|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Netconf, the Linux kernel networking development conference, has provided coverage of this year's event, which was held in Boston, MA, May 31-June 1.
Day 1 looks at the following sessions:
Day 2 covers:
Water samples from UK rivers contained significantly higher concentrations of microplastics downstream from wastewater treatment plants, according to one of the first studies to determine potential sources of microplastics pollution.
Scientists from the University of Leeds measured microplastics concentrations up and downstream of six wastewater treatment plants and found that all of the plants were linked to an increase in microplastics in the riverson average up to three times higher but in one instance by a factor of 69.
Lead author Dr. Paul Kay, from the School of Geography at Leeds, said: Microplastics are one of the least studied groups of contaminants in river systems. These tiny plastic fragments and flakes may prove to be one of the biggest challenges in repairing the widespread environmental harm plastics have caused. Finding key entry points of microplastics, such as wastewater treatment plants, can provide focus points to combating their distribution.
Thanks to microcontrollers, RTC modules, and a plethora of cheap and interesting display options, digital clock projects have become pretty easy. Choose to base a clock build around a chip sporting a date code from the late 70s, though, and your build is bound to be more than run-of-the-mill.
This is the boat that [Fran Blanche] finds herself in with one of her ongoing projects. The chip in question is a Mostek MK50250 digital alarm clock chip, and her first hurdle was find a way to run the clock on 50 Hertz with North American 60-Hertz power. The reason for this is a lesson in the compromises engineers sometimes have to make during the design process, and how that sometimes leads to false assumptions. It seems that the Mostek designers assumed that a 24-hour display would only ever be needed in locales where the line frequency is 50 Hz. [Fran], however, wants military time at 60 Hz, so she came up with a circuit to fool the chip. It uses a 4017 decade counter to divide the 60-Hz signal by 10, and uses the 6-Hz output to turn on a transistor that pulls the 60-Hz output low for one pulse. The result is one dropped pulse out of every six, which gives the Mostek the 50-Hz signal it needs. Sure, the pulse chain is asymmetric, but the chip wont care, and [Fran] gets the clock she wants. Pretty clever.
[Fran] has been teasing this clock build for a while, and were keen to see what it looks like. We hope shell be using these outsized not-quite-a-light-pipe LED displays or something similar.
Posted by Luciano Bello on Jun 11- Software: pppd, in particular the EAP-TLS patch
Imagine being isolated off-grid for an unknown number of years. Maybe you're stuck somewhere like Davidge or Mark Watney; or perhaps you've chosen a life of isolation like Yoda or Obi-Wan Kenobi. Maybe you're a survivor of the $Apocalypse. Wouldn't keeping a journal be a great idea? You could pass on your knowledge, keep track of daily activities, maybe even keep yourself from going insane!
Forget all the wastefulness, extravagance, and complexity of most modern devices, you've got survival to think about! Obviously power usage would be a major concern, but ergonomics, searchability, repairability, and data robustness would be important too. Keeping in mind that this is a dedicated device for journaling and barring the old Russian pencil and paper, what would the best solution look like with off-the-shelf modern technology?
Read more of this story at SoylentNews.
Dr. Chenxi Wang, industry thought leader and analyst, examined the Return on Investment that organizations may realize by using Cobalts Pen Testing as a Service (PTaaS) platform. This study took a detailed look at the benefits and costs of deploying Cobalts services in comparison with using traditional penetration testing consultancies. For this study, Dr. Wang conducted in-depth interviews with current Cobalt customers. The organizations interviewed represent a wide swath of different industry segments, including SaaS, More
As more devices are connected wirelessly, the need for wireless technologies that can handle increased data and capacity demands has grown exponentially.
As more devices are connected wirelessly, the need for wireless
technologies that can handle increased data and capacity demands
has grown exponentially. The coming onslaught of Internet of Things
(IoT) devices threatens to overwhelm existing wireless networks
while the proliferation of video streaming and virtual reality
technology requires faster data rates than are currently available.
Multiple input, multiple output (MIMO) is one technology that has
the potential to solve these problems by enabling the next
generation of wireless. By using more than one antenna, multiple
data signals can be sent in the same time and frequency domain to
offer huge gains in capacity, throughput, reliability, or a
combination of the three. As leading researchers and wireless
companies rush to explore new communications technologies, MIMO
will be a crucial topic.
Some of the theory behind MU-MIMO and Massive MIMO has been laid out, but researchers need to innovate faster by building real-world prototypes. The NI MIMO Prototyping System is a testbed that enables researchers to prototype these 5G MIMO systems and achieve rapid results.
MIMO Prototyping System Hardware
The MIMO Prototyping System includes USRP RIO radio heads, FlexRIO FPGA co-processors, clock distribution modules, PCIe routing hardware, and a PXIe chassis and controller. The system can be configured in a variety of sizes to meet the requirements of a wide range of MIMO applications including single user MIMO (SU-MIMO), multiple user MIMO (MU-MIMO), and Massive MIMO. The various system components and configurations will be discussed in detail in this paper. Application software is discussed in MIMO Application Framework white paper.
USRP Software Defined Radio
The USRP RIO software defined radio (SDR) features an integrated 2x2 MIMO transceiver and a high-performance Xilinx Kintex-...
Device-to-device (D2D) communication refers to the technology that allows user equipment (UE) devices to communicate with each other with or without the involvement of network infrastructures such as an access point or base stations.
Device-to-device (D2D) communication refers to the technology that allows user equipment (UE) devices to communicate with each other with or without the involvement of network infrastructures such as an access point or base stations. D2D is promising because it makes ultra-low latency communication possible. But who is using D2D and what are the real applications behind this technology? In this white paper, learn about D2D and how it enables fifth generation (5G) wireless network communication from short-range wireless to vehicle-to-vehicle communications
What Is D2D?
D2D enables the communication between devices such as cell phones or vehicles. This technique enables new device-centric communication that doesnt require direct communication with the network infrastructure. Thus, it is expected to solve part of the network capacity issue as 5G promises to connect more devices in faster, more reliable networks.
Dedicated short-range communications (DSRC) technology is often tied to 802.11p, which is the Wi-Fi standard specific to the automotive industry that leads the next generation of connected cars. In a February 15 news release, Volkswagen announced that it will provide
WLANp as standard equipment on all its cars in Europe starting in 2019. This announcement could create ripple effects in the industry to promote accident-free driving and, ultimately, autonomous driving.
However, the challenge with 802.11p technology is that it works only with cars that can transceive its protocol. Though 802.11p technology communicates safety-related information for driving such as what the weather is like at the end of a tunnel, it works only with cars that can transceive its protocol. To support complete autonomous driving, communication via cellular networks is essential. This new area is called C-V2X, where X is everything such as another car (V2V), pedestrians (V2P), networks (V2N), and so on. In this white paper, C-V2X mainly refers to LTE-V2X.
C-V2X delivers the major benefit of using the existing LTE network infrastructure, according to the initial V2V standard completion announcement by 3GPP in September 2016. It promotes high data rates, high coverage, lower latency with 5G, and more. Based on these great expectations, virtually every automotive company is looking at C-V2X as the next it technology that will pave the path to completely autonomous drivi...
Safe and reliable swarming drone tech could be making its way into consumer drones Photo: Cirque du Soleil/Richard Termine In 2016 Verity Studios worked with Cirque du Soleil to bring flying lampshade drones to its show Paramour.
Verity Studios, which took precision drone swarm technology from ETH Zurich and turned it into a spectacular live event display system, has announced a round of Series A funding totaling US $18 million from Fontinalis Partners, Airbus Ventures, Sony Innovation Fund, and Kitty Hawk. This is a lot of money for a company that most people may not know exists even if they view a Verity-powered drone show firsthand, but thats part of what makes Verity special: Everything they do is reliable, seamless, and safe, leading to experiences that have a truly mesmerizing effect.
The reason we follow companies like Verity so closely, and the reason why were happy when they get funded, is because theyve managed to transition some fairly amazing robotics research into a successful business, which is a very difficult thing to do.
The kinds of things that make Verity special come from over a decade of work at the Flying Machine Arena at ETH Zurich, led by Professor Raffaello DAndrea, a lot of which weve covered in the past. For example, Veritys drones are fully redundant, able to recover from a failed battery, a failed motor, a failed connector, a failed propeller, a failed sensor, or a failure of any other component ... through the duplication of critical components and the use of proprietary algorithms, which enable safe emergency responses to component failures. Heres what this looks like, based on research that we covered in 2014.
Verity says it has made a significant amount of progress with its drone swarm control and safety systems, although much of that will probably be wrapped up in custom and proprietary technologiesthe kind of stuff that makes Verity worth that $18M Series A....
PCBs are exceptionally cheap now, and that means everyone gets to experiment with the careful application of copper traces on a fiberglass substrate. For his Hackaday Prize entry, [Carl] is putting coils on a PCB. What can you do with that? Build a motor, obviously. This isnt any motor, though: its a linear motor. If youve ever wanted a maglev train on a PCB, this is the project for you.
This project is a slight extension of [Carl]s other PCB motor project, the aptly named PCB Motor. For this project, [Carl] whipped up a small, circular PCB with a few very small coils embedded inside. With the addition of a bearing, a few 3D printed parts, and a few magnets, [Carl] was able to create a brushless motor thats also a PCB. Is it powerful enough to use in a quadcopter? Probably not quite yet.
Like [Carl]s earlier PCB motor, this linear PCB motor follows the same basic idea. The track, if you will, is simply a rectangular PCB loaded up with twelve coils, each of them using 5 mil space and trace, adding up to 140 turns. This is bigger than the coils used for the (circular) PCB motor, but that only means it can handle a bit more power.
As for the moving part of this motor, [Carl] is using a 3D printed slider with an N52 neodymium magnet embedded inside. All in all, its a simple device, but thats not getting to the complexity of the drive circuit. Were looking forward to the updates that will make this motor move, turning this into a great entry for The Hackaday Prize.
Published this weekend was a 25-way Linux graphics card comparison for the newest major Linux game release, A Total War Saga: Thrones of Britannia, that was released natively for Linux days ago by Feral Interactive and ported from Direct3D to Vulkan in the process. As a result of premium requests, here are some additional tests for this Linux game when comparing the performance on Intel Core i7 8700K and Ryzen 7 2700X processors.
By demonstrating that even tiny brains can comprehend complex, abstract concepts, the surprise finding opens possibilities for new, simpler approaches to developing Artificial Intelligence. In research published in the journal Science, Australian and French researchers tested whether honey bees can rank numerical quantities and understand that zero belongs at the lower end of a sequence of numbers.
Associate Professor Adrian Dyer, from RMIT University in Melbourne, Australia, said the number zero was the backbone of modern maths and technological advancements.
"Zero is a difficult concept to understand and a mathematical skill that doesn't come easily -- it takes children a few years to learn," Dyer said. "We've long believed only humans had the intelligence to get the concept, but recent research has shown monkeys and birds have the brains for it as well. What we haven't known -- until now -- is whether insects can also understand zero."
As well as being a critical pollinator, the honeybee is an exceptional model species for investigating insect cognition, with previous research showing they can learn intricate skills from other bees and even understand abstract concepts like sameness and difference. But bee brains have fewer than 1 million neurons -- compared with the 86,000 million neurons of a human brain -- and little was known about how insect brains would cope with being tested on such an important numeric skill.
RMIT PhD researcher Scarlett Howard set out to test the honeybee on its understanding, marking individual honeybees for easy identification and luring them to a specially-designed testing apparatus. The bees were trained to choose an image with the lowest number of elements in order to receive a reward of sugar solution. For example, the bees learned to choose three elements when presented with three vs. four; or two elements when presented with two vs. three.
When Howard periodically tested the bees with an image that contained no elements versus an image that had one or more, the bees understood that the set of zero was the lower number -- despite never having been exposed to an "empty set."
Read more of this story at SoylentNews.
Wine's bi-weekly release cycle for new development releases is slightly off target with it surfacing today rather than last Friday, but the changes are worthwhile...
I love clearing the air with a single dismissive answer to a seemingly complex question. Short, dismissive retorts are definitive, but arrogant. It reminds readers that I am sometimes a smart a*ss.
Is technical analysis a reasoned approach for
investors to predict future value of an asset?
In a word, the answer is Hell No!. (Actually, thats two words. Feel free to drop the adjective). Although many technical analysts earnestly believe their craft, the approach has no value and does not hold up to a fundamental approach.
One word arrogance comes with an obligation to substantiateand, so, lets begin with examples of each approach.
Investment advisors often classify their approach to studying an equity, instrument or market as either a fundamental or technical analysis. For example
Do you see the difference? Fundamental analysis is rooted in SWOT: Study strengths, weaknesses, opportunities, and threats. Technical analysis dismisses all of that. If technical jargon and approach sound a bit like a Gypsy fortune teller, thats because it is exactly that! It is not rooted in revenue and market realities. Even if an analyst or advisor is earnest, the approach is complete hokum.
I have researched, invested, consulted and been an economic columnist for years. I have also
I was going blind which is not a good thing when you need to see to run a growing nonprofit. Luckily, it is 2018 and technology is advancing at an exponential rate so I had some options. Following is my story which is relevant for many reasons including that we virtually all develop eye problems over time and the state of the art available is constantly changing.
I finally couldnt read text at normal resolution on my 60 monitor which is about 4 feet from my face (and normally at 1600x900 resolution to make the text bigger) so it was time to go to the optician again. The optician considerably upgraded my prescription to 17.25 diopters on my left eye and 12.25 diopters on my right eye but warned me that this might not improve my vision much due to the beginning of cataracts in my eyes. So unlike in the past where I bought my glasses from outside the country due to restrictions on being able to purchase thin lenses in the U.S. that were implemented during the Nixon administration, I ordered glasses locally so I could speed up the process.
I was unable to see well with the new glasses so it was time to visit an ophthalmologist that my optician recommended. The ophthalmologist had the following assessment:
Dry Eye Syndrome of Bilateral Lacrimal Glands
Combined Forms of Age-related Cataract, Bilateral
Lattice Degeneration of Retina, Bilateral
Other Vitreous Opacities, Right Eye
Hemorrhage in Optic Nerve Sheath, Right Eye
There were parts of both eyes that should have retina but didnt because the eyes were so stretched. (This isnt affecting my vision.)
The lattice degeneration of the retina concerned my ophthalmologist so he then sent me to a retinologist where he expected the retinologist to operate on me before the ophthalmologist could operate. Luckily, the retinologist said he didnt need to operate on me so I went from needing 4 surgeries to needing 2 surgeries.
For those who dont know, cataract surgery replaces the broken biological lens of your eye with an artificial lens called an intraocular lens (IOL). This surgery usually uses a femtosecond laser.
Before my first surgery, the ophthalmologists assistants ran multiple tests on my eyes so they could determine what size lens would fit in them. This was tricky because my eyes are extra long (31 mm left and 30 mm right) and machines have a problem with eyes that long. A few days after my tests were done, the ophthalmologists office called me to say the doctor was unsatisfied...
Earlier this week, the Taiwanese manufacturer ASUS unveiled its first dedicated high-end gaming smartphone, the ROG (Republic of Gamers) smartphone, designed for gamers at the Computex 2018 in Taipei. With this smartphone, the company is looking to follow companies such as Razer and Xiaomi, both of whom have launched smartphones like Razer Phone and Black Shark respectively, especially for gamers.
Designed for mobile gaming, the ROG features a 6-inch full HD+ (1080 x 2160 pixels) and comes with an 18:9 aspect ratio. Its AMOLED display blends a 90Hz refresh rate and 1ms response time. The display on the ROG Phone is also certified for HDR and has the DCI-P3 color gamut. ASUS has added the worlds fastest 2.96GHz octa-core Qualcomm Snapdragon 845 SoC coupled with a Qualcomm Adreno 630 GPU to the device. Besides this, the ROG Phone comes with 8GB of RAM, and 512GB of onboard storage (with two other options of 128GB and 256GB of storage).
While the specifications do sound crazy, it has come to light that ASUS was apparently experimenting with a 10GB of RAM in an unnamed flagship smartphone about 10 months ago.
According to Twitter tipster Roland Quandt, ASUS had planned to include 10GB of RAM in an upcoming flagship, but it seems that the idea was dropped by the company due to size constraints in the phones body. RAM is usually placed on top of the processor but there was insufficient space to fit the necessary chips.
So once upon a time (a few months back) ASUS wanted to put 10GB RAM in a new flagship (ROG phone maybe?). But that didn't work out, bc of packaging issues (usually placed on top of the SoC, but no room to put the necessary modules in the little space available for a PoP design)
Roland Quandt (@rquandt) June 6, 2018
With ASUS already experimenting with the possibility of including 10GB of RAM in a smartphone, there are chances that the company may come up with such a device in the near future by finding a way through the obstacle.
We have already heard about smartphones having RAMs that are between 4GB 6GB, with one or two exceptions consisting 8GB of RAM. Do you think that we need smartphones with 1...
Neovim, the fork of Vim focused on offering better extensibility and usability, has issued their v0.3 release...
He says solid-state batteries will be cheaper than today's lithium-ion batteries and help move the grid to 100 percent renewables Photo: Ionic Materials
According to Silicon Valley visionary and Sun Microsystems co-founder Bill Joy, much about the future of energy and climate change hinges on a simple question: How soon can the worlds electric grid get its battery pack?
As a partner in the Menlo Park, Calif. venture capital company Kleiner Perkins Caufield and Byers from 2005 to 2014, Joy says he focused on what they called the big hard aggressive goals or BHAGs. And from climate to water desalination to electric grid stability, the real challenges of BHAGs often circled back to cheap, safe, scalable, and reliable grid-scale energy storage.
Last month, Joy was in Woburn, Mass. for the ribbon cutting of new facilities for a solid state battery company hes an advisor to and investor in, Ionic Materials. Ionic Materials has developed a plastic electrolytethe medium in a battery through which energy-storing ions flow between cathode and anode and back again. This specially designed plastic conducts ions like a metal conducts electrons. And switching from todays flammable liquid electrolytes to flame-retardant solid electrolytes, the company says, could bring about a new generation of lighter, more powerful, non-flammable rechargeable devices.
Joy sat down with IEEE Spectrum for a conversation about the promise of solid-state lithium (and rechargeable alkaline) batteries, the Internet of energy, and the coming electrification of airplanes.
IEEE Spectrum: As you have said, the English language doesnt have a single word for the kind of battery breakthrough thats neededa solid conductor of ions, a solid electrolyte.
Joy: Theres this evolution of language. Like we had telephone, and then we had the touch-tone phone. And then the phones that werent touch-tone suddenly were rotary phones. And then you called on cellphones. But now when you say phone you mean a mobile phone, and if you want to talk about the other phone you need to say landline....
Alessio Fattorini has announced the release of NethServer 7.5. The NethServer distribution is based on CentOS and provides a friendly, web-based administration panel. The project's latest release includes the Fail2Ban security software, the ability to set up wi-fi hotspots and more flexible control over software updates. "We have....
Flash-Friendly File-System (F2FS) maintainer Jaegeuk Kim has submitted the file-system updates intended for the Linux 4.18 kernel...
A decade ago, buying a custom-printed circuit board meant paying
a fortune and possibly even using a board houses
proprietary software to design the PCB. Now, we all have
powerful, independent tools to design circuit boards, and
there are a hundred factories in China that will take your Gerbers
and send you ten copies of your board for pennies per square inch.
We are living in a golden age of printed circuit boards, and they
come in a rainbow of colors. This raises the question: which color
soldermask is most popular, which is most desirable, and why? Seeed
Studio, a Chinese PCB house, recently ran a poll on the most
popular colors of soldermask. This was compared to their actual
sales data. Which PCB color is the most popular? It
depends on who you ask, and how you ask it.
But first, lets examine the rainbow of PCB options. Seeeds Fusion PCB service offers six different colors of soldermask for every PCB order: white, black, red, blue, green, or yellow. These are the colors youll find at most board houses, and remain constant with few exceptions; OSH Park only offers purple, but you can get purple from a few other manufacturers. There are rumors of orange soldermask. Matte black and matte green are generally the seventh and eighth colors available from any PCB manufacturer. Weve seen pink PCBs in the wild, as well....
June 11, 2018 is the day that the FCCs so-called Restoring Internet Freedom Order goes into effect. This represents the FCCs abdication of authority in upholding the hard-won net neutrality protections of the 2015 Open Internet Order. But this does not mean the fight is over.
While the FCC ignored the will of the vast majority of Americans and voted not to enforce bans on blocking, throttling, and paid prioritization, it doesnt get the final say. Congress, states, and the courts can all work to restore these protections. As we have seen, net neutrality needs and deserves as many strong protections as possible, be they state or federal. ISPs who control your access to the Internet shouldnt get to decide how you use it once you get online.
Three states (Oregon, Washington, and Vermont) have passed state net neutrality laws. Six more (Hawaii, Montana, New Jersey, New York, Rhode Island, and Vermont) have executive orders doing the same. Overall, 35 states have some form of net neutrality protections in the works.
Congress can overturn the FCCs decision and reinstate the 2015 Open Internet Order with a simple majority vote under the Congressional Review Act (CRA). It passed the Senate on May 16 by a vote of 52-47. So now we have to ask the House of Representatives to follow suit. Even though House leadership has said they will not schedule a vote, one can still be called if a majority of representatives sign a discharge petition.
You can see where your representative stands and email them to support the CRA here. Now that the FCC repeal is in effect, we need to tell the House to restore protections and keep large ISPs from changing how we use the Internet.
Science Alert has a story about a long running Lunar temperature measurement that apparently was lost and forgotten for decades.
Between 1971 and 1977, Apollo scientists conducting experiments on the Moon discovered that the surface of our li'l satellite buddy got mysteriously warmer. But the data from 1974 onwards went missing, and the strange warming phenomenon remained an enigma. The experiment was called the heat flow experiment, and it was designed to determine the rate at which the interior of the Moon loses heat.
Astronauts with Apollo 15 and 17 drilled holes into the lunar surface, up to depths of 2.3 metres, and probes measured the temperature at several depths in the holes.
These were long-term experiments, left in place after the astronauts departed, and transmitting data back to Earth.
The measurements revealed that the temperature of the moon at
all measured depths got warmer from the date the experiment started
in 1971 all the way till measurements ended in 1977.
That's a relatively short period of time on a planetary time frame. A rate of warming that rapid would have the moon surface incandescent well before we were began squabbling over who got to live in the best caves.
Various theories were put forth, but in the end people pretty much agreed it must be our fault.
Read more of this story at SoylentNews.
We now have less than 20 years to wait until the time_t value used on 32-bit systems will overflow and create time-related mayhem across the planet. The grand plan for solving this problem was posted over three years ago now; progress since then has seemed slow. But quite a bit of work has happened deep inside the kernel and, in 4.18, some of the first work that will be visible to user space has been merged. The year-2038 problem is not yet solved, but things are moving in that direction.
The growth at the end of 2017 continued for the worldwide server market in the first quarter of 2018 as worldwide server revenue increased 33.4 percent and shipments grew 17.3 percent year over year, according to Gartner. Worldwide: Server Vendor Revenue Estimates, 1Q18 The server market was driven by increases in spending by hyperscale as well as enterprise and midsize data centers. Enterprises and midsize businesses are in the process of investing in their on-premises More
Despite all our technological achievements, humans still spend a lot of time waiting around for trains. Add a stiff winter breeze to the injury of commuting, and youve got a classic recipe for misery. [George Barratt-Jones] decided to inject some warmth into this scene by inviting people to knit a free scarf for themselves by riding a bike.
All a person has to do is ride the Cyclo-Knitter for five minutes and marvel at their handiwork. By the time the scarf is finished, theyve cycled past being cold, and they have something to hold in the warmth. Cyclo-Knitter is essentially an Addi Express knitting machine being belt-driven by a stationary bike. Power is transferred from the bike through large, handmade wooden gears using old bike tire inner tubes as belts. [George] built a wooden tower to hold the machine and give the growing scarf a protected space to dangle.
We love the utility of this project as much as the joy it inspires in everyone who tries it. Check out their scarves and their reactions after the break. We havent seen people this happy to see something they werent expecting since that billboard that kills Zika mosquitoes.
We need more walkable cities and fewer cars! If aliens came to our planet they would conclude that cars are the dominant species!
Traffic signals give priority to motor vehicles over pedestrians. This inequality undermines many of the stated goals of transport, health and environment policy.
State and city governments say they want to encourage walking and biking for many reasons:
FDA-approved asthma drug appears to be effective against dementia in mice.
For the first time in an animal model, researchers at the Lewis Katz School of Medicine at Temple University showed that the tau pathology that accompanies Alzheimers disease can be reversed using the asthma drug zileuton .
[janrinok:] We covered a story a few months ago regarding a watch that also contained a projector which could be used to show an enlarged image on any nearby surface, including the hand that is wearing the watch. Well somebody decided to look a little more closely at making his own small projector - although not quite to the same degree of miniaturisation.
Who doesnt want a pocket projector? Nothing will impress a date more than being able to whip out a PowerPoint presentation of your latest trip to the comic book convention. The key to [MickMake] build is the $100 DLP2000EVM evaluation module from Texas Instruments. This is an inexpensive light engine, and perfect for rolling your own projector. You can see the result in the video below.
If you dont need compactness, you could drive the module with any Rasberry Pi or even a regular computer. But to get that pocket form factor, a Pi Zero W fits the bill. A custom PCB from [MickMake] lets the board fit in with the DLP module in a very small form factor. DLP chips use lots of microscopic mirrors that you can move roughly 20 degrees under computer control. So you can reflect light into the lens or bounce it away so it makes the image black. For color, an RGB LED cycles through the primary colors and you have to time your mirror movements to the color you want to project. Of course, the module takes care of all this for you behind the scenes.
The module can output up to 30 lumens (by default, though, it is 20 lumens) and has I2C and 8/16/24-bit parallel RGB video interfaces. If you dont want to go with a custom board, the device supports the BeagleBone Black right out of the box. The DLP resolution is nHD. That is the mirror array is 640360. While you might think the n stands for not, it actually stands for ninth, as in one-ninth. The current release of the adapter board lacks an audio amplifier, although that may change in a future release. For now, you can play audio from the Pi via Bluetooth.
Read more of this story at SoylentNews.
Scientists from Universidad Carlos III de Madrid (UC3M) have designed a new control system for wind turbines in offshore wind farms that allows power transmission to the coast in a more flexible and cheaper way than current solutions.
This innovation allows the use of a diode rectifier station in the offshore platform of a high voltage direct current (HVDC) link. In this way, the wind turbines alternating current (AC) can be easily converted into direct current (DC) for HVDC transmission.
The researchers have developed a distributed control system to synchronise and regulate the electrical voltage and frequency of the wind turbines of the offshore wind farm. This allows the transmission of energy to the general network through an HVDC link with a diode rectifier station. It is less complicated, cheaper and more flexible than other current solutions, explains co-author Santiago Arnaltes Gmez, head of the UC3M Power Control Group.
Last October, a University of California, Berkeley, team headed down to the Arizona desert, plopped their newest prototype water harvester into the backyard of a tract home and started sucking water out of the air without any power other than sunlight.
The successful field test of their larger, next-generation harvester proved what the team had predicted earlier in 2017: that the water harvester can extract drinkable water every day/night cycle at very low humidity and at low cost, making it ideal for people living in arid, water-starved areas of the world.
There is nothing like this, said Omar Yaghi, who invented the technology underlying the harvester. It operates at ambient temperature with ambient sunlight, and with no additional energy input you can collect water in the desert. This laboratory-to-desert journey allowed us to really turn water harvesting from an interesting phenomenon into a science.
Security updates have been issued by Arch Linux (chromium, firefox, flashplugin, krb5, and p7zip), Debian (firefox-esr, gnupg, gnupg1, gnupg2, libvncserver, and openjdk-7), Fedora (batik, qt3, remctl, and slurm), openSUSE (curl, glibc, ImageMagick, kernel-firmware, libvirt, libvorbis, MozillaFirefox, mozilla-nss, mupdf, prosody, qemu, slf4j, and xen), Red Hat (chromium-browser, flash-plugin, and Red Hat Virtualization), Slackware (gnupg2), and SUSE (libvirt, mailman, and xen).
Even though sports streaming services are widely available in most countries, people are not always willing to pay for them.
This applies to individuals, who turn to pirate sites or other unauthorized channels, but also to businesses such as bars and restaurants.
The latter group is seen as a thorn in the side by many rightsholders. This includes the Spanish soccer league La Liga, which broadcasts some of the most viewed matches in the world.
In an effort to curb this type of piracy, La Liga has recently started to use modern technology, and its users, to its advantage. In an unprecedented move, the soccer league has turned its official Android app into a piracy spying machine.
The app in question, which has been installed by millions of users, will use the microphone and GPS readings of the devices its installed on to report possible instances of streaming piracy.
With consent from the user, the app will analyze the audio in its surroundings to check if one of La Ligas matches is being played. It then pairs that with GPS data to see if that location is an authorized broadcaster.
Protect your team, users read when they are prompted to enable this type of data collection.
The purposes for which this functionality will be used are: (i) to develop statistical patterns on soccer consumption and (ii) to detect fraudulent operations of the retransmissions of LaLiga football matches (piracy).
The microphone will only be activated when La Liga is broadcasting its football matches, the policy further clarifies.
The spying tool was spotted by Eldiario.es, which reached out to La Liga for additional information.
The Spanish soccer league informed the publication that nobody accesses the audio fragments captured by the microphone as the audio automatically becomes a signal, a binary code. This happens only in Spain and without storing any recording or content.
Ajit Pai, the Republican chairman of the Federal Communications Commission (FCC), is promising that consumers will be protected as his repeal of the 2015 net neutrality rules goes into effect Monday.In an op-ed for CNET on Monday, Pai wrote that the...
Web site names ending in new top-level domains (TLDs) like .men, .work and .click are some of the riskiest and spammy-est on the Internet, according to experts who track such concentrations of badness online. Not that there still arent a whole mess of nasty .com, .net and .biz domains out there, but relative to their size (i.e. overall number of domains) these newer TLDs are far dicier to visit than most online destinations.
There are many sources for measuring domain reputation online, but one of the newest is The 10 Most Abused Top Level Domains list, run by Spamhaus.org. Currently at the #1 spot on the list (the worst) is .men: Spamhaus says of the 65,570 domains it has seen registered in the .men TLD, more than half (55 percent) were bad.
According to Spamhaus, a TLD may be bad because it is tied to spam or malware dissemination (or both). More specifically, the badness of a given TLD may be assigned in two ways:
The ratio of bad to good domains may be higher than average, indicating that the registry could do a better job of enforcing policies and shunning abusers. Or, some TLDs with a high fraction of bad domains may be quite small, and their total number of bad domains could be relatively limited with respect to other, bigger TLDs. Their total badness to the Internet is limited by their small total size.
More than 1,500 TLDs exist today, but hundreds of them were introduced in just the past few years. The nonprofit organization that runs the domain name space the Internet Corporation for Assigned Names and Numbers (ICANN) enabled the new TLDs in response to requests from advertisers and domain speculators even though security experts warned that an onslaught of new, far cheaper TLDs would be a boon mainly to spammers and scammers.
And what a boon it has been. The newer TLDs are popular among spammers and scammers alike because domains in many of these TLDs can be had for pennies apiece. But not all of the TLDs on Spamhaus list are prized for being cheaper than generic TLDs (like .com, .net, etc.). The cheapest domains at half of Spamhaus top ten baddest TLDs go for prices between $6 and $14.50 per domain.
Still, domains in the remaining five Top Bad TLDs can be had for between 48 cents and a dollar each.
Security firm Symantec...
Its no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are very high that threats have already penetrated their defenses and are lurking in their network. Pinpointing such threats quickly is essential, but traditional approaches to finding these needles in the haystack often fall short. Now there is a unique
It's like Debian Linux, but without systemd.
Release notes are at https://devuan.org/os/debian-fork/ascii-stable-announce-060818.
Previously: Devuan ASCII Sprint -- 15-17 Dec. 2017
Read more of this story at SoylentNews.
China no longer owns the fastest supercomputer in the world; It is the United States now. Though China still has more supercomputers on the Top 500 list, the USA takes the crown of "world's fastest supercomputer" from China after IBM and the U.S. Department of Energy's Oak Ridge National Laboratory (ORNL) unveiled "Summit." Summit is claimed to be more than twice as powerful as the current
In 1940, England was in a dangerous predicament. The Nazi war machine had been sweeping across Europe for almost two years, claiming countries in a crescent from Norway to France and cutting off the island from the Continent. The Battle of Britain was raging in the skies above the English Channel and southern coast of the country, while the Blitz ravaged London with a nightly rain of bombs and terror. The entire country was mobilized, prepared for Hitlers inevitable invasion force to sweep across the Channel and claim another victim.
Weve seen before that no idea that could possibly help turn the tide was considered too risky or too wild to take a chance on. Indeed, many of the ideas that sprang from the fertile and desperate minds of British inventors went on to influence the course of the war in ways they could never have been predicted. But there was one invention that not only influenced the war but has a solid claim on being its key invention, one without which the outcome of the war almost certainly would have been far worse, and one that would become a critical technology of the post-war era that would lead directly to innovations in communications, material science, and beyond. And the risks taken to develop this idea, the cavity magnetron, and field usable systems based on it are breathtaking in their scope and audacity. Heres how the magnetron went to war.
For most of the early days of radio, most of the innovation was geared toward providing communication at a distance. Whether it be radiotelegraphy, radiotelephony, or even radio broadcasting, distance was the driver. The further a single transmitter could reach, the fewer links would be required to make a communicate between any two points, and the larger the audience that could be reached with a broadcast. Due to the physics of radio frequency propagation, this put all the action in the longer wavelengths, the space on the spectrum with wavelengths between about 10 meters and 100 meters or so.
Some researchers were looking further up the spectrum, where wavelengths better measured in centimeters are found. These frequencies wouldnt be of much use for long-haul communications or broadcasting, but they needed to be explored and exploited, and so the tools and technologies needed to produce them would have to be developed.
This month marks one year since AMD returned to delivering high-performance server CPUs with the debut of their EPYC 7000 series processor line-up. It's been a triumphant period for AMD with the successes over the past year of their EPYC family. Over the past year, the Linux support has continued to improve with several EPYC/Zen CPU optimizations, ongoing Zen compiler tuning, CPU temperature monitoring support within the k10temp driver, and general improvements to the Linux kernel that have also helped out EPYC. In this article is a comparison of a "2017" Linux software stack as was common last year to the performance now possible if using the bleeding-edge software components. These Linux benchmarks were done with the EPYC 7351P, 7401P, and 7601 processors.
Good news! Automation capable of erasing white collar jobs is coming, but not for a decade or more. And thats also the bad news because interest in automation accelerates during economic downturns, so once tech that can take your job arrives youll already have lived through another period of economic turmoil that may already have cost you your job.
That lovely scenario was advanced yesterday by professor Mirko Draca of The London School of Economics, who yesterday told Huaweis 2018 Asia-Pacific Innovation Day 2018 that the world is currently in an era of investment and experimentation with technology. The effects of such eras, he said, generally emerge ten to fifteen years in the future.
Innovation in the 1980s therefore sparked the PC and internet booms of the mid-to-late 1990s, and were still surfing [SIC - suffering?] the changes they unleashed. Our current era of mobile tech doesnt measure up to the radical 1990s, he said, as shown by the fact that productivity gains appear to have stalled for a decade or more.
[...] We predict that AI and robotics will lead to some sort of productivity surge in ten to fifteen years, he said, adding that there is no clear evidence that a new wave of technologies that threaten jobs has started.
But he also said that it will once businesses see the need to control costs.
Read more of this story at SoylentNews.
Hooray for Juno!
Though NASAs Juno spacecraft has probed Jupiters secrets for nearly two years, the $1 billion mission was set to crash into the planets clouds in July. Now, however, the agency has confirmed Business Insiders previous report that Juno will get three additional years of flight.
Posted by Security Explorations on Jun 11Hello All,
Cybercriminals have raked over 20 million dollars in the past few months by hijacking poorly configured Ethereum nodes exposed online are continuing their operations.
In March, security experts from Qihoo 360 Netlab reported a hacking campaign aimed at Ethereum nodes exposed online, crooks were scanning for port 8545 to find wallets that exposed their JSON-RPC.
According to the researchers, the cybercrime gang stole 3.96234 Ether (between $2,000 and $3,000)., but currently, they have tracked another criminal gang that already stolen an amazing amount of funds that are available in their wallets.
Researchers claim the cybercriminal group has managed to steal a total of 38,642 Ether, worth more than $20,500,000.
Remember this old twitter we posted? Guess how much these guys have in their wallets? Check out this wallet address https://t.co/t4qB17r97J $20,526,348.76, yes, you read it right, more then 20 Million US dollars https://t.co/SXHrdTcb6e
360 Netlab (@360Netlab) June 11, 2018
If you have honeypot running on port 8545, you should be able to see the requests in the payload, which has the wallet addresses, states Qihoo 360 Netlab team. And there are quite a few IPs scanning heavily on this port now.
Geth is a popular client for running Ethereum node allowing users to manage them remotely through the JSON-RPC interface.
Developers can use this programmatic API to build applications that can retrieve private keys, transfer funds, or retrieve personal details of the owner of the wallet.
One of the most commonly asked questions we receive is How is progress going in aging research? It is something we are asked so often that we decided to provide the community with a resource that will help them to keep track of progress directly.
To that end, today we have launched our new curated database, The Rejuvenation Roadmap, which will be tracking the progress of the many therapies and projects in the rejuvenation biotechnology field. This database aims to give a quick visual summary of the status of each drug or therapy along with some additional information for people interested in learning more about them.
We believe that an informed community is an effective one, and this was one of our motivations for developing this new database. There are many resources for scientists, such as the superb databases of the Human Ageing Genomic Resources maintained by Dr. Joo Pedro de Magalhes, which are excellent for researchers. However, we noticed that there was no database that tracked the efforts of the many researchers and projects in the field, and while some people do maintain lists, they are often not public facing, easy to access, or user-friendly.
As the Internet of Things has grown in scale, IoT developers are increasingly expected to support a range of hardware resources, operating systems, and software tools/applications. This is a challenge given many connected devices are size-constrained. Virtualization can help meet these broad needs, but existing options dont offer the right mix of size, flexibility, and functionality for IoT development.
The Russian capital wants to use 5G to file traffic reports, remotely park cars, and stream soccer matches Photo: Dmitry Serebryakov/TASS/Getty Images
When the national football teams of Morocco and Iran take the field at Krestovsky Stadium in Saint Petersburg during the 2018 FIFA World Cup on 15 June, more than 60,000 fans will be there to cheer them on. And, courtesy of more than a dozen specially installed high-definition cameras, residents of Moscow, about 600 kilometers away, will watch the game over a high-speed 5G connection.
The capital of Russia will have what Evgeniy Novikov, an advisor for the Deputy Minister of Communications of Moscow, calls a 5G zone, an area where viewers can don VR glasses and switch between camera views to watch the game in real time.
Like previous bombastic 5G demonstrations, including Verizons livestream of the Super Bowl in Minneapolis last February, and multiple virtual reality demonstrations by South Korean telecom companies during the Winter Olympics in Pyeongchang, Moscows stunt will showcase the unparalleled video streaming capabilities of the next wireless generation.
But for Moscow, the World Cup demonstrations are just the first in a series of ambitious 5G tests and rollouts. The citys government is confident in the capabilities offered by 5G, though carriers, standards groups, and federal agencies are still sorting out how exactly the technology will work.
Its not yet entirely clear which frequencies 5G will operate at within the country. We dont have any legal frequency for 5G, says Novikov. The government is currently researching which frequencies it should make available. Two likely candidates are 3.5 and 28 gigahertz, since companies are currently leasing those bands for temporary demonstrations. For example,......
Posted by Moritz Muehlenhoff on Jun 11-------------------------------------------------------------------------
Former GCHQ chief Robert Hannigan has warned that the availability of hacking tools in the main marketplaces is rapidly changing the threat landscape. Hannigan served as the director of the UK intelligence agency between November 2014 until January 2017.
Threat actors have an easy access to attack tools even without having specific knowledge.
Hannigan spoke had a keynote speech titled Weaponising the web: Nation-state hacking and what it means for enterprise cybersecurity at the Infosec conference in London last week.
Hannigan highlighted the risks associated with the operation conducted by nation-state actors that had dramatically increased over the last five years.
State-sponsored hackers pose a serious risk for enterprises as well as governments, the former GCHQ chief warned of Government APT group using crime gangs as a proxy machine hard the attribution.
Nation state attacks using criminal group as a proxy is a fairly new issue. Hacking tools are becoming a commodity for threat actors and represent problem companies.
North Korean APT groups, like the infamous Lazarus APT crew, focused its activity on SWIFT network as well as crypto exchanges to steal funds.
This is a rational state pursuing rational objectives, explained Hannigan.
Hannigan warned of the intensification of the Iranian hackers that also targeted financial institutions.
Which is the greatest threat?
Russia, of course! Russia-linked APT groups are very sophistication and continuously target infrastructure worldwide. in some cases they demonstrated destructive abilities, like the attacks against the Ukrainian power grid.
Posted by Moritz Muehlenhoff on Jun 11-------------------------------------------------------------------------
Posted by Slackware Security Team on Jun 11[slackware-security] gnupg2 (SSA:2018-159-01)
Posted by Salvatore Bonaccorso on Jun 11-------------------------------------------------------------------------
Facebook has launched its own video game streaming hub. Facebook.gg, which launched on Thursday, will compete directly with popular platforms like Twitch and Mixer.
It's part of the social media site's continued efforts to become a destination for video content. The new service suggests streams based on who individual users follow, and highlights content chosen by Facebook.
Instagram is gunning for YouTube with a plan to allow longer-form video, according to the owner of an influencer network whose clients have talked with the Facebook-owned company, as well as numerous media reports.
Allowing long video could help Instagram court social media stars and their millions of fans to use its platform as their primary online home, instead of relying on YouTube, where many have fewer followers. And when the users move, so will the marketers, meaning Facebook stands to gain advertising revenue at Google-owned YouTube's expense.
[...] The news of the Facebook-owned platform embracing longer videos was first reported by The Wall Street Journal, which said Instagram would soon allow users to upload videos up to 60 minutes to their profiles. TechCrunch added on Thursday that Instagram was talking to social media influencers and publishers to create shows for an upcoming section for dedicated-to-video content, similar to Snapchat Discover.
Read more of this story at SoylentNews.
Posted by Moritz Muehlenhoff on Jun 11-------------------------------------------------------------------------
Posted by Salvatore Bonaccorso on Jun 11-------------------------------------------------------------------------
Posted by ch . sangsakul on Jun 11
In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses third-party risk and how it affects the GDPR compliance of your organization. Heres a transcript of the podcast for your convenience. Hello. My name is Darron Gibbard, and I am the Chief Technical Security Officer at Qualys. In this Help Net Security session today, I am going to be covering third-party risk how does this affect your GDPR compliance? One are More
The MIPS P6600 processor was announced in 2015 as one of the Warrior Processors based upon MIPS64 Release 6. The P6600 is based on a 28nm process, clock speeds up to 2.0GHz, and is the fastest performing of the MIPS Warrior cores. Only now has MIPS posted an enablement patch for the MIPS P6600 with GCC...
Posted by Salvatore Bonaccorso on Jun 11-------------------------------------------------------------------------
Posted by yavuz atlas on Jun 11I. VULNERABILITY
There is a simple reason for developers adopting the cloud and cloud-native application architectures. These tools and methods allow developers to accelerate innovation and feature delivery in the service of meeting business demands and keeping their enterprise competitive. While these tools and methods make noticeable improvements for DevOps teams, their new operational model creates security concerns and headaches for security practitioners. DevOps methods disaggregate the neatly packaged n-tier, VM-bound application into distributed architectures. The cloud More
The post Securing microservices and containers: A DevOps how-to guide appeared first on Help Net Security.
An IT security researcher has discovered a critical vulnerability in OnePlus
This is a post from HackRead.com Read the original post: Bootloader vulnerability in OnePlus 6 lets an attacker take control of the device
I have been on the road for a few weeks now and surprisingly the topic of discussion has predominantly been patch management. Why is patch such a prevalent topic? Patching responsibility As we near Patch Tuesday this month I wanted to share a few thoughts and observations with you all from my recent travels. Recently I attended RiskSec in New York, and last week I was at Infosecurity Europe. At RiskSec I had the pleasure More
The post Patch management is not just ITs responsibility, get your whole team on board appeared first on Help Net Security.
There was a time when a two-legged walking robot was the thing to make. But after seeing years of Boston Dynamics amazing four-legged ones, more DIYers are switching to quadrupeds. Now we can add master DIY robot builder [James Bruton] to the list with his openDog project. Whats exciting here is that with [James] extensive robot-building background, this is more like starting the challenge from the middle rather than the beginning and we should see exciting results sooner rather than later.James motor and ball screws
Thus far [James] has gone through the planning stage, having iterated through a few versions using Fusion 360, and hes now purchased the parts. Its going to be about the same size as Boston Robotics SpotMini and uses three motors for each leg. He considered going with planetary gearboxes on the motors but experienced a certain amount of play, or backlash, with them in his BB-9E project so this time hes going with...
Crowdfunding site Indiegogo has called time on a high-profile British project to create a retro handheld console.
[...] "Indiegogo asked for proof that we are ready to ship the product and requested that we send them a unit to their San Francisco office," added Dr David Levy, RCL's chairman
"We responded yesterday saying that we would sooner give a demonstration of a unit to their UK representative, and asking Indiegogo to request that he contact us to fix an appointment. Their reaction was this latest statement."
[...] The Vega+ campaign raised a total of 512,790 from more than 4,700 people on Indiegogo before the US firm blocked it from accepting more funds in March 2017.
[...] RCL has missed multiple deadlines over the past two years and given a variety of reasons for doing so, ranging from problems with the buttons of the Vega+ to disputes with former company directors - the details of which are contested.
The company had originally pledged to deliver the console in the summer of 2016.
Read more of this story at SoylentNews.
Highlights include the
unveil(), hinted at by Bob Beck
(beck@) in his p2k18
report, and "Speculating
about Intel", by Theo de Raadt (deraadt@). [An
unofficial video of the latter presentation is available.]
At the time of writing, official video recordings are not yet available.
Security researchers have been warning about cybercriminals who have made over 20 million dollars in just past few months by hijacking insecurely configured Ethereum nodes exposed on the Internet. Qihoo 360 Netlab in March tweeted about a group of cybercriminals who were scanning the Internet for port 8545 to find insecure geth clients running Ethereum nodes and, at that time, stole 3.96234
Digital twins are virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed. They are also changing how technologies such as IoT, AI and analytics are optimized.
Digital twin technology has moved beyond manufacturing and into the merging worlds of the Internet of Things, artificial intelligence and data analytics.
Kicking off a new week is the Vulkan 1.1.77 specification update...
In June 2018, the Cybercrime Bureau of the Estonian Central Criminal Police contacted HIBP and asked for assistance in making a data set of 655k email addresses searchable. The Estonian police suspected the email addresses and passwords they obtained were being used to access mailboxes, cryptocurrency exchanges, cloud service accounts and other similar online assets. They've requested that individuals who find themselves in the data set and also identify that cryptocurrency has been stolen contact them at email@example.com.
It just depends on what the patents cover, e.g. chemistry in this case
Summary: Damages (or so-called harm) from patent infringement, as demonstrated in the US earlier this month, still an overrated concept which leads to overinflated compensation for infringement; the patent microcosms claims that US courts have become anti-patent are laughable at best
Disproportionate sizes in litigation have long been an issue.Docket Navigators Docket Report about a BASF (German giant) case speaks of a discredited expert report. As Docket Navigator summarised it (along with some excerpts from the original): The court granted plaintiffs motion to strike report of defendants contract expert regarding whether defendant sold anticipating prior art before the critical date because the testimony was unhelpful.
Its so concise that its confusing (what actually happened there). But whats noteworthy here is that a relatively small defender (its workforce size is less than a tenth of BASFs) is being sort of denied the right to/of a defense. Disproportionate sizes in litigation have long been an issue.
Its almost as though law is being composed for the purpose of deterrence/retaliation rather than justice.Another new Docket Report (regarding Sabinsa Corporation v Olive Lifesciences Pvt. Ltd., a herbal products manufacturer in Bengaluru, India) shows what happens when patents not only cause major fines but also treble the ‘...
Society is vulnerable, so we need to prepare ourselves as individuals, said Dan Eliasson of the Swedish civil contingencies agency, which is in charge of the project. Theres also an information deficit in terms of concrete advice, which we aim to provide.
Defence pamphlet shows how population can prepare in event of attack and contribute to countrys total defence
Jon Henley European affairs correspondent.
Unauthorized IPTV services that provide competition to traditional broadcasters and VOD providers are a huge thorn in the side of mainstream entertainment industry companies.
As a result, the Alliance for Creativity and Entertainment (ACE), an anti-piracy partnership forged between Hollywood studios, Netflix, Amazon, and more than two dozen other companies, is now fighting on the front line, attempting to bring these competitors down.
Earlier this year, ACE members launched similar action against Florida-based Set Broadcast, LLC, the company behind the popular IPTV service SET TV. The complaint, filed at a California federal court in April, claimed that Set TV was nothing but a piracy tool which offered copyright-infringing streams to a large number of subscribers.
Despite the threats and a lawsuit, Set TV has continued to provide service to thousands of customers who access media via set-top boxes, laptops, tablets, phones and various other hardware devices. Just before the weekend, however, trouble appeared on the horizon.
A message published on Set TVs homepage indicated that the platform might be facing difficulties.
Given that Set TV is under intense pressure from ACE, many observers and some media reports put two and two together, concluding that Set TV had probably buckled under the pressure and thrown in the towel.
While that might still transpire at a later date, no official messages appeared on Set TVs social media accounts to confirm or deny. So, to learn more, TorrentFreak contacted Set TV who emailed back a short message Sunday.
We apologize for this inconvenience. We are working on getting our system back online, the company said in response.
A call to the companys support line was met with a similar message.
This morning Set TVs service still appears to be down and no updates are available detai...
A combination of the drugs mifepristone and misoprostol can help bring closure to some women and their families suffering from miscarriage, and reduces the need for surgical intervention to complete the painful miscarriage process. Results of a new clinical trial led by researchers at the Perelman School of Medicine at the University of Pennsylvania, show that while the standard drug regimen using misoprostol on its own frequently fails to complete the miscarriage, a combination of misoprostol and the drug mifepristone works much more reliably. The report is published today in the New England Journal of Medicine.
Each year in the United States alone approximately 1 million women have miscarriages. When the body does not expel the pregnancy tissue on its own -- the final part of a miscarriage -- women need to undergo a surgical procedure or take the drug misoprostol. Though often preferable for its convenience and privacy -- patients can take it in the comfort of their own homes -- misoprostol does not always work, and many women who use misoprostol are still left with no option but to undergo an invasive procedure they wished to avoid, prolonging an already physically and emotionally difficult situation.
"Though rarely discussed openly, miscarriage is the most common complication of pregnancy, and the public health burden is both physical and psychological. For too many women, misoprostol alone just leads to frustration. I have seen my patients suffer from the insult of the treatment failure added to the injury of the initial loss," said study lead author Courtney A. Schreiber, MD, MPH, chief of the division of Family Planning and an associate professor of Obstetrics and Gynecology at the Perelman School of Medicine at the University of Pennsylvania. "As physicians, we have to do better for these patients, and our new study shows that by combining mifepristone with misoprostol, we can."
Read more of this story at SoylentNews.
Without even shedding a tear over what theyve done (a betrayal to Native American values)
Summary: For over $20,000,000 (so far) the Saint Regis Mohawk Tribe has agreed to pretend that it has something to do with controversial patents of Allergan, in effect grossly abusing the concept of tribal immunity while at the same time enabling privatisation of nature
THIS SITE typically focuses on software patents and Alice. But a few other high-level decisions, notably Mayo, impact patent scope as well. There are many bogus USPTO patents which are well overdue for a review by the Patent Trial and Appeal Board (PTAB) and maybe the Federal Circuit as well. That includes patents of Allergan, which is visibly afraid of PTAB, knowing perhaps that its patents are questionable and would likely be voided upon closer scrutiny.
Allergan hired some dodgy law firm that bullies bloggers like myselfPatently-Os Dennis Crouch has in fact just given the platform to these patent scammers who misuse tribal immunity to cushion/shield monopoly of Allergan (based on bogus patents). Michael Gulliford, an advisor to the Saint Regis Mohawk Tribe and the Founder of Soryn IP Group, uses terms like controversial and death squad to refer to PTAB. He compares judges and courts to assassins basically. What a lunatic.
He admits upfront that the tribe takes $13.75 million upfront, with continuing royalty payments of $3.75 million per quarter to participate in a scam of Allergan. This is pure greed...
Have you recently bought a OnePlus 6? Don't leave your phone unattended. A serious vulnerability has been discovered in the OnePlus 6 bootloader that makes it possible for someone to boot arbitrary or modified images to take full admin control of your phoneeven if the bootloader is locked. A bootloader is part of the phone's built-in firmware and locking it down stops users from replacing
This week we have two newcomers in our chart.
Tomb Raider is the most downloaded movie.
The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.
RSS feed for the weekly movie download chart.
|Movie Rank||Rank last week||Movie name||IMDb Rating / Trailer|
|Most downloaded movies via torrents|
|1||(1)||Tomb Raider||6.6 / trailer|
|2||(7)||Pacific Rim: Uprising||5.8 / trailer|
|3||(2)||Avengers: Infinity War (HDCam)||9.1 / trailer|
|4||(5)||Love, Simon||8.0 /...|
When [Im-pro] wants a display, he wants it to spin. So he built a persistence of vision (POV) display capable of showing a 12-bit color image of 131 x 131 pixels at 16 frames per second. You can see a video about the project below, but dont worry, you can view it on your normal monitor.
The project starts with a Java-based screen capture on a PC. Data goes to the display wirelessly to an ESP8266. However, the actual display drive is done by an FPGA that drives the motor, reads a hall effect index sensor, and lights the LEDs.
Perhaps the most interesting part of the project is the FPGA-based mapping of the rectangular coordinates of the incoming video to the polar coordinates required by the display. There are 4 arms of LEDs or wings and a 3D printed structure that is all included in the post.
The FPGA is a Cmod S6 which is a breakout board for a Xilinx Spartan 6 with more than enough horsepower to handle the workload. There are also custom PCBs involved, so when you think about it, it is a fairly wide-ranging project. Java software, ESP8266 software, FPGA configurations, a 3D-printed design, and PCB layouts. If you want something simple to tackle that has a bit of everything in it, this might be your next project.
Submitted via IRC for Fnord666
The National Science Foundation (NSF) is announcing a $1.8 million grant for the initial development of a data storage network over the next two years. A collaborative team will combine their expertise, facilities and research challenges to develop the Open Storage Network (OSN). OSN will enable academic researchers across the nation to work with and share their data more efficiently than ever before.
[...] NSF's investment in OSN builds on a seed grant by Schmidt Futures a philanthropic initiative founded by former Google Chairman Eric Schmidt to enable the data transfer systems for the new network. These systems are designed to be low-cost, high-throughput, large-capacity, and capable of matching the speed of a 100-gigabit network connection with only a small number of nodes. This configuration will help to ensure that OSN can eventually be deployed in many universities across the U.S. to leverage prior investments and establish sustainable management for the overall storage network.
Read more of this story at SoylentNews.
Combining the unique strengths of lithium batteries with crazy-fast charging, carbon ultra-capacitors could save a ton of weight and add significant range and power to electric vehicles, according to Nawa Technologies. Based outside Marseilles, this fascinating French startup is working on a new type of battery it believes could offer some huge advantages in the EV space, among many others.
A transition is happening in the satellite business. Fast-moving technology and evolving customer demands are driving operators to rethink major investments in new satellites and consider other options such as squeezing a few more years of service out of their current platforms.
Which makes this an opportune moment for the arrival of in-orbit servicing.
Sometime in early 2019, the first commercial servicing spacecraft is scheduled to launch. The Mission Extension Vehicle built by Orbital ATK on behalf of subsidiary SpaceLogistics, will the first of several such robotic craft that are poised to compete for a share of about $3 billion worth of in-orbit services that satellite operators and government agencies are projected to buy over the coming decade.
Yes he did and the summit starts in a couple of days. I also observe three NK generals were also summarily dismissed. Perhaps they pushed bad advice?
Thus it may well be possible to settle all this. Those were the last kicks from the old guard. In the meantime, by now they have hundreds of pages of agreements printed out ready for signing and we will see a road map ten years long that will create an united Korea.
At the same time, Rudy has commented that Muellar and team are attempting to frame Trump. I do not think that they are really trying to do this but i do think that this is a deliberate ploy to introduce the framing meme into the public conversation.
Evidence to date has established that the Obama Whitehouse did operate a criminal entrapment scheme against Trump during and after the election and this is about to become a big thing with the IG report.
Also we are now at 35,000 sealed indictments and we just lost Anthony Boudain and Kate Slade to suicide this week. It does not make you feel good knowing all this.
In 1965, a renowned Princeton University physicist theorized that ferroelectric metals could conduct electricity despite not existing in nature.
For decades, scientists thought it would be impossible to prove the theory by Philip W. Anderson, who shared the 1977 Nobel Prize in physics. It was like trying to blend fire and water, but a Rutgers-led international team of scientists has verified the theory and their findings are published online in Nature Communications.
Its exciting, said Jak Chakhalian, a team leader of the study and Professor Claud Lovelace Endowed Chair in Experimental Physics at Rutgers University-New Brunswick. We created a new class of two-dimensional artificial materials with ferroelectric-like properties at room temperature that dont exist in nature yet can conduct electricity. Its an important link between a theory and an experiment.
The hack has happened during the weekend, on Sunday Coinrail announced the cyberheist. Attackers stole over $40M worth of ICO tokens that were maintained in the servers of the exchange.
The company published a data breach notification on its website that currently appears in maintenance mode.
. (,NPXS) . / There has been an cyber intrusion in our system. We're confirming it and some coins(Pundi X, NPXS) are confirmed.
coinrail (@Coinrail_Korea) June 10, 2018
The exchange explained that attackers stole tokens issued during the initial coin offerings (ICOs) of Pundi X (NPXS), NPER (NPER), and Aston (ATX).
Thats according to a wallet address that has been identified as belonging to the alleged attacker, who also got hold of smaller volumes of a further five tokens from Coinrail.
South Korea is one of the countries with the highest cryptocurrency trading activity, but Coinrail is one of its smaller exchanges operating over there.
According to coinmarketcap.com, the South Korean exchange ranks in worlds top 90 based on trading volume.
After the discovery of the hack, Coinrail immediately put offline its wallets to secure its cryptocurrency assets, it is currently working with the affected ICO companies to freeze the stolen funds.
Powerful Earth-observing instruments aboard NASAs Terra and Aqua satellites, launched in 1999 and 2002, respectively, have observed nearly two decades of planetary change. Now, for the first time, all that imagery from the first operational image to imagery acquired today is available for exploration in Worldview.
ComputexNVIDIA today announced the availability of NVIDIA Isaac, a new platform to power the next generation of autonomous machines, bringing artificial intelligence capabilities to robots for manufacturing, logistics, agriculture, construction and many other industries.
Launched at Computex 2018 by NVIDIA founder and CEO Jensen Huang, NVIDIA Isaac includes new hardware, software and a virtual-world robot simulator.
AI is the most powerful technology force of our time, said Huang. Its first phase will enable new levels of software automation that boost productivity in many industries. Next, AI, in combination with sensors and actuators, will be the brain of a new generation of autonomous machines. Someday, there will be billions of intelligent machines in manufacturing, home delivery, warehouse logistics and much more.
It turns out those highly Instagrammable, pitch-black "goth" foods were far edgier than we could have ever imagined. According to a new report in Eater, the Department of Health says that activated charcoal is currently banned from all food- and drink-serving establishments in NYC. A spokesperson for DOH told Eater that the rule isn't new, but enforcement has increased.
Morgenstern's Finest Ice Cream, that NYC ice cream shop that caused a mini frenzy in 2016 over their popular jet-black ice cream, reportedly had to dump "$3,000 worth of product during a routine inspection," per owner Nick Morgenstern. The ice cream shop posted a cryptic Instagram in late May that hinted something was afoot. The ice cream, which they've been making since 2015, uses coconut asha form of activated charcoal. "I don't see any evidence that this is actually a question of public health safety," Morganstern told Eater. "I would challenge someone to identify the public health safety risk of that ingredient."
Read more of this story at SoylentNews.
Nationality or sovereignty defined by ones patent scope; the danger is, by granting patents in error they associate their patents with weak enforceability
Summary: The patent microcosm, which looks for new ways to patent algorithms (in spite of Alice), actually dooms the US patent system by filling it up with invalid patents software patents that are just waiting to be thrown out by courts which can better assess subject matter (no financial incentive to grant aplenty)
THE LITIGATION climate the US became renowned/notorious for is no more; at least as far as patent litigation is concerned. As we said yesterday, a lot of the litigation drifts eastwards to Europe and China, owing to patent maximalism at the EPO and SIPO. Its estimated that this year by years end the USPTO will have marked a decline in patent filings.
We are sadly seeing a failure to reject software patent applications, which eventually perish somewhere like the Federal Circuit or Patent Trial and Appeal Board (PTAB) at a vastly higher cost!The improving patent quality is good news; its bad news to lawyers, but theyre just a tiny minority or a non-producing, unproductive niche. Based on yesterdays advertisement of an upcoming webinar of theirs, theyre trying to come up with new patenting tricks (getting patents on what otherwise would get rejected). The Practising Law Institute (PLI), a patent maximalists group, will cover 35 U.S.C. Sections 101/102/103 and 35 U.S.C. 101: The Complete Guideline Breakdown of Alice, Myriad and Mayo (basically what places restrictions on abstract patents). Theres also...
Experts still havent attributed the malware to any threat actor, InvisiMole could be a nation-state malware developed for cyber espionage purpose or the result of a development of a financially-motivated group.
The researchers have discovered only a few dozen samples in the wild, the malicious code implements a broad range of features thanks it modular architecture that make the threat very versatile.
The modular structure of the InvisiMole spyware is composed of a wrapper DLL that leverages two other backdoor modules that are embedded in its resources to conduct its activities.
According to the researchers, the authors of the InvisiMole spyware have removed any clue that could attribute the malware to a specific actor, the unique exception is represented by the compilation data of a single file (dating to October 13, 2013). Compilation dates for all the remaining files have been removed by the authors.
The main module is called RC2FM and supports 15 commands that allow the attacker to search and exfiltrate data from the infected system.
The RC2FM supports commands for gathering system information an...
I work for a company where we recently applied for a grant
through the Pennsylvania Department of Community and Economic
Development. At some point in the application process you need to
upload tax records and other documents. However, I learned that
these records can be downloaded by anybody -- actually anybody
could download all the records. DCED administers over 100 different funding
programs and so many tax records for businesses (mostly
small businesses) in Pennsylvania were affected.
Here are the main topics of this story: how do you responsibly disclose a vulnerability to government if you, or somebody you know, may have broken federal laws to find it? How do you ensure that it gets fixed? And how do you get credit?
Thuggery at the EPO is taking its toll on the mental health of staff
Summary: The judge whom Battistelli attacked, Judge Corcoran, is rumoured to be in a psychiatric hospital after 3.5 years of legal battles and defamation against him
Topi is known for causing that (in Croatia), just like Battistelli.Causing ones perceived opponents to commit suicide or sink into depression isnt a novel tactic. Topi is known for causing that (in Croatia), just like Battistelli. We know for a fact that both have been bullying in several courtrooms (and countries) Judge Corcoran and in a recent press dialogue/interview Corcorans lawyer said she thankful that Mr. Corcoran is still alive after all the abuse he was subjected to by Battistelli and his bulldog.
Prowling around the corridors of the Isar building, Mrpel learnt unfortunate news, Mrpel wrote last night. It appears that Mr. Corcoran is in hospital. Mrpel heard he was sent to be treated for psychiatric reasons. Mrpel has no access to the medical file and cats are not familiar of psychiatric hospitals, but there are few reasons to be sent to a psychiatric hospital in Germany. The most common one is when the patient is in danger of committing suicide.
Benot Battistelli, if he has any morsel of guilt left in him, might be able to medicate himself with some wine, having repeatedly abused people who dared (or had the courage) to mention his corruption.
Console gamers have relatively few options when it comes to hardware hacking, unless they wish to partake of some extreme modifications that threaten the very integrity of their machines. So without reaching for a Dremel, how can you insert a little individuality into the same standard components all your friends have?
It seems one answer is to customise your controller with some different buttons. There are commercial outfits that will supply your needs in this direction, but they arent always cheap, and plenty of older machines have no products available. This isnt a problem for [RockerGaming] though, who shows us how to cast your own set of custom buttons using a silicone mold taken from the originals.
The video is a step-by-step walkthrough of the molding process that could just as easily be applied to any other small plastic parts and is not unique to console buttons. The subjects come from a Sega Saturn controller, in the video a beige model, which raises a passing interest among European Hackaday scribes who remember the Saturn as a black console.
We see the preparation of the original buttons and mold. An acrylic golf ball trophy display case is pressed into service. (Who knew those were even a thing!) A dye is added to the two-part silicone to provide a visual mixing aid, and once the cast mold is separated from the buttons the final resin is poured into it. The cloned buttons are tidied up underneath with a Dremel, and the controller is reassembled.
A set of custom buttons will not improve your gaming, but underlying this is the fact that resin casting is a useful skill. Its somewhere weve been before in depth, so its worth reading our guide from back in 2016.
Thanks [Andrea Campanella] for the tip.
Are we ready?
Batteries powered by radioactive materials have been around for more than a century, but what they promise in power they usually lose in bulk.
Not so with a new kind of power source, which combines a novel structure with a nickel isotope to pack ten times more power than an electrochemical cell of the same size. The only question is, are we ready to go nuclear?
A team of Russian researchers have put a new spin on technology that uses the beta decay of a radioactive element to create differences in voltage.
Another missing component could revolutionize electronics.
A new theory predicts the existence of an electronic device that works like an inverse transistor. It could make circuits, smaller, faster, and less power hungry.
[...] Occasional trains are some of the only traffic left on the China-Korea Friendship Bridge. This is the crossing point for 70 percent of goods entering North Korea from China things like coal, fuel and household appliances which are typically transported from Dandong, a gleaming metropolis, to drab Sinuju, the North's second-largest city.
But these are atypical times: United Nations sanctions on North Korea for its nuclear and weapons tests have reduced traffic on this bridge to a trickle. The effects are hitting the economy of this Chinese city hard as well. But in April, Dandong's hopes were suddenly lifted. A historic meeting between leaders of North and South Korea provided raised optimism here that the closed country across the river may soon open for business. The summit planned for next week between President Trump and North Korea's leader Kim Jong Un has added more fuel to the anticipation. And investors from across China have flooded in to this border city of 2.4 million. [...] "I've never seen anything like this in Dandong," says [Bob] Li, as workers scurry around him. "We'd have several buyers coming in from all over China buying up apartments. To them, the homes were very cheap, so they would buy as many as possible."
[...] "The rumor around town is that if the North opens up, it'll finally build a road to the new bridge, and our city will be linked to Seoul by road," says Li. "Pyongyang would just be a stop on the way."
Also at Reuters.
Read more of this story at SoylentNews.
Full paper: Judges as moral reasoners Oxford Journals Oxford University Press
Summary: PTAB is taking a lot of heat (albeit always from patent maximalists) for simply applying the law, which ought to have been applied by the Office at the time of examination; confidence in US patents depends on the Offices ability to discern/distinguish patentable subject matter from clearly unpatentable subject matter
The PTAB has de-designated Idle Free and Master Image in response to Aqua Products. Fiscal year 2018s first half set a motion to amend record for two consecutive quarters
The Patent Trial and Appeal Board (PTAB) has de-designated as precedential MasterImage 3D v RealD, Case IPR2015-00040 (PTAB July 15, 2015) (Paper 42) and has de-designated as informative Idle Free Sys v Bergstrom, Case IPR2012-00027 (June 11, 2013) (Paper 26).
Much of the coverage about PTAB, however, has been hostile. As expected, it came from longtime PTAB bashers and anti-PTAB sites. Those sites have a proven disdain for patent quality. Rather than ignore those sites wed like to quickly respond to these.
The arm/hand probably intended for the ATLAS robot. Id be curious if they are already playing with attaching it on to the robot.
The first person to live with a mind-controlled robotic arm is teaching himself piano. Johnny Matheny has spent the last five months with an advanced prosthetic, designed to replace the human hand and arm.
The robot arm is part of a research project run through the Johns Hopkins University Applied Physics Lab, and funded, in part, by the US Department of Defense. Data that researchers collect could revolutionize future mind-controlled robotics.
This is the second video in a series following Johnny has he spends the year with the arm.
Watch the arm being delivered: https://youtu.be/xKUn0-Bhb7U
Check out the rest of our videos: https://goo.gl/A8gZvx
Example from last month, impacting a Japanese firm
Summary: The International Trade Commission (actually US, its not an international agency) continues to overzealously guard US interests, even if that means blocking the competition from abroad, based on some sketchy patents with burden of proof on the accused
The ITC is the US embargo (e.g. imports ban) agency, at least for patent complaints; it often seems like its just serving exceptionally large US corporations that can afford access to it; its rare to see small companies or foreign companies utilising ITC. Microsoft used ITC for one of the earlier instances of patent aggression (against rival computer mice) and in recent years weve been covering several instances of ITC misuse of laws or failing to respect tribunals such as the Patent Trial and Appeal Board (PTAB), even if the Federal Circuit later affirmed its decisions. Something is clearly not working right at the ITC (law not being applied correctly, or sanctions applied prematurely without proper due process) and it could use a reboot if not just the boot. According to this short report (behind a paywall), ITC changes its rules. To quote Managing IP:
The International Trade Commission (ITC) has implemented 11 rule changes in an attempt to modernise and clarify the existing system. Coming into effect today, some changes simply formalise existing practices; others may cause complainants to rethink their approach.
Reprinted with permission from Quanta Magazines Abstractions blog.An experiment at the Fermi National Accelerator Laboratory near Chicago has detected far more electron neutrinos than predicteda possible harbinger of a revolutionary new elementary particle called the sterile neutrino.Photograph of nside the MiniBooNE tank, photodetectors capture the light created when a neutrino interacts with an atomic nucleus, by Reidar Hahn / Fermilab
Physicists are both thrilled and baffled by a new report from a neutrino experiment at Fermi National Accelerator Laboratory near Chicago. The MiniBooNE experiment has detected far more neutrinos of a particular type than expected, a finding that is most easily explained by the existence of a new elementary particle: a sterile neutrino thats even stranger and more reclusive than the three known neutrino types. The result appears to confirm the anomalous results of a decades-old experiment that MiniBooNE was built specifically to double-check.
The persistence of the neutrino anomaly is extremely exciting, said the physicist Scott Dodelson of Carnegie Mellon University. It would indicate that something is indeed going on, added Ane Slosar of Brookhaven National Laboratory.
As for what, no one can say.
Im very excited about this result, but I am not ready to say
Google is patenting algorithms (sometimes not even its own)
Summary: Complaints that Google is claiming credit for other peoples work and then patenting that, in effect pulling an Edison to stockpile questionable patents while occasionally resorting to patent aggression
LAST year someone told us the story of how Google had used Alex Converse to patent someone else's work. This was particularly disturbing not just because of prior art but also because of patent scope.
It would be bad if Google ever got granted any patent on anything related to asymmetric numeral systems (ANS) because its an algorithm.Well, the originator of the method speaks out again. Jarek Duda was making some headlines last year and now hes back. Rather than walk away and apologise Google seems to be doubling down on its bad practice, which involves patenting software:
When Jarek Duda invented an important new compression technique called asymmetric numeral systems (ANS) a few years ago, he wanted to make sure it would be available for anyone to use. So instead of seeking patents on the technique, he dedicated it to the public domain. Since 2014, Facebook, Apple, and Google have all created software based on Dudas breakthrough.
But now Google is seeking a patent that would give it broad rights over the use of ANS for video compression. And Duda, a computer scientist at Jagiellonian University in Poland, isnt happy about it.
Google denies that its trying to patent Dudas work. A Google spokesperson...
Even though you use your brain to do a lot of thinking, you probably don't think about your brain that often.
It's an incredibly complex, incredibly precious organ. It's also incredibly squishy, as you can see in an amazing teaching video that demonstrates a freshly removed brain straight from autopsy.
As the neuroanatomist handles the vulnerable blob with the utmost care, it's awe-inspiring to realise that each one of us has a squishy brain just like it - and it contains all our memories and thoughts.
[...] And that's actually one of the purposes of the video - apart from being a teaching material, the university wanted "to stress the vulnerability of the brain to highlight the importance of wearing helmets, seat belts, and taking care of this very precious tissue."
Read more of this story at SoylentNews.
For the first time, researchers have mapped the cell nucleus in 3D, revealing the packaging and organization of a cells DNA in unprecedented detail.
June 8 (UPI) The nucleus of the cell is where the action happens, but its not easy to analyze the behavior of a massive genome inside an area 50 times smaller than the width of a human hair.
Now, for the first time, researchers have mapped the cell nucleus in 3D, revealing the packaging and organization of a cells DNA in unprecedented detail.
Inside each cell is the same massive chain of DNA. But most of the coding lies dormant. The combination of genetic sequences within in the chain that are turned off or on and expressed via RNA determines the role and functionality of each cell.
This post is a reply to
https://twitter.com/18F/status/778637006075154432 it shows two
great user interfaces you can use on your website to show the
visitor how strong their password is.
Callum from WebSound.co.uk has sent over another awesome offer for us all to enjoy! Theyve been around since 2013 and have had nothing but great feedback around our community.
Theyre a registered company in the UK (VAT Number: GB 203028955). They accept PayPal, Debit/Credit Card (Stripe) or BitCoin (Coinify). You can find their ToS/Legal Documents here.
In their own words:
WebSound is an affordable, reliable hosting provider launched in 2013 We have previously featured on LEB before and frequent offers around the LET community, however, we feel its time to bring a new, exclusive offer for the LEB community themselves again. We specialize in offering a variety of affordable VPS and Web Hosting services to cater for the needs of a wide range of clients, and our previous VPS hosting offers have been very popular among the community in the past, we hope that this offer can be met with the same popularity and demand as previously as we try to deliver something new and some updated features within our control panel since our last offering.
Exclusive Offer: LEB-KVMH50 gets 50% recurring off of all KVMH plans on any billing cycle, PLUS double disk space OR double bandwidth, open a support ticket on ordering to choose which double benefit you receive!
Using a MOSFET as a switch is generally pretty simple. Make the gate voltage sufficient with respect to the source and current flows through the channel. However, if you are switching higher voltages, you may need some additional circuitry to protect the devices gate and possibly the microcontroller driving the whole thing, too. [Lewis] discusses high voltage switching in the latest in his series of videos dealing with MOSFETs. You can see the video below.
Youll see in the video a breadboard setup driving a 50 V load and also a higher-voltage H-bridge. There are three major topics covered: Using an optoisolator, using a gate bleeder resistor, and using a zener diode to limit gate voltage.
Of course, an optoisolator isnt necessary with or without the high voltage, as long as everything works well. It can, however, prevent high-frequency noise from conducting from the FET channel through the gate acting as a capacitor. It can also be useful for saving the controller if there is a failure that shorts the channel to the gate.
The bleeder resistor isnt specific to high voltages, either. Because the gate is practically an open circuit at DC, it is a good idea to add a resistor like this so that when the gate drive is off, you dont have to wait for the charge on the gate to dissipate. In addition, the resistor offers some protection against electrostatic discharge (ESD) damage, since the ESD will tend to flow through the resistor instead of punching through the gate oxide on the device.
The zener sees service in two ways. At first, the circuit uses it to derive 12 V from the 50 V supply. However, in a later incarnation, the design uses it as a clamp to keep a P-channels gate at 12 V. These are both important because the maximum rating of the gates is 20 V.
Although the devices in the video are IRF630s and IRF9630s, the principles apply to lots of different kind of FETs. Just remember what you kind you have and understand the datasheet before you finalize your design.
This summer, the fifth instalment of the Jurassic Park franchise will be on the big screen, reinforcing a love of dinosaurs that has been with many of us since childhood. There is something awe inspiring about the biggest, fiercest, and deadest creatures that have ever walked the planet. But the films have had an additional benefit they have sparked an interest in dinosaur DNA.
The Mr DNA sequence in the original movie is a great piece of science communication and the concept of extracting DNA from the bodies of dino blood-engorged mosquitoes is an outstanding piece of fiction. It is, however, just fiction.
A feature called Significant Locations collects a detailed history of places you visit on a regular basis. The feature can be disabled via Settings > Privacy > Location Services > System Services > Significant Locations. The feature can be disabled, and history of data collected can be deleted. Apple claims that Significant Locations are encrypted and cannot be read by anyone except the phone owner. Yet, most iPhone users are unaware that their phone records their current location and calculates which locations are significant. Why hasn't Apple made people more aware of this potential violation of their privacy?
Read more of this story at SoylentNews.
Startup, Unity Biotechnology, prevents agingand its not as crazy as it seems.
Now on his fifth startup, Ned David has the blueprint for creating a lucrative biotech. His latest project: a company that will take on the ravages of aging.
This week in DistroWatch Weekly: Review: Android-x86 7.1-r1News: Running Linux From Scratch with Debian package management, TrueOS changes course, OpenMediaVault and pfSense react to GDPR, ArchLabs leaves GitHub, Haiku ports LibreOfficeTips and tricks: OpenSSH, pipes and file transfersReleased last week: Devuan 2.0.0, GeckoLinux 150Torrent corner: Archman, AUSTRUMI, Berry,....
Millions of low-skilled workers who are already being pushed out will need to adapt to the new economy.
For the last several years, CleanTechnica has covered renewable energy development in India quite closely. Several years ago, India set what seemed like a lofty target of 175 gigawatts of wind and solar energy by March 2022. Few believed that was a practical target, but then India plowed forward and happily impressed the world. This week that goal was increased to 227 gigawatts!
Currently, India has added a little more than 70 gigawatts of that goal. Assessing the progress to date on a linear scale, the trend would seem to indicate the country is behind. However, renewable energy growth is not linear.
Heres an overview of some of last weeks most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos researchers have news about the VPNFilter malware, and it doesnt look good. Why creativity is key to security Security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business innovation by imposing restrictions on access, rules and controls, and responding with no. Given More
The post Week in review: Zip Slip, GDPR and the US, why creativity is key to security appeared first on Help Net Security.
Coinrail, a South Korea-based cryptocurrency exchange has suffered a massive
This is a post from HackRead.com Read the original post: Bitcoin falls after Korean exchange loses $40M following hack attack
Need a reverse engineering challenge? Heres something from American Science and Surplus. Its a 48 x 12 LED matrix, loaded up with driver ICs and power regulators. $20 a piece, so stock up and save.
Finally, the main event. The biggest story in aviation this week is that a media embargo has lifted on the Kitty Hawk Flyer. Kitty Hawk is a startup funded by Larry Page, CEOd by Sebastian Thrun, and has received $6.5 M in funding. The Flyer, a one-man decacopter, was announced to the world through CNN Money and Casey Neistat. It should be noted that in the entire media landscape, these are the two outlets most ignorant of aviation: CNN needs no explanation, and Neistat flies quadcopters through the Hudson River Corridor at 1000 feet AGL. Additionally, Kitty Hawk is not exhibiting at AirVenture next month, which leads me to believe Kitty Hawk is trying to stay out of the aviation industry or simply doesnt want knowledgeable people asking them questions. But I digress.
The Kitty Hawk Flyer is being promoted by the company as a personal flying vehicle to make flying part of everyday life and a machine that will give you, a world free from traffic. It is being billed by CNN and Neistat as a flying car. Kitty Hawk is just fine with allowing the media to call it as such. Additionally, Sebastian Thrun is making claims about the Flyer that are disingenuous at best, outright illegal at worst, and should draw the ire of any investors.
In the CNN Money piece, Thrun claims the Flyer is capable of traveling at 100 miles per hour, which would be illegal. The Flier is certified as a Part 103 Ultralight, and under that regulation the Flyer is not capable of more than 55 knots calibrated airspeed at full power...
Submitted via IRC for Fnord666
Scientists who last year built a prototype harvester to extract water from the air using only the power of the sun have scaled up the device to see how much water they can capture in arid conditions in Arizona. Using a kilogram of MOF[*], they were able to capture about 7 ounces of water from low-humidity air each 24-hour day/night cycle. A new and cheaper MOF could double that.
[...] "There is nothing like this," said Omar Yaghi, who invented the technology underlying the harvester. "It operates at ambient temperature with ambient sunlight, and with no additional energy input you can collect water in the desert. This laboratory-to-desert journey allowed us to really turn water harvesting from an interesting phenomenon into a science."
[*] Metal-organic frameworks (MOFs) are:
compounds consisting of metal ions or clusters coordinated to organic ligands to form one-, two-, or three-dimensional structures. They are a subclass of coordination polymers, with the special feature that they are often porous. The organic ligands included are sometimes referred to as "struts", one example being 1,4-benzenedicarboxylic acid (BDC).
Also at Berkeley News.
Read more of this story at SoylentNews.
What does it mean to fall in love in the 21st century? Originally, the number of people you could fall in love with were limited to the amount that lived within relative close proximity of you (a few miles, at best). In todays world, however, it isnt that uncommon for people to fall in love online.
As we move forward into a future of VR and AI, how might our abilities to fall in love change in a world where non-biological life is teeming just as much as biological life?
Scientists have discovered that sperm contain two centrioles, as opposed to one and that additional centriole could explain infertility.
Right now, there are roughly 16 sextillion liters of water suspended in the atmosphere. The air around you is a river, you just cant see it.
Harvesting water from air would be a game-changing solution to tackling freshwater scarcity, which is increasing as the world warms. It would be especially vital in places with very little humidity in the air, like the desert. But while its technically possibleyou just need to get the water content in the air to condense around somethingdoing so efficiently has been difficult, until now.
The challenge with this technology is cooling. Water vapor will only condense into a liquid if the material it condenses on is cooler than the surrounding air. Thats why droplets of condensation will appear on a soda can the moment you take it out of the fridge. But how do you leave a piece of machinery in the desert sun all day and keep it cooler than the surrounding air? One way would be to install a cooling system. But it takes a a lot of energy to perpetually cool an object in a hot place, and isnt feasible in places where energy is expensive. We also dont want to increase the amount of energy demand in a world already struggling to reduce emissions.
Released this week was the first alpha of PHP 7.3 and I decided to take it for a spin with some benchmarks. While not as dramatic as going from PHP5 to PHP 7.0, the performance of PHP7 continues getting better...
Submitted via IRC for Fnord666
[...] After all, who needs a hole in the head? Yet for thousands of years, trepanation -- the act of scraping, cutting, or drilling an opening into the cranium -- was practiced around the world, primarily to treat head trauma, but possibly to quell headaches, seizures and mental illnesses, or even to expel perceived demons.
[...] "In Incan times, the mortality rate was between 17 and 25 percent, and during the Civil War, it was between 46 and 56 percent. That's a big difference. The question is how did the ancient Peruvian surgeons have outcomes that far surpassed those of surgeons during the American Civil War?"
[...] Whatever their methods, ancient Peruvians had plenty of practice. More than 800 prehistoric skulls with evidence of trepanation -- at least one but as many as seven telltale holes -- have been found in the coastal regions and the Andean highlands of Peru, the earliest dating back to about 400 B.C. That's more than the combined total number of prehistoric trepanned skulls found in the rest of the world.
Read more of this story at SoylentNews.
The Joo Janta 200 super-chromatic peril-sensitive sunglasses were developed to help people develop a relaxed attitude to danger. By following the principle of, what you dont know cant hurt you, these glasses turn completely opaque at the first sign of danger. In turn, this prevents you from seeing anything that might alarm you.
Here we see the beginnings of the Joo Janta hardware empire. For his Hackaday Prize entry, [matt] has created Nope Glasses. Is that meeting running long? Is your parole officer in your face again? Just Nope right out of that with a wave of the hand.
The Nope Glasses are two LCD shutters mounted in a pair of 3D printed glasses. On the bridge of the glasses is an APDS 9960 gesture sensor that tracks a hand waving in front of the glasses. Waving your hand down in front of the glasses darkens the shutters, and waving up makes them clear again. Waving left flashes between clear and dark, and waving right alternates each shutter.
In all seriousness, there is one very interesting thing about this project: how [matt] is attaching these LCD shutters to his glasses. This was done simply by taking a picture of the front and top of his glasses, converting those to 1-bit BMPs, and importing that into OpenSCAD. This gave him a pretty good idea of the shape of his glasses, allowing him to create an attachment for his glasses. Its great work, and wed really like to see more of this technique.
The Chromium developers have been very busy as of late bringing life to the Crostini Project that will give users the ability to run Linux apps natively on Chrome OS. While Linux on Chromebooks isnt a new trick, the Crostini UI presents a clean, hack-free method to launch Linux apps from the terminal app that will eventually live in Chrome OSs app drawer when enabled.
Initially birthed in Googles own Pixelbook, Linux apps on Chrome OS has now spread to ARM in the form of the Samsung Chromebook Plus. Although its still in its infancy, its becoming clear that developers are pushing to make the Crostini project a stable part of the Chromebook ecosystem.
Being lazy, I wanted a way to automate that when using my new Librem laptop. Again, I could look into a power/charging threshold for the Librem. But for less than $20, I picked up a power strip that had a timer (Century 8 Outlet Surge Protector with Mechanical Timer). Four outlets on the strip are always on, and four are connected to a built-in timer. That allows me to plug in my monitor and LED desk light to an always-on outlet, and my lap...
In the crowded world of encrypted messaging apps, few tools stand out.
Wire gives you encrypted voice calls, video calls, and messaging. It uses wireless data (through a mobile plan or wi-fi), which can help save money on phone calls and SMS charges. This is great for those of us who want to call or text our friends without eating up an expensive phone plan. It also supports most major operating systems.
On Wire, conversations are end-to-end encrypted, meaning that no one except the conversational participants can read the messages. Its open source, meaning that its code is publicly viewable. This also means it can be examined for security holes. After responding to security audits, the team has developed a fairly hardened, yet simple messenger that continues to improve.
Competitive messaging apps with similar encryption, such as Signal and WhatsApp, require users to register for the service with a phone number. And while there are workarounds, this move has serious privacy implications for those who prefer not to give away a personal number before you can chat. On Wire, you can simply register with an email.
While Wire has strong encryption and robust features, the service collects and retains a lot of metadatainformation about your conversations, such as your contacts, and who spoke to whom. Compare this to the more conservative Signal app. And because it has a web interface, we should take extra precautions to make sure no one else can log in.
When you first launch the app on your phone, it will ask you to register a...
Researchers now have an antibody that specifically targets cancer cells, while leaving healthy ones alone.
A new algorithm has been used to detect violence in drone-captured video footage:
A drone surveillance system capable of highlighting "violent individuals" in a crowd in real time has been built by [researchers].
The artificially intelligent technology uses a video camera on a hovering quadcopter to study the body movements of everyone in view. It then raises an alert when it identifies aggressive actions, such as punching, stabbing, shooting, kicking, and strangling, with an accuracy of about 85 per cent. It doesn't perform any facial recognition it merely detects possible violence between folks. And its designers believe the system could be expanded to automatically spot people crossing borders illegally, detect kidnappings in public areas, and set off alarms when vandalism is observed.
The inventors are based at the University of Cambridge, in England, India's National Institute of Technology, and the Indian Institute of Science. They hope their autonomous spy drones will help cops crush crime and soldiers expose enemies hiding in groups of innocents.
Also at Science Magazine.
Read more of this story at SoylentNews.
Russian Government has approved a new bill to punish search engines that are not aligned with Moscow and that allows its users to find VPN services, and anonymization tools that allow circumventing the censorship.
According to the amendments to the Code of Administrative Offenses of the Russian Federation, Duma will also impose fines on search engines if they will continue to provide results about queries on an up-to-date database of blocked domains upon users request.
Fines for individuals will range between 3,000 and 5,000 rubles (roughly $48 to $80), while officials will face fines up to 50,000 rubles (roughly $800), and legal entities will face fines between 500,000 to 700,000 (roughly $8,019 to $11,227).
The failure of the operator to perform the search system to connect to this system entails the imposition of an administrative fine on citizens in the amount of three thousand to five thousand rubles; on officials from thirty thousand to fifty thousand rubles; on legal entities from five hundred thousand to seven hundred thousand rubles, - reads the press release published by the Duma.
Russians ordinary use VPN services and other anonymizing services to access blocked content and bypass censorship, in the following graph we can see the continuous growth for the number of Tor users in Russia.
In 2017, Russias parliament voted to ban web tools that could be used by people to surf outlawed websites, and the Duma approved the proposed bill to oblige anyone usi...
It will be set between Revenge of the Sith and A New Hope.
Titanfall developer Respawns Vince Zampella gave us a small teaser during todays EA conference at E3, and while there arent many details yet, what we know so far sounds juicy. Yes, theres a new Star Wars game dropping holiday 2019 called Jedi: Fallen Order, and its being made by the people behind one of the best shooters of this generation, Titanfall 2.
According to the games website, Jedi: Fallen Order will take place during the period shortly after Revenge of the Sith, following a surviving Padawan during the dark times of the franchise when the Jedi are being hunted down. Zampella said on Twitter that itll be a single-player story game thats dark and gritty.
Thats not much to got on, as Respawn didnt release a trailer, key art, or anything else, but Zampella did note that youll get to wield a lightsaber. Given that Respawn is behind the game, theres plenty of reason to be excited.
The typical contemporary view assumes that there is going to be some deep tension between faith and science. From our perspective thats an illusion.
Washington D.C., Jun 10, 2018 / 05:00 am (CNA).- A Thomistic philosopher, an evolutionary biologist, and a Harvard astronomy professor walk into a bar. Well, not a bar.
But they did walk into a Washington, D.C. symposium this week, at which graduate students, professors, religious sisters, and other curious Catholics discussed highly technical scientific questions over bourbon and pecan pie, late into the night.
The three-day conference, co-sponsored by the Thomistic Institute and the Society of Catholic Scientists, brought together nearly 70 professors and graduate students from Princeton, Harvard, Yale, MIT, the University of Chicago, and other universities across the country to examine the intersection of faith and science.
Thursday night was a real treat. I got to see both Joe Grand and Kitty Yeung at the HDDG meetup, each speaking about their recent work.
Joe walked us through the OpticSpy, his newest hardware product that had its genesis in some of the earliest days of data leakage. Remember those lights on old modems that would blink when data is being transmitted or received? The easiest way to design this circuit is to tie the status LEDs directly to the RX and TX lines of a serial port, but it turns out thats broadcasting your data out to anyone with a camera. You cant see the light blinking so fast with your eyes of course, but with the right gear you most certainly could read out the ones and zeros. Joe built an homage to that time using a BPW21R photodiode.
Transmitting data over light is something that television manufacturers have been doing for decades, too. How do they work in a room full of light sources? They filter for the carrier signal (usually 38 kHz). But what if youre interested in finding an arbitrary signal? Joes bag of tricks does it without the carrier and across a large spectrum. It feels a bit like magic, but even if you know how it works, his explanation of the hardware is worth a watch!
The demos of OpticSpy pulling data out of a seemingly solid red LED were a blast to see. Im glad that Joe also spend time walking through the circuit:
Ankur Bargotra joins our blog team with the post "What Is Cognitive Computing (How AI Will Think)".
Posted by Yves-Alexis Perez on Jun 10Hi Stepian,
This video is the eleventh in a multi-part series discussing computing. In this video, well be discussing what cognitive computing is and the impact it will have on the field of computing.
[0:285:09] Starting off well discuss, what cognitive computing is, more specifically the difference between current computing Von Neuman architecture and more biologically representative neuromorphic architecture and how these two paired together will yield massive performance and efficiency gains!
[5:0910:46] Following that well discuss, the benefits of cognitive computing systems further as well as current cognitive computing initiatives, TrueNorth and Loihi.
[10:4617:11] To conclude well extrapolate and discuss the future of cognitive computing in terms of brain simulation, artificial intelligence and brain-computer interfaces!
Now that DSLWP-B has already been for 17 days in lunar orbit, there have been several tests of the 70cm Amateur Radio payload, using 250bps GMSK with an r=1/2 turbo code. Several stations have received and decoded these transmissions successfully, ranging from the 25m radiotelescope at PI9CAM in Dwingeloo, the Netherlands (see recordings here) and the old 12m Inmarsat C-band dish in Shahe, Beijing, to much more modest stations such as DK3WNs, with a 15.4dBic 20-element crossed yagi in RHCP. The notices for future tests are published in Wei Mingchuan BG2BHCs twitter account.
As far as I know, there have been no tests using JT4G yet. According to the documentation of WSJT-X 1.9.0, JT4G can be decoded down to -17dB SNR measured in 2.5kHz bandwidth. However, if we dont insist on decoding the data, but only detecting the signal, much weaker signals can be detected. The algorithm presented here achieves reliable detections down to about -25dB SNR, or 9dB C/N0.
This possibility is very interesting, because it enables very modest stations to detect signals from DSLWP-B. In comparison, the r=1/2 turbo code can achieve decodes down to 1dB Eb/N0, or 25dB C/N0. In theory, this makes detection of JT4G signals 16dB easier than decoding the GMSK telemetry. Thus, very small stations should be able to detect JT4G signals from DSLWP-B.
As described in the WSJT-X documentation, the JT4 family uses 4FSK at 4.375baud. A total of 206 symbols are transmitted over the 47.09s that a complete message lasts. A pseudo-random 206 bit sync vector is used for time and frequency synchronization. The sync vector is the following (note that there is an error in the WSJT-X documentation):
000110001101100101000000011000000000000101101101011111010001 001001111100010100011110110010001101010101011111010101101010 111001011011110000110110001110111011100100011011001000111111 00110000110001011011110101
The autocorrelation function of this sequence is shown below, both in a linear scale and in dB units.
SpaceXs careers page shows that the rocket company, which Elon Musk founded in 2002, is on a hiring spree. New hires seem to be working on the Starlink
SpaceX plans to build an Operations Area on 63-67 acres between the Kennedy Space Center's Vehicle Assembly Building and Industrial Center. The highlights include 300-foot tall tower housing a launch and landing control center, a booster and fairing processing and storage facility, and a rocket garden:
It will be an operational monument to Elon Musk's vision: a towering SpaceX launch control center, a 133,000-square-foot hangar and a rocket garden rising in the heart of Kennedy Space Center.
According to plans detailed in a draft environmental review published recently by KSC, SpaceX will undertake a major expansion of its facilities at the space center sometime in the not-too-distant future.
The review says SpaceX is seeking more room and a bigger presence "in its pursuit of a complete local, efficient, and reusable launch vehicle program."
The expansion would enable SpaceX to store and refurbish large numbers of Falcon rocket boosters and nose cones at the operations center down the road from NASA's Vehicle Assembly Building.
Read more of this story at SoylentNews.
Faced with a tsunami of pirated movies and TV shows being accessed at will through millions of piracy-enabled set-top boxes, entertainment industry groups have had to come up with a new anti-piracy strategy.
The main goal seems to demonize these devices in the press, creating the impression that anyone using them puts themselves in danger, either due to fire risk or exposure to the perils of viruses and malware.
These claims are perfect tabloid material. Newspapers, particularly in the UK, gobble up press releases and quickly spin them out, whether they have any substance to them or not. While theres little evidence that the scare stories are working as a deterrent among the pirating masses, they are a continuous source of irritation for those who know better.
This week a new Kodi-related video appeared on YouTube. Filmed at the RSA conference and presented by CyberScoop editor Greg Otto, it consists of a short interview with Kurtis Minder, CEO of security company GroupSense. How malware is growing on the Kodi/XMBC platform was the topic.
After a brief introduction on so-called Kodi boxes, Otto put it to Minder that his company had been looking into the malware that has been floating through these boxes and asked him to elaborate.
Minder said his company started its research around two months ago, working with the Digital Citizens Alliance (DCA). Of course, DCA has been one of the main sources of Kodi-related malware stories, ostensibly for the protection of consumers.
However, DCA is affiliated with the entertainment industries and there is little doubt theyre being used to promote an anti-piracy agenda. There is nothing inherently wrong with companies trying to protect their content, of course, but doing so in a way that has the potential to mislead the public is bound to raise questions.
Back to the video, Minder told interviewer Otto that his company had been looking at what the attack footprint would be for malware on the media that would show up on any given Kodi box that would be in someones home.
Its a curious statement to talk about the streaming media itself providing an attack vector but Minder doubled down, stating that theyd discovered several places on the dark web where people are selling malware-enabled media.
Otto didnt ask Minder to elaborate on these claims and Mi...
This week Mac/Linux game porting company released the Linux port of A Total War Saga: THRONES OF BRITANNIA, just two months after this game was released for Windows. With the Linux port of this strategy game the Vulkan API is being used for graphics rendering, which makes it interesting for benchmarking. Here is our extensive look at the performance of this major Linux game port when testing twenty-five different AMD Radeon and NVIDIA GeForce graphics cards to see how this game is performing on Ubuntu Linux.
Posted by Stiepan on Jun 10Hello to both,
Via: Reuters: A radical plan to transform Switzerlands financial landscape by barring commercial banks from creating money when they lend looked set to fail, according to initial projections on Sunday. The vote, called under Switzerlands system of direct democracy after gathering more than 100,000 signatures, wanted to make the Swiss National Bank (SNB) the 
Anyone who slings code for a living knows the feeling all too well: your code is running fine and dandy one minute, and the next minute is throwing exceptions. Youd swear on a stack of OReilly books that you didnt change anything, but your program stubbornly refuses to agree. Stumped, you turn to the only one who understands you and pour your heart out to a little yellow rubber duck.
When it comes to debugging tools, this digital replacement for the duck on your desk might be even more helpful. Rubber duck decoding, where actually explaining aloud to an inanimate object how you think the code should run, really works. Its basically a way to get you to see the mistake you made by explaining it to yourself; the duck or whatever personally, I use a stuffed pig is just along for the ride. [platisd] took the idea a step further and made his debugging buddy, which he dubs the Dialectic Ball, in the form of a Magic 8-Ball fortune teller. A 3D-printed shell has an ATtiny84, an accelerometer, and an LCD screen. To use it, you state your problem, shake it, and read the random suggestion that pops up. The list has some obvious suggestions, like adding diagnostic print statements or refactoring. Some tips are more personal, like talking to your local guru or getting a cup of coffee to get things going again. The list can be customized for your way of thinking. If nothing else, itll be a conversation piece on your desk.
If youre more interested in prognostication than debugging, we have no shortage of Magic 8-Ball builds to choose from. Heres one in a heart, one that fits in a business card, and even one that drops F-bombs.
If you thought you have seen it all then you
This is a post from HackRead.com Read the original post: 8 Google Maps hidden places You are not allowed to see
Submitted via IRC for Fnord666
The FCC has approved new rules expressly banning unauthorized charges on phone bills, a practice that was already illegal under federal law but never formally codified within the agency. Its the first time the commission is adopting an explicit rule.
The new rules ban unexpected phone bill charges, also known as cramming many services that a customer didnt ask for onto a bill. The rules also ban the practice of tricking a customer into switching phone carriers. From now on, if a company is found to have used deception to obtain your consent to switch carriers, your consent will be deemed invalid.
Changes are also being made to how third-party verification services, which are supposed to validate a sale or carrier switch, confirm that a customer really intended to take action. The third-party verification process will no longer need user approval for every service purchased, in order to save customers time and streamline the process. Its a change thats supposed to be helpful, but it sounds like it could lead to unexpected charges when you arent paying attention. Finally, carriers that abuse third-party verification, such as by editing out parts of a customers phone call with a third party to make it sound like an approval to switch carriers, will be suspended from using them for several years.
Read more of this story at SoylentNews.
The AMD Radeon driver developers maintaining the open-source AMDVLK Vulkan Linux driver have pushed out their latest week's worth of changes...
Facebook reportedly made agreements to share certain user data with a handful of companies even after it had said it no longer allowed such practices, raising new questions about the companys privacy policies.The Wall Street Journal reported Sunday...
Linux 4.17 landed the initial Spectre V4 mitigation as "Speculative Store Bypass Disable" (SSBD) while primarily focused on Intel CPUs and for Linux 4.18 the SSBD code has been updated for AMD processors...
Adding to the list of new features for Linux 4.18 is the long-in-development work on the restartable sequences system call...
Imagine meetings that document themselves using AI tools to add real-time translation and accessibility support. How much of that is the future and how much can you do today?
Marcus Hutchins, the British malware analyst who helped stop global Wannacry menace, is now facing four new charges related to malware he allegedly created and promoted it online to steal financial information.
Hutchins, the 24-year-old better known as MalwareTech, was arrested by the FBI last year as he was headed home to England from the DefCon conference in Las Vegas for his alleged role in creating and distributing Kronos between 2014 and 2015.
Kronos is a Banking Trojan designed to steal banking credentials and personal information from victims' computers, which was sold for $7,000 on Russian online forums, and the FBI accused Hutchins of writing and promoting it online, including via YouTube.
Hutchins pleaded not guilty at a court hearing in August 2017 in Milwaukee and release on $30,000 bail.
However, earlier this week, a revised superseding indictment [PDF] was filed with the Wisconsin Eastern District Court, under which Hutchins faces four new charges along with the six prior counts filed against him by the FBI a month before his arrest.
According to the new indictment, Hutchins created a second piece of malware, known as "UPAS Kit," and also lied to the Federal Bureau of Investigations (FBI) when he was arrested and questioned last year in Las Vegas.
[...] As the news on the revised indictment broke, Hutchins, who has repeatedly denied any illegal activity, called the charges "bullshit" and appealed to his Twitter followers for donations to cover legal costs.
Read more of this story at SoylentNews.
Artificial intelligence has exploded, and perhaps no one knows it more than Harry Shum, the executive vice president in charge of Microsofts AI and Research Group, which has been at the center of a major technological shift inside the company.
Delivering the commencement address Friday at the University of Washingtons Paul G. Allen School of Computer Science and Engineering, Shum drew inspiration from three emerging technologies quantum computing, AI, and mixed reality to deliver life lessons and point out the future of technology for the class of 2018.
[Ryan Wamsley] has spent a lot of time over the past few months working on a new project, the Ultimate LoRa backplane. This is as its name suggests designed for LoRa wireless gateways, and packs in all the features hed like to see in a LoRa expansion for the Nano Pi Duo.
His design features a three-terminal regulator, and in the quest for a bit more power efficiency he did what no doubt many of you will have done, and gave one of those little switching regulator modules in a three-terminal footprint a go. As part of his testing he inadvertently touched the regulator, and was instantly rewarded with a puff of smoke from his Nano Pi Duo. As it turned out, the regulator was susceptible to electrical noise, and had a fault condition in which its input voltage was routed directly to its output. As a result, a component in the single board computer received way more than its fair share, and burned out.
If there is a moral to be extracted from this story, it is to never fully trust a cheap drop-in module to behave exactly as its manufacturer claims. [Ryan]s LoRa board lives to fight another day, but the smoke could so easily have come from more components.
So thats the Fail of The Week part of this write-up complete, but it would be incomplete without the corresponding massive win that is [Ryan]s LoRa board itself. Make sure to take a look at it, its a design into which a lot of attention to detail has been put.
What do you do when you have time, thousands of dollars worth of magnets, and you love Mythbusters? Science. At least, science with a flair for the dramatics. The myth that a magnetic wristwatch with todays technology can stop, or even redirect, a bullet is firmly busted. The crew at [K&J Magnetics] wanted to take their own stab at the myth and they took liberties.
Despite the results of the show, a single magnet was able to measurably alter the path of a projectile. This wont evolve into any life-saving technology because the gun is replaced with an underpowered BB gun shooting a steel BB. The original myth assumes a firearm shooting lead at full speed. This shouldnt come as any surprise but it does tell us how far the parameters have to be perverted to magnetically steer a bullet. The blog goes over all the necessary compromises they had to endure in order to curve a bullet magnetically and their results video can be seen below the break.
Here we talk about shooting airplane guns so they dont get mis...
Just projecting their personal agenda
Summary: 35 U.S.C. 101 does not seem to matter to people whose living is made from litigation and patent pursuits on (or pertaining to) algorithms; we rebut a few examples from the past week, reminding readers that lawyers arent credible advisors on issues they stand to gain from (at clients and innocent companies expense)
THE collapse of software patents is very much a reality in the US. Dont ask law firms; they just want to sell more services (e.g. lawsuits and patent applications) around that.
The other day in Law.com there was an article with the term Open Source in the headline, which got our attention. Dont be misled though; Law.com is traditionally a Free/Open Source software-hostile site, typically helping lawyers sell services around licence compliance and other things which are marketed by FUD. Patents and open source are not mutually exclusive, someone (a self-appointed expert) is quoted as saying in this new piece.
Theyre alluding to the corporate flavour of Open Source, not Free/Open Source software.Actually, they are. Theyre not compatible. Software patents and Free/Open Source software cannot co-exist. You can do both and do both correctly, continues the self-appointed expert, but it takes education, especially for people who are newer in the industry.
Theyre alluding to the corporate flavour of Open Source, not Free/Open Source software. Moore said engineers often join Pure Storage from companies that were not engaged in open source projects, the author writes, and expect a similar policy. Others are pro-open source, but may not know the benefits of patents.
So theyre trying to market software patents to companies which claim to be Open Source, such as Red Hat (its applying for software patents and really ought to stop doing that). Thats one reason why Gideon Myles, continues the author, lead IP counsel at San Francisco-based Dropbox Inc., said his company educates new employees on both processes.
When it comes to patents in general (i.e. not software), patents may make sense, but as far as Free/Open Source software is concerned, there should be no patents in tha...
James Woodward and the Space Studies Institute has a Phase 2 NASA Innovative Advanced funded study. They are looking at the implementation of an innovative thrust producing technology for use in NASA missions involving in space main propulsion.
Dr. Heidi Fearn explained in a video made in 2017 how just scaling the power and size of the Mach effect propulsion causes problems. (heat, arcing and other problems). They currently believe they can scale the device to one newton of propulsion and then create large arrays of the devices for more thrust. The constant thrust could last for years or decades by using a nuclear power source.
For Mach effect propellantless propulsion it will be better to go to an array of smaller devices.
Last Sunday, I used Scott Tilley VE7TILs Doppler measurements of the DSLWP-B S-band beacon to perform orbit determination using GMAT. Yesterday Scott sent me the Doppler data he has been collecting during this week. I have re-run my orbit determination process to include this new data.
Below I show the Keplerian state that was determined on 2018-06-03, in comparison with the new state determined on 2018-06-10 (both are referenced to the same epoch of 2018-05-26 00:00:00 UTC).
% 20180603 %DSLWP_B.SMA = 8761.0758581 %DSLWP_B.ECC = 0.768016853537 %DSLWP_B.INC = 16.9728174682 %DSLWP_B.RAAN = 295.670653562 %DSLWP_B.AOP = 130.427472407 %DSLWP_B.TA = 178.126596496 % 20180610 DSLWP_B.SMA = 8762.40279943 DSLWP_B.ECC = 0.764697135746 DSLWP_B.INC = 18.6101083906 DSLWP_B.RAAN = 297.248156986 DSLWP_B.AOP = 130.40460851 DSLWP_B.TA = 178.09494681
It seems that there is still an indetermination of a few degrees in the inclination and right-ascension of the ascending node and a few kilometres in the semi-major axis.
The graph below shows the Doppler fit.
The Jupyter notebook where these calculations are performed can be found here.
Last summer saw the birth of a new anti-piracy initiative, which has already made quite a few headlines.
A coalition of the major Hollywood studios, Amazon, Netflix and several other media properties teamed up, launching the Alliance for Creativity and Entertainment (ACE).
Their ultimate goal is to beat piracy, with pirate streaming boxes as the main target.
In the months that followed, several third-party Kodi-addon developers received threatening letters in the mail and on top of that ACE filed lawsuits against three vendors of alleged pirate streaming boxes.
Their show of force hasnt gone unnoticed. It triggered some developers and sellers to lay low or move out of the game entirely. At the same time, fully-loaded pirate boxes are now harder to find at ACE member Amazon, which has removed tens of thousands of listings.
These boxes, which ship with a built-in media player as well as pirate addons, were not always hard to find though.
In fact, Dragon Box, which is now being sued by Amazon and the others, was previously sold on Amazon. This is perhaps what prompted the company to argue as a defense that it had Amazons implied authorization to promote and sell the device.
Clearly, these Dragon Boxes have now been stripped from Amazons inventory, but its still not hard to find several alleged piracy inducing items there today.
For starters, there are still hundreds if not thousands of cheap media players for sale. While these may be perfectly legal, reviews of Amazon members show, sometimes with screenshots, how these can be easily set up to run pirate addons.
Arguably, without 24/7 moderation this is hard to avoid. After all, people may also buy a PC on Amazon and recommend people to bookmark The Pirate Bay. Perhaps were nitpicking.
What may be more problematic for Amazon is the widespread availability of Kodi tutorials. While Kodi is perfectly legal, some of these books go into detail on how to add pirate addons. The same tools Amazon is suing Tickbox, Set TV, and Dragon Box over.
Do you want to install Area 51 IPTV or Set TV on your Kodi and Amazon Fire TV Stick or Fire TV? one guide mentions, referencing Set TV...
These findings are disturbing. Suicide is one of the top 10 causes of death in the US right now, and its one of three causes that is actually increasing recently, so we do consider it a public health problem and something that is all around us, Schuchat said. The other two top 10 causes of death that are on the rise are Alzheimers disease and drug overdoses, she noted.
Suicide rates increased by 25% across the United States over nearly two decades ending in 2016, according to research published Thursday by the US Centers for Disease Control and Prevention. Twenty-five states experienced a rise in suicides by more than 30%, the government report finds.
More than half of those who died by suicide had not been diagnosed with a mental health condition, said Dr. Anne Schuchat, principal deputy director of the CDC.
Summary: Refusing to let go or leave behind an opportunity to bash patent invalidations, the patent microcosm just keeps bringing up Berkheimer v HP ad infinitum
When the Federal Circuit delivered a judgment on Berkheimer the Patent Trial and Appeal Board (PTAB) did not seem to mind as much as the patent extremists minded; Berkheimer just wasnt a very major case, so Iancu's comments revealed whose side he was on. Watchtroll says that the USPTO asks Federal Circuit to Vacate, Remand 101 Case to Board in Light of Berkheimer, but as we noted earlier today (and will show later today), this is the exception rather than the norm. Theyre cherry-picking. Berkheimer is very rarely brought up in todays patent cases (rulings/opinions/determinations/judgments/arguments).
A week and a half ago (on May 31st) there was a case related to this. Dechert LLP was trying to pull a Berkheimer (we say 'pull', but they say things like Berkheimer effect) in order to shed uncertainty and doubt about many decisions to invalidate patents at the Patent Trial and Appeal Board as well as the Federal Circuit. From their summary:
The United States Court of Appeals for the Federal Circuit refused rehearing en banc of two significant decisions regarding patent-eligibility under 101 (Aatrix and Berkheimer) on May 31, with a majority of active judges on the court affirming that the patent-eligibility inquiry, though a question of law, implicates subsidiary questions of fact. The effect of these cases will be to make it substantially more difficult to invalidate paten...
Juliian C'estMoi joins our blog team with the post "Study proposes a new way to reverse the aging process".
Joe Manchin, the senior Senator from West Virginia, has inserted language in the FY19 Transportation, Housing and Urban Development, and Related Agencies appropriations bill that will force Amtrak to employ at least one ticketing agent in every state that it serves.
His reasoning? "Amtrak has told me that most of their sales are now online, but West Virginians buy far more tickets at the Charleston station than most places around the country. That's not surprising, as nearly 30% of West Virginia is without internet access, and mobile broadband access is also difficult in my state's rugged, mountainous terrain, making online ticket sales difficult."
Read more of this story at SoylentNews.
Via: EFF: The U.S. Department of Homeland Security (DHS) is quietly building what will likely become the largest database of biometric and biographic data on citizens and foreigners in the United States. The agencys new Homeland Advanced Recognition Technology (HART) database will include multiple forms of biometricsfrom face recognition to DNA, data from questionable sources, 
A Battistelli era patent
Summary: What corporate media and the mainstream speak of in relation to Apple and what more niche bloggers pay attention to, serving to highlight a decline in patent quality at the European Patent Office (EPO)
LAST weekend we wrote about Zeroclick, LLC v Apple, Inc. We took note of the relation to a very malicious patent troll, Erich Spangenberg. Days later Watchtrolll wrote about this case as well, adding virtually no new information.
But Apple remains in headlines (about patents) mostly because of its own battles against Android (and by extension Linux). Professor Michael Rischs analysis of Apple v Samsung is only days old and it speaks of the massive damages of ~$533,000,000. Rischs views:
Ive done a few interviews about the latest Apple v. Samsung design patent jury verdict, but journalistic space means I only get a couple sentences in. So, I thought I would lay out a couple points I see as important. Well see if they hold up as predictions.
Theres been a lot written about the case, so I wont rehash the epic story. Heres the short version. The design patent law affords the winning plaintiff all of the profits on the infringing article of manufacture. The Supreme Court ruled (reversing about 100 years of opposite practice) that the article of manufacture could be less than the entire accused device for sale. Because the original jury instructions did not consider this, the Court remanded for a determination of what the infringing article of manufacture was in this case (the design patents covered the shape of the phone and the default screen). The Federal Circuit remanded, and the District Court decided that, yes, in fact, the original jury instructions were defective and ordered a retrial of damages.
The District Court a...
A new approach to fight the aging process: rejuvenating the nuclear membrane.
A new discovery about the effects of aging in our cells could allow doctors to cure or prevent diabetes, fatty liver disease and other metabolic diseases and possibly even turn back the clock on aging itself.
The new finding from the University of Virginia School of Medicine suggests that fatty liver disease and other unwanted effects of aging may be the result of our cells nuclei the compartment containing our DNA getting wrinkly. Those wrinkles appear to prevent our genes from functioning properly, the UVA researchers found.
Theres no wrinkle cream for nuclear membranes, but there is a tantalizing possibility: We might use viruses to smooth the membranes surfaces and restore the cells to functioning as they did in the glow of youth.
The K40 laser cutter has become ubiquitous in hackerspaces and well-equipped home workshops over the past few years, as a relatively inexpensive introduction to laser cutting and a machine that is readily hackable. Tokyo Hackerspace have one, but sadly their laser tube failed after relatively little use. Replacing a laser tube might be a routine component change for some readers, but its still worth looking at in some detail.
Their tube had failed at its output lens cooling cap, a component that is glued onto the end of the tube rather than bonded, and which had snapped off. There had been no mechanical stress upon it, but it was found that the arrangement of their cooling system caused it to drain between uses and thus air bubbles could accumulate. The resulting cooling inefficiency caused enough thermal stress for the bond between the tube and the end piece to fail.
The in-depth analysis of what caused the failure and step-by-step description of the procedure should be of interest to any K40 owner. Little things such as ensuring that the tube is rotated to the right angle for all air bubbles to make their way out of it, or making sure that when the pump is switched off the water isnt all pulled out of it by gravity seem obvious, but these are traps that will have caught more than one K40 owner.
What did they find out?
NASAs Curiosity rover has uncovered the best evidence yet that life may have once existed on Mars.
In two separate studies on data collected by the Mars rover over the last few years, scientists identified an abundant source of organic matter in an ancient lakebed, and traced some of the planets atmospheric methane to its roots.
The groundbreaking results will help to guide the search for microbial life and improve our understanding of seasonal processes on Mars.
New video from Undoing Aging 2018: Matthew Scholz, founder and CTO of Immusoft, on their work developing a breakthrough platform for treating a variety of genetic diseases.
Accelerating rejuvenation therapies to repair the damage of aging. Berlin, March, 15 17.
Hidden in the bones of ancient humans lies evidence of diseases that continue to distress people today. Recently, the examination of two 3,800-year old skeletons revealed the presence of a Yersinia pestis strain, famously the bacterium that causes plague. This strain is now the oldest of its kind sequenced to date, and suggests that the devastation that is the bubonic plague has a Bronze Age origin.
The discovery, published Friday in Nature Communications, pushes back the proposed age of the bubonic plague by 1,000 years. It also adds to the understanding of a disease that is still reported between one and seven times per year in the United States, despite its more ancient reputation: In the U.S. 80 percent of plague cases have been in the bubonic form. Although its been present throughout much of recorded history it was the drive behind some of humanitys deadliest pandemics including the Justinian Plague and the Black Death the origin and age of the disease have remained largely a mystery.
Contrary to previous studies suggesting that Y. pestis was unable to cause disease during that time, we provide evidence that bubonic plague has been affecting humans for at least the last 4,000 years, study co-author Maria Spyrou tells Inverse.
In spite of fee hikes, inter partes reviews (IPRs) are still up
Summary: The United States is saying goodbye to a lot of the nuisance which held back development of good products; theres meanwhile a reported surge in patent litigation in China (up as much as 85% in Guangdong)
The Patent Trial and Appeal Board (PTAB) is seeing work being shifted to it from what otherwise might have been court battles. This is good because it keeps disputes within the realms of the USPTO, hence less expensive (favours the interests of relatively small firms which are easy target/prey to trolls). Attempts to use the Supreme Courts SAS Institute v Iancu to slow down PTAB (giving it more workload) arent succeeding. The patent maximalists have just said this:
Chief Judge Ruschke reveals 44% of pending cases were not instituted on all grounds and that the Board has already granted more than a dozen extensions to trials in response to SAS
PGS owns a patent on certain techniques for marine seismic surveying.
In November 2014, WesternGeco challenged the validity of PGSs patent at the Patent Trial and Appeal Board (PTAB). The PTAB instituted IPR on some, but not all, of the PGS patents claims. WesternGeco settled out of the IPR, but the PTAB continued the IPR. In June 2016, the PTAB invalidated some of the claims on which it had instituted the IPR.
PGS appealed the PTABs final decisio...
A breakthrough stem cell treatment that promises the first effective cure for heart disease will be offered to British patients this year, The Sunday Telegraph can reveal.
Hundreds of thousands stand to benefit after regulators approved a major trial of the regenerative drug capable of shrinking fatal scar tissue which follows a heart attack.
The off-the-shelf therapy, which can be harvested for thousands of recipients from one healthy donor, will begin being administered to patients at Londons Royal Brompton Hospital in November.
IBM and the Department of Energys Oak Ridge National Laboratory have revealed the worlds most powerful and smartest scientific supercomputer. Known as Summit, IBM says that its new computer will be capable of processing 200,000 quadrillion calculations per second. To put that into perspective, if every person on Earth did a single calculation per second, it would take 305 days to do what Summit does in a single second. Assuming those numbers are accurate, that would make Summit the worlds fastest supercomputer. It would also mark the first time since 2012 that a U.S. computer held that title.
Summit has been in the works for several years now and features some truly impressive specs. According to Tech Crunch, the computer will feature 4,608 compute servers, 22 IBM Power9 chips and six Nvidia Tesla V100 GPUs each. In addition, the machine will feature more than 10 petabytes of memory. As the Nvidia GPUs attest, this machine will be primarily used for the development of artificial intelligence and machine learning. In addition to the work on A.I., Summit will also be used for research into energy and other scientific endeavors at Oak Ridge.
IBM was the Department of Energys general contractor for the Summit project, but it also had the help of several other partners within the tech industry. The GPUs were provided by Nvidia, which remains one of the leaders in cutting-edge GPU development. Mellanox and Redhat were also brought on to work on the development of Summit.
By Didyktile, licensed under the Creative Commons Attribution-Share Alike 4.0 International license.
Summary: Innovation in software proceeds at a rapid pace, and does not need the encouragement of patents, explains Markham
The former Governator at the Mozilla Corporation, Gervase Markham (the programmer, not the poet), has something to say about software patents. In 2006, according to Wikipedia, he won a Google-OReilly Open Source Award as Best Community Activist [...] and has been undergoing treatment for metastatic adenoid cystic carcinoma.
As we have stressed so many times before, almost every software developer is against software patents.We were very saddened to learn some months ago that his time alive might be very limited. His words about software patents are therefore more critical/important to preserve.
Spotted via the blog (in Planet Mozilla) of the developer, Gervase Markham, was this piece titled A Case for the Total Abolition of Software Patents (later mentioned in Soylent News as well). A little while back, it says, I wrote a piece outlining the case for the total abolition (or non-introduction) of software patents, as seen through the lens of promoting innovation. Few of the arguments are new, but the Narrow Road to Patent Goodness presentation of the information is quite novel as far as I know, and may form a good basis for anyone trying to explain all the possible problems with software (or other) patents.
From the introduction:
Very few software patents make it down the road to patent goodness. The vast majority cost the company money to file and then lie gathering dust, acting only to provide a vague chilling effect on innovation in that area for those brave enough to do a patent search. A few become famous and tie up an enormous amount of industry and lawyer time and m...
This small city state could become the second countryafter the United Kingdomto explicitly legalize mitochondrial replacement therapy (MRT), a controversial assisted reproduction technique that allows women who are carriers of some rare genetic disorders to give birth to healthy babies.
Members of the Singaporean public and religious groups have until 15 June to provide their feedback about MRT to the Bioethics Advisory Committee (BAC). Based on its findings, a 13-member BAC review committee will make formal recommendations to the government later this year about whether to legalize the technology.
"Our position is to keep a close watch on what happens in the U.K., to track the U.K. experience, and to learn from what they have done," says Oi Lian Kon, who studies human genetics at the National Cancer Centre Singapore and is leading the BAC review group.
MRT is used to address devastating genetic diseases that arise from abnormalities in the DNA in mitochondria, the cell's power sources, and that commonly affect energy-intensive organs such as the brain and heart, as well as muscles. Children inherit mitochondria only from their mothers; replacing faulty mitochondria in an egg or embryo with normal ones from a donor can result in healthy babies. But it also means that offspring will bear DNA from three "parents," which makes MRT a controversial procedure.
Panel Gives Tentative Endorsement to Three-Person IVF
Newcastle University Study Verifies Safety of Three-Person IVF
First Three-Person Baby Born Using Spindle Nuclear Transfer
Baby Girl Born in Ukraine Using Three-Parent Pronuclear Transfer Technique
The intent of the attackers was to sabotage hundreds of computers at the Banco de Chile while they were attempting to breach the real target, the banks SWIFT money transferring system.
Causing a broad outage, the attackers aimed at distracting the internal IT staff while carrying our the cyberheist.
The attempted attack took place on May 24, as result, many systems at several of its branches were inoperable.
May 24, 2018, Banco de Chile reports that today it detected the presence of a fault that affected our normal attention in branches, telephone banking and some specific services. reads the security advisory published by the company,
This generated the activation of our contingency protocol designed to maintain the continuity of the services, and in no case was the security of the products and transactions of our clients affected.
Initial investigation conducted by the bank revealed that the bank systems were infected by a malware.
After an exhaustive investigation, it was determined that the origin of the detected fault was a virus, presumably from international networks, which directly affected Banco de Chiles work stations, such as an inn in the offices and terminals of our executives and cashier personnel, among others, causing difficulties in branch service and telephone banking. reads the announcement published by the bank on May 28.
Analyzing the images posted online by bank employees, it is possible to verify that the infected machine where hit by a malware that wiped their hard drives Master Boot Records (MBRs).
The Soviet-era 490IP1 LED. The digit is a mere 2.5 mm in height. Pictured with the Texas Instruments TIL306. [image: industrialalchemy.org]Its easy to assume that older components will be less integrated and bulkier than we might otherwise expect. Then something seems ahead of its time, like the teeny-tiny 490IP1 LED which was produced in the former Soviet Union. [AnubisTTP] obtained and shared images of this tiny integrated single digit LED display in which the number measures a scant 2.5 mm tall; in production it was made easier to read with an external bubble lens magnifier clipped to the outside. The red brick the 490IP1 is pictured with is the Texas Instruments TIL306, a relatively normal sized DIP component with similar functionality.
The 490IP1 is called an intelligent LED display because the package contains a decade counter and driver circuitry for the integrated seven-segment LED digit, complete with a carry signal that meant multip...
The best news of the week with Security Affairs.
Let me inform you that my new book, Digging in the Deep Web is online
Once again thank you!...
|Crooks included the code for CVE-2018-8174 IE Zero-Day in the RIG Exploit Kit|
|Impervas research shows 75% of open Redis servers are infected|
|Microsoft reportedly acquires the GitHub popular code repository hosting service|
|North Korea-Linked Covellite APT group stopped targeting organizations in the U.S.|
|NYT: Facebook APIs gave device makers deep access to user data. FB disagrees|
|Thousands of organizations leak sensitive data via misconfigured Google Groups|
A new study in Conservation Physiology, published by Oxford University Press, reveals that white shark activity increases dramatically when the animals are interacting with cage-diving operators.
In recent decades, wildlife tourism has rapidly expanded and is one of the fastest growing sectors of the tourism industry. Ecotourism opportunities to cage-dive with white sharks, large marine predators, are available in Australia, South Africa, the United States of America, Mexico, and New Zealand, with up to seven companies operating simultaneously in one site.
Previous studies have shown that wildlife tourism can change behavior of animal species by altering their habitats or eating patterns. How these changes affect the health of individual animals or animal populations is unclear.
The study shows that white sharks are more active and likely use more energy when interacting with tourism operators compared to other situations (e.g. when operators are absent), raising questions about the behavioral changes such tourism may be causing.
The researchers tracked ten white sharks at South Australia's Neptune Islands with devices for nine days, finding that the increased movement when sharks are interacting with cage-diving operators results in overall dynamic body acceleration, a proxy for activity, 61% higher compared to other times when sharks are present in the area.
[...] "Spending time interacting with cage-diving operators might distract sharks from normal behaviors such as foraging on natural, energy-rich prey like pinnipeds," Huveneers added.
[...] This study indicates that wildlife tourism may change the activity levels of white sharks and calls for an understanding of the frequency of shark-tourism interactions to appreciate the impact of ecotourism on this species fitness.
Read more of this story at SoylentNews.
Takayuki Sugano joins our blog team with the post "MIT fed an AI data from Reddit, and now it thinks of nothing but murder".
Everyone knows about the billionaires buying up rural land in New Zealand. Theyre not the only ones. CERN (The European Organization for Nuclear Research) is getting in on the act too. Obviously, I expect to receive many nothing-to-see-here emails, but CERN is very strange. Also, I wish Bruce Cathie was still alive. Via: Stuff: The 
The point of the experiment was to show how easy it is to bias any artificial intelligence if you train it on biased data. The team wisely didnt speculate about whether exposure to graphic content changes the way a human thinks. Theyve done other experiments in the same vein, too, using AI to write horror stories, create terrifying images, judge moral decisions, and even induce empathy. This kind of research is important. We should be asking the same questions of artificial intelligence as we do of any other technology because it is far too easy for unintended consequences to hurt the people the system wasnt designed to see. Naturally, this is the basis of sci-fi: imagining possible futures and showing what could lead us there. Issac Asimov gave wrote the Three Laws of Robotics because he wanted to imagine what might happen if they were contravened.
Even though artificial intelligence isnt a new field, were a long, long way from producing something that, as Gideon Lewis-Kraus wrote in The New York Times Magazine, can demonstrate a facility with the implicit, the interpretive. But it still hasnt undergone the kind of reckoning that causes a discipline to grow up. Physics, you recall, gave us the atom bomb, and every person who becomes a physicist knows they might be called on to help create something that could fundamentally alter the world. Computer scientists are beginning to realize this, too. At Google this year, 5,000 employees protested and a host of employees resigned from the company because of its involvement with Project Maven, a Pentagon initiative that uses machine learning to improve the accuracy of drone strikes.
Norman is just a thought experiment, but the questions it raises about machine learning algorithms making judgments and decisions based on biased data are urgent and necessary. Those systems, for example, are already used in credit underwriting, deciding whether or not loans are worth guaranteeing. What if an algorithm decides you shouldnt buy a house or a car? To whom do you appeal? What if youre not white and a...
After years of talk, Tor may finally be integrated with the main Firefox browser soon:
The Tor Project announced that it's working with Mozilla to integrate Tor into Firefox. Eventually, this should completely eliminate the need for the Tor Browser, as most of its features would be merged into Firefox's new "super-private mode."
Despite this, the Tor Project developers said that it takes a lot of time to rebase Tor Browser patches to new versions of Firefox. This is why Mozilla has started integrating Tor's patches into Firefox on its own through the "Tor Uplift Project."
Firefox has also adopted new security features from the Tor Browser such as first party isolation (which prevents cookies from tracking you across domains) and fingerprint resistance (which blocks user tracking through canvas elements). However, first party isolation is off by default in Firefox and fingerprint resistance can break some websites. You can enable first party isolation in about:config or by installing this add-on for it.
[...] The developers said all these features would enable a "real" private mode in Firefox, which could completely replace the need for the Tor Browser to exist. This "super-private mode" could be used by hundreds of millions of users eventually, which is why Mozilla first needs to ensure that the Tor network can scale with such usage. That means more people will need to run Tor relays. Mozilla may be able to help here by donating money to nonprofits that can run Tor relays.
Could this be the way to get Firefox above 10% market share (except that if it's done correctly, nobody will be able to measure it)?
If you are building a robot to fight fires, why not use the water that you are fighting fires with to propel your robot? That seems to be the idea behind the Dragon Fire Fighting robot built by [Professor Satoshi Tadokoro], and his team at Tadohoku University. Their dragon robot is raised by the same directed jets of water that are used to stop the fire.
The three-meter robot also uses these jets of water to steer, moving the dragons head by firing water jets at angles. Im not sure how practical it really is, though: the jets that the robot uses to steer could do as much damage as the fire itself if it wasnt used carefully. The idea is to attach it to the end of a ladder or crane used by firefighters, so it can explore a building on fire without anyone having to step inside.
The robot was built as part of the Tough Robotics Challenge, a program that is looking to build robots that can help in disasters. Japan is one of the most disaster-prone places on the planet, thanks to earthquakes, nuclear meltdowns, and Godzilla attacks, so the program is looking to build robots that can help out. Some of the concepts they are looking at include cyborg animals, a listening drone that can help find survivors after a disaster using a sensitive microphone array and a serpentine robot that can map pipes and underground structures.
[Via TechXplore and Qes]
The EOS blockchain is set to launch after a live-streamed vote among Block Producers yesterday unanimously voted GO.
Study based upon human skeletal muscle aging, mutagenesis, and the role of #satellite cells.
A more comprehensive understanding of the interplay of stem cellintrinsic and extrinsic factors will set the stage for improving cell therapies capable of restoring tissue homeostasis and enhancing muscle repair in the aged.
Human aging has multiple effects on the human body. One of the effects of human aging is the reduction in skeletal muscle (SkM) function and a reduction in the number and activity of satellite cells (SCs), the resident stem cells. The whole genome of single SC clones of the leg muscle vastus lateralis from healthy individuals of different ages (2178 years) was analyzed, to study the specific connection between SC aging and muscle impairment. In healthy adult muscle rapid increase of SCs is consistent with the accumulation rate of 13 somatic mutations per genome per year. Mutations typically do not happen in SkM-expressed genes because they are protected. However, as mutations in exons and promoters increase, genes involved in SC activity and muscle function are targeted which results in aging. Exons are coding sections of an RNA transcript, or the DNA encoding it, that are translated into protein. Proteins are the synthesis of molecules. A change in of a single base pair that caused the substitution of a different amino acid in the resulting protein (missense mutation) that was propagated to the muscle and detected in association with SC mutations affecting the whole tissue. #Somatic mutagenesis in SCs as a result is the driving force in the age related decline of SkM function.
Satellite cells (SCs) are a heterogeneous population of stem and progenitor cells. These cells play an important role in the growth and development of myofiber. The enlargement, regeneration, and remodeling in skeletal muscle (SkM) is the pivotal role of satellite cells. Satellite cells are dormant until they become activated through exer...
The second release candidate of FreeBSD 11.2 is now available for testing...
Forensic pathologists who performed Adrian Lamo's autopsy were unable to determine how the 37-year-old died in March in Wichita. His autopsy report, released Wednesday afternoon, lists Lamo's cause and manner of death as "undetermined." That means that after a thorough examination of his body, results of toxicology testing and information about Lamo's life and last hours, there is nothing that points to a specific reason he died.
"Despite a complete autopsy and supplemental testing, no definitive cause of death was identified," Scott Kipper, deputy coroner and medical examiner at the Sedgwick County Regional Forensic Science Center, wrote in the report.
Previously: Adrian Lamo Dies at Age 37
Read more of this story at SoylentNews.
The Kennedy Space Center might be getting a major upgrade and expansion soon if Elon Musk gets his way. NASA published a plan submitted by SpaceX that dramatically reimagines the companys presence at KSC in Cape Canaveral, Florida. The plans include everything from a control tower that resembles a flying saucer to a rocket garden, showcasing futuristic designs that will expand the space companys footprint and potential influence within the US agency.
NASA published a draft environmental review for the proposed SpaceX Operations Area, as first reported by Florida Today on Friday. According to the document, SpaceX is seeking permission to build on a 67-acre patch of land about one mile north of KSCs visitor center complex.
SpaceX wants to build a 133,000-square-foot Falcon hangar to process the used boosters and other rocket materials that it recovers. The hangar would facilitate more efficient recycling of the materials which could potentially save the company billions of dollars per launch.
Perhaps youve noticed, but we here at Hackaday have a slight obsession with the over-engineered. One could fairly say theres a linear relationship between how likely we are to feature a project and how needlessly complex it is. That said, it isnt as if we are unable to appreciate a minimalist approach. Taking the scenic route can be a lot of fun, but sometimes its nice to just get where youre going before you run out of gas.
This very slick Spotify Now Playing display created by [Jon Ashcroft] is a perfect example of that principle. The hardware is so straightforward that its barely worth mentioning: a Raspberry Pi with a small HDMI display, tucked neatly into a photo frame. Nothing to get too excited about there. The real hook with this particular project is the software.
Using Spotifys excellent API, his software pulls down the current track information and stores it locally. It does this every ~4 seconds, checking to see if the track has chan...
I did the work to built my own Firefox primarily to fix a couple of serious regressions that couldn't be fixed any other way. I'll start with the one that's probably more common (at least, there are many people complaining about it in many different web forums): the fact that Firefox won't play sound on Linux machines that don't use PulseAudio.
In theory, ALSA sound is easy to enable. Build pptions in Firefox are controlled through a file called mozconfig. Create that file at the top level of your build directory, then add to it:
ac_add_options --enable-alsa ac_add_options --disable-pulseaudio
You can see other options with
Of course, like everything else in the computer world, there
were complications. When I typed
mach build, I
Assertion failed in _parse_loader_output: Traceback (most recent call last): File "/home/akkana/outsrc/gecko-dev/python/mozbuild/mozbuild/mozconfig.py", line 260, in read_mozconfig parsed = self._parse_loader_output(output) File "/home/akkana/outsrc/gecko-dev/python/mozbuild/mozbuild/mozconfig.py", line 375, in _parse_loader_output assert not in_variable AssertionError Error loading mozconfig: /home/akkana/outsrc/gecko-dev/mozconfig Evaluation of your mozconfig produced unexpected output. This could be triggered by a command inside your mozconfig failing or producing some warnings or error messages. Please change your mozconfig to not error and/or to catch errors in executed commands. mozconfig output: ------BEGIN_ENV_BEFORE_SOURCE... followed by a many-page dump of all my environment variables, twice.
It turned out that was coming from line 449 of python/mozbuild/mozbuild/mozconfig.py:
# Lines with a quote not ending in a quote are multi-line. if has_quote and not value.endswith("'"): in_variable = name current.append(value) continue else: value = value[:-1] if has_quote else value
So a professional critic is the last person youd expect to use copyright to try to squelch someone elses fair use rights. But thats exactly what happened last month, when James Grubb, a journalist from VentureBeat, used the Digital Millennium Copyright Act (DMCA) to censor a critic just for highlighting a few paragraphs of his work on Twitter.
On May 2, VentureBeats gaming section published Grubbs review of a forthcoming video game, Red Dead Redemption II. His opinions on the game werent shared by everyone, which is no surprise. Another video game critic, Jake Magee, took a shot at Grubb on Twitter, suggesting he only liked games that contained progressive political posturing. Alongside that criticism, Magee posted screenshots from Grubbs reviewhis goal was to show his followers the text that, as he saw it, supported his point.
That was apparently too much for Grubb, who promptly sent a DMCA notice to Twitter over the matter. Twitter soon slapped black boxes over the images that Magee had posted. It wasn't until several days later that the boxes were removed and the post was restored.
What justified this copyright takedown, in Grubbs view? First, Grubb said that Magee posted his entire article in a screenshot, a post which, in his view, crosses the line of acceptable fair use. Grubb also suggested that he wouldnt have taken legal action if Magee had simply included a link to his article.
[...] Journalists and critics should know the basics of fair use. Its a right that their work relies on. At the very least, before a professional critic uses the DMCA to have another critics material removed, a double-take is needed on fair use.
Read more of this story at SoylentNews.
Earlier this week, the Senate Homeland Security and Governmental Affairs Committee held a hearing on the Preventing Emerging Threats Act of 2018 (S. 2836), which would give the Department of Justice and the Department of Homeland Security sweeping new authority to counter malicious drones. Officials from both those agencies as well as the Federal Aviation Administration were present to discuss the governments current response to drones, and how it would like to be able to respond. Interestingly, both the Senators and the witnesses seem to agree that there are some large, unresolved constitutional questions in this bill. In light of those questions, EFF strongly opposes this bill.
Among other things, the bill would authorize DOJ and DHS to track, disrupt, control, seize or otherwise confiscate, or even destroy unmanned aircraft that pose a threat to certain facilities or areas in the U.S. The bill also authorizes the government to intercept or acquire communications around the drone for these purposes, which could be read to include capturing video footage sent from the drone. Most concerning, many of the bills key terms are undefined, but it is clear that it provides extremely broad authority, exempting officials from following procedures that ordinarily govern electronic surveillance and hacking, such as the Wiretap Act, Electronic Communications Privacy Act, and the Computer Fraud and Abuse Act.
Given the breadth of these proposed new powers, you would expect officials to have a strong case for passing the bill. But even after the hearing, its not clear why DHS and DOJ need any expanded authority to go after malicious drones. For example, the FAA already has the ability to impose public flight restrictions for non-military aircraft, including drones. S. 2836 would expand those restrictions to any covered facility or asset, but does not narrowly define what is covered. Instead, the Secretary of Homeland Security or the Attorney General can make that determination, on their own, without public input and without public notice. While Committeeairman Ron Johnson claimed that the new authority would not give DHS the authority to knock down drones flying around your backyard, thats not exactly true.
The authorities in S. 2836 are explicitly written to support DHS missions, including those from U.S. Immigration and Customs Enforcement and U.S. Customs and Border Protection. If your backyard is on the border in San Die...
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog