|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
These days a printer especially one at home is likely to spray ink out of nozzles. It is getting harder to find home laser printers, and earlier printer technologies such as dot matrix are almost gone from peoples homes even if youll still see a few printing multipart forms in some offices.
[Thomas Winningham] bought an old Commodore dot matrix printer in a fast food parking lot for $20. How hard could it be to get it working? How hard, indeed. Check out the video below to see the whole adventure. The principle behind the printer is simple enough. The head has one or two rows of pins each controlled by a solenoid. The head moves across the paper and your job should you decide to accept it is to make the pins push out at the right spot. An ink ribbon like a typewriter uses oh yeah, more vanishing tech leaves ink on the paper where it gets punched by the pin.
You dont usually think about all this because the printers firmware takes care of everything. But a printer this old had a lot of issues including Commodores wacky ASCII-like standard. Despite all of this [Thomas] did a great job and was able to accomplish:
That will teach him to buy stuff in the parking lot of a fast food joint.
By the way, if you are patient, you only need one pin to print from a Commodore or any computer, for that matter. Like just about everything else that makes noise, someone will try to make music with dot matrix printers, too.
At EFF, we often write about abuse of the Digital Millennium Copyright Act (DMCA) takedown process. We even have a Hall of Shame collecting some of the worst offenders. EFF is not usually the target of bad takedown notices, however. A company called Topple Track has been sending a slew of abusive takedown notices, including false claims of infringement levelled at news organizations, law professors, musicians, and yes, EFF.
Once we identify pirated content we send out automated DMCA takedown requests to Google to remove the URLs from their search results and/or the website operators. Links and files are processed and removed as soon as possible because of Topple Tracks relationship with Google and file sharing websites that are most commonly involved in the piracy process.
In practice, Topple Track is a poster child for the failure of automated takedown processes.
Topple Tracks recent DMCA takedown notices target so much speech it is difficult to do justice to the scope of expression it has sought to delist. A sample of recent improper notices can be found here, here, here, and here. Each notice asks Google to delist a collection of URLs. Among others, these notices improperly target:
WhiteSource announced the release of its Vulnerability Checker, a free tool that provides companies with immediate, real-time alerts on the 50 most critical open source vulnerabilities published in the open source community. The new standalone CLI tool is free to use and available for anyone to download as a desktop application directly from the WhiteSource website. Once downloaded, the Vulnerability Checker offers users the opportunity to import and scan any library and run a quick More
The post WhiteSource unveils free open source Vulnerability Checker appeared first on Help Net Security.
Submitted via IRC for SoyCow1984
And it wasn't even close.
A month and a half ago, OpenAI showed off the latest iteration of its Dota 2 bots, which had matured to the point of playing and winning a full five-on-five game against human opponents. Those artificial intelligence agents learned everything by themselves, exploring and experimenting on the complex Dota playing field at a learning rate of 180 years per day. [...] the so-called OpenAI Five truly earned their credibility by defeating a team of four pro players and one Dota 2 commentator in a best-of-three series of games.
There were a few conditions to make the game manageable for the AI, such as a narrower pool of 18 Dota heroes to choose from (instead of the full 100+) and item delivery couriers that are invincible. But those simplifications did little to detract from just how impressive an achievement today's win was.
[...] play-by-play commentator Austin "Capitalist" Walsh sums up the despondency felt by Team Human after the bout neatly:
Never felt more useless in my life but we're having fun at least so I think we're winning in spirit.
Sure aren't winning in-game
Cap (@DotACapitalist) August 5, 2018
Read more of this story at SoylentNews.
Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. While current advances in OT/ICS cyber security are impressive, new approaches are needed to gain defensive advantage over already-capable cyber adversaries, to keep up with new OT/ICS technologies, and to serve business risk management needs in increasingly-demanding, competitive environments. In all these cases, progress only comes when both IT and OT stakeholders can (1) correctly assess current and More
The post The future of OT security in critical infrastructure appeared first on Help Net Security.
Surprise! But theres a good chance you still may not be able to buy it. Heres everything you need to know.
If the weather remains favorable and everything goes according to plan on August 11th, NASA is sending a spacecraft to the sun. The Parker Solar Probe will go closer to the massive ball of gas and plasma keeping our solar system together than any other spacecraft has gone before. It will brave extreme temperatures reaching up to 2,500 degrees Fahrenheit to collect data and images of the suns atmosphere called corona. The spacecraft will also reach speeds up to 430,000 mph, making it the fastest-ever human-made object. Thats nowhere near fast enough to reach Alpha Centauri within our lifetime it has to travel around 7,000 years to reach the star closest to our sun but fast enough to get from Philadelphia to DC in a second.
NASA plans to use the data it beams back to figure out how we can better prepare for solar winds, which are streams of charged particles emitted by the corona. Particularly strong winds could change satellites orbits, interfere with their instruments and even affect power grids here on Earth. If we want to head deeper into space in the future, we must first study how solar winds can affect our vehicles. Besides, we need to take a closer look at the star nearest to us if we want to learn more about the other stars in the universe. Finally, studying the sun could shed light on the origin of life on Earth, since its our source of light and heat.
Before the Parker Solar Probe can soar as close as 3.83 million miles above the suns surface, though, it first has to spend seven years encircling the sun again and again. It will use Venus gravity to fly closer to the sun each orbit while picking up speed in the process. By the time it reaches its final orbits, it will be zooming around the sun at 430,000 mph.
All humans begin life as a single cell that divides repeatedly to form two, then four, then eight cells, all the way up to the ~26 billion cells that make up a newborn. Tracing how and when those 26 billion cells arise from one zygote is the grand challenge of developmental biology, a field that has so far only been able to capture and analyze snapshots of the development process.
Now, a new method developed by scientists at the Wyss Institute and Harvard Medical School (HMS) finally brings that daunting task into the realm of possibility using evolving genetic barcodes that actively record the process of cell division in developing mice, enabling the lineage of every cell in a mouses body to be traced back to its single-celled origin.
The research is published today in Science as a First Release article.
A controversial new paper argues that universes with dark energy profiles like ours do not exist in the landscape of universes allowed by string theory.
New Horizons may have seen a hydrogen wall just past the edge of the solar system, where the solar wind meets the stuff of interstellar space.
What if an ultra-advanced flying robot designed for extreme military missions could join the fight to combat wildfire alongside human fire crews?
The biggest wildfire in Californian history is raging, with fire officials stating earlier this week that an area almost the size of Los Angeles has been compromised.
It is actually expected to burn through the rest of August, and experts predict the escalation in frequency and scale of wildfires will only continue going forward.
Proofpoint announced three people-centric security innovations, including Targeted Attack Protection (TAP) Isolation for personal webmail and browsing defense, threat detection, and new Threat Response python scripting. Exceptional effectiveness in threat protection requires constant innovationand today Proofpoint has increased its lead, said Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint. Technologically, these people-centric innovations are an important step forward for Proofpoint and our customers. We help security teams proactively defend their organizations from todays More
The post Proofpoint launches TAP Isolation, threat detection, and Threat Response python scripting appeared first on Help Net Security.
eSentire and Cyxtera Technologies announced a partnership to bring customers security solutions designed to secure todays hybrid IT environment. The partnership combines eSentires 247 MDR with Cyxteras AppGate SDP zero-trust network offering, delivering prevention and detection capabilities across customers hybrid IT environments. The two companies will jointly go-to-market to maximize customer reach for this mid-sized enterprise offering. Digital transformation of our customers is accelerating the adoption of hybrid IT, fundamentally changing the enterprise perimeter and More
The post eSentire and Cyxtera partner to bring zero-trust network protection to midsize enterprises appeared first on Help Net Security.
The bzip2 compression algorithm has been slowly falling out of favor, but is still used heavily across the net. A search for "bzip2 source" returns bzip.org as the first three results. But it would seem that the owner of this domain has let it go, and it is now parked and running ads. So we no longer have an official home for bzip2. If a new repository or tarball does turn up at that domain, it should be looked at closely before being trusted. (Thanks to Jason Kushmaul).
Tim Enwall, head of Misty Robotics, discusses the challenges of developing a personal robot for the mass market
This is a guest post. The views expressed here are solely those of the author and do not represent positions of IEEE Spectrum or the IEEE.
In the past two months, Mayfield Robotics, makers of Kuri the robot, has shut down sales and operations, and Jibo, which has run through more than $70 million of venture funding, announced a significant downsizing of the company.
This marks a sad time for the personal/social robot market. There were amazingly talented and passionate people at both of those companies who drove themselves constantly in the pursuit of building awesome products that were well-liked. These roboticists, engineers, and designers were solving some really difficult problems. Now, because these excellent teams with experience and knowledge will likely disperse, more difficult problems will either go unsolved or will be delayed without them. We know many of our compatriots at these two businesses and are dispirited by their loss.
I propose that the bottom line is that both Jibo and Kuri sought to sell a product to mass consumers with the belief that they had found the killer apps (or the features that make a product indispensable). In this case, those were social interaction (Jibo) and live streamed video/photos in the home (Kuri). Yes, they both did many other things pretty well from independent navigation (Kuri), to face and voice recognition (Jibo), to basic home assistant abilitiesbut the real robotic differentiators for each were those killer apps.
Additionally, both learned that the required consumer sales volume didnt materialize. For the financial backers of those companies, the size of their investment and parameters of ownership were likely (and this is experience-based conjecture on my part) predicated on an expectation of selling hundreds of thousands, if not millions, of units. To make Jibo...
WASHINGTON U.S. Reps. Lamar Smith (R-Texas) and Eddie Bernice Johnson (D-Texas), who serve as the chairman and ranking member of the House Committee on Science, Space, and Technology, and U.Sens. John Thune (R-S.D.) and Bill Nelson (D-Fla.), who serve as the chairman and ranking member of the Senate Committee on Commerce, Science, and Transportation, today announced the introduction of House and Senate companions of the National Quantum Initiative Act. The legislation would accelerate and coordinate public and private quantum science research, standards, and workforce development to give the United States a competitive advantage as China and Europe vie to achieve technological breakthroughs in this field.
Chairman Smith: The National Quantum Initiative Act will accelerate the development of quantum information science in the United States and secure our leadership in the quantum sector. As other nations are rapidly developing their own quantum programs, the U.S. faces the risk of falling behind. This legislation provides a path forward to ensure that the U.S. secures its influence in the next generation of science and technology. I am glad that Senator John Thune has joined me in introducing this legislation, along with our respective Ranking Democrat Committee Members Rep. Eddie Bernice Johnson and Senator Bill Nelson.
The bill creates a 10-year federal program that will significantly develop our quantum knowledge. It will bring a whole of government approach to advance QIS to the next level of research and development, while also creating public-private partnerships, leveraging the resources and expertise of government, industry and academia. Through new research facilities and a strong workforce pipeline, students and researchers will have greater resources and opportunities to develop their quantum skills and create the next great computing innovation. There is no doubt quantum technology will revolutionize our world to come. This bill secures American leadership in quantum science and guarantees a first place finish in the great quantum race.
In approximately February 2015, the home financing website MyFHA suffered a data breach which disclosed the personal information of nearly 1 million people. The data included extensive personal information relating to home financing including personal contact info, credit statuses, household incomes, loan amounts and notes on personal circumstances, often referring to legal issues, divorces and health conditions. Multiple parties contacted HIBP with the data after which MyFHA was alerted in mid-July and acknowledged the legitimacy of the breach then took the site offline.
Seemingly out of the blue, Elon Musk proclaimed that he might pull his money-losing Tesla Inc. off the market. Taking the electric-car company private at the price he touted would amount to an $82 billion valuation, a monumental sum that left many investors wondering: Is this a joke?
[...] "The reason for doing this is all about creating the environment for Tesla to operate best," Musk, 47, wrote Tuesday in an email to employees. He said wild swings in the carmaker's stock price are a "major distraction" to Tesla workers, who are all shareholders. And he said that being public "puts enormous pressure on Tesla to make decisions that may be right for a given quarter, but not necessarily right for the long-term."
To take Tesla private, Musk would have to pull off the largest leveraged buyout in history, surpassing Texas electric utility TXU's in 2007. And Tesla doesn't fit the typical profile of a company that can raise tens of billions of dollars of debt to fund such a deal.
[...] "The market doesn't believe him," said David Kudla, the CEO of Mainstay Capital Management, which is betting against Tesla. "His credibility has come into question over a number of things. If this were real, you'd expect the stock to go closer to $420 a share than it has." Most major buyouts also require a trip to the junk bond markets, where Tesla has fallen out of favor.
"Tesla resumed trading on the Nasdaq exchange after a nearly two-hour pause on Tuesday afternoon, shortly after the company confirmed in a blog post that CEO Elon Musk is considering taking the electric car maker private at $420 per share."
To the delight of everyone, this years official DEF CON badge is an electronic badge chock full of entertainment. Of course there is blinky, the board is artistic, and everyone hopefully maybe gets one (its rumored 27,000+ were manufactured) if they dont run out. But the badge contest at DEF CON is legendary solve all the puzzles you are awarded the coveted black badge.
The creators of this badge are no strangers to the Hackaday community. Displayed proudly on the board and in the firmware, we discover that The Toymakers are the ones who have put it all on this line this year. Kudos to the dynamic hardware collective from Minnesota. There is no larger pressure cooker in the world of badges than this, and they pulled it off marvelously. Lets take a look at all the goodies inside.
If you have already pre-ordered your AMD Threadripper 2990WX processor or just planning to be an early customer of that high-end desktop processor or the Threadripper 2950X, you may be wondering about Linux requirements from these new high-end AMD CPU offerings. Here's the gist of the Linux support state of AMD Zen+ CPUs for those wanting to get ready for Threadripper 2...
The lobbying groups for patent trolls try to appear like diverse professionals, but theyre actually paid marketing/PR fronts
Summary: The lobbying groups of patent trolls (which receive money from such trolls) carry on meddling in policy and altering perception that drives policy; we present some new examples
They are basically a megaphone of trolls with misleading/promotional headlines (also big if not imaginary sums of money).Christal Sheppard will work for the world's most awful patent troll, based on this press release that Watchtroll published the day before yesterday (we presume paid PR, based on the labeling) and Finjan, another patent troll, nowadays pays IAM. In return, IAM continues to write puff pieces for this disgusting Microsoft-connected troll; the troll even gets keynotes/speaking positions from IAM. Such is the nature of these publications/blogs. They are basically a megaphone of trolls with misleading/promotional headlines (also big if not imaginary sums of money). As a reminder, IAM is not a news site, but Google treats it as one nonetheless. Case of point is this weeks blog post that says:
There was little surprise in the numbers that Finjan recently announced for the second quarter. Revenue for the first half of the year soared to $82.3 million, an increase of more than 200% year-on-year. This was thanks in large part to the companys settlement with Symantec, but also helped by additional agreements with Carbon Black and Trend Micro. Net income for the half year also saw a correspondingly lar...
A neo-Nazi deleted two posts on Gab, a social media company popular with the alt-right and white supremacists, after Microsoft's cloud computing service threatened to block the platform.Gab said in a tweet Thursday that ...
The QTrobot from LuxAI was designed to help children with autism learn to interact with humans
For some children with autism, interacting with other people can be an uncomfortable, mystifying experience. Feeling overwhelmed with face-to-face interaction, such children may find it difficult to focus their attention and learn social skills from their teachers and therapiststhe very people charged with helping them learn to socially adapt.
What these children need, say some researchers, is a robot: a cute, tech-based intermediary, with a body, that can teach them how to more comfortably interact with their fellow humans.
On the face of it, learning human interaction from a robot might sound counter-intuitive. Or just backward. But a handful of groups are studying the technology in an effort to find out just how effective these robots are at helping children with autism spectrum disorder (ASD).
One of those groups is LuxAI, a young company spun out of the University of Luxembourg. The company says its QTrobot can actually increase these childrens willingness to interact with human therapists, and decrease discomfort during therapy sessions. University of Luxembourg researchers working with QTrobot plan to present their results on 28 August at RO-MAN 2018, IEEEs international symposium on robot and human interactive communication, held in Nanjing, China.
When you are interacting with a person, there are a lot of social cues such as facial expressions, tonality of the voice, and movement of the body which are overwhelming and distracting for children with autism, says Aida Nazarikhorram, co-founder of LuxAI. But robots have this ability to make everything simplified, she says. For example, every time the robot says something or performs a task, its exactly the same as the previous time, and that gives comfort to children with autism.
Feeling at ease with a robot, these children are better able to focus their attention on a curriculum presented together by the robot and a human therapist, Nazarikhorram says.
In the study that will presented at RO-MAN later this month, 15 boys ages 4 to 14 years participated in two interactions: one with QTrobot and one with a person alone. The children directed their gaze toward the robot about twice as long, on average, compared with their gaze toward the human.
Repetitive behaviors like han...
Contrary to widely-held opinion, taking high school calculus isn't necessary for success later in college calculuswhat's more important is mastering the prerequisites, algebra, geometry, and trigonometrythat lead to calculus. That's according to a study of more than 6,000 college freshmen at 133 colleges carried out by the Science Education Department of the Harvard Smithsonian Center for Astrophysics, led by Sadler, the Frances W. Wright Senior Lecturer on Astronomy, and by Sonnert, a Research Associate.In addition, the survey finds that weaker math students who choose to take calculus in high school actually get the most benefit from the class. The study is described in a May 2018 paper published in the Journal for Research in Mathematics Education.
"We study the transition from high school to college, and on one side of that there are college professors who say calculus is really a college subject, but on the other side there are high school teachers who say calculus is really helpful for their students, and the ones who want to be scientists and engineers get a lot out of it," Sadler said. "We wanted to see if we could settle that argumentwhich is more important, the math that prepares you for calculus or a first run-through when you're in high school followed by a more serious course in college?"
The study's results, Sadler said, provided a clear answer -a firmer grip on the subjects that led up to calculus had twice the impact of taking the subject in high school. And of those who did take calculus in high school, it was the weakest students who got the most from the class.
To get those findings, Sadler and Sonnert, designed a study that asked thousands of college freshmen to report not only demographic information, but their educational history, background and mathematics training.
Read more of this story at SoylentNews.
They want SCOTUS to reassess an IPRs case just months after it assessed two such cases, dealing a major blow to opponents of patent quality
Summary: The patent maximalists in the United States, seeing that the USPTO is moving away from patent maximalism, is desperate for a turnaround; prominent patent maximalists take it all out on PTAB
Patent maximalism is hinged on the misguided belief (or lie) that the more patents are granted and the more companies get punished for simply minding their own business, the better off supposed innovation will be (they actually allude to lawyers/attorneys fees, not innovation).
New case of point? Johnstech International Corp. v JF Technology Berhad et al. Theyre now pursuing a punishment for selling products which were made before an alleged patent infringement was proven and before appeal (this is just a district court, which is the lowest court for such disputes). As Patent Navigator put it some hours ago:
Following a jury verdict of willful infringement, the court granted in part plaintiffs motion for enhanced damages and increased the damage award by 25% because one-quarter of defendants sales at issue took place after the verdict.
Does this jury understand the subject matter? Was the patent already tested back at the USPTO? Can it?
At Kluwer Patent Blog (proponent of UPC and EPO patent maximalism) Brian Slater promotes the patent maximalism agenda for the US. It was published earlier today. This is an agenda which involves trying to weaken if not thwart Patent Trial and Appeal Board (PTAB) inter partes reviews (IPRs) because they elevate the quality of granted (by the USPTO) and enforced (in courts) patents, e.g. using 35 U.S.C. 101, only to be affirmed by the Federal Circuit if/when an appeal is allowed.
Alluding to Oil States, Slater...
Our Hackaday Prize Challenges are evaluated by a panel of judges who examine every entry to see how they fare against judging criteria. With prize money at stake, it makes sense we want to make sure it is done right. But we also have our Hackaday Prize achievements, with less at stake leading to a more free-wheeling way to recognize projects that catch our eye. Most of the achievements center around fun topics that arent related to any particular challenge, but its a little different for the Infinite Improbability achievement. This achievement was unlocked by any project that impressed with their quest for power, leading to some overlap with the just-concluded Power Harvesting Challenge. In fact, when the twenty Power Harvesting winners were announced, we saw that fourteen of them had already unlocked the achievement.
Each of the Power Harvesting winners will get their own spotlight story. And since many of them have unlocked this achievement, now is the perfect time to take a quick tour through a few of the other entries that have also unlocked the Infinite Improbability achievement.
Photovoltaic solar power is the fastest growing energy source worldwide. And since the technology easily scales from gigawatt power stations all the way down to little waving cats, its no surprise we saw a lot of experiments with solar power. Almost half of the Power Harvesting Challenge semifinalists either incorporate solar cells directly or help make the most out of their power. And if thats not enough solar inventiveness for you, there are even more solar explorers who have unlocked the achievement.
Like [Aidan Ruff], who lives on an olive farm far off the electrical grid. Hes in the middle of building a solar tracker to get more power from his 60-panel solar array. The system calculates optimal angle using GPS for time, latitude, and longitude, and a small weather station watches for high winds so it can tell the array to lay flat in self-protection. This is a project with immediately measurable returns because any increase in solar power generation will directly reduce the need to run a fossil-fuel burning generator.
If just changing angles on solar panels arent interesting enough, how about solar panels on the move? The Sun Chaser is a sun-seeking robot that carries a solar panel on its back. It could harvest sol...
Summary: Paralysis of the Unified Patent Court Agreement (UPCA) means that people are completely forgetting about its very existence; those standing to benefit from it (patent litigation firms) are therefore recycling and distorting old news
THE FIRST step of Antnio Campinos as EPO President was UPC promotion, which includes attacking constitutions across many countries in Europe. Since then the EPO has been promoting software patents virtually every day (sometimes more than once per day) in spite of the ban in Europe. So its like the pertinent laws and truth itself dont matter to the EPO. Its like Battistelli is still in charge, but his face looks a little different now (nationality is the same).
Actually, the United Kingdom does not want the Unified Patent Court; its just a bunch of law firms with a powerful lobby like CIPA that wants it and misrepresents SMEs, the country at large, and people who actually work in science and technology.We have stumbled upon quite a few Unitary Patent puff pieces this week. IAMs UPC propaganda mill was todays biggest culprit. Its like that same old UPC propaganda which the EPOs PR agency paid IAM for.
Some hours ago David Holland, Roger Lush and Melanie Stevenson (Carpmaels & Ransford LLP) overlooked major UPC barriers. Citing UK-IPO (which is biased for obvious reasons), they promote/perpetuate two famous lies and say: Looking to the future, the government proposes that the UK should continue to participate in the unitary patent system and the Unified Patent Court that underpins it, confirming the United Kingdoms long-held desire to participate in this new pan-European system.
Actually, the United Kingdom does not want the Unified Patent Court; its just a bunch of law firms with a powerful lobby like CIPA that wants it and misrepresents SMEs, the country at large, and people who actually work in science and technology. This is what happens when law firms write the news; its just marketing and lobbying. Speaking of law firms, h.....
U.S. law makes clear that the government cannot keep surveillance records on a person or group because of their political views or the way that they express their First Amendment rights. Unfortunately, the FBI has flouted these laws by maintaining records of its probe of two people whose website criticized U.S. policy in the Middle East. EFF is urging a court to make this right.
EFF filed an amicus brief in support of an ACLU of Northern California lawsuit to enforce privacy protections that Congress put in place in the 1970s against government surveillance. Rigorous enforcement of this law is needed to prevent the FBI from maintaining information it collects on the Internet about our First Amendment activity for many years after that information is no longer relevant to an ongoing investigation.
After the FBI tracked Dr. Martin Luther King, Jr. and other civil rights activists, the Army monitored domestic protests, and President Nixon ordered surveillance of his political opponents, Congress stepped in and passed the Privacy Act of 1974, which established rules about what types of information the government can collect and keep about people. The Act gives individuals the right to access records the government has on them and change or even delete that information. One of the most protective provisions is a prohibition against maintaining records of First Amendment activity, but law enforcement was given an exception for authorized law enforcement purposes.
In this case, plaintiffs Mr. Raimondo and Mr. Garris ran the website antiwar.com, where they wrote pieces criticizing U.S policy in the Middle East in the early 2000s. After reposting a widely available FBI document, they caught the notice of the FBI, which began tracking the website and the two men through a practice called threat assessment. The FBI did not find any wrongdoing or basis to further investigate. Nonetheless, the FBI maintained for many years a record of the postings on this advocacy website and its writers. The First Amendment clearly protects their online journalism and advocacy. Now they are requesting that the FBI expunge their surveillance files.
FBI assessments are the lowest level of investigation under the Attorney Generals guidelines for FBI investigations. When agents undertake assessments, they arent supervised, and they dont have to justify opening an assessment based on specific fa...
Spurred by the false alarm that made Hawaii residents fear for their lives earlier this year, IBM X-Force Red and Threatcare researchers have decided to test several smart city devices and ultimately found 17 zero-day vulnerabilities, some of which could be exploited to create potentially deadly chaos. While we were prepared to dig deep to find vulnerabilities, our initial testing yielded some of the most common security issues, such as default passwords, authentication bypass and More
Wifi password hacking has become popular as people are always in search of the free internet. But due to the advancement of technology, cracking passwords have become a difficult task to do. The reason is due to the implementation of WPA/WPA2 (wifi protected access) protocols. They made modern routers more secure and less prone to hacking.
Luckily security researchers have revealed a new way to hack these modern wi-fi routers. This new hack was got accidentally discovered by Jens Steube (lead developer in popular password-cracking tool Hashcat) while he was analyzing the newly-launched WPA3 protocol. According to him, this hack will explicitly work against WPA/WPA2 wireless network protocols with Pairwise Master Key Identifier (PMKID)-based roaming features enabled. This hack will surely allow attackers (aka.Hackers) to recover the Pre-shared Key (PSK) login passwords.
Also Read How To Hack Wi-Fi Password Without Cracking By Using Wifiphisher
Disclaimer: All content in this article are intended for security research purpose only. Techworm does not support the use of any tool to indulge in unethical practices.
4-Way Handshake based PMKID stands for pairwise key management protocol. According to Steube (security researcher), previous wifi attacking methods requires someone to log into the network so that attackers can capture EAPOL (Extensible Authentication Protocol (EAP) over LAN ) which is a network authentication protocol used in IEEE 802.1X. whereas new hack doesnt require a user to be on a target network in order to capture credentials. Following are the steps to perform this wifi hack:-
Step-1: A hacker can use a tool such as hcxpcaptool to request the PMKID from the targeted access point and dump the received frame to a file.
The litigation industry just wants lots and lots of lawsuits
Summary: A sample of news from yesterday; the patent microcosm is still arguing about who pays attorneys fees (not whether these fees are justified) and is constantly complaining about the decline in patent litigation, which means fewer and lower attorneys fees (less work for them)
AUGUST is a relatively quiet (likely quietest of the year) month for the EPO and USPTO, so we dont expect to hear many announcements and news. Nevertheless, yesterday IAM published this promotional piece about NantKwest, Inc v Matal, which goes a whole fortnight back. Heres what it said:
On 27 July 2018 the Federal Circuit Court of Appeals en banc rejected the USPTOs attempt to obtain attorneys fees after patent applicants appealed the rejection of an application in a de novo civil action. It reversed the earlier decision of a three-judge panel in NantKwest, Inc v Matal and expressly rejected the Fourth Circuit Court of Appeals reasoning for allowing the USPTO to obtain attorneys fees for appeals against trademark denials.
USPTO is once again contemplating the possibility of reviving a proposal that envisions all patent practitioners paying annual patent bar dues, Watchtroll wrote. Its all about money.
To Roebuck its all about money; theres no other reasons for these people to promote software patents, which are generally loathed by software developers.Over at Watchtroll, Arista's loss is belatedly noted and G. Michael Roebuck...
Posted by Solar Designer on Aug 09Sure. What's your point?
The US Army is moving forward with a new 100-kW laser weapon, awarding US$10 million to Lockheed Martin and Dynetics to continue development of the High Energy Laser Tactical Vehicle Demonstrator (HEL TVD). Designed to counter low cost, high volume threats, the new mobile battlefield laser is the latest in the American effort to produce incrementally more powerful and accurate directed energy weapons.
Security researchers at IBM Research developed a highly targeted and evasive attack tool powered by AI, dubbed DeepLocker that is able to conceal its malicious intent until it has infected the specific target.
IBM Research developed DeepLocker to better understand how several existing AI models can be combined with current malware techniques to create a particularly challenging new breed of malware. reads a blog post published by the experts.
This class of AI-powered evasive malware conceals its intent until it reaches a specific victim. It unleashes its malicious action as soon as the AI model identifies the target through indicators like facial recognition, geolocation and voice recognition.
DeepLocker hides its malicious payload in benign carrier applications, such as a video conference software, to avoid detection by most antivirus and malware scanners. continues IBM.
What is unique about DeepLocker is that the use of AI makes the trigger conditions to unlock the attack almost impossible to reverse engineer. The malicious payload will only be unlocked if the intended target is reached. It achieves this by using a deep neural network (DNN) AI model....
While the rise of online streaming sites can't be denied, a new research report from anti-piracy outfit Irdeto shows that P2P remains very relevant. In fact, it's still the dominant piracy tool in many countries. Irdeto researched site traffic data provided by an unnamed web analytics partner. The sample covers web traffic to 962 piracy sites in 19 countries where P2P was most used. This makes it possible to see how P2P site visits compare to those of pirate streaming sites.
The data reveal that there are massive differences in the relative use of P2P versus streaming sites between countries. In Russia, for example, only 2% of the visits go to streaming sites, while the rest of the traffic goes to P2P portals. P2P also outperforms streaming in other countries such as Australia, the Netherlands, and India. This pattern is reversed in Germany, where 88% of all visits go to pirate streaming sites. Similarly, streaming is also the dominant web piracy tool in the United States, France, Spain and other countries.
Additional research in eight countries shows that piracy traffic has grown during the course of 2017. This growth also applies to P2P sites, in all but one country, Germany. Looking at the sample as a whole, Iredeto notes that 70% of all pirate traffic goes to P2P sites, which appears to run counter to the popular narrative that streaming is more dominant today.
Read more of this story at SoylentNews.
Posted by Kurt H Maier on Aug 09This is generally how clubs work.
By allowing them to launch higher-power small satellites on smaller rockets, as opposed to the larger, and more expensive rockets that current technology requires.
Made in Space is developing power systems for small satellites that can provide up to 5 kW of solar power and is enabled by the companys Archinaut on-orbit manufacturing and assembly technology. Current small satellites are typically constrained to 1 kW of power or less.
Do you feel squeamish about eating a burger that didnt come from a cow? Most Americans dont when confronted with how bad meat is for the environment.
Adoption of Software Defined Wide Area Network (SD-WAN) has reached an inflection point and nearly every distributed business is deploying, evaluating, or planning to implement an SD-WAN as part of its IT vision. To help enterprises understand the merits of products in the market and identify the capabilities best suited to meet their use case requirements, NSS Labs announced the results of the industrys first Software Defined-Wide Area Network (SD-WAN) Group Test. The capabilities that More
Weve all seen acoustic levitation, its one of the scientific novelties of our age and a regular on the circuit of really impressive physical demonstrations of science to the public. The sight of arrays of ultrasonic speakers causing small objects and beads of liquid to float in mid-air without any suspension is magical, captivating people of all ages. Thus a lecture at Hackaday Belgrade on the subject from Asier Marzo, a research scientist with a speciality in the field of ultrasonics at the UKs University of Bristol, was a particularly fascinating and informative one.
He started by explaining acoustic levitation as a concept, and its mechanism. As an idea its one with a long history, he tells us that hundreds of years ago people tried mass ranks of the loudest musical instruments at their disposal to move rocks, all to no avail. The array of musicians of yore lacked the ability to control their individual phase, and of course their combined output would have balked at a pea-sized piece of gravel, let alone a boulder....
In recent years, entertainment industry insiders have often portrayed Australia as a piracy-ridden country.
To see if these statements hold true, the Government conducts annual consumer surveys to study local piracy habits. In recent years, this has revealed a steady decline in piracy.
The latest online copyright infringement report, released this week, shows that theres been a decrease in the number of people who consume music, movies, and TV shows illegally, compared to the year before.
The only category where the percentage of pirates has increased is games, but the overall trend is clearly downward. In 2018, two-thirds of all Aussies consumed content through legal channels, compared to 57% three years ago.
Interestingly, this pattern doesnt automatically translate to higher spending. In fact, those who pirate and buy tend to spend much more on average, compared to those who purchase content 100% legally.
This is consistent with previous research indicating that hybrid consumers (who pirate and buy) are bringing in the most money, probably because they are the most content-hungry consumers.
Also, while fewer Aussies are pirating in 2018, theyre pirating more. The volume of illegally consumed digital content has grown across all measured categories, which includes music, games, movies, and TV shows.
When the proportion of lawful and unlawful digital consumption is applied across the Australian population, it can be seen that the proportion of unlawful consumption has increased across all four content types from 2017 to 2018, the Government concludes.
In other words, there are less Aussie pirates, but theyre pirating more.
Another noteworthy finding deals with the recent pirate site blockades ordered by Australian courts. The entertainment industry argues that these will decrease piracy, and the report appears to back this up.
Of all respondents, only 7% say they will bypass a blocked site if they encounter one. An impressive statistic, but also very misleading.
Posted by Matthew Garrett on Aug 09This is a completely reasonable objection, and also apologies regarding the
Highlights of the Chrome OS 68 release include a brand-new Material 2.0 design for dialogs and secondary UI on Chrome OS, 802.11r fast BSS transition (FT) support for fast roaming, new Display Size settings for setting the size of a connected display, PIN sign-in support to allow users to use a PIN to sign into Chrome OS.
Linux applications are usually distributed in one of two ways through a software repository, or by downloading an installer package from a website. For example, the Steam download page offers a .deb package for Linux users. Even though Linux app support on Chrome OS is improving rapidly, there has never been an obvious way to install .deb packages until now.
Vice President Pence on Thursday outlined plans to establish President Trump's proposed Space Force, a new military branch slated to be established by 2020.Now the time has come to write the next great chapter in the history of our...
Posted by Solar Designer on Aug 09Perhaps I was not clear enough. Obviously (to me), there was no
Posted by David T. on Aug 09Does anyone know if there as been an POC for this? Trying to figure out how
Spreading fake news through WhatsApp was never so easy before. According to the latest research from Check Point security firm, WhatsApp users are at the risk of getting their private chats and group conversations hacked and exploited. Researchers discovered a new wave of attacks that allow cybercriminals to penetrate your messages on WhatsApp. This penetration 
This is a post from HackRead.com Read the original post: New WhatsApp flaws let attackers hack private/group chats to fake news
Depleting gut microbiome in mice leads to better insulin sensitivity.
Somewhat serendipitously, Salk Institute researchers discovered that depleting the microbiomes of mice causes the animals to have lower levels of blood glucose as well as improved insulin sensitivity .
Antibiotic-induced microbiome depletion (AIMD) has been used frequently to study the role of the gut microbiome in pathological conditions. However, unlike germ-free mice, the effects of AIMD on host metabolism remain incompletely understood. Here we show the effects of AIMD to elucidate its effects on gut homeostasis, luminal signaling, and metabolism. We demonstrate that AIMD, which decreases luminal Firmicutes and Bacteroidetes species, decreases baseline serum glucose levels, reduces glucose surge in a tolerance test, and improves insulin sensitivity without altering adiposity.
One of the most amazing technological advances found in this years Hackaday Prize is the careful application of copper traces turned into coils. Weve seen this before for RFID tags and scanners, but weve never seen anything like what Carl is doing. Hes building brushless motors on PCBs.
All you need to build a brushless motor is a rotor loaded up with super powerful and very cheap magnets, and a few coils of wire. Now that PCBs are so cheap, the coils of wire are easily taken care of. A 3D printer and some eBay magnets finish off the rest. For this weeks Hack Chat, were talking with Carl about PCB motors.
Carl Bugeja is a 23-year old electronics engineer who is trying to design new robotics technology. His PCB Motor design won the Open Hardware Design Challenge and will be going to the Finals of the Hackaday Prize. This open-source PCB motor is a smaller, cheaper, and easier to assemble micro-brushless motor.
[Carl]s main project, the PCB Motor is a stator that is printed on a 4-layer PCB board. The six stator poles are spiral traces wound in a star configuration. Although these coils pr...
Companies like AT&T, Comcast, and Verizon are going around to state legislatures and telling them that any laws they pass that protect consumers will harm their ability to deploy networks in rural America. They claim that any legislator eager to protect their constituents from the nefarious things that can be done by companies that control access to the Internet is somehow hurting residents most desperate for an Internet connection. But their lack of willingness to invest has nothing to do with laws like net neutrality or privacy, because today they are nearly completely deregulated, sitting on a mountain of cash, and have no shown intention of connecting rural Americans to high-speed Internet while their smaller competitors take up the challenge.
Congress cut corporate tax rates last year and substantially increased the profit margins of large ISPs. In total, the top three major ISPs expect to receive an additional $8.8 billion in profits just from the tax cuts alone for 2018 (Verizon - $4 billion, AT&T - $3 billion, Comcast $1.8 billion) on top of the more than $34 billion (their profits in 2016) they are expected to collect in profits. What has happened with a vast majority of that new money has not been invested in expanding or upgrading their networks to fiber to the home (FTTH), which is necessary to have a network able to handle the coming advancements in Internet services, but rather in stock buybacks. That is to say that they are not using their money to improve things for their customers but to increase the share of the profits each shareholder gets all while leaving rural America to languish.
To give you context as to how much infrastructure potential $8.8 billion represents alone, it is more money than the entire budget Congress spent in 2009 to build broadband networks in its economic recovery package known as the American Recovery and Reinvestment Act. With a little more than $7 billion, Congress was able to fund 553 projects across the country including fiber optic roll out in rural America. Even then...
Posted by Cedric Buissart on Aug 09Cobbler is a Linux installation server that allows for rapid setup of
Arthur T Knackerbracket has found the following story:
A vicious species of tick originating from Eastern Asia has invaded the US and is rapidly sweeping the Eastern Seaboard, state and federal officials warn.
The tick, the Asian longhorned tick (or Haemaphysalis longicornis), has the potential to transmit an assortment of nasty diseases to humans, including an emerging virus that kills up to 30 percent of victims. So far, the tick hasn't been found carrying any diseases in the US. It currently poses the largest threat to livestock, pets, and wild animals; the ticks can attack en masse and drain young animals of blood so quickly that they diean execution method called exsanguination.
Key to the tick's explosive spread and bloody blitzes is that its invasive populations tend to reproduce asexually, that is, without mating. Females drop up to 2,000 eggs over the course of two or three weeks, quickly giving rise to a ravenous army of clones. In one US population studied so far, experts encountered a massive swarm of the ticks in a single paddock, totaling well into the thousands. They speculated that the population might have a ratio of about one male to 400 females.
Yesterday, August 7, Maryland became the eighth state to report the presence of the tick. It followed a similar announcement last Friday, August 3, from Pennsylvania. Other affected states include New York, Arkansas, North Carolina, Virginia, and West Virginia.
-- submitted from IRC
Read more of this story at SoylentNews....
Posted by Stiepan on Aug 09Hi,
When it came to settling on the latest-generation Dell XPS 13 as my main production workhorse with Fedora Workstation 28, besides the laptop's own traits like its build quality, specs relative to price, and other factors, another important requirement was the ability to drive two 4K displays when at my desk. The Dell XPS 13 has no issue driving dual 4K screens via the Dell Thunderbolt TB16 dock.
Posted by Simon McVittie on Aug 09Note that because of the way Debian and Ubuntu kernels are packaged, this
It is pretty unusual to be reading Bloomberg Businessweek and see an article with the main picture featuring a purple PCB (the picture above, in fact). But thats just what we saw this morning. The story is about an open source modification to an insulin pump known as the RileyLink. This takes advantage of older Medtronic brand insulin pumps and allows you to control the BLE device from a smartphone remotely and use more sophisticated software to control blood sugar levels.
Of course, the FDA isnt involved. If they were, the electronics would cost $7,000 instead of $250 although, in fairness, that $250 doesnt cover the cost of the used pump. Why it has to be a used pump is a rather interesting story. The only reason the RileyLink is possible is due to a security flaw and an active hacker community.
In 2011 Medtronic, a major manufacturer of insulin pumps. was told by security researchers that their wireless link was insecure. Future devices closed that security hole, but the existing devices were never upgraded. This left thousands of pumps in circulation.
Although the researchers were worried about the malicious use of the security hole, [Ben West], a programmer with diabetes, started a five-year reverse engineering effort to understand the communication protocol. A group of hackers also figured out how to relay glucose monitoring data to remote smartphones. By 2014 [West] met a couple who had a workable insulin dosing algorithm and the automatic pancreas was born.
It is a great story and a great example of what hackers can do to change lives for the better when they work together. To their credit, though, Medtronic seems to be willing to work with the hackers and exchange ideas. You have to wonder, though.
It sounds like RileyLink has been a great success and were glad. Its built on an a device which previously won FDA approval, but depends on what is essentially a design flaw. You can imagine the FDA would not be pleased (although not all of the users are in the US). If something did go wrong, what would happen then? If something bad happened on this or a similar project, there would be a feeding frenzy in the courtrooms as well as the court of public opinion. And how do you differentiate a sensible project like this from someone scamming people with a miracle cure add-on?
You can argue t...
Some engineers are turning down tech recruiters by citing concerns about corporate values
Anna Geiduschek usually has no time to respond to recruitment emails that arrive in her inbox each week. But Geiduschek, a software engineer at Dropbox, recently made a point of turning down an Amazon Web Services recruiter by citing her personal opposition to Amazons role in hosting another tech companys service used by U.S. government agents to target immigrants for detention and deportation.
"I'm sure you're working on some very exciting technical problems over there at AWS [Amazon Web Services], however, I would never consider working for Amazon until you drop your AWS contract with Palantir," Geiduschek wrote in her email response that she shared on Twitter.
Tech companies such as Amazon, Facebook, Google, and Microsoft have faced growing internal unrest from employees who raise ethical concerns about how the companies deploy their high-tech services and products. Tech workers have signed open letters opposing Googles Project Maven contract with the U.S. military, Microsofts contract for U.S. Immigration and Customs Enforcement (ICE), and Amazons sale of facial recognition technology to law enforcement.
That chorus of dissent is now growing louder as outside engineers voice their concerns to recruiters working for those tech companies.
The protests of tech workers have proven persuasive because Silicon Valley firms compete fiercely to recruit and retain relatively scarce engineering talent. For example, Googles leadership sought to reassure employees by declaring it would not renew its Pentagon contract and by issuing a set of ethical principles for future uses of Google-developed technologies.
By the same logic, engineers who are approached by tech recruiters also have leverage. I might be a one-off example, but it could be different if Amazon gets a lot of people emailing them saying, Hey I wont work for you because of this, Geiduschek says.
Jackie Luo, a software engineer at Square, took a similar stance with a tech recruiter who sought to interest her in a career with Google. The recruiter happened to contact Luo when she was reading about Googles plans to re-enter the Chinese market with a censored version...
Ben-Gurion University of the Negev (BGU) cyber security researchers warn of a potential distributed attack against urban water services that uses a botnet of smart irrigation systems that water simultaneously. The researchers analyzed and found vulnerabilities in a number of commercial smart irrigation systems, which enable attackers to remotely turn watering systems on and off at will. They tested three of the most widely sold smart irrigation systems: GreenIQ, BlueSpray, and RainMachine smart irrigation systems. More
The post A botnet of smart irrigation systems can deplete a citys water supply appeared first on Help Net Security.
The Florida Department of Corrections is one of the many state prison systems that rely on private contractors to supply electronic messaging and access to electronic music files and books for prisoners.
For seven years, Floridas prisoners have bought music through Access Corrections, a company that took in $11.3 million selling songs at $1.70 eachnearly twice what the typical song costs on the marketplaces available to people who arent incarcerated. This is hardly exceptional: prisons also charge extremely high rates for phone calls. The FCC briefly capped this at $1/minute (much higher than normal calling rates), only to have the Trump FCC abandon the policy rather than fight a court challenge.
Florida prisoners used Access Corrections $100 MP3 players to listen to their music purchases and access their other digital files. But the Florida Department of Corrections has terminated its contract with Access Corrections in favor of the notorious industry-leader Jpay, a company that once claimed ownership of inmates correspondence with their families, and had inmates who violated the companys lengthy terms of service punished with solitary confinement, and who became notorious for selling digital postage stamps to prisoners who want message their loved ones (prisoners need to spend one postage stamp per page of electronic text, and the price of postage stamps goes up around Mothers Day).
(Jpay is a division of Securus, a company notorious for selling and even giving away access to US and Canadian cellphone location data, without a warrant, and without notice to the tracked individuals.)
Neither Jpay nor Access Corrections have offered prisoners any way to move their music purchases from the old devices to the new ones. Prison rules ban prisoners from owning more than o...
Via: Mercury News: The Bay Area continues to lead the state in shattered home-ownership dreams. Record home prices and rising interest rates have pushed statewide home affordability rates to a 10-year-low. In the Bay Area, fewer than 1 in 5 residents can afford to buy into one of the nations most expensive real estate markets, 
On September 29th, 2017, SpaceX CEO Elon Musk unveiled detailed plans of the Big Falcon Rocket at the 68th International Astronautical Congress in Adelaide, Australia. It was a follow-up speech to the prior years presentation when he first discussed the architecture of what was then called the Interplanetary Transport System. In his highly anticipated speech, Musk laid out the detailed plans for a two stage rocket to enable the colonization of Mars, a moon base, and hypersonic long-distance travel on Earth.
The design featured an enormous Booster that would be powered by 31 Raptor engines, planned to be the worlds most advanced and highest pressure chemical rocket engine. Following stage separation, the booster would return to Earth and land near or on the launch pad.
There were three variants of the rockets second stage planned: a Spaceship, Tanker and Cargo Lifter. The primary of which, the BFR Spaceship, was also the colonization vehicle and that could carry up to 100 passengers and a hundred tonnes of cargo. One possible use of the Spaceship was as the worlds first hypersonic passenger transport vehicle, which would enable travel between any two points on Earth in under an hour. Its primary envisioned mission, however, was to be a colonization vehicle for the Moon, Mars and beyond.
Demo test, abort test, finish COPVs, test fuel loading, and so on. Its a long list.
Apple is letting Infowars remain in its app store, saying that right-wing conspiracy site has not violated its policies. But the company is monitoring the app. We strongly support all points of view being represented on the App Store, as...
Posted by Andrey Konovalov on Aug 09I've uploaded the exploit:
The Earth discovered it was living in a new slice of time called the Meghalayan Age in July 2018. But the announcement by the International Union of Geological Sciences (IUGS) confused and angered scientists all around the world.
In the 21st century, it claimed, we are still officially living in the Holocene Epoch, the warm period that began 11,700 years ago after the last ice age. But not only that: within the Holocene, we are also living in this new age the Meghalayan and it began 4,250 years ago.
Over the past decade, more and more scientists have agreed that human impact on Earth is so significant that we have entered a completely new geological phase, called the Anthropocene, including a group convened to agree a formal definition. The world of science was expecting an official announcement acknowledging this Anthropocene Epoch, not the unheard-of Meghalayan Age. It was so unexpected it turned up zero hits on Google when first reported. So whats going on?
Security researchers at Trustwave have released a new open-source tool that uses facial recognition technology to locate targets across numerous social media networks on a large scale. Dubbed Social Mapper, the facial recognition tool automatically searches for targets across eight social media platforms, includingFacebook, Instagram, Twitter, LinkedIn, Google+, the Russian social networking
The latest high profile open-source project bitten by some fresh CVE security vulnerabilities is the PostgreSQL database server...
Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attacks before they affect any organization. However, the same technology can also be weaponized by threat actors to power a new generation of malware that can evade even the best cyber-security defenses and infects a computer network or launch an attack only
When it comes to running and managing open source in the enterprise, experience-driven advice counts for a lot. It is very likely that your organization already runs open source, but many organizations make the mistake of reacting to the open source ecosystem instead of adopting a proactive strategy that is optimized for success. Thats where the free Enterprise Open Source ebook comes in.
Given its appearance in one form or another in all but the cheapest audio gear produced in the last 70 years or so, youd be forgiven for thinking that the ubiquitous VU meter is just one of those electronic add-ons thats more a result of marketing than engineering. After all, the seemingly arbitrary scale and the vague volume units label makes it seem like something a manufacturer would slap on a device just to make it look good. And while that no doubt happens, it turns out that the concept of a VU meter and its execution has some serious engineering behind that belies the really simple question it seeks to answer: How loud is this audio signal?
Unsurprisingly, the modern VU meter can trace its roots back to the twin formative technologies of the 20th century: telephone and radio. For the first time in history, the human voice was projecting further than the distance the loudest person could shout, and doing so by means of electrical signals. Finding a way to quantify that signal and turn it into a value that represented the perceived volume of the original sound was crucial to design a system that could faithfully transmit it.
Given the nature of their network, the early telephone pioneers efforts at sound level metering were based on line losses over a standard mile of cable. Meters calibrated to this standard made it easy for them to adjust their vacuum tube repeaters to compensate for the speech power loss over a known length of wire.
As radio became commercialized and more widespread, the correlation between sound levels and loop length began to make less sense. In the 1920s, radio and telephone engineers began to converge on a better solution. The transmission unit (TU) was used to measure the power ratio between two different sound sources. Its a logarithmic measure, and as such better reflects how the human ear perceives sounds. The TU measurement also had the advantage of being usable at any frequency since it doesnt factor in the inductance and capacitance of a miles-long loop of wire.
Many TU meters were marketed over the 1920s and 1930s to sound engineers, whose ranks swelled when the film industry introduced talkies. There was no real standardization, however, and it was becoming increasingly hard to compare sound levels between industries, and often between different pieces of sound equipment. In the late 1930s broadcasters, motion picture companies, and the telephone industry all got together to hammer out a standard that could be used for all audio signal measurement needs. They dubbed the new measurement Volume Units, and the VU meter was born.
Arthur T Knackerbracket has found the following story:
Manure from a high-density cattle farm that holds upward of 100,000 cows may have been the source of a deadly Escherichia coli strain that found its way onto romaine lettuce and caused a massive outbreak earlier this year. That's according to a new hypothesis announced this week by the Food and Drug Administration.
The bacterium behind the outbreak was a particularly nasty strain of Shiga toxin-producing Escherichia coli O157:H7 that produces only Shiga toxin type 2 (Stx2), the more toxic of two types of toxins E. coli tends to carry. Stx2 causes cell death, triggers immune responses, and leads to the destruction of red blood cells, which can damage the kidneys.
Such Shiga-toxin producing E. coli are shed from the guts of animals (particularly cattle) and are spread by feces.
Traceback investigations by federal authorities linked the illnesses to romaine lettuce grown in the Yuma region of Arizona. Further work found that the outbreak stain was present in canal water running along farms. That pointed experts to the idea that tainted canal water was used for irrigation, literally showering crops with deadly germs.
In the new update, the FDA notes that a Concentrated Animal Feeding Operation (CAFO) is located nearby to a cluster of romaine lettuce farms. Such high-density farms are notorious for causing water quality issues. Thus, poopy runoff from the CAFO may have contaminated the canal water, which then made its way onto vegetables directly through irrigation or some other indirect route. The FDA noted that it has been pondering other hypotheses, but it didn't outline what those were.
-- submitted from IRC
Read more of this story at SoylentNews.
Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment defined as mature or moderately mature programs that include targeted and tailored scanning and prioritizing computing resources based on business criticality as a foundational element of their cyber defense and a critical step toward reducing risk, a new Tenable report has revealed. Of those organizations, however, only five percent display the highest degree of maturity, with comprehensive asset coverage as a cornerstone More
The post Theres a global divide in how organizations assess cyber risk appeared first on Help Net Security.
Facebook is known for copying Snapchats features for its social media platforms. And, the social media giant has done it yet again!!! Facebook in a blog post yesterday announced a new feature in Messenger app for its users that makes connecting with friends in video chat even more fun and competitive. Facebook has added augmented reality (AR) games in video chats of its Messenger app. This feature allows up to six people to play the AR games at a time via video chat.
For the moments when we cant be together IRL, Messenger video chat helps you connect in real-time with the people you care about most. Today were excited to make connecting with your friends in video chat even more fun and competitive! with multiplayer video chat AR games, Facebook said in the announcement on Wednesday.
Currently, there are two AR games, Dont Smile and Asteroid Attack that are available to play. These games test each players ability to steer a spaceship using their face.
With this feature starting to roll out today, you can challenge your friends around the world to two games: see who can hold a serious face the longest with Dont Smile, or see who can better navigate their spaceship with Asteroids Attack, the social media giant said.
Facebook also plans to roll out more games in the coming weeks and months. One of them is called Beach Bump, where players get to pass a beach ball back and forth, while another one is a matching cat game called Kitten Kraze.
Facebooks new feature is very much like one of Messengers chief competitor, Snapchats Snappables the lens-based games inside the Snapchat camera, that was launched in April this year. Snappables allows the user to use touch, motion, and facial expressions to compete for high scores or in literal head-to-head multiplayer match-ups. Some of the first Snappables previewed by Snapchat include an Asteroids-style space shooter, a weightlifting one you play by straining your forehead, a bubble gum popping contest, an egg-catching competition, a kiss-blowing game, and a dance party.
Tripwire released its State of Cyber Hygiene report, which examined how organisations are implementing security controls that the Center for Internet Security (CIS) refers to as cyber hygiene. The survey found that almost two-thirds of the organisations admit they do not use hardening benchmarks, like CIS or Defense Information Systems Agency (DISA) guidelines, to establish a secure baseline. These industry standards are one way to leverage the broader community, which is important with the resource More
The post Cyber hygiene: Where do organizations fall behind on basics? appeared first on Help Net Security.
Posted by Solar Designer on Aug 09Hi,
The vulnerability tracked as CVE-2018-5740 was discovered by Tony Finch of the University of Cambridge. The flaw has been assigned a CVSS score of 7.5, the expert pointed out that the flaw only affects servers that have on a feature called deny-answer-aliases enabled. The good news is that this specific feature is disabled by default.
The deny-answer-aliases feature is was implemented to help recursive server operators protect users against DNS rebinding attacks. The DNS rebinding arracks allow any website to create a dns name that they are authorized to communicate with, and then make it resolve to localhost. A remote hacker to abuse the targeted users browser to directly connect with hosts on the local network and exploit flaws in these systems.
deny-answer-aliases is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an INSIST assertion failure in name.c. states the security advisory published by the ISC.
Accidental or deliberate triggering of this defect will cause an INSIST assertion failure in named, causing the named process to stop execution and resulting in denial of service to clients. Only servers which have explicitly enabled the deny-answer-aliases feature are at risk and disabling the feature prevents exploitation.
The vulnerability affects BIND versions 9.7.0 through 9.8.8, 9.9.0 through 9.9.13, 9.10.0 through 9.10.8, 9.11.0 through 9.11.4, 9.12.0 through 9.12.2, and 9.13.0 through 9.13.2.
The ISC has issued a security patch that is implemented in versions 9.9.13-P1...
The death of Skype 7 (or Skype classic) has been delayed, following "customer feedback", according to Microsoft.
The message that was left on the original post, as reported by Microsoft blog Thurrott, was simple: "Thanks for all your comments - we are listening." A Microsoft spokesperson told CNET they have nothing more to share beyond the blog post at this time.
[...] It appears, for now, that Skype classic will continue being supported -- at least until Microsoft can transplant much-loved features to its updated version.
Read more of this story at SoylentNews.
The Linux Foundation Deep Learning Foundation (LF DLF) has announced five new members: Ciena, DiDi, Intel, Orange and Red Hat.
As an umbrella organization of The Linux Foundation itself, the LF DLF supports and sustains open source innovation in Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL).
I was recently chatting with my father about his life as a young boy growing up in rural Ireland in the middle of the last century, and the conversation moved onto cars and how when he was young cars were a relatively new technology. In the world we know today, road safety is carefully enforced to the point where we take it for granted. But it wasnt always thus. People simply werent aware of the More
The post IoT security: Lessons we can learn from the evolution of road safety appeared first on Help Net Security.
Marek Olk has continued his busy work on the RadeonSI Gallium3D driver by implementing more extensions and adjusting various limits/constants to match the behavior of their proprietary driver...
While DXVK is capable of running a great deal of Direct3D 11 games via Vulkan within Wine, a number of games have required various workarounds for either getting the game to properly work in the first place or to run efficiently. Those per-game settings are now being punted off into a per-game configuration system...
Posted by Stiepan on Aug 09Hi,
Improvements in methodology have dramatically dropped the cost of DNA sequencing in the last decade. In 2007, it cost around $10 million dollars to sequence a single genome. Today, there are services which will do it for as little as $1,000. Thats not to bad if you just want to examine your own DNA, but prohibitively expensive if youre looking to experiment with DNA in the home lab. You can buy your own desktop sequencer and cut out the middleman, but they cost in the neighborhood of $50,000. A bit outside of the experimenters budget unless youre Tony Stark.
But thanks to the incredible work of [Alexander Sokolov], the intrepid hacker may one day be able to put a DNA sequencer in their lab for the cost of a decent oscilloscope. The breakthrough came as the result of those two classic hacker pastimes: reverse engineering and dumpster diving. He realized that the heavy lifting in a desktop genome sequencer was being done in a sensor matrix that the manufacturer considers disposable. After finding a source of trashed sensors to experiment with, he was able to figure out not only how to read them, but revitalize them so he could introduce...
Nintendo has had enough of pirates and the websites that enable them, like EmuParadise. After shutting down a handful of sites and a Game Boy Advance emulator on GitHub in July, the publisher has seemingly done the work to convince EmuParadise to shut down. This massive online library of downloadable old games started 18 years ago, and up until this moment it hosted nearly complete libraries of games for various consoles that you could download and play on emulators.
Playing ROMs, as these game files are often referred to as, on an emulator exists in a legal gray area, but distributing these copyrighted works for download on the internet is obviously and clearly illegal. But Nintendo and other publishers have mostly avoided investing resources in tracking down and enforcing its legal right in many of these cases over the last couple of decades. For Nintendo, however, something has changed, and it is cracking down. And EmuParadise has confirmed that it is going to do what it must to avoid facing legal action.
"We will continue to be passionate retro gamers and will keep doing cool stuff around retro games, but you won't be able to get your games from here for now," reads an EmuParadise blog post. "Where we go with this is up to us and up to you."
Previously: Nintendo Sues ROM Sites
Read more of this story at SoylentNews.
Tribune Media has backed out of its proposed $3.9 billion merger with Sinclair Broadcast Group and filed a $1 billion lawsuit against the broadcasting giant for allegedly breaching their agreement.In an announcement early Thursday morning, Tribune...
A new study from the Kapor Center, Pivotal Ventures and Arizona State University's Center for Gender Equity in Science and Technology found that women of color make up 80 percent of all new women-led small businesses in the US. In tech, however, that figure plummets to 4 percent.
OpenSUSE's Kubic project that has been home to their container-related technologies as well as the atomicly-updated openSUSE "MicroOS" will be making some changes...
Shortly after writing about the Sound Blaster Recon3D finally getting Linux support yesterday, a Phoronix reader pointed out another frustrating Linux sound problem with a resolution on its way to the mainline Linux kernel...
Wi-Fi Protected Access II, or WPA2, is the standard behind wireless security networking. It protects users everywhere, from coffee shops to college campuses to corporate headquarters. WPA2 may be the most widespread security standard in the world that ordinary people encounter.
Spider silk is a bit of a dream material, stronger than steel by some measures yet incredibly light and flexible. Obtaining spider silk, however, is a bit of a nightmare, as most spider species are both extremely territorial and prone to cannibalism. While we have managed to identify the genes that are needed to produce silk, inserting those into other species hasn't worked out especially well, since silk formation depends on fairly precise mixtures of several proteins, as well as how the spider extrudes the fiber.
A Chinese group is now reporting some progress in overcoming at least some of these challenges. Their trick was to insert the genes into a domesticated species that already makes something like spider silkspecifically, the species that gave us the term silk. The new bit of genetic engineering has resulted in a silkworm that produces a hybrid silkworm/spider material that's not as tough but is a bit stretchier than native spider silk.
[...] They designed proteins that would cut the silkworm's chromosomes on either side of a gene that encodes a major silk protein. RNA encoding those proteins was injected into silkworm eggs, along with a DNA template that would allow the egg to repair the chromosome by inserting a spider silk gene instead. This put the spider gene under the control of the factors the silkworm normally uses to create silk proteins, which worked much better, as about 35 percent of the resulting silk was composed of the spider protein.
[...] The silk itself was also slightly different, shrinking in diameter by about 16 percent. Its ability to withstand stress without breaking was down by a similar percentage. But there were some good features; the spider-silkworm hybrid silk could be stretched to about 1.5 times the length that normal silk could without breaking.
Mass spider silk production through targeted gene replacement in Bombyx mori (open, DOI: 10.1073/pnas.1806805115) (DX)
Read more of this story at SoylentNews.
Artificial intelligence software is making its presence felt in subtle ways, in an unglamorous place: the back office.
It's not nearly as far along as DXVK that is allowing D3D11-over-Vulkan and already running great numbers of games in a performant manner under Wine, but the VK9 project for implementing Direct3D 9 over Vulkan has now hit its twenty-seventh milestone...
Perception Point announced the launch of an Advanced Shared Drive Security solution for OneDrive, SharePoint, Dropbox, Google Drive and Box. Cloud-based shared drive applications are essential productivity tools in todays enterprise environment. Despite widespread adoption, the majority of these platforms lack the security measures that have been instrumental in securing email, endpoints and networks, creating security blind spots that pose a cybersecurity risk. According to market research, 81% of IT decision makers consider shared drive More
The post Perception Point launches anti-malware solution for shared drives appeared first on Help Net Security.
Ziften announced its Zenith endpoint protection platform now includes AV protecting all enterprise endpoints from known and unknown targeted attacks. Ziften helps enterprises simplify endpoint protection plus visibility. Zenith is the cyber security platform that provides one agent for all endpoints laptops, desktops, servers, and cloud preventing multi-vector attacks with advanced AV, detection and response, plus visibility and hardening. Attackers have created a criminal industry by attacking vulnerable enterprise endpoints. And traditional AV More
The post Ziften adds AV to the Zenith endpoint protection platform to stop attacks appeared first on Help Net Security.
Bugcrowd announced the launch of Bugcrowd University to educate and empower the crowd with the latest skills and methodologies. The first advanced program of its kind, Bugcrowd University provides researcher education and training to improve the state of application security training, community engagement and content delivery. Bugcrowd University is free and open to all security researchers not just those on the Bugcrowd Platform. In the last few years, organizations around the world have witnessed More
The post Bugcrowd University to provide hands-on training for security researchers appeared first on Help Net Security.
Capsule8 announced it has secured its $15M Series B round of funding. The round, led by ClearSky Security, also features participation from Bessemer Venture Partners, Rain Capital and strategic investors. The round brings total funding to $23.5M and will be used to scale Capsule8s engineering organization and fuel sales efforts of the Capsule8 platform. We are incredibly impressed with the momentum of Capsule8 and the market traction they have already made since their product launch More
Thirteen companies, including Boeing and Amazon billionaire Jeff Bezos Blue Origin space venture, will be doing studies for NASA on the future of commercial human spaceflight in low Earth orbit.
All of the studies are due in December, and are supposed to cost no more than $1 million each. NASA still has to negotiate the contract amounts with the study groups, but it expects the total cost of the effort to come in at around $11 million.
The Cloud Native Computing Foundation today officially graduated Prometheus from incubation, opening a new chapter in the popular open-source projects evolution.
Prometheus is one of the most widely used systems for monitoring software container deployments. As such, the project has taken on an important role in the rise of containers, which are increasingly used to deploy applications because theyre lightweight and can easily move between different kinds of infrastructure.
Its the suburbanistas weekend nightmare: youre almost done with the weekly chores, taking the last few passes with the lawn mower, when you hear a pop and bang. The cylinder head on your mower just blew, and youre out of commission. Or are you? Youve got a 3D printer couldnt it save the day?
If this bench test of plastic cylinder heads is any indication, its possible just as long as youve only got 40 seconds of mowing left to do. [Project Farm] has been running all sorts of tests on different materials as field-expedient cylinder heads for small gasoline engines, using everything from JB Weld epoxy to a slab of walnut. For this test, two chunky heads were printed, one from ABS, of the thermochromic variety apparently, the other in PLA. The test went pretty much as expected for something made of thermoplastic exposed to burning gasoline at high pressure, although ABS was the clear winner with two 40-second runs. The PLA only lasted half as long before the spark plug threads melted and the plug blew out. A gasket printed from flexible filament was also tested, with predictably awful results.
As bad as all this was, it still shows that 3D-printed parts are surprisingly tough. Each part was able to perform decently under a compression test, showing that they can stand up to pressure as long as theres no heat. If nothing else, it was a learning experience. And as an aside, the cylinder heads were printed by [Terry] from the RedNeckCanadians YouTube channel. That video is worth a watch, if just for a few tips on making a 3D-printed copy of an object.
WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security flaws that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations.
Researchers at security firm Check Point have discovered several vulnerabilities in the popular instant messaging app Whatsapp, the flaws take advantage of a bug in the security protocols to modify the messages.
An attacker could exploit the flaws to intercept and manipulate messages sent by those in a group or private conversation as well as create and spread misinformation.
The issues affect the way WhatsApp mobile application communicates with the WhatsApp Web and decrypts the messages using the protobuf2 protocol.
The flaws allow hackers to abuse the quote feature in a WhatsApp group conversation to change the identity of the sender, or alter the content of members reply to a group chat, or send private messages to one of the group members disguised as a group message.
Experts pointed out the that flaws could not be exploited to access the content of end-to-end encrypted messages and in order to exploit them, the attackers must be already part of group conversations.
Check Point researchers have discovered a vulnerability in WhatsApp that allows a threat actor to intercept and manipulate messages sent by those in a group or private conversation. reads the blog post published by the experts.
The vulnerability so far allows for three possible attacks:
The experts demonstrated the exploitation of the flaws by changing a WhatsApp chat entry sent by one member of a group.
The research team from CheckPoint researchers (Dikla Barda, Roman Zaikin, and Oded Vanunu) developed a custo...
China on Wednesday increased the maximum speed of bullet trains on the Beijing-Tianjin high-speed railway to 350 km per hour (kph), reducing the inter-city travel time by five minutes.
The route now runs a Fuxing (Rejuvenation), the newest bullet train model developed in China.
The increase will shorten travel time between Beijing South Railway Station and Tianjin Railway Station from 35 minutes to 30 minutes with no price difference in fares.
Read more of this story at SoylentNews.
Posted by Petr paek on Aug 09Hello,
The only thing good in this public scandal is that it has become public. The scam itself proved safe enough but that is no consolation when the next round can kill thousands.
The whole vaccination protocol has turned into a cash grab free for all regardless of the effectiveness or lack thereof. We really have to be highly suspicious in the current environment.
Add in the questionable science that launched it all and our lack of curiosity, the whole approach needs to be rigorously investigated using modern approaches and a lack of bias.
At the Academy of Motion Picture Arts and Sciences Board of Governors meeting on Tuesday night, the 54 governors voted to add a new category to the Oscars. Per tradition, some 7,000 Academy voters, experts in their field, voted in by their colleagues, will weigh in on the best films of the year in 24 categories covering the crafts of moviemaking, from cinematography to sound, as well as the four acting categories, directing, writing, animation, foreign language, documentary, and fiction shorts and features.
But this year there will be one more: Best Popular Film. The Academy is bowing to pressure from ABC, which is anxious about historic low ratings for its telecast. The next Oscars will air on February 24, 2019 and, in 2020, will move up from February 23 to February 9, the earliest date ever, in a bid to jump ahead of multiple rival awards showswhich will, in turn, move ahead of the Oscars. (In the early days of its history, the Oscars were held in May, moved to April and March, then February.)
The Board also finally succumbed to building pressure to keep the show to three hours and not present live some of the less sexy craft categories, following the lead of other awards shows like the Tonys. (Sexy categories like Sound Mixing and Editing will be presented live during commercial breaks, then edited into the show.) This also serves to undermine the integrity of these annual global awards, which may be losing relevance as a mainstream shared event, but are still revered by cinephiles around the world.
Posted by Michael McNally on Aug 08Earlier today ISC disclosed CVE-2018-5740, involving a potential
The Raspberry Pi platform has become popular in the maker community for various CNC projects. The single board computers are readily suited to acting as a server for a small CNC setup or 3D printer, though its fair to say that for heavy work they probably arent quite up to the task of driving the steppers in a serious rig directly. [Danny] set out to try to build a CNC plotter of his own, using a Pi Zero, and learned a few things along the way.
The plotter uses 3D printed parts combined with brushed DC motors which are geared down. Potentiometers are added to allow the Pi to keep track of the location of the pen. This enables the position to be corrected through feedback.
While the plotter does move and accept commands, it does have some issues. There is significant play in the gear train which [Danny] suspects of causing the poor output results. If youve got any ideas as to how this could be improved or overcome, throw them down in the comments!
Weve seen another take on CNC control with the Raspberry Pi, too. Video after the break.
Posted by Salvatore Bonaccorso on Aug 08-------------------------------------------------------------------------
Raising capital with ICOs (Initial Coin Offerings) has become very popular: in 2017 alone, ICOs has raised a combined $3.7 billion. Projects using this model typically raise capital by issuing digital tokens on a blockchain and distributing them to investors for a financial contribution. Such crypto tokens represent a virtual store of value, which can be transferred via peer-to-peer networks and may serve different functions. Depending on their role, crypto tokens may be broadly subdivided into two major types: utility tokens and security tokens.
Utility tokens are used for granting access to a companys products or services or entitle their holders to be a part of an ecosystem where this token acts as a native currency. Utility tokens are not designed for investments and this leads to a lack of security regulations.
Security tokens derive their value from an external, tradable asset and share specific characteristics with regular financial instruments which are subject to security regulations. The commonly known characteristics are the representation of ownership and entitlement to the residual cash flows generated by the digital enterprise. When the token is classified as a security, it may represent shares of company stock.
A recent study conducted by Satis Group LLC, a premier ICO advisory company, states that over 80 percent of all ICOs are fraudulent. As mentioned, utility tokens are not subject to the same regulatory requirements as security tokens, which opens up a broad field of opportunities for fraudsters of all kinds. The absence of security can be shown as a sort of freedom during the ICOs marketing, but in fact, the token may easily turn out to be a scam. In most cases of fraud, tokens of such projects turn to dust. Investors are not protected from such situations at all. When a token is a utility token: all guarantees and agreements are in words, and if it turns out that a project has no intention of fulfilling development duties with the funds, theres no law or regulation to help the defrauded investors.
A security token, on the other hand, being subject to security regulations should satisfy legal requirements, thus theres much less of a chance a project with a token classified as a security would turn out to be a scam. Its also important to understand that a com...
The Food and Drug Administration (FDA) has approved soy leghemoglobin as generally recognized as safe (GRAS) for human consumption:
Last August, documents obtained through a Freedom of Information Act request revealed that the FDA hadn't stomached the company's previous GRAS application. The agency concluded that soy leghemoglobina protein found in the roots of soybean plants that Impossible Foods harvests from genetically engineered yeast and uses to simulate the taste and bloodiness of meathad not been adequately tested for safety.
In the application, Impossible Foods argued that the iron-containing protein is equivalent to hemoglobin, an oxygen-carrying protein in red blood cells and commonly consumed in meat. Thus, the protein was safe, the company concluded. It went as far as conducting studies in rats to back up the claim. But the FDA noted that soy leghemoglobin had never been used as an additive before, and the organization wanted data showing that the protein was safe and not an allergen specifically for humans.
[...] At the time, the decision was a searing blow to Impossible Foods, which up until then had fired up the appetites of investors and top chefs alike and savored glowing publicity. Since the company's founding in 2011, big names such as Bill Gates and Google Ventures served up more than $250 million in startup funds, and the impossible patty sizzled on the menus of such high-end restaurants as Momofuku Nishi in New York and Jardinire in San Francisco. The soy leghemoglobin was a big part of that hype, with the company touting it as its "secret sauce."
But the FDA's gut check didn't knock Impossible Foods off the market; it just left a bad taste. In fact, the company wasn't even required to submit its GRAS application to begin with due to the controversial way in which the FDA oversees food additives and GRAS designations. Under the 1938 Food, Drug and Cosmetic Act and the 1958 Food Additives Amendment, the FDA allows food companies and their hired consultants to internally test and determine a GRAS designation of a potential new additive all on their own. They can start using it without getting approval from the FDA or even notifying the agency. The FDA only steps in after the fact if problems arise.
Impossible Foods' FAQ says "the heme molecule in plant-based heme is atom-for-atom identical to the heme molecule found in meat". Heme is a component of soy leghemoglobin...
Last month, the Japanese company flexed its muscles by filing a complaint at a federal court in Arizona, targeting LoveROMS.com and LoveRETRO.co for copyright and trademark infringement.
The sites, believed to be operated by Jacob Mathias and his company Mathias Designs LLC, offered access to a wide variety of ROMs, including those relating to many Nintendo games.
The LoveROMs and LoveRETRO websites are among the most open and notorious online hubs for pirated video games, Nintendo wrote in its complaint.
Through the LoveROMs and LoveRETRO websites, Defendants reproduce, distribute, publicly perform and display a staggering number of unauthorized copies of Nintendos video games, all without Nintendos permission.
Both sites are currently down and displaying messages indicating they probably wont be back. This development was met with disappointment from the emulator community but now theres the inevitable problem of fallout and yet more bad news for retro fans.
In an announcement Wednesday, EmuParadise, one of the webs longest standing emulator and ROM download portals, revealed that it will no longer be offering game ROMs for download. The news came in a heartfelt announcement by its founder MasJ, who explained that hed pumped nearly two decades of his life into the project.
Many of you are aware that the situation with regards to emulation sites has been changing recently. What you probably dont know is that we at EmuParadise have been dealing with similar issues for all 18 years of our existence, he wrote.
From receiving threatening letters in the early days to our hosts suddenly shutting down our servers due to complaints, weve seen it all. Weve always complied with takedown requests but as you can see, that is no guarantee of anything.
MasJ says that having grown up in India, he never got to play any retro games. However, his love for the genre meant that he wanted others to join in, something which led to the creation of EmuParadise and the building of a like-minded team around the platform.
While the legal eagles out there might argue that ROM sites are illegal, this clinical view mostly fails to factor in the allure of retro games many of them abandoned,...
It began like any normal pregame in the woods.
Naked, alone, hungover, a sweaty sleeping bag in the back of a dusty pickup truck, miles from civilization. Predawn in a narrow Utah river bottom, canyon country, early July. A Thermos of lukewarm coffee. Last nights empties scattered below the exhaust. I lie awake beneath ancient cottonwoods and the hulking black shadows of canyon walls, listening for bird song while running through the mornings survey variables in my head. Immediately identifiable onesravens, magpies, hawks, black bears, skunks, quicksandand harder to predict ones. Whether the temperatures will reach 104 degrees Fahrenheit before 11 a.m. Whether the down-canyon winds will exceed Category 4 (11-16 mph) on the Beaufort scale. How many cubic feet per second the river jumped overnight and how many decibels the increased current noise will affect acoustic detection probabilities. Im thinking contingencies. What to do if conditions become unsuitable. Where to go if I cant cross the river. How to get out alive, without cell service, if something goes wrong.
By 5:15 a.m., Im rereading the protocol by headlamp. A
Natural History Summary and Survey Protocol for the Western
Distinct Population Segment of the Yellow-billed Cuckoo. Im
going over lookalikes and
Wrangel Island carries a certain profoundness, a divine story of a different sort. Life here is postapocalyptic, a kind of rebound. It portends the future.
My sponsor is Alexander Gruzdev, a big bear of a man with a nice smile, a throaty Russian accent, a Ph.D. in biology, and the ability to knock back a lot of vodka. Alexander is also the director of the Wrangel Island Reserve. He goes by Sasha, and is not the best communicator. On the occasions when Sasha tries to speak Englishwhich I appreciatemuch of his meaning is lost and so I dont know what to expect on Wrangel.
One thing I do know is that, as part of the forgotten Russia east of the Urals, it will be primitive. Ill be the Americanski in a beefy culture where tanks and testosterone rule. Its a place where songs blare I will drink your blood, and where a large poster of a topless woman is shamelessly displayed on the office wall of Wrangel Reserves deputy chief. Russians whove never visited the States hold Americans in little regard, assuming that theyre unable to hold their liquor, hike up a mountain, or skin out a deer.The divine postapocalyptic:
The Kyrgyz soldier stepped quietly out of the dark green bushes and swung his Kalashnikov rifle in the direction of our car. Another emerged and did the same. Their checkpoint was a skinny log dragged across a broken asphalt road heading toward an ethnic Uzbek village and the disputed waters of the Kasan-sai, a reservoir that irrigates the agricultural heartland of the ancient Fergana Valley. With a sleepy shake of his head, the special forces sergeant waved his rifle and made us turn our beat-up Mitsubishi around. There wont be any fighting here, the sergeant said.
At least not today. The quiet of the hot September afternoon was unbroken as we turned around and slowly ground off through the heat. Driving back the way we came through the parched foothills on the edge of the western Tian Shan range, a spur of the Himalayas, we did not pass any other cars.
But it has not always been this quiet. Throughout the spring and
summer in 2016, tensions flared after ethnic Uzbek villagers and
police blocked access to the reservoir and its water, which lies
inside Kyrgyzstan. Uzbekistan drove armored personnel carriers into
Kyrgyzstan, and both sides have captured and detained
The tariffs imposed by President Trump have claimed more jobs, this time at a consumer-electronics manufacturing plant in South Carolina.
Element Electronics blamed tariffs on Chinese imports for its decision to shut down its manufacturing facilities in Winnsboro, SC, a town located about 30 miles north of the state's capital. The plant, which makes Element TVs, will maintain a skeleton crew of eight workers, as it hopes the shutdown will be temporary."
The news is especially hard for Winnsboro and its surrounding communities because of recent job losses in the area, including the shuttering of a Walmart store, the closing of a textile mill, and the cancellation of plans to construct two nuclear reactors.
Element notified the state's Department of Employment about its plans, according to Columbia-based The State newspaper, which first reported on the plant's closing. In its notification, Element stated, "The layoff and closure is a result of the new tariffs that were recently and unexpectedly imposed on many goods imported from China, including the key television components used in our assembly operations in Winnsboro."
Read more of this story at SoylentNews.
When you think of technical education about machine learning, Facebook might not be the company that pops into your head. However, the company uses machine learning, and theyve rolled out a six-part video series that they say shares best real-world practices and provides practical tips about how to apply machine-learning capabilities to real-world problems.
The videos correspond to what they say are the six aspects of machine learning development:
None of the videos are longer than 10 minutes, so youll invest less than an hour. The videos focus less on a specific product and more on the architecture and implementation strategies. Thats valuable, but this probably isnt your only machine learning tutorial.
Quite a bit of these videos cover things we think are pretty obvious engineering axioms applied to machine learning. For example, a recurring theme is that you need to have a way to evaluate the system and do testing to see that things you change are actually making things better. Still, there are some things that are specific to machine learning.
Facebook has been in the news a lot lately, mostly not in a good way. However, their research arm quietly turns out things ranging from Torch a scientific computing framework with machine learning, to speech recognition and synthesis.
Transhumanity.net Social Futurism & the Zero State.
This article is part of a series about the Mythos (worldview-narrative) underlying the Zero State (ZS). Part 1 is about our highest concept, ideal, and level of organization, which we call The Array. Part 2 explains the Sections & Sessions our core activity revolves around, and Part 3 (below) covers the Twelve Foundation Stones that form the basis of our story.
A previous article I wrote for Tnet mentioned the need for entertainment that gives people a strong sense of meaning and purpose in their lives, and introduced an idea known as the twelve Foundation Stones of the ZS-ARG Mythos . The Foundation Stones are the seeds of our unifying narrative. Each is the fragmentary initial story of one of the twelve ZS Houses, outlined very briefly below and spelled out in full in the forthcoming Black Book.
Before reading this article it is important to understand that it refers to the Zero State (ZS) Alternate Reality Game (ARG), and thus deals in metafiction. It is not a simple non-fiction article (obviously!) and will only make sense if you already know ZS, or follow some of the links above! This article draws with thanks upon text from the ZS wiki, some of which has been contributed by members of the various ZS Houses.
We're still not getting the regular thunderstorms one would normally expect in the New Mexico monsoon season, but at least we're getting a little relief from the drought.
Last Saturday we had a fairly impressive afternoon squall. It only lasted about ten minutes but it dumped over an inch of rain and hail in that time. ("Over an inch" means our irritating new weather station stopped recording at exactly 1.0 even though we got some more rain after that, making us suspect that it has some kind of built-in "that can't be right!" filter. It reads in hundredths of an inch and it's hard to believe that we didn't even get another .01 after that.)
It was typical New Mexico hail -- lentil-sized, not like the baseballs we heard about in Colorado Springs a few days later that killed some zoo animals. I hear this area does occasionally get big hailstones, but it's fortunately rare.
There was enough hail on the ground to make for wintry snow
scenes, and we found an enormous pile of hailstones on our back
deck that persisted through the next day (that deck is always
shady). Of course, the hail out in the yard disappeared in under
half an hour once the New Mexico sun came out.
But before that, as soon as the squall ended, we went out to walk the property and take a look the "snow" and in particular at "La Cienega" or "the swamp", our fanciful name for an area down at the bottom of the hill where water collects and there's a little willow grove. There was indeed water there -- covered with a layer of floating hail -- but on the way down we also had a new "creek" with several tributaries, areas where the torrent carved out little streambeds.
It's fun to have our own creek ... even if it's only for part of a day.
More photos: August
With worn-out clichs about the dead voting, Chicago used to be the poster child for voter fraud. But if any state is a poster child for terrible election practices, it is surely Georgia. Bold claims demand bold evidence, and unfortunately there's plenty; on Monday, McClatchy reported a string of irregularities from the state's primary election in May, including one precinct with a 243-percent turnout.
McClatchy's data comes from a federal lawsuit filed against the state. In addition to the problem in Habersham County's Mud Creek precinct, where it appeared that 276 registered voters managed to cast 670 ballots, the piece describes numerous other issues with both voter registration and electronic voting machines. (In fact it was later corrected to show 3,704 registered voters in the precinct.)
Multiple sworn statements from voters describe how they turned up at their polling stations only to be turned away or directed to other precincts. Even more statements allege incorrect ballots, frozen voting machines, and other issues.
Read more of this story at SoylentNews.
The latest XKCD comic on voting machine software is wrong,
profoundly so. It's the sort of thing that appeals to our
prejudices, but mistakes the details.
The 1948 Truetone D1835 Tube Radio I recently bought a vintage tube powered radio at an estate sale and in this episode I talk about it and let you hear it. Click the image to view my Flickr pictures. Watch A video showing the radio in action!
China claims to have successfully tested its first hypersonic aircraft, a big step forward in aerospace technology that could intensify pressure on the US military. The China Academy of Aerospace Aerodynamics (CAAA), based in Beijing and part of the state-owned China Aerospace Science and Technology Corporation, conducted the first test of the "Starry Sky-2" aircraft last Friday.
Hypersonic vehicles are not simply high-speed -- they travel at least at five times the speed of sound. That's fast enough to travel across the US in around 30 minutes. According to a CAAA statement released Monday, the Starry Sky-2 reached a top speed of Mach 6 -- six times the speed of sound, or 4,563 miles (7,344 kilometers) per hour.
The test was a "complete success," claimed CAAA, which posted photos of the test launch on social media platform WeChat. "The Starry Sky-2 flight test project was strongly innovative and technically difficult, confronting a number of cutting-edge international technical challenges." The CAAA did not indicate what the new aircraft or technology would be used for, other than to say they hoped to continue contributing to China's aerospace industry.
Read more of this story at SoylentNews.
Fortnite players are told theyll have to disable a security setting on Android, the FCC finally admits that it wasnt hit by a DDoS attack, and Verizons VPN smallprint raises privacy concerns.
All this and much much more is discussed in the latest edition of the award-winning Smashing Security podcast hosted by computer security veterans Graham Cluley and Carole Theriault, joined this week by David Bisson.
Electric vehicles are getting more traction these days, but this trend is rolling towards us in more ways than just passenger vehicles. More and more bikes are being electrified too, since the cost of batteries has come down and people realize that they can get around town easily without having to pay the exorbitant price to own, fuel, and maintain a car. Of course there are turnkey ebikes, but those dont interest us much around here. This ebike from [Andy] is a master class in how to build your own ebike.
Due to some health issues, [Andy] needed a little bit of assistance from an electric motor on his bike, but found out that the one he wanted wouldnt fit his current bike quite right. He bought a frame from eBay with the right dimensions and assembled the bike from scratch. Not only that, but when it was time to put the battery together he sourced individual 18650 cells and built a custom battery for the bike. His build goes into great detail on how to do all of these things, so even if you need a lithium battery for another project this build might be worth a read.
If youve never been on an electric bike before, theyre a lot of fun to ride. Theyre also extremely economical, and a good project too if youre looking for an excuse to go buy a kit and get to work. You can get creative with the drivetrain too if youd like to do something out of the box, such as this bike that was powered by AA batteries and a supercapacitor.
It looks like Valve could be prepping to finally ship a 64-bit Steam client, possibly coinciding with their long talked about Steam UI/UX overhaul...
On June 28, California enacted the Consumer Privacy Act (A.B. 375), a well-intentioned but flawed new law that seeks to protect the data privacy of technology users and others by imposing new rules on companies that gather, use, and share personal data. There's a lot to like about the Act, but there is substantial room for improvement. Most significantly:
For many years, a growing number of technology users have objected to the myriad ways that companies harvest and monetize their personal data, and users have called on companies and legislators to do a better job at protecting their data privacy. EFF has long supported data ...
Technology companies are forming partnerships with historically black colleges and universities (HBCU) in an effort to improve the diversity of their workforces.Rep. Alma Adams (D-N.C.), the chairwoman of the HBCU congressional caucus, casts the...
Supermicro has crammed 1PB of Intel flash rulers into the slimmest possible 1U rack storage server.
The two-socket server can hold up to 32 Intel EDSFF, NVMe-connected flash drives giving a rack density of 1PB/U, the highest we have ever come across.
EDSFF stands for Chipzilla's Enterprise and Datacenter Storage Form Factor, which measures 325.35mm long, 9.5mm wide and 38.6mm high.
These front-mounted SSD DC P4500 Series drives are hot-swappable and each has a 32TB capacity, using 64-layer TLC (3bits/cell) 3D NAND. An Intel tech brief (PDF) provides the details.
We're told the drives are thermally optimised to require less airflow than a 2.5-inch U.2 SSD.
The performance numbers are heroic. Supermicro president and CEO Charles Liang said the product provides "13 million IOPS and 52GB/sec throughput in 1U" and claimed it outperforms any previous system available.
[...] Supermicro announced a 288TB 1U storage server in January using 8TB Samsung ruler SSDs. A 256TB version using previous 8TB Intel ruler SSDs was introduced in May. That has been well and truly exceeded with these 32TB drives.
Looking at this Samsung and Intel ruler data suggested to us a 64-layer Samsung flash ruler could exceed 32TB in capacity. And, we hasten to add, 96-layer flash is being developed, along with 4bits/cell QLC technology. That means we can realistically have an expectation of 64TB EDSFF drives in the 2019/2020 timeframe, meaning a 2PB/1U Supermicro product could emerge.
Read more of this story at SoylentNews.
Posted by Jouni Malinen on Aug 08On Wed, Aug 8, 2018 at 6:33 PM, Jens Timmerman
Twitter CEO Jack Dorsey told Sean Hannity on Wednesday that his platform does not "shadowban" conservatives.We do not shadowban according to political ideology or viewpoint or content, period, Dorsey said during a rare interview on Hannitys...
Electric vehicles are unlikely to create a power-demand crisis but could reshape the load curve. Heres how to bend that curve to your advantage.
Could electric vehicles (EVs) soon face a different kind of gridlock? With the electrification of mobility accelerating, energy producers and distributors need to understand the potential impact of EVs on electricity demand (Exhibit 1). The good news: McKinsey analysis suggests the projected growth in e-mobility will not drive substantial increases in total electrical-grid power demand in the near to midterm, thus limiting the need for new electricity-generation capacity during that period.
Rants about PTAB, Alice and so on merely make things worse. Limits exist for a reason and these limits need to be honoured.
Summary: Those who strive to infinitely expand patent scope are rendering the patent system obsolete and completely losing sight of the very purpose of the patent system, whose sanity US courts and lawmakers gradually restore (one ruling and one bill at a time)
THE USPTO will have granted fewer patents than before by years end. Recent numbers (a subset of the total) reaffirm rumours weve heard about that. Thats not bad news. To patent law firms that may be bad, but for society at large this may simply mean that patent quality is improving, unlike at the EPO, as we've just noted.
Not every patent represents an invention; some are more like a rendition.Not everything needs to be patented. Not every patent represents an invention; some are more like a rendition. Like music. It is not hard to understand that design patents are rubbish and the Supreme Court (SCOTUS) ought to reassess their necessity, or the lack thereof. We continue to be amazed at the sorts of design patents that we find out there; heres a new example from Apple. Why are these not being covered solely by trademarks and copyrights, which already cover software as well (the latter does)? I suppose hardware patents (like these new ones) are OK and Ive no real issue with those assuming prior art search was properly done and the innovative steps are sufficiently large.
A group of New York University researchers are testing a new approach to software security: adding more bugs to it instead of removing them. The idea is to drown attackers in a sea of enticing-looking but ultimately non-exploitable bugs and waste skilled attackers time. This approach is aimed at disrupting the triage and exploit development stages of the attackers workflow by introducing many chaff bugs (the name is a nod to the strips of foil More
The post Should we add bugs to software to put off attackers? appeared first on Help Net Security.
No one can deny that SpaceX founder Elon Musk has thought a lot about how to transport humans safely to Mars with his Big Falcon Rocket. But when it comes to Musk's highly ambitious plans to settle Mars in the coming decades, some critics say Musk hasn't paid enough attention to what people will do once they get there.
However, SpaceX may be getting more serious about preparing for human landings on Mars, both in terms of how to keep people alive as well as to provide them with something meaningful to do. According to private invitations seen by Ars, the company will host a "Mars Workshop" on Tuesday and Wednesday this week at the University of Colorado Boulder. Although the company would not comment directly, a SpaceX official confirmed the event and said the company regularly meets with a variety of experts concerning its missions to Mars.
This appears to be the first meeting of such magnitude, however, with nearly 60 key scientists and engineers from industry, academia, and government attending the workshop, including a handful of leaders from NASA's Mars exploration program. The invitation for the inaugural Mars meeting encourages participants to contribute to "active discussions regarding what will be needed to make such missions happen." Attendees are being asked to not publicize the workshop or their attendance.
The meeting is expected to include an overview of the spaceflight capabilities that SpaceX is developing with the Big Falcon rocket and spaceship, which Musk has previously outlined at length during international aerospace meetings in 2016 and 2017. Discussion topics will focus on how best to support hundreds of humans living on Mars, such as accessing natural resources there that will lead to a sustainable outpost.
The Securities and Exchange Commission (SEC) has inquired with Tesla about CEO Elon Musks tweets regarding his plans to take the company private, The Wall Street Journal reported Wednesday.Trading on the companys stock was halted Tuesday...
When working on classic vehicles, and especially when modifying them outside of their stock configurations, things can get expensive. Its a basic principle in economics: the rarer something is the more money somebody can charge you for it. But if youve got the skills and the necessary equipment, you can occasionally save yourself money by custom-fabricating some parts yourself.
After changing the gear ratio in his 1971 Ford F100, [smpstech] needed to adjust his speedometer to compensate. Unfortunately, a commercial speedometer reducer and the new cables to get it hooked up to his dash would have run into the hundreds of dollars, so he decided to try designing and 3D printing his own gearbox. The resulting development process and final product are a perfect example of how even a cheap desktop 3D printer, in the hands of a capable operator, can do a lot more than print out little toy boats.
The gearbox contains a large ring gear driven by a smaller, offset, spur gear. This compact inline package drops the speed of the input shaft by 25.5%, which [smpstech] mentions is actually a bit slower than necessary, but it does give him some wiggle room if he decides to change his tire size.
Even if youre not looking for a spe...
The GNOME Software center for installing and updating of programs will begin automatically installing updates with the upcoming GNOME 3.30 release albeit limited to sandboxed Flatpak programs...
Far too broad a scope for patenting
Summary: The breadth of European Patents, which now cover even nature itself, worries public interest groups; Team UPC, however, wants patent scope to expand further and Antnio Campinos has expressed his intention to further increase the number of grants
THE EPO is demonstrably out of control. Patent scope has gone crazy and firms like law giants (lawsuits industry) have the most to gain from it. The same goes for large monopolies/oligopolies like Big Alcohol/Breweries. We previously mentioned Carlsberg's patents on barley and the subject has just reemerged because WeMove.EU initiated a petition on the matter:
WeMove.EU group has launched a petition at European Patent Office (EPO) to deny patent grants for regular bred plants and technology used in the process of beer making.
WeMove.EU claimed that the EPO has granted patents to both Heineken and Carlsberg for regularly bred barley, which it argues is knowledge thats been around for thousands of years.
It added: With the patent these transnational corporations own the barley from the seed to the pint of beer. Not only is it outrageous these greedy corporations want to own a tradition that has been around for thousands of years, but in granting the patent, the EPO is in breach of EU law. Not only, for every patent they approve, they get paid.
The group claim that it will claim barley back and take this chance to urge Member States to stop the EPO from breaching EU law.
WeMove.EU say that brewing companies would profit three times over from patenting regur;ar barley, selling the seeds to farmers, then buying them back to turn them into beer for consumers, in what the group refer to as control from the field to the pub.
As longtime readers are a...
Posted by Matthew Garrett on Aug 08CVE 2018-5390 is a remotely exploitable denial of service against Linux
By pure coincidence, the article by Seth Baum was published just 5 days after a small asteroid exploded over early warning Tule station in Greenland.
This paper studies the risk of collision between asteroids and Earth. It focuses on uncertainty in the human consequences of asteroid collisions, with emphasis on the possibility of global catastrophe to human civilization. A detailed survey of the asteroid risk literature shows that while human consequences are recognized as a major point of uncertainty, the studies focus mainly on physical and environmental dimensions of the risk. Some potential human consequences are omitted entirely, such as the possibility of asteroid explosions inadvertently causing nuclear war. Other human consequences are modeled with varying degrees of detail. Direct medical effects are relatively well-characterized, while human consequences of global environmental effects are more uncertain. The latter are evaluated mainly in terms of a global catastrophe threshold, but such a threshold is deeply uncertain and may not even exist. To handle threshold uncertainty in asteroid policy, this paper adapts the concept of policy boundaries from literature on anthropogenic global environmental change (i.e., planetary boundaries). The paper proposes policy boundaries of 100 m asteroid diameter for global environmental effects and 1 m for inadvertent nuclear war. Other policy implications include a more aggressive asteroid risk mitigation policy and measures to avoid inadvertent nuclear war. The paper argues that for rare events like large asteroid collisions, the absence of robust data means that a wide range of possible human consequences should be considered. This implies humility for risk analysis and erring on the side of caution in policy.
He is now diagnosed with a condition called Pedophilic Disorder. An Ottawa-based animator has received 28 months in prison for possessing child pornography content. The 55-year old Tom Wysom is an artist by profession, who is known for his contribution in various animated TV shows for children including My Little Pony. At the time of his 
This is a post from HackRead.com Read the original post: My Little Pony animator jailed for possessing 60k child abuse images
An amendment from Italy's anti-establishment government that removes mandatory vaccination for schoolchildren is sending shock waves through the country's scientific and medical community.
It suspends for a year a law that requires parents to provide proof of 10 routine vaccinations when enrolling their children in nurseries or preschools. The amendment was approved by Italy's upper house of parliament on Friday by 148 to 110 votes and still has to pass the lower house.
The law had originally been introduced by the Democratic Party in July 2017 amid an ongoing outbreak of measles that saw 5,004 cases reported in 2017 -- the second-highest figure in Europe after Romania -- according to the European Centre for Disease Prevention and Control (ECDC). Italy accounted for 34% of all measles cases reported by countries in the European Economic Area, the center said.
Italy's Five Star movement and its coalition partner, the far-right League, both voiced their opposition to compulsory vaccinations, claiming they discourage school inclusion.
English Language Source: https://www.cnn.com/2018/08/07/health/italy-anti-vaccine-law-measles-intl/index.html
Read more of this story at SoylentNews.
Fortifying connections between three disparate grids could make renewable energy more widely available
The U.S. electrical grid is really made up of three largely separate grids with puny transmission connections at the seams. These seams cross sparsely populated rangeland in the middle of the country.
The Eastern Interconnection serves much of the United States east of the Great Plains. The Western Interconnection covers residents from the Great Plains to the Rockies and up and down the West Coast. And most of Texas has a grid of its own. Policymakers there shun ties with the other two grids in order to keep federal electric power regulation out of the Lone Star State.
Almost like safety pins holding together an elaborate wedding dress, no more than 1,300 megawatts of transmission capacity at a total of seven locations stitch all of this together.
The seams have long interested electric transmission and generation planners. Nearly 100 years ago, a Chicago newspaper trumpeted the value of a truly interconnected grid. Other studies have reached similar conclusions, and the most recent effort is no different.A new seam study finds considerable economic value in fortifying connections between grids.
Led by researchers at the U.S. Energy Departments National Renewable Energy Laboratory, a new seam study finds considerable economic and engineering value in fortifying these connections to better distribute power resources around the country.
The timing is right for this latest study to consider how to bridge the seams more robustly, says Aaron Bloom, who led the NREL research effort.
For one thing, equipment at the connection points is 30 to 40 years old, and nearing the end of its useful life. High-voltage direct current (HVDC) technology is readily available and increasingly affordable, and could replace the old equipment to make long-...
Scientists have come up with a prototype keyboard that can recognize different typing styles, provide its own power, and possibly even keep itself clean.
The production problems Tesla has faced with its Model 3 have been well documented. Now, sources say the company is facing similar issues with its solar roof tile initiative. According to Reuters, former and current employees have revealed that assembly line problems, plus CEO Elon Musks exacting aesthetic demands, has delayed production, causing tension with partner Panasonic, and rattling officials that are keen to see a return on significant state investment.
The Solar Roof, produced at Teslas factory in Buffalo, New York, is designed to look like and function as a regular roof while also generating energy. According to sources, technical challenges have delayed production, as has Musks design plans. Speaking to Reuters, one source said that Aesthetic look is the key point that Elon is not always satisfied with. Thats the big issue.
Neither Tesla nor Reuters sources have revealed current production figures for the roof tiles, but the delays are such that Panasonic which the initiative depends on for solar components has been forced to find other buyers for the parts it had built to sell to Tesla. According to a former Panasonic employee, the company has been shipping large volumes of its photovoltaic cells as samples to other prospective buyers, due to low demand from Tesla. Panasonic declined to comment on the issue, stating only that it believes Tesla will use Panasonic cells when it mass-markets the Solar roof.
The majority of Americans do not have a choice when it comes to high-speed Internet. People living in rural areas have poor quality and coverage when it comes to even mid-range broadband, and America is lagging behind other countries in fiber optics. There are very few things in place that help address these problems, and big ISPs are asking the FCC to end one of them. But EFF is stepping in to ask the FCC to deny AT&T's and Verizons petition to give them a further chokehold on Internet access choice.
On August 6, we filed a comment [pdf] opposing US Telecoms (AT&T's and Verizon's trade association) petition for forbearancethe request that the FCC use its authority to repeal a key provision of the 1996 Telecommunications Act.
Today, thanks to this provision, a new telecom company doesnt have to raise the huge amounts of money needed to initially build its own infrastructure. Existing incumbent telecom companies are required to share their infrastructure at established, affordable rates with new competitors. This allows them to buy space on an existing infrastructure at an affordable rate. That lowers the barrier to compete with the big, established telecom companies. And, where the new companies appear, customers finally have a choice. They can pick between, say, AT&Ts policies and those of a smaller ISP like Sonic.
Not only does that provide much-needed ISP competition, new ISPs make money with mid-level Internet access they get through existing copper lines (the FCC decided in 2005 not to extend these sharing rules to fiber). And then they can use that capital to spend on building high-speed infrastructure and build in rural areas that need more and better coverage.
Small, local ISPs are also vital for rural areas. 39 percent of rural Americans lack access to middle-level Internet service. And where big ISPs leave a gap in the market through a lack of willingness to upgrade, new local ones can step in to fill the gap.
As we pointed out in our comments to the FCC, small ISPs account for nearly half of fiber to t...
Way back when, if you wanted lights on your bike, youd head off to the local bicycle store and purchase yourself a bottle dynamo. This would consist of a magneto that was attached to a bracket on the back of the bike and would rotate by rubbing against the rear tire, generating power for the lights. These fell out of favor over the years as batteries got better and cheaper and people grew tired of the increased drag and maintenance required. Despite this, the idea of generating power onboard a bicycle has never really gone away, and [Javier] has decided to have a crack with his imPulse project.
The formerly popular bottle dynamo had one advantage over contemporary models located in bicycle hubs they were geared down to allow the generating device to make multiple turns for each revolution of the bicycle wheel. This is useful to allow the generating device to operate in its ideal range of rotational speed. Going for a more modern take, however, [Javier] has decided to leverage a stepper motor as his generating device of choice. Further taking advantage of modern technology, the imPulse system is designed to fit on to the caliper mounts of modern bicycles with disc brakes, allowing easy fitment while also leaving room for a geared-down drive.
[Javier] hasnt just stopped at power generation, however there are also plans for lighting systems and power distribution to enable the generated power to be used for a variety of purposes. It even has turn signals though thats not the first time weve seen them on a bike! Video after the break.
But when it came down to it, the core of the class settled on Cinnamon as their DE of choice. Possibly because it was the closest thing to Windows for them? Maybe. Or as one student noted, it gives me what I want without having to go looking for it. And it doesnt hurt that its easy on the eyes. My Cinnamon desktop with the joy-blue controls theme.
Now, I do have some quibbles with Cinnamon. Im all about customization. I tried the latest Kubuntu, as I like the theming options KDE gives me; but so much has changed within that structure, I just cant get it to the level of aesthetics I achieved with KDE4. My problems with Cinnamon are silly to some. I like to be able to change the icons in my system tray. Unfortunately, those seem to be fixed. And yeah, theres Mate. Mate allows those changes but try as I may, and again this is just me; but when Ive done all that I can do with my Mate Desktop, it still looks like 2003.
If youve ever wanted to make the switch to Linux, but the idea of leaving behind Windows apps always see...
The whole thing starts with cerebral cortex. It is divided into four major parts, or sometime people call it lobes.
Creative Labs launched the Recon3D sound card the better part of a decade ago and finally patches have emerged providing for better Linux driver support...
In recent years Hollywood and other entertainment sources have focused their enforcement efforts on pirate streaming sites and services.
According to several reports, streaming sites get more traffic than their P2P counterparts, with the latter being almost exclusively BitTorrent related.
While the rise of online streaming sites cant be denied, a new research report from anti-piracy outfit Irdeto shows that P2P remains very relevant. In fact, its still the dominant piracy tool in many countries.
Irdeto researched site traffic data provided by an unnamed web analytics partner. The sample covers web traffic to 962 piracy sites in 19 countries where P2P was most used. This makes it possible to see how P2P site visits compare to those of pirate streaming sites.
The data reveal that there are massive differences in the relative use of P2P versus streaming sites between countries.
In Russia, for example, only 2% of the visits go to streaming sites, while the rest of the traffic goes to P2P portals. P2P also outperforms streaming in other countries such as Australia, the Netherlands, and India.
This pattern is reversed in Germany, where 88% of all visits go to pirate streaming sites. Similarly, streaming is also the dominant web piracy tool in the United States, France, Spain and other countries.
Additional research in eight countries shows that piracy traffic has grown during the course of 2017. This growth also applies to P2P sites, in all but one country, Germany.
Looking at the sample as a whole, Iredeto notes that 70% of all pirate traffic goes to P2P sites, which appears to run counter to the popular narrative that streaming is more dominant today.
While many expect P2P piracy to be taken over by streaming and direct downloads, its clear that this has not happened yet. P2P piracy is still a big threat to the industry, in which the overall piracy problem is growing, Peter Cossack, Irdetos VP of Cybersecurity Services says.
While the increase in bandwidth and social media has facilitated growth in content redistribution piracy, particularly around live sporting events, it is clear that other forms of piracy are not going away any time soon.
While the data provide an interesting look at the regional differences it should be interpreted with caution. First, the sample only inc...
Kyle is back from HiFormance with more amazing deals for us, this time. We have enjoyed the positive feedback from our readers in regards to HiFormance and we look forward to listing them more as the offers come along!
Heres a note from the company
Its been a great year so far for us at HiFormance and we
appreciate the LowEndBox community for all your support and
feedback! We have expanded our service & support across the
nation and continue to do so each day! We want to give our
customers a unique experience with the highest level of performance
and customer service. Signing up with HiFormance means becoming
apart of a network of specialists and hosting enthusiasts that
ultimately give you the best presence on the web.
Heres the offer:
** 3 Year Prepay: Double 1 Resource FREE **
** 1 Year Prepay: Double 1 Resource FREE **
** 3 Year Prepay: Double ALL Resources FREE **
The Speck cipher is geared toward good performance in software, which makes it attractive for smaller, often embedded, systems with underpowered CPUs that lack hardware crypto acceleration. But it also comes from the US National Security Agency (NSA), which worries lots of people outside the USand, in truth, a fair number of US citizens as well. The NSA has earned a reputation for promulgating various types of cryptographic algorithms with dubious properties. While the technical arguments against Speck, which is a fairly simple and straightforward algorithm with little room for backdoors, have not been all that compelling, the political arguments are potentto the point where it is being dropped by the main proponent for including it in the kernel.
Malwarebytes and Osterman Research have polled 900 senior IT decision-makers and IT security professionals in Australia, Germany, the US, UK, and Singapore about the impact of enterprise security incidents on their bottom line, and also looked at all sides of IT security costs from budget and remediation, to hiring, recruiting and retention. Top report findings include: Cybercrime incidents are escalating, security budgets are exploding and security remediation costs are skyrocketing US-based businesses experienced a higher More
The post Nearly 15% of US security budgets go to remediating active compromises appeared first on Help Net Security.
In a recent article for the Council on Foreign Relations, the Citizen Labs Lennart Maschmeyer discusses how repressive regimes are becoming increasingly effective at targeting opposition groups using digital espionage, both at home and abroad. Specifically, civil society organizations (CSOs) are extremely vulnerable to such attacks, as evidenced by a recent Citizen Lab report showcasing a malware campaign levelled against members of the Tibetan diaspora.
Maschmeyer also outlines six obstacles facing CSOs in mitigating digital attacks. Among these challenges include a lack of standardized data, cross-border targeting, and a misplaced focus on the technical aspects instead of the social engineering mechanisms of these attacks. Additionally, he outlines that each community faces specific and tailored threats that make broad approaches to security training challenging.
Tibetan diaspora organizations targeted by Chinese threat groups may face significantly different types of threats than Syrian opposition members targeted by both the regime and other non-state groups.
The post Lennart Maschmeyer on the Effect of Cyber Conflict on Civil Society appeared first on The Citizen Lab.
Arthur T Knackerbracket has found the following story:
A massive wrong-way bet on Bitcoin left an unidentified futures trader unable to cover losses, burning counterparties and threatening to dent confidence in one of the world's largest cryptocurrency venues.
The long position in Bitcoin futures listed on OKEx, a Hong Kong-based exchange, had a notional value of about $416 million, according to an OKEx statement on Friday and data compiled by Bloomberg. OKEx moved to liquidate the position on Tuesday, but the exchange was unable to cover the trader's shortfall as Bitcoin's price slumped. Because OKEx has a "socialized clawback" policy for such instances, it will force futures traders with unrealized gains this week to give up about 18 percent of their profits.
While clawbacks are not unprecedented at OKEx, the size of this week's debacle has attracted lots of attention in crypto circles. The episode underscores the risks of trading on lightly regulated virtual currency venues, which often allow high levels of leverage and lack the protections investors have come to expect from traditional stock and bond markets. Crypto platforms have been dogged by everything from outages to hacks to market manipulation over the past few years, a period when spectacular swings in Bitcoin and its ilk attracted hordes of new traders from all over the world.
[...] Bitcoin, the biggest cryptocurrency by market value, dropped 2.2 percent to $7,383.44 at 4:56 p.m. Hong Kong time on Friday, extending its decline this week to 10 percent. It has slumped 48 percent this year.
-- submitted from IRC
Read more of this story at SoylentNews.
Qualys announced that IBM X-Force Red will leverage the Qualys Cloud Platform as part of its X-Force Red Vulnerability Management Services (VMS). As part of an expanded relationship, X-Force Red will deploy the Qualys Cloud Agent and Qualys Cloud Apps into client environments across the globe, providing a programmatic vulnerability management approach that leverages the breadth of Qualys continuous visibility and depth of the X-Force Red teams services to identify, prioritize and remediate clients most More
The post Qualys and IBM X-Force Red help orgs identify, fix most critical vulnerabilities appeared first on Help Net Security.
Like many stories, this one started on the roof. This particular roof is located in Michigan and keeps the rain and snow off of the i3Detroit hackerspace. Being an old industrial building, things up on the roof can start getting creaky, and when an almighty screech started coming from one of the rooftop vents as it swiveled in the wind, Nate, one of the groups coordinators, knew it was time to do something about it.
Previous attempts to silence the banshee with the usual libations had failed, so Nate climbed up to effect a proper repair with real bearings. He dug into the unit, measured for the bearing, and came down to order the correct items. Thats when it struck him: How many should I order? After all, bearings are useful devices, not just to repair a wonky vent but especially handy in a hackerspace, where they can be put to all sorts of uses. Would extra bearings be put to good use, or would they just sit on a shelf gathering dust?
Thats when Nate dropped us a line and asked a question that raises some interesting possibilities, and one which we couldnt answer offhand: Is there a readily accessible online library of common mechanical parts?
It turns out that Nate has something else far more interesting in mind, and its based more on his experiences with electronics parts ordering. Hes thinking about something along the lines of Octoparts Common Parts Library, Macrofabs House Parts, or Seeed Studios Open Parts Library. These repositories allow designers to see what components are currently being used for various applications. The aim is to ease the design process by limiting choices to just a few widely available parts. Start there, and if your needs arent met with some of them, branch out, spending extra time on only the parts that actually call for......
Is this the personal home robot we've been waiting for? No, but Vector will make you smile
San Francisco-based robotics company Anki is launching today a new robot called Vector. It drives on little tank treads, has an expressive LCD face, and is constantly moving around, making beeps and bloops. Vector resembles Ankis previous robot, Cozmo, but is packed with more technologyand character.
Anki says Vector is designed as a robot companion and helper for people at home. But dont expect much: The robot has a tiny voice and can barely push a coffee mug around. Its little arms can lift only a special plastic block. What Vector is good at, Anki says, is engaging with people.
The robot can certainly get your attention. At one point during my interview with Ankis chief strategy officer Patrick De Neale, Vector interrupted us to demand a fist bump. De Neale promptly complied.
Vector is available starting today on Kickstarter at a discounted price of US $200 (it will hit stores on 12 October with a $250 price tag). Kickstarter backers will also get early access to the software development kit (SDK), which will be available to all users only later this year.
Vector is powered by a 1.2 GHz quad-core Qualcomm Snapdragon, has a wide-angle HD camera, single-point laser for mapping and navigation, four-mic array, and capacitive touch sensors. And while its speech capabilities rely on the cloud, other functions, like detecting if there are people nearby, use a convolutional neural network running on its on-board processor.
Vector is Ankis fourth product. First came the robotic racing cars Drive and Overdrive. Two years ago, the company unveiled Cozmo, which became a best-selling toy on Amazon. But Anki says Vector is not a toy. The company is apparently targeting a group of tech-minded grown-ups who have always dreamed of having R2-D2 in their living rooms (ahem, we know some of them).Image: Anki...
Parental controls. Use them. Via: AP: Childrens advocates want the American Psychological Association to condemn the tech industrys practice of using persuasive psychological techniques to keep kids glued to their screens. The advocates, citing research that links excessive use of social media and video games with depression and academic troubles, say its unethical for psychologists 
Researchers at the University of California San Diego have demonstrated the worlds first laser based on an unconventional wave physics phenomenon called bound states in the continuum. The technology could revolutionize the development of surface lasers, making them more compact and energy-efficient for communications and computing applications. The new BIC lasers could also be developed as high-power lasers for industrial and defense applications.
Lasers are ubiquitous in the present day world, from simple everyday laser pointers to complex laser interferometers used to detect gravitational waves. Our current research will impact many areas of laser applications, said Ashok Kodigala, an electrical engineering Ph.D. student at UC San Diego and first author of the study.
Because they are unconventional, BIC lasers offer unique and unprecedented properties that havent yet been realized with existing laser technologies, said Boubacar Kant, electrical engineering professor at the UC San Diego Jacobs School of Engineering who led the research.
Last week the popular software code hosting service GitHub has introduced a new feature to protect its users, it will alert them whenever it detects that a password has been compromised in a third-party data breach.
GitHub has teamed with the HaveIBeenPwned.com service, managed by the cybersecurity expert Troy Hunt, to provide implement a feature that allows users to check whether their credentials have been involved in known data breaches.
Common password advice is to use a long and unique password for each website you have an account with. Its challenging to remember a strong and unique password for each website without either using a password manager or using a trivially discovered theme. As a result, password reuse is extremely prevalent. Regardless of the strength of a password, a single breach can nullify its security when used elsewhere. reads the advisory published by GitHub.
GitHub has developed service that leverages the 517 million record dataset provided by Huntto validate whether a users password has been found in any publicly available sets of breach data.
The feature will alert users that are using compromised credentials and ask them to change them du...
A slew of vulnerabilities in OpenEMR allowed attackers to access random patients health records, view data from a target database, escalate their privileges on the server, execute system commands, and more. What is OpenEMR? OpenEMR is a free and open source electronic health records and medical practice management solution. Its one of the most popular electronic medical records management solutions in use today and its estimated that, worldwide, some 15,000 healthcare organizations of varying sizes More
The post OpenEMR vulnerabilities put patients info, medical records at risk appeared first on Help Net Security.
Nurse your hangover by having Breakfast at DEF CON this Sunday. Youre invited to this yearly ritual with Hackaday and Tindie. Were celebrating the beginning of the end with coffee and pastries beginning at 10:30 am in the Hardware Hacking Village.
Head over to the Breakfast at DEF CON event page and hit the follow event button to keep on any new info about the event.
Extra internet points go to those who bring some hardware to show off and especially for anyone who is making this the end of their Saturday rather than the beginning of Sunday. We had tons of great hacks show up last year and want to outdo ourselves this time around.
Come hang out with too many Hackaday and Tindie folks to list here. Also dont forget to check out the SMD Challenge throughout the weekend.
Submitted via IRC for SoyCow1984
Let's Encrypt announced yesterday that they are now directly trusted by all major root certificate programs including those from Microsoft, Google, Apple, Mozilla, Oracle, and Blackberry. With this announcement, Let's Encrypt is now directly trusted by all major browsers and operating systems.
[...] At the end of July 2018, Let's Encrypt received direct trust from Microsoft products, which resulted in it being trusted by all major root programs. The CA's certificates are cross-signed by IdenTrust, and have been widely trusted since the beginning.
"Browsers and operating systems have not, by default, directly trusted Let's Encrypt certificates, but they trust IdenTrust, and IdenTrust trusts us, so we are trusted indirectly. IdenTrust is a critical partner in our effort to secure the Web, as they have allowed us to provide widely trusted certificates from day one," noted Josh Aas, Executive Director of ISRG.
[...] While some of these [older operating systems, browsers, and devices] are expected to be updated to trust the CA, others won't, and it might take at least five more years until most of them cycle out of the Web ecosystem. Until that happens, Let's Encrypt will continue to use a cross signature [from IdenTrust].
Read more of this story at SoylentNews.
Gaming is more popular today than ever before and it is especially popular among teens and youngsters who are hooked to it most of the time. In fact, the World Health Organization (WHO) now recognizes gaming disorder as a mental health condition in the International Classification of Diseases and has placed it in the same category as substance abuse and gambling addiction.
However, this has not stopped teens and youngsters from spending more and more time playing video games. It has even proven to be problematic, such as in this case, where a 15-year-old from Bengaluru, India is receiving treatment for his addiction to online game PlayerUnknowns Battlegrounds (PUBG).
For those unaware, the popular game PlayerUnknowns Battlegrounds or PUBG created in December last year has been downloaded over 50 million times. It was the third most popular game in June, even seven months after its introduction. It is available on PC, Android and iOS. PUBG is based on the epic 2000 movie Battle Royale. It starts with 100 players parachuting from a plane onto a large island, where they then search for weapons and gear up for a brutal fight to the death as surviving players edge closer to the center of the island. The players can choose different Mods to fight the enemy and turn out victorious. The game is extra hard and the winner of PUBG is the last man standing.
Apparently, the 15-year-old boy studying Class 10 was so immersed in playing PUBG, that he would stay up until 2-3 am playing the game, and often missed school because of waking up late, reports Hindustan Times. His worried parents then took him to SHUT (Service for Healthy Use of Technology) Clinic, located at the National Institute of Mental Health and Neurosciences (NIMHANS), which helps people deal with technology-based addictions.
During his counseling session, the boy showed all symptoms of gaming disorder, such as putting gaming over other activities and continuing with it despite the negative consequences it could bring. While he had over 1,000 online friends, he had only about four or five friends outside of his digital world. However, the worst part was that the boy was unwilling to recognize that he had a problem.
Recent times have seen more and more youngsters getting addicted to video games with those who overplay video games usually have to confront a high chance of getting either mental or physical diseases or even both if not addressed in time. Also, game addicts are often found seen isolating themselves from others in order to play video games or missing out on famil...
Posted by Jens Timmerman on Aug 08I have to ask since this was only published 4 days ago and also describes
Once upon a time, the only way to control how the kernel's CPU scheduler treated any given process was to adjust that process's priority. Priorities are no longer enough to fully control CPU scheduling, though, especially when power-management concerns are taken into account. The utilization clamping patch set from Patrick Bellasi is the latest in a series of attempts to allow user space to tell the scheduler more about any specific process's needs.
WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations. Discovered by security researchers at Israeli security firm Check Point, the flaws take advantage of a loophole in WhatsApp's security
Posted by Joachim De Zutter on Aug 08CVE ID: CVE-2018-12584
Youve probably noticed that the hacker world is somewhat enamored with overly complex electronic event badges. Somewhere along the line, we went from using a piece of laminated paper on a lanyard to custom designed gadgets that pack in enough hardware that they could have passed for PDAs not that long ago. But what if there was a way to combine this love for weighing down ones neck with silicon jewelry and the old school Hello my name is stickers?
[Squaro Engineering] might have the solution with Badgy, their multi-function e-ink namewell, badge. Compatible with the Arduino SDK, it can serve as anything from a weather display to a remote for your smart home. Oh, and we suppose in an absolute emergency it could be used to avoid having to awkwardly introduce yourself to strangers.
Powered by an ESP-12F, Badgy features a 2.9 296128 E-Ink display and a five-way tactical switch for user input. The default firmware includes support for WiFiManager and OTA updates to make uploading your own binaries as easy as possible, and a number of example Sketches are provided to show you the ropes. Powered by a LIR245...
House Democrats are urging the Federal Communications Commission (FCC) to investigate reports that the Sinclair Broadcast Group has conspired with other broadcasters to raise local advertising costs.In a letter to FCC Chairman Ajit Pai sent Tuesday...
Today, we were pleased to hear that Samumed, a San Diego-based biotech company working on regenerative medicine, has just raised $438 million towards developing anti-aging therapies.
SAN DIEGO August 6, 2018 Samumed, LLC, announced today that it has closed its A-6 Round of equity issuance with $438 million, bringing its total equity raised to date to more than $650 million. The pre-money valuation for the round was $12 billion.
We appreciate the strong support from our investors, said Osman Kibar, Ph.D., Chief Executive Officer of Samumed, and we are now in a fortunate position to both move our later stage programs to commercialization, as well as expand on our earlier stage science and clinical portfolio.
Posted by Jouni Malinen on Aug 08Published: August 8, 2018
Over the years I've reviewed instant cameras that use both Zink and Instax technologies.
After taking into account the significant premium of using the Fujifilm system I've never felt less than short changed. Everyone else appears to be having a lot more 'fun' with their Instax cameras and it's been a sales success for Fuji. In an attempt to see what I was missing out on, I decided to give it one more try and bought the latest SQ6 square format camera.
Was this a wise decision...
Submitted via IRC for takyon
Although a recent NASA-supported study found Mars cannot be made inhabitable with our current technology, this hasn't stopped the space agency from continuing its plans to one day colonize the red planet. One such initiative launched in 2015 is the 3D-Printed Habitat Challenge. The $2.5 million competition, now in its third phase, seeks to find the most adequate housing for future Martian residents. The challenge also hopes to uncover advanced construction technologies that may be used in sustainable housing solutions for Earth as well.
Now, NASA and its competition partner Bradley University of Peoria, Illinois, have selected the five winning teams out of 18 submissions from around the world. The winners will share the $100,000 prize and will have to create 3D-printed one-third-scale versions of their designs to confirm their models' feasibility.
[...] "We are thrilled to see the success of this diverse group of teams that have approached this competition in their own unique styles," said in a statement Monsi Roman, program manager for NASA's Centennial Challenges. "They are not just designing structures, they are designing habitats that will allow our space explorers to live and work on other planets. We are excited to see their designs come to life as the competition moves forward."
Read more of this story at SoylentNews.
Posted by Joan Touzet on Aug 08Date: 08.08.2018
Researchers at the National Institute of Standards and Technology (NIST) have made a silicon chip that distributes optical signals precisely across a miniature brain-like grid, showcasing a potential new design for neural networks.
The human brain has billions of neurons (nerve cells), each with thousands of connections to other neurons. Many computing research projects aim to emulate the brain by creating circuits of artificial neural networks. But conventional electronics, including the electrical wiring of semiconductor circuits, often impedes the extremely complex routing required for useful neural networks.
The NIST team proposes to use light instead of electricity as a signaling medium. Neural networks already have demonstrated remarkable power in solving complex problems, including rapid pattern recognition and data analysis. The use of light would eliminate interference due to electrical charge, and the signals would travel faster and farther.
Early last spring, we featured a book review, as part of our occasional Books You Should Read series. Usually these are seminal tomes, those really useful books that stay with you for life and become well-thumbed, but in this case it was a childrens book. Making a Transistor Radio, by [George Dobbs, G3RJV], was a part of the long-running series of Ladybird books that educated, entertained, and enthralled mid-20th-century British kids, and its subject was the construction of a 3-transistor regenerative AM receiver. If you talk to a British electronic engineer of A Certain Age there is a good chance that this was the volume that first introduced them to their art, and they may even still have their prized radio somewhere.
Making a Transistor Radio was a success story, but whats not so well-known is that there was a companion volume published a few years later in 1979....
Posted by Kotas, Kevin J on Aug 08CA20180802-01: Security Notice for CA API Developer Portal
Posted by eL_Bart0 on Aug 08man-cgi before 1.16 allows Local File Inclusion via absolute path traversal. If an Attacker provides a Filename as a
Posted by Michael Catanzaro on Aug 08------------------------------------------------------------------------
Even the best systems on the market sometimes require the driver to jump in to correct errors
Electronic safety systems in todays vehicles dont always measure up to claims made for them, says a report published Tuesday by the Insurance Institute for Highway Safety (IIHS), a non-profit supported by auto insurers.
"We zeroed in on situations our staff have identified as areas of concern during test drives with Level 2 systems, then used that feedback to develop road and track scenarios to compare vehicles," IIHS senior engineer Jessica Jermakian said, according to the report.
Level 2 autonomy employs advanced driver assistance systems (ADAS), which as the phrase implies are meant to help the driver, not replace them. A Level 2 car has the two functions of lane keeping and adaptive cruise control, a feature that maintains a safe distance from the car in front.
The Insurance Institute isnt yet at the point of ranking Level 2 systems for safety, although it does say that all of the five cars its just tested have excellent emergency braking systems. That function is the sole criterion for Level 1 autonomy.
The tested cars were the 2017 BMW 5-series with Driving Assistant Plus; the 2017 Mercedes-Benz E-Class with Drive Pilot; the 2016 Model S and the 2018 Tesla Model 3 with Autopilot (using different software versions); and the 2018 Volvo S90 with Pilot Assist.
When starting at a speed of 50 kilometers per hour (31 mph) and with the adaptive cruise control turned off, the two Teslas were not able to brake in time to completely avoid hitting an obstacle. The other cars were able to stop well short of the obstacle. With the adaptive cruise control turned on, all the cars stopped in time.
When set to follow a lead vehicle that first slowed and then stopped, all five cars were able to keep their distance and to stop in time. When the lead vehicle moved out of the way to reveal a stopped vehicle in the lane, all five cars were able to avoid hitting it.
So far, so good. But these tests were conducted on the track; in traffic things werent always so smooth. Engineers found that all of the cars except the Tesla 3 would sometimes be baffled by a stopped car. And even the Tesla 3 had a problem: excessively cautious braking....
Posted by VMware Security Response Center on Aug 08----------------------------------------------------------------------
As machine learning has become more widely adopted across industries, OReilly set out to learn more about how companies approach this work. By surveying more than 11,000 data specialists across North America, Europe, and Asia, the company has identified some of the key learnings that derive from deploying machine learning in production, and where other companies should focus as they begin their journey of machine learning adoption. Notable findings from the survey include: Job titles More
The post Where should companies focus as they begin their machine learning journey? appeared first on Help Net Security.
In 1881, Thomas Edison convinced King Kalakaua that electric streetlamps were superior to gas
In 1881, King David Kalakaua of Hawaii went on a world tour, the first of its kind for a sitting monarch. He circumnavigated the globe, stopping in Asia, India, Egypt, Europe, and the United States. Among other things, he sought to encourage immigration from the Asia-Pacific region, as Hawaiis dwindling population had created a labor shortage on its sugar plantations. But the king also wanted to introduce the culture of Hawaii to the world, and he was curious about modern science and technology.
When he arrived in Paris in August 1881, the International Exposition of Electricity was just getting under way. The exposition showcased the latest advancements in electrical technology, such as dynamos, batteries, and lighting. The first International Electrical Congress also convened during the exposition, with participants presenting papers, discussing research, and deciding on definitions for the ampere, the volt, the ohm, and other electrical units.
King Kalakaua visited the exposition and was eager to learn more. George Jones [PDF], cofounder of The New York Times, met the king in Vienna and promised an introduction to Thomas Edison. That meeting took place on 25 September 1881 in Edisons New York City office. According to The Sun (New York), the king and the inventor discussed not only the technicalities of electric lights but also the business of selling power.
As described in The Sun, Hawaiis attorney general, William N. Armstrong, told Edison that the kingdom had a volcano that burns a thousand million tons of coal a day. He jokingly added: You could put your boilers on top of the volcano and get power enough to supply the country. Apparently, Edison didnt get the joke and asked if that was where Hawaii mined its coal. Armstrong replied that in fact Hawaii imported its coal from Australia, but the volcano was their great hope. Some people have since speculated that Armstrongs remark indicated an early interest in geothermal power, but it was more likely a failed attempt at humor.
In any event, Kalakaua explained to Edison that he was keen to upgrade the kerosene lamps that li...
In 1885, Ephraim E. Weaver jumped a little too hard onto the electrification bandwagon
During the 1870s and 80s, inventors filed more than a dozen patent applications in the United States for electrical improvements to letter boxes. But why did mailboxes and letter slots, surely among the simplest mechanical devices, have to be electrified? It was primarily a matter of convenience, for people who wanted to know exactly when the mail had arrived and didnt want to waste time checking.
Free home delivery of the mail had begun in the United States in 1863, but mailboxes were not yet standard. Instead, a postman would knock on the door (perhaps with a handheld wooden knocker), wait for someone to answer, and then hand over the mail. If no one was home, the carrier returned later or the next day. Although this created great trust in the system, it wasnt very efficient. In 1909, postal officials calculated that on a typical day, carriers made 360 stops and spent an average of 15 seconds per delivery, or an hour and a half a day, simply waiting.Photos: National Postal Museum/Smithsonian Institution A Smarter Mailbox: Ephraim E. Weavers electric mailbox [front and interior shown here] came with a key that the delivery person could use to ring a bell, signaling that a package had arrived.
Beginning in the 1880s, the U.S. Post Office Department began encouraging people to install a mailbox or letter slot, although they didnt become a requirement until 1923. (For a nice concise history of the U.S. Postal Service, see The United States Postal Service: An American History 17752006 [PDF].)
And so, many of the early patents for electrical indicators for letter boxes tried to replace or augment the postmans knock. Inventor Henry R. David thought that large office and apartment buildings in cities had a particular problem. His 1875 U.S. patent [PDF] detailed a system of circuits that would inform people in far-flung corners of the building that mail was waiting for them at the main entrance.
Many of the electric...
Pakistani Hacker Posted Authentic Snapchat Source Code on GitHub Snapchats source code is stolencan there be a bigger news than that? Perhaps there is! Not only that the source code has been stolen but also posted on Microsoft-owned GitHub of all the platforms. Reportedly, the hacker hails from a small village in Pakistan and uses the 
This is a post from HackRead.com Read the original post: Hacker leaks Snapchats source code on Github
Back in June Toshiba introduced the RC100 NVMe solid-state drive as a new low-end offering. The RC100 is now a bit blindsided by Intel's just-launched 660p SSD that delivers incredible storage capacities per dollar, and I'll have some Intel 660p Linux benchmarks in a few days, but for those curious about the RC100 here are some Ubuntu Linux benchmark results for this low-cost NVMe SSD.
Trammell Hudson has written a blog post about his project to retro fit a Motorola MDT-9100T "Mobile Data Terminal" from eBay with a BeagleBone Black running a modern operating system. He figues their retro-future design was too neat to pass up and that the stylish housing combined with an aperture-less amber CRT looks like something slipped from the Fallout or BladeRunner universe into our own. So he and some others at NYC Resistor bought a few and are repurposing them. A lot of soldering and cable smithing is involved.
Read more of this story at SoylentNews.
92 percent of organizations struggle to implement security into the entire DevOps process despite most saying they want to do so a staggering capability gap exposed in the new, global data report commissioned by Checkmarx. The study spotlights the biggest barriers to securing software today depending on where organizations sit on the DevOps maturity curve. Report findings are based on online survey input from 183 respondents worldwide, the majority of whom hold software development, More
The post Only 8% of orgs have effective DevSecOps practices appeared first on Help Net Security.
Ichor Therapeutics, a life science company in Lafayette, New York, is one of the big players in the world of rejuvenation biotechnologies. Since its founding in 2013, it has been growing and expanding its portfolio of companies working on therapies against the diseases of aging; on August 1, 2018, Ichor announced the formation of its strategic fund, Grapeseed.bio.
What is Grapeseed.bio
This new fund and accelerator program is meant to provide young life science startups with seed funding up to $100,000, technical training, mentorship, and full access to Ichors large research laboratory.
Its always fun when you can mix your personal hobbies and interests with your profession, and often the passion you carry for the things you love can lead to valuable and productive insights for your vocation as well. Lets hope that theory proves true as this 20-year information security professional, and recent 3D printing enthusiast, considers the potential cybersecurity risks with additive manufacturing. If I threw you for a second there with my fancy words, More
The post The security issues 3D printing should solve before going mainstream appeared first on Help Net Security.
Google Summer of Code 2018 is quickly reaching an end. We'll be featuring some of the interesting and successful work accomplished this summer by these students engaging in hundreds of different open-source projects. One of the open-source projects slotted with a lot of participants this year was KDE...
Audience interaction reached an all-time high in 2014 with Twitch Plays Pokemon, an online gaming stream where viewers were able to collaboratively command an emulated Game Boy playing Pokemon Red. Since then, the concept has taken off. Today, we see this extended to robots in the real world, with [theotherlonestar]s Twitch Chat Controlled Robots.
The build is one that takes advantage of modern off-the-shelf components an ESP8266 provides the brains, while a Pololu Zumo provides a ready to go robot chassis to save time on the mechanical aspects of the build. An L298N dual motor controller then handles motive power.
The real ingenuity though, is teaching the robots to respond to commands from Twitch chat. The chat is available in a readily parsable IRC format, which makes programming around it easy. [theotherlonestar] created a command set that enables the robots to be driven remotely by stream viewers, and then outfitted the bots with hammers with which to fight, as well as a fedora to tip, if one is so inclined.
Its a cool build, and one which shows further promise as Twitch continues to reduce stream & chat latency. We look forward to seeing future battles, but the first one already excites.
Interested in where it all began? Check out our Twitch Plays Pokemon coverage from way back when. Video after the break.
Twistlock announced the release of Twistlock 2.5, the 14th release of its platform. Twistlock 2.5 provides enterprises with real time incident response and forensics capabilities designed to complement the defense in depth offered by Twistlocks full lifecycle, full stack approach to application security. Twistlock 2.5 introduces cloud native forensics capabilities to the Twistlock Platform. This feature provides automated forensic data collection and correlation across cloud native environments of any size with no additional resource overhead. More
The post Twistlock adds automated cloud native forensics to its cybersecurity platform appeared first on Help Net Security.
Submitted via IRC for takyon
The eruption of neighboring superstar Eta Carinae over 170 years ago is fascinating researchers and setting records for the fastest jettisoned gas from a stellar outburst.
Approximately 170 years ago, a stellar eruption sped away from our massive (and incredibly unstable) neighboring superstar Eta Carinae. Now, a team from the University of Arizona in conjunction with NASA has determined this event holds the record for the fastest jettisoned gas ever measured from a star -- without the star self-destructing.
The energy from the blast would be equivalent to that of a traditional supernova explosion, events that often leave behind only the corpse of a star. However, this double star system stayed relatively intact.
For the last seven years, University of Arizona's Nathan Smith and the Space Telescope Science Institute's Armin Rest determined how powerful the blast was by looking at echoes of light surrounding Eta Carinae.
Read more of this story at SoylentNews.
BlackBerry announced its BlackBerry Workspaces content collaboration platform, featuring a new ransomware recovery capability that allows organizations to recover from cyberattacks. Despite the precautions an organization can take, ransomware attacks will still happen. Ransomware attacks were the most common type of malware in 2017, and its projected that, by the end of 2019, a business will be hit by a ransomware attack every 14 seconds with the resulting damage costs predicted to reach $11.5B annually. More
The post BlackBerry launches new ransomware recovery feature appeared first on Help Net Security.
At Googles I/O 2017 Developers Conference last year, the search giant had announced Kotlin would be an officially supported language in Android and it will join the list of existing programming languages used for Android app development, such as Java and C++. It is also predicted that Kotlin will be surpassing Java as the primary programming language used for Android apps by December 2018.
Moving further in this direction, Google who recently announced Androids new operating system, Android 9.0 Pie has also released an SDK that is more Kotlin-friendly.
For those unaware, developed by JetBrains for JVM (Java Virtual Machine), Android, JS browser and native applications, Kotlin can be compiled to Java source code and can be used alongside Java to build apps. Like Java, Kotlin as a language is object-oriented and statically typed and fully interoperable with Java code. It is designed to solve the similar problem that Java does. It also adds a lot of nice-to-have features that Java itself doesnt currently support, a much cleaner syntax, improved code readability, ideas from functional programming, and other improvements over Java. Also, Kotlins interoperability with Java makes it possible to call Kotlin code from Java or Java code from Kotlin.
Google in its new blog post announced that the newly released Android SDK contains nullability annotations for some of the most frequently used APIs, which will preserve the null-safety guarantee when your Kotlin code is calling into any annotated APIs in the SDK.
Normally, nullability contract violations in Kotlin result in compilation errors. But to ensure the newly annotated APIs are compatible with your existing code, we are using an internal mechanism provided by the Kotlin compiler team to mark the APIs as recently annotated. Recently annotated APIs will result only in warnings instead of errors from the Kotlin compiler. You will need to use Kotlin 1.2.60 or later.
Our plan is to have newly added nullability annotations produce warnings only, and increase the severity level to errors starting in the following years Android SDK. The goal is to provide you with sufficient time to update your code, Google added.
If want to know how you can use the Kotlin-friendly SDK, simply follow the steps below.
1. Go to Tools > SD...
IBM Security announced X-Force Red Labs, a network of four secure facilities dedicated to testing the security of devices and systems including consumer and industrial IoT technologies, automotive equipment, and Automated Teller Machines (ATMs). IBM X-Force Red also has launched a dedicated ATM Testing practice in response to increased demand for securing financial transaction systems. The new Labs will be operated by X-Force Red, an autonomous team of hackers within IBM Security. The X-Force Red More
The post IBM Security now opens network of four secure testing facilities globally appeared first on Help Net Security.
AMD's Huang Rui and Christian Konig are working on LRU bulk move functionality that can yield performance improvements for Vulkan and OpenCL workloads...
The source code of the popular social media app Snapchat was recently surfaced online after a hacker leaked and posted it on the Microsoft-owned code repository GitHub. A GitHub account under the name Khaled Alshehri with the handle i5xx, who claimed to be from Pakistan, created a GitHub repository called Source-Snapchat with a description "Source Code for SnapChat," publishing the code of
CrowdStrike announced new features and capabilities expanding the scope of the CrowdStrike Falcon platform as the endpoint protection solution available to customers. CrowdStrike released a new device control module to enable visibility and control into removable media activity, a functionality for organizations looking to replace their legacy antivirus with endpoint protection. Additionally, CrowdStrike has announced a new feature to secure Docker container environments and the adoption of MITREs Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) More
The post CrowdStrike expands its endpoint protection platform with new features appeared first on Help Net Security.
IT leaders and DevOps experts tell us that key considerations around talent, measurement, vision, and IT culture are the real secrets to taking DevOps to the next level. Here we share nine of their best tips for IT leaders. Dig in, and then share yours in the comments below.
Announcing the first round of keynote speakers for Open Source Summit and Embedded Linux Conference + OpenIoT Summit Europe!
Optiv Security announced EnemyPerspectives@Optiv, an integrated suite of services that allows an organization to evaluate its digital footprint from the perspective of a potential threat actor, from that actors intent, and then take prioritized steps to remediate weaknesses. EnemyPerspectives@Optiv is the example of how Optiv helps clients build sustainable, risk-centric foundations for implementing proactive and measurable security programs. Todays organizations continue to accelerate the adoption of digital business models and environments to remain competitive. While More
The post Optiv Security enables organizations to evaluate their digital footprints appeared first on Help Net Security.
Fans of KDE Neon relying upon this OS/package-set for experiencing the latest and greatest KDE innovations can now enjoy it paired with an Ubuntu 18.04 "Bionic Beaver" base...
LibreOffice 6.1 will officially be hitting the web in a short time as the latest major feature release to this newest cross-platform, open-source office suite...
Admittedly this is more of a Sla... I mean Soyvertisement. However, I just heard about it this weekend, and it sounds both interesting and useful. I thought others might find it interesting as well
Long story short: ReviewMeta is a website which can be used to try to detect fake reviews on Amazon.
In my defense, it is somewhat technologically interesting. The system supposedly uses various heuristics and algorithms in order to accomplish this, such as searching for suspicious submission patterns, text entered, and timing windows to try to find fakes.
The "news" source I heard it from was a radio/podcast at: https://www.npr.org/templates/transcript/transcript.php?storyId=623988370
Read more of this story at SoylentNews.
The United States is still the preeminent location for scientific research, but this is not a given, and we should not take it for granted. The new policies being implemented by China, and especially their ambition to attract outside talent, could quickly drain the lifeblood of our scientific institutions. Without a determined effort to attract, support, and retain leading researchers, we cannot expect to drive the breakthroughs, technologies, and medicines of the future. Massachusetts has admirably made a strong commitment to biotechnology through the Life Sciences Initiative. But will this be enough to sustain the scientific ecosystem of the entire country?
The United States is in danger of losing its primacy in scientific research.
Dont Miss This! Were introducing you to the first astronauts who will launch from U.S. soil since the final Shuttle mission in 2011. Join us live starting at 11 a.m. EDT on Friday, Aug. 3 to meet the Commercial Crew astronauts who will fly on The Boeing Company and SpaceX capsules to #LaunchAmerica to the International Space Station.
The July edition of the Journal Club has us taking a look at a recent paper that casts doubt and concern over the use of CRISPR Cas9 for gene editing.
If you like watching these streams and/or would like to participate in future streams, please consider supporting us by becoming a Lifespan Hero: https://www.lifespan.io/hero
The paper we are discussing can be found here: https://www.nature.com/articles/nbt.
While the EXT_gpu_shader4 extension was written for the OpenGL 2.0 days a decade ago when the GeForce 8 series was NVIDIA's flagship products, AMD's Marek Olk is now adding support for this extension to the Gallium3D drivers...
Most top academic articles are published in journals that can only be accessed legally through expensive paywalls. This means that those who wish to be enriched by that knowledge must pay for the privilege. That doesnt sit well with those who believe that free access to information is a positive for the planet.
One of the sites that has continuously challenged the notion that knowledge should be available at a price is the Library Genesis project. More commonly known as Libgen, the site has torn up the rule book by hosting pirated copies of scientific publications and other books, offering them to the public for free.
For many, Libgen is offering a great service to people hungry for knowledge but for the major publishers that have a huge financial reliance on access fees, its a pirate site that needs to be stopped, just like any other. Publishers, notably Elsevier, have had the platform in their crosshairs for some time.
This week, Germany-based publication Tarnkappe discovered that local access to Libgen appears to have been limited. Users of Vodafone told the publication that attempts to access the site via gen.lib.rus.ec and the newer libgen.io domains were proving fruitless.
Those who try to access the site via its regular domains are met with the following message (translated into English).
After contacting the ISP, Tarnkappe was informed that Vodafone is indeed blocking subscriber access to Libgen. The service provider says it is complying with instructions handed down by a local court.
Due to a temporary injunction issued by various scientific publishers, Elsevier, Springer and Macmillan, which was issued by the Munich Regional Court on 18 July 2018, Vodafone has been requested to immediately implement a network ban, Vodafone spokesperson Heike Koring explained.
The preliminary injunction deals with the copyright claims of scientific publishers that have been infringed by third parties. The block was implemented by Vodafone.
At this stage, its unclear whether the ISP blockade is limited to Vodafone o...
In response to a DMCA (Digital Millennium Copyright Act) takedown notice, Microsoft-owned repository GitHub took down a leaked source code of the popular social messaging app SnapChat, after it was posted publicly on the worlds largest platform for developers.
The notice sent by Snap Inc., the parent company of Snapchat, targets the unauthorized publication and distribution of Snapchats source code.
I am [redacted] at Snap inc., owner of the leaked source code, the notice sent last week reads.
[I]t was leaked and a user has put it in this Github repo. [T]here is no URL to point to [detailing the original content] because Snap Inc. doesnt publish it publicly.
According to Motherboard, an iOS update had exposed some of Snapchats source code earlier this year, which was archived on GitHub before Snap Inc. asked the site to remove the data.
An iOS update in May exposed a small amount of our source code and we were able to identify the mistake and rectify it immediately, a Snap Inc. representative told CNET. We discovered that some of this code had been posted online and it has been subsequently removed. This did not compromise our application and had no impact on our community.
The code was uploaded by a user who claims to be from Pakistan and had created a GitHub repository called Source-Snapchat. Investigation of this users account revealed that he is from Tando Bago in the Badin District of Sindh province in Pakistan who identifies himself as i5xx on the development website. The users profile also links to a website which shares the same name as the user (https://i5xx.store).
Elliot Alderson (@fs0c131y) August 7, 2018
Nothing more is known about the uploader of the code at present. According to GitHub, the source code will not be restored on the website unless a counter-claim is made by the owner of the s...
Fedora's Engineering and Steering Committee is mulling over the idea of dropping software packages from the distribution that have notoriously bad security track records...
Posted by Michael Catanzaro on Aug 08------------------------------------------------------------------------
It may be nearly 40 years old, but the Atari 5200 still inspires legions of fans to relive the 8-bit glory days of their youth. There was much to love about the game console, but the joystick-and-keypad controllers were not among its many charms. The joystick didnt auto-center, the buttons were mushy, and the ergonomics were nonexistent.
Retro-aficionados need not suffer in silence, though, thanks to this replacement controller for the Atari 5200. [Scott Baker] didnt want to settle for one of the commercial replacements or, horrors, an adapter for the old PC-style joystick, so he rolled his own. Working from the original Atari schematics, [Scott] devised a plan for using a readily available thumbstick controller as the basis for his build. The essential problem was how to adapt the 10k pots on the new joystick to work in an environment expecting 500k pots, which he solved using an analog to digital and back to analog approach. The ADCs on an ATtiny85 convert each joystick pots voltage to a digital value between 0 and 255, which is sent to a 100K digital potentiometer. A little fiddling with RC constants brings it back in line with what the console expects. The thumbstick and buttons live on a custom PCB kudos to [Scott] for designing an ambidextrous board. The video below shows the design and the finished product in action.
[Scott] is on a bit of a 5200 kick these days; he just finished up a Raspberry Pi multi-cartridge for the venerable console. His controller should make retro-gameplay on the console a little easier on the hands.
The first solid indication of how widespread this problem really is came with last year's Federal Trade Commission (FTC) action against one of the largest and most profitable of the alleged predators, the prolific journal publisher and conference organizer OMICS, which publishes 785 titles generating over $50M in annual revenues. The FTC alleges that OMICS makes false promises of peer review in return for article processing charges (APCs), assesses those charges without disclosing them up front (then refuses to let authors withdraw their papers from submission), and lies about both the membership of its editorial boards and the names of presenters at the many conferences it sponsors - all classic examples of predatory publishing practices.
Now comes a small flood of even more alarming reports [...]
Read more of this story at SoylentNews.
This rogue planet travels the universe without a star.
Aviatrix announced a new security capability for its AVX SD cloud routing solution. The AVX virtual private cloud (VPC) egress security feature makes it easy to both discover and control internet traffic leaving Amazon Web Services (AWS) VPCs, allowing organizations to secure egress traffic against internal threats and external attacks. The AVX VPC egress security capability also enables organizations to comply with internal practices and industry regulations such as Payment Card Industry (PCI) standards, which More
The post Aviatrix software-defined cloud routing solution adds security measures for AWS VPCs appeared first on Help Net Security.
Ayla Networks announced new capabilities to its IoT platform that will simplify the ability to gain business value from IoT. This new Ayla IoT platform release overcomes restrictions on choosing wireless modules to connect to the Ayla IoT cloud and streamlines the creation of enterprise applications that use IoT device data. A new Ayla portable software agent cuts the time needed to get to market with IoT initiatives, by allowing manufacturers to select any cellular More
The post Ayla Networks announces new IoT platform offerings appeared first on Help Net Security.
A10 Networks announced an upgrade to its multi-cloud analytics and management platform, the A10 Harmony Controller. The upgrade expands A10s security and connected intelligence capabilities via new modular Harmony Apps that support key A10 security solutions, Thunder SSLi (SSL Insight), Thunder CFW (Convergent Firewall), and the Thunder CGN (Carrier-Grade Networking). With many organizations undergoing digital transformation, it is becoming critical to have available and secure application infrastructure to support business operations. A10s release of the More
The post A10 adds real-time security analytics for data centers with Harmony Apps appeared first on Help Net Security.
The most EXPENSIVE Material in the world, priced at more than 6 TRILLION per gram is?
Motorola Solutions continues to support the rollout of FirstNet with the FirstNet Ready LEX L11 handheld device. The companys public safety LTE device is designed for use on FirstNet or similar global public safety networks. FirstNet is being built by AT&T in public-private partnership with the First Responder Network Authority (FirstNet Authority). Motorola Solutions is a member of the AT&T team selected by the FirstNet Authority to deliver FirstNet. Motorola Solutions is working with AT&T More
The post Motorola Solutions FirstNet Ready LTE device enables secure real-time data sharing appeared first on Help Net Security.
The Zigbee Alliance announced that findings from market research firm ON World project a favorable market for connected devices leveraging Zigbee Alliance technologies over the next five years. ON World whose experts provide global business intelligence on the IoT confirmed that half a billion Zigbee chipsets have been sold to date. Their analysts predict that 802.15.4 mesh chipset sales will skyrocket to 4.5 billion by 2023 with the majority of those being based More
The post Analysts confirm half a billion Zigbee chipsets sold, igniting IoT innovation appeared first on Help Net Security.
There could be millions of these about and we would never know. The observation was crystal clear and the reaction normal. Sleep is no explanation and the physical disturbance confirms the reality of the event. It could be Earth derived reptilian from the description, but the lack of eyes is says otherwise.
Such a crwature poorly seen would readily explain many other occurances.
So why was it present and there we have the known program of sampling underway by several alien species. It is not surprising and its failure to initially hide is similar to many others which ended in stealthing.
The depth of non human activity on Earth has proven huge but also well hidden.
Red Toothy Humanoid Appears in the Night
Friday, July 20, 2018
SentinelOne has partnered with Avid Secure to provide security teams with visibility into their cloud workloadsincluding their hosts and networks. By combining SentinelOne with Avid Secure, security professionals are able to determine whether or not resources are protected and prioritize their protection needs. Agility is a key use case for public cloud adoption. SentinelOne and Avid Secures combined solution provides real-time cloud workload protection status at your fingertips. This is critical for migrating several petabytes More
The post SentinelOne announces partnership with Avid Secure to bring visibility to cloud security appeared first on Help Net Security.
ShiftLeft announced the public real-world benchmark of its application security solution. The test measured ShiftLefts ability to protect an application against exploit attempts made by some of white-hat hackers. Cobalt.io performed the penetration testing to provide ethical hacking expertise and an objective third-party perspective. Lab-based testing provides standardized results, but it cannot emulate the unpredictability of human-driven real-world hacking scenarios. In a lab, common tools may be used to probe the application for potential weaknesses. More
The post ShiftLeft demonstrates application protection in the first test of its kind appeared first on Help Net Security.
Spirent Communications announced the availability of the solution using data breach emulation technology to provide holistic and hyper-realistic security testing of networks and devices for awareness of data breach and intruder activity. This new solution, CyberFlood Data Breach Assessment, is a component of Spirents CyberFlood product line, extending it into production environments for continuous testing of live networks and devices. As an holistic automated solution within the live network, CyberFlood Data Breach Assessment provides active More
The post Spirent extends CyberFlood with Data Breach Assessment for testing of networks and devices appeared first on Help Net Security.
Personal bankruptcy among seniors has been growing over the last 25+ years, according to a recent study reported by the NY Times and syndicated nationally, for example at: https://www.seattletimes.com/nation-world/too-little-too-late-bankruptcy-booms-among-older-americans/
The signs of potential trouble vanishing pensions, soaring medical expenses, inadequate savings have been building for years. Now, new research sheds light on the scope of the problem: The rate of people 65 and older filing for bankruptcy is three times what it was in 1991, the study found, and the same group accounts for a far greater share of all filers.
Driving the surge, the study suggests, is a three-decade shift of financial risk from government and employers to individuals, who are bearing an ever-greater responsibility for their own financial well-being as the social safety net shrinks.
The transfer has come in the form of, among other things, longer waits for full Social Security benefits, the replacement of employer-provided pensions with 401(k) savings plans and more out-of-pocket spending on health care. Declining incomes, whether in retirement or leading up to it, compound the challenge.
Read more of this story at SoylentNews.
The astronomical observatory was founded by the Jesuits during the Spanish occupation and later transferred to the Philippine Commonwealth Weather Department. This was adjacent to the University of the Philippines campus of today south of Luneta Park. The observatory had a 19-inch refracting telescope, by far the largest in the Orient. The staff of the observatory includes five Jesuit fathers and twenty-five well-trained native assistants. The construction of a 19-inch refracting telescope and dome was in 1897.
US signal corps photo, US national archives.
These days, photochromic lenses are old-hat. Sure, its useful to have a pair of glasses that automatically tints due to UV light, but what if you want something a little more complex and flashy? Enter [Ashraf Minhaj]s SunGlass-Bot.
The build is simple, beginning with an Arduino Pro Mini for reasons of size. Connected to the analog input is a light-dependent resistor for sensing the ambient light level. This reading is then used to decide whether or not to move the servo which controls the position of the lenses. In low light, the lenses are flipped up to allow clear vision; in brighter light, the lenses flip down to protect the eyes. Power is supplied by a homebrew powerbank that it appears [Ashraf] built from an old phone battery and a small boost converter board. All the files to recreate the project are available on Github, too.
Its a fun build that [Ashraf] shows off in style. While this may not be as effortless as a set of Transition lenses or as quick as a welding mask filter, it has a certain mechanical charm that wouldnt be out-of-place in a certain sci-fi aesthetic.
Hungry for more? Check out these self-blending sunglasses we featured a while back. Video after the break.
Record-low rainfall in some regions and successive seasons of above-average temperatures have blighted vast tracts of Australia's grazing and crop land.
[...] as grain silos in the south are emptied, desperate owners are being forced to slaughter animals, even if it means it will take years for herds to recover.
[...] The ground in drought-hit regions has dried out to such a depth that it is even killing large trees.
[...] The current dry period is not as extensive as the Millennium drought of 1997-2005, which devastated nearly 50 percent of the country's agricultural land and was associated with two El Nio systems, which bring hot, dry weather to Australia.
Read more of this story at SoylentNews.
The security researcher Jens Atom Steube, lead developer of the popular password-cracking tool Hashcat, has devised a new WiFi hacking technique that could be exploited to easily crack WiFi passwords of most modern routers.
The new WiFi hacking technique allows to crack WPA/WPA2 wireless network protocols with Pairwise Master Key Identifier (PMKID)-based roaming features enabled.
The expert was analyzing the recently launched WPA3 security standard when accidentally the new technique.
This attack was discovered accidentally while looking for new ways to attack the new WPA3 security standard. WPA3 will be much harder to attack because of its modern key establishment protocol called Simultaneous Authentication of Equals (SAE). Steube wrote in a post.
The main difference from existing attacks is that in this attack, capture of a full EAPOL 4-way handshake is not required. The new attack is performed on the RSN IE (Robust Security Network Information Element) of a single EAPOL frame.
The RSN protocol was designed for establishing secure communications over an 802.11 wireless network and it is part of the 802.11i (WPA) standard. Every time it attempts to establish a secure communication channel, the RSN broadcasts an RSN IE message within the network.
The Robust Security Network protocol has the PMKID (Pairwise Master Key Identifier), that is the key needed to establish a connection between a client and an access point.
An attacker can obtain...
Many users are looking for an App or software out of parental controls, management needs and, of course, the issue of trusts between two partners. This kind of monitoring software can actually meet the needs of track the smartphones, but whatever you use it for, just keep it in mind, you must get approved before monitoring others devices due to the morality and privacy issues.
The software such as FoneMonitor that allows for monitoring any smartphone. Usually the users utilize it to monitor the targeted devices on their own smartphone or computer. There is no question about the legitimacy of this software, for example, with employees consent, it can be used to watch your staffs during the working period in terms of checking the text messages, Apps activity, keylogger on the targeted smartphones, to be sure if the workers are on duty or leaking out the confidential information.
FoneMonitor is compatible with both Android and iOS system, it allows for tracking the targeted devices on your smartphone as well as on the computers with Windows or Mac OS system, supporting all the popular web browsers, which include, Firefox Mozilla, Google Chrome, and Internet Explorer.
Installation (Easy steps to use FoneMonitor)
There are four simple steps you need to take in order to use FoneMonitor effectively:
Step #1: download the FoneMonitor App on the Android devices from the designated page. On iPhone, it just requires to sync with iCloud, and you can start to use.
Step #2: Create your FoneMonitor account
Step #3: Verify the targeted smartphone
Step #4: Monitor the activities on the targeted phone.
For Android devices, you need to install the App on the targeted device, the App can be set to be invisible on the phone.
So I took a survey of WiFi at Caesar's Palace and thought I'd
write up some results.
When we go to DEF CON in Vegas, hundreds of us bring our WiFi tools to look at the world. Actually, no special hardware is necessary, as modern laptops/phones have WiFi built-in, while the operating system (Windows, macOS, Linux) enables monitor mode. Software is widely available and free. We still love our specialized WiFi dongles and directional antennas, but they arent really needed anymore.
Its also legal, as long as you are just grabbing header information and broadcasts. Which is about all thats useful anymore as encryption has become the norm -- we can pretty much only see what we are allowed to see. The days of grabbing somebodys session-cookie and hijacking their web email are long gone (though the was a fun period). There are still a few targets around if you want to WiFi hack, but most are gone.
So naturally I wanted to do a survey of what Caesars Palace has for WiFi during the DEF CON hacker conference located there.
Here is a list of access-points (on channel 1 only) sorted by popularity, the number of stations using them. These have mind-blowing high numbers in the ~3000 range for CAESARS. I think something is wrong with the data.
Submitted via IRC for takyon
Living on an island can have strange effects. On Cyprus, hippos dwindled to the size of sea lions. On Flores in Indonesia, extinct elephants weighed no more than a large hog, but rats grew as big as cats. All are examples of the so-called island effect, which holds that when food and predators are scarce, big animals shrink and little ones grow. But no one was sure whether the same rule explains the most famous example of dwarfing on Flores, the odd extinct hominin called the hobbit, which lived 60,000 to 100,000 years ago and stood about a meter tall.
Now, genetic evidence from modern pygmies on Floreswho are unrelated to the hobbitconfirms that humans, too, are subject to so-called island dwarfing. An international team reports this week in Science that Flores pygmies differ from their closest relatives on New Guinea and in East Asia in carrying more gene variants that promote short stature. The genetic differences testify to recent evolutionthe island rule at work. And they imply that the same force gave the hobbit its short stature, the authors say.
Read more of this story at SoylentNews.
In July 2018, staff of the Lanwar gaming site discovered a data breach they believe dates back to sometime over the previous several months. The data contained 45k names, email addresses, usernames and plain text passwords. A Lanwar staff member self-submitted the breach to HIBP and has also contacted the relevant authorities about the incident after identifying a phishing attempt to extort Bitcoin from a user.
Few things hit a hacker or maker harder than when a beloved tool goes to that Big Toolbox In The Sky. It can be hard to trash something thats been with you through countless repairs and teardowns, made all the worse by the fact most employers dont recognize Tool Bereavement as a valid reason to request time off. Maybe next time one of your trusty pieces of gear gives up the ghost, you can follow the example set by [usuallyplesent] and turn it into a piece of art to hang up on the shop wall.
The shop had gotten years of daily service out of this air powered angle die grinder (not bad for a $14 Harbor Freight tool), and he thought they should immortalize it in their waiting room by turning it into an interesting piece of art. After all, its not everyday that some folks see the insides of the sort of tools the more mechanically inclined of us may take for granted.
After taking the grinder apart and cleaning everything up, [usuallyplesent] decided to simplify things a bit by tossing out the assorted tiny components like seals and washers. By just focusing on the larger core components, the exploded view is cleaner and reminds us of a light saber cutaway.
Facebook wants banks to "share detail financial information about their customers, including card transactions and checking account balances". Summary article here, original paywalled WSJ article here, alternative link may avoid paywall.
Facebook says that "it wouldn't use bank data for ad-targeting purposes", and that they "don't have special relationships, partnerships, or contract with banks or credit-card companies to use their customers, purchase data for ads." You can just hear the missing word yet. In fact, later on the article specifically says "As part of the proposed deals, Facebook asked banks for information about where its users are shopping with their debit and credit cards".
Of course, the great mass of people will have no problem allowing Facebook into their financial lives...
Read more of this story at SoylentNews.
Whos up for a swim?
Our world was rocked by last weeks announcement of good radar evidence for a liquid water lake under the Red Planets south pole. Senior Editor Emily Lakdawalla introduces us to the story that is then taken up by two of host Mat Kaplans favorite Martians. The Goddard Space Flight Centers James Garvin headed NASAs Mars exploration program, while NASA Ames astrobiologist Chris McKay co-founded the Mars Underground more than 35 years ago. Look up! Mars is still close by, and the Perseid meteor shower is around the corner. Bruce Betts gives us the Whats Up lowdown.
This video was made possible by Brilliant. Be one of the first 200 people to sign up with this link and get 20% off your premium subscription with Brilliant.org! https://brilliant.org/singularity
Artificial intelligence has been a topic of growing prominence in the media and mainstream culture since 2015, as well as in the investment world, with start-ups that even mention the word in their business model, gaining massive amounts of funding.
While to many, the hype around AI may appear sudden, the concepts of modern artificial intelligence have been around for over a century and extending further, the concept of artificial intelligence and artificial beings have been in the minds of humans for thousands of years.
To better understand and appreciate this technology and those who brought it to us as well as to gain insight into where it will take us: sit back, relax and join me in an exploration on the history of artificial intelligence.
Thank you to the patron(s) who supported this video
Wyldn pearson collin R terrell kiyoshi matsutsuyu
Twitter CEO Jack Dorsey on Tuesday explained the sites decision not to suspend conspiracy theorist Alex Jones, breaking with several other top tech companies.In recent days, Jones and his website, Infowars, have been banned or otherwise...
This is obvious, but it tripped me up a few times after listening to the excellent Awk series by Dave and B-yeezi, so I though I'd share it here to save others the trouble. When moving from simple awk commands to proper awk scripts, you put a shebang line at the top of your script. It's pretty common to many of us, because we do it for Python and Bash all the time. But if you just put: #!/usr/bin/awk Then your awk script won't work the way you expect. You must provide the -f flag: #!/usr/bin/awk -f Now you can pipe things to your awk script as expected.
A couple of years ago, Samsung launched its first 4TB solid state drives, which might as well not have existed given their $1,499 asking price. Today, the company announces the commencement of mass production of a more though it's too early to know exactly how much more affordable variant with its 4TB QLC SSDs. The knock on QLC NAND storage has traditionally been that it sacrifices speed for an increased density, however Samsung promises the same 540MBps read and 520MBps write speeds for its new SSDs as it offers on its existing SATA SSD drives.
Describing this new family of storage drives, which will also include 1TB and 2TB variants, as consumer class, Samsung will obviously aim to price them at a level where quibbles about performance will be overwhelmed by the sheer advantage of having terabytes of space. Any concerns about the reliability of these drives should also be allayed by the three-year warranty promised by Samsung. The launch of the first drives built around these new storage chips is slated for later this year.
What's the endurance of QLC NAND again?
Also at Engadget.
3D QLC NAND Could Reach 1000 P/E Cycles
Samsung Announces a 128 TB SSD With QLC NAND
Micron Launches First QLC NAND SSD
Western Digital Samples 96-Layer 3D QLC NAND with 1.33 Tb Per Die
Read more of this story at SoylentNews.
Q-Anon gained popularity from the Far-Rights favorite website 4chan. The online hacktivist group Anonymous has been missing from the limelight for a while but now, the group is back and vows to carry out a doxxing operation against Q-Anon and expose the real identity of whoever is behind it. Doxing is an activity in which the 
This is a post from HackRead.com Read the original post: Anonymous hackers vow to expose Q-Anon
Someone walks into the Vintage Computer Festival and asks, whats new?. Its a hilarious joke, but there is some truth to it. At this years Vintage Computer Festival West, the exhibit hall wasnt just filled to the brim with ancient computers from the Before Time. There was new hardware. There was hardware that would give your Apple IIgs even more memory. There was new hardware that perfectly emulated 40-year-old functionality. Theres always something new at the Vintage Computer Festival.
Some of the more interesting projects are just coming off the assembly line. If you want a modern-day Lisp machine, that one wont be assembled until next week, although there was a working prototype at VCF. If you want the greatest recreation of the most beautiful hardware, VCF has your back. Check out these amazing builds below.
During the second AI renaissance in the 1980s, researchers had a powerful language at their disposal. Lisp was the language of AI in the 80s, and there were even purpose-built machines built to run Lisp fast. You havent lived until youve had a Symbolics Lisp machine under your desk. Of course, AI died once som...
NVIDIA has just published their latest Vulkan beta driver release for Windows and Linux...
A new technique for quantum computing could bust open our whole model of how time moves in the universe.
A new paper, published July 18 in the journal Physical Review X [ https://journals.aps.org/prx/abstract/10.1103/PhysRevX.8.031013 ], opens the door to the possibility that the arrow pf time is an artifact of classical-style computation something that's only appeared to us to be the case because of our limited tools.
A team of researchers found that in certain circumstances causal asymmetry disappears inside quantum computers.
In this paper, the researchers looked at physical systems that had a goldilocks' level of disorder and randomness not too little, and not too much.
They tried to figure out those systems' pasts and futures using theoretical quantum computers (no physical computers involved). Not only did these models of quantum computers use less memory than the classical computer models, she said, they were able to run in either direction through time without using up extra memory. In other words, the quantum models had no causal asymmetry
"While classically, it might be impossible for the process to go in one of the directions [through time]," said Jayne Thompson, of the National University of Singapore, "our results show that 'quantum mechanically,' the process can go in either direction using very little memory."
And if that's true inside a quantum computer, that's true in the universe, she said.
Quantum physics is the study of the strange probabilistic behaviors of very small particles all the very small particles in the universe. And if quantum physics is true for all the pieces that make up the universe, it's true for the universe itself, even if some of its weirder effects aren't always obvious to us. So if a quantum computer can operate without causal asymmetry, then so can the universe.
Thompson added that the research doesn't prove that there isn't any causal asymmetry anywhere in the universe. She and her colleagues showed there is no asymmetry in a handful of systems. But it's possible, she said, that there are some very bare-bones quantum models where some causal asymmetry emerges.
Read more of this story at SoylentNews.
The Infowars app is rising in the Apple store's rankings after a number of other major digital platforms cracked down on its content.The app has surged in popularity in recent days from the 47th to the 4th most popular Apple store news app in the...
Engineers at Caltech have developed a new control algorithm that enables a single drone to herd an entire flock of birds away from the airspace of an airport. The algorithm is presented in a study in IEEE Transactions on Robotics.
The project was inspired by the 2009 Miracle on the Hudson, when US Airways Flight 1549 struck a flock of geese shortly after takeoff and pilots Chesley Sullenberger and Jeffrey Skiles were forced to land in the Hudson River off Manhattan.
The passengers on Flight 1549 were only saved because the pilots were so skilled, says Soon-Jo Chung, an associate professor of aerospace and Bren Scholar in the Division of Engineering and Applied Science as well as a JPL research scientist, and the principal investigator on the drone herding project. It made me think that next time might not have such a happy ending. So I started looking into ways to protect airspace from birds by leveraging my research areas in autonomy and robotics.
Here on Earth, electromagnetic waves around the planet are typically pretty calm. When the Sun fires a burst of charged particles at the Earth we are treated to an aurora (often called Northern Lights), but rarely are they a cause for concern. If you were to head to Jupiter, however, things would change dramatically.
In a new study published in Nature Communications, researchers describe the incredible electromagnetic field structure around two of Jupiters moons: Europa and Ganymede. The invisible magnetic fields around these bodies is being powered by Jupiters own magnetic field, and the result is an ultra-powerful particle accelerator of sorts, which might be capable of seriously damaging or even destroying a spacecraft.
Chorus waves are low-frequency electromagnetic waves that occur naturally around planets, including Earth. Near our planet theyre mostly harmless, but they do have the capability to produce extremely fast-moving killer particles that could cause damage to manmade technology if we happened to be in the wrong place at the wrong time.
The launch marks the first reuse of an improved Falcon 9 Block 5, which includes several upgrades designed to allow SpaceX to quickly refurbish and re-launch the rocket.
Theres a literal disturbance in the force that alters what physicists have long thought of as a characteristic of superconductivity, according to Rice University scientists.
Rice physicists Pengcheng Dai and Andriy Nevidomskyy and their colleagues used simulations and neutron scattering experiments that show the atomic structure of materials to reveal tiny distortions of the crystal lattice in a so-called iron pnictide compound of sodium, iron, nickel and arsenic.
These local distortions were observed among the otherwise symmetrical atomic order in the material at ultracold temperatures near the point of optimal superconductivity. They indicate researchers may have some wiggle room as they work to increase the temperature at which iron pnictides become superconductors.
The fusion of a sperm cell with an egg cell is the very first step in the process that leads to new individuals in sexually reproducing species. Fundamental as this process may be, scientists are only now beginning to understand the complexities of how it works.
In a paper published in PLOS Biology, researchers have described the detailed structure of proteins that enable sperm-egg fusion in two different species: a flowering plant and a protozoan. The researchers hope that revealing the process in these species and their relatives might bring scientists a step closer to understanding it across sexual species, including humans and other vertebrates.
Its surprising to me that we still dont know how a human sperm fuses with a human egg, said Mark Johnson, an associate professor of biology at Brown University and a study co-author. One of the things we hope this paper will do is establish a structural signature for the proteins that make gamete fusion work in these species so that we might be able to look for it in species where those protein mechanisms are still unknown.
For the last 20 million years, the species of yeast used to brew beer has had 16 chromosomes. Now scientists have created a new species with just one.
Apple in a letter to lawmakers on Tuesday defended its data collection practices and took a pointed jab at "other companies" that may be less committed to protecting the privacy of their customers."We believe privacy is a...
For more than a decade, file-sharers around the world have been pressured to pay significant settlement fees, or face worse in court.
The practice is particularly common in the United States. While there is only a small group of independent companies involved, thousands of people are taken to court each year.
These efforts, often characterized as copyright trolling, share a familiar pattern. After the film companies acquire a subpoena to get the personal details of an alleged pirate, they contact this person with a settlement request.
These cases are not intended to go to trial, however. Instead, the copyright holders often drop their complaint when the accused person fights back.
This was the case when Darren Brinkley was sued in a Utah federal court last year. In a complaint filed by Criminal Productions, he and 31 others were accused of illegally sharing a copy of the movie Criminal.
Brinkley denied these claims and rejected the settlement offer but the film company still didnt back off.
Plaintiff persisted, forcing Defendant to retain counsel and incur significant attorneys fees and costs. Yet Plaintiff had no intention of litigating its claims, Brinkleys lawyers write.
Rather, these filings are shameless efforts to extort inflated settlements from infringers and non-infringers alike.
The above is quoted from a recent motion for attorney fees, because things changed significantly when Brinkley lawyered up. While Criminal Productions initially refused to let the case go, recently it voluntarily dismissed the case.
According to Brinkleys lawyers, the film company dropped the case like a hot potato when it discovered that the defendant was attempting to look into its business.
As expected, when Plaintiff realized a Motion to Compel discovery was in draft, Criminal sought voluntary dismissal of both its affirmative claims and Brinkleys counterclaims, which this Court granted, with prejudice, on July 6, 2018.
The dismissal came after nearly a year and all this time Criminal Productions failed to produce any evidence. The defense argues that, while the filmmakers had no intention to litigate the baseless suit, their client was forced to run up significant costs.
The same also happened in other cases, where so-called copyright trolls quickly bailed out when defense attorneys sought discovery. Brinkleys attorneys see this as a typical example of cut and run litigation, and argue that Criminal Productions must pay their clients legal bill.
Defense Secretary James Mattis said Tuesday that he absolutely supports the creation of a new space branch for the military, but declined to say whether it would be the separate Space Force President Trump has pressed for....
Submitted via IRC for SoyCow1984
A team of researchers at Duo Security has unearthed a sophisticated botnet operating on Twitter; and being used to spread a cryptocurrency scam.
The botnet was discovered during the course of a wider research project to create and publish a methodology for identifying Twitter account automat...
The team used Twitter's API and some standard data enrichment techniques to create a large data set of 88 million public Twitter accounts, comprising more than half a billion tweets. (Although they say they focused on the last 200 tweets per account for the study.)
Read more of this story at SoylentNews.
As summer scorches the northern hemisphere, heres something to cool your thoughts: winter is only four months away. And with it will come the general misery and the proclamations that Itll never be warm again, not to mention the white stuff and the shoveling. Or perhaps not, if youre lucky enough to have a semi-autonomous electric snowblower in the garage.
Well never get lucky enough to have such wonders gifted on us as [Dane] did, but we applaud him for picking up the torch where someone else obviously left off. And who knows; perhaps the previous maker took inspiration from this remote-controlled snowblower build?
Torrenting is a highly efficient way to transfer files through the Internet
Torrenting. Youve heard about it, talked about it, and probably even enjoyed something that came from it without you knowing. But, youve probably misunderstood it.rawpixel on Unsplash
What is Torrenting?
Simply put, Torrenting is a highly efficient way to transfer files through the Internet. This is usually done through a client like BitTorrent.
To torrent, you first download a torrent file from a torrent site. These files come straight from other users (seeders) who are willingly sharing their file to other peers. Once you download the torrent file, you feed it to a client. The client tells you what file youve downloaded and where it can be found.
A person looking to download a certain file can directly download it from another person (peer). The more peers that are seeding (sharing the file), the quicker a file can be downloaded and the less burden it will be to the seeders. Its because of this method of file sharing that makes torrenting such a great way to share files to millions of users across the Internet in so little time.
Herein lies the problem with torrenting. Because people are downloading files directly from other users and not from a single source (official website for the media being downloaded), it makes pirating those files really easy and quick.
This is why, as you may have already heard, torrenting is looked upon with disdain especially by businesses losing profits from potential sales of pirated files.
But, torrenting isnt all bad. In fact, it has actually helped A LOT of businesses already- even bigger ones like Facebook!
How torrents can benefit businesses
1. You can give your customers JUST what they want
On-demand access has always been a big hit with consumers but the broadcasting industry always seemed to miss this point. Theyd only show reruns of popular shows 10 years later.
In 2005, David Poltrack, Executive Vice President at CBS, has said:
"In our research with consumers, content-...
Police in Florida have arrested a 25-year-old man accused of being part of a multi-state cyber fraud ring that hijacked mobile phone numbers in online attacks that siphoned hundreds of thousands of dollars worth of bitcoin and other cryptocurrencies from victims.
On July 18, 2018, Pasco County authorities arrested Ricky Joseph Handschumacher, an employee of the city of Port Richey, Fla, charging him with grand theft and money laundering. Investigators allege Handschumacher was part of a group of at least nine individuals scattered across multiple states who for the past two years have drained bank accounts via an increasingly common scheme involving mobile phone SIM swaps.
A SIM card is the tiny, removable chip in a mobile device that allows it to connect to the providers network. Customers can legitimately request a SIM swap when their existing SIM card has been damaged, or when they are switching to a different phone that requires a SIM card of another size.
But SIM swaps are frequently abused by scam artists who trick mobile providers into tying a targets service to a new SIM card and mobile phone that the attackers control. Unauthorized SIM swaps often are perpetrated by fraudsters who have already stolen or phished a targets password, as many banks and online services rely on text messages to send users a one-time code that needs to be entered in addition to a password for online authentication.
In some cases, fraudulent SIM swaps succeed thanks to lax authentication procedures at mobile phone stores. In other instances, mobile store employees work directly with cyber criminals to help conduct unauthorized SIM swaps, as appears to be the case with the crime gang that allegedly included Handschumacher.
According to court documents, investigators first learned of the groups activities in February 2018, when a Michigan woman called police after she overheard her son talking on the phone and pretending to be an AT&T employee. Officers responding to the report searched the residence and found multiple cell phones and SIM cards, as well as files on the kids computer that included an extensive list of names and phone numbers of people from around the world.
The following month, Michigan authorities found the same individual accessing personal consumer data via public Wi-Fi at a local library, and seized 45 SIM cards, a laptop and a Trezor w...
Advocates for the First Amendment are asking Facebook to ease restrictions on journalists and scholars gathering user data for research.In a letter Monday, the Knight First Amendment Institute at Columbia University asked Facebook CEO Mark...
Looking for how to hack WiFi password OR WiFi hacking software? Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers. Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens 'Atom' Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols
While Mir has long been focused on its Snap support, now available via the Snap Store is offering EGMDE...
Submitted via IRC for SoyCow1984
Only one of top 12 ISPs raised listed speed after new truth-in-advertising rule.
Most broadband providers in the UK "have been forced to cut the headline speeds they advertise when selling deals" because of new UK rules requiring accurate speed claims, according to a consumer advocacy group.
"Eleven major suppliers have had to cut the advertised speed of some of their deals, with the cheapest deals dropping by 41 percent," the group wrote last week.
The analysis was conducted by Which?, a brand name used by the Consumers' Association, a UK-based charity that does product research and advocacy on behalf of consumers.
"BT, EE, John Lewis Broadband, Plusnet, Sky, Zen Internet, Post Office, SSE, TalkTalk, and Utility Warehouse previously advertised their standard (ADSL) broadband deals as 'up to 17Mbps,'" the group noted in its announcement on Saturday. "The new advertised speed is now more than a third lower at 10Mbps or 11Mbps."
"TalkTalk has completely dropped advertising speed claims from most of its deals," the consumer group also said. "Vodafone has also changed the name of some of its deals: Fibre 38 and Fibre 76 are now Superfast 1 and Superfast 2."
The new rules were implemented in May by the Committees of Advertising Practice, the UK ad industry's self-regulatory body. Which? said it had been "campaigning for an advertising change since 2013."
Previously, ISPs were allowed to advertise broadband speeds of "up to" a certain amount, even if only one in 10 customers could ever get those speeds, Which? wrote. "But the new advertising rules mean that at least half of customers must now be able to get an advertised average speed, even during peak times (8-10pm)," the group said.
The entry-level speed tiers were apparently the least accur...
The entire idea of the Power Harvesting Challenge is to get usable power from something, be it solar energy, a rushing waterfall, or fueling steam turbines with hamsters. [Cole B] decided that instead of capturing energy from one of these power sources, hed do it all. He created Power Generation Modules, or Lego bricks for harvesting power. Theres a hand crank module, a water turbine module, and enough modules to do something with all that captured power like a light module and a USB charger module.
But maybe you dont want to generate power the normal way. Maybe you think spinning magnets is too mainstream, or something. If thats the case, then [Josh] has the project for you. Its the P Cell, a battery fueled by urine. Yes, its just a simple copper zinc wet cell using urea as an electrolyte, but remember: in the early 1800s, human urine was a major source of nitrates used in the manufacture of gunpowder. Why not get some electricity from something that is just sent down the tubes?
Right now were in the middle of the Human Computer Interface Challenge. Show us that you have what it takes to get a computer to talk to a human, get a human to talk to a computer, or even recreate one of those weird 3D CAD mice from the early 90s. Were looking for any interesting ways to bridge that valley between people and their devices. Twenty Human Computer Interface Challenge submissions will be selected to move onto the finals and win $1000 in the process! The five top entries of the 2018 Hackaday Prize will split $100,000!
The O'Reilly Open Source Conference (OSCON) returned to Portland, Oregon in July for its 20th meeting. Previously, we covered some retrospectives and community-management talks that were a big part of the conference. Of course, OSCON is also a technology conference, and there were lots of talks on various open-source software platforms and tools.
Subscribers can read on for the second part of an OSCON report by guest author Josh Berkus.
A multibillion-dollar Italian banking conglomerate has stopped advertising with Facebook until the social media company improves its ethical standards."Facebook is not acting in an ethical way," Unicredit CEO Jean Pierre Mustier said during a...
Tesla shares were halted Tuesday afternoon after CEO Elon Musk tweeted that hes thinking about taking the company private.Am considering taking Tesla private at $420. Funding secured, Musk said in the tweet."Shareholders could...
Sen. Chris Murphy (D-Conn.) defended statements he made Monday advocating for social media companies to shut down some users.Murphy contended that private companies choosing to keep their platforms from spreading hate and lies is not the same...
Security updates have been issued by Debian (kernel), Fedora (ceph, exiv2, myrepos, and seamonkey), openSUSE (libofx and znc), Oracle (kernel), Red Hat (qemu-kvm-rhev), SUSE (clamav, kernel, and rubygem-sprockets-2_12), and Ubuntu (gnupg, lftp, libxcursor, linux-hwe, linux-azure, linux-gcp, linux-raspi2, and lxc).
Software patents account for more than half of all utility patents granted in the US over the past few years. Clearly, many companies see these patents as a way to fortune and growth, even while software patents are hated by many people working in the free and open-source movements. The field of patenting has now joined the onward march of artificial intelligence. This was the topic of a talk at OSCON 2018 by Van Lindberg, an intellectual-property lawyer, board member and general counsel for the Python Software Foundation, and author of the book Intellectual Property and Open Source. The disruption presented by deep learning ranges from modest enhancements that have already been exploitedmaking searches for prior art easierto harbingers of automatic patent generation in the future.
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog