|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Heres an overview of some of last weeks most interesting news and articles: Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco There is a new twist in the CCleaner hack saga: the attackers apparently didnt set out to compromise as many machines as possible, but were after some very specific targets. Three things to know about the dark web One of the more curious aspects about the dark web is that it didnt start More
Hope you like it! Please make comments. Many tks.
Let me share a concept of with you. Its focus lies on human enhancement through the exponential technology available, such as: nanotechnology, genetics, AI, in order to lessen peoples suffering, stop aging and ultimately achieve a longer lifespan. .
This is it. After twelve years we finally have a new Star Trek. Star Trek: Discovery (were using ST:DSC as the abbreviation) is airing right about when this post goes up. Next week, youll have to pay CBS $6USD a month to get your Star Trek fix, and today might be the last time a new episode of Star Trek is aired on broadcast TV ever. Enjoy it now, and hope the theme song doesnt have lyrics. Also, hope The Orville is a tenth as good as a Galaxy Quest series could be.
Whats the best way to describe Delta Sigma PLLs? The Cat In The Hat (PDF, page 31). [Dr. Tune] found a Seuss reference in a TI app note. Personally, Im a fan of hand-drawn cartoons, but well take what we can get.
The Raspberry Pi is a great media storage device, but its absolutely insufficient for audiophile tomfoolery. Heres a neat Pi DAC/amp/DSP thingy. The VoltaStream turns the Raspberry Pi into a WiFi-connected pair of speakers with low-latency audio in and a TOSLINK connector.
SpaceX! There is serious consideration being given to starting an Elon Musk column here on Hackaday. There will be SpaceX updates coming this week from the International Astronautical Congress in Adelaide. What will we find out? I dont know bruh, but I just got back from Burning Man and I realized it was a whole lot like Mars and I was wondering Elon, like, have you ever been to Burning Man because its really dusty and a whole lot like Mars and theres not much water Please, organizers of the IAC, I implore you: give more idiots microphones. That was hilarious.
How was the World Maker Faire in New York this weekend? In one word, empty. Abnormally so. Maker Faire was not as crowded as last year, and you could actually move around. My agoraphobia didnt kick in until the afterparties, and lines for the $5 bottles of water were short. Bay Area Faire attendance was down 16% from 2016-2017, and I would bet attendance for the NY Faire would be down a similar amount. Even a 10% decline in attendance would be noteworthy; the weather last year was cold and rainy and this year was beautiful. There are rumors, speculatio......
A local US police department has urged people not to call 911 after reports that a man had been crushed by a garage door.
The supposed victim in Greene County, Tennessee, turned out to be a scarily realistic, early Halloween decoration. The department said it had received calls about a "suspicious person lying in a driveway with bloody handprints on the garage". Officers investigated, only to find it was a puppet stuffed with straw.
Greene County TN Sheriff's Department wrote on Facebook: "ATTENTION EVERYONE!!! For those of you driving on Chuckey Pike in Greene County: THIS IS A HALLOWEEN DECORATION! Do NOT call 911 reporting a dead body. Instead, congratulate the homeowner on a great display."
[Okay, Soylentils, what is your best Halloween prank? --Ed.]
Read more of this story at SoylentNews.
SHE SORTS C-CELLS BY THE SEASHORE
Using sound waves, scientists sort markers for cancer and other diseases such as kidney disease, neurodegenerative diseases and other conditions.
Link to article: https://phys.org/news/2017-09-blood-tissue-biopsies.html
Discover & share this Animated GIF with everyone you know. GIPHY is how you search, share, discover, and create GIFs.
Posted by Leo Famulari on Sep 24That's correct, I was informed of the upcoming 4.9.2 release as part of
Posted by Ludovic Courts on Sep 24Hi,
...Daniel Rothman, [is] a geophysicist at the Massachusetts Institute of Technology, who built a database of fossil records going back half a billion years. Rothman found the periods in which large percentages of existing species died off coincided with big swings in the carbon isotopes found in those records, suggesting the planet's carbon cycle was out of whack.
[...] human civilization has been pumping more carbon into the environment by burning carbon-rich fossil fuels like coal, oil, and natural gas. On the current trajectory, the oceans are expected to absorb at least another 300 billion tons of carbon by 2100 an amount that could end up producing long-term changes to the environment, Rothman concluded.
[...] Rothman isn't alone in warning of a potential extinction. Some scientists argue a sixth such event is under way already, with about two species a year disappearing and thousands seeing their populations and ranges shrink.
The more arid study is published in Science Advances and the full text is freely available.
Read more of this story at SoylentNews.
In recent years many pirate sites have struggled to make a decent income.
Not only are more people using ad-blockers now, the ad-quality is also dropping as copyright holders actively go after this revenue source, trying to dry up the funds of pirate sites.
Last weekend The Pirate Bay tested a cryptocurrency miner to see whether that could offer a viable alternative. This created quite a bit of backlash, but there were plenty of positive comments too.
The question still remains whether the mining efforts can bring in enough money to pay all the bills.
The miner is provided by Coinhive which, at the time of writing, pays out 0.00015 XMR per 1M hashes. So how much can The Pirate Bay make from this?
To get a rough idea we did some back-of-the-envelope calculations, starting with the sites visitor numbers.
SimilarWeb estimates that The Pirate Bay has roughly 315 million visits per month. On average, users spend five minutes on the site per visit. While we have reason to believe that this underestimates the sites popularity, well use it as an illustration.
We spoke to Coinhive and they estimate that a user with a mid-range laptop would have a hashrate of 30 h/s.
In Pirate Bays case this would translate to 30 hashes * 300 seconds * 315M visits = 2,835,000M hashes per month. If the miner is throttled at 30% this would drop to 850,000M hashes.
If Coinhive pays out 0.00015 XMR per million hashes, TPB would get 127.5 XMR per month, which is roughly $12,000 at the moment. Since the miner doesnt appear on all pages and because some may actively block it, this number will drop a bit further.
Keep in mind that this is just an illustration using several estimated variables which may vary greatly over time. Still, it gives a broad idea of the potential.
Since Pirate Bay tested the miner several other sites jumped on board as well. Well keep a close eye on the developments and hope we can share some real data in the future.
Ive fallen and I cant get up. We all remember it, and we all know what product were talking about. Now, with cheap microcontrollers, ubiquitous WiFi, and wearable electronics, there must be a simpler solution. [Jean Paradedel]s emergency button project is designed to replace those wearable emergency buttons, which usually include an expensive call center plan.
[Jean]s button is based off an ESP8266 module, which sends an email to a care provider if a button is pressed. The whole thing is powered by a CR2032 watch battery and the devices case was 3D printed. The interface is simple its just a wearable button, after all and the form factor is small enough to be completely unobtrusive.
[Jean] reflashed the ESP8266 board with a simple sketch that runs the project. First, a button-press connects the device to WiFi and then blinks an LED so you know its connected. When the emergency button is pressed, an email is sent out letting a caregiver know that theres a problem.
Check out the video below for a demo of this cheap emergency button in action.
Large plant-eating dinosaurs are usually presumed to have been strictly herbivorous, because their derived teeth and jaws were capable of processing fibrous plant foods. This inferred feeding behavior offers a generalized view of dinosaur food habits, but rare direct fossil evidence of diet provides more nuanced insights into feeding behavior. Here we describe fossilized faeces (coprolites) that demonstrate recurring consumption of crustaceans and rotted wood by large Late Cretaceous dinosaurs. These multi-liter coprolites from the Kaiparowits Formation are primarily composed of comminuted conifer wood tissues that were fungally degraded before ingestion. Thick fragments of laminar crustacean cuticle are scattered within the coprolite contents and suggest that the dinosaurian defecators consumed sizeable crustaceans that sheltered in rotting logs. The diet of decayed wood and crustaceans offered a substantial supply of plant polysaccharides, with added dividends of animal protein and calcium. Nevertheless, it is unlikely that the fossilized fecal residues depict year-round feeding habits. It is more reasonable to infer that these coprolites reflected seasonal dietary shiftspossibly related to the dinosaurs' oviparous breeding activities. This surprising fossil evidence challenges conventional notions of herbivorous dinosaur diets and reveals a degree of dietary flexibility that is consistent with that of extant herbivorous birds.
Read more of this story at SoylentNews.
its been almost two weeks since Apple launched its latest iPhone 8 at a gala in Cupertino. Apple has started shipping the iPhone 8 to its buyers from September 22 in stores across the world. You already know what the iPhone 8 looks like its just like the last three generations of iPhones, but with a glass back. The latest iteration from Apple is a continuation of iPhone journey but there is something about iPhone 8 that you dont know.
It is the fastest smartphone in the world! In fact, leave aside Samsung Galaxy S8/Note 8 and OnePlus 5T it is faster than Dell XPS and MacBook Pro iCore5 laptops. Toms Guide guys did a chop chop on iPhone 8 and the results were amazing.
Toms Guide guys started the testing of iPhone 8 with Geekbench 4, which measures overall performance.The test results were something out of blue. iPhone 8 beats Samsungs Galaxy Note 8 which is currently the fastest Android smartphone by a whopping margin. In the multicore portion of this test, the iPhone 8 hit 10,170 which was 54 percent faster than the score from Samsungs Galaxy Note 8 at 6,564.
Mind you Apple is powering iPhone 8 with an all-new A11 six-core chip and Samsung Galaxy S8 Note has 6GB of RAM paired with Qualcomms fastest and latest Snapdragon 835 chip. iPhone 8 also beat the other competitor, OnePlus 5 which got a score of 6,542.
The real surprise is that iPhone beat even its own brother in shelves MacBook Pro. Yes, the iPhone 8 GeekBench 4 scores were greater than Apple Mac OS run MacBook Pro 13 inch laptop with 7th-generation Core i5 processor. It also beat Windows 10 run Dell XPS 13. Mind you the founder of Geekbench, John Poole, said that laptops are better at delivering sustained performance over a longer period of time, as opposed to the shorter max burst performance that benchmark tests like those conducted at Geekbench 4 are designed to measure.
Via: Independent: A catastrophic sleep-loss epidemic is causing a host of potentially fatal diseases, a leading expert has said. In an interview with the Guardian, Professor Matthew Walker, director of the Centre for Human Sleep Science at the University of California, Berkeley, said that sleep deprivation affected every aspect of our biology and was widespread 
Our friends at [The Thought Emporium] have been bringing us delightful projects but not all of them warrant a full-fledged video. What does anyone with a bevy of small but worthy projects do? They put them all together like so many mismatched LEGO blocks. Grab Bag #1 is the start of a semi-monthly video series which presents the smaller projects happening behind the scenes of [The Thought Emporium]s usual video presentations.
Solar eclipse? There are two because the first was only enough to whet [The Thought Emporium]s appetite. Ionic lifters? Learn about the favorite transformer around the shop and see what happens when high voltage wires get too close. TEA lasers? Use that transformer to make a legitimate laser with stuff around your house. Bismuth casting? Pet supply stores may have what you need to step up your casting game and its a total hack. Failures? We got them too.
Hidden Google Chrome Tricks And Features That Will Make Your Life Easier
Google Chrome is the most popular internet browser on the planet. This is one such statement no one will debate over. Seeing how popular the browser is, its bound to have so many tips and tricks available, that some of them unfortunately get forgotten. Weve gone over and made a list of the lesser known Chrome tricks. Read on for the full list.
For all those who wished they could use their phones voice search functionalities on their PCs as well. The OK Google feature of Android, works within the Chrome browser as well.
Ever felt the need to quickly note down an idea or a thought that came in your mind while you were surfing the internet ? With keep.google.com, you can now quickly note anything you need right in your browser.
See saved passwords
We all use Googles autofill feature to have Chrome remember our passwords. Ever wondered where the passwords are stored ? You can access them and/or change them by typing the following text in the address bar chrome://settings/passwords
Restore recently closed tabs
If youve ever closed your browser with multiple tabs open and then wanted to go back, Chrome has you covered. Just hit the Settings button on the top-right end of the browser, scroll down to history and you will see all your recent tabs ready to be opened with a single click.
Martin Flser (nee Grlin) has announced the "XFree KWin" project. This isn't to be confused with XFree86 but rather is about ridding KWin optionally of X11/X.Org dependencies...
The discovery was made by researchers at security firm PhishMe that found the names of show characters and other references into the source code of the Visual Basic script used by the crooks.
The Visual Basic script is included in the ZIP or RAR archive attached to email spam used in the ransomware campaign. When the victims open the archive and run the VB script contained within, it would download and install the Locky ransomware.
Lightweight script applications designed to deliver malware often use rotating or pseudorandom variable names to ensure that the malware delivery tools look unique. In this case, many of the variables (some misspelled) referred to characters and events from the globally-popular television fantasy epic Game of Thrones. states Phishme.
Experts discovered in the VB script reference to the TV show such as Aria, SansaStark, RobertBaration, JohnSnow, or HoldTheDoor .
The worlds first head transplant surgery, is set to happen early next year in China. While this headline will sound straight out of a Hollywood film, this is set to happen in reality. In fact, the surgery was set to happen in December this year, but the Russian volunteer for the surgery -Valery Spiridonov has decided not to take part in the procedure and therefore, the surgery will now happen with a Chinese volunteer. There is no definitive date set, but it is expected to happen in the first quarter of 2018.
Junk Science ?
Dr. Sergio Canavero made headlines last year when he announced his plans to perform the first human head transplant. Since the announcement, the Italian neuroscientist has recruited a Chinese surgeon Dr. Xiaoping Ren, to perform the surgery with him. The first patient to undergo this procedure is a Russian man named Valery Spiridonov suffers from Werdnig-Hoffmann Disease, a genetic disease that breaks down muscles and kills nerve cells located in the brain and spinal cord thus making him unable to move. Currently, he is confined to his wheelchair with the only possible movements being the ability to feed himself, type and control his wheelchair with a joystick.
Spiridonov had been working with Dr. Canavero for about 2 years to get the surgery however, he has now said that he will not undergo the surgery because the doctor could not promise him what he wished for from the surgery the ability to walk again and live a normal life. The surgery does not even guarantee that he would live. He will now seek an alternative spinal surgery to improve his life instead as he said in his statement.
Given that I cannot rely on my Italian colleague, I have to take my health into my own hands. Luckily, there is quite a well-tested surgery for cases like mine when a steel implant is used to support a spine in straight position.
Dr. Sergio Canavero has since made a statement of his own wherein he confirmed that the surgery will instead proceed with a Chinese volunteer . Despite being criticized by the scientific community on his experiment, he is hopeful of success.
At present, nothing in detail. When the time comes, the official news will be announced by Xiaopings team in China. At the moment, I can only disclose that there has been massive progress in medical experiments that would have seemed impossible even as recently as a few months ago. The milestones that have been reached will undoubtedly revolutionize medicine. That much I can already say. ~ Sergio Canavero....
[The] main problem here is that software development is not an individual sport. Assessing technical traits means that we are looking at candidates as individuals. At the same time, we will put them in a team context and the project's success will depend on their teamwork. A person's resume or LinkedIn profile says close to nothing about their team skills.
What's more, we know quite a lot about what makes teams effective. Anita Woolley's research on collective intelligence [DOI: 10.1126/science.1193147] [DX] provides extremely valuable insight on the topic. First of all, how do we define collective intelligence? It's basically the skill of a group to solve complex problems. Well, it sounds like the definition of everyday work for software development teams if you ask me.
Why is collective intelligence so important? Exploiting collective intelligence, as opposed to going with the opinion of the smartest person in a room, is a winning strategy. To put in Anita Woolley's words: "Collective intelligence was much more predictive in terms of succeeding in complex tasks than average individual intelligence or maximal individual intelligence."
Read more of this story at SoylentNews.
Earlier this year ASUS announced the Tinker Board as their first step into the ARM single board computer world. Earlier this month I finally received a Tinker Board for testing and it has been quite interesting to say the least. The Tinker Board with its Rockchip SoC has been among the most competitive ARM SBCs we have tested to date in its price range and the form factor is compatible with the Raspberry Pi.
Summary: A series contemplating Benot Battistellis sudden interest in Angola, a country with no European Patents but plenty of connections to Antnio Campinos
The minutes of the June 2017 meeting of the EPO Administrative Council confirm that Battistelli has been authorised to open negotiations on a validation agreement with Angola (dated Friday). Its the favourite day for the EPO to dump some words (e.g. in the intranet) or formal documents it prefers not to get noticed. There are already internal jokes about those Friday spills always check whats being buried and where/why.
Does Angola really matter for the EPO? The numbers (of lack thereof) speak for themselves:
Its not hard to see why its tempting to suspect a political aspect to all of this. Prepare for some rather embarrassing t...
Subgraph OS is a Debian-based Linux distribution which provides several security, anonymous web browsing and hardening features. The project has released a new development version, Subgraph OS 2017-09-22 Alpha. The alpha snapshot includes initial support for multiple named bridges which can be attached to application sandboxes. In addition,....
DragonFlyBSD today picked up direct input support within the kernel's polling code. This can boost the networking performance though for now is just supported by the IX4 driver, what is used as the Intel 10Gb Ethernet driver...
Of course, anytime someone does a power test, you have to wonder if there were any tricks or changes that would have made a big difference. However, the relative data is interesting (even though you could posit situations where even those results would be misleading). You should watch the videos, but the bottom line was a 3000 mAh battery provided 315 days of run time for the ESP8266 and 213 days with the ESP32.
The fact that the hardware and software only differ in the central processing unit means the results should be pretty comparable. [G6EJD] accounts for the current draws throughout the circuit. The number of days were computed with math, so they dont reflect actual use. It also depends on how many samples you take per unit time. The goal was to get operation on batteries to last a year, and that was possible if you were willing to reduce the sample rate.
While we generally like the ESP32, [G6EJD] makes the point that if battery life is important to you, you might want to stick to the ESP8266, or look for something else. Naturally, if you are trying to maximize battery life, you are going to have to do a lot of sleeping.
Via: Reuters: Chinese automaker BYD Co Ltd (002594.SZ) expects the countrys shift to cleaner new-energy vehicles (NEV) to be complete in just over a decade, an aggressive timeframe that would challenge traditional carmakers in the world top auto market. All vehicles in the country will be electrified by 2030, which could range from full electric 
Patent sharks want (and profit from) legal chaos
Summary: Ahead of the decision regarding Oil States (probably months away, some time next year), various influential sites confront the misleading and self-serving propaganda from the patent microcosm, e.g. law firms (to whom patent quality is a threat)
The Patent Trial & Appeal Board (PTAB) is one of the best things about the USPTO. Its truly a shame that the EPO is nowadays driving away (to Haar) its own equivalent of PTAB. In this post wed like to focus our attention on PTAB, having written about it 24 hours ago in relation to the Mohawk tribe.
Who is it that spreads all the PTAB hate? The patent industry (trolls, lawyers and so on).Let it be understood, upfront, that PTAB is widely supported by scientists, technologists and their employers (including the very largest technology firms). Who is it that spreads all the PTAB hate? The patent industry (trolls, lawyers and so on). Covering additional CAFC cases, PTAB basher Dennis Crouch wrote about NFC Tech v Matal a few days ago to state:
Following an IPR administrative trial, the Patent Trial & Appeal Board (PTAB) concluded that the challenged claims of NFCs U.S. Patent 6,700,551 are unpatentably obvious. The focus of the dispute is on a pre-AIA inventorship claim The PTAB rejected NFCs attempt to claim priority to its date of invention.
On remand, it looks like the IPR case will continue in its original analysis, the PTAB did not actually determine whether the prototype embodied the claimed invention since it dismissed on other grounds. Thus, NFC is simply one step closer to success.
As we noted here back in August, Crouch and his blog (Patently-O) had become the loudest PTAB bashers out the...
The best news of the week with Security Affairs.
Once again thank you!
|400,000 UK consumers at risk after the Equifax data breach|
|Chrome will label Resources delivered via FTP as Not Secure|
|MAGENTO 2.0.16 and 2.1.9 security update fixes critical flaw in the platform|
|Security Affairs newsletter Round 128 News of the week|
|US Treasury announced sanctions against seven Iranian nationals and other entities|
|CCleaner supply chain compromised to distribute malware|
|CSE CybSec ZLAB Malware Analysis Report: NotPetya|
|Malware attacks leverage the Hangul Word Processor and PostScript to spread malware|
|The hacker KuroiSH defaced the official Google Brazil domain|
|Hackers exploit an undocumented Word feature for user finge...|
Here's how the test will work: I place an order on Walmart.com for several items, even groceries. When my order is ready, a Deliv driver will retrieve my items and bring them to my home. If no one answers the doorbell, he or she will have a one-time passcode that I've pre-authorized which will open my home's smart lock. As the homeowner, I'm in control of the experience the entire time the moment the Deliv driver rings my doorbell, I receive a smartphone notification that the delivery is occurring and, if I choose, I can watch the delivery take place in real-time. The Deliv associate will drop off my packages in my foyer and then carry my groceries to the kitchen, unload them in my fridge and leave. I'm watching the entire process from start to finish from my home security cameras through the August app. As I watch the Deliv associate exit my front door, I even receive confirmation that my door has automatically been locked.
Read more of this story at SoylentNews.
A Norwegian developer has developed a new Qt platform abstraction plug-in to let Qt applications make use of GTK+ for windowing system integration. The Qt apps rely upon GTK+ as a host toolkit to provide GTK menus, GTK for input, and other integration bits...
More than a week after it said most people would be eligible to enroll in a free year of its TrustedID identity theft monitoring service, big three consumer credit bureau Equifax has begun sending out email notifications to people who were able to take the company up on its offer. But in yet another security stumble, the company appears to be training recipients to fall for phishing scams.
Some people who signed up for the service after Equifax announced Sept. 7 that it had lost control over Social Security numbers, dates of birth and other sensitive data on 143 million Americans are still waiting for the promised notice from Equifax. But as I recently noted on Twitter, other folks have received emails from Equifax over the past few days, and the messages do not exactly come across as having emanated from a company that cares much about trying to regain the publics trust.
Heres a redacted example of an email Equifax sent out to one recipient recently:
As we can see, the email purports to have been sent from trustedid.com, a domain that Equifax has owned for almost four years. However, Equifax apparently decided it was time for a new and perhaps snazzier name: trustedidpremier.com.
The above-pictured message says it was sent from one domain, and then asks the recipient to respond by clicking on a link to a completely different (but confusingly similar) domain.
My guess is the reason Equifax registered trustedidpremier.com was to help people concerned about the breach to see whether they were one of the 143 million people affected (for more on how that worked out for them, see Equifax Breach Response Turns Dumpster Fire). Id further surmise that Equifax was expecting (and received) so much interest in the service as a result of the breach that all the traffic from the wannabe customers might swamp the trustedid.com site and ruin things for the people who were already signed up for the service before Equifax announced the breach on Sept. 7.
The problem with this dual-domain approach is that the domain trustedidpremier.com is only a few weeks old, so it had very little time to establish itself as a legitimate domain. As a result, in the first few hours after Equifax disclosed the breach the domain was actually flagged as a phishing site by multiple brows...
Science fiction does not just predict the future but rather inspires it. Similarly, in patent lobbying, making ridiculous claims can change the outcome to the effect the lobbyists want (UPC, Alice and so on)
Summary: Spinning and twisting the facts (for so-called alternative facts), the patent microcosm is trying to give the impression that software patents are still fine in the US
THE previous post reminded readers that the Intellectual Property Owners Association (IPO), together with IBM, is trying to undermine Alice. They mislead the world. Its a lobbying and PR campaign. IBMs longtime asset, David Kappos (former USPTO Director), plays a role in that. But what role does crooked media play in the attempts to water down or suppress Alice? Actually, as we have been showing for years, such media is occupied or dominated by the patent microcosm.
Its a classic reversal of narratives, where the attacker is the defender and the attacked (defender) is the aggressor.Yesterday, Matthew Bultman was at it again, spinning against Alice, as usual. He is habitually cherry-picking and using misleading language to make it seem as though the patent microcosm is right and still has might. He writes for Law 360, a news site which many people would wrongly assume to be objective. Hidden behind paywalls is this latest article of his, with the word Surviving in the headline (sometimes he puts Attack in his headlines). To Bultman, the one being sued attacks and the troll survives. Its a classic reversal of narratives, where the attacker is the defender and the attacked (defender) is the aggressor. Its appal...
Researchers at security firm Barracuda have spotted a new widespread ransomware campaign leveraging emails with malicious attachments, some of them pretend to be sent by the l multi-level marketing nutrition company Herbalife.
More than 20 million Herbalife branded emails were sent in a 24 hour period, since then, crooks sent out messages at a rate of about two million attacks per hour.
Most of the messages are sent from Vietnam other significant sources are India, Columbia, and Turkey and Greece.
The Barracuda Advanced Technology Group is actively monitoring an aggressive ransomware threat that appears to come in the largest volume from Vietnam. Other significant sources of this attack include India, Columbia, and Turkey and Greece. Other countries appear to be distributing the same attack in very low volumes. reads the analysis published by Barracuda. So far we have seen roughly 20 million of these attacks in the last 24 hours, and that number is growing rapidly.
The attackers are using a Locky variant with a single identifier to track the infections.
Barracuda researchers have confirmed that this attack is using a Locky variant with a single identifier. The identifier allows the attacker to identify the victim so that when the victim pays the ransom, the attacker can send that victim the decryptor, continues the analysis. In this attack, all victims get the same identifier, which means that victims who pay the ransom will not get a decryptor because it will be impossible for the criminal to identify them.
The email attachment claims to be an invoice for an order placed through the company Herbalife. If the user opens the file, it will launch the ransomware dropper.
Attackers are also observing attachments that claim to impersonate invoicing from marketplace.amazon.uk...
While I usually look at the Linux kernel code size following each merge window, I am a few days late this time around due to busy Xeon/EPYC benchmarking and XDC2017. Anyhow, Linux 4.14 is showing some weight gains but nothing too bad...
Wrapping up our XDC2017 coverage for this annual X.Org developer event that took place this past week in Mountain View, Zhenyu Wang of Intel presented on their ongoing work for mediated GPU virtualization pass-through support on Linux, Intel GVT...
Summary: The Intellectual Property Owners Association (IPO), together with IBM (Manny Schecter, Marian Underweiser and others), is still trying to overturn Mayo and Alice
THREE years ago Alice came to change everything. It was the summer of 2014 when the US patent system became more officially hostile towards software patents. Much has been written on the subject since then, including literally about a thousand articles here in Techrights (we regret not developing a detailed index page in Wiki form as we went along covering Alice; we had made one for the Bilski case).
We constantly need to defend and advocate Alice; in absence of opposition to these saboteurs (usually the patent microcosm, which produces nothing but lawsuits) things can quickly change for the worse.Alice is not a done deal, so to speak. Alice and Section 101 are constantly under attack. USPTO examiners often ignore the determination, instead relying on amorphous and dynamic guidelines, which contain loopholes for patenting software (a bunch of loopholes that courts dont quite fall for).
We constantly need to defend and advocate Alice; in absence of opposition to these saboteurs (usually the patent microcosm, which produces nothing but lawsuits) things can quickly change for the worse. We have already named some of these saboteurs. They dont quite keep it a secret (at least not effectively).
Yesterday we were reminded of the effect of stacked panels because Juves UPC specialist wrote: Nine panelist @Vossius #UPC Conference to vote on new start date of #UPC. All: at some day in 2019
We have already named some of these saboteurs. They dont quite keep it a secret (at least not effectively).I guess none of these panelists was a UPC sceptic, I wrote. Just gotta push the lie of Unitary Patent being inevitable.
UPC is a great example of echo chamber politics. Lots of people with financial stake in the outcome keep misleading one another. Its like a blind religion.
The same is true for software patents.
Just a short while ago IBMs patent chief, Manny Schecter, wrote that 99%...
The rationale for this rapid curricular renovation is economic. Teaching kids how to code will help them land good jobs, the argument goes. In an era of flat and falling incomes, programming provides a new path to the middle class a skill so widely demanded that anyone who acquires it can command a livable, even lucrative, wage.
This narrative pervades policymaking at every level, from school boards to the government. Yet it rests on a fundamentally flawed premise. Contrary to public perception, the economy doesn't actually need that many more programmers. As a result, teaching millions of kids to code won't make them all middle-class. Rather, it will proletarianize the profession by flooding the market and forcing wages down and that's precisely the point.
Read more of this story at SoylentNews.
[Mikael Vejdemo-Johansson] is a member of the NYC Resistor hackerspace and an avid fan of a D&D themed improv theatre called The Campaign. To show his appreciation, he decided to gift them a Christmas present: a giant D20. The original plan called for integrated LEDs to burst alight on a critical hit or miss, or let out pulses if it landed on another face. Cool, right? Well, easier said than done.
[Vejdemo-Johansson] figured a circle of 4 tilt sensors mounted on the one and twenty face would be enough to detect critical rolls. If any of the switches were tilted beyond 30 degrees, the switch would close. He mounted eight ball-tilt switches and glued in the LEDs. A hackerspace friend also helped him put together an astable multivibrator to generate the pulses for non-critical rolls.
This did not work out so well. His tilt sensor array proved to be a veritable electronic cacophony and terribly sensitive to any movement. That and some other electronic troubles forced a shelving of any light shows on a critical hit or miss. [Vejdemo-Johansson] kept the pulsing LEDs which made for a cool effect when shining through the mirrored, red acrylic panes he used for the die faces. Foam caulk backer rods protect as the dies structure to stop it from being shattered on its first use.
Before The Campaigns next show, [Vejdemo-Johansson] managed to stealthily swap-out of the troupes original die with his gift, only for it to be immediately thrown in a way that would definit...
Dori Liszkai, Advisory Council Member - Blockchain at GLG (Gerson Lehrman Group), joins our New Money Systems Board.
Thankfully, no ones out there systematically murdering lawyers. But advances in artificial intelligence may diminish their role in the legal system or even, in some cases, replace them altogether. Heres what we stand to gainand what we should fearfrom these technologies.
How legal representation could come to resemble TurboTax.
Submitted via IRC for SoyCow8963
Security researchers from Adguard have issued a warning that the popular GO Keyboard app is spying on users. Produced by Chinese developers GOMO Dev Team, GO Keyboard was found to be transmitting personal information about users back to remote servers, as well as
Adguard made the discovery while conducting research into the traffic consumption and unwanted behavior of various Android keyboards. The AdGuard for Android app makes it possible to see exactly what traffic an app is generating, and it showed that GO Keyboard was making worrying connections, making use of trackers, and sharing personal information.
Read more of this story at SoylentNews.
Most of us are aware that ransomware is a type of malicious software from cryptovirology that threatens to publish the victims data or perpetually block access to it unless a cryptocurrencytypically Bitcoin is paid. But what happens if you are asked to send nude photographs instead of Bitcoin to get access to your device? Shocked, right?
That is what a new ransomware known as nRansomware is doing. On Thursday, the researchers at MalwareHunterTeam, a research group focused on ransomware, discovered the ransomware software installed through a file called nRansom.exe, which demands at least 10 nude photographs from the victim in order to get their files back. The victim is actually forced to create a Protomail account, which will then be verified as legitimate by the attacker. Once the photos are sent, the victim will receive a code to disable the malware. It appears that the attackers are looking to sell the photos to make money.
The ransomware has a background of several images of the fictional childrens character Thomas the Tank Engine and an image stating the conditions. The malware also appears to play looped music in the background.
The below screenshot was tweeted by the researchers displaying the message when a victims device is hacked:
MalwareHunterTeam (@malwrhunterteam) September 21, 2017
Your computer has been locked. You can only unlock it with the special unlock code, reads the message. The victim is also asked to create an email account on a specified website and then email to hackers from that address. After we reply, you must send at least 10 nude pictures of you. After that we will have to verify that the nudes belong to you.
It is still unclear how many people have been affected with this ransomware or whether the demand is legitimate threat and not a prank. However, the file nRansom.exe, to some extent does appear to be legitimate, as it is classified as malicious by several antivirus engines, including VirusTotal and Hybrid Analysis, which are both public malware repositories.
To stay clear from these kinds of ransomware,...
The thorny issue of how to deal with the online piracy phenomenon used to be focused on punishing site users. Over time, enforcement action progressed to the services themselves, until they became both too resilient and prevalent to tackle effectively.
In Europe in particular, theres now a trend of isolating torrent, streaming, and hosting platforms from their users. This is mainly achieved by website blocking carried out by local ISPs following an appropriate court order.
While the UK is perhaps best known for this kind of action, Belgium was one of the early pioneers of the practice.
After filing a lawsuit in 2010, the Belgian Anti-Piracy Foundation (BAF) weathered an early defeat at the Antwerp Commercial Court to achieve success at the Court of Appeal. Since then, local ISPs have been forced to block The Pirate Bay.
Since then there have been several efforts (1,2) to block more sites but rightsholders have complained that the process is too costly, lengthy, and cumbersome. Now the government is stepping in to do something about it.
Local media reports that Deputy Prime Minister Kris Peeters has drafted new proposals to tackle online piracy. In his role as Minister of Economy and Employment, Peeters sees authorities urgently tackling pirate sites with a range of new measures.
For starters, he wants to create a new department, formed within the FPS Economy, to oversee the fight against online infringement. The department would be tasked with detecting pirate sites more quickly and rendering them inaccessible in Belgium, along with any associated mirror sites or proxies.
Peeters wants the new department to add all blocked sites to a national pirate blacklist. Interestingly, when Internet users try to access any of these sites, he wants them to be automatically diverted to legal sites where a fee will have to be paid for content.
While its not unusual to try and direct users away from pirate sites, for the most part Internet service providers have been so...
Another day, another data breach to report, login credentials of more than half a million records belonging to vehicle tracking device company SVR Tracking (aka Stolen Vehicle Records Tracking) have been leaked online.
The incident potentially exposes the personal data and vehicle details of drivers and businesses using the SVR Tracking service.
The unsecured AWS S3 cloud storage bucket containing SVR Tracking data was discovered by experts at Kromtech Security Center.The SVR Tracking service allows its customers to track their vehicles in real time by using a physical tracking device hidden in the vehicles.
The S3 bucket contained details of roughly 540,000 SVR accounts, including email addresses and passwords, as well as users vehicle data, such as VIN (vehicle identification number) and the IMEI numbers of GPS devices.
The exposed archive also includes information where the tracking device was hidden in the car.
The repository contained over a half of a million records with logins / passwords, emails, VIN (vehicle identification number), IMEI numbers of GPS devices and other data that is collected on their devices, customers and auto dealerships. Interestingly, exposed database also contained information where exactly in the car the tracking unit was hidden. reads the blog post published by Kromtech.
Experts highlighted that leaked passwords were protected by the weak SHA-1 hashing algorithm that was easy to crack.
The experts discovered a Backup Folder named accounts contained 540,642 ID numbers, account information that included many plate & vin numbers, emails, hashed passwords, IMEI numbers and mo......
UCLA researchers have developed a new type of air conditioner that is not only energy efficient and eco-friendly , but can also fit inside your pocket. When we think about air conditioners, the image that comes into our minds is a big bulky machine that is fitted onto a wall that cools down the entire room. These machines usually pump refrigerant fluids, that can harm the environment when they break down or arent disposed of properly. This new research, can possibly change all of this.
How does it work ?
These devices are named thermoelectric coolers do not work in the same manner as traditional ACs. They need expensive ceramic materials and are not the most efficient in cooling down entire rooms as the traditional ACs. The reason for this is the way they work.
The researchers have said these devices use electrocaloric effects , in simpler terms, an electric field is used to move the unwanted heat through specially designed materials. Polymers with special properties are used and is placed between two points a heat source where the heat is generated and the heat sink that takes away the heat.
When this polymer comes in contact with the heat source, it will absorb the heat. At this point, the electric field is inactive. When the polymer comes in contact with the heat sink, the electric field is turned on. This field will cause the molecules of the polymer to arrange themselves in a particular order which will push the heat into the sink.
Cheaper than traditional ACs ?
Besides being energy efficient, there is another reason why this technology could end up being cheaper than the AC we use today. Traditional ACs are used to cool an entire room. With this technology, companies could instead cool down individual seats thus saving on their AC bills. The researchers have even used this method to cool a Galaxy S4 by making a cooling device with flexible materials. Their results showed that this caused the phone to cool down by around 8 degrees.
It turns out that medical manufacturers also do hacking once in a while. [JanHenrikH] recently tweeted a photo of an ECG-Trigger-Unit that hed opened up. Inside he found that the LCD screen was that of a Game Boy Advance (GBA) and the reason he could tell was that the screens original case was still there, complete with GAME BOY ADVANCE SP written on it.
In the manufacturers defense, this device was likely made around
the year 2000 when gaming products were some of the best sources
for high speed, high quality, small LCDs
This design document for a portable ECG measurement
instrument from as recently as 2013 cites reasons for
using a GBA as:
The Verge had even turned up this US patent from 1997 that has the diagnostic medical device be a cartridge for plugging into a Game Boy. At the time, PCs were frequently used for medical displays but this patent cites issues such as the higher cost of PCs, software installation issues, and crashing. However, they talk about the crashing being due to running word processing and spreadsheet software on the same PC, something not likely to happen if the PC is dedicated to bedside monitoring.
But despite all those pros, wouldnt you feel surprise and alarm when you first glimpse the Game Boy inside the device thats monitoring your heart? We also have to wonder what licensing these products went through in the countries in which they were used. This particular device was made by German company Medical Imaging Electronics.
Game Boy hacks arent limited to the medical industry though. Here on Hackaday, weve seen them turned into remote controls for flying drones and weve seen Game Boy cartridge emulators that use STM32. Finally, if youre wondering where you saw [Jan Henrik]s name before, he was one of the two hackers driving the motorized armchair in a photo in our [Jenny List]s SHACamp 2017 write-up.
Our thanks to [geonomad] for the tip!
Scientists at the Francis Crick Institute have performed the UK's first human embryo editing experiment:
The blueprint for life - DNA - has been altered in human embryos for the first time in the UK. The team at the Francis Crick Institute are unravelling the mysteries of the earliest moments of life. Understanding what happens after a sperm fertilises an egg could lead to ways of improving IVF or explain why some women miscarry. The embryos were modified shortly after fertilisation and allowed to develop for seven days.
[...] The researchers used 41 embryos that had been donated by couples who no longer needed them for IVF. After performing the genetic modification, the team could watch how the embryos developed without OCT4.
Over the course of the first seven days, a healthy, normal embryo goes from one cell to about 200. It also goes through the first steps of organising itself and handing out specialised jobs to different cells. The embryo forms a hollow sphere called a blastocyst, with some cells destined to go on to form the placenta, some the yolk sac and others, ultimately, us. But without OCT4 the blastocyst cannot form. It tries - but implodes in on itself. From the embryo's perspective it is a disaster but for scientists it has given unprecedented insight.
Genome editing reveals a role for OCT4 in human embryogenesis (open, DOI: 10.1038/nature24033) (DX)
Read more of this story at SoylentNews.
Its a problem as old as photography: your camera is only as good as your lens. As cameras shrink, so do lenses, and so do the options for upgrading to a better lens. And forget about switching to a different focal length or aperture its often just not an option. Unless you make it an option by adding a CS lens mount to a high-end webcam.
Well stipulate that at 4k resolution and packed with all sorts of goodies, the Logitech Brio Pro is a heck of a nice camera. And the lens isnt bad either, as youd hope for a camera with almost 9 megapixels at its disposal. But with an optical field of view optimized for video conferencing, its hard to use this premium camera for much else. [Saulius] fixed that by taking the camera apart and adding a new case with a built-in C- and CS-mount, resulting in literally thousands of lens choices. [Saulius] post has valuable teardown information, which includes exposing the CCD sensor completely. The new case is sold as a kit, but it looks like a 3D-printed case would be pretty easy to whip up.
In a mind-boggling world first, a team of biologists and security researchers have successfully infected a computer with a malicious program coded into a strand of DNA.
It sounds like science fiction, but I assure you its quite real although you probably dont have to worry about this particular threat vector any time soon. That said, the possibilities suggested by this project are equally fascinating and terrifying to contemplate.
The multidisciplinary team at the University of Washington isnt out to make outlandish headlines, although its certainly done that. They were concerned that the security infrastructure around DNA transcription and analysis was inadequate, having found elementary vulnerabilities in open-source software used in labs around the world. Given the nature of the data usually being handled, this could be a serious problem going forward.
Submitted via IRC for SoyCow8963
The UK government has made no secret of its dislike of encrypted messaging tools, and it has made frequent reference to the problems WhatsApp causes it with regard to investigations into terrorism. Calls have been made by the government to force companies to allow access to encrypted content when asked.
In the wake of Theresa May's "more needs to be done about extremist content" speech, it has emerged that WhatsApp refused to add a backdoor that would allow the government and law enforcement agencies to access private conversations.
Sky News reports anonymous sources as saying that during the summer the government told WhatsApp to devise a way that would enable it to access encrypted messages. While WhatsApp already complies with government requests to provide meta data such as the name of an account holder, associated email address, and IP addresses used, it does not -- and, indeed, due to lack of access itself, cannot -- provide access to, or the content of encrypted messages.
Read more of this story at SoylentNews.
You could say that it is the essence of a site like this one, that the kind of people who form our readership are also the kind of people who examine the specs of the devices in front of them to reveal hidden features. Such was the case with [Ryan], who noticed that the eMMC controller on his 96Boards HiKey development board supports both HS200 data transfer speeds and 1.8v signaling, both of which it wasnt using.
In unlocking the extra performance, he takes readers through a primer on the device tree, and is happy to report that his transfer rate has increased from 26 to 36 MB/s, a tidy return on his work.
However, the story doesnt end there. The 8GB Samsung eMMC chip wasnt quite as roomy as hed have liked, so it was time to replace it with a 32GB version. Even with careful desoldering, he managed to lift a few pads, though very fortunately they were ones that were either NC or power rails that were duplicated elsewhere. Some tricky reflowing of what is quite a formidable BGA package to do by hand, and he was rewarded with a working board featuring higher flash capacity. We salute him for taking it on, we probably wouldnt have had the courage.
Weve brought you a similar upgrade before, this time an eMMC on a Nexus 5 phone.
Thanks [darkspr1te] for the tip.
Less than a week after the first release candidate (RC) was made available, the second RC build of FreeBSD 10.4 is now also ready for testing. Some of the recent noteworthy changes include: "Given that the amd64 disc1 image was overflowing, more of the base components installed into....
The Marea cable's new "open" design allows it to evolve with technology, ensuring the highest performance for users now and well into the future, even as the global population of internet users grows. And make no mistake, the demand is growing. Just think of the many high-bandwidth applications and content you use today such as Skype and Facebook Live, and the volume of streaming videos, movies and music consumed daily. This ability to interoperate with many different kinds of networking equipment brings significant benefits including lower costs and easier equipment upgrades, leading to faster growth in bandwidth rates.
Completed in less than two years nearly three times faster than is typical Marea is a powerful example of the important role the private sector has to play in connecting the world. It also set a new standard for subsea cables because it is designed to meet today's demand and evolve with the progress of tomorrow, allowing companies offering digital services to be better equipped to handle cross-border internet traffic, which is expected to increase eightfold by 2025.
Read more of this story at SoylentNews.
Ashley Brooke Taylor, Cofounder at Future Culture, joins our New Money Systems Board. Future Culture is a nonprofit partnership honing a unique perspective on the integration of blockchain and community.
Uber will lose its license to operate inside London. The issue may be only a temporary setback since the license expires on September 30th and Uber can continue to operate in London while appealing the decision:
London's transportation agency dealt a major blow to Uber on Friday, declining to renew the ride-hailing service's license to operate in its largest European market. [...] "Uber's approach and conduct demonstrate a lack of corporate responsibility in relation to a number of issues which have potential public safety and security implications," the agency, Transport for London, said in a statement.
[...] In issuing its decision, Transport for London, which is responsible for the city's subways and buses as well as regulating its taxicabs, declared that Uber was not "fit and proper" to operate in the city a designation that carries significant weight in Britain. "Fit and proper" is a benchmark applied across different sectors of business and the charitable organizations in the country to ensure that people or organizations meet the requirements of their industry or specialty. Tests typically assess factors like an individual or company's honesty, transparency and competence, though there is no formal exam. In Uber's case, Transport for London said it examined issues of how it dealt with serious criminal offenses, how it conducted background checks on drivers and its justification for a software program called Greyball that "could be used to block regulatory bodies from gaining full access to the app."
Read more of this story at SoylentNews.
Theres not many technical details but [phckopper] lets us know that the rendering is done using the SPI on the STM, transferred via DMA, which is synchronized to two saw-tooth waves that are fed in to the X and Y axes of the oscilloscope. The Z axis, which controls the brightness of the dot, is fed from the MOSI. By making the oscilloscope range all over the screen, similar to the way a CRTs gun does,  is able to draw sprites, rather than vector graphics. The display has a resolution of 400400 and each sprite is 1616. The input is from a PS2 joystick connected to [phckopper]s PC, with the information communicated over UART using a simple protocol.
While NVIDIA isn't doing much to help out Nouveau, at least the company is contributing to the open-source Linux graphics ecosystem in other ways. In addition to presenting at XDC2017 this week on the Unix device memory allocator API and DeepColor / HDR support, they also presented on server-side GLVND...
Scientists have engineered a "tri-specific antibody" that they say can attack 99% of HIV strains:
Scientists have engineered an antibody that attacks 99% of HIV strains and can prevent infection in primates. It is built to attack three critical parts of the virus - making it harder for HIV to resist its effects.
The work is a collaboration between the US National Institutes of Health and the pharmaceutical company Sanofi. The International Aids Society said it was an "exciting breakthrough". Human trials will start in 2018 to see if it can prevent or treat infection.
Trispecific broadly neutralizing HIV antibodies mediate potent SHIV protection in macaques (DOI: 10.1126/science.aan8630) (DX)
The development of an effective AIDS vaccine has been challenging due to viral genetic diversity and the difficulty in generating broadly neutralizing antibodies (bnAbs). Here, we engineered trispecific antibodies (Abs) that allow a single molecule to interact with three independent HIV-1 envelope determinants: 1) the CD4 binding site, 2) the membrane proximal external region (MPER) and 3) the V1V2 glycan site. Trispecific Abs exhibited higher potency and breadth than any previously described single bnAb, showed pharmacokinetics similar to human bnAbs, and conferred complete immunity against a mixture of SHIVs in non-human primates (NHP) in contrast to single bnAbs. Trispecific Abs thus constitute a platform to engage multiple therapeutic targets through a single protein, and could be applicable for diverse diseases, including infections, cancer and autoimmunity.
Read more of this story at SoylentNews.
Summary: The Hygiene Hypothesis persuades people to consume parasitic worms as a way to treat chronic autoimmune disorders. As well, people eat tapeworms as a way to lose weight. Learn more about two closely related scientific beliefs called the Hygiene Hypothesis and the Old Freinds Hypothesis. Part 1 of a 2-part series. Cover photo: 3drenderings / Getty Images.
Its difficult to believe, but thousands of people eat worms as a way to lose weight or cure diseases.
People dont just eat worms on TV shows, like the Fear Factor. Some extreme dieters consume tapeworms as a way to lose weight. Another group of people ingests parasitic worms known as helminths to ward-off the debilitating symptoms of autoimmune diseases.
Over Half a Million Vehicle Records from SVR Tracking Leaked
This is a post from HackRead.com Read the original post: Over Half a Million Vehicle Records from SVR Tracking Leaked Online
Summary: Helminthic therapy is the intentional consumption of parasites as a treatment for autoimmune disease. Out of the 7000 people who practice helminthic therapy each year, this report tells the story of a young woman who purchases black market worms and then treats herself at a high cost. Part 2 of a 2-part series. Cover photo: Eraxion / Getty Images.
Would you eat worms to boost your overall health or cure what ails you?
Over 7,000 people intentionally self-infect with parasites, and the practice is growing in popularity.
Phlebotomy is a fun word, and the fine art of finding veins. While the skill of putting needles in arms is honed by nurses and physicians over the course of decades, there are, of course, technological solutions to finding veins. One of the more impressive medical devices that does this uses near-infrared imaging basically looking under the skin with almost visible light. These devices cost a fortune.
One project in the Hackaday Prize is looking to change that. Its a near-infrared vein finder. Instead of the thousands of dollars professional unit costs, this one can be built for under one hundred bucks.
As far as this build goes, veins are illuminated via IR light at about 950nm. The backscatter of this light is captured via a Raspberry Pi NoIR camera, with regular old photography film blocking visible light. From there, its just a simple matter of image processing and hitting enhance several times until veins appear on a display.
Rhonda Stevenson, President of Tau Zero Foundation, joins our Space Settlement Board.
Posted by Marcus Meissner on Sep 23https://www.suse.com/security/cve/CVE-2017-9798/
SDL 2.0.6 was released on Friday as the latest feature update for this widely-used library that allows for more cross-platform portability of applications and games centered around input, audio, and video helpers...
Posted by Till Drges on Sep 23Am 23.09.2017 um 13:44 schrieb Hanno Bck:
Regular visits to the dentist are an important part of keeping your teeth healthy. But what if you could give your oral health a boost by receiving a vaccine on top of your regular dental care routine?
Led by WIOV scientist Yan Huimin, the researchers tested a fusion of proteins to prevent the development of dental caries. Better known as dental cavities, caries is caused by the bacteria Streptococcus mutans (S. mutans).
The current trend of cheap, desktop, consumer 3D printers arguably began at the World Maker Faire in New York several years ago. What began with just a single printer exploded into a mindless proliferation of extrusion boxes, and by 2012, every single booth had to have a 3D printer on display no matter how applicable a CNC machine was to what they were actually selling.
Now were in the doldrums of the hype cycle and 3D printers just arent cool anymore. This year at the World Maker Faire, 3D printers were relegated to a tiny corner of the faire, right next to the portajohns. Its the smallest showing of 3D printing Ive ever seen at the New York Maker Faire.
Of course, this doesnt mean the state of 3D printing isnt constantly improving. 3D printers have never been cheaper, more capable, or more popular. This is how technology works, really: it doesnt get good until it gets boring. Still, there were some impressive displays of the current state of 3D printing at the World Maker Faire this weekend. You can check that out below.
One of the perennial favorite 3D printers is the Prusa I3, In the last year, Prusa has been knocking everything out of the park with actual innovation like a slicer for beginners, a dead-simple implementation of variable layer thickness printing, and of course multi-material extrusion.
Now the I3 is getting an upgrade, announced today at the World Maker Faire. The I3 MK 3 is an incremental upgrade, but still has some awesome, very desirable features. The stepper drivers have been upgraded to Trinamic drivers, and the fan is now a PC Master Race-approved Noctua unit. The print bed has been upgraded to a removable, magnetic piece of spring steel coated with PEI, and theres now a touch sensor to turn the printer on. Also on the upgrade list is a Bondtech drive gear, an optical filament encoder, and the ability to recover prints after a power failure and to recover shifted layers.
There are a few pics of the prints coming off the multi-extrusion Prusa below. These are really some of the finest prints Ive ever seen coming off a 3D printer. Of course, most of this is due to the incredible operator skill demonstrated by the Prusa team, but these results show the Prusa is capable of just about anything....
A new study shows that Neanderthal brains developed more slowly than ours. An analysis of a Neanderthal child's skeleton suggests that its brain was still developing at a time when the brains of modern human children are fully formed. This is further evidence that this now extinct human was not more brutish and primitive than our species. The research has been published in the journal Science.
Until now it had been thought that we were the only species whose brains develop slowly. Unlike other apes and more primitive humans modern humans have an extended period of childhood lasting several years. This is because it takes time and energy to develop our large brain. Previous studies of Neanderthal remains indicated that they developed more quickly than modern humans - suggesting that their brains might be less sophisticated.
But a team led by Prof Antonio Rosas of the Museum of Natural Sciences in Madrid found that if anything, Neanderthal brains may develop more slowly than ours. "It was a surprise," he told BBC News. "When we started the study we were expecting something similar to the previous studies," he told BBC News.
The growth pattern of Neandertals, reconstructed from a juvenile skeleton from El Sidrn (Spain) (open, DOI: 10.1126/science.aan6463) (DX)
Read more of this story at SoylentNews.
Want to share your terminal over the web for demo, learning or collaboration purpose? Try these two applications to share your terminal as a web application.
It was announced a day or two ago, but now the PocketBone has made its first real-world appearance at the World Maker Faire in New York this weekend. This is a tiny, tiny Linux computer thats small enough to fit on a keychain, or in an Altoids mini tin. Its only $25 USD, and from the stock lists on Mouser and Digikey, there are plenty to go around.
The specs for the PocketBeagle are more or less exactly what you would expect from any BeagleBone. Theres an ARM Cortex-A8 running at 1GHz, 512 MB of RAM, and SD card storage. I/O is eight analog inputs, up to 44 digital GPIOs, up to 3 UARTs, 2 I2C busses, 2 SPI busses, and 4 PWM outputs. All of this is packed into the OSD3358 System on a Chip from Octavo Systems.
This isnt the first time weve seen Octavo Systems BeagleBone on a Chip Before the release, head Beagle herder [Jason Kridner] built a PocketBone in Eagle, which was shortly followed by [Michael Welling]s similar efforts in KiCad. The PocketBone has been a reality for months, but now its accessible to hackers who dont want to deal with soldering BGA packages.
Of course, a new development board isnt worth anything without a few demos and examples. For Maker Faire, [Jason] brought out two demos. The first of these is effectively a PacMan arcade game just a simple 3D printed enclosure, a screen, and two d-pads made out tact switches. It plays PacMan and only PacMan, but its good enough to demonstrate the Linux-ness of the PocketBone....
Posted by Kurt H Maier on Sep 23This is standard operating procedure for Red Hat, at least. Generally
Adobe is showing that it can be transparent about its security practices:
Having some transparency about security problems with software is great, but Adobe's Product Security Incident Response Team (PSIRT) took that transparency a little too far today when a member of the team posted the PGP keys for PSIRT's e-mail accountboth the public and the private keys. The keys have since been taken down, and a new public key has been posted in its stead.
The faux pas was spotted at 1:49pm ET by security researcher Juho Nurminen:
Nurminen was able to confirm that the key was associated with the email@example.com e-mail account.
[How many here have done something like this? Perhaps an extra file accidentally uploaded to GitHub? --Ed.]
Read more of this story at SoylentNews.
Azam Shaghaghi, Strategy Analyst at BMO Financial Group, joins our New Money Systems Board.
ETERNALBLUE targets the SMBv1 protocol and it has become widely adopted in the community of malware developers.
Investigations on WannaCry, for example, revealed that at least other 3 different groups have been leveraging the NSA EternalBlue exploit. In August, a new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread, earlier this year, researchers at Flashpoint observed the TrickBot banking Trojan also included an EternalBlue module as well.
The Retefe banking Trojan has historically targeted Austria, Sweden, Switzerland and Japan, and we have also observed it targeting banking sites in the United Kingdom. While it has never reached the scale or notoriety of better-known banking Trojans such as Dridex or Zeus, it is notable for its consistent regional focus, and interesting implementation. states the analysis published by ProofPoint.
Unlike Dridex or other banking Trojans that rely on webinjects to hijack online banking sessions, Retefe operates by routing traffic to and from the targeted banks through various proxy servers, often hosted on the TOR network,
Researchers have observed a wave of phishing messages using weaponized Microsoft Office documents. containing embedded Package Shell Objects, or Object Linking and Embedding Objects, that are typically Windo...
Longtime Nouveau contributors Martin Peres and Karol Herbst presented at this week's XDC2017 X.Org conference at the Googleplex in Mountain View. It was a quick talk as they didn't have a whole lot to report on due to their open-source NVIDIA "Nouveau" driver efforts largely being restricted by NVIDIA Corp...
Cybersecurity experts from Ben-Gurion University of the Negev (BGU) in Israel have demonstrated that security cameras infected with malware can be hacked invisibly and controlled using infrared (IR) light, which then can be used to either infiltrate a network or disclose sensitive information from the cameras network.
In a paper titled aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR), the researchers said that the technique can be used on professional and home security cameras, and even LED doorbells, which can detect infrared light (IR), not visible to the human eye. CCTV cameras are equipped with IR LEDs, used for night vision, and are perfect for the aIR-Jumper technique to exploit.
In this paper, we show how attackers can use surveillance cameras and infrared light to establish bi-directional covert communication between the internal networks of organizations and remote attackers. We present two scenarios: exfiltration (leaking data out of the network) and infiltration (sending data into the network), the researchers wrote.
The cyber team led by Dr. Mordechai Guri, head of research and development for BGUs Cyber Security Research Center (CSRC), demonstrated how IR can be used to create a secret communication channel between malware installed on an internal computer network and an attacker located at a distance of hundreds of metres to kilometres away with direct line of sight.
The researchers were able to leak internal data at a bit rate of 20bit/s per camera and were able to deliver commands to the network at bit rate of more than 100bit/s from one camera. The aIR-Jumper method can be used to transfer hidden signals to surveillance cameras, including PIN codes, passwords, and encryption keys, which are modulated, encoded, and then transferred to attackers.
Security cameras are unique in that they have one leg inside the organization, connected to the internal networks for security purposes, and the other leg outside the organization, aimed specifically at a nearby public space, providing very convenient optical access from various directions and angles, Mordechai Guri said in the release.
The researchers uploaded two videos on YouTube, wherein the first video shows an attacker sending infrared signals to the security camera, while the second one shows the camera (which is already infected with malware) exfiltrating data from the affected network.
In an infiltration scenario, an attacker standing in a public area (e.g., in the s...
Posted by Marc Deslauriers on Sep 23Hi,
We have always seen that Apple and Samsung try to outdo each other with their new flagships. Recently, Apple launched its premium smartphone iPhone X on September 12 in Cupertino to celebrate the 10th anniversary of the first ever iPhone. While people are still talking about Apples iPhone X, Samsung has decided not to be left behind and make its presence felt too.
According to a report by Korean publication ETNews, Samsung has reportedly developed a high speed new image sensor that can capture photos at an incredible 1,000 frames per second (fps) with 4x slow motion video capability. On the other hand, Apples iPhone X is able to take 240 frames per second based on full HD resolution.
The 4x slo-mo capture by Samsung is similar to how Sony created for its incredible Xperia XZ1 and XZ Premium smartphones. However, the company may use slightly different technology for the sensor to avoid infringement of Sony patent, the site said. For instance, Samsungs design is a little different from Sonys (which also uses a three-layer chip) in that the memory is bonded to the rear surface of an existing two-layer sensor design rather than fitted in between the image sensor and logic components.
The new image sensor camera is planned for Samsungs upcoming Galaxy S9 line and the company will start the mass production of the three-layered image sensor as early as November 17th. This layered three-structure design of the sensor is made into a layered structure by connecting a system semiconductor (logic chip) that is in charge of calculations and DRAM chip that can temporarily store data through TSV (Through Silicon Via) technology. After the pilot operation, the company will start mass producing it in December.
Currently, we are unsure if all these rumors and speculations are accurate. With Samsung not expected to announce the Galaxy S9 atleast till the start of 2018, we are likely to come across many more leaks about the device in the near future. However, on the other hand, if Samsung manages to fit the slow-mo camera into the Galaxy S9, it is expected to beat the Galaxy S8, Galaxy Note 8, iPhone X and maybe the current top end Sony phones too.
The post Samsung Galaxy S9 Video Camera May Be 4x Faster Than iPhone X appeared first on TechWorm.
I did a 30 minute podcast at Think Liberty about my #transhumanism ideas and governor run:
Our very own Kevin Shaw sits down and speaks with 2018 California Libertarian Governor candidate Zoltan Istvan. Comments comments Related.
Under Chief Judge Sharon Prost
Summary: Some of the latest actions and decisions from the Federal Circuit, which originally brought software patents to the United States and is now taking them away, gradually
LAST night we wrote about the Federal Circuit (CAFC) refuting Gilstrap yet again. We later updated our post with a statement from CCIA and then found this good coverage from a good journalist (a lot of those who cover patent issues are unfortunately with and usually from the patent microcosm). He summarised it as follows:
Not long after TC Heartland, though, the East Texas judge who hears more patent cases than any other turned down a motion to transfer by supercomputer maker Cray Inc., which was sued for patent infringement by Raytheon in 2015. Lawyers for Cray argued that, under the provisions of TC Heartland, their client was entitled to have its case in a home venue. But US District Judge Rodney Gilstrap disagreed and said that Crays ties to the districta single salesperson, working out of his homewas enough to keep the case in the Eastern District.
Today, Gilstraps decision was reversed by the US Court of Appeals for the Federal Circuit, which hears all patent appeals. In a 20-page decision (PDF), the three-judge panel directed the case against the Seattle-based tech company to be transferred.
Gilstraps decision to keep Raytheon v. Cray in his court turned the normally wonky area of patent venue into a scorching political issue. At a Capitol Hill hearing about patent reform, the judge was denounced by both Rep. Bob Goodlatte (R-Va.) and Rep. Darrell Issa (R-Calif.), with Issa calling Gilstraps decision reprehensible.
Last week the patent microcosm...
Posted by Anthony Liguori on Sep 23Just as an FYI, we (Amazon Linux AMI) also did all of the preparation
By Uzair Amir
A few months ago, two ransomware scams made news for
This is a post from HackRead.com Read the original post: New ransomware scam asks for nude pics to unlock files
Sometimes you dont have the hardware you need, and you can either do without or let the projects needs inspire you to create an alternative. Thats pretty sweet, and its even sweeter when you find a solution thats dirt cheap.
[Chu_st] created a sub-$10 blimp mount for his shotgun mike. It consists of a PVC pipe which attaches to the microphones shock mount. Plastic gardening grid is used for the shell, shaped by hand into the desired blimp shape and secured with zip ties and gaffer tape. [Chu_st] suggests using nylon stocking as a wind screen. The microphone itself attaches to a length of bicycle seat tube using a standard mic clamp.
Posted by Simon McVittie on Sep 23The Debian bug tracker (bugs.debian.org) is always public and has no
Posted by Levente Polyak on Sep 23[...]
Since the patents are not even assigned to the Mohawk people, this whole scam accomplishes nothing
Photo credit: Sarah Stierch (CC BY 4.0)
Summary: In an effort to dodge scrutiny from the Patent Trial and Appeal Board (PTAB), Allergan Plc offloaded a lot of negative publicity onto the Mohawk people, owing primarily to the Mowhawk Tribes general counsel, Dale White
THE Patent Trial & Appeal Board (PTAB) has been making many headlines recently. The patent microcosm is trying as hard as it can to kill it. It cannot kill the people inside the PTAB (whom it vainly refers to as a death squad), so it wants to kill the entire institution. Its appalling.
We were very sad to see the Mohawk people exploited, or virtually used as a sort of instrument for killing PTAB. As some people have put it, the Mohawk tribe is now facilitating a "scam" (not our word). Dont expect the patent microcosm to admit this. In fact, in some comments that we saw over the past week, all criticisms of this ploy are being dismissed or played down as being just a substance-less cry of scam. Far from it!
Earlier this week, in a site of the patent microcosm, Philippe J.C. Signore from Oblon wrote about this as a case for refreshing Constitutional Law recollection. Well, as patent radicalism is waning (the system has improved in recent years) they will try to crush the system. Here is what Signore wrote:
Article III also states that the judicial power of the U.S. is vested in the federal courts and judges. In its brief filed in August 2017, Oil States argued that IPR proceedings are unconstitutional because they are set up as adversarial judicial trials (as opposed to examination proceedings) of granted private property rights, and as such should be handled by Article III judges and not administrative agency employees who are beholden to Executive Branch officials. Oil States also argued that IPR trials resolve questions of novelty or obviousness, which are precisely the same questions that English jurors resolved, such that they fall within the Seventh Amendments scope.
The Eleventh Amen...
SolarCity, a company Tesla acquired in Nov. 2016, has agreed to pay $29.5 million to resolve allegations that it lied to the government by submitting inflated claims to cash in on a solar stimulus program, the Department of Justice announced Friday.
SolarCity has agreed to drop charges it had against the US government as part of the settlement, which is not an admission of guilt. The settlement is a SolarCity obligation, a SolarCity representative told Business Insider.
The investigation centered on a program Section 1603 set up under the Obama administration that was meant to encourage solar adoption by subsidizing installation costs. The program allowed solar companies to receive a federal grant that was equal to 30% of the cost to install or acquire solar systems.
The Justice Department alleges that SolarCity made thousands of claims that overstated the costs of its installations, allowing it to receive inflated grant payments. It has been probing SolarCity and several other solar companies since 2012.
Source: Business Insider
SolarCity was founded in 2006 by brothers Peter and Lyndon Rive, based on a suggestion for a solar company concept by their cousin, Elon Musk, who is the chairman and helped start the company. The Rive brothers left SolarCity earlier this year.
Read more of this story at SoylentNews.
Aging is a consequence of physics, not biology. Dr. Aubrey de Grey believes that the aging of any machine with moving parents is fundamentally the same, whether that machine is alive or not. He states that the SENS Foundation doesnt work on longevity and immortality it works on health. The only way we are going to live substantially longer is by staying truly youthful for substantially longer.
Dont mess with the cole
Reference: Order of succession
Summary: Antnio Campinos is quite likely the next EPO President, as insiders suspect that many applications for the job got rejected politically (turned down by political mischief)
THE German media believes that Antnio Campinos will be the next head of the EPO (the Office, not the Organisation, whose Chairman will leave one week from now). Campinos is believed to be French, for reasons we explained before [1, 2], and he is close to Battistelli. Insiders suspect that Battistelli is already paving the way for Campinos to win the job, as we previously explained in:
Imagine having 3 French Presidents (out of 4) in succession! Never mind the fact that much of the remaining management, dubbed Team Battistelli, is also French. What a coup! (French word)
Insiders suspect that Battistelli is already paving the way fo...
Posted by Hanno Bck on Sep 23Hi,
CybSec Enterprise recently launched a malware Lab called it Z-Lab, that is composed of a group of skilled researchers and lead by Eng. Antonio Pirozzi.
Its a pleasure for me to share with you the second analysis that we have recently conducted on the Petya Ransomware.
We have dissected the ransomware and discovered interesting details that are included in our report.
Below the abstract from the analysis, the detailed report is available for free on our website.
In a modern environment, where data stored in computers play a fundamental role in the private and work routine, we must consider the problem of the risk of losing these data. In fact, the ever-increasing threat, that is spreading, is Ransomware. In the last 15 years, malware writers have realized that they may have anyone in their hand with his data.
Figure 1: Characteristic Petya Skull with the corresponding UI containing the payment ransom instructions....
The study, published in Geophysical Research Letters [DOI: 10.1002/2017GL074723] [DX], adds three new members to the list of craters near Mercury's north pole that appear to harbor large surface ice deposits. But in addition to those large deposits, the research also shows evidence that smaller-scale deposits scattered around Mercury's north pole, both inside craters and in shadowed terrain between craters. Those deposits may be small, but they could add up to a lot more previously unaccounted-for ice.
"The assumption has been that surface ice on Mercury exists predominantly in large craters, but we show evidence for these smaller-scale deposits as well," said Ariel Deutsch, the study's lead author and a Ph.D. candidate at Brown. "Adding these small-scale deposits to the large deposits within craters adds significantly to the surface ice inventory on Mercury."
[...] To seek further evidence that such smaller-scale deposits exist, the researchers looked though the altimeter data in search of patches that were smaller than the big crater-based deposits, but still large enough to resolve with the altimeter. They found four, each with diameters of less than about 5 kilometers. "These four were just the ones we could resolve with the MESSENGER instruments," Deutsch said. "We think there are probably many, many more of these, ranging in sizes from a kilometer down to a few centimeters."
Also at the American Geophysical Union.
Read more of this story at SoylentNews.
Earlier this year Keith Packard started a contract gig for Valve working to improve Linux's support for virtual reality head-mounted displays (VR HMDs). In particular, working on Direct Rendering Manager (DRM) and X.Org changes needed so VR HMDs will work well under Linux with the non-NVIDIA drivers...
As an avid fan of the show Dr Who, [Adam Sifounakis] saw a model for a laser-cut TARDIS that piqued his curiosity that eventually grew into a multi-week project involving multiple setbacks, missteps, revamps and finally gratification. Behold, his sound activated TARDIS.
First and foremost, assembling and painting the model was a fun puzzle despite a few trips to the store with a little backtracking on the painting due to impatience. Next, the creation of a pulsing soft white LED circuit timed with an audio clip to really sell the image of a mini-TARDIS proved to be a tedious ordeal, paying off in the end with a satisfying glow through the vellum-diffused windows on the model.
How to trigger the lights? [Sifounakis] initially wanted a capacitive sensor to trigger the sound effects, but that way lay dragons and madness so he went with snap-activated effect to activate the TARDIS like the Doctor himself. After struggling with building his own microphone setup, he switched to an electret mic with adjustable gain which worked like a charm. Setting up this TARDIS Adafruit Pro Trinket brain involved a snag or two, and after that it was smooth s...
I have been traveling for about two weeks now, spending 10 days camping in Iceland and now a few days on the ferry to get back. For this trip I brought along my Samsung N150 Plus (a very old netbook), loaded with openSUSE Linux 42.3.
Speak the word mainframe to many millennial techies, and the first things that likely come to mind are in the form of grainy sepia photos of floor-to-ceiling, wall-to-wall computers with big spinning tapes. But thats far from the reality of the modern mainframe.
Imagine instead up to 240 10-core, 5.2ghz processors, 32TB of RAIM (redundant array of independent memory), hardware-based encryption, and fully hot-swappable hardware components. Those are the specs of the newly released IBM z14 a single machine that could replace the computing resources of an average corporate data center with room to spare.
An epidemiological survey has found there were about 400 million patients needing new teeth in China, but the number of qualified dentists was lagging behind demand.
In March this year the US Food and Drug Administration approved the use of a robot system named Yomi designed to assist human surgeons when fitting implants.
Successful procedure raises hopes technology could avoid problems caused by human error and help overcome shortage of qualified dentists.
PUBLISHED : Thursday, 21 September, 2017, 6:30pm.
UPDATED : Friday, 22 September, 2017, 9:43pm.
China is once again operating the world's fastest train service after a speed cap was lifted:
China increased the maximum speed of bullet trains on the Shanghai-Beijing line to 350 kilometers per hour yesterday, six years after a fatal accident led to a speed cap. The limit was reduced to 300kph after 40 people died in a high-speed train crash near Wenzhou, east China's Zhejiang Province, in July 2011.
The decision to increase the speed means that China once again has the world's fastest train service. The new limit cuts the time of the 1,318-kilometer journey between Shanghai and the capital to four hours and 28 minutes, saving passengers nearly an hour. A total of 14 trains a day will run between the two cities at the higher speed.
Read more of this story at SoylentNews.
For most torrent fans around the world, The Pirate Bay is the big symbol of international defiance. Over the years the site has fought, avoided, and snubbed its nose at dozens of battles, yet still remains online today.
But there is another site, located somewhere in the east, that has been online for nearly as long, has millions more registered members, and has proven just as defiant.
RuTracker, for those who havent yet found it, is a Russian-focused treasure trove of both local and international content. For many years the site was frequented only by native speakers but with the wonders of tools like Google Translate, anyone can use the site at the flick of the switch. When people are struggling to find content, its likely that RuTracker has it.
This position has attracted the negative attention of a wide range of copyright holders and thanks to legislation introduced during 2013, the site is now subject to complete blocking in Russia. In fact, RuTracker has proven so stubborn to copyright holder demands, it is now permanently blocked in the region by all ISPs.
Surprisingly, especially given the enthusiasm for blockades among copyright holders, this doesnt seem to have dampened demand for the sites services. According to SimiliarWeb, against all the odds the site is still pulling in around 90 million visitors per month. But the impressive stats dont stop there.
This week, RuTracker celebrates its 13th birthday, a relative lifetime for a site that has been front and center of Russias most significant copyright battles, trouble which doesnt look like stopping anytime soon.
Back in 2010, for example, RU-Center, Russias largest domain name registrar and web-hosting provider, pulled the plug on the sites former Torrents.ru domain. The Director of Public Relations at RU-Center said that the domain had been blocked on the orders of the Investigative Division of the regional prosecutors office in Moscow. The site never got its domain back but carried on regardless, despite the setbacks.
Back then the site had around 4,000,000 members but now, seven years on, its ranks have swelled to a reported 15,382,907. According to figures published by the site this week, 778,317 of those members signed up this year...
[MotoGeeking] built a giant spray booth and is in the process of making customized, air-filtering barn doors for it. When it came to buy hardware to move the doors, though, he found all the ready-made options to be prohibitively expensive. You know what comes next: he designed barn door hardware from the ground up, and did it as cheaply as possible.
After intensely studying many images of barn doors and hardware, [MotoGeeking] decided on the right wheels and went from there. Kick scooter wheels fit the bill nicely, since they are designed to support a lot of weight and come with their own bearings and spacers. And theyre cheap, too just $9 for a pair.
[MotoGeeking] found some C channel extruded aluminium that seemed to be a perfect match for the wheels, but the wheel was quick to bind whenever it touched the sides. He solved that one by epoxying a length of round bar into the bottom corners. This allows the wheel to move freely while forcing it to stay centered in the track.
In designing the 1/4 aluminium brackets, [MotoGeeking] took a measure thrice, order once approach to selecting the fasteners. You probably know by now that McMaster-Carr has free CAD drawings for every little thing. [MotoGeeking] imported the ones he liked into Illustrator and built around them. This helped him get it right the first time and kept the headaches and hair-tearing away. Watch the giant door skeleton glide effortlessly on its track after the break.
Researchers at The University of Manchester have developed the world's first handheld SORS device that can detect fake spirits, such as vodka and whisky, whilst still in their bottles.
SORS, or 'spatially offset Raman spectroscopy," devices give highly accurate chemical analysis of objects and contents beneath concealing surfaces, such as glass bottles. It works by using 'an optical approach' where lasers are directed through the glass, enabling the isolation of chemically-rich information that is held within the spirits.
Such devices are already commercially available but are usually used for security and hazmat detection, screening and pharmaceutical analysis. This latest version, developed at the University's School of Chemistry in the Manchester Institute of Biotechnology (MIB), is the first time such a handheld tool is being used for a food or beverage product. The reseach has been published in Nature today (21st September).
Spirit drinks are the EU's biggest agri-food export, with EU governments' revenues of at least 23 billion in excise duties and VAT, and approximately 1 million jobs linked to the production, distribution and sale of spirit drinks.
Bah, I make my own.
Read more of this story at SoylentNews.
There was a shocking moment in this weeks Senate Commerce Committee hearing on the Stop Enabling Sex Traffickers Act (SESTA). Prof. Eric Goldman had just pointed out that members of Congress should consider how the bill might affect hundreds of small Internet startups, not just giant companies like Google and Facebook. Will every startup have the resources to police its users activity with the level of scrutiny that the new law would demand of them? There is a large number of smaller players who dont have the same kind of infrastructure. And for them, they have to make the choice: can I afford to do the work that youre hoping they will do?
Goldman was right: the greatest innovations in Internet services dont come from Google and Facebook; they come from small, fast-moving startups. SESTA would necessitate a huge investment in staff to filter users activity as a companys user base grows, something that most startups in their early stages simply cant afford. That would severely hamper anyones ability to launch a competitor to the big Internet playersgiving users a lot less choice.
Sen. Richard Blumenthals stunning response: I believe that those outliersand they are outlierswill be successfully prosecuted, civilly and criminally under this law.
Given the extreme penalties for under-filtering, platforms would err in the opposite direction, removing legitimate voices from the Internet.
Blumenthal is one of 30 cosponsorsand one of the loudest championsof SESTA, a bill that would threaten online speech by forcing web platforms to police their members messages more stringently than ever before. Normally, SESTAs proponents vastly understate the impact that the bill would have on online communities. But in that unusual moment of candor, Sen. Blumenthal seemed to lay bare his opinions about Internet startupshe thinks of them as unimportant outliers and would prefer that the new law put them out of business.
Lets make something clear: Google will survive SESTA. Much of the SESTA fights media coverage has portrayed it as a battle between Google and Congress, which sadly misses the point. Large Internet companies may have...
The first high-risk bug, tracked as CVE-2017-5121, is an Out-of-bounds access in V8 reported by Jordan Rabet, Microsoft Offensive Security Research and Microsoft ChakraCore team on 2017-09-14.
The expert received a $ 7,500 reward under the Google bug bounty program.
The second high-risk vulnerability, tracked as CVE-2017-5122, is an Out-of-bounds access in V8 as well that was reported by Choongwoo Han of Naver Corporation on 2017-08-04.
The CVE-2017-5122 vulnerability was also awarded a $3,000 bounty.
According to Krishna Govind from Google, many vulnerabilities in Google solutions have been detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.
To date, Google has already fixed 25 vulnerabilities (8 of them were assessed as High-severity issues) affecting different Chrome 61 releases, half of which were reported by external researchers.
Google already paid over $30,000 in bug bounty rewards to the external security researchers who discovered the vulnerabilities, the highest one was $7,500.
(Security Affairs Google Chrome, bug bounty)
Posted by Salvatore Bonaccorso on Sep 22Hi
A few years ago, we saw the rise of software-defined radios with the HackRF One and the extraordinarily popular RTL-SDR USB TV tuner dongle. Its been a few years, and technology is on a never-ending upwards crawl to smaller, cheaper, and more powerful widgets. Now, some of that innovation is making it to the world of software-defined radio. The LimeSDR Mini is out, and its the cheapest and most capable software defined radio yet. Its available through a Crowd Supply campaign, with units shipping around the beginning of next year.
The specs for the LimeSDR mini are quite good, even when compared to kilobuck units from Ettus Research. The frequency range for the LimeSDR Mini is 10 MHz 3.5 GHz, bandwidth is 30.72 MHz, with a 12-bit sample depth and 30.72 MSPS sample rate. The interface is USB 3.0 (the connector is male, and soldered to the board, but USB extension cables exist), and the LimeSDR is full duplex. That last bit is huge the RTL-SDR cant transmit at all, and even the HackRF is only half duplex. This enormous capability is thanks to the field programmable RF transceiver found in all of the LimeSDR boards. We first saw these a year or so ago, and now these boards are heading into the hands of hackers. Someones even building a femtocell out of a Lime board.
The major selling point for the LimeSDR is, of course, the price. The early bird rewards for the Crowd Supply campaign disappeared quickly at $99, but there are still plenty available at $139. This is very inexpensive and very fun on the Crowd Supply page, you can see a demo of a LimeSDR mini set up as an LTE base station, streaming video between two mobile phones. These are the golden days of hobbyist SDR.
Microsoft is apparently working on to make Windows into a modular operating system known as Andromeda OS internally at the Redmond HQ, that will work cross-platform, on any device type or architecture, as reported by Microsoft insiders at Windows Central. Andromeda OS is the future support of Windows 10 operating system.
Windows OS is more than 30 years old now and is based on old and demanding code, architecture and features. With the introduction of Andromeda OS, Microsoft is looking to make Windows 10 a universal OS that will allow it to adapt to each specific device without being based on particular, prior product variants. In other words, Andromeda OS will turn Windows 10 into a modular system suitable for different architectures rather than the x86 architecture used by desktops, laptops, and tablets running Intel or AMD chips.
Andromeda OS will allow any functions to be added or removed to suit the system or device its required to run on. This will in turn offer developers the flexibility to build versions of Windows 10 with different features and functions, quickly and efficiently or use a Windows OS without being affected by performance-sapping features not required by the device.
Microsoft is expected to replace the mobile platform Windows 10 Mobile with Andromeda OS likely to be seen in phones and tablets, and possibly even wearables in 2018 or later.
The post Microsofts Andromeda OS to turn Windows 10 into a modular platform appeared first on TechWorm.
Janet Faulkner, Program Manager at the University of Houston, joins our Futurists Board.
From the lowRISC blog:
We are looking for a talented hardware engineer to join the lowRISC team and help make our vision for an open source, secure, and flexible SoC a reality. Apply now!
lowRISC C.I.C. is a not-for-profit company that aims to demonstrate, promote and support the use of open-source hardware. The lowRISC project was established in 2014 with the aim of bringing the benefits of open-source to the hardware world. It is working to do this by producing a high quality, secure, open, and flexible System-on-Chip (SoC) platform. lowRISC C.I.C. also provides hardware and software services to support the growing RISC-V ecosystem. Our expertise includes the LLVM Compiler, hardware security extensions and RISC-V tools, hardware and processor design.
[...] lowRISC is an ambitious project with a small core team, so you will be heavily involved in the project's development direction. This role will involve frequent work with external contributors and collaborators. While much of the work will be at the hardware level the post will offer experience of the full hardware/software stack, higher-level simulation tools and architectural design issues.
Some practical experience of hardware design with a HDL such as Verilog/SystemVerilog is essential, as is a good knowledge of the HW/SW stack. Ideally, candidates will also have experience or demonstrated interest in some of: SoC design, large-scale open source development, hardware or software security, technical documentation, board support package development and driver development. Industrial experience and higher degree levels are valued, but we would be happy to consider an enthusiastic recent graduate with a strong academic record.
Informal enquires should be made to Alex Bradbury firstname.lastname@example.org.
takyon (thanks to an AC): lowRISC is a project to create a "fully open-sourced, Linux-capable, system-on-a-chip"; it is based around RISC-V, the "Free and Open RISC Instruction Set Architecture", which is meant to provide an extensible platform that scales from low-level microcontrollers up to highly parallel, high-bandwidth general-purpose supercomputers.
Reduced instruction set computer (RISC).
Marsia Bealby, Coeditor of "Current Research in Egyptology 2012: Proceedings of the Thirteenth Annual Symposium", joins our Futurists Board.
The Raspberry Pi is a powerful embedded computing platform. However, for all its Linux-based muscle, it lacks one thing that even the simplest 8-bit microcontrollers usually have analog-to-digital conversion. There are a great many ways to rectify this shortcoming, and [Chris Burgess] has brought us another with an 8-channel ADC for the Raspberry Pi.
For the ADC, [Chris] chose the MCP3008, for its low cost and availability. In this configuration it offers 10-bit resolution and a maximum sampling rate of 200 kilosamples per second. Adafruit has a great guide on working with the MCP3008, too. With such a useful resource to hand, [Chris] was able to spin up a PCB to interface the chip to the Raspberry Pi using SPI. [Chris] took care to try to make the board to the official HAT specifications. As far as the physical aspects go, the board is to spec, however [Chris] omitted the EEPROM required for auto-configuration purposes. That said, the pads are on the board if someone wants to take the initiative to install one.
Its a tidy build that provides something sorely missing from the Raspberry Pi, for a reasonable cost. [Chris]s goal was to build something that would enable the measurement of analog sensors for a robot project; wed love to hear your ideas for potential uses in the comments!
WIRED wants to take you on the deepest dive yet into the science behind the Impossible Burger.
Biting into an Impossible Burger is to bite into a future in which humanity has to somehow feed an exploding population and not further imperil the planet with ever more livestock. Because livestock, and cows in particular, go through unfathomable amounts of food and water (up to 11,000 gallons a year per cow) and take up vast stretches of land. And their gastrointestinal methane emissions aren't doing the fight against global warming any favors either (cattle gas makes up 10 percent of greenhouse gas emissions worldwide).
This is the inside story of the engineering of the Impossible Burger, the fake meat on a mission to change the world with one part soy plant, one part genetically engineered yeastand one part activism. As it happens, though, you can't raise hell in the food supply without first raising a few eyebrows.
Read more of this story at SoylentNews.
Microsofts first mission statement envisioned a computer on every desk and in every home, but Bill Gates also had another goal: that computers would someday be able to see, hear, communicate and understand humans and their environment.
More than 25 years and two CEOs later, Microsoft is betting its future on it.
As if the onslaught of hurricanes Irma and Maria were not enough, the National Weather Service in San Juan is reporting that a major dam is failing in Puerto Rico and that 70,000 people are being evacuated by bus. From CBS:
The National Weather Service in San Juan said Friday that the northwestern municipalities of Isabela and Quebradillas, home to some 70,000 people, were being evacuated with buses because the nearby Guajataca Dam was failing after Hurricane Maria hit the U.S. territory.
Maria poured more than 15 inches of rain on the mountains surrounding the dam, swelling the reservoir behind it.
Details remained slim about the evacuation with communications hampered after the storm, but operators of the dam reported that the failure was causing flash-flooding downstream. The 345-yard dam holds back a man-made lake covering about 2 square miles and was built decades ago, U.S. government records show.
"Move to higher ground now," the weather service said in a statement. "This is an extremely dangerous and life-threatening situation. Do not attempt to travel unless you are fleeing an area subject to flooding or under an evacuation order."
"Act quickly to protect your life," it added. "Buses will be evacuating people from these areas."
Wikipedia has a page about Guajataca Dam
Read more of this story at SoylentNews.
According to CNBC, Tesla is teaming up with AMD to develop a custom chip optimized for AI, to be used for self-driving features in Tesla cars. The head of Tesla's "Autopilot" team is Jim Keller, formerly of AMD and Apple, who helped design the A4 and A5 chips while working at Apple and was lead architect on the Athlon 64 at AMD.
GlobalFoundries, which fabricates chips for Advanced Micro Devices Inc, said on Thursday that Tesla had not committed to working with it on any autonomous driving technology or product, contradicting an earlier media report. [...] The spokesperson for GlobalFoundries said that Jhas comments at the GlobalFoundries Technology Conference were not reported accurately.
Read more of this story at SoylentNews.
Sen. Elizabeth Warren (D-Mass.) is no longer blocking President Donald Trumps nominee to head the Justice Departments Antitrust Division, Reuters reported.Warren on Friday reportedly lifted her hold and will allow the Senate to vote on Makan...
GitLab 10.0 has been released. "With every monthly release of GitLab, we introduce new capabilities and improve our existing features. GitLab 10.0 is no exception and includes numerous new additions, such as the ability to automatically resolve outdated merge request discussions, improvements to subgroups, and an API for Wiki thanks to a contribution from our open source community."
[rabbitcreek] based his the tide prediction software off of [Luke Millers] Tide Clock, which applies location-specific adjustments to the standard lunar clock, taking into consideration such factors as the geographic features (basin depth, etc.) that modify the default timing. [Miller]s Arduino code includes a library of common locations organized by NOAA station number.
[rabbitcreek]s project consists of a Adafruit Feather board hooked up to a DS3231 RTC breakout and a HS-225BB servo, which turns the clocks hand. Its an 180-degree servo, attached to a hacked-down Actobotics gearbox gearing the servo down 2:1 to permit 360 degrees of movement.
He also wanted his creation to be left to operate unattended for years, theoretically so solar power was a natch. The face of the clock consists of individual wavers o...
The Clear Containers team at Intel has announced the release of Clear Containers 3.0. "Completely rewritten and refactored, Clear Containers 3.0 uses Go language instead of C and introduces many new components and features. The 3.0 release of Clear Containers brings better integration into the container ecosystem and an ability to leverage code used for namespace based containers."
When is it on?
The Blockchain for Good Hackathon takes place Saturday, 30 September and Sunday, 1 October. Full agenda can be found here.
How many years has it been going?
This is the inaugural event.
What exciting things can people look forward to for the 2017 version?
Facebook has announced that the React, Jest, Flow, and Immutable.js projects will be moving to the MIT license. This is, of course, a somewhat delayed reaction to the controversy over the "BSD+patent" license previously applied to those projects. "This decision comes after several weeks of disappointment and uncertainty for our community. Although we still believe our BSD + Patents license provides some benefits to users of our projects, we acknowledge that we failed to decisively convince this community."
It should come as no surprise that the first recorded use of the number zero, recently discovered to be made as early as the 3rd or 4th century, happened in India. Mathematics on the Indian subcontinent has a rich history going back over 3,000 years and thrived for centuries before similar advances were made in Europe, with its influence meanwhile spreading to China and the Middle East.
As well as giving us the concept of zero, Indian mathematicians made seminal contributions to the study of trigonometry, algebra, arithmetic and negative numbers among other areas. Perhaps most significantly, the decimal system that we still employ worldwide today was first seen in India.
With such a significant technical lead, how did they fall behind?
Read more of this story at SoylentNews.
Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password.
In addition to requesting something you know to log in (in this case, your password), an account protected with 2FA will also request information from something you have (usually your phone or a special USB security key). Once you put in your password, you'll grab a code from a text or app on your phone or plug in your security key before you are allowed to log in. Some platforms call 2FA different thingsMulti-Factor Authentication (MFA), Two Step Verification (2SV), or Login Approvalsbut no matter the name, the idea is the same: Even if someone gets your password, they won't be able to access your accounts unless they also have your phone or security key.
There are four main types of 2FA in common use by consumer websites, and it's useful to know the differences. Some sites offer only one option; other sites offer a few different options. We recommend checking twofactorauth.org to find out which sites support 2FA and how, and turning on 2FA for as many of your online accounts as possible. For more visual learners, this infographic from Access Now offers additional information.
Finally, the extra layer of protection from 2FA doesn't mean you should use a weak password. Always make unique, strong passwords for each of your accounts, and then put 2FA on top of those for even better log-in security.
When you enable a site's SMS 2FA option, you'll often be asked to provide a phone number. Next time you log in with your username and password, you'll also be asked to enter a short code (typically 5-6 digits) that gets texted to your phone. This is a very popular option for sites to implement, since many people have an SMS-capable phone number and it doesn't require installing an app. It provides a significant step up in ac...
Your weekly selection of awesome robot videos Image: ANYbotics via YouTube
Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next two months; heres what we have so far (send us your events!):
Let us know if you have suggestions for next week, and enjoy todays videos.
This video shows some impressively robust autonomous rough-terrain locomotion from ANYmal, but its mostly worth watching for the epic ANYmal back massage (!) at the end:
We present an architecture for rough-terrain locomotion with quadrupedal robots. All sensing, state estimation, mapping, control, and planning runs in real-time onboard the robot. The method is implemented on the quadrupedal robot ANYmal and we present experiments of climbing stairs, steps, and slopes and show how the robot can adapt to changing and moving environments.
By Pter Fankhauser, Marko Bjelonic, Miki Takahiro, Tanja Baumann, C. Dario Bellicoso, Christian Gehring, and Marco Hutter.
[ ANYmal ]
Some of you have been waiting a long, long, long time for this: an actual Jibo unboxing and setup video!
Jibos are shipping now for early Indiegogo backers. Im not sure how Sean got his first, but itll be interesting to see what...
The Samba 4.7.0 release is out. New features include whole DB read locks (a reliability improvement), active directory with Kerberos support, detailed audit trails for authentication and authorization activities, a multi-process LDAP server, better read-only domain controller support, and more. See the release notes for details.
Hes no better than Randall Rader, a facilitator of trolls (discharged with dishonor, so to speak)
Photo from Reuters
Summary: The man whose court has become a trolling factory is being refuted (but not reprimanded) by the CAFC, which certainly can see that something is amiss and serves to discredit the system as a whole
THE media does not usually name judges (personifying cases). But Gilstrap is a special case; he himself has become the story due to outrageous rulings on patents (and more recently copyrights, too). The judge whom prominent politicians have dubbed reprehensible keeps ignoring the Supreme Court [1, 2]. He has single-handedly decided that the litigation industry in his town is more important than the law itself.
What will people think of the legal system, having read about the tales of Gilstrap? Its almost as though he is proudly biased; he boasts about it and openly invites patent trolls to his court (for favourable treatment). If he continues to make complete and utter mockery of the law, how long will it take before higher courts intervene at a more personal level/capacity?
Well, towards the end of this week the patent microcosms media took note of one such development; Federal Circuit rejects Gilstraps test for patent venue, said the headline. Here is the opening paragraph (much of the rest is behind a paywall):
The Federal Circuit has reversed an Eastern District of Texas refusal to transfer the Cray case, and rejected Judge Gilstraps test for determining patent venue. This includes the appeals court stating there must be a physical, geographical location in the district from which the business of the defendant is carried out
Almost simultaneously the other site of the patent micr...
Quantum computer is touted as the next big leap in technology. China has been leading the Quantum computer arena and has already sent a hack-proof quantum computer into space. They even managed to achieve the first ever Star Trek-like teleportation by sending a Photon 500 km from space to the Space Center in China. The United States is not far behind but its Quantum computer technology is shrouded in secret under the official secrets act. Indian scientists who have made a name for themselves by sending Mangalyaan a Mars orbiter at 1/5th the price of American Mars Orbiter and launching an extraordinary 104 satellites in the space at one go.
Now the Indian scientists have embarked on their next mission building Indias own Quantum computer. Keen to tap into the next big advance in computing technology, the Department of Science and Technology (DST) is planning to build its own quantum computer.
Unlike the normal computer and laptops that we have at our homes, the quantum computer employs the principles of quantum mechanics to store information in qubits instead of the typical bits of 1 and 0. While our computers and laptops run on the principle of bits and bytes, the Quantum computers run on Qubits These Qubits are theoretically 100 times faster than the conventions bits and bytes and work faster because of the way such circuits are designed, and their promise is that they can do intensive number-crunching tasks much more efficiently than the fastest comparable computers.
Quantum computers are considered to the fastest things on Earth. To give you an example, a quantum computer would require 3.5 million fewer steps than a traditional machine to sort and parse a billion numbers. A quantum computer can find the solution in only 31,623 steps compared to the millions of steps a conventional computer would take.
One of the top uses of Quantum computer is of course military. Indian military could have the power to number crunch any problems from field military formations to in-house missile tests and hydrogen yield testing. Quantum computer can also be used to predict the weather correctly. India depends on monsoon and a correct prediction may help its millions of farmers produce a variety of crops according to the monsoon outbreak. A quantum computer can also help ISROs space programme besides providing the necessary infrastructure for the Aadhar card backbone. The Indian government hopes to directly credit benefits and subsidies (Universal Basic Inco...
Mark Zuckerberg announced on Friday that he was dropping a bid to maintain majority control of Facebook while he and his wife Priscilla sell off almost all of their shares in the company to fund their philanthropy.Zuckerberg specifically said in a...
It has happened again, security researchers with Kromtech Security Research Center discovered a new Verizon leak exposed confidential and sensitive data on internal systems.
Leaked data includes server logs and credentials for internal systems, the huge trove of documents was found on an unprotected Amazon S3 bucket.
The archive seems to refer to internal Verizon Wireless systems, known as Distributed Vision Services (DVS), that is a middleware system used by the company to deliver data from the back-end systems to the front-end applications used by employees and staff in stores and at call centers.
On September 20th, Kromtech Security researchers discovered publicly accessible Amazon AWS S3 bucket containing around 100MB of data attributing to internal Verizon Wireless system called DVS (Distributed Vision Services). states a blog post published by Kromtech.
DVS is the middleware and centralized environment for all of Verizon Wireless (the cellular arm of VZ) front-end applications, used to retrieve and update the billing data.
The Amazon cloud storage contained several files, mostly scripts and server logs that included some login credentials to internal systems, some folders contained internal Verizon confidential documents, another folder contained 129 Outlook messages with internal communications within Verizon Wireless domain.
The repository contained:
Although no customers data are involved in this data leak, some scripts could be used by an attacker to elevate privileges within the internal systems and access them.
Some documents, marked as confidential and proprietary materials, include detailed information on the internal infrastructure, including server IP addresses and global router hosts.
Its not clear why the confidential documents were exposed on a public server.
According to ZDNet, the unprotected Amazon S3 storage server was controlled by an employee that told ZDNet on the phone Thu...
Arcan, the open-source display server powered by a game engine, is out with a new release. Its Durden desktop environment has also been updated...
The U.S. Marine Corps will soon have its first female infantry officer. The unnamed lieutenant is expected to lead an infantry platoon of about 40 marines:
The Marine Corps is set to have its first female infantry officer, a milestone in its nearly 250-year-long history.
The lieutenant is scheduled to graduate with her all-male peers on Monday after she completed all of the graduation requirements in the service's grueling 13-week Infantry Officer Course, the Corps said. Her completion of the course was first reported by The Washington Post. The officer's name was not made public.
The course was opened to women in 2012, and on an experimental basis. More than 30 women attempted it, but when none passed, the course was once again closed to females in the spring of 2015. After the Pentagon opened all military jobs to women, four additional women tried the course without success.
Also at The Hill.
Read more of this story at SoylentNews.
Summary: The existing status of GNU/Linux in a world full of patent trolls, which not only target OEMs from Asia typically in the US but are also dragging them into Europe, aided by the EPOs patent bubble
THE FREE/LIBRE software world is thriving. Its spreading everywhere. But that does not mean that users of such software are protected from frivolous lawsuits, especially in countries where software patents exist. Developers too are occasionally being threatened or sued; we have given examples where projects got shut down due to these actions.
Readers might rightly wonder why we havent said a single thing about Red Hats latest press release; we instead included about a dozen stories in our daily links under the Red Hat section (not much new there, just reiteration of a promise from a decade and a half ago). We are more concerned about real, existing, potent threats to software.
Intellectual Ventures founder Greg Gorder has left the firm, becoming the latest of the quartet of its founders to step away from the business, following Peter Detkin and Ed Jung. According to his bio, which remains on the IV website, Gorder left earlier this month and will now focus on his familys philanthropic activities.
Detkin stood down as vice chairman in January 2015, although he has continued to devote part of his time to IV-related work. Earlier this year he became a senior adviser to Sherpa Technology Group, the consulting business that was established by former VP of IP at IBM and IP Hall of Fame member Kevin Rivette. Jung also took on a new role at the start of the year, becoming CEO of Xinova, the innovation business that was spun out of IV in 2016.
Intellectual property is the next software, Myhrvold once said. It means that to him its all about patents. This Microsoft-connected patent troll is already suing quite a few companies that distribute BSD and/or GNU/Linux. Its not a matter of if or when. The battle began years ago, but Intellectual Ventures operates through v...
Rather than fighting to control plasma, this startups device exploits instabilities to fuse atoms Photos: LPPFusion (2)
Since nuclear fusions earliest days, the sun has served as the ultimate prototype. Its the closest continuously functioning large-scale fusion reactor, after all. Why not copy from the best? So tokamaks, stellarators, and laser ignition facilities all strive to create high-pressure and high-temperature plasmas that behave like microcosms of the suns core.
One of the biggest challenges these systems face is achieving the tight control they require over the plasma fuel they seek to fuse. But one New Jersey fusion startup company is taking a very different tack: Guide the plasmas instability; dont fight it, says Eric Lerner, president and chief scientist at LPPFusion, based in Middlesex, N.J.
LPPFusion is building what it calls a Dense Plasma Focus (DPF) device. This consists of a thick, hollow central anode surrounded by a ring of cathodes that are about the size and shape of candles. And indeed, the whole thing looks rather like a candelabra.
Heres how its supposed to work: The device sits in a chamber filled with the gas to be fused at a low pressure, while a bank of external capacitors blast pulses of electricity down the electrodes, forming a plasma from the gas. In a millionth of a second, the electric blast reaches the top of the electrodes, and natural instabilities produce filaments of plasma. The pulse of current reaches the end of the electrodes, and the filaments combine and collapse near the mouth of the cathode. This produces microscopic balls of plasma called plasmoids. Further instabilities in the plasmoids produce electron beams, which heat up the plasmoids to the temperatures required for fusion.
Still under peer review as of press time was a paper submitted to the journal Physics of Plasmas,......
T-Mobile and Sprint are close to an agreement on a major wireless merger, Reuters reported on Friday.The deal would revive an effort that was abandoned in 2014 amid tough regulatory hurdles under President Obama. The Trump administration since...
Researchers have reported an idea to implant nanotube yarns that could draw electricity from flowing blood Image: Fudan University/Wiley
To power wearable electronics, engineers have for years been tinkering with ways to generate electricity from our bodies. Theyve cooked up schemes to convert heartbeats, footsteps, and muscle motions into electricity.
Now a team from Fudan University in China has come up with a method for generating electricity from blood flow using a tiny fiber spun from carbon nanotubes. The idea is that the fiber could be implanted in a blood vessel to harvest the energy from flowing blood. Theyve presented the rudimentary concept in Angewandte Chemie , and havent tested the device in animals yet.
To make the 0.8-millimeter-diameter fibers, they either wrap a plastic fiber with an ordered array of carbon nanotubes, or simply twist a carbon nanotube sheet to make a yarn-like thread.
As the solution flows past, negative ions in the solution and electrons drawn from the nanotubes try to balance out the electric double layer. But they dont quite succeed: more charge builds up at the front of the flow. And this leads to a potential difference between the two ends of the fiber, generating voltage and electric current. Other teams have made nanotube-based yarns that generate electricity when twisted and stretched.
When the fiber is put in a tube that is connected on each end with a copper wire and has salty fluid flowing through it, it generates power with an efficiency of over 23 percent. This is higher than previously reported fiber-shaped energy harvesting devices, the researchers say. The electrical output is higher with longer fibers, faster-flowing liquid, and more concentrated salt solution.
A 30-centimeter-long device generates...
Molecular computing reaches another milestone Image: Nanchang University/Nature Nanotechnology STM image of all the initial -form molecules in the middle row that changed into the -form owing to a single manipulation
The history of molecular computing and electronics has been a long and twisting roadone that was meticulously catalogued on the pages of IEEE Spectrum two years ago. While the future of molecular electronics and computing remains somewhat up in the air, a great deal of research is still being focused on the field.
There have been proof-of-concept molecular switches, molecular data storage bits, and diodes. However, one fundamental issue that has not been resolved is the transfer and exchange of signals between molecular devices for complex signal processing at room temperature.
Now researchers at Nanchang University in China have described, in the journal Nature Nanotechnology , a device that uses a particular kind of molecule that takes on two specific geometries when in contact with a copper surface. These two geometries can serve as the 0 and 1 of digital logic.
The work is based on a phenomenon known as in-plane molecular orientation, which occurs when an organic molecule lands on a solid surface. This adsorbed molecule might take different adsorption geometries. These adsorption geometries can be classified into several groups.
In our case, the molecule we used has two distinguished adsorption geometries on a copper surface, explained Li Wang, professor of physics at Nanchang University, in an e-mail interview with IEEE Spectrum. One is left-handed, the other is right handed. For the purposes of data storage or transfer, We define left-handed geometry as 1 and the right-handed geometry as 0, added Wang.
Wang and his colleagues discovered that the in-plane orientation of a molecule could be controlled by the in-plane orientations of two neighboring molecules due to their intermolecular interactions. The researchers exploited this intermol...
No more waiting for an orderly to see you out, or an attendant to see you to your gate Photo: Panasonic
Autonomous vehicles can add anew member to their ranksthe self-driving wheelchair. This summer, two robotic wheelchairs made headlines: one at a Singaporean hospital and another at a Japanese airport.
The Singapore-MIT Alliance for Research and Technology, or SMART, developed the former, first deployed in Singapores Changi General Hospital in September 2016, where it successfully navigated the hospitals hallways. It is the latest in a string of autonomous vehicles made by SMART, including a golf cart, an electric taxi, and most recently, a scooter that zipped more than 100 MIT visitors around on tours in 2016.
The SMART self-driving wheelchair has been in development since January 2016, says Daniela Rus, director of MITs Computer Science and Artificial Intelligence Laboratory and a principal investigator in the SMART Future Urban Mobility research group. Today, SMART has two wheelchairs in Singapore and two wheelchairs at MIT being tested in a variety of settings, says Rus.
The robots computer uses data from three lidars to make a map. A localization algorithm then determines where the smart chair is on the map. The chairs six wheels lend stability, and the chair is designed to make tight turns and fit through normal-size doorframes. When we visited several retirement communities, we realized that the quality of life is dependent on mobility. We want to make it really easy for people to move around, said Rus in a recent MIT statement.
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog