the bounties in those same categories go up to $10,000, $30,000 and $100,000. A new bug bounty program for side channel vulnerabilities The company More

14:00

Cyber Intrusion Creates More Havoc for Washington States New Marijuana Tracking System "IndyWatch Feed Tech"

Other states seed-to-sale tracking systems have troubles of their own Photo: iStock Photo

Licensed marijuana product growers and retailers have been very unhappy with Washington States new seed-to-sale marijuana tracking system that went live on 1 February.

Buggy software has kept many suppliers from shipping their products because of manifest errors and, equally, retailers from accepting their orders. While Washingtons Liquor and Cannabis Board officials have insisted that the myriad software problems are being fixed or work arounds exist for most of them, it also has disclosed that the tracking system experienced a cyber intrusion.

In a letter to licensees, the Liquor and Cannabis Board stated that on 1 February someone downloaded a copy of the traceability database, which in turn affected key operations of the tracking system in a way the Board refused to disclose. The intruder was able to access information for four days of marijuana deliveries, including delivery-vehicle information together with type, license-plate number and VIN numbers. The Liquor and Cannabis Board said that since the latter information was publicly available and no personal information was accessed, there was no need for anyone to be concerned. Retailers and growers, however, were not exactly comforted by the Boards reassurances.

Like most other states that have legalized marijuana in some form, Washington State requires that marijuana products be tracked from seed, or when its planted, to sale to a customer, so the state will have insights into the state of the market and movements of the products. The state, which allowed the retail sale of marijuana in 2014, initially used the software provided by BioTrackTHC. However, the company decided aga...

13:53

Peter Thiel Migrating From Silicon Valley to Los Angeles "IndyWatch Feed Tech"

Netflix's CEO offered to resign from Facebook's board in 2016, citing his fellow board member Peter Thiel's support of Donald Trump:

Netflix CEO Reed Hastings who called his fellow board member Thiel's support of Trump "catastrophically bad judgment" in an email leaked to the Times also offered to resign over his disagreement with Thiel, according to a Wall Street Journal report published Thursday. Sources told WSJ that Facebook CEO Zuckerberg declined Hastings' offer to resign. Facebook declined to comment on the matter to Business Insider.

Now, Thiel may resign from Facebook's board instead in the midst of packing up and leaving the Bay area:

The founder of PayPal and a prominent investor in Silicon Valley, Thiel is reportedly moving his investment firms Thiel Capital and Thiel Foundation out of the Bay Area and into Los Angeles this year, according to WSJ.

In L.A., Thiel is also reportedly planning to build "a right-leaning media outlet to foster discussion and community around conservative topics." Thiel bankrolled the lawsuits that eventually forced Gawker Media into bankruptcy, and has been trying to buy Gawker's now-defunct flagship site.

Although Thiel has called Silicon Valley a "one-party state", in the 2016 Presidential election, Hillary Clinton beat President Trump 72 percent to 22 percent in Los Angeles County.

The Guardian also has an article about Thiel's involvement in New Zealand.

Also at Ars Technica, The Mercury News, LA Times, and Vanity Fair.

Related:...

13:30

Still relying solely on CVE and NVD for vulnerability tracking? Bad idea "IndyWatch Feed Tech"

2017 broke the previous all-time record for the highest number of reported vulnerabilities. The 20,832 vulnerabilities cataloged during 2017 by Risk Based Security (VulnDB) eclipsed the total covered by MITREs Common Vulnerability Enumeration (CVE) and the National Vulnerability Database (NVD) by more than 7,900. Incredibly, we see too many companies still relying on CVE and NVD for vulnerability tracking, despite the US government funded organization falling short year after year. While some argue that the More

13:28

Meet Mars 2018 "IndyWatch Feed Tech"

Comme tous les premiers samedis du mois, c'est meeting HZV ! 

RDV ce samedi 3 Mars 2018 l'Electrolab 52, Rue Paul Lescop Nanterre  16H !

 

Pas de talk programm pour le moment, si vous voulez en proposer un, crivez-nous sur meet [at] hackerzvoice [dot] net !

 

Piqre de rappel : le CFP de la #ndh16 est toujours ouvert, vous avez jusqu'au 5 avril prochain pour faire vos propositions : https://submit.hackerzvoice.net/

13:09

"IndyWatch Feed Tech"

OpenSSL 1.1.1 is currently in alpha. OpenSSL 1.1.1 pre release 1 has now been made available. states the OpenSSLs announcement

This OpenSSL pre-release has been provided for testing ONLY. It should NOT be used for security critical purposes. The alpha release is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under https://www.openssl.org/source/mirror.html)

The first Internet-Draft dates back to April 2014, in January it was presented the 23 and will expire on July 9, 2018.

One of the most debated problems when dealing with TLS is the role of so-called middleboxes, many companies need to inspect the traffic for security purposes and TLS 1.3 makes it very hard.

The reductive answer to why TLS 1.3 hasnt been deployed yet is middleboxes: network appliances designed to monitor and sometimes intercept HTTPS traffic inside corporate environments and mobile networks. Some of these middleboxes implemented TLS 1.2 incorrectly and now thats blocking browsers from releasing TLS 1.3. However, simply blaming network appliance vendors would be disingenuous. reads a blog post published by Cloudflare in December that explained the difficulties of mass deploying for the TLS 1.3.

According to the tests conducted by the IETF working group in December 2017, there was around a 3.25 percent failure rate of TLS 1.3 client connections.

OpenSSL TLS 1.3

TLS 1.3 will deprecate old cryptographic algorithms entirely, this is the...

13:00

Enterprises Identify 10 Essential Tools for DevOps "IndyWatch Feed Tech"

In rough order of their appearance in the DevOps pipeline, based on real-world user feedback, here are the most essential DevOps tools:In some of these 10 major categories, just one tool rules the roost, such as Docker for application containers and Jenkins for CI/CD. In others, DevOps practitioners view a handful of tools as interchangeable, depending on personal preferences and the IT environment's specific requirements.

13:00

Slow Down That Hot Rod Camera Dolly "IndyWatch Feed Tech"

[Eric Strebel]  uses a small homemade vehicle with his camera mounted on it to get great tracking shots for the intros to his videos. If the movement is slow enough then the effect is quite professional looking. But he wanted it eight times slower. We not only like the simple way he did it, along with how he machined parts for it, but the result makes it look like a hot rod, hence his name for it, the dolly hot rod. He also has an elegant mechanism for disengaging the motor while he repositions the dolly.

Machining Bondo body filler cylinderMachining Bondo body filler cylinder

The are many ways to slow down a rotation. Were assuming he was already at the minimum speed for the vehicles 8 RPM motor transmission and electronic speed controller. Gears or pulleys would probably be the next options. But [Eric] went even simpler, switching from roller blade wheels to larger diameter scooter wheels.

As simple as that sounds though, it led to that age-old conundrum, how to attach the wheels to the vehicle. The axle is made up of PVC tubes. So he...

12:19

Impact of Data Breaches on Corporations' Stock Values... None That Matters? "IndyWatch Feed Tech"

Picked this on Bruce Schneier's CRYPTO-GRAM latest issue, under the very terse description of

Interesting research: "Long-term market implications of data breaches, not," by Russell Lange and Eric W. Burger. The market isn't going to fix this. If we want better security, we need to regulate the market.

The "Long term implications..." link is paywalled, but there are two other recent(ish) academic papers linked.

The first one, "Market Implications of Data Breaches" by Russell Lange and Eric W. Burger (21 PDF pages, title page, ToC and references included). The "executive summary/key findings":

  • While the difference in stock price between the sampled breached companies and their peers was negative (-1.13%) in the first three days following announcement of a breach, by the 14th day the return difference had rebounded to +0.05%, and on average remained positive through the period assessed.
  • For the differences in the breached companies' betas and the beta of their peer sets, the differences in the means of 8 months pre-breach versus post-breach was not meaningful at 90, 180, and 360-day post-breach periods.
  • For the differences in the breached companies' beta correlations against the peer indices pre- and post-breach, the difference in the means of the rolling 60-day correlation 8 months pre-breach versus post-breach was not meaningful at 90, 180, and 360-day post-breach periods.
  • In regression analysis, use of the number of accessed records, date, data sensitivity, and malicious versus accidental leak as variables failed to yield an R2 greater than 16.15% for response variables of 3, 14, 60, and 90-day return differential, excess beta differential, and rolling beta correlation differential, indicating
    that the financial impact on breached companies was highly idiosyncratic.
  • Based on returns, the most impacted industries at the 3-day post-breach date were U.S Financial Services, Transportation, and Global Telecom.
    At the 90-day post-breach date, the 3 most impacted industries were U.S. Financial Services, U.S. Healthcare, and Global Telecom.

Read more of this story at SoylentNews....

12:00

Xen Project Contributor Spotlight: Kevin Tian "IndyWatch Feed Tech"

The Xen Project is comprised of a diverse set of member companies and contributors that are committed to the growth and success of the Xen Project Hypervisor. The Xen Project Hypervisor is a staple technology for server and cloud vendors, and is gaining traction in the embedded, security and automotive space. This blog series highlights the companies contributing to the changes and growth being made to the Xen Project and how the Xen Project technology bolsters their business.

11:50

The Code.mil Open Source Initiative Got a Makeover "IndyWatch Feed Tech"

The Defense Department launched the Code.mil website on Tuesday, a new, streamlined portal for its similarly named Code.mil initiative, a collaborative approach to meeting the governments open source policy.

The site features a suite of new tools, including checklists that links to offer guidance, and represents an evolution of the Code.mil project, according to Ari Chivukula, policy wrangler for the Defense Digital Service.

11:37

Intel Open-Sources LLVM Graphics Compiler, Compute Runtime With OpenCL 2.1+ "IndyWatch Feed Tech"

Now it's clear why Intel hasn't been working on the Beignet code-base in months as they have been quietly working on a new and better OpenCL stack and run-time! On open-source Intel OpenCL you can now have OpenCL 2.1 while OpenCL 2.2 support is on the way...

11:22

Solus 4 To Offer Experimental GNOME Wayland Session, MATE UI Refresh "IndyWatch Feed Tech"

The Solus Linux distribution has offered up some new details this week on their upcoming Solus 4 release...

11:10

DRI3 v1.1 Updated by Collabora For Modifiers & Multi-Plane Support "IndyWatch Feed Tech"

As a sign that DRI3 v1.1 is hopefully ready to go, Louis-Francis Ratt-Boulianne of Collabora on Friday sent out his latest set of patches adding modifiers and multi-plane support to the Direct Rendering Infrastructure...

10:45

PCI Council and X9 Committee to Combine PIN Security Standards "IndyWatch Feed Tech"

The PCI Security Standards Council (PCI SSC) and financial services standards outfit the Accredited Standards Committee X9 have decided to combine forces on personal-identification-number-handling-rules.

Today, both have their own standards, which is a pain for organisations like banks that follow rules set by both organisations. The overlapping standards also make life hard for assessors who may consider an organisation's PCI compliance is not in order if they adhere to the X9 rules.

The Register imagines a few readers don't enjoy having to figure out how to get the two standards running alongside each other.

Hence the decision to consolidate the PCI PIN Security Standard and the X9 TR39 PIN Standard.

Source: The Register


Original Submission

Read more of this story at SoylentNews.

10:37

SRT in GStreamer "IndyWatch Feed Tech"

Pending moderation
Title: 
SRT in GStreamer

10:29

Patent Trolls Are Thwarted by Judges, But Patent Lawyers View Them as a Business Opportunity "IndyWatch Feed Tech"

Law firms in various states hope that the demise of the Eastern District of Texas will mean more lawsuits where they are

USA map

Summary: Patent lawyers are salivating over the idea that trolls may be coming to their state/s; owing to courts and the Patent Trial and Appeal Board (PTAB) other trolls software patents get invalidated

AS NOTED in the last post, patents granted by the USPTO are often passed to trolls sooner or later. The trolls would like to think of themselves as monetisers, but all they really do is tax the economy. That does not help innovation or creativity; it merely crushes both. TC Heartland, a Supreme Court decision from about 9 months ago, continues to worry firms that profit from patent trolls and aggressors. One of them, writing in lawyers media, expressed a common lawyers concern that patent litigation is declining (true story), then expressing optimism about trolls coming home to Georgia:

Is patent litigation coming home to Georgia? Last year the U.S. Supreme Court holding in TC Heartland v. Kraft Foods Grp. Brands significantly affected the law of venue jurisdiction under 28 U.S.C. 1400(b) for patent infringement cases. One result was to shift new patent complaint filings away from federal district courts that had been perceived to be plaintiff-friendly, such as the Eastern District of Texas, as I recently wrote in the Daily Report. TC Heartland only clarified one of the tests for patent venue in 1400(b), holding that the provision where the defendant resides is limited to only the district where the defendant is incorporated.

[...]

The year 2018 will likely bring resolution to some of these issues and more patent litigation to Georgia. I believe we can expect at least one, but perhaps two precedential Federal Circuit decisions further clarifying where a defendant committed an act...

10:22

Forever Young: The Documentary BBC News "IndyWatch Feed Tech"

Is ageing a disease? One that can be cured? BBCs Gabriela Torres meets the self-experimenters and scientists who are trying to dramatically extend our lives.

Please subscribe HERE http://bit.ly/1rbfUog

World In Pictures https://www.youtube.com/playlist?list=PLS3XGZxi7cBX37n4R0UGJN-TLiQOm7ZTP
Big Hitters https://www.youtube.com/playlist?list=PLS3XGZxi7cBUME-LUrFkDwFmiEc3jwMXP
Just Good News https://www.youtube.com/playlist?list=PLS3XGZxi7cBUsYo_P26cjihXLN-k3w246

10:00

Theres Now A New MIDI Spec, And Drones "IndyWatch Feed Tech"

MIDI, the Musical Instrument Digital Interface, was released in 1983 in a truly bizarre association between musical instrument manufacturers. At no other time, before or since, has there been such cooperation between different manufacturers to define a standard. Since then, the MIDI spec has been expanded with SysEx messages, the ability to dump samples via MIDI, redefining the tuning of instruments via MIDI to support non-Western music, and somewhere deep in the spec, karaoke machines.

Now theres a new update to the MIDI spec (Gearnews link, heres the official midi.org announcement but their website requires registration and is a hot garbage fire). At this years NAMM, the place where MIDI was first demonstrated decades ago,  the MIDI Manufacturers Association announced an update to MIDI that makes instruments and controllers smarter, and almost self-learning.

There are three new bits to the new update to the MIDI spec. The first is Profile Configuration, a way to auto-configure complex controller mappings, described as, MIDI Learn on steroids. The second update is Property Exchange, and allows MIDI devices to set device properties like, product name, configuration settings, controller names, and patch data. This is effectively setting metadata in controllers and devices. The third new bit is Protocol Negotiation, a way to automatically push future, next-gen protocols over a DIN-5 connector.

What does this all mean? Drones. No, Im serious. The MIDI association is tinkering around with some Tiny Whoops and Phantoms, and posted a video of drones being controlled by a MIDI controller. Play a glissando up, and the drone goes up. You can check out a video of that below.

5 Open Source Technology Trends for 2018 "IndyWatch Feed Tech"

Title: 
5 Open Source Technology Trends for 2018

09:55

Microsofts Patent Moves: Dominion Harbor, Intellectual Ventures, Intellectual Discovery, NEC and Uber "IndyWatch Feed Tech"

Trolls' harbour

Summary: A look at some of the latest moves and twists, as patents change hands and there are still signs of Microsofts hidden hand

THE theme of patent trolls entities that do nothing but lawsuits and threats of lawsuits is still a thing. Yes, the USPTO is aware of the problem and even the US Supreme Court uses the term trolls. Here in Europe the press rarely mentions the problem, which is being exacerbated by the EPO. Patent trolls are on the rise in Germany and London too has become a hot destination for trolls. Most vulnerable to these are SMEs, which are less capable of affording justice (legal process) and have less money to shell out for protection.

Patent trolls are on the rise in Germany and London too has become a hot destination for trolls.Thankfully, some of the trolling sector is drifting eastwards to China. Its not a good thing for China, but it seems to be a side effect of a misguided patent policy which attracted low-quality patents in large numbers. When one has low-quality patents in large numbers one can simply use the sheer amount of them irrespective of underlying quality to threaten ruinous litigation and thus extort money for settlements. This seems to be the business model of Dominion Harbor, which is a malicious patent troll that strongly dislikes me, worships other trolls, and associates with rather unpleasant people. IAM wrote the other day that [a]fter purchase of 4,000 former Kodak patents from IV last year, Dominion is building quite a portfolio.

IV is Intellectual Ventures, the worlds largest patent troll, which came from Microsoft. Proud to announce our latest acquisition, the troll said. Dominion Harbor Acquires Leading NEC LCD Portfolio with more than 1,200 assets

Patent aggregators such as these are of no worth unless they become trolls or pass their so-called assets to trolls. Thats how Intellectual Ve...

09:42

A new text bomb threatens Apple devices, a single character can crash any apple iPhone, iPad Or Mac "IndyWatch Feed Tech"

Researchers discovered a new dangerous text bomb that crashes Apple devices, only a single character of the Indian Telugu language could create the chaos.

A new text bomb threatens Apple devices, just a single character of the Indian alphabet (precisely the
Telugu language, a Dravidian language spoken in India by about 70 million people) can crash your device and block access to the Messaging app in iOS, including WhatsApp, Facebook Messenger, Outlook for iOS, Gmail, Safari and Messages for the macOS versions.

The issue seems not affect the beta versions of iOS 11.3 and Telegram and Skype applications.

First spotted by Italian Blog Mobile World, the text bomb affects a wide range of Apple devices, including iPads, Macs and even Watch OS devices running the latest versions of OS.

apple text bomb

The news of the bug was first reported on the Italian Blog Mobile World, the issue can be it can be easily exploited by anyone just by sending a message containing the Telugu character to the recipient.

Once the recipient receives the message or typed the Telugu symbol into the text editor, its Apple device will crash.

To fix the issue on the device that is crashing after received the text bomb is possible to send a message to the app that is crashing.

According to the bug report published on OpenRadar:

When iOS, MacOS, watchOS try to render Indian symbol all of it has crashed Steps to Re...

09:15

Court Orders Spanish ISPs to Block Pirate Sites For Hollywood "IndyWatch Feed Tech"

Determined to reduce levels of piracy globally, Hollywood has become one of the main proponents of site-blocking on the planet. To date there have been multiple lawsuits in far-flung jurisdictions, with Europe one of the primary targets.

Following complaints from Disney, 20th Century Fox, Paramount, Sony, Universal and Warner, Spain has become one of the latest targets. According to the studios a pair of sites HDFull.tv and Repelis.tv infringe their copyrights on a grand scale and need to be slowed down by preventing users from accessing them.

HDFull is a platform that provides movies and TV shows in both Spanish and English. Almost 60% its traffic comes from Spain and after a huge surge in visitors last July, its now the 337th most popular site in the country according to Alexa. Visitors from Mexico, Argentina, United States and Chile make up the rest of its audience.

Repelis.tv is a similar streaming portal specializing in movies, mainly in Spanish. A third of the sites visitors hail from Mexico with the remainder coming from Argentina, Columbia, Spain and Chile. In common with HDFull, Repelis has been building its visitor numbers quickly since 2017.

The studios demanding more blocks

With a ruling in hand from the European Court of Justice which determined that sites can be blocked on copyright infringement grounds, the studios asked the courts to issue an injunction against several local ISPs including Telefnica, Vodafone, Orange and Xfera. In an order handed down this week, Barcelona Commercial Court No. 6 sided with the studios and ordered the ISPs to begin blocking the sites.

They damage the legitimate rights of those who own the films and series, which these pages illegally display and with which they profit illegally through the advertising revenues they generate, a statement from the Spanish Federation of Cinematographic Distributors (FEDECINE) reads.

FEDECINE General director Estela Artacho said that changes in local law have helped to provide the studios with a new way to protect audiovisual content released in Spain.

Thanks to the latest reform of the Civil Procedure Law, we have in this jurisdiction a new way to exercise different possibilities to protect our commercial film offering, Artacho said.

Those of us who are part of this industry work to make culture accessible and...

09:15

MeltdownPrime and SpectrePrime Attacks Likely Mitigated by Existing Patches "IndyWatch Feed Tech"

New exploits related to Meltdown and Spectre have been found, using two CPU cores against each other in cache-based side-channel attacks. The attacks are likely stopped by existing software patches for Meltdown and Spectre, but not necessarily the hardware changes that Intel and others are working on:

When details of the Meltdown and Spectre CPU security vulnerabilities emerged last month, the researchers involved hinted that further exploits may be developed beyond the early proof-of-concept examples. It didn't take long. In a research paper "MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols" out this month, bit boffins from Princeton University and chip designer Nvidia describe variants of Meltdown and Spectre exploit code that can be used to conduct side-channel timing attacks.

In short, the team have discovered new ways for malware to extract sensitive information, such as passwords and other secrets, from a vulnerable computer's memory by exploiting the Meltdown and Spectre design blunders in modern processors. The software mitigations being developed and rolled out to thwart Meltdown and Spectre attacks, which may bring with them performance hits, will likely stop these new exploits.

Crucially, however, changes to the underlying hardware probably will not: that is to say, whatever Intel and its rivals are working on right now to rid their CPU blueprints of these vulnerabilities may not be enough. These fresh exploits attack flaws deeply embedded within modern chip architecture that will be difficult to engineer out. Before you panic: don't. No exploit code has been released.

Intel is now offering $250,000 for side-channel attacks.


Original Submission

Read more of this story at SoylentNews.

09:04

[slackware-security] irssi (SSA:2018-046-01) "IndyWatch Feed Tech"

Posted by Slackware Security Team on Feb 16

[slackware-security] irssi (SSA:2018-046-01)

New irssi packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/irssi-1.0.7-i586-1_slack14.2.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:
https://irssi.org/security/html/irssi_sa_2018_02...

09:00

Hunting for the ancient lost farms of North America "IndyWatch Feed Tech"


 What leaps out at you is that domestication was a well understood art practiced everywhere just as plant breeding is today.

As i have posted, our future is organic and in conjunction with robot supported high density populations.  Domestication and plant breeding will be practiced everywhere across the globe.  Our archeological record will easily promote a number of obvious candidates.

Certainly the global demand is there,..

Hunting for the ancient lost farms of North America

2,000 years ago, people domesticated these plants. Now theyre wild weeds. What happened?

09:00

LPPFusion Report "IndyWatch Feed Tech"


This report is heavily formatted but seems to make it through blogger.

As expected the process of development is long and tortuous.  Yet i do think this is the most promising of the available tech.

At least they are getting funding and are moving forward..
.

 

....

09:00

Scandal, Corruption, Lawbreaking And So What? "IndyWatch Feed Tech"



I am sorry folks, but this article is not from the alt right but from the well established National Review and certainly cannot be ignored.  After months of steady disclosure against a wall of Dem protest and denial we have here all the ugly.

It is all as bad as might be imagined.  Yet it is still all about the behavior of political actors and politicized actors surrounding the Obama Administration and their failed 2016 campaign to essentially override the inconvenience of the Constitution. 


The reason it is not 'so what' is that Trump won.  Better he came weaponized himself with excellent Intel and critical support from the Legions and in particular the Praetorian Guard.


He has allowed all who are stupid to hang themselves over the past year while every conversation was listened to.  Now they will all be renditioned to GITMO as enemy combatants out of the reach of their lawyers to share their knowledge.


Astonishingly, the civilian aspects of the enforcement powers of the Republic, politicized and integrated with the Global pedophile natural conspiracy for personal profit.  This included leadership of the CIA, the DOJ and the FBI.  The scope of the treason is impossible to grasp.


The take down was massively planned and organized and is ongoing today.  I do think that it can no longer be turned back.  We are certain that the Navy, the Marines and most aspects of military Intel is fully involved at the highest levels. This will include the Space Fleet as well as protector.  Other units are likely out of the information loop but can be keyed up as needed.


...


Scandal, Corruption, Lawbreaking And So What? 


...

09:00

Lawrence Livermore unlocks 3D printing to smaller than 150 nanometer features "IndyWatch Feed Tech"


I do not know if we are at the real limits, but this is certainly close enough for just about anything we want to try out that takes additional advantage of quantum effects as well.

This will also hugely expand the wow factor.   The other limitation not mentioned is our imaginations.  Recall that gem in Star Wars that carried all the data?

Perhaps the future of memory sticks.


Lawrence Livermore unlocks 3D printing to smaller than 150 nanometer features

brian wang | January 10, 2018

https://www.nextbigfuture.com/2018/01/lawrence-livermore-unlocks-3d-printing-to-smaller-than-150-nanometer-features.html


Lawrence Livermore National Laboratory (LLNL) researchers have discovered novel ways to extend the capabilities of two-photon lithography (TPL), a high-resolution 3D printing technique capable of producing nanoscale features smaller than one-hundredth the width of a human hair.
The findings unleashes the potential for X-ray computed tomography (CT) to analyze stress or defects noninvasively in embedded 3D-printed medical devices or implants.

Two-photon lithography typically requires a thin glass slide, a lens and an immersion oil to help the laser light focus to a fine point where curing and printing occurs. It differs from other 3D-printing methods in resolution, because it can produce features smaller than the laser light spot, a scale no other printing process can match. The technique bypasses the usual diffraction limit of other methods because the photoresist material that cures and hardens to create structures previously a trade secret simultaneously absorbs two photons instead of one.
...

09:00

The Case for Making Cities Out of Wood - Facts So Romantic "IndyWatch Feed Tech"


An Alphabet subsidiary is planning to build a futuristic neighborhood, not out of concrete and steel, but woodand wood is looking good.Photograph by Daici Ano / Flickr

Last month, Dan Doctoroff, the C.E.O. of Sidewalk Labs, Googles sibling company under Alphabet, answered a question about what his company actually does during a Reddit Ask Me Anything session, replying, The short answer is: We want to build the first truly 21st-century city. Quayside, a Toronto neighborhood the company is developing in partnership with a Canadian tri-government agency, is the first step toward Doctoroffs goal. It has been in the news recently because it could inspire a Black Mirror plot: It will be built from the Internet up, according to a project document, a merger of physical and digital realms. Fittingly, according to the New York Times, No obvious way to opt out of Quaysides surveillance systems exists, except by staying out of the area.

But Quaysides newsworthy for another, more encouraging reason: The plan is to build the place, not out of concrete and steel, but woodand wood is looking good. A recent advance in wood technology, announced this month, should interest the neighborhoods developers:
Read More

08:09

8tracks - 7,990,619 breached accounts "IndyWatch Feed Tech"

In June 2017, the online playlists service known as 8Tracks suffered a data breach which impacted 18 million accounts. In their disclosure, 8Tracks advised that "the vector for the attack was an employees GitHub account, which was not secured using two-factor authentication". Salted SHA-1 password hashes for users who didn't sign up with either Google or Facebook authentication were also included. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses.

08:08

DELL EMC addressed two critical flaws in VMAX enterprise storage systems "IndyWatch Feed Tech"

Dell EMC addressed two critical vulnerabilities that affect the management interfaces for its VMAX enterprise storage systems.

The Dell EMCs VMAX Virtual Appliance (vApp) Manager is an essential component of a wide range of the enterprise storage systems.

The first flaw tracked as CVE-2018-1215 is an arbitrary file upload vulnerability that could be exploited by a remote authenticated attacker to potentially upload arbitrary maliciously crafted files in any location on the web server. The flaw received a Common Vulnerability Scoring System (CVSS) base score of 8.8.

Arbitrary file upload vulnerability A remote authenticated malicious user may potentially upload arbitrary maliciously crafted files in any location on the web server. By chaining this vulnerability with CVE-2018-1216, the attacker may use the default account to exploit this vulnerability. reads the security advisory.

VMAX enterprise storage systems

The second flaw tracked as CVE-2018-1216 is an undocumented default account in the vApp Manager with a hard-coded password. The flaw received a Common Vulnerability Scoring System (CVSS) base score of 9.8.

Hard-coded password vulnerability The vApp Manager contains an undocumented default account (smc) with a hard-coded password that may be used with certain web servlets. A remote attacker with the knowledge of the hard-coded password and the message format may use vulnerable servlets to gain unauthorized access to the system. Note: This account cannot be used to log in via the web user interface. continues the advisory. 

The CVE-2018-1215 could be chained with a second flaw tracked as CVE-2018-1216 to use a hard-coded password to a default account to exploit this vulnerability.

The vApp Manager which is embedded in Dell EMC Unisphere for VMAX, Dell EMC Solutions Enabler, Dell EMC VASA Virtual Appliances, and Dell EMC VMAX Embedded Management (eManagement) contains multiple security vulnerabilities that may potentially be exploited by malicious users to compromise the affected system. sta...

08:02

A Single-Character Message Can Crash Any Apple iPhone, iPad Or Mac "IndyWatch Feed Tech"

Only a single character can crash your iPhone and block access to the Messaging app in iOS as well as popular apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail. First spotted by Italian Blog Mobile World, a potentially new severe bug affects not only iPhones but also a wide range of Apple devices, including iPads, Macs and even Watch OS devices running the latest versions of

07:44

Milky Way Ties with Neighbor in Galactic Arms Race "IndyWatch Feed Tech"

Astronomers have discovered that our nearest large neighbour, the Andromeda galaxy, is roughly the same size as the Milky Way. It had been thought that Andromeda was two to three times the size of the Milky Way, and that our own galaxy would ultimately be engulfed by our supposedly bigger neighbour. But the latest research, published today, evens the score between the two galaxies.

The study found the weight of the Andromeda is 800 billion times heavier than the sun, on par with the Milky Way. Astrophysicist Dr Prajwal Kafle, from the University of Western Australia node of the International Centre for Radio Astronomy Research, said the study used a new technique to measure the speed required to escape a galaxy. "When a rocket is launched into space, it is thrown out with a speed of 11 km/s to overcome the Earth's gravitational pull," he said. "Our home galaxy, the Milky Way, is over a trillion times heavier than our tiny planet Earth so to escape its gravitational pull we have to launch with a speed of 550 km/s. We used this technique to tie down the mass of Andromeda."

Milky Way ties with neighbor in galactic arms race

-- submitted from IRC


Original Submission

Read more of this story at SoylentNews.

07:00

Pulling Music Out Of Thin Air with a Raspberry Pi "IndyWatch Feed Tech"

Inspired by the concept of a laser harp, [2fishy] followed the same principle but chose a simpler and safer alternative by using LEDs instead. For each playable tone, a LED is mounted opposite a light dependent resistor, creating an array of switches that is then connected to the Raspberry Pis GPIO pins. A Python script is handling the rest, polling the GPIO states and with a little help from pygame, triggering MIDI playback whenever the light stream is interrupted.

There are enough LED/LDR pairs to play one full octave and have some additional control inputs for menu and octave shifting. This concept will naturally require some adjustments to your playing you can get an idea of it in the demonstration video after the break. And if this design is still not the right size for you, or if you prefer to play in total darkness, this similar MIDI instrument using ultrasonic distance sensors could be of interest.

06:07

Austria: The "Ashtray of Europe"? "IndyWatch Feed Tech"

Austria has one of the highest rates of smoking and youth smoking among high income countries, and that might not be changing anytime soon:

Many Western countries have banned smoking in bars and restaurants, but Austria is bucking that trend. Under a law passed in 2015, Austria was due to bring in a total ban this May, but now its new government of the conservatives and the far-right Freedom Party have scrapped the plans.

The move was spearheaded by the leader of the Freedom Party, Austria's Vice Chancellor Heinz-Christian Strache, himself a smoker, who told parliament last month that it was about freedom of choice. He said restaurants should be free to decide if they want to have smoking sections, where "a citizen has the possibility to decide perhaps to enjoy a cigarette or a pipe or a cigar with their coffee".

The move has horrified Austria's medical establishment. Dr Manfred Neuberger, professor emeritus at the Medical University of Vienna, says it is "a public health disaster".

"The decision is irresponsible. It was a victory for the tobacco industry. The new government made Austria into the ashtray of Europe."

Meanwhile, the country is considering buying more jet fighters, recruiting more police, defunding its public broadcaster, and examining its past.


Original Submission

Read more of this story at SoylentNews.

06:02

Intel just put a quantum computer on a silicon chip "IndyWatch Feed Tech"

A Dutch company called QuTech, working with Intel, just pulled off a silicon chip-based quantum computer. The futures looking good for spooky action.

06:02

Graphene film makes dirty water drinkable in a single step "IndyWatch Feed Tech"

Every year, millions of people around the world die from drinking unclean water. Now, researchers have developed a process that can purify water, no matter how dirty it is, in a single step. Scientists from Australian research organization CSIRO have created a filtration technique using a graphene film with microscopic nano-channels that lets water pass through, but stops pollutants. The process, called Graphair, is so effective that water samples from Sydney Harbor were safe to drink after being treated.

And while the film hails from graphene, Graphair is comparatively cheaper, faster and more environmentally-friendly to make, as its primary component is renewable soybean oil, which also helps maximise the efficiency of the purifying techniques filter counterpart. Over time, oil-based pollutants can impede water filters, so contaminants have to be removed before filtering can even begin, but using Graphair removes these pollutants faster than any other method.

Water purification usually involves a complex process of several steps, so this breakthrough could have a significant impact on the some 2.1 billion people who dont have clean, safe drinking water. All thats needed is heat, our graphene, a membrane filter and a small water pump. Were hoping to commence field trials in a developing world community next year, said lead author Dr Dong Han Seo, who added that the team is looking for industry partners to help scale up the technology, and is also working on other applications for Graphair, such as seawater and industrial effluents.

04:48

[SECURITY] [DSA 4115-1] quagga security update "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Feb 15

-------------------------------------------------------------------------
Debian Security Advisory DSA-4115-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
February 15, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : quagga
CVE ID : CVE-2018-5378 CVE-2018-5379...

04:45

Vulnerability Disclosure (Web Apps)-Bravo Tejari Web Portal-Unrestricted File Upload "IndyWatch Feed Tech"

Posted by Arvind Vishwakarma on Feb 15

------------------------------------------------------------------
Vulnerability Type: Unrestricted File Upload
Vendor of Product: Tejari
Affected Product Code Base: Bravo Solution
Affected Component: Web Interface Management.
Attack Type: Local - Authenticated
Impact: Malicous File Upload
-----------------------------------------------------------------

Product description:
Brao Tejari is a strategic procurement platform that enables...

04:43

Re: [FD] Defense in depth -- the Microsoft way (part 51): Skype's home-grown updater allows escalation of privilege to SYSTEM "IndyWatch Feed Tech"

Posted by Stefan Kanthak on Feb 15

"Jeffrey Walton" wrote:

[ http://seclists.org/fulldisclosure/2018/Feb/33 ]

This is of course related: after Zack Whittacker published
<<a href="https://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/" rel="nofollow">https://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/>
some hundred news outlets, bloggers etc. followed up.
Except Zack Whittacker nobody contacted me.
Many copied his article, some others added their own and wrong...

04:36

Vulnerability Disclosure (Web Apps)-Bravo Tejari Web Portal-CSRF "IndyWatch Feed Tech"

Posted by Arvind Vishwakarma on Feb 15

-----------------------------------------------------
Vulnerability Type: Cross Site Request Forgery (CSRF)
Vendor of Product: Tejari
Affected Product Code Base: Bravo Solution
Affected Component: Web Interface Management.
Attack Type: Local - Authenticated
Impact: Unauthorised Access
------------------------------------------

Product description:
Bravo Tejari is a strategic procurement platform that enables
organizations to generate more value,...

04:24

Italian Anti-Corruption Authority (ANAC) Adopts Onion Services "IndyWatch Feed Tech"

The Tor Project reports that the Italian Anti-Corruption Authority will now be using Tor as part of its method of collecting tips anonymously.

To comply with these standards, the Italian Anti-Corruption Authority (ANAC), an administrative watchdog, just launched their national online whistleblowing platform using onion services, giving whistleblowers who come forward a secure way to report illegal activity while protecting their identities. Most anti-corruption whistleblowers first speak out anonymously, and only when they know that their concerns are being addressed do they disclose their identities, as reported by Transparency International Italy, an organization advocating uses of Tor in the fight against corruption since 2014.

More details are available in Italian.

Source : Italian Anti-Corruption Authority (ANAC) Adopts Onion Services


Original Submission

Read more of this story at SoylentNews.

04:00

Learn About Waveforms Interactively "IndyWatch Feed Tech"

Well be honest: If you are a regular Hackaday reader, you probably wont learn much new information about waveforms from this website. However, the presentation is a great example of using React on a webpage and who knows you might just pick up something interesting. At the very least, itll be a great resource the next time you try to help someone starting out.

The animated waveform is cool enough. It is also interesting that it changes based on where you are in the text. The really interesting part though is that you can press the M key to unmute your audio and hear what the wave sounds like. You can also use adjustments to control the frequency and amplitude of the wave.

The topics center around audio, although they have some applicability to higher frequencies, too. Theres talk about amplitude, frequency, and phase. There are examples of sine waves, square waves, and more. There is also a really good example of how adding a series of sine waves can create a square wave via harmonics.

If you want more details about synthesis, by the way, we covered it earlier. In fact, weve talked about it a few times.

03:12

Federal Judge Says Embedding a Tweet Can Be Copyright Infringement "IndyWatch Feed Tech"

Rejecting years of settled precedent, a federal court in New York has ruled [PDF] that you could infringe copyright simply by embedding a tweet in a web page. Even worse, the logic of the ruling applies to all in-line linking, not just embedding tweets. If adopted by other courts, this legally and technically misguided decision would threaten millions of ordinary Internet users with infringement liability.

This case began when Justin Goldman accused online publications, including Breitbart, Time, Yahoo, Vox Media, and the Boston Globe, of copyright infringement for publishing articles that linked to a photo of NFL star Tom Brady. Goldman took the photo, someone else tweeted it, and the news organizations embedded a link to the tweet in their coverage (the photo was newsworthy because it showed Brady in the Hamptons while the Celtics were trying to recruit Kevin Durant). Goldman said those stories infringe his copyright.

Courts have long held that copyright liability rests with the entity that hosts the infringing contentnot someone who simply links to it. The linker generally has no idea that its infringing, and isnt ultimately in control of what content the server will provide when a browser contacts it. This server test, originally from a 2007 Ninth Circuit case called Perfect 10 v. Amazon, provides a clear and easy-to-administer rule. It has been a foundation of the modern Internet.

Judge Katherine Forrest rejected the Ninth Circuits server test, based in part on a surprising approach to the process of embedding. The opinion describes the simple process of embedding a tweet or imagesomething done every day by millions of ordinary Internet usersas if it were a highly technical process done by coders. That process, she concluded, put publishers, not servers, in the drivers seat:

[W]hen defendants caused the embedded Tweets to appear on their websites, their actions violated plaintiffs exclusive display right; the fact that the image was hosted on a server owned and operated by an unrelated third party (Twitter) does...

03:00

The False Teeth of Chrome's Ad Filter "IndyWatch Feed Tech"

Last year, a new industry organization, the Coalition for Better Ads, published user research investigating ad formats responsible for "bad ad experiences." The Coalition examined 55 ad formats, of which 12 were deemed unacceptable. These included various full page takeovers (prestitial, postitial, rollover), autoplay videos with sound, pop-ups of all types, and ad density of more than 35% on mobile. Google is supposed to check sites for the forbidden formats and give offenders 30 days to reform or have ...

02:53

It Takes a Human to Screw Things Up Properly "IndyWatch Feed Tech"

Submitted via IRC for TheMightyBuzzard

Humans easily outperform machines when it comes to tightening and loosening screw fasteners. The future of manufacturing and recycling may depend on changing that.

In the pantheon of technologies that make our modern society possible, one of the most underappreciated and neglected is the threaded fastener, more commonly known as the screw. This technology emerged at the dawn of the industrial era, when it became possible to make metal gadgets like these on a large scale.

Today, these devices literally hold the world together. Our 21st-century lifestyles would not be possible without them, and they are likely to play an indispensable role for the foreseeable future.

Yet in a world where manufacturing techniques are increasingly automated, there is a problem. The process of screwing and unscrewing is still one in which humans outperform machines. Robotic devices have difficulty locating screws and their sockets and then manipulating screws and screwdrivers effectively.

[...] These researchers are part of a team building robots that can take apart electronic devices, like smartphones, for recycling. The project is called RecyBot, and its goal is to create a high-speed intelligent robotic system for dismantling electronics.

That's a considerable challenge, and one of the biggest headaches is unscrewing. So the team at least have this under their belt. But the same technology could be applied in a wide range of smart factories that have to assemble and disassemble components.

Source: https://www.hardocp.com/news/2018/02/13/humans_screw_much_better_than_killer_robots/

Source: Haptics of Screwing and Unscrewing for its Application in Smart Factories for Disassembly


Original Submission

Read more of this story at SoylentNews.

02:21

Customs and Border Protection's Biometric Data Snooping Goes Too Far "IndyWatch Feed Tech"

The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Privacy Office, and Office of Field Operations recently invited privacy stakeholdersincluding EFF and the ACLU of Northern Californiato participate in a briefing and update on how the CBP is implementing its Biometric Entry/Exit Program.

As weve written before, biometrics systems are designed to identify or verify the identity of people by using their intrinsic physical or behavioral characteristics. Because biometric identifiers are by definition unique to an individual person, government collection and storage of this data poses unique threats to privacy and security of individual travelers.

EFF has many concerns about the government collecting and using biometric identifiers, and specifically, we object to the expansion of several DHS programs subjecting Americans and foreign citizens to facial recognition screening at international airports. EFF appreciated the opportunity to share these concerns directly with CBP officers and we hope to work with CBP to allow travelers to opt-out of the program entirely.

You can read the full letter we sent to CBP here.

01:19

The Countries Most Likely to Survive Climate Change in One Infographic "IndyWatch Feed Tech"

TheEcoExperts report

So, which country is the most likely to survive climate change?

The answer is Norway, thanks to its low vulnerability score and high readiness score. The nation's Nordic neighbours also fared well, with Finland (3rd), Sweden (4th), Denmark (6th), and Iceland (8th) landing 5 out of the 10 top spots for survivability. So we should all flee to the countries of northern Europe and the north Atlantic to live out our final days should our planet become uninhabitable.

Even more surprising is China's position in the ranking--59th. Despite arguably being the world's biggest contributor towards climate change--emitting a massive 9,040 metric tons of CO2 into the atmosphere every year--the country is somewhat sensitive to the effects of a warming planet. This is largely due to the nation's growing population which is putting a strain on China's natural resources and public services. Rather ironically, China's vulnerability to climate change therefore means that they may eventually reap what they sow.

...and who are the biggest losers?

At the other end of the scale, it comes as no surprise that the world's poorest and least developed nations have the lowest chance of surviving climate change. Countries in sub-Saharan Africa fill the bottom 10 spaces for survivability, with Somalia being named the country least likely to survive climate change.

Chad, Eritrea, the Central African Republic, and the Democratic Republic of Congo also fared badly, owing to their unstable governance, poor infrastructure, lack of healthcare, and a scarcity of food and water.

These findings serve as a stark reminder of the need for wealthier, more established countries to support the world's most vulnerable nations. This is particularly true given that many of the world's richest economies contribute the most to climate change but are in fact the least likely to be affected by it.


...

01:00

Building an Arduino Smart IC Tester for $25 "IndyWatch Feed Tech"

Theres no question that you can get a lot done with the classic multimeter; its arguably the single most capable tool on your bench. But the farther down the rabbit hole of hacking and reverse engineering you go, the more extravagant your testing and diagnostic gear tends to get. For some of us thats just an annoying reality of the game. For others its an excuse to buy, and maybe even build, some highly specialized equipment. Well give you one guess as to which group we fall into here at Hackaday.

[Akshay Baweja] is clearly a member of the second group. Hes recently published a guide on building a very slick intelligent Integrated Circuit tester with a total cost of under $25 USD. Whether youre trying to identify an unknown chip or verifying your latest parts off the slow-boat from China actually work before installing them in your finished product, this $25 tool could end up saving you a lot of time and aggravation.

[Akshay] walks readers through the components and assembly of his IC tester, which takes the form of a Shield for the Arduino Mega 2560. The custom PCB he designed and had manufactured holds the 20 Pin ZIF Socket as well as the 2.4 inch TFT touch screen. The screen features an integrated micro SD slot which is important as you need the SD card to hold the chip database.

With an IC to test inserted into the ZIF socket,...

01:00

HPR2490: What's In My Podcatcher 2 "IndyWatch Feed Tech"

I listen to many podcasts as my primary form of audio entertainment, and because Hacker Public Radio listeners also tend to be podcast listeners (pretty much by definition) I am sharing my finds with the community. Besides, Ken made me do it. Links: http://hackerpublicradio.org https://soundcloud.com/healthcaretriage http://thehistoryofrome.typepad.com/ http://www.ihearofsherlock.com/ http://www.bbc.co.uk/programmes/b00snr0w/episodes/downloads https://inquiring.show/ http://imagination.ucsd.edu/_wp/feed/podcast/ http://www.katebushnews.com/index.php/category/www-katebushnews-com/kate-bush-fan-podcast/ http://podnutz.com/category/linux-for-the-rest-of-us/ https://www.linuxvoice.com/category/podcasts/ http://mugglecast.com/ https://www.nature.com/nature/podcast/index.html http://www.palain.com

00:18

Links 15/2/2018: GNOME 3.28 Beta, Rust 1.24 "IndyWatch Feed Tech"

GNOME bluefish

Contents

GNU/Linux

  • Server

    • Understanding SELinux labels for container runtimes

      SELinux provides great filesystem separation for your container runtimes, but you need to be careful when running multiple container runtimes on the same machine at the same time, and also careful to clean up any content left on a host when you remove a container.

    • Servers? We dont need no stinkin servers!

      OK, so well always need some servers.

      But with the rise of virtual machines (VM)s and container technologies such as Docker, combined with DevOps and cloud orchestration to automatically manage ever-larger numbers of server applications, serverless computing is becoming real.

    • Kubernetes Monitoring with Prometheus

      Kubernetes makes management of complex environments easy, but to ensure availability its crucial to have operational insight into the Kubernetes components and all applications running on the cluster. I believe monitoring is the...

00:12

[$] Dynamic function tracing events "IndyWatch Feed Tech"

For as long as the kernel has included tracepoints, developers have argued over whether those tracepoints are part of the kernel's ABI. Tracepoint changes have had to be reverted in the past because they broke existing user-space programs that had come to depend on them; meanwhile, fears of setting internal code in stone have made it difficult to add tracepoints to a number of kernel subsystems. Now, a new tracing functionality is being proposed as a way to circumvent all of those problems.

00:10

Quagga 1.2.3 release with BGP security issue fixes "IndyWatch Feed Tech"

Posted by Paul Jakma on Feb 15

Hi,

Quagga 1.2.3 has been released, and it contains fixes for a number of
BGP security issues, 3 of which were not public till today. Please see:

http://savannah.nongnu.org/forum/forum.php?forum_id=9095

The CERT vulnerability note is at:

https://www.kb.cert.org/vuls/id/940439

Quagga advisories are at the URIs in the release announcement, also
available via either of:

https://gogs.quagga.net/Quagga/quagga/src/master/doc/security...

00:01

Fedora Might Begin Having A Release Manager "IndyWatch Feed Tech"

Fedora developers are now discussing the possibility of naming a release manager each development cycle as a person in charge of wrangling together each release and seeing that the "Rawhide" development state is kept in better condition. Who knows, this also might actually help Fedora's longtime trouble of delivering releases on time...

Thursday, 15 February

23:48

FDA Approves Blood Test for Concussions "IndyWatch Feed Tech"

The U.S. Food and Drug Administration has approved a blood test for detecting/diagnosing concussions:

The U.S. Food and Drug Administration today permitted marketing of the first blood test to evaluate mild traumatic brain injury (mTBI), commonly referred to as concussion, in adults. The FDA reviewed and authorized for marketing the Banyan Brain Trauma Indicator in fewer than 6 months as part of its Breakthrough Devices Program.

Most patients with a suspected head injury are examined using a neurological scale, called the 15-point Glasgow Coma Scale, followed by a computed tomography or CT scan of the head to detect brain tissue damage, or intracranial lesions, that may require treatment; however, a majority of patients evaluated for mTBI/concussion do not have detectable intracranial lesions after having a CT scan. Availability of a blood test for concussion will help health care professionals determine the need for a CT scan in patients suspected of having mTBI and help prevent unnecessary neuroimaging and associated radiation exposure to patients.

Also at STAT News and CNN.


Original Submission

Read more of this story at SoylentNews.

23:45

Facebook wants you to install a VPN app accused of spying on users "IndyWatch Feed Tech"

By Ryan De Souza

Facebooks Onavo VPN app the essence of situational irony

This is a post from HackRead.com Read the original post: Facebook wants you to install a VPN app accused of spying on users

23:30

Uber assisting in Florida shooting investigation "IndyWatch Feed Tech"

Uber is assisting law enforcement in its investigation into Wednesday's deadly shooting at a South Florida high school. Nikolas Cruz, 19, took an Uber a little after 2 p.m. to Marjory Stoneman Douglas High School, where he killed 17 people...

23:30

Getting Ahead with Particle Source Simulation "IndyWatch Feed Tech"

Dont miss CSTs new eSeminar demonstrating the electromagnetic simulation of four different particles sources in CST STUDIO SUITE 2018.

This eSeminar will illustrate the electromagnetic simulation of four different particles sources in CST STUDIO SUITE 2018: a Pierce-type electron gun, a field emission source, an ion source and a magnetron cathode. It will guide you through the use of different emission models as well as the simulation of the emission in a conformal hexahedral or tetrahedral mesh. In addition, the superposition of external fields will be shown and the setup of an electron source will be demonstrated.

PRESENTER:

...

23:14

[CVE-2017-15712] Apache Oozie Server vulnerability "IndyWatch Feed Tech"

Posted by Rohini Palaniswamy on Feb 15

Apache Oozie is a workflow scheduler system to manage Apache Hadoop jobs.

Severity: Severe

Vendor:
The Apache Software Foundation

Versions Affected:
Oozie 3.1.3-incubating to Oozie 4.3.0
Oozie 5.0.0-beta1

Description:
Vulnerability allows a user of Oozie to expose private files on the Oozie
server process. The malicious user can construct a workflow XML file
containing XML directives and configuration that reference sensitive files
on the...

23:08

Top tech group exec joining White House as Trump adviser "IndyWatch Feed Tech"

An executive at a top technology trade association will be joining the White House as a tech adviser to President Trump.Abigail Slater, the general counsel for the Internet Association (IA), which represents tech giants like Google and Facebook,...

22:35

Amazon reaches $1.2 million settlement with EPA over illegal pesticide sales "IndyWatch Feed Tech"

The Environmental Protection Agency (EPA) reached a $1.2 million settlement with Amazon on Thursday over charges that third parties had used the website to sell thousands of illegal pesticides.This agreement will dramatically reduce the online...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog