|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Good Old Downloads (GOD), a pirate site dedicated to gaming titles, announced on its website that it is shutting down with immediate effect, reports TorrentFreak.
For those unaware, GOD started as an alternative to GOG.com (formerly Good Old Games), that offered downloads of DRM-free games from GOG.com for people to pirate for free.
With more than million visitors visiting every month, the website started growing in popularity, which was ad-free and funded exclusively through donations.
According to a message posted on the site, the sites operators say that they are shutting down due to attacks on the platform from rival sites and the fear of being targeted with legal action.
The farewell message on the website reads:
We looked at other popular game piracy sites and discovered they were all filled with dozens of tracking scripts, infuriating ads (sometimes viruses) and mainly existed for the sole purpose of making money.
In response, we created a website without any of those things and improvements; it was easy to download files, a clean design, and dead links became a thing of the past with the voting system where you could vote to have games re-uploaded automatically. Best of all, almost everything was automated so you didnt have to rely on some person at their computer to upload files!
Which brings us to
Rival sites started to target us by making threats and claiming they have reported us to anti-piracy corporations. We also want to move on with our lives and enjoy other things without the constant fear of legal action breathing down our necks.
Although GOD did not disclose the names of the rival sites due to which they decided to call it quits, they did get back at some of the other game piracy websites by publishing an investigative report (PDF file) that suggests gamers which piracy sites are safe and which ones arent.
The purpose of this document is to summarize information found online that reveals the identity of the individuals that operate the gaming piracy websites igg-games.com (http://igg-games.com/) and gamestorrent.co (http://gamestorrent.co/) which profit from the distribution of illegal copies of video games via advertisements (pop-up ads, etc). At the time of publication, they are ranked 1,305 and 5,958 globally by Alexa.com, the report notes.
Interestingly, the site operators of...
Well, theres some great news for Virgin Galactic as it prepares for an attempt to send SpaceShipTwo to space. The Fdration Aronautique Internationale (FAI), which maintains records for aviation and spaceflight, is considering lowering the boundary of space from 100 to 80 km (62.1 to 47.7 miles).
Virgin Galactics SpaceShipTwo probably cant reach the 100 km boundary, which is also known as the Karman line.
FAI issued the following statement last week:
Summary: In the face of patent maximalists endless efforts to derail patent quality the tribunal keeps calm and carries on smashing bad patents
SUPPORTED by SCOTUS and the Federal Circuit, inter partes reviews (IPRs) at the Patent Trial and Appeal Board (PTAB) have long (years) applied 35 U.S.C. 101 to invalidate software patents erroneously granted by the Patent and Trademark Office (USPTO). PTAB combined with Alice has been a very possible emergence and development for software developers (programmers/coders), as opposed to patent trolls.
Attempts to undermine IPRs so as to save fake patents have not been successful.As the week begins we already see Janal Kalis mining USPTO documents, hoping to find some positive news. All he found was this exceptional case wherein The PTAB Reversed an examiners 101 Rejection of Claims for inventory management in a patent application owned by Baker Hughes: https://e-foia.uspto.gov/Foia/RetrievePdf?system=BPAI&flNm=fd2017006294-11-13-2018-1
We can assume that in all other new cases PTAB affirmed the examiners rejections or overturned (reversed) an acceptance.
Understandably, those who are accustomed to making a living from lawsuits arent happy. PTAB thwarts frivolous lawsuits.
Consider this new tweet which says: Do [Section] 101 panels exist? Director of TC 3600 Business Methods Tariq Hafiz provides priceless insights for effectively dealing with the @USPTO
So I told him that the term 101 panels is as meaningless a concept as dont spit chewing gum on the pavement department. Section 101 is the law and patents on Business Methods are bunk, no matter what the USPTO says. Its down to the courts, eventually. They have the final say, provided one can afford the long and arduous process.
Authored by Robert Jain last week was this PTAB headsup regarding Unified Patents and RPX (theres commonality in how they file IPRs a subject we covered several times before). Attempts to undermine IPRs so as to save fake patents have not been successful. As...
Apple CEO Tim Cook on Monday said he believes it is "right" and "moral" for technology companies to block hate speech and violent conspiracy theories from their platforms."At Apple, we believe that technology needs to have a clear point of view on...
Hillicon Valley: Nexstar to buy Tribune in $4.1B TV deal | Dozens join on to Paris cyber pact | Lawsuit claims Israeli spyware used to track Khashoggi | Mattis says Russia tried to interfere in 2018 midterms | Robot janitors coming to Walmart "IndyWatch Feed Tech"
Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...
Less than two months after a booster separation issue with a Soyuz rocket caused a dramatic, high-gravity landing, the Russian vehicle soared back into space on Monday at 6:31 ET (11:31 UTC). The launch from Kazakhstan, under mostly clear, blue skies, was nominal as each of the rocket's first, second, and third stages fired normally.
The launch sent NASA astronaut Anne McClain, Canadian David Saint-Jacques, and Russian Oleg Kononenko into space aboard their Soyuz MS-11 spacecraft. After making four orbits around the Earth, their Soyuz spacecraft is scheduled to dock with the Russian segment of the International Space Station at 12:35pm ET (17:35 UTC) Monday.
According to SpaceFlightNow.com the docking was successful.
Crew Vehicle Fails Mid-Flight, Astronauts OK
Soyuz Failure Narrowed Down to Collision Between Booster and Core Stage
NASA Confident in Soyuz, Ready for Crewed Launch in December
Roscosmos Completes Investigation into October Soyuz Failure, Finds Assembly Issue
Read more of this story at SoylentNews.
The BPF verifier is charged with ensuring that any given BPF program is safe for the kernel to load and run. Programs that fail to terminate are clearly unsafe, as they present an opportunity for denial-of-service attacks. In current kernels, the verifier uses a heavy-handed technique to block such programs: it disallows any program containing loops. This works, but at the cost of disallowing a wide range of useful programs; if the verifier could determine whether any given loop would terminate within a bounded time, this restriction could be lifted. John Fastabend presented a plan for doing so during the BPF microconference at the 2018 Linux Plumbers Conference.
Antoine Henri Becquerel (born December 15, 1852 in Paris, France), known as Henri Becquerel, was a French physicist who discovered radioactivity, a process in which an atomic nucleus emits particles because it is unstable. He won the 1903 Nobel Prize in Physics with Pierre and Marie Curie, the latter of whom was Becquerels graduate student. The SI unit for radioactivity called the becquerel (or Bq), which measures the amount of ionizing radiation that is released when an atom experiences radioactive decay, is also named after Becquerel.
Becquerel was born December 15, 1852 in Paris, France, to Alexandre-Edmond Becquerel and Aurelie Quenard. At an early age, Becquerel attended the preparatory school Lyce Louis-le-Grand, located in Paris. In 1872, Becquerel began attending the cole Polytechnique and in 1874 the cole des Ponts et Chausses (Bridges and Highways School), where he studied civil engineering.
Last week Chinese researchers rocked the world with reports that twin babies whose genes the scientists edited prior to birth had been born, the product of secret experiments that are being widely decried as unethical. Even as that story plays out, it is true that CRISPR gene editing is already being used in humans, in ways that illustrate just how unethical this recent use was.
Patients parents have been emailing me a lot, says Hye Young Lee, a researcher at the University of Texas San Antonio whose work looks at alternative delivery methods for CRISPR. Lee says she normally gets a few emails a month from the parents of the patients she works with, but that the number of emails went up recentlyin relation, she suspects, to the news of the CRISPR babies, which is creating the illusion that CRISPR and other gene editing techniques are ready for extensive use in humans.
The scientific communitys current consensus is that theyre far from being at that stageand its impossible to know now when or if they will be. But gene editing is being used in adult humans, to early trials to treat genetic diseases. In terms of gene editing for adults, I know that there are things going on, Lee says, but its nothing like this weeks news. Although her own work is at least a few years away from being ready for human testing, there are some cautiously progressing trials at drug companies using CRISPR in adult humans who have diseases that are the result on mutations in a single gene.
So far, robots have primarily been developed to fulfill utilitarian purposes, assisting humans or serving as tools to facilitate the completion of particular tasks. As robots become more human-like, however, this could pose significant challenges, particularly for robots built to engage with humans socially.
Humans have used sex dolls as inanimate objects for sexual pleasure throughout history. Animated sex robots, social robots created to meet humans needs for sex and affection, offer more. Due to recent developments in robotics and AI, sex robots are now becoming more advanced and human-like. Purchasers can have them customised both in appearance and in how they speak and behave to simulate intimacy, warmth and emotion.
Currently, sex robots are inanimate things, able to simulate but not engage in mutual intimacies. In the future, however, technological advances might allow researchers to manufacture sentient, self-aware sex robots with feelings, or sexbots. The implications of the availability of sexbots as customisable perfect partners for intimate relationships with humans are potentially vast.
Posted by Salvatore Bonaccorso on Dec 03Hi
Qatar plans to leave OPEC in January, shaking up the alliance of oil-producing nations and furthering its dispute with Saudi Arabia. Qatar made the announcement on Monday the same day it informed OPEC.
Qatar's Energy Minister Saad al-Kaabi said the small Persian Gulf country will leave OPEC because it wants to focus on natural gas a sector in which Qatar is a world leader. But the move also draws another line of division with Saudi Arabia, the only country with which Qatar shares a land border.
Saudi Arabia cut diplomatic ties with Qatar in June of 2017, in a dramatic move that was matched by Egypt, the United Arab Emirates and others. Since then, Saudi Arabia has maintained a boycott against Qatar, a country that has sometimes pursued its own foreign policy goals against the will of its fellow Sunni states.
[...] Qatar's exit from the Organization of Petroleum Exporting Countries will become official on Jan. 1, 2019, Kaabi said at a news conference in Doha Monday. The country will still attend the group's winter meeting in Vienna, which is scheduled to begin on Thursday.
Read more of this story at SoylentNews.
Most of us have fond memories of the Etch-a-Sketch from childhood. [Potent Printables] wanted to update the designs so he 3D printed an XY carriage for a stylus that works with a cell phone drawing program. You can see the video below and the 3D model details on Thingiverse.
The design is fun all by itself, but it also gave us a few ideas. For one thing, if you motorized it you could make some pretty clever drawing toys. But there could be a more practical use, too.
Youd have to automate the Z-axis as well, but if you did, this wouldnt be a bad test jig for mobile application developers. The stylus could simulate finger poking and dragging while screen captures verified proper operation. Of course, there are other ways to do this, but it would be pretty neat to see a mechanized finger tracing out tests on a new user interface.
Besides that, its just a fun project that should be easy enough to scale up to use an old tablet thats gathering up dust and make it useful again. In addition, the first part of the video shows how the real McCoy works, which is always fun.
Plants often get short shrift in conservation circles, but machine learning could help botanists save tens of thousands of species.
As the OSIRIS-REx spacecraft arrives at its target asteroid Bennu, scientists on the ground prepare for a new bounty of planetary samples.
Complementing our many recent bare-metal Linux distribution comparison benchmarks, here is a fresh look at how the various high profile Linux distributions are running on Amazon's Elastic Compute Cloud (EC2). For this round of testing on their current-generation M5 instance type, Amazon Linux 2, Clear Linux 26600, Debian 9.6, Red Hat Enterprise Linux 7.6, SUSE Linux Enterprise Server 15, and Ubuntu 18.04 LTS were benchmarked.
CentOS has released CentOS Linux 7.6 (1810). "Updates released since the upstream release are all posted, across all architectures. We strongly recommend every user apply all updates, including the content released today, on your existing CentOS Linux 7 machine by just running 'yum update'." See the release notes for more information.
The pioneering social robot company has sold its IP and assets, meaning that this is pretty much the end
In some very sad but not at all surprising news considering how things have been going for social robots lately, The Robot Report is, er, reporting that Jibo Inc. has completed the sale of its assets and intellectual property to a New Yorkbased investment management firm, which I suspect is not going to be using Jibos IP to build robots.
Weve known for a while that Jibo (the company) was having some challenges both in selling robots and meeting expectations. Layoffs followed, and back in June, a Boston Globe reporter stopped by Jibos Boston office to find it deserted and full of packing material and sold furniture.
New Jibos havent been available to purchase for months, although owners reported getting software updates as recently as August. According to The Robot Report, however, Jibo has now sold all of its IP and assets to SQN Venture Partners, which is probably just going to try to sell them off for as much money as possible. (We reached out to Jibo founder Cynthia Breazeal last week to ask about the SQN deal and the fate of all the Jibo robots out there. Well update the post if we hear back.)Photo: Jibo Cynthia Breazeal and Jibo.
A few more details from The Robot Report:
Jibo also filed a Foreign Certificate of Withdrawal with the Commonwealth of Massachusetts. Jibo was a Massachusetts-based company that was incorporated in Delaware. By filing the form, Jibo acknowledges it is not transacting business in the commonwealth and surrenders its authority to transact business in the commonwealth.
The form was submitted by the Kallander Group, a Hudson, MA-based company that in part specializes in comprehensive trust services for corporate restructuring and dis...
Tumblr on Monday announced it will ban all adult content from its website, a move that comes just two weeks after it acknowledged child pornography had found its way onto the platform.The microblogging and social networking site said in a statement&...
A first for video games.
Nvidia has announced its $2,500 Turing-based Titan RTX GPU. It is said to have a single precision performance of 16.3 teraflops and "tensor performance" of 130 teraflops. Double precision performance has been neutered down to 0.51 teraflops, down from 6.9 teraflops for last year's Volta-based Titan V.
The card includes 24 gigabytes of GDDR6 VRAM clocked at 14 Gbps, for a total memory bandwidth of 672 GB/s.
Drilling a bit deeper, there are really three legs to Titan RTX that sets it apart from NVIDIA's other cards, particularly the GeForce RTX 2080 Ti. Raw performance is certainly once of those; we're looking at about 15% better performance in shading, texturing, and compute, and around a 9% bump in memory bandwidth and pixel throughput.
However arguably the lynchpin to NVIDIA's true desired market of data scientists and other compute users is the tensor cores. Present on all NVIDIA's Turing cards and the heart and soul of NVIIDA's success in the AI/neural networking field, NVIDIA gave the GeForce cards a singular limitation that is none the less very important to the professional market. In their highest-precision FP16 mode, Turing is capable of accumulating at FP32 for greater precision; however on the GeForce cards this operation is limited to half-speed throughput. This limitation has been removed for the Titan RTX, and as a result it's capable of full-speed FP32 accumulation throughput on its tensor cores.
Given that NVIDIA's tensor cores have nearly a dozen modes, this may seem like an odd distinction to make between the GeForce and the Titan. However for data scientists it's quite important; FP32 accumulate is frequently necessary for neural network training FP16 accumulate doesn't have enough precision especially in the big money fields that will shell out for cards like the Titan and the Tesla. So this small change is a big part of the value proposition to data scientists, as NVIDIA does not offer a cheaper card with the chart-topping 130 TFLOPS of tensor performance that Titan RTX can hit.
Federal Communications Commission (FCC) Chairman Ajit Pai did not mislead lawmakers about a conversation with the White House counsel over the proposed Sinclair Broadcast Group and Tribune Media merger, the agency's watchdog said Monday.The Office...
Mass production has become hybridized with customization to allow for the production of unique goods at scale.
Not too long ago, in all but the most niche industries, consumer choice was largely limited to a handful of options created for mass production. If someone wanted, say, a hot pink sports car with lime green seats, they would probably have to settle for a customized base model. The low demand for such a unique style choice would translate to a preemptive cost for availability direct from the factory.
But times are changing, and in many areas mass production has become hybridized with customization to allow for the production of unique goods at scale. Strategies for mass customization give customers the freedom to choose desired options while still maintaining the cost-effective benefits of the conventional assembly line.
Figures 1 and 2: The first-generation Toyota Aygo, top, and the Peugeot 107, are essentially the same car. Both were produced at a joint-venture factory in the Czech Republic. Sources: Matthias93/CC BY-SA 3.0 and Vauxford/CC BY-SA 4.0
Mass Customization Strategies
Modularity is a strategy used by car manufacturers to introduce customization at the tail end of the mass production process. Different car models sharing identical components can be produced by identical processes right up until the final assembly, during which custom modules are added to give each model its unique look. The Czech Republic-based automotive manufacturing company TPCA is a joint venture that since 2005 has manufactured small Toyota, Peugeot and Citron models that share a common chassis, engine, transmission and electrics. Differences between the three models mostly consist of small cosmetic touches added during the final stages of production.
The same modular component approach has also been successful in other industries to allow personalized touches. Companies like Apple, for instance, allow customers to add or subtract a limited number of components to their base model computers, iPads, iPhones and smart watches when they place an order. Companies like IKEA offer ready-to-assemble furniture that can be customized with various options for fabric covering, leg type and wood stain color.
The greater the personalization abilities, the closer the end result comes to being bespoke a term traditionally associated with custom tailoring that indicates objects fully made-to-order. Products...
Mankinds fascination with airplanes is unbroken. Whether youre outside with your camera, getting an actual glimpse of the aircraft, or sitting at home with your RTL-SDR dongle and have a look at them from a distance, tracking them is a fun pastime activity. Provided, of course, that you are living close by an airport or in an area with high enough air traffic. If not, well theres always real-time tracking online to fall back to, and as [geomatics] will show you, you can build your own live flight tracking system with a few lines of Python.
As its usually the case with Python, a lot of functionality is implemented and readily available from external modules, which lets you focus on the actual application without having to worry too much about the details. Similarly, plenty of data can be requested from all sorts of publicly accessible APIs nowadays. If you are looking for a simple-enough example to get into both subjects with a real-world application, [geomatics] flight tracker uses cartopy to create a map using Open Street Map data, and retrieves the flight information from ADS-B Exchanges public API.
We have seen ADS-B Exchange mentioned a few times before, for example with this ESP8266 based plane spotter and its successor. And if youre more curious about the air traffic in your direct surroundings, its probably time for a DVB USB dongle.
Amazon on Monday briefly topped the list of Wall Street's most valuable companies, over Apple and Microsoft as the three battle for the top market value.The trio of tech giants have been hovering around the same market cap for weeks, with...
First launched just a decade ago, search engine DuckDuckGo is a goto tool for Internet users who value their privacy.
Unlike many competitors, the site doesnt keep a record of users IP addresses or other sensitive information.
The search engine also has a variety of useful features such as instant answers and bangs. The latter are particularly useful for people who want to use DuckDuckGo to search directly on other sites.
Typing !yt keyword will do a direct search on YouTube, for example, !w keyword goes to Wikipedia, and !torrentfreak keyword does a search on TorrentFreak. This library of bangs has been around for a long time and has grown to more than 10,000 over the years.
However, a few days ago, roughly 2,000 of these were removed. Interestingly, this included many bangs that link to torrent sites, such as The Pirate Bay, 1337x and RARBG. Similarly, bangs for OpenSubtitles, Sci-Hub and LibGen are gone too.
Initially, it was unclear what had happened, but after people started asking questions on Reddit, DuckDuckGo staff explained that this was part of a larger cleanup operation.
DuckDuckGo went through its bangs library and removed all non-working versions, as well as verbose ones that were not actively used. In addition, many pirate site bangs were deleted as these are no longer permitted.
Bangs had been neglected for some time, and there were tons of broken ones. As part of the bang clean-up, we also removed some that were pointing to primarily illegal content, DuckDuckGo staffer Tagawa explains.
The search engine still indexes the sites in question but it feels that offering curated search shortcuts for these sites in their service might cause problems.
Apparently, this wasnt a major issue when the bangs were first introduced. However, perhaps in part due to a changing perspective on the role of third-party intermediaries, DuckDuckGo sees potential liability issues now.
It may not seem like so at first blush, but it is very different legally if it is a bang vs. in the search results because the bangs are added to the product by us explicitly, and can be interpreted legally as an editorial decision that is actively facili...
This discovery could help us answer some of the largest conundrums in physics today. Scientists know that matter and antimatter were created in about equal proportions after the Big Bang, as the universe cooled and expanded, but they cant explain the asymmetry of matter and antimatter, or why antimatter, which annihilates anything it comes into contact with, didnt just wipe out all matter.
[W]e have yet to answer a central question of why didnt matter and antimatter, which it is believed were created in equal amounts when the Big Bang started the Universe, mutually self-annihilate? co-author Professor Mike Charlton said to Sci-News. We also have yet to address why there is any matter left in the Universe at all. This conundrum is one of the central open questions in fundamental science, and one way to search for the answer is to bring the power of precision atomic physics to bear upon antimatter.
I need to read a list of file names from a text file named input.txt and take action each file name. How do I read file names from a text file and say run /bin/foo command on each file? How do I read filenames from a text file and take certain action on those files?
The post Bash read file names from a text file and take action appeared first on nixCraft.
The role of high-precision test solutions is going to be crucial in early 5G chipset prototyping, development and device design validation.
The role of high-precision test solutions is going to be crucial in early 5G chipset prototyping, development and device design validation. The advent of 5G networks marks the most disruptive change in the mobile industry since the transition from analog to digital back in the early 1990s. Now add to this the relatively unknown millimeter wave (mmWave) technology that needs far more robust phase coherence due to wider signal bandwidths, and what is at hand is a brand new test frontier.
The 5G networks will employ a broad range of spectrum frequencies, including the popular 28 GHz and 39 GHz 5G mmWave bands. Here its worth noting that while LTE will be an integral part of 5G networks, the role of mmWave frequencies is likely to grow due to the availability of plentiful spectrum as well as aggregated channel bandwidth of 1 GHz and higher.
Figure 1: The mmWave bands available above 24 GHz that the FCC has proposed for mobile use. Source: National Instruments
At the same time, however, 5G mmWave frequencies (Figure 1) will require more sophisticated test solutions for chipsets, mobile devices, network infrastructures and cybersecurity. Thats because these airwaves travel at shorter distances and are more susceptible to radio propagation loss issues.
The commercialization of mmWave technology is accelerating amid the launch of the 5G New Radio (NR) standard, and this calls for a chronicle of major challenges that the traditional spectrum analyzer-based test solutions cannot manage efficiently and cost-effectively. This also calls for a sneak peek of test solutions that are viable from cost and design standpoints for the rapidly evolving mmWave 5G technologies.
The mmWave frequencies demand more sophisticated RF parametric measurements for signal gain, directivity, beamwidth and antenna efficiency. These RF parametric measurements become even more challenging because of 5Gs smaller device size and array size. Then, there are propagation loss issues at higher mmWave frequencies, where signal power can quickly diminish due to environmental conditions like rain or snow.
The antenna is especially a sensitive area i...
Graham Cluley Security News is sponsored this week by the folks at OneSpan. Thanks to the great team there for their support!
More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.
OneSpan is now giving you the chance to download its Financial Agreement Automation RFP Guide for Account Opening, Digital Lending and Leasing Automation.
Trillions of dollars in financial transactions are processed each year. These include credit agreements, loans, new account openings, mortgages, pensions and annuities.
Todays customer is looking for speed, ease and convenience. To meet these demands, financial institutions must offer fully digital experiences.
This guide is for financial institutions evaluating technology for agreement automation.
Agreement automation refers to the digitization of the customer agreement process for financial transactions including application data validation, digital identity verification, agreement signing and storage, and audit trail capture.
This guide will assist you in:
If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more info...
MX Linux is a desktop-oriented Linux distribution based on Debian's Stable branch and is a cooperative venture between the antiX and former MEPIS Linux communities. The project has released a new development snapshot, MX Linux 18 Beta1. "New and updated mx-apps: system-keyboard and system-locale options allow easy access....
With just a week left for this Congress, one of the weirdest bad copyright bills is back on the calendar. The Register of Copyrights Selection and Accountability Act would make the Register of Copyrights a presidential appointee, politicizing a role that should not be made a presidential pawn.
Currently, the Register of Copyrights is appointed by the Librarian of Congress, as the Copyright Office is part of the Library. This bill would take the appointment out of the hands of the Librarian and put it in the hands of the President.
The Register of Copyrights does a number of important, nonpartisan, non-political jobs. As the name implies, they register copyrightable material. But they are also charged with providing advice to Congress and information and assistance to others in the federal government on copyright. Its important to note that, except in rare, narrow circumstances, the Register of Copyrights does not make copyright policy. Congress does.
The Register of Copyrights does not do the same things the heads of executive departments and judges do. Picking someone for that job the same way those are pickedappointed by the President and a confirmation process in the Senatedoes not make sense for it.
Because the Register is charged with providing advice and information and not with making policy, making the job as apolitical as possible is a good thing. A Presidential appointee, chosen for adherence to the beliefs of the President, is more politicized, not less. A Presidential appointment also means more avenues of influence by special interests, including the major media and entertainment companies that continually seek to expand the scope of copyright for their own benefit, not for individual creators or users. The unusual (and possibly unconstitutional) procedure set out in the bill compounds this problem: the Register would be chosen by the President from a list of people compiled by the leaders of the House and Senate, who themselves may be beholden to the e...
The world's largest retailer is rolling out 360 autonomous floor-scrubbing robots in some of its stores in the U.S. by the end of the[sic] January, it said in a joint statement with Brain Corp., which makes the machines. The autonomous janitors can clean floors on their own even when customers are around, according to the San Diego-based startup.
Walmart has already been experimenting with automating the scanning of shelves for out-of-stock items and hauling products from storage for online orders. Advances in computer vision are also making it possible to use retail floor data to better understand consumer behavior, improve inventory tracking and even do away with checkout counters, as Amazon.com Inc. is trying to do with its cashierless stores. Brain's robots are equipped with an array of sensors that let them to[sic] gather and upload data.
"We can take anything that has wheels and turn it into a fully autonomous robot, provided that it can go slow and stopping is never a safety concern," said Brain Chief Executive Office Eugene Izhikevich. "And it's more than just navigation. It is to robots what Android operating system is to smartphones."
Amazon.com Inc. wants to sell alcohol at its planned new Amazon Go retail store in the Illinois Center. Seattle-based Amazon (Nasdaq: AMZN) applied for a liquor license from the city of Chicago this month, with "Amazon Retail LLC" applying for package goods liquor license at 111 E. Wacker Drive, floor 1, according to the city.
Amazon announced its fourth Chicago-area Am...
Scientists can now discover how the fine details of gene activity differ from one cell type to another in a tissue sample, thanks to a technique invented by Weill Cornell Medicine researchers.
The technique, described in a paper published Oct. 15 in Nature Biotechnology, will enable biologists to better understand the distinct molecular workings of different cell types in the body. It may also enable the improved understanding and treatment of diseases caused by abnormal gene activity.
An individual gene can say different things, and the true meaning often requires listening to entire phrases, rather than single words, said senior study author Dr. Hagen U. Tilgner, assistant professor of neuroscience in the Feil Family Brain and Mind Research Institute at Weill Cornell Medicine. Our new method essentially allows us to record complete phrases, called isoforms, that each gene expresses in each cell.
As far as computer architectures go, ARM doesnt have anything to be ashamed of. Since nearly every mobile device on the planet is powered by some member of the reduced instruction set computer (RISC) family, theres an excellent chance these words are currently making their way to your eyes courtesy of an ARM chip. A userbase of several billion is certainly nothing to sneeze at, and thats before we even take into account the myriad of other devices which ARM processors find their way into: from kids toys to smart TVs.
ARM is also the de facto architecture for the single-board computers which have dominated the hacking and making scene for the last several years. Raspberry Pi, BeagleBone, ODROID, Tinker Board, etc. If its a small computer that runs Linux or Android, it will almost certainly be powered by some ARM variant; another market all but completely dominated.
It would be a fair to say that small devices, from set top boxes down to smartwatches, are today the domain of ARM processors. But if were talking about what one might consider traditional computers, such as desktops, laptops, or servers, ARM is essentially a non-starter. There are a handful of ARM Chromebooks on the market, but effectively everything else is running on x86 processors built by Intel or AMD. You cant walk into a store and purchase an ARM desktop, and beyond the hackers who are using Raspberry Pis to host their personal sites, ARM servers are an exceptional rarity.
Or at least, they were until very recently. At the re:Invent 2018 conference, Amazon announced the immediate availability of their own internally developed ARM servers for their Amazon Web Services (AWS) customers. For many developers this will be the first time theyve written code for a non-x86 processor, and while some growing pains are to be expected, the lower cost of the ARM instances compared to the standard x86 options seems likely to drive adoption. Will this be the push ARM needs to finally break into the server and potentially even desktop markets? Lets take a look at what ARM is up against.
The Sacramento Countys Department of Human Assistance (DHA) is terminating its invasive automated license plate reader (ALPR) program, following an EFF investigation that found the agency was accessing driver data to investigate welfare recipients without enacting the basic civil liberties safeguards required by California law.
Over the last two years, DHA spent $10,000 to access a massive database of information about peoples driving patterns. Vigilant Solutions LEARN system includes billions of license plate scans, with time stamps and geolocation, collected by law enforcement agencies and private contractors using high-speed ALPR cameras. In addition to serving as a cloud storage service, LEARN also functions as an analytical tool that can be used to track vehicle owners in near real-time, reveal their travel history (such as where they park their cars), and identify cars that visit targeted locations. DHA does not own its own ALPR cameras, but instead has relied upon data shared by other entities to conduct benefits fraud investigations.
EFF exposed this location surveillance of low-income people in July, and the Sacramento Bee followed up with a report about it. Meanwhile, the Coalition of California Welfare Rights Organizations (CCWRO) demanded accountability from the county through a direct meeting and a formal letter.
As of Nov. 1 the agency cut off investigators from accessing the LEARN system. A single DHA staff member will have access to the system for auditing purposes until the contract with Vigilant Solutions expires in May 2019. The DHA director disclosed this good news in a letter to the CCWRO executive director, Kevin Aslanian.
A California state law passed in 2015 requires any agency that accesses ALPR data to implement a privacy and usage policy that is consistent with respect for individuals privacy and civil liberties. The policy must describe a process for regular audits. Also, agencies must document the purpose for every search of the data they conduct. EFF found that DHA fulfi...
Last month when the AMD Radeon RX 590 launched, it wasn't working on Linux to much surprise considering it's another Polaris refresh. Today there are new AMDGPU DRM kernel patches and firmware/microcode files that do allow the RX 590 now to work properly under Linux...
The Chinese scientist who claimed to have created the world's first gene-edited babies, He Jiankui, is missing after his former employers denied that he was detained over the weekend, the South China Morning Post reports.A...
The parent firm of bling retailers Jared and Kay Jewelers has fixed a bug in the Web sites of both companies that exposed the order information for all of their online customers.
In mid-November 2018, KrebsOnSecurity heard from a Jared customer who found something curious after receiving a receipt via email for a pair of earrings hed just purchased as a surprise gift for his girlfriend.
Dallas-based Web designer Brandon Sheehy discovered that slightly modifying the link in the confirmation email he received and pasting that into a Web browser revealed another customers order, including their name, billing address, shipping address, phone number, email address, items and total amount purchased, delivery date, tracking link, and the last four digits of the customers credit card number.
Sheehy said after discovering the weakness, his mind quickly turned to the various ways that crooks might exploit it.
My first thought was they could track a package of jewelry to someones door and swipe it off their doorstep, he said. My second thought was that someone could call Jareds customers and pretend to be Jared, reading the last four digits of the customers card and saying thered been a problem with the order, and if they could get a different card for the customer they could run it right away and get the order out quickly. That would be a pretty convincing scam. Or just targeted phishing attacks.
Concerned that his own information was similarly exposed, Sheehy contacted Jared parent company Signet Jewelers and asked them to fix the data exposure. When several weeks passed and Sheehy could still view his information and that of other Jared customers, he reached out to KrebsOnSecurity.
Scott Lancaster, chief information security officer at Signet, said the company did fix the problem for all future orders shortly after receiving a customers complaint. But Lancaster said Signet neglected to remedy the data exposure for all past orders until contacted by KrebsOnSecurity.
When a customer first brought this matter to our attention in early November, we fixed it for all new orders going forward, Lancaster said. But we didnt notice at the time that this applied to all past orders as well as future orders.
Lancaster said the problem affected only orders made online through jared.com...
I just love it when the reductionists are wrongagain. I can not help myself. bigsmile
University of Nebraska-Lincoln researchers have found revolutionary evidence that an evolutionary phenomenon at work in complex organisms is at play in their single-celled counterparts, too.
Species most often evolve through DNA mutations inherited by successive generations. A few decades ago, researchers began discovering that multicellular species can also evolve through epigenetics: traits originating from the inheritance of cellular proteins that control access to an organisms DNA, rather than genetic changes.
Because those proteins can respond to shifts in an organisms environment, epigenetics resides on the ever-thin line between nature and nurture. Evidence for it had emerged only in eukaryotes, the multicellular domain of life that comprises animals, plants and several other kingdoms.
CyberSaint Security released new product enhancements to the companys CyberStrong integrated risk management software platform that allows CISOs and executive management to align on enterprise-wide cybersecurity objectives. The new capabilities include automated executive risk, compliance, and data privacy and protection reports that allow CISOs to enhance their communication and decision making at the Board and C-Suite level, and take zero manual effort to prepare. According to Gartner, by 2020 all large enterprises will be asked More
The post CyberSaint Security enhances its CyberStrong Platform appeared first on Help Net Security.
That quantum mechanics is a successful theory is not in dispute. It makes astonishingly accurate predictions about the nature of the world at microscopic scales. What has been in dispute for nearly a century is just what its telling us about what exists, what is real. There are myriad interpretations that offer their own take on the question, each requiring us to buy into certain as-yet-unverified claims hence assumptions about the nature of reality.
Now, a new thought experiment is confronting these assumptions head-on and shaking the foundations of quantum physics. The experiment is decidedly strange. For example, it requires making measurements that can erase any memory of an event that was just observed. While this isnt possible with humans, quantum computers could be used to carry out this weird experiment and potentially discriminate between the different interpretations of quantum physics.
Every now and then you get a paper which gets everybody thinking and discussing, and this is one of those cases, said Matthew Leifer, a quantum physicist at Chapman University in Orange, California. [This] is a thought experiment which is going to be added to the canon of weird things we think about in quantum foundations.
Posted by Mathias Payer on Dec 03Hi there,
Via: MSN: Robots are coming to a Walmart Inc. near you, and not just as a gimmick. The worlds largest retailer is rolling out 360 autonomous floor-scrubbing robots in some of its stores in the U.S. by the end of the January, it said in a joint statement with Brain Corp., which makes the machines. 
After publishers sued Sci-Hub, Russian ISPs are now preventing users from accessing the valuable scientific data repository and paywall killer.
WATCH LIVE: NASAs Osiris-REx spacecraft is expected to arrive at a 1,640-foot wide, carbon-rich asteroid named Bennu to collect and return samples in hopes of learning more about the origins of life on Earth and perhaps elsewhere in the solar system.
Via: Defense One: How do you detect submarines in an expanse as large as the ocean? The U.S. military hopes that common marine microorganisms might be genetically engineered into living tripwires to signal the passage of enemy subs, underwater vessels, or even divers. Its one of many potential military applications for so-called engineered organisms, a 
Its a rare game that is able to bridge the gap between sports game fans and those that identify as hardcore gamers. Midway was able to bring those two groups onto common ground when they released NBA Jam to arcades in 1993. The game was an instant hit and was ported to 16-bit home consoles that same year. Compromises were made during those ports, so an attempt to make them more inline with the arcade release came in the form of NBA Jam: Tournament Edition a year later. However, in the heart of [eskayelle] NBA Jam: TE on the Super Nintendo didnt go far enough. Now they have released a ROM hack that completely reworks NBA Jam: TE, and its called the Double Z Mod.The original NBA Jam ball (courtesy of Steve Lin)
The concept behind the ROM hack was to bring about the NBA Jam game that fans deserved. All facets of pop culture from the early 90s were mixed in (not just former Presidents). According to the ROM hacks notes, some of the things that were packed into the mod include:
Assets from the or...
Adding to NVIDIA's busy Monday morning of announcing the TITAN RTX and open-sourcing PhysX, they also shipped their latest Vulkan beta driver support for Windows and Linux...
Intel has enjoyed a virtual monopoly in the server CPU arena for some time. However, AMD's EPYC series of processors, based on the latest iteration of Zen architecture, may change that. The first generation of these chipsets, Naples, managed to reduce Intel's market share to 99% shortly after its launch. This may sound less than impressive, but in a billion-dollar industry, it was possibly quite valuable to AMD.
The latest report on the server market by DRAMeXchange indicates that Intel's share is down to 98% by now. This represents a 100% improvement for AMD. Furthermore, the analysts estimate that the release of EPYC Rome-based silicon will result in further gains. They will ultimately result in a total market share of 5% for these CPUs by the end of 2019.
Intel is keeping AMD under 15%. For now:
Now it's easy to tell that Intel will still remain the dominant player in the market, retaining a 90-95% market share lead over AMD but Intel's Ex-CEO, Brian Krzanich, stated that his company wouldn't want AMD capturing 15-20% server market share. In fact, at the pace at which AMD is gaining their server market share, 15% doesn't really feel like a far cry from now.
[...] Looking at the market penetration r...
Security updates have been issued by Debian (nsis, openssl, poppler, and tiff), Fedora (dnsdist, drupal7, kernel, kernel-headers, kernel-tools, net-snmp, perl, php-Smarty2, and samba), Gentoo (connman, nagios-core, php, and webkit-gtk), Mageia (apache-mod_perl, kdeconnect-kde, and python-requests), Red Hat (rh-postgresql10-postgresql), and SUSE (kernel).
Days ahead of the FreeBSD 12.0 release, the long-ago-forked DragonFlyBSD is out with its very exciting 5.4 six-month feature update...
Via: BBC: Abandoned coal mines across the UK could be brought back to life as huge underground farms, according to academics. Mine shafts and tunnels are seen as the perfect environment for growing food such as vegetables and herbs. The initiative is seen as a way of providing large-scale crop production for a growing global 
Everyone starts their day with a routine, and like most people these days, mine starts by checking my phone. But where most people look for the weather update, local traffic, or even check Twitter or Facebook, I use my phone to peer an inch inside my daughters abdomen. There, a tiny electrochemical sensor continuously samples the fluid between her cells, measuring the concentration of glucose so that we can control the amount of insulin shes receiving through her insulin pump.
Type 1 diabetes is a nasty disease, usually sprung on the victim early in life and making every day a series of medical procedures calculating the correct amount of insulin to use for each morsel of food consumed, dealing with the inevitable high and low blood glucose readings, and pinprick after pinprick to test the blood. Continuous glucose monitoring (CGM) has been a godsend to us and millions of diabetic families, as it gives us the freedom to let our kids be kids and go on sleepovers and have one more slice of pizza without turning it into a major project. Plus, good control of blood glucose means less chance of the dire consequences of diabetes later in life, like blindness, heart disease, and amputations. And I have to say I think its pretty neat that I have telemetry on my child; we like to call her our cyborg kid.
But for all the benefits of CGM, its not without its downsides. Its wickedly expensive in terms of consumables and electronics, it requires an invasive procedure to place sensors, and even in this age of tiny electronics, its still comparatively bulky. It seems like we should be a lot further along with the technology than we are, but as it turns out, CGM is actually pretty hard to do, and there are some pretty solid reasons why the technology seems stuck.
The Optimizer Smart system could help millions of patients with congestive heart failure
The medical device sitting in Joan Boyles chest looks much like a pacemaker or defibrillator, with a pager-sized machine implanted under the right clavicle and electrodes running out of it into the heart wall. But this device is unlike any currently available in cardiology clinics across the United States.
It doesnt regulate a slow heartbeat, as pacemakers do. Nor does it work like an implantable defibrillator to send low-energy shocks that can reset a wonky heart rhythm. Rather, the Optimizer Smart system delivers high-energy pulses to faltering heart muscle tissue, helping an ailing ticker contract more strongly and deliver oxygen-rich blood where its needed throughout the body.
Boyle received the implantable pulse generator in June through a controlled-access study protocol. Beforehand, she was struggling, feeling very lethargic, and her breathing was labored, says Boyles granddaughter Jennifer Wagner. Just going from the car to the house was a difficult task.
Now, Boyle is on her feet more. The 86-year-old great-grandmother from Philadelphia is back to making ceramics, painting, and baking her signature chocolate chip cookiesand soon millions of other Americans suffering from congestive heart failure could gain access to the Optimizer system, too.
On Tuesday, an advisory committee to the U.S. Food and Drug Administration (FDA) will meet and vote on whether to recommend marketing authorization of the first-of-its-kind device.
Up to one-quarter of all patients with moderate-to-severe heart failure could be candidates for this kind of cardiac contractility modulation therapy if they fail to respond adequately to ACE inhibitors, beta blockers, and other drug treatments.
Theres been a segment of the population that has not had a device available for them, says Steven Roberts, Boyles cardiologist from the Thomas Jefferson University Hospitals in Philadelphia. For these people, the heart muscle is weakit doesnt pump forcefully enoughbut the electrical system is still working.
The device then essentially serves as a personal trainer for wimpy left ventricles, boosting the performance, strength, and pumping power of the enfeebled heart chamber.
Developers are beginning to firm up the Darktable 2.6 release as the next feature update to this amazing, cross-platform open-source RAW photography software...
Via: Canadian Geographic: A massive pit that was spotted in a remote high alpine valley in British Columbias Wells Gray Provincial Park earlier this year is the entrance to a previously unexplored cave of national significance, say two members of a Canadian team that helped conduct a preliminary exploration of the site in September.
Back in August, The Boring Company was already distancing itself from a plan it pitched earlier in the year to build a test tunnel under Sepulveda Boulevard and the 405 freeway in Los Angeles.
On Tuesday, The Boring Company and a group of Westside residents issued a joint statement that they had "amicably settled" a lawsuit brought by the residents against The Boring Company in May of this year, according to the Los Angeles Times. The company, founded by Tesla and SpaceX CEO Elon Musk, said it would drop plans to build the 405 test tunnel and focus instead on building the so-called "Dugout Loop" that will run between a downtown LA Metro station and Dodger Stadium, if all goes as planned.
Elon Musk talks proof-of-concept tunnel parallel to the 405 in Los Angeles Musk announced the 405-parallel tunnel in an evening talk back in May, describing it as a 2.7 mile north-south test tunnel that wouldn't carry the general publicat first. Musk added at the time that The Boring Company would eventually do test rides to get user feedback. The City of Los Angeles appeared poised to fast-track Musk's idea, with LA Metro announcing: "We'll be partners moving forward."
[...] Now, The Boring Company intends to focus on the Dugout Loop, for which it has begun the CEQA permitting process (although it's unclear if a full permit will be acquired before construction starts). Critics have charged that The Boring Company has taken advantage of poorer neighborhoods,...
Gjoko Krstic, an Applied Risk researcher, has discovered a vulnerability in Pilz PNOZmulti Configurator software that allows a local attacker to read sensitive data in clear-text. The software is used to configure safety controllers, providing the user with the ability to modify elements such as IP addresses, download and upload project files and run other setup functions. The tool can be found on engineering workstations which are used to configure safety controllers. The software is More
The post Vulnerability discovered in safety controller configuration software appeared first on Help Net Security.
Uncovering forgotten history can help explain why science still has a masculine bias today.
On September 14, 2015, signals from one of the Universes most mind-boggling, powerful events produced the tiniest signal in a pair of detectors, one in Louisiana and one in Washington state. Theyd detected two already-wild objects, black holes, slamming into one another.
Youre probably familiar with black holes as cosmic vacuum cleaners, but theyre a little bit more complex than that. One core takeaway of Einstiens theory of gravity is that heavy enough things actually change the shape of the space around them, and gravity is how we experience this warping. Black holes are regions of space so small and massive that they carry a point-of-no-return, an event horizon beyond which space is so warped that every path that anything could travel leads to the black holes middle. Nothing, not even light, can escape.
Chinese makers produced 99% of electric buses deployed globally from 2014 to 2017. Via: Wall Street Journal: A national project to replace millions of gasoline-fueled taxis, buses and trucks with new electric models is boosting Chinas ambitions to lead the global shift to battery-powered transportation. Signs of progress can already be found on American, as 
Researchers used the chip to test a simple neural net and identify numerals with 100 percent accuracy
Today at the IEEE International Electron Devices Meeting in San Francisco, IBM reported a new 8-bit analog chip. But the true development was less about analog chips catching up to their digital peers and more a radical rethink of chip architecture. This chip is the first to perform 8-bit calculations right where information is stored.
In traditional von Neumann chip architecture, data constantly shuttles between memory and processing, which consumes valuable energy and time, says Abu Sebastian, the lead researcher on this work, from IBM Zurich. In-memory calculations are the logical next step for reducing power consumption while increasing performance. These gains are necessary for hardware to keep up with advancements in artificial intelligence.
IBMs new analog chip is based on phase-change memory. The key ingredient is a material that can undergo phase changes in response to electrical current. Typically, these are alloys of germanium, tellurium, and antimony. In one phase, which is conductive, the atoms are lined up nicely. In the other phase, which doesnt conduct electricity, the atoms move around, heated locally by current, and become jumbled.
A phase-change material held between two electrodes doesnt switch completely between ordered and jumbled arrangements like ones and zeros. Instead, at any point in time, there is a mix of both: The overall resistance of the material is determined by the size of the regions where atoms are jumbled.
Were coding information in terms of atomic arrangements, says Sebastian. The weights of a neural network, for example, can be stored and accessed as the resistance in a phase-change memory device.
But these resistances suffer from drift and fluctuation. Because current passes through the phase-change material when information is read, the jumbled regions change a little bit every timewhich has limited the precision and practicality of such devices.
To circumvent this problem, the IBM researchers introduced a so-called projection segment to the phase-change memory device. First proposed in 2015 by the same team, the projection segment is a conducting layer of metal nitride that wraps around a phase-change materi...
Awesome photos of Soyuz launch from space, as ESA astronaut Alexander Gerst congratulates Russian space agency Roscosmos and all international partners for a flawless launch of #Soyuz MS-11 "IndyWatch Feed Tech"
Welcome to space, David, Anne and Oleg! Docking is set for 17:36 GMT (18:36 CET).
Welcome to space, David, Anne and Oleg!
Walmart announced on Monday that it plans to deploy 360 autonomous custodial robots by the end of January that will mop the floors of some of its stores.The retailer said in a joint statement with developer Brain Corp. that the machines...
A ground-breaking study has shown it takes a matter of hours for billions of minute plastic nanoparticles to become embedded throughout the major organs of a marine organism.
The research, led by the University of Plymouth, examined the uptake of nanoparticles by a commercially important mollusc, the great scallop (Pecten maximus).
After six hours exposure in the laboratory, billions of particles measuring 250nm (around 0.00025mm) had accumulated within the scallops intestines.
The sun has a north pole but no spacecraft has ever photographed it. Now the European Space Agency has cleverly pieced a together picture of it using other images.
Nexstar Media Group has reached a deal to purchase Tribune Media Company in a $6.4 billion merger that would create the largest local television company in the country.The two companies announced Monday that Nexstar would be paying about $4.1...
It seems as though not a day goes by without news spreading over another major cyber attack. Hackers are becoming increasingly efficient at targeting everything from small startups to Fortune 500 companies and even entire government agencies, and as the world moves further away from traditional types of warfare and more toward engaging in all-out cyber warfare, these attacks are only going to
It's been a big year for low-energy nuclear reactions. LENRs, as they're known, are a fringe research topic that some physicists think could explain the results of an infamous experiment nearly 30 years ago that formed the basis for the idea of cold fusion. That idea didn't hold up, and only a handful of researchers around the world have continued trying to understand the mysterious nature of the inconsistent, heat-generating reactions that had spurred those claims.
Their determination may finally pay off, as researchers in Japan have recently managed to generate heat more consistently from these reactions, and the U.S. Navy is now paying close attention to the field.
Read more of this story at SoylentNews.
Fuel is heavy. And when launching a satellite into space, the amount of fuel you give it determines how long it can stay operational. That is, unless you can refuel at a space gas station.
The news: Startup Orbit Fab is scheduled to launch an experiment to the International Space Station on board a SpaceX Dragon cargo mission tomorrow at 1:38pm EST. Its goal is to test the companys method of fluid transfer in space. Itll be launched alongside other scientific experiments to be performed by astronauts on board the station in collaboration with the ISS US National Lab.
The challenge: Refueling and repairing satellites in space requires some expert wrangling, as well as well as the launch of large quantities and types of fuel into orbit. Also, pumping new fuel into a satellite doesnt work in microgravity the way it does on Earth. Fluids are harder to measure and float around their tanks unpredictably.
Experts from HackenProof discovered Open Elasticsearch instances that expose over 82 million users in the United States.
Elasticsearch is a Java-based search engine based on the free and open-source information retrieval software library Lucene. It is developed in Java and is released as open source, it is used by many organizations worldwide.
Experts discovered 73 gigabytes of data during a regular security audit of publicly available servers. Using the Shodan search engine the experts discovered three IPs associated with misconfigured Elasticsearch clusters.
A massive 73 GB data breach was discovered during a regular security audit of publicly available servers with the Shodan search engine. reads a blog post published by HackenProof.
Prior to this publication, there were at least 3 IPs with the identical Elasticsearch clusters misconfigured for public access.
The first IP discovered by the experts on November 14, contained the personal information of 56,934,021 U.S. citizens (i.e. name, email, address, state, zip, phone number, IP address, and also employers and job title).
Experts discovered a second Index of the same archive that contained more than 25 million records with more detailed information (i.e. name, company details, zip address, carrier route, latitude/longitude, census tract, phone number, web address, email, employees count, revenue numbers, NAICS codes, SIC codes, and etc).
Overall, HackenProof says (...
Amazon is testing out its cashierless checkout technology in bigger stores with one eye on Whole Foods, according to The Wall Street Journal.
Sources told the Journal that Amazon is testing out the futuristic tech which tracks and charges for the items shoppers take from the shelves in Seattle, in a space formatted like a large store.
U.K. researchers say a new exhaust system brings practical fusion power one step closer.
Over the next year, OSIRIS-REx will survey the asteroid using five scientific instruments on board the spacecraft. These instruments will help it determine a safe location from which to collect a small sample from Bennus surface that will be returned to Earth in September 2023.
Bennus low gravity provides a unique challenge for the mission, said Rich Burns, OSIRIS-REx project manager at NASAs Goddard Space Flight Center. At roughly 0.3 mile in diameter, Bennu will be the smallest object that any spacecraft has ever orbited.
This week we have five newcomers in our chart.
Venom is the most downloaded movie.
The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.
RSS feed for the articles of the recent weekly movie download charts.
|Movie Rank||Rank last week||Movie name||IMDb Rating / Trailer|
|Most downloaded movies via torrents|
|1||()||Venom||7.0 / trailer|
|2||()||The Predator||5.6 / trailer|
|3||()||The House with a Clock in Its Walls||6.1 / trailer|
|4||(1)||The Nun||5.5 /...|
A huge, gaping cave has been discovered hidden in the remote Canadian wilderness, and despite the overwhelming scale of this stunning natural void, researchers suggest it may never have been seen by human eyes before.
Nicknamed the Sarlacc Pit after the monstrous pit-dwelling beast in Star Wars, the giant cave concealed amidst the rugged terrain of British Columbias Wells Gray Provincial Park is so vast its effectively unbelievable, explorers say.
My immediate reaction was that there cant be a cave there, its impossible, geoscientist Catherine Hickson, who conducted an expedition to the site in September, told Global News.
One of the first things we learn about computers is the concept of binary ones and zeroes. When we dig into implementation of digital logic, we start to learn about voltages, and currents, and other realities of our analog world. It is common for textbooks to use flow of water as an analogy to explain flow of electrons, and [Glen Anderson] turned that conceptual illustration into reality. He brought his water computer to the downtown Los Angeles Mini Maker Faire this past weekend to show people the analog realities behind their digital devices.
[Glen]s demonstration is a translation of another textbook illustration: binary adder with two four-bit inputs and a five-bit output. Each transistor is built from a plastic jewel box whose lid has been glued to the bottom to form two chambers. A ping-pong ball sits in the upper chamber, a rubber flap resides in the lower chamber covering a hole, with a string connecting them so a floating ball would lift the flap and expose the hole.
Heres how an inverter works in this computer: Input is a pipe connected to the upper chamber. Incoming water (representing one) fills the upper chamber to float the ball. As the ball floats, it lifts the flap and drains water out of the lower chamber. Output is a pipe connected to this chamber, so any water is drained from output pipe as well. This absence of water represents zero, inverse of output, thus this box is a water NOT gate....
According to New Zealands Government Communications Security Bureau, Huawei equipment for 5G infrastructure poses a significant network security risk, for this reason, it asked mobile company Spark to avoid using the equipment of the Chinese company.
The announcement follows the decision of the Australian Government to ban Huawei equipment from Australias 5G network due to security concerns.
The Chinese company has been founded by a former Peoples Liberation Army official in 1987. The US was the first country that warned of the security risks associated with the usage of the products manufactured by the Chinese telecommunications giant.
The Chinese firm denies having shared Australian customer data with the Chinese intelligence, but it is not enough for the Australian Government.
Australian authorities also banned the Chinese firm ZTE Corp.
Huawei was already helping Spark to build 5G mobile networks.
In New Zealand, Huawei has previously helped build mobile networks. In March, Spark and Huawei showcased a 5G test site across the street from the Parliament, in a publicity move that was attended by then Broadcasting Minister Clare Curran. reported the Associated Press.
China and New Zealand have a good commercial partnership and the ban imposed by the government could have severe repercussions on it. In 2008, New Zealand signed a free-trade deal with China.
The economic and trade cooperation between China and New Zealand is mutually beneficial in nature, said Foreign Ministry spokesman Geng Shuang.
We hope New Zealand will provide a level-playing field for Chinese enterprises operation there and do something conducive for mutual trust and cooperation.
Which is the Sparks opinion on the...
The bash man page is close to 40K words. It's not quite War and Peace, but it could hold its own in a rack of cheap novels. Given the size of bash's documentation, missing a useful feature is easy to do when looking through the man page. For that reason, as well as to look for new features, revisiting the man page occasionally can be a useful thing to do.
The sub-section of interest today is Parameter Expansionthat is, $var in its many forms. Don't be confused by the name though, it's really about parameter and variable expansion.
While the long-term prospects of the project have yet to be determined, longtime Linux input expert Peter Hutterer of Red Hat has hacked together "GGKBDD" as the generic gaming keyboard daemon for Linux systems...
Commercial Chambers Building the first to be scanned.
What if Waterford Manor, Richmond Cottage, and Belvedere orphanages could have been digitally preserved before they were destroyed?
What if their exact dimensions and details were recorded as historical record, with possibilities for virtual tours, or even replicas, long after the buildings are gone?
Police forces across the UK are coming under increasing pressure to launch criminal investigations into incidents of social media and computer hacking, according to a new report from the Parliament Street think tank. The news comes as senior Police Chiefs have warned that budget cuts and limited resources are leading to an increase in violent crime across the country. The new research paper, reveals that 14 police forces have launched a total of 2,547 investigations More
The post Sharp rise in email and social media hacking in the UK appeared first on Help Net Security.
The Khronos Group's Vulkan working group is kicking off the start of a new week with a new specification update. The Vulkan 1.1.95 release brings with it two new floating point extensions...
The ARM Linux developers continue working on Energy Aware Scheduling (EAS) for the mainline Linux kernel to better handle systems with asymmetric CPU topologies, namely SoCs like those with ARM big.LITTLE cores...
Matter is all around us. As human beings, were made of it. Matter is the stuff that makes up the physical world as we know it; a collection of atoms made up of particles called protons, electrons and neutrons.
Part of my work, as a post-doctoral researcher at iThemba LABS (Laboratory for Accelerator Based Sciences) in Cape Town, South Africa, focuses on neutrons. These are subatomic particles that can penetrate through matter, which means they can be harnessed for all sorts of important work.
For example, high-energy neutrons may be used to destroy tough tumours that cant be killed by the usual x-rays that are available in hospitals.
For those utilizing OpenBLAS as the linear algebra library for your application(s), OpenBLAS 0.3.4 was released on Sunday with the latest features and CPU optimizations for multiple architectures...
Has serverless surpassed containers? Will Kubernetes be the center of the universe for developers? Regardless of the technical benefits, your personal investment in the technologies impact your point of view.
The treatment could transform the lives of five million in the UK who have the disease.
Last month at the Linux Plumbers Conference (LPC 2018) was a presentation by Red Hat's open-source graphics driver developer David Airlie on creating a vendor-neutral compute stack that theoretically could take on NVIDIA's CUDA dominance...
TL;DRAs far as I can tell, theres currently no way of providing documentation for specific containers that we could fairly call canonical, best practice, or even all that widely used. This blog post suggests some currently available (but sadly not-great) workarounds but also points to what I think could be a fundamentally better path.
The space rock could hold clues to the origins of our solar system, and maybe even life on Earth.
As promising as a drug candidate may be, the unfortunate truth is that not all of them end up performing as hoped but that doesnt mean theyre completely useless. Researchers at Oxford University have managed to give second life to an experimental cancer drug known as tasquinimod, which has now shown promise in preventing Parkinsons.
Ask medieval historian Michael McCormick what year was the worst to be alive, and he's got an answer: "536." Not 1349, when the Black Death wiped out half of Europe. Not 1918, when the flu killed 50 million to 100 million people, mostly young adults. But 536. In Europe, "It was the beginning of one of the worst periods to be alive, if not the worst year," says McCormick, a historian and archaeologist who chairs the Harvard University Initiative for the Science of the Human Past.
A mysterious fog plunged Europe, the Middle East, and parts of Asia into darkness, day and nightfor 18 months. "For the sun gave forth its light without brightness, like the moon, during the whole year," wrote Byzantine historian Procopius. Temperatures in the summer of 536 fell 1.5C to 2.5C, initiating the coldest decade in the past 2300 years. Snow fell that summer in China; crops failed; people starved. The Irish chronicles record "a failure of bread from the years 536539." Then, in 541, bubonic plague struck the Roman port of Pelusium, in Egypt. What came to be called the Plague of Justinian spread rapidly, wiping out one-third to one-half of the population of the eastern Roman Empire and hastening its collapse, McCormick says.
[...] At a workshop at Harvard this week, [a team led by McCormick and glaciologist Paul Mayewski at the Climate Change Institute of The University of Maine (UM) in Orono] reported that a cataclysmic volcanic eruption in Iceland spewed ash across the Northern Hemisphere early in 536. Two other massive eruptions followed, in 540 and 547. The repeated blows, followed by plague, plunged Europe into economic stagnation that lasted until 640, when another signal in the icea spike in airborne leadmarks a resurgence of silver mining, as the team reports in Antiquity this week.
Alpine ice-core evidence for the transformation of the European monetary system, AD 640670 (open, DOI: 10.15184/aqy.2018.110) (DX)
Read more of this story at SoylentNews.
Music and movies are extremely vulnerable, with no effective technology available after several decades of trying. However, software and video games are able to put up a bit more of a fight when appropriate DRM and other technologies are put in place.
Situated on top of regular DRM, Denuvo has made its way to the top of the pile as one of the most effective and hated (by pirates at least) anti-tamper technologies. This reputation has in part been earned through its ability to prevent low-level crackers from defeating its locks but also due to a perception that it can be anti-consumer.
With this reputation, Denuvo is consistently targeted by crackers, who are getting more and more successful in defeating the technology. A few days protection now seems to be the most the product can offer, with the company itself now openly suggesting that a couple of weeks protection is a reasonable aim and valuable in itself.
Given Denuvos profile, it was interesting to see an apparently new technology being touted by its makers a few months ago. Dubbed Valeroa, this new kid on the anti-tamper block seems to have Denuvo in its sights, with interesting marketing which presents the tech as a more consumer-friendly tool to achieve the same aims.
Valeroa anti-tamper does [not] require you to have an internet connection. Not even when you launch your game for the first time or after you upgraded your hardware. Some games require you to be online, but this is not a Valeroa requirement, the company claims.
The protected game behaves as if there is no protection applied at all. Gamers dont need to re-validate hardware or need an internet connection. They also dont need to install additional software or drivers. They can play the game as it was intended by the game developer.
Addressing other complaints usually aimed at Denuvo, Valeroa claims not to continuously write to the gamers hard drive while placing no limit on the number of daily installations or changes of hardware.
In common with Denuvo, however, the company behind Valeroa states that its tech is extremely difficult to crack before and closely after the game release date.
Curiously, it also adds that the protection ...
December 1 is World AIDS Day, an annual event dedicated to raising awareness and money to fight AIDS around the world.
Over the last four decades, HIV and AIDS have been at the forefront of advocacy and research. But despite medical advances, AIDS remains one of the most destructive pandemics in history, particularly of youth.
If you ever doubt the potential for catastrophe that mucking about with electric vehicles can present, check out the video below. It shows what can happen to a couple of Tesla battery modules when due regard to safety precautions isnt paid.
The video comes to us by way of [Rich], a gearhead with a thing for Teslas. He clearly knows his way around the EV world, having rebuilt a flood-soaked Tesla, and aspires to open an EV repair shop. The disaster stems from a novelty vehicle he and friend [Lee] bought as a side project. The car was apparently once a Disney prop car, used in parades with the Mr. Toads Wild Ride theme. It was powered by six 6-volt golf cart batteries, which let it maintain a stately, safe pace on a crowded parade route. [Rich] et al would have none of that, and decided to plop a pair of 444-cell Tesla modules into it. The reduced weight and increased voltage made it a real neck-snapper, but the team unwisely left any semblance of battery management out of the build.
You can guess what happened next, or spin up to the 3:00 mark in the video to watch the security camera mayhem. Its not clear what started the fire, but the modules started cooking off batteries like roman candles. Quick action got it pushed outside to await the fire department, but the car was a total loss long before they showed up. Luckily no other cars in the garage were damaged, nor were there any injuries not that the car didnt try to take someone out, including putting a flaming round into [Lee]s chest and one into the firetrucks windshield.
[Rich] clearly knew he was literally playing with fire, and paid the price. The lesson here is to respect the power of these beefy batteries, even when youre just fooling around.
On Monday, December 3 at 18:31:47 UTC (1:31pm EST) or about 10 hours after the time this story goes live. With this launch, SpaceX would mark 3 milestones:
First, it will be the first time that one of their boosters will have flown 3 times. The first launch of this booster was on May 11 (from pad 39A at the Kennedy Space Center in Florida) and the second was on August 7 (from pad 40 at Cape Canaveral Air Force Station). This launch will be from Space Launch Complex 4-East at Vandenberg Air Force Base near Lompoc, California. (Attentive readers will notice that this booster will have been launched from three different launch pads. Another first.)
Second, it will be the most satellites deployed in a single launch by a U.S. company: 64 (15 microsats and 49 cubesats). Note the qualification, though; India's ISRO launched 88 cubesats using their PSLV into a 500 km altitude SSO on Feb 15, 2017.
Third, this would be SpaceX's 19th launch of the year its most ever.
This flight has been rescheduled from Dec 1 (for weather) and Dec 2 (to check out the second stage). The launch will be live-streamed on YouTube with coverage expected to begin approximately 15 minutes before launch.
Next up is an ISS resupply mission on December 4, scheduled at 18:38 UTC (1:38pm EST). This would be SpaceX's 20th flight of the year and is scheduled 24 hours and 7 minutes after the Dec 3 launch. This launch is from pad SLC-40, Cape Canaveral Air Force Station, Florida.
But wait, there's more! On Dec 18th, SpaceX plans a GPS satellite launch on December 18 @ 14:24 UTC (9:24am EST) from the same pad (SLC-40) as was used on Dec 4 That would mark a two-week turnaround time for that launch pad.
And, to wrap up the year, SpaceX plans an Iridium Next launch on Dec 30 @ 16:38 UTC (11:38am EDT) from pad SLC-4E at the Vandenberg Air Force Base, California.
Should all these flights go off as planned, this would make for a very Happy New Year for SpaceX as it would mark 22 launches in a single year, just under 2 flights per month!
I hate to break this to you all but Trump very much thinks in terms of decades. What he is breaking are decadal deals in which the USA is losing. Recall he was in the building business in which every mistake is financed out to twice its original cost.
As soon as you understand that you can see what the prize will be and what has to be pushed now. There are real problems that need to be engineered through, or we will be doing this again and again. It may ultimately require fully engaging with India to rapidly advance its economy as well to counter Chinese trade tactics.
Yet now is a good time to put some lipstick on the pig and make something work properly. Certainly a back off is due in terms of negotiations..
An anonymous hacker hijacked over 50,000 internet-connected printers worldwide to print out messages promoting the subscription to the PewDiePie YouTube channel. Felix Arvid Ulf Kjellberg, aka PewDiePie, is a popular Swedish Youtuber, comedian, and video game commentator, formerly best known for his Lets Play commentaries and now mostly known for his comedy and vlogs.
This is the last act of disputed for the most-subscribed Youtube channel crown between T-Series and PewDiePie.
The PewDiePie has more than 73 million YouTube subscribers.
Now a hacker with the Twitter account TheHackerGiraffe decided to promote his favourite YouTube channel in his way, he hacked tens of thousands of printers exposed online.
The hacker scanned the Internet for printers with port 9100 open using Shodan and hacked them publishing a message that invited the victims to unsubscribe from T-Series channel and subscribe to PewDiePie instead.
PewDiePie is in trouble, and he needs your help to defeat T-Series!
PewDiePie, the currently most subscribed to channel on YouTube, is at stake of losing his position as the number one position by an Indian company called T-Series that simply uploads videos of Bollywood trailers and campaigns,
The TheHackerGiraffe used the Printer Exploitation Toolkit (PRET) to compromise vulnerable printers. The PRET is a legitimate developed by researchers from Ruhr-Universitt Bochum in Germany for testing purposes.
The 4.20-rc5 kernel prepatch is out; among other things, it contains the STIBP changes described in this article. Linus is also thinking about release timing: "So my current suggestion is that we plan on a Christmas release, everybody gets their pull requests for the next merge window done *before* the holidays, and then we see what happens. I think we all want to have a calm holiday season without either the stress of a merge window _or_ the stress of prepping for one."
Acoustic fields are unexpectedly richer in information than is typically thought, said David Dowling, a professor in U-Ms Department of Mechanical Engineering.
[...] Sonar arrays are typically designed to record sounds in specific frequency ranges. Sounds with frequencies higher than an arrays intended range may confuse the system; it might be able to detect the presence of an important contact but still be unable to locate it.
Any time sound is recorded, a microphone takes the role of the human ear, sensing sound amplitude as it in varies in time. Through a mathematical calculation known as a Fourier transform, sound amplitude versus time can be converted to sound amplitude versus frequency.
With the recorded sound translated into frequencies, Dowling puts his technique to use. He mathematically combines any two frequencies within the signals recorded frequency range, to reveal information outside that range at a new, third frequency that is the sum or difference of the two input frequencies.
This information at the third frequency is something that we havent traditionally had before, he said.
In the case of a Navy vessels sonar array, that additional information could allow an adversarys ship or underwater asset to be reliably located from farther away or with recording equipment that was not designed to receive the recorded signal. In particular, tracking the distance and depth of an adversary from hundreds of miles awayfar beyond the horizonmight be possible.
And whats good for the Navy may also be good for medical professionals investigating areas of the body that are hardest to reach, such as inside the skull. Similarly, remote seismic surveys that parse through the earth seeking oil or mineral deposits could also be improved.
[...] More information:
Read more of this story at SoylentNews....
Countering Russian Social Media Influence" I love that they never ask: "how effective is Russian social media influence"? I don't grant the premise. Of all the channels for distributing info, what evidence is there that Twitter bots are better than RT? https://t.co/Nq0ygq0rka
Infowar is open to analysis. There are well known guidelines for effective offensive information warfare, and if theres sufficient historical data the attacks can be measured for effectiveness. For example, if a threat actor used information warfare against a US election there would be an excellent historical record of the impact of info ops on the population. It is called polling, and it literally measures the impact of information on public sentiment. Polls provide us with a proxy metric for measuring the impact of various information warfare events on the election (to some degree.)
Using what we know about how to wage effective information warfare, we can examine operations and make educated guesses about their impact. If there is polling data available, we can even measure our guesstimates of efficacy against real world impact. This is about as close as we can get to measuring the impact of infowar, anddue to the extensive public documentationthere is no better target for open source analysis than the US election.
There is a perfect case study, the US 2016 presidential elec...
The concept of creating a gaming portable out of a home console has been around for some time, but its hardly seen the other way around. There have been a few devices that dared to straddle the line (i.e., Sega Nomad, Nintendo Switch, etc.), but the two worlds typically remain separate. [Stephen] looked to explore that space by attempting to turn the Game Boy Advance into a big boy console. The FPGA-based mod kit he created does just that, and comes complete with controller support and digital video output in 720p over a mini HDMI cable.
The kit itself was designed specifically for the original model GBAs containing the 40-pin LCD ribbon cable. These original models were the early run of non-backlit screens that are also denoted by a motherboard designation that can be seen by peering into the battery compartment. RGB signals are read directly from the GBA LCD socket by removing the handhelds screen in favor of a fresh flat flex ribbon cable. This method enables a noise-free digital-to-digital solution as opposed to the digital-to-analog output of Nintendos own Game Boy Player add-on for the GameCube.
At an astonishing 240160 native resolution, GBA video is scaled by the FPGA up to 5x within a 720p frame. Of course some of the image is cutoff in the proc...
With organizations moving to the cloud and remote workers becoming the rule rather than the exception, the definition of the network is changing. Add to this the increasing use of IoT devices, encryption and engagement in shadow IT practices, and its easy to see why organizations have trouble keeping their network and systems secure. Whats more, attackers are changing tactics: they are relying less and less on malware and shifting their focus to stealing legitimate More
The post Detecting malicious behavior blended with business-justified activity appeared first on Help Net Security.
Can you deceive a deceiver? Thats the question that computer scientists at Binghamton University, State University of New York have recently been exploring. Assistant Professor of Computer Science Guanhua Yan and PhD student Zhan Shu are looking at how to make cyber deception a more effective tool against malicious hackers. Their study was inspired by the 2013 Target data breach that affected 41 million consumers and cost Target $18.5 million, and the 2017 Equifax hack More
The post Making it harder for attackers to know when a system begins to deceive a bad actor appeared first on Help Net Security.
Secure Operations Technology (SEC-OT) is a methodology and collection of best practices inspired by a decade of experience working with secure industrial sites. The SEC-OT approach is counter-intuitive to many IT and even industrial control system (ICS) security practitioners. It turns out that secure industrial sites ask different questions and get different answers. For example, industrial sites generally do not ask how can we protect our information? Instead, they ask, how to we keep the More
The post Best practice methodology for industrial network security: SEC-OT appeared first on Help Net Security.
Cloud Academy released its November 2018 Data Report revealing trends and shifts in the cloud computing industry. The world is trending multi-cloud Multi-cloud has become reality and Cloud Academys analysis of job postings reveals that DevOps engineers are now expected to have concurrent proficiency in Amazon Web Services (AWS) and Microsoft Azure, with 70 percent of job postings mentioning Azure also mentioning AWS. Google places a distant third in the public cloud supremacy battle Job More
The post What cloud platforms are DevOps professionals being asked to understand? appeared first on Help Net Security.
High penetration of Industrial Internet of Things (IIoT) technology in critical infrastructure and the manufacturing sector has resulted in a growing number of potential cyber-attack surfaces. According to a recent analysis from Frost & Sullivan, cyber-attacks within the energy and utilities industries alone cost an average of $13.2 million per year. These rising incidences of cyber-attacks, coupled with evolving compliance regulations by governments, and increased awareness among mature and less mature markets have accelerated the More
Twenty-five years ago today, a group of astronauts ascended in the space shuttle to accomplish a feat of unprecedented proportions: to fix NASAs Hubble Space Telescope, in space. Learn how the ingenuity of those repairs blazed the way for decades of not only satellite repairs, but also space exploration: https://go.nasa.gov/2FWHuXz&h=AT1qFoI48_v6tgpXkkQf7uBHIj2XuhjlZErelV8A
Critics say that geoengineering efforts are Band-Aid solutions that treat the symptoms of climate change instead of the cause: global carbon emissions. Jim Thomas, the co-executive director of an environmental advocacy organization called the ETC Group, told Nature that he fears the Harvard project could push the concept of geoengineering into the mainstream.
But advocates say that anything that could buy some extra time in the face of looming climate catastrophe is worth exploring.
Im studying a chemical substance, Harvard researcher Zhen Dai told Nature. Its not like its a nuclear bomb.
Im Caleb Harper, principal investigator and director of the Open Agriculture initiative at the MIT Media Lab. Kent Larson courtesy of MIT Media Lab.
In his book Tomatoland: How Modern Industrial Agriculture Destroyed Our Most Alluring Fruit, Barry Estabrook details how grocery store tomatoes are both less nutritious and delicious than those grown decades ago. Industrial farming now grows crops for yield, sacrificing taste and vitamins for an easy-to-harvest, shippable product. Its why apples at your local supermarket are probably about a year old. Caleb Harper, a principal research scientist at MIT and director of the OpenAg Initiative, wants to use technology to grow food thats healthier, tastier, and more sustainable.
Growing for nutrition and growing for flavor, its not really something anyone does, he told Digital Trends at the recent ReThink Food conference in Napa, California.
A signalling issue in the cells that form hair was found by New York scientists. This pathway can be stimulated in matured or wounded skin, the study on mice found.
Thousands of "gilets jaunes" (yellow vest) protesters, often masked, riot in the streets of Paris and other major French cities for a third weekend. Hundreds have been arrested and injured (including police) in the often violent protests. Reuters documents the activities in some detail. This video shows a mob of protesters surround and attack a policeman (it's ok, he gets away, with help from one or more of the protesters).
The protests are over fuel taxes imposed to discourage fossil fuel use and help France meet its carbon emission goals under the Paris Climate Accord (which the U.S. is not party to.)
With the usual nod to common sense:
The U.S. embassy issued a statement urging citizens to be careful, saying that "violent clashes between police and protesters" continued in at least three of Paris's 20 districts, known as arrondissements. "Avoid all demonstrations, seek shelter in the vicinity of clashes, follow instructions of security personnel"
Chants and graffiti sprayed during the protests sometimes expresses frustration with the administration:
[Some] targeted the Arc de Triomphe, chanting "Macron Resign" and scrawling on the facade of the towering 19th-century arch: "The yellow vests will triumph."
Read more of this story at SoylentNews.
Posted by wissam . bashour on Dec 02#####################################
Posted by Moritz Muehlenhoff on Dec 02-------------------------------------------------------------------------
Posted by Moritz Muehlenhoff on Dec 02-------------------------------------------------------------------------
Posted by SEC Consult Vulnerability Lab on Dec 02SEC Consult Vulnerability Lab Security Advisory < 20181130-0 >
Weve got two hands, so its natural to want to use both of them while diagnosing a circuit with an oscilloscope. Trouble is, keeping both hands on the probes makes it a touch difficult to manipulate the scope. If only there were some way to put your idle lower appendages to work.
This multipurpose oscilloscope footswitch interface makes so much sense that we wonder why such a thing isnt standard equipment on more scopes. [Paul Roukema]s interface relies on the USB Test and Measurement Class (USBTMC) protocol that allows most modern scopes to be remotely controlled, somewhat like the General Purpose Interface Bus (GPIB) protocol of old. [Paul]s interface uses an STM32 microcontroller to talk USBTMC to either Keysights Infinium scopes or the Tektronix DPO line, since those were what he had to test against. Tapping the footswitch cycles the acquisition mode on and off or triggers a single acquisition. Hes thoughtfully included the USBTMC specs in his GitHub project, so adapting it to other scopes should be straightforward. Wed even wager that older scopes with GPIB could enjoy the same handsfree control.
Have a down-market scope but still want to go handsfree? [Jenny List]s primer on running a Rigol with Python might offer some hints on where to start.
Mountains and volcanoes are some of the most fascinating geological formations on Earth and scientists and adventurers alike cant get enough of them. Not a lot of us will get a first-hand look at what the planets tallest peaks and ranges look like from their summits, but thanks to the photos taken by NASA satellites in orbit and camera-wielding astronauts in space, they are visible as they never would be to the naked eye hundreds of miles above the Earth.
Click through the slideshow to see stunning images of the Earths mountains and volcanoes from Mount Everest and the Himalayas to the volcanoes of Hawaii and the snow-covered peaks of the Rocky Mountains captured from space.
Bitcoin just ended its worst-performing month in seven years in terms of month-over-month price declines. While this is comparing rate of fall and not absolute values, the world of economics is run on rate.
The worlds largest cryptocurrency began November at an average price across exchanges of $6,341, but as of 0:00 UTC on December 1 is trading at just $3,964, according to CoinDesks Bitcoin Price Index.
As it stands, the near $2,400 drop in bitcoins price has created a -37.4 percent monthly performance, which is its worst on record since August 2011, when it fell from roughly $8 to $4.80 to print a -40 percent monthly loss.
This may have some good impact for PC gamers:
The Bitcoin networks hash rate, one way of gauging the computing power dedicated to mining the digital currency, dropped about 24 percent from an all-time high at the end of August through Nov. 24, according to Blockchain.com. While the decline may have partially resulted from miners switching to other cryptocurrencies, JPMorgan Chase & Co. says some in the industry are losing money after Bitcoins price tumbled.
A big miner shakeout could be bad news for chipmakers including Taiwan Semiconductor Manufacturing Co. and Nvidia Corp. who supply the industry, along with mining-rig designers like Bitmain Technologies Ltd. that are pursuing initial public offerings.
Read more of this story at SoylentNews.
The article also cites Linuxs use in AI, data lakes, and in the Sierra supercomputer that monitors Americas nuclear stockpile, concluding that In its domination of IoT, cloud technology, supercomputing and AI, Linux is heading into 2019 with a lot of momentum.
Weve tested the most promising laptops pre-installed with Linux, and featured reviews of them in our 2018 Linux Laptop Buyers Guide. Download your copy now to read what you need to know when shopping for your next Linux laptop.
This simply means that Microsoft failed to recognize a windows device when used. This would naturally lead users to believe that the app doesnt even exist for Windows devices, which is not the case. Sad to say that this shows how important smartphones are to Microsoft and how littl...
Powerful antiretroviral drugs (ARVs) can now keep the virus controlled at levels that current tests cannot detect in the blood. Perhaps just as important, people who take these drugs diligently soon after theyre infected are unlikely to pass the virus to others. But the treatment isnt perfect. Those with HIV need to take a pill every day for the rest of their lives, and even if they do, the virus can easily morph to become resistant to the drugs. Thats why patients on ARV treatment should faithfully monitor their virus and cycle between different combinations of drugs.
Finding new, easier ways to more effectively treat HIV and stop its spread is therefore an urgent priority, and researchers are now looking beyond daily drugs to therapies that might provide people with more lasting protection.
The trio are the first to fly on the Soyuz after it broke apart with two astronauts on board.
BLACK holes are the most mysterious objects in the universe, but scientists have come one small step closer to understanding the impossibly powerful phenomena.
But while screening can be extremely helpful, it also carries some risks. Heres what you need to know about lung cancer screenings.
How does lung cancer screening work?
Currently, theres only one recommended screening test for lung cancer: low-dose computer tomography (low-dose CT scan). This test creates images of the inside of the body or in this case, the lungs using low doses of radiation.
|Feed||RSS||Last fetched||Next fetched after|
|"IndyWatch Feed Tech"||XML||02:19, Saturday, 08 December||03:19, Saturday, 08 December|
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog