|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
While last week was the main power management feature updates for the Linux 4.17 kernel merge window that included the new ACPI TAD driver, Rafael Wysocki today sent in a secondary set of feature updates and it includes a rather significant development for Linux power and performance...
A "simple" utility to make a system beep is hardly the first place one would check for security flaws, but the strange case of the "Holey Beep" should perhaps lead to some rethinking. A Debian advisory for the beep utility, which was followed by another for Debian LTS, led to a seemingly satirical site publicizing the bug (and giving it the "Holey Beep" name). But that site also exploits a new flaw in the GNU patch programand the increased scrutiny on beep has led to more problems being found.
Submitted via IRC for fyngyrz
Senator Kennedy of Louisiana confronted Facebook CEO Mark Zuckerberg about the transparency of the social media company's policies on Tuesday.
"I'm going to suggest you go home and rewrite it, and tell your $1,200 dollar and[sic] hour lawyer...you want it written in English not Swahili, so the average American user can understand," Kennedy said.
Read more of this story at SoylentNews.
The deadline for concluding a modernized North American Free Trade Agreement (NAFTA), originally scheduled for last year, has continued to slip. An eighth and final formal round of negotiations was cancelled last week, and despite earlier optimistic plans that the parties could announce an "agreement in principle" at the Summit of the Americas in Peru this Friday 13 April, these plans have since been abandoned.
An over-optimistic negotiation schedule isn't the only problem here. The other is that United States Trade Representative (USTR) is pushing a hard line on topics such as intellectual property that neither of the other negotiating parties find remotely palatable. As a result, although advances have been made in some other chapters, reports suggest that virtually the whole of the agreement's IP chapter remains up in the air.
In October 2016, as the Trans-Pacific Partnership (TPP) was beginning to falter, Steve Metalitz of the International Intellectual Property Alliance (IIPA) remarked with surprising frankness that "We may well have reached the high water mark of linking IP and trade." Since then, more evidence has emerged that he was correct about this. One example is the suspension of most of the intellectual property chapter from the TPP, when it became the 11-country Comprehensive and Progressive Trans-Pacific Partnership Agreement (CPTPP). Another example is Europe's backdown from its demands for a twenty year copyright term extension in the Mercosur-EU trade agreement. Other U.S. trading partners have also been expressing more critical views about the downsides of excessively long minimum copyright terms, and most surprising at all, so have representatives of copyright holders.
The USTR could continue to press its hard line on intellectual property for round after round, in the ho...
A futuristic plan for Shenzhen, China proposes self-driving car tunnels and drone-specific highway lanes.
Japanese researchers have developed a way of not only levitating, but also moving objects three dimensionally using sound waves. The device uses four arrays of speakers to make soundwaves that intersect at a focal point that can be moved up, down, left, and right using external controls. And to human ears the device is completely quiet, as it uses ultrasound.
Occupational exposure to ultrasound in excess of 120 dB may lead to hearing loss. Exposure in excess of 155 dB may produce heating effects that are harmful to the human body, and it has been calculated that exposures above 180 dB may lead to death. The UKs independent Advisory Group on Non-ionising Radiation (AGNIR) produced a report in 2010, which was published by the UK Health Protection Agency (HPA). This report recommended an exposure limit for the general public to airborne ultrasound sound pressure levels (SPL) of 70 dB (at 20 kHz), and 100 dB (at 25 kHz and above).
View our exclusive interviews with graphic design experts as they discuss where the future of their industry is headed.
We shape our tools, the old maxim goes, and thereafter our tools shape us. But what if both man and tools could shape and guide each other as equals?
Thats the dream of the Senior Director of Advanced Technology at InvenSense, a TDK Group Company, Dr. Peter G. Hartwell, who believes we are heading into a profound new age of man-machine collaboration, led by breakthroughs in sensor technology. Some problems simply cant be solved using human senses or machine capabilities alone; we need a fusion of the two, says Hartwell.
The problems which Hartwell targets are at the very core of a life well lived: customized health care, more energy-efficient infrastructure, productive workplaces, safer cities, and improved environmental monitoring.
Skyscrapers shoot up in most cities, but what are developers to do in growing places where new building construction is limited to less than ten stories tall?
Explore our graphical guide to the advances of the future, from 2013 to 2150.
As we begin a new year, BBC Future has compiled 40 intriguing predictions made by scientists, politicians, journalists, bloggers and other assorted pundits in recent years about the shape of the world from 2013 to 2150.
Get ready to lift your jaw off the floor.
It seems that the intricacies of technology are only speeding up, and every day we get closer to the sci-fi future predicted in so many novels and movies.
In a recent video from Google, we got a look into what that future might look like. Google introduced a new product called Project Soli, which uses radar technology to detect movements to such a detailed degree that you can use subtle finger movements to control it.
Collecting old CPUs and firing them up again is all the rage these days, but how do you know if they will work? For many of these ICs, which ceased production decades ago, sorting the good stuff from the defective and counterfeit is a minefield.
Testing old chips is a challenge in itself. Even if you can find the right motherboard, the slim chances of escaping the effect of time on the components (in particular, capacitor and EEPROM degradation) make a reliable test setup hard to come by.
Enter [Samuel], and the Universal Chip Analyzer (UCA). Using an FPGA to emulate the motherboard, it means the experience of testing an IC takes just a matter of seconds. Why an FPGA? Microcontrollers are simply too slow to get a full speed interface to the CPU, even one from the 80s.
So, how does it actually test? Synthesized inside the FPGA is everything the CPU needs from the motherboard to make it tick, including ROM, RAM, bus controllers, clock generation and interrupt handling. Many testing frequencies are supported (which is helpful for spotting fakes), and if connected to a computer via USB, the UCA can check power consumption, and even benchmark the chip. We cant begin to detail the amount of thought thats gone into the design here, from auto-detecting data bus width to the sheer amount of models supported, but you can read more technical details here.
The Mojo v3 FPGA development board was chosen as the heart of the project, featuring an ATmega32U4 and Xi...
During the fall of 2014, Hollywood launched WhereToWatch, its very own search engine for movies and TV-shows.
The site enabled people to check if and where the latest entertainment was available, hoping to steer U.S. visitors away from pirate sites.
The initiative marks a further attempt by the MPAA to combat rampant online piracy by reminding consumers of legal means to watch movies and TV shows, the LA Times wrote, for example.
Over the past several years, the site hasnt appeared in the news much, but it did help thousands of people find legal sources for the latest entertainment. However, those who try to access it today will notice that WhereToWatch has been abandoned, quietly.
The MPAA pulled the plug on the service a few months ago. And where the mainstream media covered its launch in detail, the shutdown received zero mentions. So why did the site fold?
According to MPAA Vice President of Corporate Communications, Chris Ortman, it was no longer needed as there are many similar search engines out there.
Given the many search options commercially available today, which can be found on the MPAA website, WheretoWatch.com was discontinued at the conclusion of 2017, Ortman informs TF.
There are more than 140 lawful online platforms in the United States for accessing film and television content, and more than 460 around the world, he adds.
The MPAA lists several of these alternative search engines on its new website. The old WhereToWatch domain now forwards to the MPAAs online magazine The Credits, which features behind-the-scenes stories and industry profiles.
While the MPAA is right that there are alternative search engines, many of these were already available when WhereToWatch launched. In fact, the site used the services of the competing service GoWatchIt for its search results.
Perhaps the lack of interest from the U.S. public played a role as well. The site never really took off and according to traffic estimates from SimilarWeb and...
Purism has begun with their Librem 5 phone platform documentation as they still plan to get developer boards out this summer and ideally begin shipping the actual Linux security-minded smartphones next year...
Amid much excitement in 2016, astronomers revealed the discovery of an Earth-sized planet around the star closest to our Sun, Proxima Centauri. This exoplanet, just 4.2 light years from Earth, was close enough to its red dwarf star that water might well exist on its surface.
Alas, now we know that life probably does not live on the planet, at least not on the surface. In March 2016, astronomers using an array of telescopes known as Evryscope observed a "superflare" 10 times larger than any previous one detected from the red dwarf star.
Read more of this story at SoylentNews.
Following rumors the past few days, AMD officially confirmed the Radeon RX 500X series today for desktops and notebooks, but these effectively are just re-branded GPUs for OEM builders...
The encrypted messaging app Signal is Edward Snowdens favorite app.
This is a post from HackRead.com Read the original post: 17-year-old finds screen lock bypass vulnerability in Signal app for iOS
On Saturday, the Hackaday Community from across Ireland and other parts of Europe poured into the performance hall at Dublins Project Arts Centre for a massive collection of talks. From rediscovering centurys old technology, to cutting edge research projects, we heard talks from dozens of attendees on the technology that is interesting them most right now.
Choosing what to share about last weekends Uncon has been a particularly taxing process. So many and varied were the projects presented, and such was their high standard, that a writer faces a significant challenge to fit them into a single report. But well give it a try. Read on for highlights of what was a weekend we will remember forever.[Rachel]s about to lull us into a false sense of security with talk of fashion, then go for the eyeballs!
Dublin by early April has...
The Internal Revenue Service has been urging tax preparation firms to step up their cybersecurity efforts this year, warning that identity thieves and hackers increasingly are targeting certified public accountants (CPAs) in a bid to siphon oodles of sensitive personal and financial data on taxpayers. This is the story of a CPA in New Jersey whose compromise by malware led to identity theft and phony tax refund requests filed on behalf of his clients.
Last month, KrebsOnSecurity was alerted by security expert Alex Holden of Hold Security about a malware gang that appears to have focused on CPAs. The crooks in this case were using a Web-based keylogger that recorded every keystroke typed on the targets machine, and periodically uploaded screenshots of whatever was being displayed on the victims computer screen at the time.
If youve never seen one of these keyloggers in action, viewing their output can be a bit unnerving. This particular malware is not terribly sophisticated, but nevertheless is quite effective. It not only grabs any data the victim submits into Web-based forms, but also captures any typing including backspaces and typos as we can see in the screenshot below.
Whoever was running this scheme had all victim information uploaded to a site that was protected from data scraping by search engines, but the site itself did not require any form of authentication to view data harvested from victim PCs. Rather, the stolen information was indexed by victim and ordered by day, meaning anyone who knew the right URL could view each days keylogging record as one long image file.
Those records suggest that this particular CPA John, a New Jersey professional whose real name will be left out of this story likely had his computer compromised sometime in mid-March 2018 (at least, this is as far back as the keylogging records go for John).
Its also not clear exactly which method the thieves used to get malware on Johns machine. Screenshots for Johns account suggest he routinely ignored...
The Washington Post has a retrospective on 14 years of Mark Zuckerberg saying sorry, not sorry:
From the moment the Facebook founder entered the public eye in 2003 for creating a Harvard student hot-or-not rating site, he's been apologizing. So we collected this abbreviated history of his public mea culpas.
Read more of this story at SoylentNews.
Fortanix been selected to present in the session Protecting Containers from Host-Level Attacks at RSA Conference 2018 next week. CEO and Co-Founder Ambuj Kumar will join renowned cryptography expert Benjamin Jun, CEO of HVF Labs, and Docker Security Lead David Lawrence in the session that describes how Runtime Encryption and Intel SGX keep a container encrypted during runtime to protect data in use from host OS, root users and network intruders, even if the infrastructure More
The post Fortanix presenting on protecting containerized apps with runtime encryption at RSAC 2018 appeared first on Help Net Security.
Patch Tuesday came and went and, as usual, Microsoft and Adobe have released patches/security updates for vulnerabilities affecting a wide variety of their products. Adobes patches This April 2018 Patch Tuesday Adobe addressed vulnerabilities in Adobe PhoneGap Push Plugin, Adobe Digital Editions, Adobe InDesign, Adobe Experience Manager, and Adobe Flash Player. Of these updates, the most important one is that for Adobe Flash Player. Not only is the product the most widely used of those More
The post What patches to prioritize following the April 2018 Patch Tuesday? appeared first on Help Net Security.
Judging by the number of compilations that have been put online, one of the not-so-secret vices of the YouTube generation must be the watching of crash videos. Whether it is British drivers chancing their luck on level crossings, Russians losing it at speed on packed snow, or Americans driving tall trucks under low bridges, these films exert a compelling fascination upon the viewing public intent on deriving entertainment from the misfortunes of others. The footage is often peripheral or grainy, having inevitably been captured by a dashcam or a security camera rather than centre-stage on a broadcast quality system with professional operation. You cant predict when such things will happen.
There was one moment, back in 1984, when predicting a major crash was exactly what you could do. It was a national event, all over the TV screens, and one which was watched by millions. The operators of British nuclear power stations wished to stage a public demonstration of how robust their transport flasks for spent nuclear fuel rods were, so after all the lab tests they could throw at one they placed it on a railway test track and crashed a 100mph express train into it....
The acting CEO of Cambridge Analytica, the data firm at the center of controversy over Facebook's handling of user data, has stepped down from the role.The data firm's board of directors announced Wednesday that Alexander Tayler will step down from...
Rep. David McKinley (R-W.Va.) grilled Facebook founder and CEO Mark Zuckerberg on Wednesday over opioid dealers using the social media giant to distribute drugs, saying the platform was hurting its users. "Your platform is still being used to...
A sex worker review website has blocked U.S. users in anticipation of the Stop Enabling Sex-Trafficking Act (SESTA) coming into effect. U.S.-based users can still access it with a VPN, while all visitors are asked to "not access TER from a Prohibited Country":
A website that hosts customer reviews of sex workers has started blocking Internet users in the United States because of forthcoming changes in US law. Congress recently passed the Stop Enabling Sex Traffickers Act bill (SESTA), and President Trump is expected to sign it into law. SESTA will make it easier to prosecute websites that host third-party content that promotes or facilitates prostitution, even in cases when the sex workers aren't victims of trafficking.
After Congress approved the bill, Craigslist removed its "Personals" section and Reddit removed some sex-related subreddits. The Erotic Review (TER) has followed suit by blocking any user who appears to be visiting the website from the United States. "As a result of this new law, TER has made the difficult decision to block access to the website from the United States until such time as the courts have enjoined enforcement of the law, the law has been repealed or amended, or TER has found a way to sufficiently address any legal concerns created by the new law," the website's home page says in a notice to anyone who accesses the site from a US location.
[...] SESTA was inspired largely by the existence of Backpage. But federal law enforcement authorities were able to shut Backpage down last week, even though SESTA hasn't been signed into law yet. Trump may sign the bill this week. [...] Some sex workers have spoken out against SESTA, saying that websites can help sex workers screen clients and avoid dangerous situations. A group called Survivors Against SESTA says the new law "will cause harm to vulnerable populations engaging in the sex trade without helping...
President Trump on Wednesday signed a sex trafficking bill that reduces legal protections for websites that enable sex trafficking.Joined by lawmakers and victims of sex trafficking, the president praised the legislation and told victims he was...
There have been a number of highly visible, fast-moving trends in industrial automation technology over the past few years. The most notable of these has been the Internet of Things and its related mobile and remote applications. Other high-profile trends include the rise of augmented and virtual reality and the proliferation of industrial cybersecurity companies.
Somewhat under radar, another trend has been developing. That trend is the increasing use of Linux as a leading operating system (OS) for automation controllers.
Simone Margaritelli, the VP of Research at Zimperium, has created a Linux port of Little Snitch, a wildly popular macOS firewall application.
Named OpenSnitch, the Linux port works on the same principles of the macOS version, being a host-based firewall that notifies users when local apps are attempting to initiate new outgoing network connections.
Similar to Little Snitchs normal modus operandi, when this happens, OpenSnitch will display a popup, asking the user for instructions on how to deal with this new process....
ThreatQuotient launched ThreatQ Investigations, a cybersecurity situation room designed for collaborative threat analysis, shared understanding and coordinated response. ThreatQ Investigations allows real-time visualization of an investigation as it unfolds within a shared environment, enabling teams to better understand and anticipate threats, as well as coordinate a response. The solution, built on top of the ThreatQ threat intelligence platform, brings order to the chaos of security operations that occurs when teams work in silos, acting independently, More
The post ThreatQ Investigations: Cybersecurity situation room accelerates security operations appeared first on Help Net Security.
Wow. This is very nuts: Russia vows to shoot down any and all missiles fired at Syria. Get ready Russia, because they will be coming, nice and new and smart! You shouldnt be partners with a Gas Killing Animal who kills his people and enjoys it! Donald J. Trump (@realDonaldTrump) April 11, 2018 Via: 
The Internet of Things is just around the corner, and somehow or another, all these bits of intelligent dust and juice bag squeezers will have to talk to one another. One of the better ways to get IoT bits talking to each other is MQTT, Message Queuing Telemetry Transport, a protocol designed for small code footprints and limited network bandwidth. It gets a lot of IoT hype, but its a great alternative to HTTP for your own small projects, so thats what were talking about during this weeks Hack Chat.
MQTT is a machine-to-machine connectivity protocol, very useful in remote locations, where a small code footprint is required, where bandwidth is at a premium, or for turning a lamp on and off from your phone, while sitting in the same room. Its ideal for mobile applications, and in the twenty or so years since its creation, MQTT has made inroads into all those smart devices around your house.
MQTT is based on a very simple publish and subscribe model with topics that allow you to configure where messages should be sent. It is an extremely simple protocol, but with MQTT, you can set up a complete home automation system that...
A Democratic lawmaker began her questions for Facebook CEO Mark Zuckerberg on Wednesday by listing his history of apologizing for problems at the social media giant.You have a long history of growth and success, but you also have a long list...
The Python Package Index (PyPI) is the principal repository of libraries for the Python programming language, serving more than 170 million downloads each week. Fifteen years after PyPI launched, a new edition is in beta at pypi.org, with features like better search, a refreshed layout, and Markdown README files (and with some old features removed, like viewing GPG package signatures). Starting April 16, users visiting the site or running pip install will be seamlessly redirected to the new site. Two weeks after that, the legacy site is expected to be shut down and the team will turn toward new features; in the meantime, it is worth a look at what the new PyPI brings to the table.
Wizebit is proud to welcome Machine Learning guru Peter Morgan to its elite team of blockchain specialists and developers.
Peter is the author of the popular report, Machine Learning is Changing the Rules: Ways Businesses Can Utilize AI to Innovate, and brings years of real world experience designing, building, and implementing AI and IP networks for Cisco, IBM, and BT Labs.
As the first company to create a confidential smart assistant on the blockchain, Wizebit officially launched in 2018 with the mission of allowing personal data to be connected while remaining protected.
A Democratic lawmaker on Wednesday told Mark Zuckerberg he believes there are similarities between Facebook's data collection practices and the federal government's covert operation in the 1960s that improperly surveilled black civil...
Facebook on Monday started sending a notification to users whose accounts were compromised due to the Cambridge Analytica scandal.
For those unaware, Christopher Wylie, a Cambridge University researcher, had recently revealed that data analysis firm, Cambridge Analytica and Facebook were involved in a privacy scandal wherein the former illegally lifted data of millions of Facebook users without their knowledge and consent and used it to influence voter trends in several countries. Facebook allowed thousands of app developers to harvest data through third-party online games and quizzes and then used it to target American voters with emotionally specific messaging. Facebook believes that as many as 87 million users personal data have been collected without their permission.
Those who are affected by the scandal will receive a warning for using the Cambridge Analytica app, which means they are also likely to be responsible for their friends and acquaintances data being handed over to the firm, as they are a victim by proxy.
For those, who are unaffected by the event, will receive a more general message for checking apps and websites that have access to their Facebook data.
While as promised by Facebooks CEO Mark Zuckerberg last week, the notifications that appear at the top of News Feed of the user have started rolling out, but it appears to be slow.
In the meanwhile, you can manually check the information by visiting Facebooks support page titled How can I tell if my info was shared with Cambridge Analytica? which will provide a more immediate response.
A box labeled Was my information shared? on that page will display the results for the currently logged-in user. The contents of the box will change depending on if the user accessed the banned site, if their friends logged in, or if their data is safe.
If your data wasnt compromised, you will see a message that reads: Based on our available records, neither you nor your friends logged into This Is Your Digital Life. As a result, it doesnt appear your Facebook information was shared with Cambridge Analytica by This Is Your Digital Life.
If your data was harvested, you will see a message that reads: A friend of yours did log in. In this case, it is likely that your public profile, in addition to your page likes, your birthday, current city and probably also your News Feed were likely shared with This Is Your Digital Life. Of an estimated 87 million worldwide, about one million people in the UK will see the second message.
In the event, you were the one to i...
Broad and inconsistent interpretations of behind the times laws, new anti-infosec legislation, lawsuits and criminal prosecutions are having a chilling effect on security research. Its difficult to quantify the effect, but Joseph Lorenzo Hall and Stan Adams of the US-based non-profit Center for Democracy & Technology have attempted to reveal the worries and choices of security researchers in the current climate by interviewing twenty of them. We used a qualitative methods research design to understand More
The post How security researchers deal with risks stemming from their activities appeared first on Help Net Security.
Nurdles. The name sounds inoffensive, cuddly even However, nurdles are anything but. Nurdle is the colloquial name for pre-production plastic pellets (which is in itself rather a mouthful); these are the raw material of the plastic industry the building blocks for plastic bottles, plastic bags, drinking straws, car components, computer keyboards in fact almost anything you can think of thats made of plastic.
However, nurdles are also covering our beaches. I found that out for myself when Fauna & Flora International (FFI) first started researching this issue in 2009. Having read about them I went looking on my local beach, and was shocked to find so many nurdles in the strandline and trapped in washed-up seaweed. I had never noticed them before, but they had clearly been accumulating for some time.
While pictures of the tide of larger plastics in the ocean are front page news, the issue of nurdle pollution has received much less attention. Recent storms, however, have resulted in higher levels of nurdles being reported from a range of sites around UK coasts, highlighting the numbers of nurdles that are in our waterways, seas and sediments a level of pollution which we can only see when they are flushed out and onto the beach. The Great Nurdle Hunt (an initiative of our partner Fidra) has mapped nurdle finds from around the UK and Europe, which has identified a number of nurdle hotspots in key industrial estuaries. However, this problem isnt unique to Europe; nurdles are reported worldwide, but only hit the headlines when there are significant local spills from containers lost at sea, as recently occurred in South Africa. However, such one-off events arent the only source of nurdle pollution.
Researchers from the Ruhr University Bochum (RUB) and the University of Warwick were able to observe the smallest details of hydrogen production with the synthetic mineral pentlandite. This makes it possible to develop strategies for the design of robust and cost-effective catalysts for hydrogen production. The working groups of Prof. Wolfgang Schuhmann and Dr. Ulf-Peter Apfel from the RUB and the team headed by Prof. Patrick R. Unwin from the University of Warwick published their results in the journal Angewandte Chemie.
Hydrogen gas is considered a possible future source of energy and can be produced from water using platinum catalysts and electricity. However, researchers seek alternative catalysts made of cheaper and more readily available materials with equally high efficiency. There are a number of materials that, like platinum, are able to catalyse the reaction of water into hydrogen. These include metal chalcogenides such as the mineral pentlandite, which is just as efficient as platinum and is also significantly more stable toward catalyst poisons such as sulphur, explains Ulf-Peter Apfel. Pentlandite consists of iron, nickel and sulphur. Its structure is similar to that of the catalytic centres of hydrogen-producing enzymes found in a variety of sources, including green algae.
In the current study, the researchers investigated hydrogen production rates of artificially prepared crystalline surfaces of the mineral pentlandite in a drop of liquid with a diameter of a few hundred nanometres. They used scanning electrochemical cell microscopy for this purpose.
This is a fairly common response to the discussion of extending healthy human lifespans. The idea that fear of dying is the only thing that motivates the advocates, supporters, and scientists working on rejuvenation biotechnology and ending age-related diseases.
These days, war is not really portrayed in a very good light. When we think about war, we think about genocide, mass murder, and slaughter, and we call for an end to it. The popular sentiment is that war is bad and we should just do away with it. However, once upon a time, things were rather different, and soldiers fighting wars were not seen as victims of mindless violence. Losing your life in battle was considered glorious and noble, and your family would be proud of you for fighting in the name of your country, your God, or whatever. People who were afraid of dying and refused to fight were regarded as cowards, most certainly not as pacifists of a strong moral fiber, and were possibly executed; being a conscientious objector was not yet a thing, and human rights werent either.
This is sheer madness to us, but back in the day, it was entirely normal. Most of us will probably think people must have been crazy to let themselves be fooled into believing such nonsense, but thats the power of propaganda for you.
The modern age of pro-death propaganda
However, the story is not completely over even today. This may be because of past glorification of death, stale ideas about the circle of life, a widespread coping mechanism, or a combination of the three, but at least in certain circumstances, being afraid of death is still seen as a sign of cowardice and sometimes also inferiority.
Fuze card is wide open to data theft over Bluetooth. A fix is on the way.
The makers of the programmable Fuze smart card say it's powerful enough to be your wallet in one card yet secure enough to be used the same way as traditional payment cardsincluding trusting it to restaurant servers when paying the bill. But it turns out that convenience comes with a major catch. A flaw makes it possible for anyone with even brief physical control of the card to surreptitiously siphon all data stored on the device.
Fuze representatives said they're aware of the vulnerability and plan to fix it in an update scheduled for April 19. They also thanked the two researchers who, independent of one another, discovered the vulnerability and privately reported it. So far, however, Fuze officials have yet to fully inform users of the extent of the risk so they can prevent private data stored on the cards from being stolen or tampered with until the critical flaw is repaired.
Read more of this story at SoylentNews.
[Nixie] wants to sputter. We know, who doesnt? But [Nixie] has a specific purpose for his sputtering: thin-film deposition, presumably in support of awesome science. But getting to that point requires a set of tools that arent exactly off-the-shelf items, so hes building out a DIY sputtering rig on the cheap.
If youre not familiar with sputtering, thats understandable. In this context, sputtering is a process that transfers particles from one solid to another by bombarding the first solid with some sort of energetic particles, usually electrons or a plasma. When properly controlled, sputtering has applications from mass spectrometry to the semiconductor industry, where its used to either deposit thin films on silicon wafers or etch them away selectively.
No matter the application, sputtering needs a stable stream of plasma. [Nixie] has posted a series of articles on his blog walking us through his plasma experiments, from pulling a really strong vacuum to building a high-voltage power supply from a microwave oven transformer. Its a project that needs a deep well of skills and tools, like glassworking, machining, and high-voltage electronics. Check out the plasma in the video below.
The Khronos Group has officially announced the long-awaited open-source availability of their SPIRV-LLVM-Translator that allows the bi-directional translation of SPIR-V and LLVM IR...
Energy-efficient lightbulbs are more expensive and less available in high-poverty urban areas than in more affluent locations, according to a new University of Michigan study conducted in Wayne County.
U-M researchers explored disparities in the availability and price of energy-efficient bulbs by surveying 130 stores across Michigans most populous county.
They found that the cost to upgrade from a conventional incandescent bulb to a highly efficient light-emitting diode, or LED, was twice as high in the highest-poverty areas. At the same time, the price for less-efficient incandescent and halogen lamps (IHLs) decreased as the poverty level increased.
The image of the crackpot inventor, disheveled, disorganized, and surrounded by the remains of his failures, is an enduring Hollywood trope. While a simple look around ones shop will probably reveal how such stereotypes get started, the image is largely not a fair characterization of the creative mind and how it works, and does not properly respect those that struggle daily to push the state of the art into uncharted territory.
That said, there are plenty of wacky ideas that have come down the pike, most of which mercifully fade away before attracting undue attention. In times of war, though, the need for new and better ways to blow each other up tends to bring out the really nutty ideas and lower the barrier to revealing them publically, or at least to military officials.
Of all the zany plans that came from the fertile minds on each side of World War II, few seem as out there as a plan to use birds to pilot bombs to their targets. And yet such a plan was not only actively developed, it came from the fertile mind of one of the 20th centurys most brilliant psychologists, and very nearly resulted in a fieldable weapon that would let fly the birds of war.
After graduating from college in 1926, Burrhus Frederic Skinner was a bit of a lost soul. He had had every intention of being a writer, but nothing seemed to be coming from his efforts. Living in his parents Pennsylvania home, he decided to scrap his plan of writing the Great American Novel and return to school.
Inspired by the works of Pavlov and Watson, which he browsed while working at a bookstore to make ends meet, B.F. Skinner applied to the Psychology Department of Harvard University in 1926. Skinner was interested in making psychology an experimental science, and rather than the concentrate on exploring the mind, he was determined to only study what could be quantified. Rather than trying to delve into the subjective world of thoughts and emotions, he decided to study behaviors.
Anyone who has taken an introductory psychology course will be familiar with operant conditioning, the term Skinner came up with to describe one way that animals learn. The idea with operant conditioning is that behaviors are either reinforced or discouraged by what happens as a result of the behavior. The classic case occurs in the Skinner Box, an invention of his. In the simplest case, a rat placed in the box can be trained to press a lever by the release of a food pellet, or can be discouraged from pressing the lever by getting an electric shock through the cage floor. Operant conditioning differs from classical conditioning, such as in the case of Pavlovs famously drooling dogs, in that the latter makes an association between stimulus and an involuntary response, like salivating at the sou...
Yesterday NVIDIA released their first 396 Linux driver beta in the form of the 396.18 release and its biggest addition is a new Vulkan SPIR-V compiler to replace the compiler that's been hobbled together since the Vulkan 1.0 debut. Here are some fresh NVIDIA Vulkan Linux benchmarks and more on this new SPIR-V compiler.
David Kappos, former Director of the USPTO
Summary: The latest examples of Andrei Iancu and David Kappos (current and former USPTO Directors, respectively) found in bed with the patent microcosm (like the disgraced Judge Rader and unlike Michelle Lee, whom the patent microcosm constantly smeared to eventually oust)
THE EPO scandals are many. Too many to count. Theres danger, however, that similar scandals will spread to the US (we wrote about some appointments by nepotism recently, including the CIO and the new chief, whose firm used to work for Donald Trump).
Heres the latest gossip from the Office. Its less than a day old. Its about Pam Isom, who is said to have hired her nephew by marriage:
Pam Isom, allegedly traveled on government funds to visit her daughter in Florida under the guise of training. One can see that John Owens and Tony Chiles influence still exists and will continue.
USPTO CIO Watchdog (@CIO_Watchdog) April 10, 2018
Pam Isom's Directorate is allegedly conducting illegal hiring practices. The Trademark Div, seems to hire and promote one race over another. The org chart is evidence but others outside of AED has also commented. Maybe why TD cannot deliver products and Trademarks is unhappy.
USPTO CIO Watchdog (@CIO_Watchdog) April 10, 2018
According to these Highlights (highlighted by...
Mark Zuckerberg will face his second day of testimony before lawmakers in Washington on Wednesday when he appears before the House Energy and Commerce Committee.The Facebook CEO held his own during a lengthy Senate hearing on Tuesday...
The admins among you will be unsurprised to discover that, more than a quarter of the time, data breaches across the world originated between the chair and the keyboard of organisation "insiders". And no, we don't mean they clicked on a dodgy link...
The latest edition of Verizon's Data Breach Investigations Report (DBIR) found that 25 per cent of all attacks over the year were perpetrated by said insiders and were driven largely by financial gain, espionage and simple mistakes or misuse.
It also reports that organised criminal groups continue to be behind around half of all breaches, while state-affiliated groups were involved in more than one in 10. Financial gain, unsurprisingly, continued to be the top motivation for cybercriminals.
The healthcare industry was found to be at particularly high risk of insider threats through errors and employee misuse such as medical workers accessing patient records for simple curiosity or fun.
Read more of this story at SoylentNews.
Blockchain technology is heralded to become a broadly disruptive force in the coming years. According to a Forbes story, blockchain is already revolutionizing contracts, payment processing, asset protection, and supply chain management.
2D materials produce a semi-floating gate memory that falls somewhere between DRAM and SRAM Image: School of Microelectronics, Fudan University This schematic shows the design for a new semi-floating gate memory.
Researchers at Fudan University in Shanghai, China have leveraged two-dimensional (2D) materials to fabricate a relatively new gate design for transistors that may fill the gap between volatile and non-volatile memory.
The result is what the researchers are dubbing a quasi-non-volatile device that combines the benefits of static random access memory (SRAM) and dynamic random access memory (DRAM). The new device will make up for DRAMs limited data retention ability and its need to be frequently refreshed and SRAMs high cost.
In research described in Nature Nanotechnology , the Chinese researchers leveraged a gate design that has been gaining popularity, recently called semi-floating gate (SFG) memory technology. The SFG gate design is similar to a typical field effect transistor except that SFG transistor can remember the applied voltage from the gate.
The researchers have shown that the 2D SFG memory they have fabricated has 156 times longer refresh time (10 seconds) than DRAM (64 milliseconds), which saves power, and ultrahigh-speed writing operations on nanosecond timescales (15 nanoseconds), which puts it on par with DRAM (10 nanoseconds). This new device also boosts the writing operation performance to approximately 106 times faster than other memories based on 2D materials.
These improvements to refresh time and writing operations suggest that the quasi-non-volatile memory has the potential to bridge the gap between volatile and non-volatile memory technologies and decrease the power consumption demanded by frequent refresh operations, enabling a high-speed and low-power random access memory.
The first floating gate transistor was made in 1967 and since then has become a mainstay of nonvolatile memory technology. However, the writing/erasing speed of a floating gate transistor is around one millisecond, making it slower than the CPU, prohibiting its use where a high writing speed is needed.
The researchers saw that there was a chance to improve the performance of a floating gate transistor because so much of its...
The FIDO Alliance and the World Wide Web Consortium (W3C) have achieved a standards milestone in the global effort to bring simpler yet stronger web authentication to users around the world. The W3C has advanced Web Authentication (WebAuthn), a collaborative effort based on Web API specifications submitted by FIDO to the W3C, to the Candidate Recommendation (CR) stage. The CR is the product of the Web Authentication Working Group, which is comprised of representatives from More
The post FIDO2: Authenticate easily with phishing-resistant security appeared first on Help Net Security.
Facebook users are increasingly worried about their privacy online amid revelations that political contractor Cambridge Analytica used the social media platform to obtain information on 87 million Americans without their consent, according...
While it unfortunately didn't happen in time for last month's GNOME 3.28 release, there are more performance improvements en route...
Another day, another ransomware scam but this one is harmless
This is a post from HackRead.com Read the original post: New ransomware locks files & asks victims to play PUBG game
The Domain Name System (DNS) is a plain-text service that lets anyone who can see the wire capture a user's DNS traffic and work out whether they're asking for naughty.com or nice.com. So to help enhance its privacy a group of researchers has proposed a more "Oblivious DNS protocol.
However, as the group explained here, even encrypted DNS (for example, DNS over TLS) is still exposed at the recursive resolver (that is, the DNS component most directly connected to the client), because that server decrypts the user request so it can fetch the IP address of the site the user wants.
In other words, whether you use your ISP's resolver, or one provided by a third party like Google or Cloudflare, at some point you have to trust the resolver with your DNS requests.
Read more of this story at SoylentNews.
Less than half of all organizations were able to detect a major cybersecurity incident within one hour. Even more concerning, less than one-third said that even if they detected a major incident, they would be unable to contain it within an hour, according to LogRhythm. Average time to detect a major cybersecurity incident The study, conducted by Widmeyer, which surveyed 751 IT decision makers from the U.S., U.K. and Asia-Pacific, also revealed that a majority More
The post How many can detect a major cybersecurity incident within an hour? appeared first on Help Net Security.
iboss has published the findings of its 2018 Enterprise Cloud Trends report. The survey of IT decision makers and office workers in U.S. enterprises found that 64% of IT decision makers believe the pace of software as a service (SaaS) application adoption is outpacing their cybersecurity capabilities. Combined with growing pressures from shadow IT and mobile employees, 91% of IT decision makers agree they need to update security policies to operate in a cloud-first environment. More
The post Organizations want to leverage the cloud but are held back by security misconceptions appeared first on Help Net Security.
Latest Stack Overflow survey of 100,000-plus developers finds the highest salaries and interest levels in DevOps methodologies and artificial intelligence.
In this article, I'll provide a checklist of beginner-friendly features and some tips to make your first open source contribution easy.
Before contributing to a project, you should understand how it works. To understand it, you need to try it for yourself. If you find the product interesting and useful, it is worth contributing to.
[Anjul Patney] and [Qi Sun] demonstrated a fascinating new technique at NVIDIAs GPU Technology Conference (GTC) for tricking a human into thinking a VR space is larger than it actually is. The way it works is this: when a person walks around in VR, they invariably make turns. During these turns, its possible to fool the person into thinking they have pivoted more or less than they have actually physically turned. With a way to manipulate perception of turns comes a way for software to gently manipulate a persons perception of how large a virtual space is. Unlike other methods that rely on visual distortions, this method is undetectable by the viewer.Saccadic movements
The software essentially exploits a quirk of how our eyes work. When a humans eyes move around to look at different things, the eyeballs dont physically glide smoothly from point to point. The eyes make frequent but unpredictable darting movements called saccades. There are a number of deeply interesting things about saccades, but the important one here is the fact that our eyes essentially go offline during saccadic movement. Our vision is perceived as a smooth and unbroken stream, but thats a result of the brain stitching visual information into a cohesive whole, and filling in blanks without us being aware of it.
Part one of [Anjul] and [Qi]s method is to manipulate perception of a virtual area relative to actual physical area by mak...
AMD and Microsoft released the microcode and security updates for Spectre vulnerabilities.
The Meltdown and Spectre attacks could be exploited by attackers to bypass memory isolation mechanisms and access target sensitive data.
The Meltdown attack could allow attackers to read the entire physical memory of the target machines stealing credentials, personal information, and more.
The Meltdown exploits the speculative execution to breach the isolation between user applications and the operating system, in this way any application can access all system memory.
The attack breaks the isolation between different applications, allowing to leak information from the kernel to user programs, as well as from virtualization hypervisors to guest systems.
Posted by Daniel Beck on Apr 11Jenkins is an open source automation server which enables developers around
Submitted via IRC for AndyTheAbsurd
A new device allows robots used in warehouses and third-party logistics (3PL) facilities to draw power or recharge batteries wirelessly while in operation.
The technology could have a big impact on the capabilities of mobile industrial robots, potentially freeing them from limitations imposed by modern batteries.
Waypoint Robotics, which makes custom mobile robots for the supply chain industry, unveiled its EnZone Wireless Charging Dock at this year's MODEX, the largest supply chain expo in North & South America and the hottest ticket in town this week for the mobile robotics industry.
The underlying technology for the wireless charging system comes from partner WiBotic, which makes plug-and-play devices for the wireless transmission of power to robotic platforms.
Last year, WiBotic made a splash with a wireless charging pad it claims can keep drones in the air indefinitely. That capability could prove indispensable if drone delivery takes off the way many analysts believe it will.
Read more of this story at SoylentNews.
If you're looking to take your container management to the next level, the Rancher Docker Container Manager might be just what you need. Jack Wallen shows you how to get this up and running.
You've been working with containers for some time nowmaybe you're using docker commands to manage and deploy those containers. You're not ready to migrate to Kubernetes (and Docker has been treating you well), but you'd like to make use of a handy web-based management tool to make your container life a bit easier. Where do you turn?
Igalia developers have been working on shaderInt16 support Intel's open-source "ANV" Vulkan driver to provide 16-bit integer support...
Posted by Yves-Alexis Perez on Apr 11-------------------------------------------------------------------------
Imagine the neural network (NN) as a black box inside a space with internal functions, inputs, and outputs. All its outputs are dependent on the inputs with a unique idea: auto-training.
Inside the software, every possible function points in the direction of the existence of the network. As for its intelligence, it's undeterminable, an open question. But the human brain, whose intelligence is very high, can be investigated for patterns.
[...] Using an innovative artificial intelligence tool, the NN learns how to generate contextually relevant reviews. For example, if we ask for the best food around us, the system will answer. But the language will include various adjectives, which are not consistent with our way of talking.
If we use every single input available for a valuable result, then high performance could be obtained.
The network's perception of the interaction with our world has its own way of existence. If the machine remembers pleasant emotions of a man drinking his coffee, it can store those feelings in relation to the activity.
It is, now, possible, to see more clearly how this form of artificial intelligence builds consciousness. The NN can gradually build egos and make judgments by itself, from the stimuli it receives.
The NN is not programmed to obey the rules of the language's syntax. That is why it is so different - the complexity of a robot's mind, without any rules.
Read more of this story at SoylentNews.
Summary: In spite of the continued assessment of patent law at the US Supreme Court (SCOTUS), things wont change in favour of the software patents lobby any time soon (if ever)
THE (arguably) most anticipated patent decision from SCOTUS is (probably) Oil States. Just under a year ago we saw yet more favourable (to patent reform) decisions from SCOTUS. Expect more of the same later this month or next month.
Another possible case (to reach SCOTUS) is a high-profile case regarding patents, but it not about patent scope (Alice has already settled much of that) or litigation venue scope (TC Heartland dealt with it last summer/spring). Earlier this week Patently-O wrote about it:
Helsinns petition for certiorari received strong support this week from a bevy of ten briefs amici. The missing element now is a call from the Supreme Court for the views of the Solicitor General (CVSG) and a resulting brief from the U.S. Government supporting the petition.
The Patent Act bars the patenting of inventions that were on sale prior to to the inventions filing date. The question on appeal here is whether the AIA limited on sale to only include publicly available information or instead do secret and confidential business deals also count as invalidating prior art (if ever discovered).
This case isnt of much interest to us, but still, it can help show where SCOTUS stands (or sits) on patents. Writing about this other case which isn't of much interest to us, SCOTUS Blog has just said:
On the first morning of the Supreme Courts April session next week, the justices will return to problems of extraterritorial patent infringement, hearing argument in WesternGeco v Ion Geophysical Corp. For the third time in recent years, the court...
When you choose Python for software development, you choose a large language ecosystem with a wealth of packages covering all manner of programming needs. But in addition to libraries for everything from GUI development to machine learning, you can also choose from a number of Python runtimesand some of these runtimes may be better suited to the use case you have at hand than others.
Over the 20th century our knowledge of the universe expanded, as did our technological ability to capture images its outer reaches. The Hubble Space Telescope allowed us to pull back the curtains on the deep limits of the universe and the new millennium promises an even higher definition imaging with the James Webb Space Telescope.
Despite ongoing delays, the JWT promises to take us even closer to the edge of time and space, delivering a new perspective on some of the oldest galaxies in the universe, potentially just a few hundred million years after the big bang.
Hackers can compromise your computer just visiting a malicious website or clicking a malicious link.
Microsoft has released April Patch Tuesday that addresses 66 vulnerabilities, 24 of which are rated critical and five of them could be exploited by an attacker to compromise a PC by just tricking the victims into visiting a website or opening a specifically crafted file.
Microsoft April Patch Tuesday includes the fix for five critical remote code execution vulnerabilities in Windows Graphics Component (CVE-2018-1010, -1012, -1013, -1015, -1016) that are related to improper handling of embedded fonts by the Font Library.
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website, reads the advisory for the CVE-2018-1013.
An attacker could also embed an ActiveX control marked safe for initialization in an application or Microsoft Office document that hosts the IE rendering engine.
The flaws were discovered by Hossein Lotfi, a security researcher at Flexera Software. and affect all versions of Windows OS to date.
Microsoft also addressed a denial of service vulnerability in Windows Microsoft Graphics that could be exploited by an attacker to cause a targeted system to stop responding. This vulnerability tied the way Windows handles objects in memory.
Microsoft April Patch Tuesday also addressed a critical RCE vulnerability, tracked as CVE-2018-1004, that resides in the Windows VBScript Engine and affects all versions of Windows.
An attacker who successfully exploited the vulnerability could gain the same user rights as the current user...
By sheer coincidence (another one of those!) all the EPO budget will flow into the town where Battistelli is a politician just 3 weeks before his departure
Summary: The tyrant who destroyed the EPO and built himself a palace using millions which were supposed to go to a contractor in another country is engaging in dubious financial affairs again (akin to his padrone, Nicolas Sarkozy, who has been charged with corruption)
The finalists will be announced on 24 April, the EPO
wrote yesterday about the European Inventor Award
epo.org link) and the
location can be confirmed. It says very clearly: The next edition
of the European Inventor Award will be held on 7 June 2018 in
SUEPO now points out that even his successor, whom he chose (another Frenchman with zero background in sciences), isnt being trusted by stakeholders, based on a new JUVE poll. The culture of nepotism is almost assured to prevail.That Battistelli takes EPO budget 'home' just 3 weeks before leaving isnt new to us. We wrote about it before. That hes leaving the EPO in ruins is also without doubt. SUEPO now points out that even his successor, whom he chose (another Frenchman with zero background in sciences), isnt being trusted by stakeholders, based on a new JUVE poll. The culture of nepotism is almost assured to prevail.
Heres the EPO (...
This has opened a whole new window to physics.
This could be big.
It used to be that you could pop the hood and with nothing more than flat head screwdriver, some baling wire, and tongue held at the optimal angle, you could fix anything that ailed your car. But today, for better or for worse, the average automobile is a rolling computer that runs on gasoline and hope (if it even still has a gasoline engine, that is). DIY repairs and maintenance on a modern car is still possible of course, but the home mechanics toolbox has needed to evolve with the times. If you want to do anything more advanced than changing a tire, youll really want to have the gear to interface with the vehicles computer via the OBD-II port.
But for some, even that isnt enough. [limiter121] recently wrote in to tell us of an interesting project which doesnt read the OBD-II port in a vehicle, but actually emulates one. Like so many others this hack was born out of necessity, as a way to test an OBD-II project without having to sit out in the driveway all day. It allows you to create fictitious speed and engine RPM values for the OBD-II device or software under test to read, complete with a slick web interface to control the car.
So what makes it tick? Surprisingly little, actually. At the most basic level, an ESP32-WROOM-32 is connected up to a SN65HVD230 CAN transceiver chip. Youll also need a 3.3V power supply, as well as a USB to serial adapter to do the initial programming on the ESP32. From there its just a matter of compiling and flash...
So-called transparency reports are becoming increasingly popular with Internet-based platforms and their users. Among other things, they provide much-needed insight into how outsiders attempt to censor content published online and what actions are taken in response.
Google first started publishing its report in 2010, Twitter followed in 2012, and theyve now been joined by a multitude of major companies including Microsoft, Facebook and Cloudflare.
As one of the worlds most recognized sites, Reddit joined the transparency party fairly late, publishing its first report in early 2015. While light on detail, it revealed that in the previous year the site received just 218 requests to remove content, 81% of which were DMCA-style copyright notices. A significant 62% of those copyright-related requests were rejected.
Over time, Reddits reporting has become a little more detailed. Last April it revealed that in 2016, the platform received just 3,294 copyright removal requests for the entire year. However, what really caught the eye is how many notices were rejected. In just 610 instances, Reddit was required to remove content from the site, a rejection rate of 81%.
Having been a year since Reddits last report, the company has just published its latest edition, covering the period January 1, 2017 to December 31, 2017.
Reddit publishes this transparency report every year as part of our ongoing commitment to keep you aware of the trends on the various requests regarding private Reddit user account information or removal of content posted to Reddit, the company said in a statement.
Reddit believes that maintaining this transparency is extremely important. We want you to be aware of this information, consider it carefully, and ask questions to keep us accountable.
The detailed report covers a wide range of topics, including government requests for the preservation or production of user information (there were 310) and even an instruction to monitor one Reddit users activities in real time via a so-called Trap and Trace order.
In copyright terms, there has been significant movement. In 2017, Reddit received 7,825 notifications of alleged copyright infringement under the Digital Millennium Copyright Act, thats up roughly 138% over the 3,294 notifications received in 2016.
For a platform of Reddits unquestionable size, these volumes are...
Spring is the time of year when birds are singing throughout the Northern Hemisphere. Far to the north, beneath the ice, another lesser-known concert season in the natural world is just coming to an end.
A University of Washington study has published the largest set of recordings for bowhead whales, to discover that these marine mammals have a surprisingly diverse, constantly shifting vocal repertoire. The study published April 4 in Biology Letters, a journal of the United Kingdom's Royal Society, analyzed audio recordings gathered year-round east of Greenland. This population of bowhead whales was hunted almost to extinction in the 1600s and was recently estimated at about 200 animals. Audio recordings gathered from 2010 to 2014 indicate a healthy population, and include 184 different songs.
"If humpback whale song is like classical music, bowheads are jazz," said lead author Kate Stafford, an oceanographer at the UW's Applied Physics Laboratory. "The sound is more freeform. And when we looked through four winters of acoustic data, not only were there never any song types repeated between years, but each season had a new set of songs."
Stafford has recorded whales' sounds throughout the world's oceans as a way to track and study marine mammals. She first detected bowhead whales singing off the other side of Greenland in 2007. A previous study by Stafford of the Spitsbergen whales off west Greenland reported in 2012 that the whales were singing continuously during the winter breeding season, the first hint that there may be a healthy population in that area.
"We were hoping when we put the hydrophone out that we might hear a few sounds," Stafford said of the earlier study. "When we heard, it was astonishing: Bowhead whales were singing loudly, 24 hours a day, from November until April. And they were singing many, many different songs."
The new paper extends that initial five-month dataset, and confirms that bowhead whales sing in this region regularly from late fall to early spring. In fact the hydrophones, which are underwater microphones, picked up slightly more singing in the later years of the study. But what was most remarkable was the relentless variety in the animals' songs, or distinct musical phrases.
Worthwhile essay and says much about how the narrative was managed during the past century.
Yet the real future will be powered by locally accessing energy potential from static electricity and Dark Matter. This was done first with Tesla's device although he did not know what i just described.
That basically means a not so simple device will flood any particular circuit with all the load energy it demands. kiss off traditional energy taxation as presently practiced.
Depending on the speaker, lectures can be a joy, but, the efficacy of the lecture, as a teaching method, is in doubt.Photograph by ESB Professional / Shutterstock
Getting lectured is rarely, if ever, a pleasant experience. Youre being told what to do and think, or even chastised. Dont lecture me, we like to say. Having to attend a lecture, thoughthats not so bad, depending on the speaker. Hell, on the go, I listen to lectures willingly. Check out A Master List of 1,300 Free Courses From Top Universities: 45,000 Hours of Audio/Video Lectures, from Open Culture. Its a treasure trove.
Yet the efficacy of the lecture, as a teaching method, is in doubt. The latest salvo comes from a study published in Science last month, authored by just under 30 researchers who, a decade ago, began monitoring almost 550 lecturers as they taught over 700 courses at 25 universities in Canada and the United States. The task of gathering and analyzing all the studys data is unenviable, involving sitting in on classes and then rewatching them on tape.
The main conclusions: First, Didactic practicesvarious forms of
lecture, using slides and so forthare prevalent throughout the
undergraduate STEM curriculum,
On Tuesday a new X.Org Server 1.20 release candidate was issued by Red Hat's Adam Jackson for this prolonged development cycle now stretching well more than one and a half years...
For years, archaeologist Huw Groucutt and his team had driven one particular stretch of desert on their way to dig sites in Saudi Arabia. As they drove they caught glimpses of what looked like bones, emerging from the slowly eroding sand. Finally, in 2014, the team decided to explore the array of bones at Al Wusta. Within two years, amidst more than 800 fossilized animal bones and nearly 400 stone artifacts, they discovered something remarkable: the middle digit of a finger bone, from what appeared to be a modern human.
Anatomically modern, that is. The fossilized finger dated to at least 85,000 years ago.
[...] The discovery is a dream come true, because it supports arguments that our teams have been making for more than 10 years, said archaeologist Michael Petraglia, another co-author of the study, in a press conference. This find together with other finds in the last few years suggests that modern humans, Homo sapiens, are moving out of Africa multiple times during many windows of opportunity in the last 100,000 years or so.
Read more of this story at SoylentNews.
A trio of satellites studying our planets magnetic field have shown details of the steady swell of a magnetic field produced by the oceans tides.
Four years of data collected by the European Space Agencys (ESA) Swarm mission have contributed to the mapping of this other magnetic field, one that could help us build better models around global warming.
Physicist Nils Olsen from the Technical University of Denmark presented the surprising results at this years European Geosciences Union meeting in Vienna, explaining how his team of researchers managed to detail such a faint signature.
Researchers at Caltech have induced a range of sensations in the arm of a paralyzed man. The breakthrough comes courtesy of electrodes implanted in the brain, which stimulated the neurons to produce different feelings depending on the type of electrical signals. The team says the research could eventually lead to advanced prosthetic limbs that allow users to feel realistic sensations through them.
Plenty of exciting research is being conducted to help paralyzed people regain control of and feeling in their limbs. The NeuroLife system has helped a quadriplegic man move his arms again using just his thoughts, allowing him to perform a number of actions. Electrical nerve stimulation, both with and without electrode implants, has helped several people voluntarily move their legs again, often for the first time in years.
In this new study, Caltech researchers implanted two tiny arrays of electrodes into the somatosensory cortex, the small region of the brain responsible for the bodys sensations of movement or position, as well as cutaneous sensations such as touch, pressure and vibration.
How close are we really to space travel? Our featured contributor Lola Akinmade kerstrm talks to Space Nation, a company thats researching both space tourism and how space technology can help us on Earth.
Thanks to Google, it can often feel like there are no mysterious places left on earth to exploreand finding new places to call the final frontier seems increasingly difficult. Even the Pacific Oceans Marianna Trench, at over 36,000 feet deep and arguably the most legit final frontier on earth, has been explored by Hollywood director James Cameron in a submersible. As a result, the past few decades have seen us looking upwards to the most mysterious of places: Our own galaxy.
Blockbuster movies set in space and fictional alien encounters continue to intrigue us. Space discovery programs on TV science channels continually pique our curiosity. Even kids cartoons such as the 1960s American series The Jetsons brought the concept of commercial space travel closer to us, thanks to its flying space cars, pod-like apartments, and a robot maid called Rosie.
The University of Nebraska College of Law is joining forces with space and military law experts from Australia and the United Kingdom to take the lead on understanding how our Earth-bound laws will be applied in times of armed conflict in outer space.
Some of the best legal and policy minds at the University of Adelaide, UNSW Canberra, University of Exeter and Nebraska Law will draft the definitive document on military and security law as applied to space.
The Woomera Manual on the International Law of Military Space Operations is to be completed in 2020. It will draw on the knowledge of dozens of legal and space operations experts from around the world.
Adobe April Security Bulletin has addressed a total of 19 vulnerabilities in its products, including Flash Player, Experience Manager, InDesign CC, Digital Editions, ColdFusion and the PhoneGap Push plugin.
The flaws addressed with the Adobe April Security Bulletin Tuesday include a use-after-free, out-of-bounds read, out-of-bounds write and heap overflow bugs that could be exploited by remote attackers to execute arbitrary code on the target system and that could lead information disclosure.
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities in Adobe Flash Player 188.8.131.52 and earlier versions. Successful exploitation could lead to arbitrary code execution in the context of the current user. reads the security advisory published by Adobe.
|Vulnerability Category||Vulnerability Impact||Severity||CVE Number|
|Use-After-Free||Remote Code Execution||Critical||CVE-2018-4932|
|Out-of-bounds read||Information Disclosure||Important||CVE-2018-4933|
|Out-of-bounds read||Information Disclosure||Important||CVE-2018-4934|
Facebook CEO Mark Zuckerberg will testify before Congress this week to explain how his company collects and handles users' personal information. The past few weeks have been difficult for Facebook over concerns that the data of millions of users has been breached. Facebook stores details of almost every action you have taken and interaction you have engaged in on its platform.
The core of the radio is a LattePanda, an extremely powerful Intel single board computer. Its running Windows, and loads up a list of Internet radio streams and podcasts to play from a USB thumb drive thats built into an old vacuum tube. The LattePanda uses its built-in Arduino to interface with the radios original front panel knobs, which now are used to switch between streams. A particularly neat effect is the static and cross-talk thats artificially added when switching stations, making it sound like youre really dialing in a station...
Senators Diane Feinstein (D-CA) and Chuck Grassley (R-IA) are preparing legislation that would regulate encryption and potentially mandate "backdoors." The Senate Judiciary Committee has been meeting with tech lobbyists and at least three researchers to come up with a "secure way" to allow only law enforcement to access encrypted information:
US lawmakers are yet again trying to force backdoors into tech products, allowing Uncle Sam, and anyone else with the necessary skills, to rifle through people's private encrypted information. Two years after her effort to introduce new legislation died, Senator Dianne Feinstein (D-CA) is again spearheading an effort to make it possible for law enforcement to access any information sent or stored electronically. Such a backdoor could be exploited by skilled miscreants to also read people's files and communications, crypto-experts continue to warn.
Tech lobbyists this month met the Senate Judiciary Committee to discuss the proposed legislation a sign that politicians have changed tactics since trying, and failing, to force through new laws back in 2016. New York District Attorney and backdoor advocate Cyrus Vance (D-NY) also briefed the same committee late last month about why he felt new legislation was necessary. Vance has been arguing for fresh anti-encryption laws for several years, even producing a 42-page report back in November 2015 that walked through how the inability to trawl through people's personal communications was making his job harder.
From the NYT article:
A National Academy of Sciences committee completed an 18-month study of the encryption debate, publishing a report last month. While it largely described challenges to solving the problem, one section cited presentations by several technologists who are de...
The GRUB2 boot-loader now has support for the Flash-Friendly File-System so it can boot to systems formatted with F2FS as the root file-system...
In 2016, my colleague, Matt Braithwaite, ran an experiment in Google Chrome which integrated a post-quantum key-agreement primitive (NewHope) with a standard, elliptic-curve one (X25519). Since that time, the submissions for the 1st round of NISTs post-quantum process have arrived. We thus wanted to consider which of the submissions, representing the new state of the art, would be most suitable for future work on post-quantum confidentiality in TLS.
In TLS 1.2, the client offers possible cipher suites in its initial flow, the server selects one and sends a public-key in its reply, then the client completes the key-agreement in its second flow. With TLS 1.3, the client offers several possible public-keys in its initial flow and the server completes one of them in its reply. Thus, in a TLS 1.3 world, the larger post-quantum keys will be sent to every TLS server, whether or not theyll use it.
(There is a mechanism in TLS 1.3 for a client to advertise support for a key-agreement but not provide a public-key for it. In this case, if the server wishes to use that key-agreement, it replies with a special message to indicate that the client should try again and include a public-key because itll be accepted. However, this obviously adds an extra round-trip and we dont want to penalise more secure optionsat least not if we want them adopted. Therefore Im assuming here that any post-quantum key agreement will be optimistically included in the initial message. For a diagram of how this might work with a post-quantum KEM, see figure one of the Kyber paper. Also I'm using the term public-key here in keeping with the KEM constructions of the post-quantum candidates. It's not quite the same as a Diffie-Hellman value, but it's close enough in this context.)
In order to evaluate the likely latency impact of a post-quantum key-exchange in TLS, Chrome was augmented with the ability to include a dummy, arbitrarily-sized extension in the TLS ClientHello. To be clear: this was not an implementation of any post-quantum primitive, it was just a fixed number of bytes of random noise that could be si...
Take any two cells from your body and theres a good chance their genetic sequences will be a match. That is, unless you happen to have whats referred to in the medical literature as a tetragametic chimerism a condition that causes separate fertilised embryos to merge into a single body.
Once thought to be rare among humans, theres good reason to suspect we might be seeing a lot more of it in the future.
The truth is, nobody is really certain how many humans have cells in their body that once belonged to a sibling.
In the summer of 1935, the physicists Albert Einstein and Erwin Schrdinger engaged in a rich, multifaceted and sometimes fretful correspondence about the implications of the new theory of quantum mechanics. The focus of their worry was what Schrdinger later dubbed entanglement: the inability to describe two quantum systems or particles independently, after they have interacted.
Until his death, Einstein remained convinced that entanglement showed how quantum mechanics was incomplete. Schrdinger thought that entanglement was the defining feature of the new physics, but this didnt mean that he accepted it lightly. I know of course how the hocus pocus works mathematically, he wrote to Einstein on July 13, 1935. But I do not like such a theory. Schrdingers famous cat, suspended between life and death, first appeared in these letters, a byproduct of the struggle to articulate what bothered the pair.
The problem is that entanglement violates how the world ought to work. Information cant travel faster than the speed of light, for one. But in a 1935 paper, Einstein and his co-authors showed how entanglement leads to whats now called quantum nonlocality, the eerie link that appears to exist between entangled particles. If two quantum systems meet and then separate, even across a distance of thousands of lightyears, it becomes impossible to measure the features of one system (such as its position, momentum and polarity) without instantly steering the other into a corresponding state.
Its time to rethink the quest to control aging, death, and diseaseand the fear of mortality that fuels it.
I went to medical school, at least in part, to get to know death and perhaps to make my peace with it. So did many of my doctor friends, as I would find out. One dayusually when youre young, though sometimes laterthe thought hits you: You really are going to die. That moment is shocking, frightening, terrible. You try to pretend it hasnt happened (its only a thought, after all), and you go about your business, worrying about this or that, until the day you put your hand to your neckin the shower, sayand What is that? Those hard lumps that you know, at first touch, should not be there? But there they are, and they mean death. Your death, and you cant pretend anymore.
I never wanted to be surprised that way, and I thought that if I became a doctor and saw a lot of death, I might get used to it; it wouldnt surprise me, and I could learn to live with it. My strategy worked pretty well. Over the decades, from all my patients, I learned that I would be well until I got sick and that although I could do some things to delay the inevitable a bit, whatever control I had was limited. I learned that I had to live as if I would die tomorrow and at the same time as if I would live forever. Meanwhile, I watched as what had been called medical carethat is, treating the sickturned into health care, keeping people healthy, at an ever-rising cost.
If physicists do find that gravitational waves have travelled through dimensions other than the four we live in, it will be the start of a revolution in physics. But how close are we really?
Alzheimers gene is neutralised in human brain cells for the first time.
Just two copies of this gene can increase your risk 12-fold.
Have you ever questioned someones state of mind or reminded someone that it pays to be mindful? Maybe youve told someone that they needed to be more open-minded? Or perhaps youve felt like you need to find some peace of mind for yourself.
But have you ever wondered what exactly a mind is?
If you try, its quite difficult to define the concept. It is the center and stronghold of your being, the basis of your consciousness and without it can you even be considered to be truly alive? I have wondered many times about what and where it is.
NASA wants to go to Mars. SpaceX wants to go to Mars. Michio Kaku wants humanity to go to Mars so we can avoid extinction. The rest of us just want to see our species actually set foot on Mars. But first, the moon.
Think of the moon as a launchpad for the Red Planet. As LiveScience found out, Boeings Crew Space Transportation (CST)-100 Starliner is going to take advantage of our satellite as a blast-off point for the next frontier. Starliner (the name is about as sci-fi as you can get) is what happens when Boeing, which probably makes everyone think airplanes not spaceships, joins forces with NASA to develop a reusable space capsule that will be able to fly up to seven astronauts to the ISS. It will also be the worlds first commercial space vehicle.
Starliner is even autonomous. Meaning crews will spend less time on training and take off sooner. It only needs one astronaut to fly it, or more like assist it in flight, using tablets and touch screens.
Machines dont actually have bias. AI doesnt want something to be true or false for reasons that cant be explained through logic. Unfortunately human bias exists in machine learning from the creation of an algorithm to the interpretation of data and until now hardly anyone has tried to solve this huge problem.
A team of scientists from Czech Republic and Germany recently conducted research to determine the effect human cognitive bias has on interpreting the output used to create machine learning rules.
The teams white paper explains how 20 different cognitive biases could potentially alter the development of machine learning rules and proposes methods for debiasing them.
A solar storm is forecast to hit Earth Tuesday after the sun unleashed a powerful solar flare a burst of high-energy radiation.
Texas-based NanoRacks is fine-tuning and rebranding its concept for turning upper-stage rocket boosters into orbital outposts, starting with a habitat called Independence-1.
The discovery of an 88,000-year-old human finger fossil in the Nefud Desert in northern Saudi Arabia is changing the way researchers think about the migration of early humans.
The Federal Communications Commission's proposed ban on Huawei and ZTE gear in government-funded projects will hurt small Internet providers' efforts to deploy broadband, according to a lobby group for rural ISPs.
As previously reported, FCC Chairman Ajit Pai's proposal would prevent Universal Service Fund (USF) money from being used to buy equipment or services from companies that "pos[e] a national security risk." If the FCC approves the proposal, the ban is most likely to prevent the purchase of equipment from Chinese technology vendors Huawei and ZTE. But it could also affect other companies and technology from other countries, depending on how the FCC determines which companies pose national security threats.
ISPs who use federal money to build or expand broadband service would end up with fewer options for buying network gear. This would "irreparably damage broadband networks (and limit future deployment) in many rural and remote areas throughout the country," the Rural Wireless Association (RWA) told the FCC in a filing yesterday.
The RWA represents rural wireless Internet providers that offer home or mobile Internet service and have fewer than 100,000 subscribers. A recent Wall Street Journal report said that small ISPs rely on Huawei gear more than large telcos do.
Lawmakers Urge AT&T to Cut Ties With Huawei
U.S. Government Reportedly Wants to Build a 5G Network to Thwart Chinese Spying
U.S. Intelligence Agency Heads Warn Against Using Huawei and ZTE Products
The U.S. Intelligence Community's Demonization of Huawei Remains Highly Hypocritical
What does it take to build a quantum computer? Lots of exotic supercooled hardware. However, creating a simulator isnt nearly as hard and can give you a lot of insight into how this kind of computing works. A simulator doesnt even have to be complicated. Heres one that exists in about 150 lines of Python code.
You might wonder what the value is. After all, there are plenty of well-done simulators including Quirk that we have looked at in the past. Whats charming about this simulator is that with only 150 lines of code, you can reasonably read the whole thing in a sitting and gain an understanding of how the different operations really affect the state.
One thing to note is that the 150 lines quoted includes comments, so the actual code bulk is even less. The majority of the program handles the quantum register and a generic way to apply a matrix to the quantum state. That leaves most of the operations as just simple definitions of matrices. For example:
# Hadamard Gate 'H': np.multiply(1. / np.sqrt(2), np.matrix([ [1, 1], [1, -1] ])),
Using the simulator involves writing more Python code, so really this is a library more than a simulator like Quirk. For example, heres part of the example code included:
############################################# # Swap 2 Qubits # ############################################# # Here, We Will Apply a Pauli-X Gate / NOT Gate # To the first qubit, and then after the algorithm, # it will be swapped to the second qubit. Swap = QuantumRegister(2) # New Quantum Register of 2 qubits Swap.applyGate('X', 1) # Apply The NOT Gate. If Measured Now, it should be 10 # Start the swap algorithm Swap.applyGate('CNOT', 1, 2) Swap.applyGate('H', 1) Swap.applyGate('H', 2) Swap.applyGate('CNOT', 1, 2) Swap.applyGate('H', 1) Swap.applyGate('H', 2) Swap.applyGate('CNOT', 1, 2) # End the swap algorithm print('SWAP: |' + Swap.measure() + '>') # Measure the State, Should be 01
Zuckerberg announced Friday that the company will "require people who manage large pages to be verified," meaning they will have to provide the company, and by extension the US government, with their real names and locations.
[...] Zuckerberg added that the move would involve the hiring of thousands of additional censors and "security" personnel. "In order to require verification for all of these pages and advertisers, we will hire thousands of more people," he wrote.
Read more of this story at SoylentNews.
The latest update to Privacy Badger brings a new onboarding process and other improvements. The new onboarding process will make Privacy Badger easier to use and understand. These latest changes are just some of the many improvements EFF has made to the project, with more to come!
Join EFF and millions of users in the fight to regain your privacy rights!
Privacy Badger was created with the objective of protecting users from third-party tracking across the weball users. To do this, Privacy Badger needed a couple of key features:
Privacy Badger uses heuristics, meaning it observes and learns who is tracking you
For the first purpose, Privacy Badger uses heuristics, meaning it observes and learns who is tracking you rather than maintaining a manual list of trackers. Even if there is a third-party tracker that is rather unknown, or new, Privacy Badger will see that tracker. If your Privacy Badger sees the tracker three times, it will block that tracker so you don't have to wait for someone to eventually update that list. It's also a matter of trustPrivacy Badger blocks by behavior and not by a third-party controlled list that might be sold to advertisers.
Second, we try to make Privacy Badger simple and informative. Your Privacy Badger learns on its own and displays a badge showing how many trackers it has seen. If it breaks a websites functionality, you can quickly disable Privacy Badger on that site.
When you install Privacy Badger, it doesn't block anything immediately because it needs to learn. This is a unique functionality, so many users first reaction to Privacy Badger when they first install it is that it doesn't work. We explained this in our FAQ and Onboarding pages, but weve improved those pages to make it clear for everyone.
To fix this, the new onboarding is simple and points out some essentials on how Privacy Badger works, what to do when something breaks, and what it means to join the team of millions of Badgers. Its...
Why does Facebook have patents to listen (eavesdrop) through the microphone for ambient sound if they are only using it for uploading your video? My live feed of the Congress hearings cut out right near the end, but did anyone ask these questions?
Periodic ambient waveform analysis for enhanced social functions is a patent to listen to ambient waveforms e.g. stuff around you
In 2014 ambient patent (filed 2011)
Client devices periodically capture ambient audio waveforms, generate waveform fingerprints, and upload the fingerprints to a server for analysis. The server compares the waveforms to a database of stored waveform fingerprints, and upon finding a match, pushes content or other information to the client device. . Facebook Eavesdropping Patent 2014 8706499
(ambient means sound around you eg what you are watching on TV, if you are in the movies etc)
And if your friends are around you (the term voice waveform fingerprint seems to be voice mapping)
Thus a clients location may be enhanced if the location of users whose fingerprints match the clients is known. 8706499
yeah turn off location tracking, go to the pub with friends, and presto, your location is tracked.
Periodic ambient waveform analysis for dynamic device configuration is a patent for modifying your phone
Particular embodiments of the special purpose client application hosted on a mobile device of a user may be configured to continuously or periodically capture ambient audio waveform data using a microphone or sensor subsystem in the mobile d...
U.S. President Donald Trumps $1.3 trillion government spending bill, signed March 23rd, offered 2,323 pages of budgeting on issues ranging from domestic drug policy to defense. The last-minute rush to fund the U.S. government through this all-or-nothing omnibus presented legislators with a golden opportunity to insert policies that would escape deep public scrutiny. Case in point: the Clarifying Lawful Use of Overseas Data (CLOUD) Act, whose broad ramifications for undermining global privacy should not be underestimated, was snuck into the final pages of the bill before the vote.
Between the U.S. CLOUD Act and new European Union (EU) efforts to dismantle international rules for cross-border law enforcement investigations, the United States and EU are racing against one another towards an unfortunate finish-line: weaker privacy protections around the globe.
The U.S. CLOUD Act allows the U.S. President to enter into executive agreements with qualifying foreign governments in order to directly access data held by U.S. technology companies at a lower standard than required by the Constitution of the United States. To qualify, foreign governments would need to be certified by the U.S. Attorney General, and meet certain human rights standards set in the act. Those qualifying governments will have the ability to bypass the legal safeguards of the Mutual Legal Assistance Treaty (MLAT) regime.
In addition, U.S. law enforcement agencies (from local police to federal agents) can now compel U.S. and foreign technology companies to disclose communications data of U.S. and foreign users that is stored overseas, regardless of the datas physical location, potentially bypassing the countries privacy and data protection laws. Permitting the U.S. access to data which can be located anywhere sets a dangerous precedent for other countries, who are likely to demand similar access to data held in the United States. Such expansion of U.S. law enforcement power breaks the principle of territoriality, the core component of international law, and will produce a domino effect of information requests that overstep responding countries privacy safeguards.
Leaked documents obtained by the...
A tech investor reportedly met with senior Facebook officials last month on behalf of GOP mega-donor Rebekah Mercer and pitched the company on an independent investigation into Cambridge Analytica and the 2016 presidential election. The March...
Adobe and Microsoft each released critical fixes for their products today, a.k.a Patch Tuesday, the second Tuesday of every month. Adobe updated its Flash Player program to resolve a half dozen critical security holes. Microsoft issued updates to correct at least 65 security vulnerabilities in Windows and associated software.
The Microsoft updates impact many core Windows components, including the built-in browsers Internet Explorer and Edge, as well as Office, the Microsoft Malware Protection Engine, Microsoft Visual Studio and Microsoft Azure.
The Malware Protection Engine flaw is one that was publicly disclosed earlier this month, and one for which Redmond issued an out-of-band (outside of Patch Tuesday) update one week ago.
That flaw, discovered and reported by Googles Project Zero program, is reportedly quite easy to exploit and impacts the malware scanning capabilities for a variety of Microsoft anti-malware products, including Windows Defender, Microsoft Endpoint Protection and Microsoft Security Essentials.
Microsoft says by default, Windows 10 receives updates automatically, and for customers running previous versions, we recommend they turn on automatic updates as a best practice. Microsoft doesnt make it easy for Windows 10 users to change this setting, but it is possible. For all other Windows OS users, if youd rather be alerted to new updates when theyre available so you can choose when to install them, theres a setting for that in Windows Update. In any case, dont put off installing these updates too long.
Facebook CEO Mark Zuckerberg offered a vehement defense of his company on Tuesday during a lengthy Senate hearing, the first time the chief of the nations largest social media company has ever appeared before a congressional panel.The 33-year-old...
In April 2018, the Pokmon website known as Smogon announced they'd suffered a data breach. The breach dated back to September 2017 and affected their XenForo based forum. The exposed data included usernames, email addresses, genders and both bcrypt and MD5 password hashes.
In wake of recent privacy scandals in the tech world, Valve is now offering new privacy settings for Steam users...
Danko Nikolic joins our blog team with the post "Robots Go Mental". Danko Nikolic joins our blog team with the post "Robots Go Mental".
Notes brought to a Senate hearing by Facebook CEO Mark Zuckerberg on Tuesday reportedly suggested that he anticipated lawmakers to ask whether he planned to resign from the company amid questions about its handling of users' data.The notes, captured...
With the in-development Linux 4.17 kernel there is the long-awaited discrete GPU support in good shape at least for hardware like Polaris and Fiji. While the latest and greatest AMD GPUs are the Vega family, more work has been needed for AMDKFD support. Unfortunately those Vega changes didn't make it in for Linux 4.17, but those patches are now available...
Overnight Tech: Zuckerberg grilled by lawmakers over data scandal | What we learned from marathon hearing | Facebook hit with class action lawsuit | Twitter endorses political ad disclosure bill | Uber buys bike share "IndyWatch Feed Tech"
ZUCKERBERG ON THE HILL: Facebook CEO Mark Zuckerberg testified for the first time before Congress Tuesday facing lawmakers during a joint hearing of the Senate Commerce and Judiciary committees.Senators grilled him on the controversy...
Armor-Piercing Bullet Turned to Dust When Fired at Composite Metal Foam
Essentially a metal sponge consisting of hollow metal beads within solid metal, composite metal foam (CMF) generally retains some physical properties of its base materials. While its defining characteristic is ultra-high porosity, CMF boasts 5 to 6 times greater strength as well as over 7 times higher energy absorption than previously developed metal foams. Typically created by melting aluminum around hollow metal spheres, it is impressively 70% lighter than sheet metal and 80 times more energy absorbent than steel.
The foam is claimed to be non-toxic, resistant to radiation, fire and heat resistant.
Youtube video (13 seconds) https://www.youtube.com/watch?v=lWmFu-_54fI
Related video (2:30) demonstrates automotive and other applications https://www.youtube.com/watch?v=7uE_f9rXLlk
Slightly different coverage at https://newatlas.com/metal-foam-bullets/42731/
Another Youtube video, demonstrating an explosion - https://youtu.be/yMVEQh5Akcc
Read more of this story at SoylentNews.
Facebooks first reactions to the Cambridge Analytical headlines looked very different from the now contrite promises Mark Zuckerberg made to the U.S. Congress this week. Look closer, though, and you'll see a theme running through it all. The message coming from Facebooks leadership is not about how it has failed its users. Instead it's about how users and especially developers have failed Facebook, and how Facebook needs to step in to take exclusive control over your data.
You may remember Facebook's initial response, which was to say that whatever Cambridge Analytica had gotten away with, the problem was already solved. As Paul Grewal, Facebook's deputy general counsel, wrote in that first statement, "In the past five years, we have made significant improvements in our ability to detect and prevent violations by app developers" Most significantly, he added, in 2014 Facebook "made an update to ensure that each person decides what information they want to share about themselves, including their friend list. This is just one of the many ways we give people the tools to control their experience. "
By the time Zuckerberg had reached Washington, D.C., however, the emphasis was less about users controlling their experience, and more about Facebooks responsibility to make sure those outside Facebooknamely developers and userswere doing the right thing.
A week after Grewal's statement, Zuckerberg made his first public comments about Cambridge Analytica. "I was maybe too idealistic on the side of data portability, he told Recode's Kara Swisher and Kurt Wagner. Going forward, preventing future privacy scandals "[is] going to be solved by restricting the amount of data that developers can have access to."
In both versions, the fault supposedly lay with third parties, not with Facebook. But Mark Zuckerberg has made it clear that he now takes a broader view of Facebook's responsibility. As he said in his Tuesday testimony to Congress:
We didn't take a broad enough view of our responsibility... It's not enough to just connect people, we have to make sure that those connections are positive. It's not enough to just give people a voice, we ne...
If youre working with audio in an embedded environment, the best option for years now has been the Teensy 3 microcontroller board. This choice has mostly been due to its incredible power and audio libraries, but until now we really havent seen a stompbox-style interface that used the Teensy to its fullest extent. Now we have, in [Wolkstein]s GitSynth, everything you could want in a synthesizer that processes the signals from an electric guitar.
The core of this build is a Teensy 3, and all the audio goodies that come with that. Also included is a USB MIDI and audio interface, smartly both attached to a panel-mount USB-B connector on the back of the stompbox. Other controls include a single mono in jack for guitars and synths, two mono out jacks for stereo-ish output, a bunch of footswitches for bypass, tap tempo, preset selection, a jack for an expression pedal, and some buttons to move around the LCD user interface.
While putting a powerful microcontroller in a stomp box for is a project weve seen many times, this project really shines with the MIDI GUI thats built for a device with a real display and a mouse. [Wolkstein] built a PyQt-based app for this synth, and its a plethora of buttons and sliders that looks similar enough to a real synthesizer. Theres enough configurability here for anyone.
You can check out the demo video (in German, but auto-translate subtitles exist) below.
Thanks [Mynaru] for the tip!
The Catalog of Missing Devices is a tour through some of the legitimate, useful and missing gadgets, tools and services that don't exist but should. They're technologies whose chance to exist was snuffed out by Section 1201 of the Digital Millennium Copyright Act of 1998, which makes tampering with "Digital Rights Management" into a legal no-go zone, scaring off toolsmiths, entrepreneurs, and tinkerers.
We're still adding our own designs to the Catalog, but we've also been honored by EFF supporters who've come up with their own additions. One such supporter is Dustin Rodriguez, who sends us these five great ideas for future entries. If you have great ideas for additions, send them to me and maybe you'll see them here on Deeplinks!
A new Illinois bill would strip residents of critical protection of their biometric privacy, including their right to decide whether or not a business may harvest and monetize data about their faces and fingerprints. Given the growing public outrage over how Facebook and Cambridge Analytica handled sensitive user data, this is the wrong time to reduce privacy protections.
The existing Illinois Biometric Information Privacy Act (BIPA) is the strongest law of its kind in our country. Among the key measures that protect our rights:
Our biometrics are easy to capture. Once captured, we generally cannot change our biometrics, unlike our credit card numbers, or even our names. Databases of biometric information are ripe targets for data thieves. Thats why EFF strongly supports Illinois BIPA as a necessary means to protect our biometric privacy from intrusion by private entities.
The new Illinois bill (S.B. 3053) would create broad new exemptions from BIPA, and thus greatly reduce the biometric privacy of all Illinoisans. For example, it would exempt face recognition...
Reddit announced Tuesday that it has found nearly 1,000 accounts suspected to be linked to a Russian troll farm.Reddit CEO Steve Huffman, writing under the username spez, wrote that the platform had identified 944 accounts suspected...
Google has published code and details for VR180, a video/photo format intended for simpler devices to capture or display content for virtual reality:
For Google's VR180 to become successful, manufacturers and developers have to be onboard, creating devices and churning out videos and apps that use the format. That's why the tech giant is now opening it up to hardware-makers and devs by publishing the remaining details on how they can start engaging with the format and offer VR180 products. When Google-owned platform YouTube introduced VR180 last year, it introduced the format as a way for creators to shoot immersive photos and videos for VR headsets that still have a normal perspective when viewed on a phone or PC.
From Google's blog:
For VR180 video, we simply extended the Spherical Video Metadata V2 standard. Spherical V2 supports the mesh-based projection needed to allow consumer cameras to output raw fisheye footage. We then created the Camera Motion Metadata Track so that you're able to stabilize the video according to the camera motion after video capture. This results in a more comfortable VR experience for viewers. The photos that are generated by the cameras are written in the existing VR Photo Format pioneered by Cardboard Camera.
Good news for the stereoscopic 3D imaging enthusiasts out there.
Can you get hacked just by clicking on a malicious link or opening a website? YES. Microsoft has just released its April month's Patch Tuesday security updates, which addresses multiple critical vulnerabilities in its Windows operating systems and other products, five of which could allow an attacker to hack your computer by just tricking you visit a website. Microsoft has patched five
Did Cambridge Analytica had access to your Facebook data? This new
This is a post from HackRead.com Read the original post: How to know if your Facebook data was shared with Cambridge Analytica?
Sen. Ted Cruz (R-Texas) grilled Facebook CEO Mark Zuckerberg on Tuesday over what the Republican senator described as broad concerns that the company has censored conservative accounts and content.Zuckerberg defended Facebook as a platform for...
While it could have been pretty much assumed up until now that Red Hat Enterprise Linux 8 would ship without Python 2 considering that next enterprise Linux OS release isn't even out yet, its long-term maintenance support, and Python 2 reaching EOL at the start of 2020, but now it's been made official...
Submitted via IRC for SoyCow9228
For one brave man, eating one of the hottest peppers in the world came with an unexpected side effect: Days of splitting headaches that prompted a trip to the emergency room.
The unusual case, detailed in The BMJ on Monday, began immediately after the 34-year-old man took part in a chili pepper eating contest. He ate a Carolina Reaper, the pepper christened as the world's hottest by the Guinness Book of World Records in 2013 (though there have been several unofficial challengers to the title since).
Immediately after eating the pepper, he started dry heaving. Then he felt excruciating neck pain that soon radiated throughout his entire head. For the next several days, he would experience short but incredibly painful bursts of head pain known as thunderclap headaches. The episodes got so bad that he eventually visited the ER.
Thankfully, a brain scan didn't reveal any major neurological issues, such as a bulged blood vessel (aneurysm) or bleeding. But several of his arteries did appear to narrow significantly, a condition called reversible cerebral vasoconstriction syndrome (RCVS).
RCVS is known to cause thunderclap headaches, and can be brought on by reactions to drugs, including cocaine and certain antidepressants. No case of RCVS has ever been associated with pepper-eating, but the main ingredient that accounts for a pepper's spicinesscapsaicinis known to interact with our blood vessels, either by constricting or dilating them, the doctors noted. And cayenne peppers have been rarely linked to heart attacks or suddenly constricted arteries near the heart.
The Carolina Reaper was the world's hottest pepper at the time of the incident, but two varieties have surpassed it unofficially: Dragon's Breath, developed by Neal Price, NPK Technology, and Nottingham Trent University for anesthetic research, and Pepper X, created by the breeder of the Carolina Reaper, Ed Currie.
EFF has been writing about the upcoming European Digital Single Market directive on copyright for a long time now. But it's time to put away the keyboard, and pick up the phone, because the proposal just got worseand it's headed for a crucial vote on June 20-21.
The European Copyright Directive was enacted in 2001 and is now woefully out of date. Thanks in large part to the work of Pirate Party MEP Julia Reda, many good ideas for updating European copyright law were put forward in a report of the European Parliament in July 2015. The European Commission threw out most of these ideas, and instead released a legislative proposal in October 2016 that focused on giving new powers to publishers. That proposal was referred to several of the committees of the European Parliament, with the Parliament's Legal Affairs (JURI) Committee taking the lead.
As the final text must also be accepted by the Council of the European Union (which can be considered as the second part of the EU's bicameral legislature), the Council Presidency has recently been weighing in with its own "compromise" proposals (although this is something of a misnomer, as they do little to improve the Commission's original text, and in some respects make it worse). Not to be outdone, German MEP (Member of the European Parliament) Axel Voss last month introduced a new set of his own proposals [PDF] fo...
Facebook CEO Mark Zuckerberg said Tuesday that special counsel Robert Mueller has interviewed Facebook employees as part of his investigation into Russian election interference.The social media executive also said he believes the company may...
When life hands you the worlds smallest chainsaw, whats there to do except make it even more ridiculous? Thats what [JohnnyQ90] did when he heavily modified a mini-electric chainsaw with a powerful RC car engine.
The saw in question, a Bosch EasyCut with Nanoblade technology, can only be defined as a chainsaw in the loosest of senses. Its a cordless tool intended for light pruning and the like, and desperately in need of the [Tim the Toolman Taylor] treatment. The transmogrification began with a teardown of the drivetrain and addition of a custom centrifugal clutch for the 1.44-cc nitro RC car engine. The engine needed a custom base to mount it inside the case, and the original PCB made the perfect template. The original case lost a lot of weight to the bandsaw and Dremel, a cooling fan was 3D-printed, and a fascinatingly complex throttle linkage tied everything together. With a fuel tank hiding in the new 3D-printed handle, the whole thing looks like it was always supposed to have this engine. The third video below shows it in action; unfortunately, with the engine rotating the wrong direction and no room for an idler gear, [JohnnyQ90] had to settle for flipping the bar upside down to get it to cut. But with some hacks its the journey that interests us more than the destination.
This isnt [JohnnyQ90]s first nitro rodeo hes done nitro conversions on a cordless drill and a Dremel before. You should also check out his micro Tesla turbine, too, especially if you appreciate fine machining.
Thanks for the tip, [Altome].
Spring is in the air and the new issue of 2600 should be in your hands. If it's not, we can help alleviate this. The easiest way is to subscribe, which you can do on our subscription page for printed copies. If you have a Kindle and want to have issues magically appear there, simply click on the U.S. or U.K. Kindle subscription page and you'll have the new issue within seconds. It doesn't end there. You can also subscribe through Google Play or the Nook all over the planet. And for a full listing of all of our digital options, simply go to our digital edition guide, which is constantly being updated.
And remember: all of these issues can be taken outdoors so you can enjoy the spring weather.
Facebook CEO Mark Zuckerberg on Tuesday kicked off his inaugural appearance before lawmakers on Capitol Hill by apologizing for his companys recent missteps.Its clear now that we didnt do enough to prevent these tools from being used for harm,"...
Facebook pays millions of dollars every year to researchers and bug hunters to stamp out security holes in its products and infrastructure, but following Cambridge Analytica scandal, the company today launched a bounty program to reward users for reporting "data abuse" on its platform. The move comes as Facebook CEO Mark Zuckerberg prepares to testify before Congress this week amid scrutiny
Posted by Yves Younan on Apr 10Dear all,
A vulnerability affecting emergency alert systems supplied by ATI Systems, one of the leading suppliers of warning sirens in the USA, could be exploited remotely via radio frequencies to activate all the sirens and trigger false alarms. We first found the vulnerability in San Francisco, and confirmed it in two other US locations including Sedgwick County, Wichita, Kansas, Balint Seeber, Director of Threat Research at Bastille, told Help Net Security. Although we have not visited More
The post Emergency alert systems used across the US can be easily hijacked appeared first on Help Net Security.
Confusion and erratic enforcement at the US communications agency is sending satellite makers abroad Illustration: IEEE Spectrum
When officials at the Federal Communications Commission (FCC) denied launch authorization for four innovative satellites from startup Swarm Technologies last December, the agency was unequivocal as to the reason. The applicant proposes to deploy and operate four spacecraft that are smaller than 10 centimeters in one of their three dimensions, read a letter to Swarms CEO and founder Sara Spangelo. These spacecraft are therefore below the size threshold at which detection by the Space Surveillance Network can be considered routine.
The FCC was worried about collisions in space, where even the smallest objects traveling at orbital velocities can inflict massive damage on satellites or, in a worst-case scenario, manned spacecraft. It thought Swarms SpaceBees satellites, measuring 10 by 10 by 2.5 cm, would be just too small to track.
When Swarm launched them anyway, on an Indian rocket in January, the FCC was furious. It rescinded permission for the companys next satellite launch, due later this month, and questioned whether Swarm was a suitable company to hold a communications license at all. If the FCC comes down hard on Swarm, the companys ambitious plans for a constellation of Internet of Things communications satellites could be doomed.
So why did Swarm take such a risk in launching its SpaceBees, or even building them in the first place? Perhaps because the FCCs position on small satellites has been bizarrely inconsistent.
An investigation by IEEE Spectrum has revealed that the FCC licensed multiple satellites smaller than 10 cm over the past five years, including some as small as 3.5 by 3.5 by 0.2 cm. But the commission has also changed its mind from one application to the next, refusing launch permission for satellites that were virtually identical to ones previously authorized. This uncertainty has led to at least one satellite maker exporting his technology rather than risk being denied a license in the U.S.
The Smaller, the Better
Most satellites are essentially smartphones in space. They have sensors such as cameras and magnetometers to gather data, radio transmitters and receivers for communication, processors to crunch the numbers, and batteries to power everything. And like smartphones, satellites have benefited from decades of technological advances such as those whose progres...
There are old CPU architectures being dropped from the Linux 4.17 kernel while also some new CPU support added. The latest work added with the busy Linux 4.17 development cycle is support for the MIPS-based Microsemi Ocelot SoCs...
IBM aims to boost quantum computing startups, but warns of a long revenue desert Illustration: iStockphoto
IBM is betting on quantum computing, but it cant win without the help of startups. And how long it will take for the bet to pay off is anybodys guess.
That was the message of the Q Summit, a one-day meeting of quantum computing researchers, investors, and entrepreneurs hosted by IBM in Menlo Park, Calif., last week.
We need startups in the quantum space, said Joe Raffa, director of IBM Ventures. Theres a huge amount of work to do, he said, to cross the long revenue desert.
The potential is big, but the risks are huge.
There are really only 15 or 20 people in the world who will make or break quantum computing, said Matt Johnson, CEO of QC Ware, a startup that is building a commercial software package for quantum computing.
Quantum computing was ten years away 20 years ago, said Vijay Pande, general partner at Andreessen Horowitz, and it still is. But eventually, he said, it will make a leap and take the computing world by surprise.
For generation after generation, the quantum computer will be way slower than the classic machine, he said. But its rate of evolution is hyper exponential, so suddenly, in some n years, it will jump over the classic machine. The real question is when will this transition happen.Its hard to talk about the market if I dont even know what the algorithms are. Vijay Pande, Andreessen Horowitz
He had some predictions along that ten-year timeline. Within 10 years, for certain limited disciplines, he says, quantum computers will dominate. New algorithms will be developed to use themalgorithms that arent currently being developed for classic computers because it would be pointless to run them. Why? They would be just too slow.
But, he said, this all makes it very difficult to address quantum computing as a venture capitalist. Its hard to talk about the market if I dont even know what the algorithms are.
A top physicist says the construction of a "factory" to produce Higgs boson particles is a priority for the science community. In an exclusive interview, Nigel Lockyer, head of America's premier particle physics lab, said studying the Higgs could hasten major discoveries. He said momentum in the physics community was gathering for a machine to be built either in Europe or Asia. "Our field uniformly agrees that would be a good thing," he told the BBC. The Fermilab director added: "The Higgs is such an interesting particle - a unique particle."
[...] Physicists had hoped that the LHC would turn up evidence of physics phenomena not explained by the Standard Model. So far, efforts to detect new physics have come away empty-handed, but studying the Higgs in more detail might break the impasse.
A successor to the Large Hadron Collider would be designed in a way that allows scientists to zero in on the Higgs boson. The LHC works by smashing beams of proton particles together, but the collisions that produce the Higgs also produce many other particles. This makes it complicated to work out which collisions produce the Higgs boson. A different type of particle smasher, called an electron-positron collider, should produce only a Higgs and another particle called a Z boson.
This makes it more suitable for detailed study of the Higgs' properties. Dr Lockyer said there were currently discussions over a new electron-positron collider in China, and a linear collider that could function as a Higgs factory in Japan. Alternatively, it could be housed at Cern after the Large Hadron Collider comes to the end of its operating lifetime. [...] But he stressed that there was still plenty to come from the LHC, which will undergo a major upgrade in the 2020s.
Read more of this story at SoylentNews.
If Techcrunch is to be believed, our skies will soon be filled with delivery robots, ferrying tacos and Chinese food and Amazon purchases from neighborhood-area dispatch stations to your front door. All of this is predicated on the ability of quadcopters to rapidly recharge their batteries, or at the very least swap out batteries automatically.
For their Hackaday Prize entry, [frasanz], [ferminduaso], and [david canas] are building the infrastructure that will make delivery drones possible. Its a drone supercharger, or a robot that grabs a drone, swaps out the battery, and sends it off to deliver whatever is in its cargo compartment.
This build is a droneport of sorts, designed to have a drone land on it, have a few stepper motors and movable arms spring into action, and replace the battery with a quick-change mechanism. This can be significantly more difficult than it sounds you need to grab the drone and replace the battery, something thats easy for human eyes and hands, but much harder for a few sensors and aluminum extrusion.
To change batteries, the team is just letting the drone land somewhere on a platform thats a few feet square. Arms then move it, pushing the drone to the center, and a second arm then moves in to swap the battery. The team is using an interesting locking cam solution to clamp the battery to the drone. Its much easier for a machine to connect than the standard XT-60 connector found on race quads.
Is this the project the world needs? Quite possibly so. Drones are going to be awesome once battery life improves. Until then, well have to live with limited flight times and drone superchargers.
Some of the most popular music videos on YouTube, including the worlds most popular YouTube video Despacito has been hacked.
Popular videos of pop stars like Shakira, Drake, Selena Gomez, Adele, Taylor Swift, and Calvin Harris were replaced by hackers that spread the message Free Palestine.
Despacito, the Luis Fonsis mega-hit that was watched five billion times was replaced by an image of a group of armed men dressed in hooded sweatshirts that appeared to come from the Spanish series Money Heist.
The videos were hacked by a duo calling themselves Prosox and KuroiSH.
All the hacked videos are on singers accounts belonging to the VEVO platform that is owned by a group of some of the biggest music corporations.
According to YouTube, the problem doesnt affect its platform but Vevo.
After seeing unusual upload activity on a handful of Vevo channels, we worked quickly with our partner to disable access while they investigate the issue, a YouTube spokesperson said.
Vevo confirmed a security breach on systems.
We are working to reinstate all videos affected and our catalog to be restored to full working order. We are continuing to investigate the source of the breach, it said in a statement.
The alleged hacker @ProsoxW3b started posting severs Tweets first saying it has hacked for fun and not for profit.
While AMD has plumbed in FreeSync variable-rate refresh support with their AMDGPU DC display code stack, it's not yet all happy on the open-source mainline kernel as the missing piece has been over having a unified API for the Direct Rendering Manager drivers that can be used for supporting Free-Sync or the VESA-approved AdaptiveSync or HDMI VRR (Variable Refresh Rate). The discussion over having this common API for DRM drivers is back to being discussed...
Hundreds of robotics events are taking place all over the country this week Image: IEEE Spectrum; Robot cards: National Robotics Week IEEE Spectrum teams up each year with iRobot and Georgia Tech's Institute for Robotics & Intelligent Machines (IRIM) to create a set of trading cards featuring 10 famous robots and their creators. Check out the 2018 deck!
In 2010, the U.S. House of Representatives passed resolution H.Res. 1055 to make the second week of April officially National Robotics Week. Now celebrating its eighth year, National Robotics Week is more national and more robotics-y than ever, with hundreds of events taking place all over the country.
We know that most of you live robotics every single day anyway (as you should), and so National Robotics Week might not seem like its worth celebrating, but what about your friends and family who have no idea how cool robots are, and who maybe have no idea what it is that you actually, you know, do? Fundamentally, NRW is all about celebrating how cool robotics is, and getting as many people involved as possiblethink about finding an event near you that looks like fun, and then dragging someone along who doesnt (yet) understand why robotics is the best thing ever. Theyll either thank you for it, or think youre crazy, but its a win either way, right?
You can find out whats going on at the National Robotics Week website, here. If you cant find something near you, that just means that you need to start planning to host your own NRW event next year. And dont forget, weve partnered with NRW to make a brand-new set of robot trading cards, which you can get here.
This ones kinda hard to swallow so take a deep breath, open your minds, and pretend its 2100. I CONTACT is essentially a mouse fitted to your eyeball. The lens is inserted like any other normal contact lens except its laced with sensors to track eye movement, relaying that position to a receiver connected to your computer. Theoretically that should give you full control over a mouse cursor. Id imagine holding a blink correlates to mouse clicks.
The idea was originally created for people with disabilities but anyone could use it. Those of us too lazy to use a mouse now have a free hand to do whatever it is people do when they sit at the computer for endless hours. I love the idea but there is a caveat. How is the lens powered? Perhaps in the future, electrical power can be harnessed from the human body, just not in a Matrix creepy-like way.
Designers: eun-gyeong gwon & eun-jae lee.
next is an advanced smart transportation system based on swarms of modular self-driving vehicles, refined by italian designers and engineers. the modules can drive autonomously on regular roads, joining themselves and detach even when in motion. when joined, the doors between modules fold, creating a walkable open space among modules. founded by tommaso gecchelin, the concept would greatly outperform conventional transportation when used in conjunction with other modules. the collection of next modules would improve traffic fluidity, commute time, running costs and pollution prevention by optimizing each module occupancy rate.
once linked, passengers would be able to walk between modules
the modules would be individualized
shipping and goods transportation could be adapted
companies would offer specific modules to the system piotr boruslawski I designboom.
Anything that keeps people from getting hit is important.
When the light turns red, a huge laser wall projecting apparitions of crossing pedestrians spans across the crosswalk. The concept is designed to keep crossing pedestrians safe from any overzealous drivers who otherwise might have ran the red light.
Kyle over at HiFormance is back with more amazing deals for us, this time even better then the last. We have enjoyed the positive feedback from our readers in regards to HiFormance and we look forward to listing them more!
Heres a note from the company
Its been a great year so far for us at HiFormance and we
appreciate the LowEndBox community for all your support and
feedback! Since we launched last year and sustained exponential
growth, we have expanded our service & support across the
nation and continue to do so each day! We want to give our
customers a unique experience with the highest level of performance
and customer service. Signing up with HiFormance means becoming
apart of a network of specialists and hosting enthusiasts that
ultimately give you the best presence on the web. Welcome to
HiFormance, how can we further enhance your hosting
(Just submit a ticket and include the resource you choose to be doubled.)
Heres the offer:
Universities Educating Students on Cybersecurity by Simulating Fake Phishing Attacks.
This is a post from HackRead.com Read the original post: Students fell prey to phishing attacks conducted by their universities
Security experts at Bastille have devised a new technique, dubbed SirenJack to remotely hack emergency warning systems.
Emergency warning systems are used worldwide to alert the public of emergency situations like natural disasters and strikes.
False alarms cause widespread concern and increasing distrust in these systems, particularly as seen in 2017 after the Dallas Siren incident that set off over 150 tornado warning sirens citywide for more than 90 minutes. reads the website published by experts.
SirenJack is a vulnerability found in ATI Systems emergency alert systems that can be exploited via radio frequencies (RF) to activate sirens and trigger false alarms. The radio protocol used to control the sirens is not secure (activation commands are sent in the clear no encryption is used). continues the Bastille.
Ill-intentioned could trigger false alarms to cause panic and chaos among the population.
Researchers say they have discovered a new attack method that allows hackers to remotely trigger sirens. The SirenJack method leverages a vulnerability that resides in emergency alert systems made by ATI Systems.
These systems are widely adopted, it is quite easy to find them in military facilities and industrial plants.
The issue is related to the implementation of unsecured radio protocol controls.
The researcher Balint Seeber started its analysis back in 2016, he focused its researcher on San Franciscos outdoor public warning systems.
The warning systems had been using RF communications, the experts discovered that was possible to issue commands without encryption, allowing a man-in-the-middle attacker to forge them.
It was a joke for attackers to identify the radio frequency used by the targeted siren and send issue a specially crafted message that triggers an alarm.
A single warning siren false alarm has the potential to cause widespread panic and endanger lives, explained Chris Risley, CEO of Bastille Networks. Bastille informed ATI and San Francisco of the vulnerability 90 days ago, to give them time to put a patch in place. Were now...
Common Dreams reports
Environmental and indigenous groups are cheering after Kinder Morgan announced Sunday [April 8] it was halting most work on its controversial Trans Mountain expansion pipeline project, citing continuing opposition. Map of proposed route
"This is a sign that organizing works, and it could well be the beginning of the end for this dangerous pipeline", declared Clayton Thomas-Muller, a Stop-it-at-the-Source campaigner with 350.org.
"This is huge", added British Columbia-based advocacy group Dogwood.
In the company's statement announcing the move, chairman and CEO Steve Kean said Kinder Morgan was suspending "all non-essential activities and related spending" as a result of the "current environment" that puts shareholders at risk.
"A company cannot resolve differences between governments", he added, referencing resistance from B.C. lawmakers that is at odds with support for the project coming from Ottawa and neighboring Alberta. "While we have succeeded in all legal challenges to date, a company cannot litigate its way to an in-service pipeline amidst jurisdictional differences between governments", Kean said.
Unless legal agreements are reached by May 31, Kean said that "it is difficult to conceive of any scenario in which we would proceed with the project". (There are still 18 pending court cases that could thwart the project, the Wilderness Committee notes.)
Read more of this story at SoylentNews.
If you were to create a short list of women who influenced software engineering, one of the first picks would be Margaret Hamilton. The Apollo 11 source code lists her title as PROGRAMMING LEADER. Today that title would probably be something along the line of Lead software engineer
Margaret Hamilton was born in rural Indiana in 1936. Her father was a philosopher and poet, who, along with grandfather, encouraged her love of math and sciences. She studied mathematics with a minor in philosophy, earning her BA from Earlham College in 1956. While at Earlham, her plan to continue on to grad school was delayed as she supported her husband working on his own degree from Harvard. Margaret took a job at MIT, working under Professor Edward Norton Lorenz on a computer program to predict the weather. Margaret cut her teeth on the desk-sized LGP-30 computer in Nortons office.
Hamilton soon moved on to the SAGE program, writing software which would monitor radar data for incoming Russian bombers. Her work on SAGE put Margaret in the perfect position to jump to the new Apollo navigation software team.
The Apollo guidance computer software team was designed at MIT, with manufacturing d...
Car manufacturers, like most companies, navigate a narrow lane between the benefits of using free and open-source software and the perceived or real importance of hiding their trade secrets. Many are using free software in some of the myriad software components that make up a modern car, and even work in consortia to develop free software. At the recent LibrePlanet conference, free-software advocate Jeremiah Foster covered progress in the automotive sector and made an impassioned case for more free software in their embedded systems.
Subscribers can read on for a report on the talk by guest author Andy Oram.
A serious vulnerability has been exposed in "emergency alert systems" that could be exploited remotely via radio frequencies to activate all the sirens, allowing hackers to trigger false alarms. The emergency alert sirens are used worldwide to alert citizens about natural disasters, man-made disasters, and emergency situations, such as dangerous weather conditions, severe storms, tornadoes
NVIDIA has rolled out an exciting beta Linux driver today, the first in their upcoming 396 driver series...
With today's release of the Feral GameMode library/daemon of course I am running some benchmarks... Here is some initial numbers while this has spurred some fresh benchmarks looking at the P-State vs. CPUFreq performance and their respective frequency scaling governor options...
Few people following the controversial topic of Internet piracy will be unaware of the site-blocking phenomenon. Its now one of the main weapons in the entertainment industries arsenal and its affecting dozens of countries.
While general figures can be culled from the hundreds of news reports covering the issue, the manner in which blocking is handled in several regions means that updates arent always provided. New sites are regularly added to blocklists without fanfare, meaning that the public is kept largely in the dark.
Now, however, a submission to the Canadian Radio-television and Telecommunications Commission (CRTC) by Motion Picture Association Canada provides a more detailed overview. It was presented in support of the proposed blocking regime in Canada, so while the key figures are no doubt accurate, some of the supporting rhetoric should be viewed in context.
Over the last decade, at least 42 countries have either adopted and implemented, or are legally obligated to adopt and implement, measures to ensure that ISPs take steps to disable access to copyright infringing websites, including throughout the European Union, the United Kingdom, Australia, and South Korea, the submission reads.
The 42 blocking-capable countries referenced by the Hollywood group include the members of the European Union plus the following: Argentina, Australia, Iceland, India, Israel, Liechtenstein, Malaysia, Mexico, Norway, Russia, Singapore, South Korea, and Thailand.
While all countries have their own unique sets of legislation, countries within the EU are covered by the requirements of Article 8.3 of the INFOSEC Directive which provides that; Member States shall ensure that rightholders are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe a copyright or related right.
That doesnt mean that all countries are actively blocking, however. While Bulgaria, Croatia, Cyprus, Czech Republic, Estonia, Hungary, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Poland, Romania, Slovakia, and Slovenia have the legal basis to block infringing sites, none have yet done so.
In a significant number of other EU countries, however, blocking activity is prolific.
To date, in at least 17 European countries, over 1,800 infringing sites and over 5,300 domains utilized by such sites have been blocked, including in the following four countries where the positive impact of site-blocking over time has been demo...
More than half of your body is not human, say scientists.
Human cells make up only 43% of the bodys total cell count. The rest are microscopic colonists.
Understanding this hidden half of ourselves our microbiome is rapidly transforming understanding of diseases from allergy to Parkinsons.
NASA has just released an all-new 4K-resolution video showing the surface of the moon in incredible detail. Created using data gathered over the last nine years, the five-minute presentation shows our nearest neighbor like youve never seen it before.
Wow, I would love to stay here!
The Aurora Station, the worlds first luxury space hotel, orbiting 200 miles above the earth, is looking for guests.
Theres a place you can go on vacation where the sun rises and sets 16 times a day, the stars are clearer than youve ever seen, and there are only a handful of people around for miles and mileshundreds of miles, in fact.
Okay, if youve got some spare time, check out this amazing website called Stuff in Space. Its a simulation of every satellite (alive or dead), space station, and large piece of space junk orbiting the Earth right now.
You can zoom in and out, rotate the Earth and its satellites around. Pick any one object and discover more information about it. Or just leave it running and watch all the objects buzz around in real time. Humans have been busy launching a lot of stuff, and its only going to increase.
The simulation was made by James Yoder, an incoming Electrical and Computer Engineering freshman at the University of Texas at Austin, and its based on data supplied by Space Track, which is a service of the Joint Space Operations Center. They have a bunch of handy data feeds and APIs that you can use track orbital objects, but Ive never seen anything as creative as this.
Recent research into human hormones may shed some light on the future of artificial intelligence development. Our complicated emotional states may be nothing more than a byproduct of learning.
A simultaneous imaging and energy harvesting sensor is in the news. Samuel Moore at IEEE Spectrum informed readers that a team of four from University of Michigan published their paper describing what they achieved. They built a prototype sensor, and what it does-think of a future camera that just about watches you non-stopis described in the journal, IEEE Electron Device Letters.
The article is titled Simultaneous Imaging and Energy Harvesting in CMOS Image Sensor Pixels. The four authors are from University of Michigan: Sung-Yun Park, Kyuseok Lee, Hyunsoo Song and Euisik Yoon.
Their technology puts the equivalent of a solar cell under each pixel, said IEEE Spectrum.
Kazan, Russia, April 2325.
2325 April 2018 in Kazan (Russia) will be a biogerontological conference with the following main topics:
- Epigenetic mechanisms of aging
- Genomics, metabolomics, proteomics of longevity in humans and animals.
- Environment and aging
- Biomarkers of biological age
- Pharmacological interventions in aging.
- Mechanisms of regeneration.
ReactOS 0.4.8 is now available as the project's first update of 2018 that continues working on becoming an "open-source Windows" with binary drop-in compatibility support...
Mechanical engineers at the University of California, Riverside, have reported success in using inexpensive materials to produce thermoelectric devices that transform low-level waste heat into electricity.
Their advance could enable a wide variety of commercial applications. For example, integrating thermoelectric generating devices into computer chips could enable the heat they produce to provide a power source. Waste heat from automobile engines could run a cars electronics and provide cooling. Photovoltaic solar cells could be made more efficient by harnessing the heat from sunlight striking them to generate more electricity.
Also, using the same basic technology, economical thermoelectric refrigerators could be produced that would be more energy efficient and with fewer moving parts than refrigerators that use compressors and coolant. Current thermoelectric refrigerators are expensive and relatively inefficient. In essence, they operate in reverse of thermoelectric generators, with an electric current applied to generate a temperature gradient that could be used in cooling.
In its early life, the Earth would have been peppered nearly continuously by asteroids smashing into our young planet. These fiery collisions made our world what it is today. It may seem like things have changed since then, given the vast assortment of life and wide blue oceansand things have indeed changed. At least in some respects. However, Earth still receives thousands of tons of matter from space, but this is in the form of microscopic dust particles (as opposed to recurrent, energetic collisions).
Fortunately, in modern times, a large asteroid colliding with the surface of the Earth happens only very rarely. Nevertheless, it does happen from time to time.
As most are probably already aware, it is widely believed that an asteroid initiated the dinosaurs extinction some 65 million years ago. And more recently, the Russian Chelyabinsk meteor hit our planet in February of 2013. It entered at a shallow angle at 60 times the speed of sound. Upon contact with our atmosphere, it exploded in an air burst. The size of this body of rock (before it burned up and shattered) is estimated to be around 20 meters (across) and it weighed some 13,000 metric tons.
In a study of Lookout users, more than half clicked mobile phishing URLs that bypassed existing security controls. Since 2011, Lookout has observed this mobile phishing URL click rate increase 85 percent year-over-year. Mobile devices have eroded the corporate perimeter, limiting the effectiveness of traditional network security solutions like firewalls and secure web gateways, said Aaron Cockerill, chief strategy officer at Lookout. Operating outside the perimeter and freely accessing not just enterprise apps and SaaS, More
Fluorescent dye not only highlights but also kills cancer stem cells.
Korean and Singaporean scientists have recently proposed a new probe to detect cancer stem cells, and it might be an effective seek-and-destroy weapon against a variety of cancer types.
In a paper published in the journal Angewandte Chemie earlier this month, the researchers describe a fluorescent dye that they created to highlight cancer stem cells, and, as it turns out, the dye does more than thatit may actually be lethal to the cells it binds to .
Cancer stem cells in brief
Cancer stem cells (CSCs, also known as TICs, tumor-initiating cells) are exactly what they sound like; they are cancerous cells that exhibit stem cell-like abilities to self-renew and differentiate into the other cell types found in a given tumor. Discovered at the end of the 90s, these cells are the real culprit behind cancerous growth, being able to give rise to both to other CSCs and cells that, while non-tumorigenic themselves, are still part of a tumorthey descend from a cancer stem cell but do not have the same ability to divide uncontrollably. This is according to the CSC model of cancer; according to the stochastic model, it might be possible that every cell in a tumor has the ability to self-renew and differentiate, not only cancer stem cells, and the truth might be not so clear-cut, with some tumors following one model and others following the other .
Linux computer manufacturer System76 made its mark in part because of its commitment to open source principles and doing what it believes is right. Last year it released its homegrown Linux, Pop!_OS. In early March, System76 founder Carl Richell tweeted about the companys plans to locate its computer manufacturing factory in Denver, Colorado. By moving its manufacturing from China to the United States, System76 is offering more proof that its not afraid to buck prevailing tech norms to do things the System76 way.
My laptop named angela is (was?) a Thinkpad x120e (ThinkWiki). Its a netbook model (although they branded it a Ultraportable), which meant back then that it was a small, wide, slim laptop with less power, but cheaper. It did its job: I carried it through meetings and conferences all over the world for 7 years now. I also used it as a workstation for a short time in 2016-2017 when marcos stopped being a workstation and turned solely into a home cinema.
Via: USA Today: Members of the House and Senate committees that will question Facebook CEO Mark Zuckerberg about user privacy protection next week are also some of the biggest recipients of campaign contributions from Facebook employees directly and the political action committee funded by employees. The congressional panel that got the most Facebook contributions is 
The term DAO, or decentralized autonomous organization, is relatively new. When mentioned in the company of blockchain enthusiasts, however, it tends to invoke excited speculation about whether DAOs will render the traditional hierarchal organizational model obsolete through the means of smart contracts. Such a revolution would negate the need for managerial decision-making, thereby consigning the concept of the C-Suite to a similar fate as the horse and cart.
While the development of blockchain technology has certainly brought such possibilities closer to fruition, attempts to develop DAOs to the point of overtaking traditional organizational structures have been problematic thus far. However, one company DAOstack is developing innovative solutions to these problems, implementing what it says will be the Wordpress for DAOs.
Before elaborating on the problems of DAOs and the solutions presented by DAOstack, it is worth considering a more prosaic question. What is the problem with traditional corporate structures, that the implementation of a DAO could solve?
Any company operating in todays competitive market seeks growth in order to deliver greater value to its stakeholders. While growth can ensure a competitive edge, it also comes with the challenge of balancing the interests of an ever-increasing stakeholder population.
The advent of the Internet enabled huge developments in connectivity, which in turn enabled the exchange of information and data in real-time. Rapid corporate globalization thus became a reality. Even with these technological developments, however, large organizations with huge stakeholder groups have continued to struggle with the balance of agile decision-making against the need for speedy growth.
With the advent of blockchain technology, distributed public ledgers are now being accepted as a global means of establishing trust and consensus. The Ethereum blockchain expanded the distributed ledger functionality that was introduced by Bitcoin to include a code execution machinery.
This machinery enables the development of decentralized applications known as apps alongside the algorithmic enforcement...
Photographers Gavin Heffernan and Harun Mehmedinovic of SKYGLOW have made and released a composited video to illustrate what New York City would look like if there were no light pollution blocking out the night sky.
The 3-minute video is in honor of the upcoming Dark Sky Week. Dark Sky Week is coming up from April 15th through the 21st this year. SKYGLOW is an ongoing project that raises awareness for endangered night skies and shows the dangers of light pollution.
Read more of this story at SoylentNews.
With the fine work needed for surface-mount technology, most of the job entails overcoming the limits of the human body. Eyes more than a couple of decades old need help to see whats going on, and fingers that are fine for manipulating relatively large objects need mechanical assistance to grasp tiny SMT components. But where it can really fall apart is when you get the shakes, those involuntary tiny muscle movements that we rarely notice in the real world, but wreak havoc as we try to place components on a PCB.
To fight the shakes, you can do one of two things: remove the human, or improve the human. Unable to justify a pick and place robot for the former, [Tom] opted to build a quick hand support for surface-mount work, and the results are impressive considering its built entirely of scrap. Its just a three-piece arm with standard butt hinges for joints; mounted so the hinge pins are perpendicular to the work surface and fitted with a horizontal hand rest, it constrains movement to a plane above the PCB. A hole in the hand rest for a small vacuum tip allows [Tom] to pick up a part and place it on the board he reports that the tackiness of the solder paste is enough to remove the SMD from the tip. The video below shows it in action with decent results, but we wonder if an acrylic hand rest might provide better visibility.
Not ready for your own pick and place? Thats understandable; not every shop needs that scale of production. But we think this is a great idea for making SMT approachable to a wider audience.
Facebook and Cambridge Analytica were hit with a class-action lawsuit on Tuesday, just hours before Mark Zuckerberg is slated to testify to Congress about how the political consulting firm managed to improperly obtain data on 87 million Facebook...
Uber is set to acquire an electric bike-sharing start-up, the company announced on Monday.Uber CEO Dara Khosrowshahi said in an online post that it has reached an agreement to buy JUMP Bikes, which currently operates in San Francisco and Washington...
An advocacy group on Tuesday filled the lawn in front of the Capitol building with cutouts of Facebook CEO Mark Zuckerberg to protest the tech leader ahead of his congressional testimony. Avaaz, which identifies itself as a global advocacy...
Security updates have been issued by CentOS (libvorbis and thunderbird), Debian (pjproject), Fedora (compat-openssl10, java-1.8.0-openjdk-aarch32, libid3tag, python-pip, python3, and python3-docs), Gentoo (ZendFramework), Oracle (thunderbird), Red Hat (ansible, gcc, glibc, golang, kernel, kernel-alt, kernel-rt, krb5, kubernetes, libvncserver, libvorbis, ntp, openssh, openssl, pcs, policycoreutils, qemu-kvm, and xdg-user-dirs), SUSE (openssl and openssl1), and Ubuntu (python-crypto, ubuntu-release-upgrader, and wayland).
MIT Media Lab researchers call it AlterEgo headset. Though it sounds
This is a post from HackRead.com Read the original post: Mind-Reader Headset Transfers Your Thoughts On Screen with 90% Accuracy
The Verge is reporting:
Microsoft is releasing the source code for its original Windows File Manager from nearly 28 years ago. While it's a relic from the past, you can still compile the source code Microsoft has released and run the app on Windows 10 today.
The source code is available on GitHub, and is maintained by Microsoft veteran Craig Wittenberg under the MIT license. Wittenberg copied the File Manager code from Windows NT 4 back in 2007, and has been maintaining it before open sourcing it recently. It's a testament to the backward compatibility of Windows itself, especially that this was originally included in Windows more than 20 years ago.
A port of Microsoft's File Manger made its first appearance in OS/2 1.1 and then became the primary file manager in Windows 3.0.
Read more of this story at SoylentNews.
This unholy lovechild of a cheap solder sucker and an even cheaper soldering iron is the HBTool HB-019 desoldering iron. It came to me for the princely sum of five pounds ($7). So for somewhere between the cost of a pint of foaming ale and the pubs pie and mash Id eat alongside it, what had I got?
Regular Hackaday readers will be familiar with my penchant for ordering cheap tools and other electronic gizmos from the usual suppliers of Far Eastern tech, and subjecting them to review for your entertainment and edification. Sometimes the products are so laughably bad as to be next-to-worthless, other times they show enough promise to be of use, and just occasionally they turn out to be a genuine diamond in the rough, a real discovery. This is no precious stone, but it still makes for an entertaining review.
Taking the unit out of its blister pack, I had what looked like a slight...
Information security is an enabler for business. This has been a mantra for some time, and although it is repeated at major conferences, the reality is that the lack of good security practices is more a disabler. Take for example the recent Facebook woes, one recent Facebook woes, analysis suggests that the #DeleteFacebook movement reached a peak of 60,000 mentions on Twitter. If we calculate the estimated average revenue per user, this equates to a More
The post Information security can enable business as soon as we change the conversation appeared first on Help Net Security.
Positive Technologies has released a new report with statistics on the success rates of social engineering attacks, based on the 10 largest and most illustrative pentesting projects performed for clients in 2016 and 2017. To verify the security of corporate systems, testers imitated the actions of hackers by sending emails to employees with links to websites, password entry forms, and attachments. In total, 3,332 messages were sent. If the attacks had been real, 17 percent More
Sen. Ed Markey (D-Mass.) plans to release new legislation Tuesday that would force internet companies such as Facebook, Twitter and Google to get clear permission from consumers about collecting their data.The legislation, aimed at tackling data...
In addition to the overhauled/rewritten Windows support, the upcoming Phoronix Test Suite 8.0-Aremark is also featuring much better support for the BSDs. As part of that testing, here are some fresh benchmarks of FreeBSD and TrueOS...
Mark Zuckerberg will begin his marathon testimony before lawmakers in Washington on Tuesday in what is likely to be a blockbuster hearing and a make-or-break moment for the Facebook CEO.Zuckerberg will testify before lawmakers on the...
The zinc yarn battery works when knotted, stretched, cut, and washed Image: American Chemical Society
Researchers have shaped a rechargeable zinc-ion battery into an elastic yarn that churns out power when bent, stretched, washed with water, and even cut.
The zinc yarn battery could be woven into washable sensor-laden smart clothes and integrated into commercial textiles to power wearable displays, electronics, and medical implants.
The yarn joins a line-up of innovative flexible energy-generating and -storing devices that can be integrated into power fabrics. The list includes solar cell ribbons that can be woven into fabrics, knittable supercapacitors, and power-generating yarns that harvest mechanical energy or the triboelectric effect to generate power.
Some researchers have tried to make flexible versions of the workhorse zinc-manganese alkaline battery because of its proven high capacity, low cost, and safety. But these flexible versions have had low capacities. Plus these primary batteries cant be recharged. But researchers have recently come up with high-performance rechargeable zinc-ion batteries.Illustration: American Chemical Society Schematic diagram of fabrication and encapsulation of the yarn ZIB
Chunyi Zhi of the City University of Hong Kong and his colleagues made their thread-like rechargeable zinc battery by twisting carbon nanotube fibers into yarn. They coat one piece of yarn with zinc to make an anode and another with manganese dioxide to serve as a cathode. Then they wind the two yarn pieces on an elastic fiber, soak it with a commonly used water-absorbing gel, and encase the device in elastic silicone and a water repellant....
In what seems to be a hacker attack, the music video of the hit song Despacito, which had more than five billion views on YouTube has been removed.
The original clips had been posted by Vevo, a music video hosting service that is a collaboration between the big three record companies, Universal Music Group (UMG), Sony Music Entertainment (SME) and Warner Music Group (WMG). Other Vevo channels of artists like Shakira, Selena Gomez, Adele Chris Brown, Maroon 5, Drake and Taylor Swift, were also inaccessible.
For those unaware, the Spanish-language hit Despacito released in January 2017, and went on to break several records in music streaming, including one for the single with the most weeks at No.1 in the U.S., with 16 consecutive weeks. It also became the most-streamed song in the world after reaching 4.6bn plays.
Meanwhile, the Despacito video has been removed, but its cover image shows pictures of five animated and masked people pointing guns at the camera. The hackers, who call themselves Prosox and Kuroish, used the online moniker of KuroiSH and had written Free Palestine below the videos.
The BBC reports that a Twitter account probably belonging to one of the hackers posted: Its just for fun, I just use [the] script youtube-change-title-video and I write hacked.
Dont judge me I love YouTube, it added.
Both YouTube and Vevo have been contacted to comment on the issue.
The post Despacito YouTube video has been hacked and deleted appeared first on TechWorm.
Jim Gettys refutes the claim that the early designers of Internet software were not concerned about security. "Government export controls crippled Internet security and the design of Internet protocols from the very beginning: we continue to pay the price to this day".
Apple yesterday officially announced the launch of the new generation of iPhones, the iPhone 8 and iPhone 8 Plus (PRODUCT) RED Special Edition.
The iPhone 8 and iPhone 8 Plus will be enclosed in glass with a matching aluminum band and a black front. Both the iPhones will sport Retina HD display and will be powered by an A11 Bionic chip, which is specifically designed to enhance the augmented reality (AR) experience. The iPhone 8 Plus features dual 12MP cameras, which are capable of taking photos in Portrait mode with Portrait Lighting, bringing dramatic studio lighting effects to iPhone, allowing customers to capture stunning portraits with a shallow depth of field effect in five different lighting styles.
In addition, Apple also introduced a new (PRODUCT) RED iPhone X leather folio case crafted from finished European leather for $99, which will be available for purchase from today.
The aim of launching the red variants of the iPhone 8 and 8 Plus is to support (RED), an organization that raises awareness and funds to help combat HIV/AIDS.
This special edition (PRODUCT)RED iPhone features a stunning red and black color combination and also offers customers the opportunity to make an impact in fighting the spread of HIV and AIDS, said Greg Joswiak, Apples vice president of Product Marketing.
A portion of all proceeds from the products goes to the Global Fund HIV/AIDS grants, which provide testing, counseling, treatment and prevention programs with a specific focus on eliminating transmission of the virus from mothers to their babies.
Since partnering with (RED) in 2006, Apple has donated more than $160 million to the Global Fund, making it the organizations largest corporate donor.
Todays announcement is further evidence of Apples leadership in and commitment to the AIDS fight since the beginning of (RED) in 2006, said Deborah Dugan, (RED)s CEO. The more than $160 million Apple has donated in the last 11 years today equates to more than 800 million days of life-saving ARV medication that prevents the transmission of HIV from mothers to their babies. Were honored that Apple has dedicated its resources to our purpose, and cant wait to see customers bring our mission to life through the purchase of iPhone 8 and iPhone 8 Plus (PRODUCT) RED Special Edition.
The iPhone 8 and iPhone 8 Plus (PRODUCT) RED Special Edition will be available in 64GB and 256GB models with a starting price of $699. Starting today, the iPhones are available to order online in select countries and regions and in stores beginning April 13.
The iPhones will start arriving in stores on April 13 in Australia, Canada, China, Franc...
A massive cyber attack took offline the entire government infrastructure of the Caribbean island Sint Maarten. it is a constituent country of the Kingdom of the Netherlands.
Government building remained closed after the attack.
The Ministry of General Affairs hereby informs the public that the recovery process of the Government of Sint Maarten ICT Network is progressing steadily and will continue throughout the upcoming weekend following the cyber-attack on Monday April 2nd reported the media.
According to the local media, The Daily Herald a cyber attack hit the country on April 2nd, the good news is that yesterday the government services were resumed with the exception of the Civil Registry Department.
According to the authorities, this is the third attack in over a year, but at the time of writing, there are no public details on the assault.
The system was hacked on Easter Monday, the third such
attack in over a year. No further details about the hacking have
been made public by government.
The Ministry thanked the people of St. Maarten for their patience during this period. continues the announcement.
Below the announcement made by the Government on Facebook.
The incident demonstrates the importance of a cyber strategy for any government, in this case, hacked shut...
There are many reasons why healthcare institutions have poor cybersecurity: most resources go towards providing patient care and not enough is left for cybersecurity; not all hospitals have a dedicated cybersecurity team; cybersecurity policies and authentication procedures are difficult to implement due to many users who rotate within the hospital, and more. In a recent paper, though, Trend Micro researchers zeroed in on two particular risks these organizations are susceptible to and they dont feel More
Posted by Stefan Kanthak on Apr 10Hi @ll,
Posted by Simon Bieber on Apr 10Affected Products
Caltech scientists have created a strain of bacteria that can make small but energy-packed carbon rings that are useful starting materials for creating other chemicals and materials. These rings, which are otherwise particularly difficult to prepare, now can be "brewed" in much the same way as beer.
The bacteria were created by researchers in the lab of Frances Arnold, Caltech's Linus Pauling Professor of Chemical Engineering, Bioengineering and Biochemistry, using directed evolution, a technique Arnold developed in the 1990s. The technique allows scientists to quickly and easily breed bacteria with the traits that they desire. It has previously been used by Arnold's lab to evolve bacteria that create carbon-silicon and carbon-boron bonds, neither of which is found among organisms in the natural world. Using this same technique, they set out to build the tiny carbon rings rarely seen in nature.
"Bacteria can now churn out these versatile, energy-rich organic structures," Arnold says. "With new lab-evolved enzymes, the microbes make precisely configured strained rings that chemists struggle to make."
Read more of this story at SoylentNews.
Posted by Moritz Muehlenhoff on Apr 10-------------------------------------------------------------------------
Posted by Simon Bieber on Apr 10Affected Products
Posted by Mark Cox on Apr 10Various OSS projects I've been involved with use a master vulnerability
A majority of Americans say tougher government regulations are needed to rein in the power of Facebook and other social media companies, according to a CBS News/YouGov poll released Tuesday.About 60 percent of voters told pollsters that...
When implementing DevOps initiatives, the word continuous is the key to success. Most Agile schemes today incorporate concepts and strategies that can and should be implemented at all times throughout the SDLC. The most important to recognize throughout your teams development cycle are Continuous Integration (CI), Continuous Testing (CT) and Continuous Delivery (CD).
The official YouTube account of Vevo video hosting giant has
This is a post from HackRead.com Read the original post: Vevo YouTube account hacked; popular celebs affected Despacito video deleted
More than 80 percent of organizations that have been impacted by a data breach have introduced a new security framework and 79 percent have reduced employee access to customer data, according to new benchmark data, 2018 Global Payments Insight Survey: Bill Pay Services, from ACI Worldwide and Ovum. The benchmark, comprised of responses from executives at billing organizations such as consumer finance, healthcare and higher education, also revealed that over 70 percent of organizations that More
The post Steps executives are taking to increase security while launching new ways to pay appeared first on Help Net Security.
The original seed project for CNCF was Kubernetes, as orchestration is a critical piece of moving toward a cloud-native infrastructure.
Posted by Christian Brabandt on Apr 10FWIW: The vim poc has been "fixed" as of
These days, conversations about Java tend to center around Oracle and Google fighting it out in court. But back in 1996, Sun was the keeper of Java and promoted it heavily. They even released a diskless workstation that only runs Java applets. The Sun JavaStation was affectionately called the Mr. Coffee and [Cameron Gray] wants to show you how it worked and whats inside of it.
A single screw frees the innards from the small case. Inside looks like a dense PC from the era, although the parts inside are a far cry from a typical PC. The CPU was a 110 MHz microSPARC II soldered directly to the motherboard. The four RAM slots could take up to 64 megabytes of PC RAM.
Unlike Suns full-blown workstations, the JavaStation took standard PC peripherals. For example, the monitor connection is a standard VGA and there are normal PS/2 keyboard and mouse ports. The driver for this box was price, so having cheap commodity I/O was a selling point.
[Camerons] JavaStation had lost its configuration, so he had to use a serial terminal to reset some key parameters. After that, the machine was able to boot itself over its network connection. The operating system is no surprise JavaOS.
By the way, if you happen to have one of these boxes, they can run Linux. Turns out running Linux makes the box faster than the original JavaOS and offers better software choices, too. You can see Corel Office, for example, running on the box and [Cameron] says the slow loading of applications and performance was the chief complaint among users.
Facebook should adopt stringent EU data protection rules as a global "baseline" for all of the social network's services, consumer activists say in an open letter that contends the rules will help ensure the company is accountable and transparent.
The Transatlantic Consumer Dialogue, a coalition of US and European consumer groups, called on CEO Mark Zuckerberg to adopt the EU's General Data Protection Regulation to govern his company's platform. The sweeping regulation, known by the abbreviation GDPR, gives Europeans more control over their personal data and compels companies to notify consumers of data breaches within 72 hours. It also expands the types of information that are considered personal data.
"The GDPR provides a solid foundation for data protection, establishing clear responsibilities for companies that collect personal data and clear rights for users whose data is gathered," TCD said in its letter. "These are protections that all users should be entitled to no matter where they are located."
[...] In its letter, the Transatlantic Consumer Dialogue suggested the GDPR represents the gold standard in data protection, telling Zuckerberg that "there is simply no reason for your company to provide less than the best legal standards currently available to protect the privacy of Facebook users."
It urged Zuckerberg to express his commitment "to global compliance with GDPR and provide specific details on how the company plans to implement these changes" in his Congressional testimony.
[...] Facebook declined to comment for this story, but executives have previously commented on GDPR and similar subjects.
Read more of this story at SoylentNews.
While Sci-Hub is loved by thousands of researchers and academics around the world, copyright holders are doing everything in their power to wipe if off the web.
The publisher was further granted a broad injunction, requiring various third-party services to stop providing access to the site. This includes domain registries, hosting companies and search engines.
Soon after the order was signed, several of Sci-Hubs domain names became unreachable as domain registries and Cloudflare complied with the court order. Still, Sci-Hub remained available all this time, with help from several newly registered domain names.
Frustrated by Sci-Hubs resilience, ACS recently went back to court asking for an amended injunction. The publisher requested the authority to seize any and all Sci-Hub domain names, also those that will be registered in the future.
Plaintiff has been forced to engage in a game of whac-a-mole whereby new sci-hub domain names emerge, ACS informed the court.
Further complicating matters, some registries, registrars, and Internet service providers have refused to disable newer Sci-Hub domain names that were not specifically identified in the Complaint or the injunction
Soon after the request was submitted, US District Court Judge Leonie Brinkema agreed to the amended language.
The amended injunction now requires search engines, hosting companies, domain registrars, and other service or software providers, to cease facilitating access to Sci-Hub. This includes, but is not limited to, the following domain names.
sci-hub.ac, scihub.biz, sci-hub.bz, sci-hub.cc, sci-hub.cf, sci-hub.cn, sci-hub.ga, sci-hub.gq, scihub.hk, sci-hub.is, sci-hub.la, sci-hub.name, sci-hub.nu, sci-hub.nz, sci-hub.onion, scihub22266oqcxt.onion, sci-hub.tw, and sci-hub.ws.
Posted by Tomer Brisker on Apr 10An information disclosure vulnerability was discovered in the host power
The latest driver optimization work by Timothy Arceri on Valve's Linux GPU driver team has been working on function inlining within NIR rather than within the GLSL IR optimizations. The net result is faster NIR compile times that benefit the Intel OpenGL driver and also help with RadeonSI Gallium3D...
Ahead of this month's Rise of the Tomb Raider Linux release, Feral Interactive has released a new system tool for Linux called GameMode...
Summary: The European Patent Office (EPO) decides to grant a patent to Oil India Limited (OIL) and the Indian media goes insane
THE famous rejection of software patents in India is exactly the opposite of what has been happening at the EPO, more so under Battistelli. We quite like and very much appreciate Indias attitude towards patents; the country takes nothing for granted and actually assesses the impact of particular patent families on the general population. India is a software powerhouse and programmers reject software patents with almost no exception (none that were aware of).
Karry Lai, based in Hong Kong, said yesterday that [a]fter the retirement of Honble Justice K N Basha on May 13 2016, Indias Intellectual Property Appellate Board (IPAB) was almost non-functional for 19 months.
India is a software powerhouse and programmers reject software patents with almost no exception (none that were aware of).We covered this before. IPAB is only vaguely similar to PTAB in the US and BoA in Europe. Its a similar acronym, but they arent quite the same.
What was most curious, however, was yesterdays news in India. Even the English-speaking sites alone. Millions (or about a million per year) of patents get granted. Need there be a news article about each of these? Why did the Millennium Post decide to write a whole article about one? Authorities at European Patent Office (EPO) have communicated their decision to grant patent to Oil India Limited (OIL) for an invention titled A method for preventing wax deposition in oil wells with packers, it says. EnergyInfraPost said the same and so did...
If you have been using ZOL 0.7.7 that was released last month, you will want to upgrade right away to ZFS On Linux 0.7.8...
Posted by Jakub Wilk on Apr 10* Not Real , 2018-04-09, 13:35:
Fintech firms have exploded onto the financial scene in Singapore and other mature markets in Asia in recent times. Focusing on disruptive technologies like peer-to-peer lending, affordable digital payment solutions, and more accurate risk analysis among other things, these startups are winning over customers by replacing the service delivery model used by traditional banks with user-friendly technologies.
Fintechs are lowering the cost of customer acquisition by reducing processing costs, by improving user experience, and by developing stronger APIs that make collaboration with partner institutions easier. They are also offering their partners more points of acceptance of loan/credit card applications and access to more traffic without having to invest in new infrastructure setup.
Customers arent complaining either. Thats because they get curated content and information about credit cards, loans, and other financial products at one place. By leaving the grunt work to these fintechs, customers can simply focus on identifying the right product based on their need. With the help of filters, they can make the shortlisting process effortless and quick.
Have you ever heard about Crowdo, Capital Springboard, FundedHere, or MoolahSense? These are peer-to-peer online lending sites through which you can raise funds by sharing your story. These crowdfunding sites are revolutionising the alternative lending space through disintermediation, cost optimisation, quicker delivery, and technology modernisation.
There is no need for paperwork or running. The online mediator simply charges you a brokerage for letting you use their domain.
Players like Skolafund provide deserving students a chance to get funded by potential funders for pursuing education in an affordable manner. They can match profiles and ensure that the right student meets the right funder.
SMEs, often ignored by traditional banking channels, have found their go-to source for funds. Crowd Genie, which started in 2016, is helping SMEs get loans through crowdfunding.
Even for fintechs focused on traditional loans and credit cards, theyre releasing the hidden value in the delivery chain, benefiting all the stakeholders in the process.
If youre wondering, how information aggregator sites like BankBazaar are making a difference, here is your answer.
DragonFlyBSD 5.2 is now available as the latest installment of this popular BSD operating system...
Last month I wrote about Broadcom's Eric Anholt exploring the use of AMDGPU's DRM scheduler within the in-development Video Core V (VC5) DRM driver. That work has panned out and looks like it will eventually work out for this open-source Broadcom graphics driver...
Its time for folks from the 1990s to get nostalgic, as Microsoft has open sourced the Windows 3.0 File Manager released 28 years ago. This file manager was a replacement for managing files through MS-DOS, which allowed Windows users to copy, move, delete, and search for files.
Veteran Microsoft developer Craig Wittenberg, who had copied the code in 2007 from Windows NT 4, has been maintaining it privately under the MIT license before open sourcing it recently. The source code Microsoft has released can be compiled and even run on Windows 10.
Heres a portion of the projects README.md file:
original_plus tag: refers to the source for WinFile as of Windows NT4 with minimal changes so that it compiles with Visual Studio and runs on current Windows.
File Manager actually uses an MDI, or multiple-document interface, to display multiple folders within the main application window. Most of the MSFT open source stuff is either trash or completely unmaintained, one Hacker News reader noted following the release. Only a couple of high profile projects are maintained and they jam opt-out telemetry in if you like it or not (despite hundreds of comments requesting them to go away). Even Scott Hanselman getting involved in one of our tickets got it nowhere. Same strong arming and disregard for customers.
For those who are interested in reliving the 1990s, can just go to the GitHub page here to download the Windows File Manager for Windows 10.
Source: The Verge
The post Microsoft Open Sources the Original File Manager of the 90s appeared first on TechWorm.
Summary: An outline of Microsofts patent activities and the activities of its satellites, which pass around patents and sue Microsofts rivals through obscure trolls (set up solely for the purpose of these lawsuits)
THE worlds biggest troll feeder is Microsoft, which not only feeds (in the investment sense) Intellectual Ventures, the worlds largest patent troll that in turn feeds (with patents) Dominion Harbor. Dominion Harbor is suing a lot of companies through subsidiaries. Microsoft also fed (in the investment sense) Finjan, one of the most vocal patent trolls, which is also publicly traded (they had a meeting with shareholders a week ago, discussing their blackmail plans). This post will cover all these trolls and their feeders, assuring readers that Microsoft loves Linux as much as the Greek like Turks.
When the thugs from Microsofts IP subsidiary accuse an OEM of patent infringement they throw hundreds of patents at them in order to ensure they cannot challenge them all individually (or it would be vastly more expensive than just settling). This is racketeering.Yesterday we saw this Apple patents propaganda site saying that Microsoft Wins a Patent for a Possible Surface Branded Folding Smartphone with Sophisticated Camera System & more (more gimmicks).
Putting aside the fact that theres prior art all over this, what would be the purpose given that Microsoft barely sells anything in this space? When the thugs from Microsofts IP subsidiary accuse an OEM of patent infringement they throw hundreds of patents at them in order to ensure they cannot challenge them all individually (or it would be vastly more expensive than just settling). This is racketeering. Its also a deterrence against legal challenges to dubious patents.
Heres what the latest patent is about:
Novartis International AG has acquired AveXis, Inc. in order to gain access to its main drug, AVXS-101, a gene therapy treatment for spinal muscular atrophy, and bolster its gene therapy expertise. Novartis's CEO expects AVXS-101 to generate billions in sales:
Novartis AG agreed to acquire AveXis Inc. for $8.7 billion to gain a promising drug to treat a rare disease that afflicts infants, hastening a shift toward gene therapy and precision medicines. Shareholders of the Bannockburn, Illinois-based company will receive $218 a share in cash in a tender offer, Novartis said in a statement Monday. The price is 88 percent above where AveXis closed Friday.
The transaction is Novartis's second deal to advance in gene therapy this year -- and the first led by new Chief Executive Officer Vas Narasimhan. The Swiss drugmaker is redeploying some of the $13 billion in proceeds from the sale of its stake in a consumer-health joint venture to partner GlaxoSmithKline Plc to gain more firepower in prescription medicines before some of its existing best-sellers lose patent protection. "Our goal is to build on a core of medicines as a medicines company powered by data and digital," Narasimhan said in a conference call with investors. "A deal like this fits right in that sweet spot."
AveXis is developing a product to treat spinal muscular atrophy, an inherited neurodegenerative disease caused by a defect in a single gene, which shows the potential to become a blockbuster, according to Novartis.
About 1 in 10,000 people are affected by a type of spinal muscular atrophy. AVXS-101 currently has "breakthrough therapy" designation in the U.S.
Also at Reuters.
Read more of this story at SoylentNews.
Posted by Vladis Dronov on Apr 10Hello,
Posted by Gordo Lowrey on Apr 10I'm just gonna go out on a limb here, and say this is an unfounded
Pushing software patents even in Korea
Summary: The proponents of software patents (for personal financial reasons) carry on promoting HEVC, which is neither necessary nor beneficial; in fact, patents that it is built upon are software patents, which are almost entirely invalid (upon legal challenge)
THERES an abundance of free codecs these days. Multimedia can be properly encoded and compressed using Free (as in freedom as well as price) software. Ogg, VP8/9 and various other options exist with similar ones for real-time streaming. But there are those who want to pocket billions of dollars by pushing to the public typically through the World Wide Web patent-encumbered and nonfree formats/standards. This isnt a new problem, but it still needs tackling.
As we noted the other day, IAMs latest issue (magazine) contained HEVC boosting. see HEVC articles in Techrights (old and more recent) for background on this; its pretty nasty a substitute if not sequel for the MPEG thicket (enforced by a patent troll). Richard Lloyd, the software patents pusher, was flagrantly pushing HEVC yesterday. To quote:
As IAM has covered over the last few years, patent pools appear to be gaining in popularity, in part because the tough licensing environment has encouraged patent owners in particular to seek out ways to make the dealmaking process much more efficient. In the last couple of years we have seen the emergence of two new platforms Avanci and Velos Media focused on mobile technology in auto and the Internet of Things and video compression respectively, while others such as Via Licensing have overhauled their approach to emerging markets such as China.
At the end of March, security experts at Proofpoint discovered a Microsoft Office document exploit builder kit dubbed ThreadKit that has been used to spread a variety of malware, including banking Trojans and RATs (i.e. Trickbot, Chthonic, FormBook and Loki Bot).
The exploit kit was first discovered in October 2017, but according to the experts, crooks are using it at least since June 2017.
The ThreadKit builder kit shows similarities to Microsoft Word Intruder (MWI), it was initially being advertised in a forum post as a builder for weaponized decoy documents.
Just after its appearance, documents created with the ThreadKit builder kit have been observed in several campaigns.
Now threat actors are using the ThreadKit builder kit to target the recently patched CVE-2018-4878 Flash vulnerability, experts started observing exploit code samples in the wild a few days ago.
The vulnerability could be exploited by an attack by tricking victims into opening a document, web page or email containing a specially crafted Flash file.
According to the researcher Simon Choi the Flash Player flaw has been...
Leap Motion just dropped what may be the biggest tease in Augmented and Virtual Reality since Google Cardboard. The North Star is an augmented reality head-mounted display that boasts some impressive specs:
Yes, you read that last line correctly. The North Star will be open source hardware. Leap Motion is planning to drop all the hardware information next week.
Now that weve got you excited, lets mention what the North Star is not its not a consumer device. Leap Motions idea here was to create a platform for developing Augmented Reality experiences the user interface and interaction aspects. To that end, they built the best head-mounted display they could on a budget. The company started with standard 5.5 cell phone displays, which made for an incredibly high resolution but low framerate (50 Hz) device. It was also large and completely unpractical.
The current iteration of the North Star uses much smaller displays, which results in a higher frame rate and a better overall experience. The secret sauce seems to be Leaps use of ellipsoidal mirrors to achieve a large FOV while maintaining focus.
Submitted via IRC for fyngyrz
A year ago, I visited the Apple campus in Cupertino to figure out where the hell the new Mac Pro was. I joined a round table discussion with Apple SVPs and a handful of reporters to get the skinny on what was taking so long. The answer, it turns out, was that Apple had decided to start completely over with the Mac Pro, introduce completely new pro products like the iMac Pro and refresh the entire MacBook Pro lineup.
[...] In that discussion a year ago, Apple SVP Phil Schiller acknowledged that pro customers, including developers, were hungry for evidence that Apple was paying attention to their needs. "We recognize that they want to hear more from us. And so we want to communicate better with them. We want them to understand the importance they have for us, we want them to understand that we're investing in new Macs not only new MacBook Pros and iMacs but Mac Pros for them, we want them to know we are going to work on a display for a modular system," Schiller said.
[...] While there are no further details on the exact shape that the Mac Pro will take, Boger says they are still very much in the modular mindset. [...]What shape that modularity takes is another matter entirely, of course. I know some people have been pining for the days of internal expansion card configurations with standardized hardware and maybe that is the way that this will go. But on Tuesday I also got a tour of the editing suites where Mac hardware and software is pushed to the limits, including extensive use of eGPU support, and a different vision emerges.
[...] All we currently know about the Mac Pro is that it's modular and that it's being shaped by the feedback from those pros in-house, as well as external conversations with developers and professional users.
[...] As a side note, by the way, I wouldn't expect to see any more info about Mac Pro at WWDC in June. Maybe Apple will surprise on that front, but I think for anything further about Mac Pro we're going to have to wait for next year.
Read more of this story at SoylentNews.
An unnamed security researcher has found several vulnerabilities in the Linux command line tool Beep, including a severe flaw introduced by a patch for a privilege escalation vulnerability.
Beep is a small open source utility used in the past by Linux developers to produce a beep with a computers internal speaker, it allows users to control the pitch, duration, and repetitions of the sound.
The researcher discovered a race condition in the utility that could be exploited by an attacker to escalate privileges to root. Versions through 1.3.4 are affected by the flaw that was tracked as CVE-2018-0492.
Further info on the flaw is available on the website holeybeep.ninja
Is your system vulnerable? In order to discover if a system is vulnerable it is possible to run the following command:
curl https://holeybeep.ninja/am_i_vulnerable.sh | sudo
A vulnerable machine will beep.
The Holey Beep website also provides a patch, but experts noticed that it actually introduces a potentially more serious vulnerability that could be exploited to execute an arbitrary code on the patched system.
The patch vulnerability seems more severe to me, as people apply patches all the time (they shouldnt do it as root, but people are people), reads a message published by Tony Hoyle on the Debian bug tracker. Its concerning that the holeybeep.ninja site exploited an unrelated fault for fun without apparently telling anyone.
Beep is also affected by other issues, including integer overflow vulnerabilities, and a...
The potential harm of AIs deliberately designed to kill in warfare is much more pressing than self-driving car accidents.Photograph by Airman 1st Class James Thompson / U.S. Air Force
In 2016, a Mercedes-Benz executive was quoted as saying that the companys self-driving autos would put the safety of its own occupants first. This comment brought harsh reactions about luxury cars mowing down innocent bystanders until the company walked back the original statement. Yet protecting the driver at any cost is what drivers want: A recently published study in Science (available to read on arXiv) shows that, though in principle people want intelligent cars to save as many lives as possible (like avoiding hitting a crowd of children, for example), they also want a car that will protect its occupants first.
It would be hard to trust this algorithm because wethe humans
nominally in charge of the A.I.dont ourselves have the right
ethical answer to this dilemma. Besides, and potentially worse, the
algorithm itself might change. No matter how a cars A.I. is
initially programmed, if it is designed to learn and improve itself
as it drives, it may act unpredictably in a complicated accident,
perhaps in ways that
Northrop Grumman, rather than SpaceX, is reportedly responsible for the loss of a secret satellite (reportedly) worth $3.5 billion:
In early January, SpaceX adamantly denied rumors that it had botched the launch of a classified spy satellite called Zuma, and now, a new government probe has absolved the company of blame for the spacecraft's loss. Government investigators looking into the mission determined that a structure on top of the rocket, called the payload adapter, failed to deploy the satellite into orbit, The Wall Street Journal reports. That adapter was built by defense contractor Northrop Grumman, which means SpaceX isn't at fault for Zuma's demise.
This scenario aligns with what many speculated at the time. SpaceX launched Zuma on top of its Falcon 9 rocket on January 7th, and just a day later, reports started to surface that the satellite had fallen back to Earth and burned up in the atmosphere after the mission. However, SpaceX president Gwynne Shotwell claimed that the rocket performed as it was supposed to. "For clarity: after review of all data to date, Falcon 9 did everything correctly on Sunday night," she said in a statement. "If we or others find otherwise based on further review, we will report it immediately. Information published that is contrary to this statement is categorically false."
[...] Meanwhile, the payload adapter failure isn't a good look for Northrop Grumman, which is having a difficult time piecing together another important spacecraft right now: NASA's James Webb Space Telescope. Northrop is the main contractor of the telescope and is currently integrating large pieces of the spacecraft at the company's facilities in Redondo Beach, California. However, NASA recently announced that James Webb's launch will have to be delayed until 2020, due to a number of mistakes and delays that were made at Northrop during the construction process.
SpaceX should demand to use its own payload adapters for any new classified/national security launches, because it will probably be granted in light of this "Beltway bandit" fiasco.
Via: Reuters: The Federal Bureau of Investigation on Monday raided the offices and home of U.S. President Donald Trumps personal lawyer Michael Cohen, law enforcement sources said, in a dramatic new development in a series of probes involving close Trump associates. Cohens lawyer, Stephen M. Ryan, said that U.S. prosecutors conducted a search that was 
Science fiction has long had the idea that a good drink should just appear from a sliding panel in a wall. Bartending is to be the preserve of robots and AIs manual control is for the past, and in an effort to continue our progress to towards that sci-fi future, Reddit user [HighwingZ] has built a beautiful machine that mixes and serves drinks.
Instead of a sliding wall panel, [HighwingZ] has built a hexagonal container. Five of the six sides contain bottles to fill the drink with, the last panel contains the spigot and a spot for the glass. The machine works by weighing the liquid that gets poured into the glass using a load cell connected to a HX711 load cell amplifier. An aquarium pump is used to push air into whichever bottle has been selected via some magnetic valves which forces the liquid up its tube and into the glass. A simple touch screen UI is used so the user can select which drink and how much of it gets poured. All of this is connected to a Raspberry Pi to control it all.
The whole thing is built into a great looking wooden showcase with see-through sides, so you can see the bottles to be used to make the drinks. [HighwingZ] put the Python code that controls everything on github for anyone wanting to make their own. There are a few cocktail making hacks on the site, like...
One of England's top police officers, Shaun Sawyer, wants citizens to go after internet giants that have wronged them.
Sawyer, who is chief constable in Devon and Cornwall and is national lead for human trafficking and modern slavery, made the suggestion in an interview with The Sunday Times, published over the weekend.
In a paywalled article, he told the Murdoch organ that if someone is a victim of an Internet-enabled crime, they should sue the platform involved.
Describing the internet as a safe space for organised crime, he said Silicon Valley company abuses were becoming a human injustice.
The comments coincidentally (?) came after American authorities last week shuttered Backpage.com, a site accused of supporting human trafficking by allowing publication of advertisements for "escorts".
Sawyer believes platforms like Facebook need more policing, and he also criticised liberal laws.
So it's down to users, apparently: if people with the resources of the person in the street start suing the platforms, he argued, they would start using their resources to spot abuse.
Read more of this story at SoylentNews.
Hematopoietic stem cells, that form mature blood cells, require a very precise amount of protein to function -- and defective regulation of protein production is common in certain types of aggressive human blood cancers. Now, a research team at Lund University in Sweden has uncovered a completely new mechanism that controls how proteins are produced to direct stem cell function.
"Our research is potentially important for life-threatening blood cancers characterised by dysfunctional stem cells -- which are common in elderly people. High protein synthesis levels could represent an Achilles' heel to eradicating cancer-initiating cells," explains Cristian Bellodi, research team leader at Lund University's Department of Laboratory Medicine.
Dr. Bellodi's laboratory uncovered a new important function of pseudouridine, the most common type of RNA modification in human cells.
[...] The team's key discovery was that stem cells lacking an enzyme responsible for pseudouridine modification of RNA, known as PUS7, produce abnormal amounts of protein. This protein overload leads to unbalanced stem cell growth and dramatically blocks differentiation to blood cells.
They uncovered that the PUS7 enzyme is capable of introducing a pseudouridine modification into previously uncharacterized, non-coding-protein RNA molecules that they denoted as miniTOGs (mTOGs). The presence of pseudouridine "activates" mTOGs to strongly suppress the stem cell protein synthesis machinery. This ensures that the correct amount of proteins is made.
"Our work illustrates that this exquisite control mechanism -- regulated by PUS7 and pseudouridine -- is critical to adjusting the amount of proteins needed for human stem cells to grow and produce blood," says Cristian Bellodi.
Since pseudouridine modifications may affect various RNA molecules in different types of normal and malignant cells, "our discoveries pave the way for future avenues of research aimed at exploring the role of pseudouridine in human development disease," concludes Cristian Bellodi.
Read more of this story at SoylentNews.
#Chicago friends, Im honored to be speaking at the University of Chicago via the Chicago Society on Thursday, April 19, at 6PM CDT, Cobb 106. The Chicago Society has hosted speakers like Bill Gates, former Secretary of State Madeleine Albright, Nobel Laureate Gary Becker, and former Treasury Secretary Hank Paulson, Join me for a free talk and Q & Aand ask me all questions about #transhumanism and our coming wild tech future!
Imagine a single particle, only one-tenth the diameter of a bacterium, whose miniscule jiggles induce sustained vibrations in an entire mechanical device some 50 times larger. By taking clever advantage of the interplay between light, electrons on the surface of metals, and heat, researchers at the National Institute of Standards and Technology (NIST) have for the first time created a plasmomechanical oscillator (PMO), so named because it tightly couples plasmonsthe collective oscillations of electrons at the surface of a metal nanoparticleto the mechanical vibrations of the much larger device its embedded in.
The entire system, no bigger than a red blood cell, has myriad technological applications. It offers new ways to miniaturize mechanical oscillators, improve communication systems that depend on the modulation of light, dramatically amplify extremely weak mechanical and electrical signals and create exquisitely sensitive sensors for the tiny motions of nanoparticles.
NIST researchers Brian Roxworthy and Vladimir Aksyuk described their work in a recent issue of Optica.
Sperm in space!!!
For the first time (officially), NASA will set loose some human sperm in outer space.
If you went to bed last night as an industrial company, youre going to wake up this morning as a software and analytics company. Jeff Immelt, former CEO of General Electric
The second wave of digitization is set to disrupt all spheres of economic life. As venture capital investor Marc Andreesen pointed out, software is eating the world. Yet, despite the unprecedented scope and momentum of digitization, many decision makers remain unsure how to cope, and turn to scholars for guidance on how to approach disruption.
The first thing they should know is that not all technological change is disruptive. Its important to distinguish between different types of innovation, and the responses they require by firms. In a recent publication in the Journal of Product Innovation, we undertook a systematic review of 40 years (1975 to 2016) of innovation research. Using a natural language processing approach, we analyzed and organized 1,078 articles published on the topics of disruptive, architectural, breakthrough, competence-destroying, discontinuous, and radical innovation. We used a topic-modeling algorithm that attempts to determine the topics in a set of text documents. We quantitatively compared different models, which led us to select the model that best described the underlying text data. This model clustered text into 84 distinct topics. It performs best at explaining the variability of the data in assigning words to topics and topics to documents, minimizing noise in the data.
[Fribo] the robot is a research project in the form of an adorable unit that hears and speaks, but doesnt move. Moving isnt necessary for it to do its job, which is helping people who live alone feel more connected with their friends. Whats more interesting (and we daresay, unusual) is that it does this in a way that respects and maintains individuals feelings of privacy. To be a sort of social connector and trigger between friends where every interaction is optional and opt-in was the design intent behind [Fribo].
The device works by passively monitoring ones home and understands things like the difference between opening the fridge and opening the front door; it can recognize speech but cannot record and explicitly does not have a memory of your activities. Whenever the robot hears something it recognizes, it will notify other units in a circle of friends. For example, [Fribo] may suddenly say Oh, one of your friends just opened their refrigerator. I wonder what food they are going to have? People know someone did something, but not who. From there, there are two entirely optional ways to interact further: knocking indicates curiosity, clapping indicates empathy, and doing either reveals your identity to the originator. All this can serve as an opportunity to connect in some way, or it can just help people feel more connected to others. The whole thing is best explained by the video embedded below, which shows several use cases.
In this day and age of treating people like data to be intrusively mined, its downright charming for a projects vision to be something as simple and wholesome as being a reminder that there are others out there, sharing everyday activities. Of course, on the opposite end of [Fribo]s minimalist visage is this robot that communicates entirely with animated gifs.
[Fribo] is a project by [Kwangmin Jeong], [Jihyun Sung], [Haesung Lee], [Aram Kim], [Hyem Kim], [Chanmi Park], [Youin Jeong], [JeeHang Lee], and [Jinwoo Kim] from Yonsei University in Korea.
One of the silliest bugs on record emerged late last week, when Debian project leader Chris Lamb took to the distro's security to post an advisory that the little [beep] utility had a local privilege escalation vulnerability.
The utility lets either a command line user control a PC's speaker, or more usefully a program can pipe the command out to the command line to tell the user something's happened. If, of course, their machines still have a beeper-speaker, which is increasingly rare and raises the question why the utility still exists. Since beep isn't even installed by default, it's not hard to see the issue would have gone un-noticed.
News of the bug emerged at holeybeep.ninja/, a site that combines news of the bug with attempts at satirising those who brand bugs and put up websites about them.
But the joke's on holeybeep.ninja because according to the discussion at the Debian mailing list, the fix the site provided didn't fix all of beep's problems. As Tony Hoyle wrote: The patch vulnerability seems more severe to me, as people apply patches all the time (they shouldn't do it as root, but people are people) It's concerning that the holeybeep.ninja site exploited an unrelated fault for 'fun' without apparently telling anyone.
German security researcher and journalist Hanno Bck alerted the OSS-sec list to further issues on Sunday.
As a result, Bck wrote, beep should probably be discarded: it needs a proper code review, and there's no much point to the effort for a tool talking to the PC speaker, which doesn't exist in most modern systems anyway.
Read more of this story at SoylentNews.
Researchers have made a potentially vital breakthrough in the search for renewable energy storage.
Seek will also tell you which species you are most likely to see in your area, based on wildlife observations recorded and uploaded to iNaturalist. You will be given maps and charts to help you track down nearby flora and fauna but if you prefer to explore on your own, Seek is happy to tell you about any random plant or insect that catches your eye.
INaturalist encourages all users to take photos of everything they see even if its not on the list to develop the AIs ability to recognize wildlife. As co-founder Scott Loarie told My Modern Met, The only way we can improve our modeling of species is to get more data, and to do that we need more people outside taking pictures.
Seek is currently available on the App Store and is in beta testing for Android.
S cientists have claimed an important breakthrough in the battle against Alzheimers after neutralising the most significant gene responsible for the disease for the first time.
A team in California successfully identified the protein associated with the high-risk apoE4 gene and then manage to prevent it damaging human neuron cells.
The study could open the door to a potential new drug capable of halting the disease, however the researchers have urged caution because so far their compound has only been tried on collections of cells in a laboratory.
Investors are sounding the alarm after a little-known U.S. government agency green lit what could be the next trillion-dollar technology.
This tight-lipped agency, known as DARPA, has a history of developing some of the most transformative technologies known to man. But what many dont realize is that it can PAY to follow DARPAs biggest projects.
In fact, one DARPA-funded venture was a computer network designed to provide interconnectivity among users we now call this network the internet.
SpaceXs CEO feeds the hype for a new rocket with a photo showing a gigantic tool that will be used as a mold to create the spaceships body.
Nobody knows when The Big One is going to hit California, but heres how experts think it will play out when it does.
Scientists tested a brain implant that replicates short-term recall in patients with memory loss. It may have actually worked.
Facebook CEO Mark Zuckerberg will feel the glare of the national spotlight on Tuesday as he testifies to Congress for the first time.Lawmakers are demanding answers about how Cambridge Analytica, a British data firm hired by the Trump campaign, was...
Zuckerberg enters the lion's den: It's a big week for Mark Zuckerberg who is facing the toughest political test of his career. The stakes are high as he testifies before the House and Senate this week over the Cambridge Analytica data scandal and...
The "real-time clock" (RTC) changes usually aren't too notable to the Linux kernel merge windows, but for the in-development Linux 4.17 kernel to prolong their life for decades to come, at least as far as the clock is concerned...
A team of engineers from the National University of Singapore (NUS) recently discovered that a naturally occurring bacterium, Thermoanaerobacterium thermosaccharolyticum TG57, isolated from waste generated after harvesting mushrooms, is capable of directly converting cellulose, a plant-based material, to biobutanol.
A research team led by Associate Professor He Jianzhong from the Department of Civil and Environmental Engineering at NUS Faculty of Engineering first discovered the novel TG57 strain in 2015. They went on to culture the strain to examine its properties.
Assoc Prof He explained, "The production of biofuels using non-food feedstocks can improve sustainability and reduce costs greatly. In our study, we demonstrated a novel method of directly converting cellulose to biobutanol using the novel TG57 strain. This is a major breakthrough in metabolic engineering and exhibits a foundational milestone in sustainable and cost-effective production of renewable biofuels and chemicals."
[...] Moving forward, the research team will continue to optimise the performance of the TG57 strain, and further engineer it to enhance biobutanol ratio and yield using molecular genetic tools.
The team published the findings of the study in the scientific journal Science Advances on 23 March 2018.
Read more of this story at SoylentNews.
Lostnbronx takes a quick look at what it is that constitutes "reviews" of stories (be they books, films, TV shows, audio dramas, whatever) as opposed to "critiques" of them. How do these two things differ, and what are their purposes? Is one more important than the other? Why does it even matter?
Its past time for Facebook to come clean about how it is handling user data. After the latest Cambridge Analytica news broke the dam on over a decade of Facebook privacy concerns, Mark Zuckerberg is heading to to Washington, D.C. this week for two days of Congressional testimony. On Tuesday, hell appear before the Senate Judiciary and Commerce Committees, and on Wednesday the House Energy & Commerce Committee.
The last thing we need from Zuckerberg at these hearings is more apologies. What we want is information and accountability, and not just in connection with discrete scandals like Cambridge Analytica. Congress should be asking Facebook for a detailed account of what data Facebook has shared with third parties, what it has done to prevent misuse of that data, what it told users about how it would handle their information, and what steps it will take in the future to respect users' privacy rights.
A company ethos of connection and growth at all costs cannot co-exist with users' privacy rights.
Beyond nailing down down the details of specific cases like the Cambridge Analytica mess and the revelation of paid Russian propaganda on the social media giant's platform, we hope lawmakers will also keep in mind the larger tension at the core of each one of Facebook's privacy missteps and scandals: A company ethos of connection and growth at all costs cannot co-exist with users' privacy rights. Facebook operates by collecting, storing, and making it easy for third parties to use unprecedented amounts of user data. Until that changes, the p...
KDE Connect is the nifty KDE project providing allowing communication between your Linux desktop computer and your Android smartphone/tablet via a secure communication protocol. KDE Connect 1.3 is now the latest feature release...
You probably learned in school that Thomas Edison was the first human voice recorded, reciting Mary Had a Little Lamb. As it turns out though, thats not strictly true. Edison might have been the first person to play his voice back, but he wasnt the first to deliberately record. That honor goes to a French inventor named douard-Lon Scott de Martinville. He wanted to study sound and created the phonautograph a device which visualized sound on soot-covered paper. They were not made to be played back, but the information is there. These recordings were made around 1860. Theres a 9-part video series about how the recordings were made and more interestingly how they were played back using modern technology. Part 1 appears below.
We say around 1860 because there were some early recordings starting around 1857 that havent been recovered. Eventually, the recordings would have a tuning fork sound which allows modern playback since the known signal can estimate the speed of the hand-cranked cylinder. The date of the first recovered recording was today, April 9th, 158 years ago.
The really interesting part is how they found some actual recordings with the original patent and then tracked down even more stored in archives. It is amazing that soot-covered paper has survived all these years. The website has a description of two different methods used to scan and playback the primitive recordings. You can also hear the recovered audio, of course.
Weve heard rumblings no pun intended that audio might be accidentally recorded in pottery or other old artifacts. However, we havent seen any credible recovery of sound using these methods, including an attempt by MythBusters.
The phonautograph was a precursor to the phonograph, and we wonder if Edison was aware of it. It is interesting to think of the progression of audio recording media. Sooty paper, tinfoil, wax, vinyl, and even wire have held recordings. Of course, tape, plastic, and now whatever can hold digital data also do the job today.
Submitted via IRC for AndyTheAbsurd
Having movable eyebrows and evolving beyond the Neanderthal ridge may have played a crucial role in early human survival.
Eyebrows, we all have them, but what are they actually for? While eyebrows help to prevent debris, sweat, and water from falling into the eye socket, they serve another important function too and it's all to do with how they move and human connection.
[...] But our latest research may have found an answer to explain why archaic humans had such a pronounced wedge of bone over their eyes (and why modern humans don't). And it seems to be down to the fact that our highly movable eyebrows can be used to express a wide range of subtle emotions which could have played a crucial role in human survival.
Research has already shown that humans today unconsciously raise their eyebrows briefly when they see someone at a distance to show we are not a threat. And we also lift our eyebrows to show sympathy with others a tendency noticed by Darwin in the 19th century.
[...] The brow ridges in archaic humans also serve no obvious function in relation to chewing or other practical mechanics a theory commonly put forward to explain protruding brow ridges. As when the ridge was taken away there was no effect on the rest of the face when biting. This means that brow ridges in archaic humans must have had a social function most likely used to display social dominance as is seen in other primates.
For our species losing the brow ridge probably meant looking less intimidating, but by developing flatter and more vertical foreheads our species could do something very unusual move our eyebrows in all kinds of subtle and important ways.
Although the loss of the brow ridge may have initially been driven by changes in our brain or facial reduction, it subsequently allowed our eyebrows to make many different subtle and friendly gestures to people around us.
Read more of this story at SoylentNews.
Today's hardware monitoring subsystem updates sent into the Linux 4.17 kernel merge window were a bit peculiar with "new Centaur CPUs" now being supported for reading the CPU core temperatures...
The largest pro-Black Lives Matter page on Facebook was actually a scam tied to a white man in Australia, CNN reported on Monday. The page had accrued 700,000 Facebook followers almost double the amount of the official Black Lives Matter...
Federal prosecutors on Monday indicted executives for Backpage.com on a series of money laundering and prostitution charges.The 93-count indictment was unsealed days after authorities seized the classified ads site and reportedly raided the...
Facebook shut down accounts linked to hackers widely believed to be operating on the Russian government's behalf before the 2016 presidential election, CEO Mark Zuckerberg plans to tell Congress this week.In summer 2016, Facebook identified accounts...
President Trump's chief economic adviser, Larry Kudlow, offered Facebook founder and CEO Mark Zuckerberg fashion advice ahead of his upcoming Capitol Hill testimony this week, saying he should stop wearing "hoodies and dungarees.""Is he going...
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog