Open source software, applications, and projects are becoming more commonplace, at least more than they ever have been. Thats because major organizations and brands have now embraced the development philosophy.
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
In response to my anti-NetNeutrality blogs/tweets, people ask
what about this? In this post, I address the second question.
The FCC plans to completely repeal #NetNeutrality this week.Christian J. (@dtxErgaOmnes) November 22, 2017
Here's the censorship of speech that actually happened without Net Neutrality rules:#SaveNetNeutrality pic.twitter.com/6R29dajt44
So in response to my anti-netneutrality tweets/blogs, Jose
Pagliary asks "what about this?"
The FCC plans to completely repeal #NetNeutrality this week.Christian J. (@dtxErgaOmnes) November 22, 2017
Here's the censorship of speech that actually happened without Net Neutrality rules:#SaveNetNeutrality pic.twitter.com/6R29dajt44
It's been about a decade, but Toyota is finally doing humanoid robots again Image: Toyota Toyota's new T-HR3 humanoid robot.
Toyota has announced the T-HR3, a brand-new, third-generation humanoid robot. Its 1.5-meter tall, weighs 75 kilograms, and has 32 degrees of torque-controlled freedom plus a pair of 10 fingered hands. At first glance, it appears to be very capable, with excellent balance and coordination, and Toyota has decided to approach autonomy by keeping a human in the loop inside of a sophisticated, immersive Master Maneuvering System.
As with most flagship robotics projects from large Japanese companies, Toyota has done a very good job of not telling anyone about it until theyre good and ready, meaning that all we have to go on at the moment is a press release and some basic specs and videos. Weve got those to share, along with some thoughts on what this robot is all about, below.
From the press release:
Toyota Motor Corporation (Toyota) today revealed T-HR3, the company's third generation humanoid robot. Toyota's latest robotics platform, designed and developed by Toyota's Partner Robot Division, will explore new technologies for safely managing physical interactions between robots and their surroundings, as well as a new remote maneuvering system that mirrors user movements to the robot.
T-HR3 reflects Toyota's broad-based exploration of how advanced technologies can help to meet people's unique mobility needs. T-HR3 represents an evolution from previous generation instrument-playing humanoid robots, which were created to test the precise positioning of joints and pre-programmed movements
Were trying to figure out exactly what the third generation refers to. There were a couple different versions of Toyotas musical humanoid partner robots from the 2000s; the first one of these could play the trumpet, and was introduced in 2003:
The second could play the violin, and had more muscular legs and significantly better hair:
Theres also this robot, though, which appears to have a completely different set of legs (and a massive battery pack) to enable much more dynamic movements:
Who wants warm drinks? Well, coffee drinkers, we guess. Other than them, who wants warm drinks? Tea drinkers, sure. How about room temperature drinks? No one, thats who. Its silly to buy a refrigerator to cool down a single drink, so what option are you left with? Ice cubes? Theyll dilute your drink. Ice packs and a cooler? Sure, theyll keep your drinks cold, but theyre hardly cool are they? No, if you want a cold drink the cool way, you build a thermoelectric cooler. And if you want to build one, youre in luck, because [John Park] has a tutorial to do just that up on AdaFruit.
After the break, you can watch as [John] goes over the project and builds it, or go to the AdaFruit website and follow the instructions to build your own. As [John] says, there might be better ways to chill your drinks, but this is definitely one of the more science-y and interesting ones. For more projects using the Peltier Effect, try this one that uses the effect in sous-vide cooking, or this one, a Peltier cooled micro-fridge!
The First Amendment is too often overlooked in discussions of the National Security Agencys vast surveillance authorities. But as Congress considers whether to reauthorize Section 702 of FISA this winter, we must remember that its not just our Fourth Amendment rights to privacy that are in the crosshairs, but also our First Amendment rights. These rights to anonymously speak, associate, access information, and engage in political activism are the bedrock of our democracy, and theyre endangered by the NSAs pervasive surveillance.
The NSA uses Section 702 to justify ongoing programs to siphon off copies of vast amounts of our communications directly from the Internet backbone as well as require system-wide searches across the information collected by major Internet companies like Google, Facebook, and Apple.
So how does the First Amendment come to apply to mass surveillance? To understand this, we need to begin with a little history of the civil rights movement.
As part of the backlash to the Supreme Courts ruling striking down segregation in schools, the Attorney General of Alabama, John Patterson, brought a lawsuit against a leading civil rights organization, the National Association for the Advancement of Colored People (NAACP). The lawsuit alleged that the NAACP violated a state law requiring foreign corporations to file certain paperwork and get approval before practicing business in Alabama. The NAACP is a nonprofit membership organization; it didnt file the paperwork because it believed it was exempt. While the NAACP fought the suit, the state issued a subpoena demanding detailed records from the NAACP, including membership lists and bank records. The NAACP refused to surrender its membership lists, fearing retaliatory consequences for its members. Because of this refusal, the court fined the NAACP $10,000, which after five days was raised to $100,000. The NAACP continued to fight the order for two years until the Supreme Court took up the issue, never surrendering its membership lists.
Ultimately the NAACP was vindicated. The Supreme Court recognized that the First Amendment protected the associational privacy interests of NAACP members. It directly recognized that freely associating for advocacy or other purposes is a fundamental right. It noted that state invasions of privacy could infringe on that right: It is beyond debate that freedom to engage in association for the advancement of beliefs and ideas is an inseparable aspect of the "liberty" assured by the Due Process Clau...
While the Directory has been and continues to be a great resource to the world for over a decade now, it has the potential to be a resource of even greater value. But it needs your help!
This week we're back to work on adding new entries to the Directory. The backlog of unapproved packages continues to dwindle, but we want to get it all the way down to zero, and keep adding more. Each new package helps to make the Directory a better resource for finding any sort of software that you may need. The Directory is one of our most visited resources, so keeping it growing ensures there's lots for all those users to see.
If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting.
This op-ed by a "net neutrality expert" claims the FCC has
always defended "net neutrality". It's garbage.
This wrong on its face. It imagines decades ago that the FCC inshrined some plaque on the wall stating principles that subsequent FCC commissioners have diligently followed. The opposite is true. FCC commissioners are a chaotic bunch, with different interests, influenced (i.e. "lobbied" or "bribed") by different telecommunications/Internet companies. Rather than following a principle, their Internet regulatory actions have been ad hoc and arbitrary -- for decades.
Sure, you can cherry pick some of those regulatory actions as fitting a "net neutrality" narrative, but most actions don't fit that narrative, and there have been gross net neutrality violations that the FCC has ignored.
There are gross violations going on right now that the FCC is allowing. Most egregiously is the "zero-rating" of video traffic on T-Mobile. This is a clear violation of the principles of net neutrality, yet the FCC is allowing it -- despite official "net neutrality" rules in place.
The op-ed above claims that "this [net neutrality] principle was built into the architecture of the Internet". The opposite is true. Traffic discrimination was built into the architecture since the beginning. If you don't believe me, read RFC 791 and the "precedence" field.
More concretely, from the beginning of the Internet as we know it (the 1990s), CDNs (content delivery networks) have provided a fast-lane for customers willing to pay for it. These CDNs are so important that the Internet wouldn't work without them.
I just traced the route of my CNN live stream. It comes from a server 5 miles away, instead of CNN's headquarters 2500 miles away. That server is located inside Comcast's network, because CNN pays Comcast a lot of money to get a fast-lane to Comcast's customers.
The reason these egregious net net violations exist is because it's in the interests of customers. Moving content closer to customers helps. Re-prioritizing (and charging less for) high-bandwidth video over cell networks helps customers.
You might say it's okay that the FCC bends net neutrality rules when it benefits consumers, but that's garbage. Net neutrality claims these principles are sacred and should never be violated. Obviously, that's not true -- they should be violated when it benefits consumers. This means what net neutrality is really saying is that ISPs can't be trusted to allows act to benefit consumers, and therefore need government oversight. Well, if that's your principle, then...
A dash of start-up moxie could speed up biomedical innovation Photo: Dave Thompson/AFP/Getty Images
Who will invent tomorrows life-saving and life-extending medicines? Not medical schools. Not research physicians. Not biologists.
Really? The geeks will save us? Maybe. Spanning diseases as diverse as cancer and malaria, in the gnarly fields of memory extension and cognitive decline, electrical engineers and computer scientists are revitalizing and reshaping the face of biomedical innovation.
Part of the reason is desperation. Biomedical innovators are experiencing a crisis in performance. For decades, vast increases in spending on traditional forms of medical research have resulted in fewer effective drugs or therapies.
The stagnation of biomedical innovation is an invitation to wealthy digital innovators to insist they can do better. In his second book, Zero to One: Notes on Startups, or How to Build the Future, Peter Thiel, a well-known venture capitalist, argues that health researchers are overly cautious, too prone to asking permission from health bureaucrats, and infatuated with publishing studies instead of contributing to beneficial health outcomes.
These frustrations prompted Thiel, in 2016, to fund unregulated human trials for a herpes vaccine in the Caribbean nation of St. Kitts and Nevis.
Because digital innovators rarely face federal regulations, they suspect that government tends to cripple biomedical creativity. As evidence, they point to weak results by the National Institutes of Health, which spends a staggering US $30 billion a year on research.
Forged in the early 1960s, the paradigm for pharmaceutical innovation has remained virtually unchanged for nearly 50 years, Kenneth Kaitin, director of the Tufts Center for the Study of Drug Development, has written. During a period when most other research-based industries have made frequent and often sweeping modifications to their R&D processes, the pharmaceutical sector continues to utilize a drug development process that is slow, inefficient, risky, and expensive.
Computer people think they can fix a broken process. One reason: The success of...
The ThinkPad X1 Carbon has been enjoying its time on Linux 4.15. In addition to the recent boot time tests and kernel power comparison, here are some raw performance benchmarks looking at the speed from Linux 4.10 through Linux 4.15 Git...
Spotted at Lobsters is a thread about a stackoverflow question on man; why does running "man -w" report "gimme gimme gimme" when run at 00:30?
This gets this response:
Pretty much the whole story is in the commit. The maintainer of man is a good friend of mine, and one day six years ago I jokingly said to him that if you invoke man after midnight it should print "gimme gimme gimme", because of the Abba song called "Gimme gimme gimme a man after midnight":
Well, he did actually put it in. A few people were amused to discover it, and we mostly forgot about it until today.
Anyone know of other good easter eggs that have cropped up unexpectedly and caught users out?
Read more of this story at SoylentNews.
A key Democrat is calling on the Federal Trade Commission (FTC) to investigate a massive Uber breach that released data on 57 million people, as well as the company's delay in reporting the cyber incident."The unending barrage of breaches shows that...
There is an entire subculture of people fascinated by computer keyboards. While the majority of the population is content with whatever keyboard came with their computer or is supplied by their employer usually the bottom basement squishy membrane keyboards there are a small group of keyboard enthusiasts diving into custom keycaps, switch mods, diode matrices, and full-blown ground-up creations.
Ariane Nazemi is one of these mechanical keyboard enthusiasts. At the 2017 Hackaday Superconference, he quite literally lugged out a Compaq with its beautiful brominated keycaps, and brought out the IBM Model M buckling spring keyboard.
Inspired by these beautiful tools of wordcraft, [Ariane] set out to build his own mechanical keyboard and came up with something amazing. Its the Dark Matter keyboard, a custom, split, ergonomic, staggered-columnar, RGB backlit mechanical keyboard, and at the 2017 Hackaday Superconference, he told everyone how and why he made it.
A rubber dome keyboard. The only spring pressure comes from a sheet of rubber
Ninety-nine percent of the keyboards youll ever see are crappy rubber dome keyboards. This is a specific type of switch, made with two contacts on a PCB, a sheet of rubber with a bunc...
Uber is facing mounting scrutiny from lawmakers, states and several countries after revealing a massive data breach affecting information on 57 million customers and drivers.The company notified regulators on Tuesday of the breach, which took place...
Multiple countries are launching probes into Uber after a report revealed that it had covered up a massive cyber attack that exposed the data of 57 million passengers and drivers last year.According to Reuters, four countries the United...
If a tech came out to diagnose something on my property and pulled out divining rods Id take them off the tech and beat them using them.
Itd be like the police saying We have no leads but the Ouija board is being fetched as we speak
Making outdoor lighting more efficient doesn't reduce light pollutionit encourages people to use more light Gif: Earth Science and Remote Sensing Unit/Johnson Space Center/NASA These photos from 2010 and 2015 show changes in outdoor lighting in Calgary, Canada. In the 2015 photo, many new areas on the edge of Calgary are lit up. Some neighborhoods have also switched from orange sodium lamps to white LED lamps.
Around the world, more lights keep being switched on. A new analysis of satellite data from the past four years shows that the total acreage lit by artificial light at night increased by an average of 2.2 percent a year. The brightness of the areas lit at the start of the study also increased by the same rate2.2 percent annuallyaround the globe.
That growth is disappointing, says Christopher Kyba of the GFZ German Research Center for Geoscience in Potsdam. A member of the International Dark-Sky Association, he had hoped that efforts to switch outdoor lighting from sodium lamps to efficient LEDs would reverse the loss of the night.
Instead, he says, "the use of artificial lighting is increasing and we're losing more and more of the night on a planetary scale."
Light pollution was an issue even before LEDs, and it wasn't
just astronomers who complained. City-dwellers were annoyed by the
glare from bright lights shining in their windows. Naturalists
found that artificial lights were affecting animals including
insects, bats, and sea turtles. In 2012, the European Union
launched the Loss
of the Night Network to monitor environmental effects of
The improvements in energy efficiency brought by LED street lights are clear. But the extent of artificial lighting at night has been hard to monitor. Photos from military weather satellite photos showed the global extent of artificial lighting, but the cameras were not calibrated to measure brightness and were prone to changes in sensitivity.
That changed after the October 2011 launch of a NOAA satellite carrying the Visible Infrared Imaging Radiometer Suitea set of instruments that includes a sensor calibrated to measure nighttime radiance at wavelengths from 500 to 900 nanometers. That sensor's main pur...
I'll be speaking at OWASP London tomorrow. It will be the same talk I just gave at Defcamp two weeks ago, and it will be the last time I give this talk.
It's sold out, but there will be a live streaming posted somewhere (maybe on their facebook page?).
After that, I will be talking at Black Hat Europe about Disco and libDisco. Stay tuned.
Provide of CVV and Bank Logins + MSR/ATM Skimmers good prices
- US cvv: Visa/Master: $2 - Amex Card/Discover: $4
- UK cvv: Card Random: $8, With D.O.B/With Pin: $13
- CA cvv: $10
- Paypal verified with mail and pass login: $25
* Only sell, not share and I don't want to see SCAM and SPAM here.
* I will send CVV checked live after you make payment. If cvv not good i'll change it in 5mins.
* Who bought please verified for me.
* Contact me for more details:
- ICQ (/UIN):...
Sell cvv with good quality
The Federal Circuit always says no to software patents (this year at least) and the Supreme Court (SCOTUS) rejects any petitions for it to deal with such matters
Summary: The reality of the matter is grim for software patents and the patent microcosm, borrowing the media as usual, tries to give false hopes by insinuating that the Supreme Court (SCOTUS) may overturn Alice quite soon
THE battle in the courtroom is over. Software patents are pretty much over. So the battle has been taken to the press, where the patent industry places its lies and marketing on an almost daily basis. We keep track of all this.
So the battle has been taken to the press, where the patent industry places its lies and marketing on an almost daily basis.Yesterday/today, using the word survive in the headline (inverting narratives, wherein the aggressor merely survives or is attacked by the defendant), the high-factor media of lawyers speaks of Alice and asks, Will Any Software Patents Survive?
Here is the outline:
In his Patent and Trademark Law column, Robert L. Maier writes: In recent weeks, the Federal Circuit has continued to affirm district court decisions finding software-related patents invalid for failure to meet the patentable subject matter requirement of 35 U.S.C. 101. At the same time, a petition for certiorari to the Supreme Court was filed seeking to challenge the availability of this very defensea petition that, if heard by the Supreme Court, could have dramatic implications for U.S. patent litigation.
They have been saying things like these for a number of months, but it never materialises. SCOTUS wont be revisiting the subject of software patents any time soon (if ever). We wrote about this dozens of times before. The above is one of those real soon now prophecies/narratives (akin to Team UPCs); they just try to give a glimmer of hope to clients and convince them to carry on pursuing software patents.
What does all this say about the patent law firms? Or about the media? Watch this...
As it turns out, turning off location services on Android devices does not mean that Google cant pinpoint your location. According to a recent Quartz report, since the beginning of 2017, Android phones have been collecting the addresses of nearby cellular towers and sending that data back to Google. This happened even if the user turned off location services, didnt use any (Google) apps, and hasnt even inserted a carrier SIM card. The revelation has More
Many of us are visiting parents/relatives this
Thanksgiving/Christmas, and will have an opportunity to help our
them with cybersecurity issues. I thought I'd write up a quick
guide of the most important things.
HP dedicates significant efforts in designing secure printing systems, a recent marketing campaign launched by the firm shows the dangers of vulnerable printers for corporate networks.
HP launched new enterprise LaserJet printers back in 2015 and introduced several security improvements across the time.
Experts from FoxGlove Security tested an HP PageWide Enterprise 586dn multi-functional printer (MFP) and an HP LaserJet Enterprise M553n printer.
The team used a hacking tool dubbed PRET (PRinter Exploitation Toolkit) developed by researchers from Ruhr-Universitt Bochum in Germany.
At the time, the tool was used by the author to find security vulnerabilities in 20 printer models manufactured by Dell, Brother, Konica, Samsung, HP, OKI, and Lexmark.
The printers were affected by flaws related to common printing languages, PostScript and PJL, used in most laser printers. The flaws are not a novelty, according to the experts, they have existed for decades.
Now experts from FoxGlove used the PRET tool to find a path traversal flaw that allowed them to access the content of any print job, inclu...
An Oxford graduate's failure to get a top degree cost him a lucrative legal career, the High Court has heard.
Faiz Siddiqui alleges "inadequate" teaching on his modern history course resulted in him getting a low upper second degree in June 2000. He blames staff being absent on sabbatical leave and is suing the university for 1m. Oxford denies negligence and causation and says the case is "massively" outside the legal time limit.He said: "Whilst a 2:1 degree from Oxford might rightly seem like a tremendous achievement to most, it fell significantly short of Mr Siddiqui's expectations and was, to him, a huge disappointment."
Mr Mallalieu said his employment history in legal and tax roles was "frankly poor" and he was now unemployed, rather than having a career at the tax bar in England or a major US law firm. Mr Siddiqui also said his clinical depression and insomnia have been significantly exacerbated by his "inexplicable failure". Julian Milford, for Oxford University, told the court Mr Siddiqui complained about insufficient resources, but had only described the teaching as "a little bit dull".
Perhaps he might find employment with "This is Windows calling..."
Read more of this story at SoylentNews.
Recent developments on the world political stage have brought the destructive potential of electromagnetic pulses (EMP) to the fore, and people seem to have internalized the threat posed by a single thermonuclear weapon. Its common knowledge that one bomb deployed at a high enough altitude can cause a rapid and powerful pulse of electrical and magnetic fields capable of destroying everything electrical on the ground below, sending civilization back to the 1800s in the blink of an eye.
Things are rarely as simple as the media portray, of course, and this is especially true when a phenomenon with complex physics is involved. But even in the early days of the Atomic Age, the destructive potential of EMP was understood, and allowances for it were made in designing strategic systems. Nowhere else was EMP more of a threat than to the complex web of communication systems linking far-flung strategic assets with central command and control apparatus. In the United States, one of the many hardened communications networks was dubbed the Groundwave Emergency Network, or GWEN, and the story of its fairly rapid rise and fall is an interesting case study in how nations mount technical responses to threats, both real and perceived.
GWEN began as a patch for a perceived gap in the communications network connecting the countrys strategic nuclear assets primarily the launch control centers (LCC) of the ballistic missile launch facilities to the National Command Authority, which is basically the president. Like all strategic communications systems, GWEN was designed to incorporate best practices for surviving the electromagnetic effects of an EMP. But GWEN had another mission....
President Trumps feud with CNN is casting a shadow over the Justice Departments lawsuit to block AT&T from merging with Time Warner, the news outlets parent company.The Justice Departments decision to bring a lawsuit against a vertical...
Summary: In an effort to sabotage PTAB with its inter partes reviews the patent microcosm is organising one-sided events that slam PTABs legitimacy and misrepresent statistics
THE Patent Trial and Appeal Board (PTAB) is loved by everyone except those whose entire business [sic] model is litigation. This isnt exactly surprising and hopefully the Justices have already grasped that. In a matter of months they will likely cement PTABs role in the USPTO.
The patent industry isnt happy. Its not supposed to be happy. Its a parasite.
A short while ago Managing IP published Michael Shore vows to take a wrecking ball to the IPR system an article in which Michael Shore, an architect of a scam or a sham (he schemed to misuse tribal immunity), is portrayed as anything but a con artist. Speaking to the aggressors and sharks at IP Dealmakers Forum, he thinks this behaviour of his is normal and acceptable:
The lawyer behind Allergans controversial transfer of patents to a Native American tribe said at the IP Dealmakers Forum that other companies are lining up to do deals and that universities endowment funds are interested in getting involved. Shore outlined why he believed these types of deals are here to stay
Its one of those echo chamber-type events. Its stacked/loaded with PTAB foes. These people arent doing so well. Their business is certainly diminishing. It looks, for example, like a lot of IAM staff left quite recently. About half the names (of writers) are gone in just a matter of months. Is this patent trolls lobby dying with the trolls?
Yesterday, Fenwick & West, proponents of software patents in the US and elsewhere, braced hands with the patent trolls lobby (IAM et al) in this PTAB-bashing article which is based on an IAM event. To quote: So we see some evidence supporting both sides of the argument. But that doesnt mean we should give up on...
Posted by Securify B.V. on Nov 22------------------------------------------------------------------------
While Sci-Hub is praised by thousands of researchers and academics around the world, copyright holders are doing everything in their power to wipe the site from the web.
The publisher was further granted a broad injunction, requiring various third-party services to stop providing access to the site. This includes domain registries, which have the power to suspend domains worldwide if needed.
Yesterday, several of Sci-Hubs domain names became unreachable. While the site had some issues in recent weeks, several people noticed that the present problems are more permanent.
Sci-hub.io, sci-hub.cc, and sci-hub.ac now have the infamous serverhold status which suggests that the responsible registries intervened. The status, which has been used previously when domain names are flagged for copyright issues, strips domains of their DNS entries.
This effectively means that the domain names in question have been rendered useless. However, history has also shown that Sci-Hubs operator Alexandra Elbakyan doesnt easily back down. Quite the contrary.
In a message posted on the sites VK page and Twitter, the operator points out that users can update their DNS servers to the IP-addresses 220.127.116.11 and 18.104.22.168, to access it freely again. This rigorous measure will direct all domain name lookups through Sci-Hubs servers.
In addition, the Sci-Hub.bz domain and the .onion address on the Tor network still appear to work just fine for most people.
Its clear that Ukraine-born Elbakyan has no intention of throwing in the towel. By providing free access to published research, she sees it as simply...
Posted by Chad Dougherty on Nov 22One more reference that might help you, perhaps indirectly, is
Facebook announced on Wednesday that it's creating a portal that will allow its users to see what pages created by Russian actors they may have liked or followed. The company says that it will be rolling out the tool, which will be available in...
Researchers have created a nanoscale magnetic circuit that can send along bits of information in three dimensions Illustration: Ddalo Sanz-Hernndez This illustration shows the steps to fabricate a new 3D magnetic circuit. In steps 1 and 2, an electron microscope and gas injector print a scaffold onto a silicon substrate. In step 3, the scaffold is covered with a magnetic material. In step 4, a laser reads the magnetic information contained within the structure.
Researchers at the University of Cambridge in the UK have broken the paradigm of two-dimensional circuits used to store and transmit data and created a nanoscale magnetic circuit that can send along bits of information in three dimensions.
These new magnetic-based circuits have the potential to form architectures where logic and memory circuits are merged together, according to the researchers. This merger could reduce the energy required for data transfer associated with any logic operation and could prove to be a boon for battery-powered applications, such as mobile phones or the Internet of Things.
In traditional circuits, electrons are pushed around conducting tracks, which are gated using transistors. The electrons flow depending on which transistors are opened or closed, allowing information to be processed and stored. When electrons move through the material in this traditional architecture, they experience resistance due to collisions with atoms in the conducting tracks.
In magnetic circuits such as the ones used in this work, which is described in the journal ACS Nano , the feature of electrons used to encode information is not their charge, but their spina quantum-mechanical property.
The difference between a standard and a magnetic system can be visualized in a simple way by comparing people running on a stadium track versus a crowd wave at the grandstand, explained coauthor Ddalo Sanz-Hernndez. In a traditional system, electrons are physically moving, like people running, and collide with obstacles along their way. In magnetic systems such as these, in analogy to a crowd wave, people do not need to move, but transmit the information by interacting with their neighbours in a very efficient way.
There are two steps to create the circuit, according to coauthor Ama...
Posted by Michal Zalewski on Nov 22Not the same tool, but Hanno released a bignum fuzzer that found quite
Earlier this month the FFmpeg project landed its initial NVDEC NVIDIA video decoding support after already supporting NVENC for video encoding. These new NVIDIA APIs for encode/decode are part of the company's Video Codec SDK with CUDA and is the successor to the long-used VDPAU video decoding on NVIDIA Linux boxes. That NVDEC support has continued getting into shape...
Facebook has failed to repair a feature in its ad tools that allows housing advertisers to discriminate against certain races, a practice that is illegal under the Fair Housing Act.In February, ProPublica discovered that Facebooks ad platform...
How many times it has happened to you when you look for something online and the next moment you find its advertisement on almost every other web page or social media site you visit? Web-tracking is not new. Most of the websites log its users' online activities, but a recent study from Princeton University has suggested that hundreds of sites record your every move online, including your
Posted by Guido Vranken on Nov 22Peter,
Brendan Gregg introduces a set of BPF-based tracing tools on opensource.com. "Traditional analysis of filesystem performance focuses on block I/O statisticswhat you commonly see printed by the iostat(1) tool and plotted by many performance-monitoring GUIs. Those statistics show how the disks are performing, but not really the filesystem. Often you care more about the filesystem's performance than the disks, since it's the filesystem that applications make requests to and wait for. And the performance of filesystems can be quite different from that of disks! Filesystems may serve reads entirely from memory cache and also populate that cache via a read-ahead algorithm and for write-back caching. xfsslower shows filesystem performancewhat the applications directly experience."
We all know the old saw: if its too good to be true, it probably is. But nowhere does this rule seem to break down as regularly as when we order parts. Banggood, AliExpress, and eBay are flooded with parts ready to be magically transported across the globe to our doorsteps, all at prices that seem to defy the laws of economics.
Most of these transactions go off without a hitch and we get exactly what we need to complete our Next Cool Thing. But its not always so smooth, as [Kerry Wong] recently discovered with an eBay order that resulted in some suspicious chips. [Kerry] ordered the AD633 analog multiplier chips as a follow-up to his recent Lorenz Attractor X-Y recorder project, where he used an Arduino to generate the chaotic butterflys data set as a demo for the vintage instrument. Challenged in the comments to do it again in analog, [Kerry] did his homework and found a circuit to make it happen. The needed multipliers were $10 a pop on DigiKey, so he sourced cheaper chips from eBay. The $2 chips seemed legit, with the Analog Devices logo and everything, but the circuit didnt work. [Kerry]s diagnosis in the video below is interesting, and its clear that the chips are fakes. Caveat emptor.
Heres hoping that [Kerry] sources good chips soon and regales us with a successful build. Until then, what are your experiences with cheap chips? Have you been burned by overseas or domestic suppliers before? Does any single supplier seem like a better bet to you, or is it all hit or miss? Sound off in the comments below.
Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for more than a year. This week, the ride-hailing firm ousted its chief security officer and one of his deputies for their roles in keeping the hack under wraps, which included a $100,000 payment to the attackers.
Compromised data from the October 2016 attack included names, email addresses and phone numbers of 50 million Uber riders around the world, the company told Bloomberg on Tuesday. The personal information of about 7 million drivers was accessed as well, including some 600,000 U.S. driver's license numbers. No Social Security numbers, credit card information, trip location details or other data were taken, Uber said.
"None of this should have happened, and I will not make excuses for it." - Dara Khosrowshahi
At the time of the incident, Uber was negotiating with U.S. regulators investigating separate claims of privacy violations. Uber now says it had a legal obligation to report the hack to regulators and to drivers whose license numbers were taken. Instead, the company paid hackers to delete the data and keep the breach quiet. Uber said it believes the information was never used but declined to disclose the identities of the attackers.
Is it just me, or does Uber dig itself deeper each time?
Read more of this story at SoylentNews.
Multiple states including New York and Illinois have opened investigations into a massive 2016 breach at Uber that exposed data on 57 million customers.The breach first came to light on Tuesday when Bloomberg reported that executives at the...
IARPAs deep-learning challenge solicits AI to analyze satellite images Photos: DigitalGlobe/IARPA
Spy satellites and their commercial cousins orbit Earth like a swarm of space paparazzi, capturing tens of terabytes of images every day. The deluge of satellite imagery leaves U.S. intelligence agencies with the worlds biggest case of FOMOfear of missing outbecause human analysts can sift through only so many images to spot a new nuclear enrichment facility or missiles being trucked to different locations. Thats why U.S. intelligence officials have sponsored an artificial-intelligence challenge to automatically identify objects of interest in satellite images.
Since July, competitors have trained machine-learning algorithms on one of the worlds largest publicly available data sets of satellite imagerycontaining 1 million labeled objects, such as buildings and facilities. The data is provided by the U.S. Intelligence Advanced Research Projects Activity (IARPA). The 10 finalists will see their AI algorithms scored against a hidden data set of satellite imagery when the challenge closes at the end of December.
The agencys goal in sponsoring the Functional Map of the World Challenge aligns with statements made by Robert Cardillo, director of the U.S. National Geospatial-Intelligence Agency, who has pushed for AI solutions that can automate 75 percent of the workload currently performed by humans analyzing satellite images.
It seems to me like these agencies want to generate maps automatically, says Mark Pritt, a research scientist at Lockheed Martin, without having to have a human person look at a satellite image and saying, Oh, theres a smokestack there, let me mark it on the map. Todays maps are generated manually.
Pritt and his colleagues at Lockheed make up one of many teams from academia, government labs, and the private sector that are competing for a total of US $100,000 in prize money. They and other contestants are eager to deploy deep-learning algorithms that can recognize specific patterns and identify objects of interest in Earth imagery. Such images are typically gathered through remote-sensing technologies aboard satellites, aircraft, and drones.
Satellite images present a far greater sorting challenge to deep-learning algorithms than do online ph...
Uber suffered a breach in October 2016, which resulted in the compromise of sensitive information of some 57 million users and drivers, and paid off the hackers to keep mum about it. Compromised data According to a statement by current Uber CEO Dara Khosrowshahi, the stolen data included names, email addresses and mobile phone numbers of users and drivers around the world, as well as drivers license numbers of around 600,000 drivers in the United More
I'm regularly asked if I would consider selling merchandise featuring the Moans (the outro family of puppets). So I'm trying out a storefront on Teespring. Unfortunately the prices are higher than I was expecting, but it seems well organised, so I thought I'd give it a go. If there is any interest I'll add the rest of the family (and Zac) in later.
Here is the link: https://teespring.com/stores/techmoan-merch
Security updates have been issued by Arch Linux (roundcubemail), Debian (optipng, samba, and vlc), Fedora (compat-openssl10, fedpkg, git, jbig2dec, ldns, memcached, openssl, perl-Net-Ping-External, python-copr, python-XStatic-jquery-ui, rpkg, thunderbird, and xen), SUSE (tomcat), and Ubuntu (db, db4.8, db5.3, linux, linux-raspi2, linux-aws, linux-azure, linux-gcp, and samba).
For the first time ever astronomers have studied an asteroid that has entered the Solar System from interstellar space. Observations from ESO's Very Large Telescope in Chile and other observatories around the world show that this unique object was traveling through space for millions of years before its chance encounter with our star system. It appears to be a dark, reddish, highly-elongated rocky or high-metal-content object. The new results appear in the journal Nature on 20 November 2017.
On 19 October 2017, the Pan-STARRS 1 telescope in Hawai`i picked up a faint point of light moving across the sky. It initially looked like a typical fast-moving small asteroid, but additional observations over the next couple of days allowed its orbit to be computed fairly accurately. The orbit calculations revealed beyond any doubt that this body did not originate from inside the Solar System, like all other asteroids or comets ever observed, but instead had come from interstellar space. Although originally classified as a comet, observations from ESO and elsewhere revealed no signs of cometary activity after it passed closest to the Sun in September 2017. The object was reclassified as an interstellar asteroid and named 1I/2017 U1 (`Oumuamua).
"We had to act quickly," explains team member Olivier Hainaut from ESO in Garching, Germany. "`Oumuamua had already passed its closest point to the Sun and was heading back into interstellar space."
...  The Pan-STARRS teams proposal to name the interstellar objet[sic] was accepted by the International Astronomical Union, which is responsible for granting official names to bodies in the Solar System and beyond. The name is Hawaiian and more details are given here. The IAU also created a new class of objects for interstellar asteroids, with this object being the first to receive this designation. The correct forms for referring to this object are now: 1I, 1I/2017 U1, 1I/`Oumuamua and 1I/2017 U1 (`Oumuamua). Note that the character before the O is an okina. So, the name should sound like H O u mu a mu a. Before the introduction of the new scheme, the object was referred to as A/2017 U1.
-- submitted from IRC. See also here.
Hyperprecise clocks in our cellphones mean well always know where we are in time and space Illustration: Emily Cooper
For Fridtjof Nansen, 13 April 1895 started well. Six days earlier, the Norwegian explorer had set a new record for the closest approach to the North Pole, and now he was moving quickly over unbroken sea ice toward Cape Fligely and home. But then came a sickening realization: In his eagerness to break camp, he had forgotten to wind the chronometers. He had lost track of precise time, and thus the ability to track his longitude.
Although Nansen couldnt have lost his position by more than a few minutes, it forced him to take a circuitously conservative route to avoid being swept into the North Atlantic. His expedition thus had to endure a hungry winter, camped on an unknown shore. Not until June the following year did he encounter other explorers and learn his true positionon Cape Felder, in Franz Josef Land.
Today, anyone with a smartphone can determine their time and position with ease. Satellites of the Global Positioning System (GPS) broadcast clock signals across the globe with uncertainties below 100 nanoseconds, or one ten-millionth of a second. These time signals carry the information needed for precise navigation: Because radio waves travel at exactly 0.299,792,458 meters per nanosecond (apart from minuscule variations due to refraction in the atmosphere), comparing signals from different satellites makes it possible to determine a position within a few meters. Thats why GPS has transformed seismic monitors, drone delivery, and many other applications.
But GPS cant solve all timing problems. Central to the system are atomic clocks carried on each satellite. Although these clocks are extremely stable (and regularly calibrated by comparing them with ground-based atomic clocks at national standards laboratories), there are many ways to go wrong when transferring timing information to the userjamming, spoofing, unintentional interference, solar storms, even reflections from buildings. But what if we could put this precision directly in the hands of the user by shrinking the atomic clock itself so it could work inside the GPS receiver? Would we, like Nansen, t...
We love to pretend like our components are perfect. Resistors dont have capacitance or inductance. Wires conduct electricity perfectly. The reality, though, is far from this. It is easy to realize that wire will have some small resistance. For the kind of wire lengths you usually encounter, ignoring it is acceptable. If you start running lots of wire or you are carrying a lot of current, you might need to worry about it. Really long wires also take some time to get a signal from one end to the other, but you have to have a very long wire to really worry about that. However, all wires behave strangely as frequency goes up.
Of course theres the issue of the wire becoming a significant part of the signals wavelength and theres always parasitic capacitance and inductance. But the odd effect Im thinking of is the so-called skin effect, first described by [Horace Lamb] in 1883. [Lamb] was working with spherical conductors, but [Oliver Heaviside] generalized it in 1885.
Put simply, when a wire is carrying AC, the current will tend to avoid traveling in the center of the wire. At low frequencies, the effect is minimal, but as the frequency rises, the area in the center that isnt carrying current gets larger. At 60 Hz, for example, the skin depth for copper wire the depth where the current falls below 1/e of the value near the surface is about 0.33 inches. Wire you are likely to use at that frequency has a diameter less than that, so the effect is minimal.
However, consider a 20 kHz signal a little high for audio unless you are a kid with good ears. The depth becomes about 0.018 inches. So wire bigger than 0.036 inches in diameter will start losing effective wire size. For a 12-gauge wire with a diameter of 0.093 inches, that means about 25% of the current-handling capacity is los...
The Qt Company has issued Qt 5.9.3 as the latest tool-kit update in the Qt 5.9 Long-Term Support series...
The regulator in charge of data privacy in the United Kingdom is reviewing a major data hack of Uber, and assessing the possibility of fining the company for concealing the hack.Ubers announcement about a concealed data breach last October raises...
Federal Communications Commission (FCC) Chairman Ajit Pai on Wednesday defended his plan to eliminate the Obama-era net neutrality rules, accusing critics of overstating their fears about what it will mean for the internet.They greatly overstate...
Black Friday is widely regarded as the beginning of the US (and increasingly global) Christmas shopping season. Cyber Monday, which comes three days later, was created to persuade people to shop online more. They are a huge boon for retailers, both online and offline, but also for cybercriminals. Phishing As these shopping holidays approach, phishers are impersonating e-commerce and consumer brands and bombarding inboxes with fake deals and gift cards. They try to create a More
One thing that I don't think I've heard anybody say, though, is that the origins of the story might date back to the late 1990's. I first came across a story about a video game in the early 1980's that had strange effects on its players in the book GURPS Warehouse 23, published by Steve Jackson Games (first printing in 1997, second printing in 1999, available for purchase as a downloadable PDF from the Steve Jackson Online Store because the dead tree edition is out of print). The chapter Conspiracies, Cover-Ups, and Hoaxes of the game supplement opens with a story called The Astro Globs! Cover-Up, which talks about a video game called Astro Globs! (unsurprisingly) developed in 1983 by a computer programmer named Gina Moravec (after Hans Moravec?) which was uncannily adaptive to the person playing it. The video game described by the game book would figure out how the person playing it thought and tailored itself to be increasingly challenging and fascinating without ever getting frustrating, which also made it dangerously hypnotic. The son of the programmer of the game was hospitalized for dehydration after playing it for over 72 hours with neither sleep nor food nor water.
The first printing of Warehouse 23 was in 1997, which implies that the genesis of the Astro Globs! sto...
As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to provide oversight for cybersecurity programs, many boards may find themselves unprepared to perform the necessary level of due diligence. This lack of understanding and the inability by the board to challenge cybersecurity assumptions is one of the key reasons why Chief Information Security Officers perennially lack the resources More
New York Attorney General Eric Schneiderman (D) is investigating what he calls a massive scheme to corrupt the Federal Communications Commission (FCC) with fake public comments on net neutrality.In an open letter to Federal Communications...
The Linux Foundation works through our projects, training and certification programs, events and more to bring people of all backgrounds into open source. We meet a lot of people, but find the drive and enthusiasm of some of our youngest community members to be especially infectious.
Its surprising to some and shocking to many. Despite a
This is a post from HackRead.com Read the original post: Uber Paid Hackers $100k to Hide Massive Theft of 75M Accounts
Organizations believe that todays cyber threat landscape places them at high risk of cyber attacks. The EY survey of nearly 1,200 C-level leaders of the worlds largest and most recognized organizations examines some of the most urgent concerns about cybersecurity and their efforts to manage them. Findings show that 56% of those surveyed are making or planning to make changes to their strategies and plans due to the increased impact of cyber threats, risks and More
a new chemical composite developed by researchers at MIT could provide an alternative. It could be used to store heat from the sun or any other source during the day in a kind of thermal battery, and it could release the heat when needed, for example for cooking or heating after dark.
A common approach to thermal storage is to use what is known as a phase change material (PCM), where input heat melts the material and its phase change -- from solid to liquid -- stores energy. When the PCM is cooled back down below its melting point, it turns back into a solid, at which point the stored energy is released as heat. There are many examples of these materials, including waxes or fatty acids used for low-temperature applications, and molten salts used at high temperatures. But all current PCMs require a great deal of insulation, and they pass through that phase change temperature uncontrollably, losing their stored heat relatively rapidly.
Instead, the new system uses molecular switches that change shape in response to light; when integrated into the PCM, the phase-change temperature of the hybrid material can be adjusted with light, allowing the thermal energy of the phase change to be maintained even well below the melting point of the original material.
The rate of cooling can be controlled.
Grace G. D. Han, Huashan Li, Jeffrey C. Grossman. Optically-controlled long-term storage and release of thermal energy in phase-change materials. Nature Communications, 2017; 8 (1) DOI: 10.1038/s41467-017-01608-y
Read more of this story at SoylentNews.
The United States charged the Iranian computer expert Behzad Mesri of Games of Thrones HBO Hack. On Tuesday, the man was charged with stealing scripts and plot summaries for Games of Thrones.
The Manhattan US attorney Joon Kim said Mesri is had previously hacked computer systems for the Iranian military. The man threatened to release stolen data, unless HBO paid a $6 million ransom in Bitcoin.
Behzad Mesri, an Iranian national who had previously hacked computer systems for the Iranian military, allegedly infiltrated HBOs systems, stole proprietary data, including scripts and plot summaries for unaired episodes of Game of Thrones, and then sought to extort HBO of $6 million in Bitcoins. said U.S. Attorney Joon H. Kim. Mesri now stands charged with federal crimes, and although not arrested today, he will forever have to look over his shoulder until he is made to face justice. American ingenuity and creativity is to be cultivated and celebrated not hacked, stolen, and held for ransom. For hackers who test our resolve in protecting our intellectual property even those hiding behind keyboards in countries far away eventually, winter will come.
Behzad Mesri, who is still at large, is an Iran-based hacker who also goes online with the moniker Skote Vahshat.
Mesri faces seven counts in the United States, including wire fraud, aggravated identity theft and four counts of computer fraud.
The DoJ accused the man of being the mastermind behind the cyber attacks against HBO from May to August, he stole scripts and plot summaries for then unaired episodes of the Game of Thrones series, and multiple other shows.
Mersi compromised multiple user accounts belonging to HBO employees and other authorized users, in this way he accessed the company servers and stole confidential and proprietary information.
Over the course of sev...
The buzz about `Oumuamua, our first known visitor from another stellar system, seems likely to continue given yesterdays news that the objects axis ratio is a startling 10 to 1. Given all that, Jim Benford wondered whether there were SETI implications here. Was anyone on the case from our major SETI organizations? The answer is below, as we learn that the effort is ongoing. A frequent contributor to these pages, Jim is President of Microwave Sciences in Lafayette, California, which deals with high power microwave systems from conceptual designs to hardware. He also heads up the critical sail subcommittee for Breakthrough Starshot, the effort to send small beamed sails with miniaturized payloads to a nearby star.
By James Benford
I contacted Jill Tarter and Andrew Siemion about whether SETI researchers are conducting observations of the interstellar interloper, Oumuamua. Both say yes.
Jill said that the Allen Telescope Array has been looking at it for a while. Andrew said that Breakthrough Listen was using the Green Bank Telescope for a few hours last weekend. This was actually looking for water via hydroxyl lines using broadband 1.1-1.9 GHz data. No water was immediately evident in the coarse spectra from the standard data reduction. Breakthrough Listen is working on incorporating the appropriate windowing capabilities necessary to analyze this data, so as to use their data analysis pipeline.
Therefore there are some observations in parts of the microwave spectrum.
Image: This diagram shows the orbit of the interstellar asteroid Oumuamua as it passes through the Solar System. Unlike all other asteroids and comets observed before, this body is not bound by gravity to the Sun. It has come from interstellar space and will return there after its brief encounter with our star system. Its hyperbolic orbit is highly inclined and it does not appear to have come close to any other Solar System body on its way in. Credit: ESO/K. Meech et al.
Besides astronomical observations of this unique object, there is also this remote possibility: That this interloper is an interstellar survey probe, having perhaps dropped down to interplanetary-scale velocities in order to take data during its transit o...
The EU Cybersecurity Agency ENISA published a report on the security of the Internet of Things (IoT). The study aims to set the scene for IoT security in Europe. It serves as a reference point in this field and as a foundation for relevant forthcoming initiatives and developments. IoT threats impact Security recommendations crucial for functionality ENISA defines IoT as a cyber-physical ecosystem of interconnected sensors and actuators, which enables intelligent decision making. IoT brings More
Sell Dumps 101 201 ICQ#671352786 Sell cvv2 Fullz Sell track 1
track 2 with pin EMV Software
ICQ : 671352786
Skype : Bredteam2002
Sell EMV Sofware Clone Encode
SELL Dumps with pin
SELL dumps pin
Sell track1 track2 with pin
Sell track 1&2 with pin
Sell track2 with pin
Sell cvv2 full info
Sell UK full
Sell cvv UK full
Sell CA full
Sell cvv CA full
Sell US full
Sell cvv US full
Sell Dead full...
Sell Dumps 101 201 ICQ#671352786 Sell cvv2 Fullz Sell track 1 track 2 with pin EMV Software
ICQ#661116561 Sell dumps pin skim atm plastic card track1 track2
ccv fullz info
ICQ : 661116561
Gmail : email@example.com
Sell dumps, dumps track2, sell dumps pin, dumps 101, dumps 201, sell track 1&2, sell track1 track2, sell track2, track1 track2, sell cvv, sell cvv2, cvv fullz, cvv fullz info, dead fullz, Clone emv, clone chip, clone Card, clone credit card,uk full, CA full, US full, cvv UK full, dead full, cloning emv, emv Software, emv encode,
ICQ#661116561 Sell dumps pin skim atm plastic card track1 track2 ccv fullz info
With AMDGPU DC having been merged a few days ago for the Linux 4.15 merge window, it's now possible to run the Radeon RX Vega graphics cards with display support using the mainline kernel without having to resort to using a patched/third-party kernel build or using the AMDGPU-PRO hybrid driver. Here are some tests I have carried out with the Radeon RX Vega 56, RX Vega 64, and other graphics cards from Linux 4.15 Git compared to a few NVIDIA GPUs.
Black Friday, the American sales phenomenon that allegedly marked the time of year when retailers began to make a profit moving from the red to the black has increasingly become a fixture on bargain hunters calendars across the world. Not restricted to traditional brick-and-mortar stores, the likes of Amazon, Dell, Microsoft and many more have already launched online Black Friday campaigns to encourage purchases of discounted goods. The advertising emails sent out by More
The distinctive blue-and-white enclosure of the Chinese-made K40 laser cutter has become a common sight in workshops and hackerspaces, as they represent the cheapest route to a working cutter that can be found. Its fair to say though that they are not a particularly good or safe machine when shipped, and [Archie Roques] has put together a blog post detailing the modifications to make something better of a stock K40 performed at Norwich Hackspace.
After checking that their K40 worked, and hooking up suitable cooling and ventilation for it, the first task facing the Norwich crew was to install a set of interlocks. (A stock K40 doesnt shut off the laser when you open the lid!) A switch under the lid saw to that, along with an Arduino Nano clone to aggregate this, a key switch, and an emergency stop button. A new front panel was created to hold this, complete a temperature display and retro ammeter to replace the modern original.
Norwichs laser cutter has further to go. For example, while we secretly approve of their adjustable bed formed from a pile of beer mats, we concede that their plans to make something more practical have merit. The K40 may not be the best in the world, indeed its probable we should be calling it an engraver rather than a cutter, but if that means that a small hackerspace can have a cutter and then make it useful without breaking the bank, its good to see how its done.
This isnt the first K40 enhancement weve featured. Norwich might like to look at this improved controller, or even extend their cutters bed. Meanwhile if [Archie]s name rings a bell, it might be because of his Raspberry Pi laptop.
Free software developer Roderick Colenbrander has made public his Wine-Vulkan repository that he is using to stage his work around better Vulkan support within Wine...
Given that collaboration [in science] is the norm, you may be asking yourself the eternal question: Who cares? How does the image of a lone scientist hero cause any danger to me?
The problem arises when there is a debate about a scientific topic. Following this structure, debate is a necessary and encouraged part of the scientific process. This debate happens before the idea is released to anyone outside of a few scientists and, while it can become heated at times, takes place with great respect between proponents of different viewpoints.
The danger can come when scientific results are released to the public. Our society now provides a platform for anyone to comment, regardless of his or her education, experience or even knowledge of the topic at hand.
While this is an excellent method of disseminating knowledge, it can also provide a platform for any opinionregardless of the weight of data behind itto be equal to that released in more traditional scientific ways.
Particularly in today's largely populist climate, people are looking to see the lone scientist hero overthrow the perceived dominance of facts coming from academia.
And herein lies the problem. In this situation, the opinion of a lone commenter may be considered on equal footing with that of tens or hundreds of people who have made the subject their life's work to ensure their interpretations are correct.
Everybody is entitled to their own scientific opinion, but everybody is not entitled to their own scientific facts?
Read more of this story at SoylentNews.
The intersection of software development, security, and operations can be difficult for some businesses to traverse. Platforms such as Cloud Foundry aim to help organizations bridge the gap, while still focusing on security.
One of the most famous and multinational cab service company known as Uber came under the hacking spotlight. The astonishing news of Uber hacking was made even more surprising by the fact that Uber application was hacked at end of 2016 but the company did not bother to inform its customers about the hack until
The post The famous chauffeur driven cab service Uber under attack appeared first on Hacker News Bulletin | Find the Latest Hackers News.
Airlines are under pressure to reduce their carbon emissions, and are highly vulnerable to global oil price fluctuations. These challenges have spurred strong interest in biomass-derived jet fuels. Bio-jet fuel can be produced from various plant materials, including oil crops, sugar crops, starchy plants and lignocellulosic biomass, through various chemical and biological routes. However, the technologies to convert oil to jet fuel are at a more advanced stage of development and yield higher energy efficiency than other sources.
We are engineering sugarcane, the most productive plant in the world, to produce oil that can be turned into bio-jet fuel. In a recent study, we found that use of this engineered sugarcane could yield more than 2,500 liters of bio-jet fuel per acre of land. In simple terms, this means that a Boeing 747 could fly for 10 hours on bio-jet fuel produced on just 54 acres of land. Compared to two competing plant sources, soybeans and jatropha, lipidcane would produce about 15 and 13 times as much jet fuel per unit of land, respectively.
Maybe jet fuel is a better use of the world's sugar supply than eating it is...
Read more of this story at SoylentNews.
You know you're doing SEO correctly when EVERY SINGLE BACKLINK contains the keywords you're targeting. No garbage anchor texts, no "click here" links, just links that will make you rank #1.
This is what SEO that I constructed and executed for my new online tools network looks like after 30 days of launching.
69 links (external and internal) to onlineSTRINGtools.com, all 69 contain keyword "string":
33 backlinks to onlineCSVtools.com, all 33 contain keyword "csv":
All other sites in the network have the same SEO.
Pro tip of the day: Get your SEO right, outrank your competitors, and succeed. See you next time!
While LibreOffice Calc for a while now has been offering OpenCL support for speeding up spreadsheet computations, with not all drivers/GPUs supporting OpenCL, this Microsoft Office alternative is finally receiving proper multi-threading support...
The research got a lot of attention after Bilham presented it at the October meeting of the Geological Society of America. Several critics noted that correlation is not causation earthquake clusters and fluctuations of Earths rotation might happen on the same time scales, but that doesnt mean they are linked.
Theres a curious connection between earthquakes and the Earths rotation. But that doesnt mean the planet is in for a major shaking next year.
Uber is in headlines once againthis time for concealing last year's data breach that exposed personal data of 57 million customers and drivers. On Tuesday, Uber announced that the company suffered a massive data breach in October 2016 that exposed names, e-mail addresses and phone numbers of 57 million Uber riders and drivers along with driver license numbers of around 600,000 drivers.
Following in the steps of Ubuntu 17.10 dropping 32-bit desktop images and other Linux distributions also lessening their focus on 32-bit support, OpenMandriva has issued its final i586 release...
What is open source? How does open source benefit users? And how do we support open source initiatives? In this article, Kayla Matthews introduces the basics of open source as well as the importance and value of open source tools.
Open source software, applications, and projects are becoming more commonplace, at least more than they ever have been. Thats because major organizations and brands have now embraced the development philosophy.
Late July it was reported that hackers had stolen proprietary information from media giant HBO.
The haul was said to include confidential details of the then-unreleased fourth episode of the latest Game of Thrones season, plus episodes of Ballers, Barry, Insecure, and Room 104.
Hi to all mankind, an email sent to reporters read. The greatest leak of cyber space era is happening. Whats its name? Oh I forget to tell. Its HBO and Game of Thrones!!!!!!
In follow-up correspondence, the hackers claimed to have penetrated HBOs internal network, gaining access to emails, technical platforms, and other confidential information.
Soon after, HBO chairman and CEO Richard Plepler confirmed a breach at his company, telling employees that there had been a cyber incident in which information and programming had been taken.
Any intrusion of this nature is obviously disruptive, unsettling, and disturbing for all of us. I can assure you that senior leadership and our extraordinary technology team, along with outside experts, are working round the clock to protect our collective interests, he said.
During mid-August, problems persisted, with unreleased shows hitting the Internet. HBO appeared rattled by the ongoing incident, refusing to comment to the media on every new development. Now, however, it appears the tide is turning on HBOs foe.
In a statement last evening, Joon H. Kim, Acting United States Attorney for the Southern District of New York, and William F. Sweeney Jr., Assistant Director-in-Charge of the New York Field Division of the FBI, announced the unsealing of an indictment charging a 29-year-old man with offenses carried out against HBO.
Behzad Mesri, an Iranian national who had previously hacked computer systems for the Iranian military, allegedly infiltrated HBOs systems, stole proprietary data, including scripts and plot summaries for unaired episodes of Game of Thrones, and then sought to extort HBO of $6 million in Bitcoins, Kim said.
Mesri now stands charged with federal crimes, and although not arrested today, he will forever have to look over his shoulder until he is made to face justice. American ingenuity and creativity...
Rotary tools are great little handheld powerhouses that fill the void between manual tools and larger shop machines. Theyre also kind of expensive for what they are, which is essentially a power circuit, a switch, and a high-RPM motor with a tool coupling on the shaft. If your tooling needs are few and you have the resources, why not make your own?
[DIY King 00] built himself a cordless rotary tool for less than $10 out of commonly-available parts. It doesnt run nearly as fast as commercial rotary tools, but thats not necessarily a bad thing. He made the body out of 2 diameter PVC and mounted a 12 V, 400 RPM DC motor directly to one of the fiberglass end caps. Tools are chucked into a collet that screws into a coupler on the motor shaft.
For power, [DIY King 00] built a 7.4 V battery pack by wiring two 18650 cells from an old laptop battery in series. It isnt the full 12 V, but its enough power for light-duty work. These 2200 mAh cells should last a while and are rechargeable through the port mounted in the other end cap.
Drill down past the break to see the build video and watch the tool power through plywood, fiberglass, and inch-thick lumber. Once youve made your own rotary tool, try your hand at a DIY cordless soldering iron.
Uber CEO Dara Khosrowshahi announced on Tuesday that hackers broke into the company database and accessed the personal data of 57 million of its users, the bad news is that the company covered up the hack for more than a year.
The attackers accessed also the names and drivers license numbers of roughly 600,000 of its drivers in the United States.
The hack happened in 2016, it was easy for hackers that according to a report published by Bloomberg, obtained credentials from a private GitHub site used by the Uber development team. The hackers tried to blackmail Uber and demanded $100,000 from the company in exchange for avoiding publish the stolen data.
Two attackers accessed a private GitHub coding site used by Uber software engineers and then used login credentials they obtained there to access data stored on an Amazon Web Services account that handled computing tasks for the company. From there, the hackers discovered an archive of rider and driver information. Later, they emailed Uber asking for money, according to the company. states Bloomberg.
In a statement on Tuesday, Khosrowshahi said the intruders accessed cloud-hosted data stores:
I recently learned that in late 2016 we became aware that two individuals outside the company had inappropriately accessed user data stored on a third-party cloud-based service that we use. The incident did not breach our corporate systems or infrastructure.
At the time of the incident, we took immediate steps to secure the data and shut down further unauthorized access by the individuals. We subsequently identified the individuals and obtained assurances that the downloaded data had been destroyed. We also implemented security measures to restrict access to and strengthen controls on our cloud-based storage accounts. reads a CEOs statement.
You may be asking why we are just talking about this now, a year later. I had the same question, so I immediately asked for a thorough investigation of what happened and how we handled it....
Expanding bike lanes, handing out free helmets and making lessons free: New York is making great strides in encouraging pedal power at the expense of exhaust fumes, even if some cyclists are still nervous about navigating bottleneck traffic.
For years, the city of 8.5 millionwhich has the most extensive public transport network in the United Statesstood and watched the bike boom take off in European capitals.
In 2013, then billionaire mayor Michael Bloomberg launched the Citi Bike sharing scheme and since then, New York has seen the fastest growth rate in cycle use of any big US city.
"The city has come a long ways in terms of having a much stronger commitment to promoting bicycling," says Rich Conroy, education director for Bike New York, a non-profit organization that encourages safe cycling.
"People realize we can't grow as a city by building more streets and adding more cars," explained Conroy.
Get exercise time in, lose weight, get to work, and save money all at the same time. What's not to love?
Read more of this story at SoylentNews.
Posted by Peter Bex on Nov 22Hi there,
The hacking campaign was spotted by McAfee and Palo Alto Networks, both security firms attributed the attacks to the Hidden Cobra APT.
The activity of the Lazarus APT Group surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks and experts that investigated on the crew consider it highly sophisticated.
This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. Security researchers discovered that North Korean Lazarus APT group was behind recent attacks on banks, including the Bangladesh cyber heist.
According to security experts, the group was behind, other large-scale cyber espionage campaigns against targets worldwide, including the Troy Operation, the DarkSeoul Operation, and the Sony Picture hack.
The malicious code used in this last campaign is an Android malware delivered as an APK file that has been designed to mimic a Korean bible app that was published in the Google Play by a developer named GODpeople.
The malicious APK wasnt available on the Google Play store and it is still unclear how the APT distributed it.
The McAfee Mobile Research team recently examined a new threat, Android malware that contains a backdoor file in the executable and linkable format (ELF). The ELF file is similar to several executables that have been reported to belong to the Lazarus cybercrime group. (For more on Lazarus, read this post...
The sudoers file can provide detailed control over user privileges, but with very little effort, you can still get a lot of benefit from sudo. In this post, we're going to look at some simple ways to get a lot of value out of the sudo command in Linux.
Trick 1: Nearly effortless sudo usage
Quartz has found that Android phones have been tracking user locations and sending them to Google throughout 2017:
Even if you take all of those precautions, phones running Android software gather data about your location and send it back to Google when they're connected to the internet, a Quartz investigation has revealed.
Since the beginning of 2017, Android phones have been collecting the addresses of nearby cellular towerseven when location services are disabledand sending that data back to Google. The result is that Google, the unit of Alphabet behind Android, has access to data about individuals' locations and their movements that go far beyond a reasonable consumer expectation of privacy. Quartz observed the data collection occur and contacted Google, which confirmed the practice.
The cell tower addresses have been included in information sent to the system Google uses to manage push notifications and messages on Android phones for the past 11 months, according to a Google spokesperson. They were never used or stored, the spokesperson said, and the company is now taking steps to end the practice after being contacted by Quartz. By the end of November, the company said, Android phones will no longer send cell-tower location data to Google, at least as part of this particular service, which consumers cannot disable.
"In January of this year, we began looking into using Cell ID codes as an additional signal to further improve the speed and performance of message delivery," the Google spokesperson said in an email. "However, we never incorporated Cell ID into our network sync system, so that data was immediately discarded, and we updated it to no longer request Cell ID."
Read more of this story at SoylentNews.
Posted by P J P on Nov 21Hello Ian,
[Divconstructors] cashed in after Halloween and picked up a skeleton dog prop from the Home Depot, for the simple and logical purpose of turning it into a robot.
The first step was to cut apart the various body parts, followed by adding bearings to the joints and bolting in a metal chassis fabricated from 1/8 aluminum stock. This is all pretty standard stuff in the Dr. Frankenstein biz. For electronics he uses a Mega with a bark-emitting MP3 shield on top of it. Separately, a servo control board manages the dozenish servos not to mention the tail-wagging stepper.
[Divconstructors] actually bought two skeletons, one to be his protoype and the other to be the nice-looking build. However, we at Hackaday feel like he might have missed an opportunity: As any necromancer can tell you, a freakish combination of two skeletons beats out two normal skeletons any night of the week. Also, two words for you to consider: cyberdog ransomeware. We imagine you dont really feel ransomware until theres the family robodog ready to test out its high-torque jaw servos on your flesh. Of course if he were a real dog we could either remotely control him with a hot dog, or just give him a talking collar.
After her personal journey caring for a friend with cancer, Martina Clark created Carers Couch providing information, education, advice and assistance that increases carers capacity and resilience. Many carers just don't get a break; emotional burnout, depression, anxiety and chronic illness are common and impact the overall mortality of carers. Self-care is crucial in preventing this but due to high workload and lack of support. In a role that no one applies for, carers currently lack resources and support that are centralised. Building on her personal experiences as a carer as well as running the current Carers Couch site, Martina hopes that the hack weekend will help her deliver this information and support all in one place.
When Roberto Pietrobon isnt working in corporate partnerships for the Stroke Foundation hes working on his project Care to Compare. The project aims to provide online health insurance comparisons that capture the profits of health insurance referrals to provide funding to health charities. Having already hacked with RHoK in June, as well as work ongoing work since, Roberto is excited for both UXers and backend developers who might be interested in helping to realise the Care to Compare concept.
A team of scientists led by Virginia Commonwealth University physicist Jason Reed, Ph.D., have developed new nanomapping technology that could transform the way disease-causing genetic mutations are diagnosed and discovered. Described in a study published today in the journal Nature Communications, this novel approach uses high-speed atomic force microscopy (AFM) combined with a CRISPR-based chemical barcoding technique to map DNA nearly as accurately as DNA sequencing while processing large sections of the genome at a much faster rate. What's morethe technology can be powered by parts found in your run-of-the-mill DVD player.
The human genome is made up of billions of DNA base pairs. Unraveled, it stretches to a length of nearly six feet long. When cells divide, they must make a copy of their DNA for the new cell. However, sometimes various sections of the DNA are copied incorrectly or pasted together at the wrong location, leading to genetic mutations that cause diseases such as cancer. DNA sequencing is so precise that it can analyze individual base pairs of DNA. But in order to analyze large sections of the genome to find genetic mutations, technicians must determine millions of tiny sequences and then piece them together with computer software. In contrast, biomedical imaging techniques such as fluorescence in situ hybridization (FISH) can only analyze DNA at a resolution of several hundred thousand base pairs.
Reed's new high-speed AFM method can map DNA to a resolution of tens of base pairs while creating images up to a million base pairs in size. And it does it using a fraction of the amount of specimen required for DNA sequencing.
Read more of this story at SoylentNews.
Posted by Ian Zimmerman on Nov 21Hi, what can I do with these QEMU reports? I can try to apply the
In addition to looking at system boot times from Linux 4.6 to Linux 4.15, while doing this kernel testing session on the Lenovo ThinkPad I also took some battery power consumption measurements...
As consumers demand smaller memory chips with greater capacity, engineers optimize the manufacturing process to ensure the chips will hold up.
The following is an excerpt from Multiphysics Simulation 2017.
By: Lexi Carver
In the 1980s, during the dawn of what would become a booming tech industry, flash memory made a splash by offering erasable and programmable computer storage. These storage chips now appear in cameras, memory cards, USB sticks, and phones that can store thousands of photo, music, and video files.
Though they often go unnoticed by consumers, designers work tirelessly to keep up with demands for smaller size and greater capacity. Behind the production of a single memory device stands a long line of researchers, engineers, and assemblers who must overcome the manufacturing challenges associated with processing these tiny chips.
KEEPING THE DIES INTACT
Memory chips are produced by placing a 300 mm diameter semiconductor wafer onto a carrier tape, then separating the wafer into single chips. Once removed, the tape leaves behind a thermoplastic adhesive on the chip undersides, later enabling bonding to a substrate using heat and compression. Chips are bonded into stacks to increase the amount of memory in a given area. Wire bonds connect the chips and the substrate. Finally, an entire sheet of stacks is put into a molding machine, encased in protective plastic, and then separated into many pieces, each containing a stack of memory chips (Figure 1).
Figure 1. Top left: Dies being bonded onto a substrate before being wire bonded, coated in the plastic mold, and separated. Center: Stacks of dies on a substrate. Right: Back of the substrate showing the interfaces for connecting the memory chips to larger devices.
But removing the tape without bending the thin dies too much poses a tricky problem. With thicker chips from decades past, manufacturers used a multi-needle ejector to remove the tape using a series of pins. But these place too much stress on the thinner dies; the multi-needle ejector runs the risk of wrecking them.
As chips got thinner eight or ten years ago, we were shocked at how many dies broke, says Stefan Behler, senior exper...
A Suezmax container ship can hold over 10,000 TEUs or Twenty Foot Equivalent Units. Most containers carried are double this length FEUs or Forty Foot Equivalent Units but that still means in the region of 5,000 containers.
Only around one third of that cargo is on-deck though most is hidden in the holds, under massive hatch covers. To get a container out from the bottom of the hold could involve removing 50 containers from that hatch cover, removing the hatch cover, then taking a further 8 containers to access the bottom of a stack.
Screw up the load plan and you create chaos. What if the load plan, which is just a CSV list or similar, is hacked and modified? No-one knows what container is where. instead of taking 24-48 hours to load and unload, it could take weeks to manually re-inventory the ship. Time is money for a ship. Lots of money. Blocking a port for a period whilst the mess is resolved incurs enormous costs and could even jeopardise supplies to an entire country.
Seems like more bang-for-the-buck than an IED [Improvised Explosive Device].
Read more of this story at SoylentNews.
Posted by Secunia Research on Nov 21======================================================================
Posted by Moritz Muehlenhoff on Nov 21-------------------------------------------------------------------------
Posted by Advisories on Nov 21#############################################################
[security bulletin] HPESBHF03798 rev.1 - HPE Proliant Gen10 Servers, DL20 Gen9, ML30 Gen9 and Certain Apollo Servers Using Intel Server Platform Service (SPS) v4.0, Local Denial of Service and Execution of Arbitrary Code "IndyWatch Feed Tech"
Posted by security-alert on Nov 21https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03798en_us
Posted by Yves-Alexis Perez on Nov 21-------------------------------------------------------------------------
Posted by Advisories on Nov 21#############################################################
Seventy cents doesnt buy you a lot these days. Maybe some sweets or candies at most. How about a string of LEDs that you can use to decorate your home during the festive season? [Amaldev] was curious to know what was, or wasnt, inside these blinky LED strings which made them so cheap. Hes done a Christmas LED Light Teardown and shows how blinky LED string lights can be built with the bare minimum of components.
The string he purchased had 28 LEDs seven each in four colors, a controller box with one push button and a power cord. Without even knowing what is inside the controller box, the cost of the product seems astonishing based on this BoM. The single push button cycles through eight different light patterns for each press. It even has a faux CE mark for the supply plug. Cracking open the case, he finds that the controller board is sparsely populated with just seven through hole components and a COB (chip on board) module. A simple, 8-bit, 8-pin microcontroller is possibly what controls the device.
[Amaldev] sketches out a schematic to figure out how it works. There are two arms with 14 LEDs of alternating colors, each of which is controlled by an SCR. Two GPIO output pins from the COB control the gates of each of these SCRs. The button is connected to a GPIO input, and a second input is connected to the AC supply via a current limiting resistor. Most likely, this is used to determine the zero crossing of the waveform so that the COB can generate the appropriate trigger signals for the gate outputs.
It is unlikely that these products are manufactured using automated processes. The PCB production could be automated, but soldering all the wires, fitting it all in the enclosure and preparing the LED string itself would require manual labor. At US$ 0.7 retail on the street, it is difficult to imagine the cost breakdown even when the quantities are in large numbers. Maybe a combination of cheap components, recycled or rejected parts (mains cord/enclosure), lack of safety and protection measures (no fuses, no strain reliefs) and reducing the component BoM to an absolute, bare minimum, coupled with very high volumes lets them pull it off? What are your thoughts chime in with comments.
Its difficult to overstate the importance of finding an original Darwin specimen, collected during the Beagles first voyage. But finding it, and realizing it was a lost specimen collected by Darwin, was just the first step in a much longer journey.Photograph by fiddledydee / Flickr
On August 24, 1832, HMS Beagle dropped anchor at Bahia Blanca, a deep natural harbor in present-day Argentina. On board was a 23-year-old naturalist, Charles Darwin. He had been at sea since December 27, 1831, when the Beagle left Plymouth. Darwin had spent most of those months incapacitated with seasickness. During one bout of nausea, staring sadly down at a long, slow inescapable swell unfurling below him, he wrote, This & three following days were ones of great & ceaseless suffering.
A few days before arriving at Bahia Blanca, Darwin had sent his
first shipment of specimens home to Cambridge. Among them were four
bottles of animals in preservative, rocks and tropical plants,
several marine animals, and many, many beetles. On the coast, at
Bahia Blanca, Darwin continued collecting specimens. Among the
material was an unusually large species of rove beetle with a long,
segmented body and an iridescent blue-green head. There, too, in
the sandy ground
Most people probably arent aware of this, but the 2016 U.S. Presidential election included a candidate who had a radio-frequency identification chip implanted in his hand. No, it wasnt Donald J. Trump. It was Zoltan Istvan, a nominee representing the Silicon Valley-based Transhumanist Party and his body-worn chip unlocked his front door, provided computer password access and sent an auto-text that said: Win in 2016!
The transhumanist movement employing technology and radical science to modify humans offers a glimpse into the marriage of machines and people, the focus of a recent paper released by the Institute for Critical Infrastructure Technology (ICIT). With cybernetic implants already available to consumers, the prospect for techno-human transmutation cyborgs is not as far away as many may think.
We are moving towards automation, we are moving towards machine learning, said Parham Eftekhari (pictured), co-founder and senior fellow at ICIT. Were seeing it impact a lot of our society.
Eftekhari stopped by the set of theCUBE, SiliconANGLEs mobile livestreaming studio, and spoke with co-hosts John Furrier (@furrier) and Dave Vellante (@dvellante) at CyberConnect 2017 in New York City. They discussed ICITs recent cybersecurity research and the potential for increased government regulation. ( Disclosure below.)
Tencent Holdings Ltd. has surpassed Facebook Inc. in market value, becoming the first Chinese technology company to join the ranks of the world's five largest corporations.
Investors piled into the Chinese social networking giant, extending this year's rally to 127 percent and boosting its market value by some $292 billion as of Tuesday's close. That year-long surge has made founder Ma Huateng the mainland's second-richest man and lifted the entire Hong Kong bourse. The operator of the ubiquitous WeChat messaging service is now valued at $523 billion, a whisker above Facebook's $522 billion on Monday.
Investors are betting that Tencent can lean on its billion-plus users and hit games like Honour of Kings to evolve into an advertising and entertainment titan along the lines of a Google or Facebook. Created almost two decades ago as a web portal before morphing into one of the world's biggest purveyors of video games, the argument is that its dominance of Chinese social networking also bankrolls an expansion into newer markets from video streaming to finance.
Also at TechCrunch.
Read more of this story at SoylentNews.
Planning to try and automate the entire store.
Walmart (WMT) has been quietly testing out autonomous floor scrubbers during the overnight shifts in five store locations near the companys headquarters in Bentonville, Arkansas.
Continue Reading Below
A spokesperson for Walmart told FOX Business that the move, which was first reported by LinkedIn, is a very small proof of concept pilot that we are running and that the company still has a lot more to learn about how this technology might work best in our different retail locations.
But can it backflip?
The Pentagon is developing a new fleet of shadow bombers that possibly disappear on radar like those featured in Star Trek movies.
The unit of B-21 stealth bombers, a futuristic combat aircraft, are being created at a secret desert plant in Palmdale, California, after the company Northrop Grumman won the contract for their development two years ago, The Times reported.
The U.S. military has sanctioned the development of around 100 of the bat-like bombers for as much as $80 billion. The precise amount remains top secret.
In a recent article, I began to unpack Rodney Brooks October 2017 essay The Seven Deadly Sins of AI Predictions. Now I continue my analysis by looking into the faulty atheistic thinking that motivates the AI salvation preached by futurists such as Googles Ray Kurzweil. Although Brooks does not address this worldview dimension, his critique of AI predictive sins provides a great opportunity for just that.
Brooks is a pioneer of robotic artificial intelligence (AI) and is MIT Panasonic Professor of Robotics Emeritus. He is also the founder and chief technology officer of Rethink Robotics, which makes cobotsrobots designed to collaborate with humans in a shared industrial workspace.
Previously I discussed Brooks remark that all the evidence that I see says we have no real idea yet how to build the superintelligent devices that Kurzweil and like-minded singularity advocates imagine.
The LXLE distribution is an Ubuntu-based project which is designed to be lightweight and run on lower-end computers. The LXLE project has released a new version, LXLE 16.04.3, which is supported through to the year 2021 and includes several bug fixes. "LXLE 16.04.3 is built upon Ubuntu Mini....
Take the language of one NSA surveillance reauthorization bill and add a few strong reform proposals from another, and what do you get? A bill that helps protect Americans from the warrantless search of the content of their emails, text messages, and digital communications.
On November 17, Senators Patrick Leahy (D-VT) and Mike Lee (R-UT) introduced the USA Liberty Act (S. 2158) into the Senate. It is based on legislation of the same name introduced in October by House Judiciary Committee Chairman Bob Goodlatte (R-VA) and Ranking Member John Conyers (D-MI).
EFF supports this legislation and welcomes the additional protections included.
Both the House-side and Senate-side USA Liberty Act seek to reauthorize Section 702 of the FISA Amendments Act, an NSA surveillance tool scheduled to expire at the end of this year. Section 702 permits the NSA to target electronic surveillance at non-U.S. persons located outside the United States. But when the NSA sweeps up emails and text messages of foreign targets, it predictably also collects messages written by U.S. persons. These communications are stored in NSA databases as well as those of other intelligence agencies, such as the FBI and CIA. When FBI agents search through Section 702-collected data in FBI systemseven when data belongs to U.S. personsthey do not obtain a warrant.
These unconstitutional searches of Americans communications, which skirt the Fourth Amendment requirement of a warrant, are called backdoor searches.
The Senate-side USA Liberty Act restricts these searches by borrowing an approach from a separate amendment made for the FISA Amendments Reauthorization Act of 2017, a second Section 702 reauthorization bill before the Senate. Though not identical in language, both the Senate-side USA Liberty Act and the amendment to the FISA Amendments Reauthorization Act place certain warrant requirements on backdoor searches.
According to the Senate-side USA Liberty Act, if government agents want to read Section 702-collected communications belonging to U.S. persons, they first need to obtain a warrant from the Foreign Intelligence Surveillance Court (FISC), which provides judicial oversight on Section...
Via: CNBC: Apple supplier Foxconn has been employing students illegally work overtime to help assemble the iPhone X, the Financial Times reported Tuesday. Six high school students told the Financial Times they would usually work 11-hour shifts to help manufacture Apples flagship phone at a factory in Zhengzhou, China. The long hours breach Chinese laws 
Posted by FreeBSD Security Advisories on Nov 21=============================================================================
Via: BBC: What was it for? Cs answer in 1952 is revealing. He thought it right to have a large sum to meet such contingencies as (a) a very large inducement to some person in an absolutely key position, or (b) the Vote for the Service being drastically cut in some political emergency in a 
Via: Los Angeles Times: In its race to embrace driverless vehicles, Washington has cleared away regulatory hurdles for auto companies and brushed aside consumer warnings about the risk of crashes and hacking. But at a recent hearing, lawmakers absorbed an economic argument that illustrated how the driverless revolution they are encouraging could backfire politically, particularly 
Via: National Geographic: Seventy-eight-year-old Mauro Morandi often walks along the rocky shores of Budelli Island and looks out over the disconsolate sea, feeling dwarfed by the phantom forces that tug and twist the tides. We think we are giants that can dominate the Earth, but were just mosquitos, Morandi says. In 1989 on a stretch 
Smartphones are fun to use, but what if someone is
This is a post from HackRead.com Read the original post: Google collects Android location data even if location service is off
Nissan Leafs, which go about 107 miles on a charge, sometimes end up relegated to commuter cars due to battery-life worries. The mass-market, standard Tesla Model 3 can go double that, but even that distance can be disconcerting on long road trips.
Both batteries could work about 50 percent longer with a device provisionally patented by Vanderbilt University's Ken Pence, professor of the practice of engineering management, and Tim Potteiger, a Ph.D. student in electrical engineering. It reconfigures modules in electric car battery packs to be online or offlinedepending on whether they're going to pull down the other modules.
The two used Tesla's open-source, high-density, lithium-ion battery to model their method of improving durability, adding a controller to each of the battery's cells.
"We know there are some battery cells that run out of juice earlier than others, and when they do, the others run less efficiently," Potteiger said. "We make sure they all run out of energy at the same time, and there's none left over."
Is a 50% boost in range worth the expense of the extra controllers?
Read more of this story at SoylentNews.
Shocker. Via: Quartz: Many people realize that smartphones track their locations. But what if you actively turn off location services, havent used any apps, and havent even inserted a carrier SIM card? Even if you take all of those precautions, phones running Android software gather data about your location and send it back to Google 
Belt grinding offers a lot of advantages for the metalworker, and since belt grinders are pretty simple machines, shop-built tools are not an uncommon project. A bolt-together belt grinder makes this tool even more accessible to the home gamer.
With no access to a welder but with a basic milling machine and an ample scrap bin at his disposal, [IJustLikeMakingThings] had to get creative and modify some of the welding-required belt grinder designs he found online to be bolt-up builds. The key to a cool running belt grinder is for the belt to be as long as possible, and the 2x72 belt seems to be the sweet spot, at least here in the States. Machined drive and idler wheels with the crown needed for proper belt tracking were sourced online, as was the D-bracket for holding the two guide wheels. But the rest of the parts were fabricated with simple tools and bolted together. [IJustLikeMakingThings] provides a lot of detail in his write-up, and it shouldnt be too hard to build a belt grinder just like this one.
Looking for other belt grinder plans to compare notes? Heres a grinder with an even simpler design, but with welding required.
Posted by Guido Vranken on Nov 21Dear list,
Phones using Googles operating system, Android, have been collecting their users location data, even when a user has turned off the device's location services, Quartz reported on Tuesday.The company has been collecting such data on Android...
Federal Communications Commission Chairman Ajit Pai is moving forward with a controversial proposal to ease restrictions on the ownership of broadcast stations.In a statement Tuesday, Pai said he is seeking comments on raising the cap on how much of...
I went to Le Guess Who in Utrecht, and it was very good. Heres a festival report.
The festival is spread out all over Utrecht, like here in front
of a church where
Le Mystre des Voix Bulgares performed. (The doors closed mysteriously before the huddled throng and nobody let us know what was happening, so we stood there for half an hour until most people decided by themselves that perhaps de kerk is vol.) But the main bulk of the concerts took place either in the enormodome TivoliVredenburg, or 30 minutes south in the De helling/Pastoefabriek/LE:EEN/etc cluster of venues.
If you are looking out for a SATA 2.5-inch HDD/SSD to USB3 adapter, the Sabrent EC-SS31 is quite simple, works with Linux, supports USB 3.1, and retails for about $10 USD...
The new rules are expected to be announced on Wednesday, whilst most Americans are distracted by getting home to loved ones for Thanksgiving.
This will then be followed by a vote on 10 December, which would see the 2015 rules designed to protect the internet being torn down.
[...] The important point, as we've said before, is that once the genie is out of the bottle, getting it back in is almost impossible and for our readers outside the US, don't think this doesn't affect you - everything that passes through US servers will be affected in some way and will knock on to you.
Read more of this story at SoylentNews.
Uber covered up a massive cyberattack that exposed the data of 57 million passengers and drivers last year, according to Bloomberg.Hackers reportedly stole the names, email addresses and phone numbers of 50 million Uber riders around the world in...
Microsoft employee Tim Sneath, who spent no less than 17 years with the company, announced in a blog post that hes leaving the software giant to work for Google on the new Flutter mobile framework.
Sneath started his post by emphasizing how great Microsoft is, explaining that he company has incredibly diverse interests and is filled with talented people.
Despite the good parts, however, the former Microsoft Program Manager who worked on a series of projects for developers, discussed what he described as the missteps that the Redmond-based software giant embraced beginning with the Windows Vista era.
Sir, It is encouraging to see a pro-Linux article in The Irish Times, with Derek Scally promoting the many advantages of the free and open-source operating system, without glossing over the difficulties a user may have when installing and using it for the first time on their personal computer (Goodbye Apple, goodbye Microsoft hello Linux, Technology, Novem...
ISIS capability as a transnational terrorist organisation continues to collapse. They are unable to bring recruits to controlled territory for training, but rather have to rely entirely on remotely managed raw amateurs who are ineffective and error prone. This shows that counterterrorism efforts are working effectively to limit the damage that ISIS, the organisation, can do. Unfortunately, their trained and battle hardened members who survive and escape will be extremely dangerous. Good newsright now they suck; bad newsthe post ISIS world is scarier.
This post will examine why having an entirely remote external operations arm is not a winning strategy for a terrorist group. The positives:
These apparent benefits are actually outweighed by the negatives of using only trained professional operatives. The negatives:
An effective terrorist organisation makes strategic use of violence to attempt to achieve the result they want. At its most generic this is some sort of utopian ideal (global communism, the caliphate, freedom, the independence and/or union of greater population group). Since achieving this vision is a matter of developing and executing a strategy (class warfare, removal of colonial ruling elites, agitating for political autonomy, etc.) the leaders of the group, the centre, must be able to use their military resources with strategic precision (in theory anyway.)
A purely remote control agent is basically the least strategically effective mechanism availablethe centre has no control over their targeting, timing, effectiveness, success rate; and there is basically no way to increase the amount of control over the remote agent. A group that is unable to execute operations that further their strategic goal is severely handicapped. Even worse, the application of violence to further strategic goal is extremely tricky as violence needs to be calibrated and targeted very specifically. Too much violence can reduce support, as can too little, and embarrassing or incompetent acts of violence can also reduce p...
Phoronix Test Suite 7.6 Milestone 3 is now available as the last planned development release ahead of the stable debut of 7.6.0-Alvdal...
The 2017 OWASP Top 10 is based on data from 23 contributors covering more than 114,000 applications. OWASP published on GitHub the data used for its report.
The categories have been selected based on the risk they pose, but what are the application Security Risks?
Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention. states the OWASP.
Sometimes these paths are trivial to find and exploit, and sometimes they are extremely difficult.
The OWASP Top 10 vulnerabilities are injection, broken authentication, sensitive data exposure, XML external entity (XXE), broken access control, security misconfiguration, cross-site scripting (XSS), insecure deserialization, using components with known vulnerabilities, and insufficient logging and monitoring.
The insufficient attack detection and prevention results from the merger of the current 4th and 7th items, Insecure direct object references and the Missing Function Level Access Control.
The categories have been merged into the item Broken access control that was dated back in 2004.
A team of researchers with the University of Georgia in Athens has developed a technique for controlling chemical reactions that release drugs inside the body. In their paper published in the journal Nature Catalysis, the group describes coating chemicals to prevent a reaction from occurring until the application of a magnetic field that releases a desired drug.
In some medical applications, it is better for a medical treatment if a chemical can be applied directly to a certain part of the body and nowhere else. Chemicals meant to treat tumors are the prime examplechemotherapy drugs act on every cell they contact, causing a host of negative side effects. In this new effort, the group took a novel approach to solving this problem, using a magnet to force coated chemicals together, prompting a drug releasing reaction.
To provide a means for controlling when chemicals come into contact inside the body, the researchers created tiny packets by first coating iron oxide nanoparticles with silica and then coating them further with two types of polymers, which, when combined, form a brush-like structure. Each of the packets was then loaded with either an enzyme or a substrate meant to react with the enzyme, and, of course, the drug to be released.
The technique is intended to better target chemotherapy in cancer treatments such that only tumors are exposed to the chemical agents. It is hoped the more precise targeting can avoid the side effects of chemotherapy.
Read more of this story at SoylentNews.
LED matrix displays and flat-screen monitors have largely supplanted old-school electromechanical models for public signage. We think thats a shame, but its also a boon for the tinkerer, as old displays can be had for a song these days in the online markets.
Such was the case for [John Whittington] and his flip-dot display salvaged from an old bus. He wanted to put the old sign back to work, but without a decent driver, he did what one does in these situations he tore it down and reverse engineered the thing. Like most such displays, his Hannover Display 7 x 56-pixel flip-dot sign is electromechanically interesting; each pixel is a card straddling the poles of a small electromagnet. Pulse the magnet and the card flips over, changing the pixel from black to fluorescent green. [John] used an existing driver for the sign and a logic analyzer to determine the protocol used by the internal electronics to drive the pixels, and came up with a much-improved method of sending characters and graphics. With a Raspberry Pi and power supply now resident inside the case, a web-based GUI lets him display messages easily. The video below has lots of details, and the code is freely available.
You may recall [John] from a recent edge-lit Nixie-like display. Looks like hes got a thing for eye-catching displays, and were fine with that.
President Trump said that AT&T's proposed merger with Time Warner is "not good for the country," one day after the Department of Justice announced it was suing to block the $85 billion deal."Personally, Ive always felt that that...
As were waiting for security researchers to detail the Intel Management Engine vulnerability that can allow attackers to run undetectable, unsigned code on machines with Intel processors, the US-based chip maker has announced the release of firmware that plugs a number of potentially critical flaws in Intel Management Engine (ME), Intel Trusted Execution Engine (TXE), and Intel Server Platform Services (SPS). What is Intel ME, TXE and SPS? Intel Management Engine (ME) is a subsystem More
Today, we heard from the Federal Communications Commission (FCC) about its plans to devastate Network Neutrality. Instead of responding to the millions of Americans who want to protect the free and open Internet, the FCC instead is ceding to the demands of a handful of massive ISPs, like Comcast, Verizon, and AT&T.
EFF will be analyzing the full plan when it is released. But based on what we know so far, its clear that Chairman Pai is seeking to reverse the 2015 Open Internet Order that established clear but light touch protections for Internet users and Internet innovation. The FCCs new approach invites a future where only the largest Internet, cable, and telephone companies survive, while every start-up, small business, and new innovator is crowded outand the voices of nonprofits and ordinary individuals are suppressed. Costs will go up, as ISPs take advantage of monopoly power to raise rates on edge providers and consumers alike. And the FCCs proposed plan adds salt to the wound by interfering with state efforts to protect consumer privacy and competition.
The FCC today abdicates a fundamental responsibilitybut Internet users wont. Today, and every day, we will fight to defend net neutrality. Tell Congress that lawmakers must act to defend our open Internet.
Contact Congress now.
On Saturday night an unknown hacker targeted the Sacramento Regional
This is a post from HackRead.com Read the original post: Sacramento Regional Transit System in California Held for $7,000 Ransom
Three years ago, EFF exposed how hundreds of law enforcement agencies were putting families at risk by distributing free ComputerCOP Internet safety software that actually transmitted keystrokes unencrypted to a third-party server. Our report also raised serious questions about whether the company was deceiving government agencies by circulating a bogus letter of endorsement from a top official in the U.S. Treasury Department.
This month, our suspicions were confirmed. A document obtained through the Freedom of Information Act shows that, in response to EFFs research, the Treasury Departments Inspector General launched an investigation into ComputerCOP. The final report concluded that the company had, in fact, doctored a government letter to improperly convince law enforcement agencies to spend asset forfeiture funds to buy the product.
Unfortunately, the report shows that ComputerCOP dodged criminal prosecution because the statute of limitations expired. Nevertheless, the records should serve as the final nail in the coffin for this software. It was bad enough that the software was proven dangerous; it is even worse for law enforcement agencies to do business with a company that federal investigators caught forging documents.
ComputerCOP is a CD-ROM (now also available on a USB storage stick) that promises to help parents protect their children from Internet predators. More than 240 agencies signed contracts with ComputerCOP, often worth tens of thousands of dollars. But the software was less about safety than it was about self-promotion. Elected law enforcement officialsincluding sheriffs, mayors and district attorneysplaced their images on the cover and recorded promotional videos about how the software was the first step to protecting children online. By and large, the free software giveaway was used to generate positive media coverage. In Arizona, for example, the software project was spearheaded by the Maricopa County District Attorney...
Anouk Wipprechts hackerly interests are hard to summarize, so bear with us. She works primarily on technological dresses, making fashion with themes inspired by nature, but making it interactive. If that sounds a little bit vague, consider that shes made over 40 pieces of clothing, from a spider dress that attacks when someone enters your personal space too quickly to a suit with plasma balls that lets her get hit by Arc Attacks giant musical Tesla coils in style. She gave an inspiring talk at the 2017 Hackaday Superconference, embedded below, that you should really go watch.
Anouk has some neat insights about how the world of fashion and technology interact. Technology,...
Speed cameras have been the focus of motorists' anger and frustration for years, although we are told repeatedly that they are an effective means of reducing death and injury on the roads. But is this really the case?
Whether speed cameras actually do save lives seems an easy assertion to test: measure the numbers of casualties at a site over a period, say two years; introduce a speed camera; re-measure the number of casualties over an equal period, and any reduction is due to the camera. But it's not really that simple. Many other factors are at play that might make cameras appear to be more effective than they really are. And these factors are often ignored when evaluating the performance of speed cameras at improving road safety.
Do speed cameras actually save lives?
[...] In road safety data, there is a general tendency for collision incidents at a site to reduce anyway following a short-term rise in their number, without any treatment (such as a speed camera) being applied. In statistics, this is known as regression-to-the-mean (or RTM). We also know that the long-term trend in collisions has generally been downward due to factors such as improved vehicle safety and better driver education[PDF].
So if we observe a reduction in casualties at a site following the installation of a camera, we need to ask how much of this reduction would have happened anyway (the RTM effect)? How much is due to general trends in road safety? And how much can we actually attribute to the camera itself?
[...] To make matters worse, half of the UK's fixed speed cameras may not even be turned on. So the situation is far from simple.
Methods to accurately account for RTM and trend often require knowledge of advanced statistics which may not always be available within a road safety team, and so it is likely that these confounding factors are not being considered consistently across the country.
[...] So, do speed cameras save lives? The answer is almost certainly yes, but probably not always to the extent that people are led to believe.
Whether an Enterprise SOC or an MSSP the challenges of too many alerts, disconnected tools and a shortage of analysts continue to plague security operations. Security Automation and Orchestration are increasingly looked to enable analysts to triage the tsunami of alerts flooding the organisation, provide context to accelerate investigation, and provide the playbooks and workflow to drive consistency and efficiency throughout security operations. In this webinar Amos Stern, CEO of Siemplify and, Arthur Hedge, CEO More
Its novel design makes this pumped hydro project nearly as flexible as a storage battery. Whether the market is ready for it remains to be seen Photo: Absaroka Energy An artist's rendering of the Gordon Butte pumped hydro facility shows the upper and lower reservoirs and nearby Colstrip transmission line.
A pumped hydro project in southcentral Montana could provide electric utilities in the Pacific Northwest with a US billion-dollar, 400-megawatt facility that mimics both a battery and a fast-start natural gas-fired plant.
The Gordon Butte pumped storage project received its 50-year operating license from the Federal Energy Regulatory Commission in December 2016. The project holds a water right issued by the state of Montana to withdraw water from a nearby stream to fill the project reservoirs, and replace water lost to evaporation and seepage.With a FERC license in hand, Gordon Butte is in search of a customer for its pumped hydro capacity.
According to Carl Borgquist, president and CEO of Bozeman, Montana-based Absaroka Energy, an engineering contract with a design-construction firm is almost complete. But the project is by no means assured.
For one thing, two 40-year-old coal-fired units at the Colstrip power plant in southeastern Montana would need to close as expected in 2022. The closure was agreed to in 2016 by Allentown, Penn.-based Talen Energy and Seattle-based Puget Sound Energywhich own and operate the two unitsand environmental groups that sued over air emissions from the 2,094 MW plant.
For another thing, at least one of a handful of Pacific Northwest utilities still needs to sign a long-term purchase power agreement (PPA) to buy flexible capacity and ancillary services from the pumped hydro project. That may not be as simple as it sounds: Few U.S. power markets have set a value for the kinds of capacity and ancillary services the project could provide.
Whats more, in a straight-up comparison of installed capacity costs, Gordon Butte loses, according to numbers crunched for Absaroka by the consultancy Energy and Environment Economics, Inc., and presented by Borgquist in February 2017.
The numbers show that the cost per kilowatt for 400 MW of pumped hydro capacity is around $2,250. By contrast, the cost for gas-fired capacityprovided by technology that ranges from an aeroderivative combustion turbine to a reciprocating enginewas calculated to b...
Apple told senators that capitulating to the Chinese government's ban on certain privacy apps would help the iPhone continue to "promote greater opennness [sic] and facilitate the free flow of ideas and information."The comments came...
Do your friends and family rope you into providing tech support when you're home for the holidays? Use this opportunity to be a digital security hero and rescue your family from tracking cookies, unencrypted disks, insecure chats, and recycled passwords.
Check out EFFs Security Education Companion for ideas and inspiration. And remember: People learn by doing! Encourage friends and family members to walk through new security concepts and tools with you, and avoid the pitfalls of taking over their devices and doing it yourself.
Are your friends and family asking for general computer tips? Do you sense that they dont really want to listen for beyond a minute? You can cover the most important general ideas in one minute or less.
Figure out what browser(s) your family members and friends are using and install Privacy Badger. Privacy Badger is a simple browser extension that will help eliminate tracking cookies and ads that follow you around the internet. Install it yourself, or use our Security Education Companion lesson to explain how it works.
While youre at it, also install HTTPS Everywhere. HTTPS Everywhere makes sure that your browser uses secure HTTPS whenever its available, making your browsing more secure (and protecting your family computer from leaking sensitive data in some situations). Install it yourself, or use our Security Education Companion lesson to explain how it works.
Did a family member or friend get a fancy new phone, tablet, or computer? Are they worried about losing it or someone stealing it? Help give them peace of mind and keep other people out of their device: show them how to turn on full-disk encryption and password protection.
If you are using the NVIDIA proprietary graphics driver and anxious to try out the Linux 4.15 kernel for its many new features/improvements, unfortunately you will need to wait a few days as the current public driver is broken against this latest code...
With gene drives, scientists are trying to supercharge evolution to eradicate malaria and save endangered species from extinction. But is this DARPA-funded tech safe enough to test in the wild? One of its creators isnt so sure.
We had reported over a year ago that Google is working on a new in-development operating system named Fuchsia, which is not Android or Chrome OS based. It instead runs on top of the real-time Magenta kernel instead of Linux. Fuchsia is based on a new microkernel called Zircon, derived from Little Kernel, a small operating system intended for embedded systems. It runs across cross computers, mobile phones, tablets, and Internet of Things (IoT) devices.
Android Police noted that some of the most recent code commits that Google is working to integrate Swift, an open-source programming language developed by Apple with its Fuchsia OS. Fuchsia already supports programming languages like Dart, a language similar to C developed by Google and other languages like C/C++ and Go.
For those unaware, Swift, the successor of Objective-C, is a relatively clean, fast and error-free programming language that can reduce the length of the code, saving time and energy. Developed by Apple, Swift is suitable for building applications for iOS, macOS, watchOS and tvOS. It can be mixed with existing C/Objective-C/C++ code on Apples own platforms.
The support for Swift on Fuchsia was spotted on GitHub repository via a pull request adding Fuchsia OS support to the compiler. It was created by a Google employee and there are discussions about splitting it into several smaller pull requests in order to make it easier to review the code changes.
Confirming the move in a tweet, Apples Swift creator, Chris Lattner who currently works at Google, suggesting that it plans to have its own code.
Swift at Google has enough folks working on it that we need a staging ground/integration point, and we decided it should be public. https://t.co/hyphe0KrU0
Chris Lattner (@clattner_llvm) November 15, 2017
Google intends to make a code to meet their special requirements by making changes to Swift, and releasing it to Swift official repository. In fact, Google has already done this work. Google developer Zac Bowling posted a message in his social media account, which says that Swift GitHub has established a pull request to require support for the Fuchsia OS in t...
Stuff will be flown into space for the purpose of burning it so people can look at it:
Meteor showers are an awe-inspiring sight, and skywatchers often plan well in advance for their shot at spotting shooting stars as they rain down from the heavens. The rare events have, up until now, been a totally natural phenomenon, but one company is planning on turning on-demand meteor showers into big business, and it's scheduled its first man-made shooting star showcase for early 2019.
The company, called ALE, has created a spectacle it calls Sky Canvas, and it's as close to controlled meteor showers as we may ever get. What makes it so interesting is that this isn't some kind of slight of hand or illusion, but actual material dropped from special satellites burning up in the atmosphere to produce a brilliant light show overhead. It's wild, wild stuff.
The cube-shaped satellites that control ALE's Sky Canvas are tiny less than two feet on each side but they carry the proprietary pellets that create the "shooting stars" and can be controlled remotely from the ground. On command, the satellites release their payload, which then falls to Earth and, after coming into contact with the intense friction of the atmosphere, ignite.
Manmade explosions over Hiroshima?
Read more of this story at SoylentNews.
Google Joan Feynman and you can feel the search behemoth consider asking for clarification. Did you mean: Richard Feynman? Image search is even more biased toward Richard. After maybe seven pictures of Joan, theres an endless scroll of Richard alone, Richard playing the bongos, Richard with Arline, the love of his life.
Yes, Joan was overshadowed by her older brother, but what physicist of the era wasnt? Richard didnt do it on purpose. In fact, no one supported Joans scientific dreams more than he did, not even their mother. Before Richard ever illuminated the world with his brilliance, he shined a light on his little sister, Joan.
Baby Joan works on the Feynman smirk. Image via r/physics
Joan Feynman was born in Queens, New York City in 1927 to Lucille and Melville Feynman, nine years after Richard came along. Both children were raised to be insatiably curious. Their parents encouraged them to always ask why, and to take notice of the world around them.
Joan deeply admired her brother and was always interested in whatever he was doing. Richard capitalized on this right away, making Joan his first student. He taught her how to a...
Reexaminations (akin to but not identical to IPRs) can help weed out stupid patents like the one below
USPTO patent quality (US 6368227 B1)
Summary: The battle over the right to criticise particular patents has gotten very real and the Electronic Frontier Foundation (EFF) fought it until the end; this is why we need granted patents to be criticised upon petitions too (and often invalidated as a result)
THE USPTO, prior to some recent reforms, had been granting a lot of dubious patents on software patents which were later invalidated by PTAB, the appeal board which is half a decade old (US patents typically last two decades).
GEMSA wrote to EFF accusing us of
false and malicious slander. It subsequently filed a lawsuit and
obtained an injunction from a South Australia court purporting to
require EFF to censor itself.
EFFWe are very gratified to see PTABs growth and the crackdown on software patents. Earlier today I saw this press release about a new software patent on brain segmentation (my field of research). Do examiners seriously think that computer vision is anything but software and reducible to mathematics? Did words like brain and fancy jargon like dynamic atlas make them think that this is not an algorithm? This is where PTAB comes handy and such stupid patents (as the EFF calls them) get invalidated as though they were never granted.
Late July, President Vladimir Putin signed a new law which requires local telecoms watchdog Rozcomnadzor to maintain a list of banned domains while identifying sites, services, and software that provide access to them.
Rozcomnadzor is required to contact the operators of such services with a request for them to block banned resources. If they do not, then they themselves will become blocked. In addition, search engines are also required to remove blocked resources from their search results, in order to discourage people from accessing them.
Removing entire domains from search results is a controversial practice and something which search providers have long protested against. They argue that its not their job to act as censors and in any event, content remains online, whether its indexed by search or not.
Nevertheless, on October 1 the new law (On Information, Information Technologies and Information Protection) came into effect and it appears that Russias major search engines have been very busy in its wake.
According to a report from Rozcomnadzor, search providers Google, Yandex, Mail.ru, Rambler, and Sputnik have stopped presenting information in results for sites that have been permanently blocked by ISPs following a decision by the Moscow City Court.
To date, search engines have stopped access to 786 pirate sites listed in the register of Internet resources which contain content distributed in violation of intellectual property rights, the watchdog reports.
The domains arent being named by Rozcomnadzor or the search engines but are almost definitely those sites that have had complaints filed against them at the City Court on multiple occasions but have failed to take remedial action. Also included will be mirror and proxy sites which either replicate or facilitate access to these blocked and apparently defiant domains.
The news comes in the wake of reports earlier this month that Russia is considering a rapid site blocking mechanism that could see domains rendered inaccessible within 24 hours, without any parties having to attend a court hearing.
While its now extremely clear that Russia has one of the most aggressive site-blocking regimes in the world, with both ISPs and search engines required to prevent access to infringing sites, its uncertain whether these measures will be enough to tackle ram...
Even very moderate activity levels can influence the risk of death, according to a new study led by the University of Buffalo. The study showed that there was a significant reduction of mortality risk in women over 65 who regularly engaged in light physical activites, such as household chores.
Yes, folding the laundry, ironing, vacuuming the house and other menial tasks might not seem the most glamorous of activities, but they may help you to live longer.
Hackers looking for a payout have hit the Sacramento Regional Transit (SacRT) system, defacing the agency website, erasing data from some of its servers, and demanding money to stop the attack and not do further damage. The attack According to the Sacramento Bee, the hackers announced their presence on Saturday (November 18) by placing a message on the agencys main webpage saying that they wanted to help the agency fix vulnerabilities. On Sunday, they began More
Colorado has slapped Uber with a nearly $9 million fine for letting dozens of drivers with serious criminal or motor vehicle offenses work for the ride-hailing firm, The Associated Press reported.The Colorado Public Utilities Commission...
This will crush Chinese innovation
Summary: China is becoming what the United States used to be in terms of patents, whereas the American system is adopting saner patent policies that foster real innovation whilst curtailing mass litigation
THE USPTO, together with US courts, may have done whats necessary to stave off at least some patent trolls. With software patents on the rocks, venue-shifting becoming tough and various other notable factors, patent trolls either go out of business [sic] or move somewhere else. Some of them go to China.
Even China, based on yesterdays blog post, is lost in an appalling trap of a patent gold rush. The Chinese government now signals that competing/emergent players (those which compete against state-connected giants) are to be banned. From the blog: While many past customs enforcement campaigns have focused on foreign rights owners (often big international brands), this one was carried out on behalf of domestic tech companies. China Daily explains that it is part of the governments plan to nurture Chinese companies with IP advantages in their exported goods. In planning the Soaring Dragon operation, the Shenzhen authorities selected patent owners that were deemed capable of independent innovation Huawei and ZTE chief among them.
The Chinese government now signals that competing/emergent players (those which compete against state-connected giants) are to be banned.So put another way, a quarter million products were denied access to the market. Who exactly benefits from that? Whatever the details behind the numbers GACC is publicly promoting, it concludes, the message is clear: if youre an innovative Chinese company and your patents are being infringed, the customs services is one of the tools at your disposal. The more proactive they become, the more potent a remedy this will be, especially for the likes of Huawei and ZTE.
Those are massive corporations. They now shield themselves with a massive number of low-quality patents, just like in the US. This actually suppresses innovation and reduces competition. Its like ITC in the US.
Earlier today Watchtroll...
Net neutrality proponents are planning a last-ditch holiday protest against the Federal Communications Commission's (FCC) move to scrap Obama-era rules. Protesters in cities including Phoenix, Denver, San Francisco, New York City,...
Security updates have been issued by Debian (ldns and swauth), Fedora (kernel and postgresql), Mageia (botan, krb5, and sssd), and Ubuntu (apport, linux, linux-aws, linux-gke, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-raspi2, linux-hwe, linux-lts-xenial, procmail, and samba).
The agency wants ideas for turning computers into lifelong learners Illustration: iStockphoto
Earlier this month a self-driving shuttle in Las Vegas patiently waited as a delivery truck backed up, then backed up some more, then backed right into it. Inconveniently for the roboshuttles developer Navya, this happened within hours of the shuttles inauguration ceremony. The real problem is that the shuttle cant learn from the incident the way a human would: immediately and without forgetting how to do everything else in the process.
The U.S. Defense Advanced Research Projects Agency (DARPA) is looking to change the way AI works through a program it calls L2M, or Lifelong Learning Machines. The agency is looking for systems that learn continuously, adapt to new tasks, and know what to learn and when. We want the rigor of automation with the flexibility of the human, says the programs director Hava T. Siegelmann. The US $65-million program has already chosen 16 groups for 4-year projects, but according to Siegelmann there is still opportunity to propose 12- or 18-month projects.
AIs big problem stems from the structure in use today. Neural networks are adaptable systems whose ability to learn comes from varying the strength of connections between its artificial neurons. Today these networks are trained on a set of dataimages of cars and people for example. The strength of a networks connections are then fixed, and the system goes out into the world to do its thing.
The problem comes when the AI encounters something it was never trained to recognize. Without retraining, the system would make the same mistake over and over again. But right now, AIs cant really be retrained on the job. Trying to do so with todays systems leads to a phenomenon called catastrophic forgetting, Siegelmann explained at the IEEE Rebooting Computing Conference. Its a situation where learning the new item disrupts the knowledge of all the other things the system already knew how to do.
Even humans suffer some performance drop when they encounter something new, but we can recover while still performing a function. If you raise the net in a basketball game by 30-centimeters, players will miss most of the time at first, but as they continue playing theyll learn to score at the new height. You dont have to pull them off the court and teach them the entire game over again....
For better or worse, pets often serve as inspiration and test subjects for hardware hacks: smarten up that hamster wheel, tweet the squirrel hunting adventures from a dogs point of view, or automate and remote control a reptile enclosure. [TheYOSH], a gecko breeder from the Netherlands, chose the latter and wrote TerrariumPi for the Raspberry Pi to control and monitor his exotic companions home through a convenient web interface.
The right ecosystem is crucial to the health and happiness of any animal that isnt native to its involuntarily chosen surroundings. Simulating temperature, humidity and lighting of its natural habitat should therefore be the number one priority for any pet owner. The more that simulation process is reliably automated, the less anyone needs to worry.
TerrariumPi supports all the common temperature/humidity sensors and relay boards you will find for the Raspberry Pi out of the box, and can utilize heating and cooling, watering and spraying, as well as lighting based on fixed time intervals or sensor feedback. It even supports location based sunrise and sunset simulation your critter might just think it never left Madagascar, New Caledonia or Brazil. All the configuration and monitoring happens in the browser, as demonstrated in [TheYOSH]s live system with public read access (in Dutch).
It only seems natural that Python was the language of choice for a reptile-related system. On the other hand, it doesnt have to be strictly used for reptiles or even terrariums; TerrariumPi will take care of aquariums and any other type of vivarium equally well. After all, we have seen the Raspberry Pi handling greenhouses and automating mushroom cultivation before.
Ajit Pai, the Republican chairman of the Federal Communications Commission (FCC), announced on Tuesday that the FCC will vote to roll back Obama-era net neutrality rules that require internet service providers to treat all web traffic...
We are in a multidimensional and fully internationalized carry trade game, folks, which means there is a very serious and tangible risk pool sitting just below the surface across worlds largest insurance companies, pensions funds and banks, the so-called mandated undertakings
Human well-being will be severely jeopardized by negative trends in some types of environmental harm, such as a changing climate, deforestation, loss of access to fresh water, species extinctions and human population growth, scientists warn in today's issue of BioScience, an international journal.
The viewpoint article"World Scientists' Warning to Humanity: A Second Notice"was signed by more than 15,000 scientists in 184 countries.
The warning came with steps that can be taken to reverse negative trends, but the authors suggested that it may take a groundswell of public pressure to convince political leaders to take the right corrective actions. Such activities could include establishing more terrestrial and marine reserves, strengthening enforcement of anti-poaching laws and restraints on wildlife trade, expanding family planning and educational programs for women, promoting a dietary shift toward plant-based foods and massively adopting renewable energy and other "green" technologies.
Global trends have worsened since 1992, the authors wrote, when more than 1,700 scientistsincluding a majority of the living Nobel laureates at the timesigned a "World Scientists' Warning to Humanity" published by the Union of Concerned Scientists. In the last 25 years, trends in nine environmental issues suggest that humanity is continuing to risk its future. However, the article also reports that progress has been made in addressing some trends during this time.
The article was written by an international team led by William Ripple, distinguished professor in the College of Forestry at Oregon State University. The authors used data maintained by government agencies, nonprofit organizations and individual researchers to warn of "substantial and irreversible harm" to the Earth.
"Some people might be tempted to dismiss this evidence and think we are just being alarmist," said Ripple. "Scientists are in the business of analyzing data and looking at the long-term consequences. Those who signed this second warning aren't just raising a false alarm. They are acknowledging the obvious signs that we are heading down an unsustainable path. We are hoping that our paper will ignite a wide-spread public debate about the global environment and climate."
Here is the official page where you can read the full article, endorse the arti...
In past few months, several research groups have uncovered vulnerabilities in the Intel remote administration feature known as the Management Engine (ME) which could allow remote attackers to gain full control of a targeted computer. Now, Intel has admitted that these security vulnerabilities could "potentially place impacted platforms at risk." The popular chipmaker released a security
Online applications could work as smoothly as the programs you install on your machine Photo: Gabriela Hasbun
What if you could share a computer-aided design (CAD) model and even allow a colleague to manipulate it from afar? Click on this link, check out my design, and feel free to add more holes or fill some in, you might say. You wouldnt have to instruct your distant coworker to install special software or worry about whether her operating system could run it. Imagine that all your programs and data were stored in the cloud and that even computationally intensive applications like multimedia editing ran just as well in your browser as they would if they had been installed locally.
Since the early days of the World Wide Web, a lot of smart, passionate people have wanted to make it into a vehicle for running almost any kind of program. What makes that dream so tantalizing is that the Web is different from other software platforms. Its defined by open standards, so anyone can build on it. Its not owned by any company, so developers are beholden only to their users. And its constructed largely around open-source technologies, so it has the potential to be very democratic.
Over the past three decades, a whole generation of developers has worked to make this vision a reality. Weve added new capabilities to the Web, like audio and video streaming, 2D and 3D graphics, typography, peer-to-peer communication, data storage, offline browsing, as well as multitouch, location, and camera inputs. But we continue to struggle with performance, specifically the ability to run Web applications as quickly as non-Web applications.
Denial of Service (DoS) attacks have been around as long as computers have been networked. But if your business relies on the Internet to sell products or collaborate, a DoS attack is more than a nuisance, it can be critical.
Over the past few years, the number of DoS attacks has continued to slowly grow in a cat and mouse evolution bad actors get a slightly stronger attack, and network vendors come up with slightly more resilient equipment to defend. Generally the attacks came from botnets comprised of infected computers and servers. The cost of acquiring and keeping these systems in the botnet was relatively expensive, so there was an economic limiter on how fast the attacks would grow. Then Mirai happened in 2016 and everything changed.
The Mirai botnet didnt struggle with corporate security teams and technical security controls like anti virus software and firewalls.
Instead, it focused on the millions of Internet of Things (IoT) devices like webcams and Internet routers in the home to build the botnet. With no security controls to overcome, the Mirai botnet was able to grow and launch Distributed Denial of Service (DDoS) attacks larger than ever seen before. A high-profile attack against Internet journalist Brian Krebs signaled that things had changed, then the October 2016 attack against DNS provider Dyn, showed how devastating a DDoS attack can be. And in the world of a cyber...
European researchers assemble the components for a new kind of cochlear implant Photo: CSEM Two of the vertical cavity surface-emitting lasers used in a new optical cochlear implant are shown here next to a matchstick. Each laser rests within a sapphire box.
Blinking lights could soon serve a whole new purpose. Recent findings have led German, Swiss, and Austrian researchers to develop a prototype hearing implant based on the concept that a series of laser pulses can trigger auditory signals from hair cells located within the inner ear.
An array of near-infrared lasers can produce a soundwave using whats called the optoacoustic effect, the researchers believe. In their device, tiny vertical cavity surface-emitting lasers, which pulsate light at a spectrum of 1.4 to 1.9 microns, act upon the fluid within the nautilus-shaped cochlear canals in the inner ear.
Basically, the infrared light is absorbed by the liquid inside the cochlea. A small fraction of the liquid will expand due to heat. If that happens rapidly enough, it generates a soundwave inside the duct of the cochlea. This stimulates or moves tiny hair cells located there, which in turn sends a signal along the auditory nerve which the brain understands as sound.
Over the last three years, the researchers have built tiny laser arrays and completed tests on guinea pigs, finding they could generate action potentials, the signals carried by auditory nerves, using vertical laser light and the optoacoustic effect. They compared stimuli in the guinea pigs from the laser array with an acoustic click. Both generated nerve signals matching in form and amplitude.
It is still early days but the hope is that this technology can be used to replace or improve hearing devices and cochlear implants, says Mark Fretz, a physicist and project manager at the Centre Suisse dElectronique et Microtechnique (CSEM), an applied research and technology nonprofit based in Alpnach, Switzerland.
The next steps would be to improve the energy efficiency of the device and make it smaller. Individual components developed for the prototypeincluding a tiny sapphire case for hermetically sealing implanted body sensors and an improved laser lens designmay also find other uses, such as allowing laser light to shine within the ear to improve balance.Illustration: Chittka and Brockman, PloS Biology...
Posted by Matthias Weckbecker on Nov 21Hi,
Tether, a start-up firm known for offering dollar-backed cryptocurrency has announced that hackers have
This is a post from HackRead.com Read the original post: Hackers steal $30 million worth of cryptocurrency in Tether hack
Last week we presented our initial benchmarks of the Intel Optane SSD 900P on Linux and it offers mighty performance potential for those using I/O heavy workloads thanks to the use of 3D XPoint memory. But is a solid-state drive like this really worth the price if you are just a Linux gamer? Here are some tests comparing load times and boot times between a HDD, SATA 3.0 SSD, NVMe SSD, and this 3D XPoint NVMe U.2 SSD.
Having a mold problem in your home is terrible, especially if you have an allergy to it. It can be toxic, aggravate asthma, and damage your possessions. But lets be honest, before you even get to those listed issues, having mold where you live feels disgusting.
You can clean it with the regular use of unpleasant chemicals like bleach, although only with limited effectiveness. So I was not particularly happy to discover mold growing on the kitchen wall, and decided to do science at it. Happily, I managed to fix my mold problems with a little bit of hacker ingenuity.
I did some research into the underlying causes of the issue. We know mold loves moisture, but the specific root of the problem seems to be a high relative humidity in the surrounding air.
There is a limit to how much water vapor the air can contain at a given temperature. Relative humidity is the percentage of that water vapor limit at the current air temperature. High relative humidity also makes condensation worse, another source of moisture for mold growth. The thing to know is that moisture is our enemy here and the unit of measure that gives us the most reliable information about that is relative humidity.
A study done in Tokyo (PDF warning) seemed to show that the magic num...
Once again crooks succeeded in publishing a malware in the official Google Play Store deceiving the anti-malware protections implemented by the tech giant.
The android malware is also able to intercept text messages and delete them from the victims device, in this way it could bypass 2FA implemented by banks.
Google removed at least four previous versions of this banking trojan from the Play Store from the beginning of the year, but crooks always succeeded in proposing a new variant infecting victims of major banks worldwide.
Another set of malicious apps has made it into the official Android app store. Detected by ESET security systems as Android/TrojanDropper.Agent.BKY, these apps form a new family of multi-stage Android malware, legitimate-looking and with delayed onset of malicious activity. reads the analysis published by ESET.
We have discovered eight apps of this malware family on Google Play and notified Googles security team about the issue. Google has removed all eight apps from its store; users with Google Play Protect enabled are protected via this mechanism.
Researchers from security firms ESET, AVAST, and...
The fiftieth TOP500 list has been released. Although there has been little change at the top of the list, China now dominates the list in terms of the number of systems, rising to 202 from 160 in June, with the U.S. falling to 143 systems from 169. However, this seems to be the result of Chinese vendors pushing more commercial systems to get on the list:
An examination of the new systems China is adding to the list indicates concerted efforts by Chinese vendors Inspur, Lenovo, Sugon and more recently Huawei to benchmark loosely coupled Web/cloud systems that strain the definition of HPC. To wit, 68 out of the 96 systems that China introduced onto the latest list utilize 10G networking and none are deployed at research sites. The benchmarking of Internet and telecom systems for Top500 glory is not new. You can see similar fingerprints on the list (current and historical) from HPE and IBM, but China has doubled down. For comparison's sake, the US put 19 new systems on the list and eight of those rely on 10G networking. [...] Snell provided additional perspective: "What we're seeing is a concerted effort to list systems in China, particularly from China-based system vendors. The submission rules allow for what is essentially benchmarking by proxy. If Linpack is run and verified on one system, the result can be assumed for other systems of the same (or greater) configuration, so it's possible to put together concerted efforts to list more systems, whether out of a desire to show apparent market share, or simply for national pride."
Sunway TaihuLight continues to lead the list at just over 93 petaflops. The Gyoukou supercomputer has jumped from #69 (~1.677 petaflops) in the June list to #4 (~19.136 petaflops). Due to its use of PEZY "manycore" processors, Gyoukou is now the supercomputer with the highest number of cores in the list's history (19,860,000). The Trinity supercomputer has been upgraded with Xeon Phi processors, more than tripling the core count and bringing performance to ~14.137 petaflops (#7) from ~8.1 petaflops (#10). Each of the top 10 supercomputers now has a measured LINPACK performance of at least 10 petaflops.
The #100 system has an Rmax of 1.283 petaflops, up from 1.193 petaflops in June. The #500 system has an Rmax of 548.7 teraflops, up from 432.2 teraflops in June. 181 systems have a performance of at least 1 petaflops, up from 138 systems. The combined...
Do you own an Android smartphone? If yes, then you are one of those billions of users whose smartphone is secretly gathering location data and sending it back to Google. Google has been caught collecting location data on every Android device owner since the beginning of this year (that's for the past 11 months)even when location services are entirely disabled, according to an investigation
When I first wrote about the interstellar interloper now called Oumuamua, I made reference to Arthur C. Clarkes Rendezvous with Rama because of the delightful symmetry between the novel and the object, though noting that were unlikely to find that A/2017 U1 is as intriguing as Clarkes mysterious starship bound for the Magellanics (see An Interstellar Visitor?). Still, an interstellar object entering the Solar System only to go careening back out of it could not help but recall Clarke, whose asteroid 31/439 wound up being artificial.
Then came the paper from Karen Meech (University of Hawaii Institute for Astronomy, where the object was first detected with the Pan-STARRS1 telescope). Drawing on data from telescopes around the world, Meechs team has been able to characterize our first nearby object from another stellar system, with equally delightful results. For it turns out that Oumuamua (pronounced oh MOO-uh MOO-uh) has an unusual axis ratio, being about ten times longer than it is wide. Jim Benford couldnt resist suggesting I show a cover from Rendezvous with Rama depicting just such an axis ratio, and I agreed wholeheartedly.
Any science fiction fan familiar with Clarke (and are there any who arent?) will have fun with the similarities, but how much do we actually know about Oumuamua? Meechs team based its conclusions on the objects shape on the fact that its brightness changed so dramatically as it rotated (spinning on its axis every 7.3 hours). Lance Benner, who specializes in radar imaging of near-Earth and main-belt asteroids at JPL, calls the axis ratio here truly extraordinary. We know of no Solar System objects elongated more than 3 times longer than they are wide.
Nothing in our Solar System, in other words, quite matches an object shaped like this. Of course, it might also look like the image below, courtesy of the European Southern Observatory.
Samsung, the South Korean technology giant, has accidentally confirmed the launch of a new foldable smartphone Galaxy X through the devices support page.
The support page is for a smartphone with the model number SM-G888N0, a label that is widely believed to be the upcoming Samsung Galaxy X. According to the Dutch site, Mobiel Kopen (as reported by Lets Go Digital) found a support page for the smartphone on Samsungs Korean site. Although, the support page doesnt provide specifications of the device, it does confirm the existence of a foldable smartphone. The SM-G888 had already received a few certifications from regulators including the Bluetooth SIG, Wi-Fi Alliance, and South Koreas own National Radio Research Agency, reports Mobiel Kopen.
One can expect Samsung to launch the Galaxy X initially in South Korea and also get it certified there. Based on the reception of the Galaxy X, it may decide when to release the device in the other countries. Also, since its a foldable smartphone, it might see a limited launch.
The post Samsung accidentally confirms foldable Galaxy X launch through live support page appeared first on TechWorm.
The latest variants of tech support scams targeting Apple users have done away with the usual visually prominent error messages. Instead, they open the potential victims default communication or phone call app, and prompt them to call the fake tech support scam hotline (the number is already prepopulated in the app): With click-to-call links, tech support scams do not have to be as elaborate as many current tech support scam websites. They dont have to More
See the Top 10 moments of 2017 Linux Foundation events, including a conversation with Linus Torvalds, a video created by actor Joseph Gordon-Levitt through his colloborative production company, the Diversity Empowerment Summit, and Auto Grade Linux in the new Toyota Camry.
The company plans to capture the printed display market from right under the noses of OLED manufacturers Illustration: Nanosys
Quantum dots have established themselves as a go-to material for photoluminescence, in which light is emitted when stimulated by a light source. Based on this capability, companies such as Nanosys have been able to help display companies like Samsung capture a growing segment of the display market from competing technologies such as LED-backlit LCD and organic light-emitting diode (OLED) displays.
Nanosys currently has more than 60 quantum dot-enabled products on the market, and the company now wants to make a big push to expand the capabilities of quantum dots beyond just photoluminescence into the area of electroluminescence, where photons are emitted in the presence of an electric field or current. Nanosys expects this development to lead to a new era of what Nanosys is terming: Electro Luminescent Quantum Dot (ELQD) displays.
Executives at Nanosys believe that ELQD displays have the potential to disrupt the display industry over the next decade. The displays dont need a backlight and, because each subpixel is addressable, the display wastes no energy while the light travels from the backlight to the pixel. This should translate into lower power consumption, along with wider viewing angles, purer colors, and perfect black levels, according to Jeff Yurek, Director of Marketing and Investor Relations at Nanosys.
We expect to see these displays in the three to five year timeframe, said Yurek. We think that quantum dots have the potential to deliver on the promise of OLED.
It has long been promised that OLEDs would someday be available in...
This is a walk through of the Ethernaut capture-the-flag competition where each challenge was an ethereum smart contract you had to break.
I did this at 2am in a hotel room in Romania and ended up not finishing the last challenge because I took too long and didn't want to re-record that part. Basically what I was missing in my malicious contract: a function to withdraw tokens from the victim contract (it would have work since I had a huge amount of token via the attack). I figured I should still upload that as it might be useful to someone.
At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards ubiquity, their impacts will likewise scale, as will their effects. In fact, 74 percent of CTOs today believe that cloud computing will have the most measurable impact on their business this year. Specifically in the area of file storage, the cloud has swiftly become the domain of governmental regulations, More
KrebsOnSecurity recently featured a story about a New Mexico man who stands accused of using the now-defunct vDOS attack-for-hire service to hobble the Web sites of several former employers. That piece stated that I wasnt aware of any other prosecutions related to vDOS customers, but as it happens there was a prosecution in the United Kingdom earlier this year of a man whos admitted to both using and helping to administer vDOS. Heres a look at some open-source clues that may have led to the U.K. mans arrest.
In early July 2017, the West Midlands Police in the U.K. arrested 19-year-old Stockport resident Jack Chappell and charged him with aiding the vDOS co-founders two Israeli men who were arrested late year and charged with running the service.
Until its demise in September 2016, vDOS was by far the most popular and powerful attack-for-hire service, allowing even completely unskilled Internet users to launch crippling assaults capable of knocking most Web sites offline. vDOS made more than $600,000 in just two of the four years it was in operation, launching more than 150,000 attacks against thousands of victims (including this site).
For his part, Chappell was charged with assisting in attacks against Web sites for some of the worlds largest companies, including Amazon, BBC, BT, Netflix, T-Mobile, Virgin Media, and Vodafone, between May 1, 2015 and April 30, 2016.
At the end of July 2017, Chappell pleaded guilty to those allegations, as well as charges of helping vDOS launder money from customers wishing to pay for attacks with PayPal accounts.
A big factor in that plea was the leak of the vDOS attacks, customer support and payments databases to this author and to U.S. law enforcement officials in the fall of 2016. Those databases provided extremely detailed inf...
Eighty-five per cent of senior executives plan to invest in artificial intelligence (AI) and the Internet of Things (IoT) by 2020, according to a new survey of UK digital leaders by Deloitte. The findings come from the first edition of a new regular report from Deloitte, the Digital Disruption Index. The index will track investment in digital technologies and create a detailed picture of their impact on the largest and most influential business and public More
The Global Cyber Alliance has given the world a new free Domain Name Service resolver, and advanced it as offering unusually strong security and privacy features.
The Quad9 DNS service, at 22.214.171.124, not only turns URIs into IP addresses, but also checks them against IBM X-Force's threat intelligence database. Those checks protect agains landing on any of the 40 billion evil sites and images X-Force has found to be dangerous.
The Alliance (GCA) was co-founded by the City of London Police, the District Attorney of New York County and the Center for Internet Security and styled itself "an international, cross-sector effort designed to confront, address, and prevent malicious cyber activity."
[...] The organisation promised that records of user lookups would not be put out to pasture in data farms: "Information about the websites consumers visit, where they live and what device they use are often captured by some DNS services and used for marketing or other purposes", it said. Quad9 won't "store, correlate, or otherwise leverage" personal information.
[...] If you're one of the lucky few whose ISP offers IPv6, there's a Quad9 resolver for you at 2620:fe::fe (the PCH public resolver).
Read more of this story at SoylentNews.
Despite concerns about identity theft and fraud, consumers dont plan to curb their holiday shopping, according to Discover. While 62 percent of consumers are very or moderately concerned about identify theft or fraud this holiday season, 73 percent, say concerns over recent data breaches wont affect how theyll go about their holiday shopping. Discover has commissioned its annual holiday shopping survey since 2004. Consumers are taking proactive steps to safeguard their identities When it comes More
SecurityMatters and Waterfall Security Solutions announced a global partnership to protect industrial control systems from the most advanced cyber threats. The joint solution integrates SecurityMatters SilentDefense network monitoring platform with Waterfalls Unidirectional Security Gateways to enable industrial enterprises to continuously and centrally monitor industrial control networks, while thoroughly protecting those networks from cyber attacks. SecurityMatters flagship product, SilentDefense, is an OT network monitoring and intelligence platform that empowers industrial operators with unrivaled visibility, threat detection More
At this year's Opensource.com Community Moderator's meeting in Raleigh, North Carolina, Red Hat CEO Jim Whitehurst made a comment that stuck with me.
"Open source's supply chain is source code," he said, "and the people making up that supply chain aren't very diverse."
Diversity and inclusivity in the technology industryand in open source communities more specificallyhave received a lot of coverage, both on Opensource.com and elsewhere. One approach to the issue foregrounds arguments about concepts that are more abstractlike human decency, for example.
In the Harry Potter universe, Professor Moody was, perhaps unfairly, given the nickname Mad Eye for the prosthetic eye he wore. His eye remains a challenge for technically-minded cosplayers aiming to recreate the look and feel of this unique piece of headgear. [cyborgworkshop] had already mastered the basic eye, but wanted to take things further.
The original build relied on a sub-micro servo to move the eyeball. This was done at random as an attempt to simulate the eyes behaviour in the books and films. However, wanting more, [cyborgworkshop] decided to make the eye more reactive to its surrounding environment. Using the Adafruit Huzzah, a breakout board for the ESP8266, code was whipped up to detect the number of WiFi access points in the area. The more access points, the more frequent and erratic the movement of the eye. Occasional slower periods of movement are coded in before the eye resumes its wild darting once more, depending on just how saturated the local WiFi environment is.
Pirate streaming boxes are all the rage this year. Not just among the dozens of millions of users, they are on top of the anti-piracy agenda as well.
Backed by the major film studios, the organization booked a significant victory earlier this year against Filmspeler. In this case, the European Court of Justice ruled that selling or using devices pre-configured to obtain copyright-infringing content is illegal.
Paired with the earlier GS Media ruling, which held that companies with a for-profit motive cant knowingly link to copyright-infringing material, this provides a powerful enforcement tool.
With these decisions in hand, BREIN previously pressured hundreds of streaming box vendors to halt sales of hardware with pirate addons, but it didnt stop there. This week the group also highlighted its successes against vendors of unauthorized IPTV services.
BREIN has already stopped 170 illegal providers of illegal media players and/or IPTV subscriptions. Even providers that only offer illegal IPTV subscriptions are being dealt with, BREIN reports.
In addition to shutting down the trade in IPTV services, the anti-piracy group also removed 375 advertisements for such services from various marketplaces.
This is illegal commerce. If you wait until you are warned, you are too late, BREIN director Tim Kuik says.
You can be held personally liable. You can also be charged and criminally prosecuted. Willingly committing commercial copyright infringement can lead to a 82,000 euro fine and 4 years imprisonment, he adds.
While most pirate IPTV vendors threw in the towel voluntarily, some received an extra incentive. Twenty signed a settlement with BREIN for varying amounts, up to tens of thousands of euros. They all face further penalties if they continue to sell pirate subscriptions.
In some cases, the courts were involved. This includes the recent lawsuit against MovieStreamer, that was...
The melting Antarctic ice stream that is currently adding most to sea-level rise may be more resilient to change than previously recognised. New radar images reveal the mighty Pine Island Glacier (PIG) to be sitting on a rugged rock bed populated by big hills, tall cliffs and deep scour marks. Such features are likely to slow the ice body's retreat as the climate warms, researchers say. The study appears in the journal Nature Communications [open, DOI: 10.1038/s41467-017-01597-y] [DX].
"We've imaged the shape of the bed at a smaller scale than ever before and the message is really quite profound for the ice flow and potentially for the retreat of the glacier," said lead author Dr Rob Bingham from Edinburgh University. "Where the bed is flat - that's where we will see major retreat. But where we see these large hills and these other rough features - that's where we may see the retreat slowed if not stemmed," he told BBC News.
Read more of this story at SoylentNews.
It's been a while since last doing any Linux boot speed comparisons while this morning I have some numbers to share when looking at the boot performance from the Linux 4.6 kernel through Linux 4.15 Git to see how it's changed over time,..
If you plan on immersing yourself into the booming world of ecommerce, you need a dynamo tool that can propel you to the heights of success. The platform you choose needs an appealing and effective range of features for displaying your goods and collecting funds. And it needs to be as intuitive as it is powerful.
The multitude of ecommerce platforms have a lot to offer. Many of these solutions make it easy enough for novices to master creating professional storefronts, uploading products, establishing checkout processes and and all the other ecommerce ins-and-outs.
There are plenty of well-known options for merchants to choose from, such as Shopify, Magento and WooCommerce. Today I will give you the skinny on another one of the most popular solutions on the market: BigCommerce.
BigCommerce offers users a vast selection of powerful features that provide value to both ecommerce veterans and rookies. Despite a relatively simple interface and design, BigCommerce still touts high-level capabilities, effectively creating a one-stop shop for all of a merchants needs. Its not a perfect platform, but its pretty darn close.
Is BigCommerce your ideal ecommerce partner? Lets find out.
Packages and Offerings
For anyone who wants to test out BigCommerces features or interface, check out the 15-day free trail. Thats a good chunk of time to see if the platform is suited to your brands needs.
BigCommerce has four different tiers of service: Standard ($29.95/month), Plus ($79.95/month), Pro ($249.95/month), and Enterprise (custom).
Unlike other ecommerce solutio...
Again some bad news for cryptocurrency users. Tether, a Santa Monica-based start-up that provides a dollar-backed cryptocurrency tokens, has claimed that its systems have been hacked by an external attacker, who eventually stole around $31 million worth of its tokens. With a market capitalization of $673 million, Tether is the world's first blockchain-enabled platform to allow the
Last week was equally spent on refactoring, bugfixing and infrastructure. We're looking for replacement our oldish server and it seems that rented server or virtual hosts seems to be best fit for us these days. Still there are quite some choices to consider.
I've done quite some development as well - I'm most happy with Util::linkOrButton refactoring which helped to cleanup the code quite a lot, but there were other fixes and improvements as well.
After apologizing how they handled the EGLStreams proposal for NVIDIA Wayland support, James Jones of NVIDIA is trying to get the development of their proposed generic device memory allocator library back on track...
Little did I know that learning about Chomsky would drag me down a rabbit hole back to regular expressions, and then magically cast regular expressions into something that fascinated me. What enchanted me about regular expressions was the homonymous linguistic concept that powered them.
Here are some early AMD Radeon Linux gaming benchmarks using the in-development Linux 4.15 kernel. Unfortunately, there are a few performance regressions...
A committee of top tier infosec heavy weights (and a half dozen interns) got together and wrote a guide to campaign information security. Its a fine document produced by a lot of talented people and definitely a good starting point. Indeed, it mirrors much of the advice I put together in August 2016 for political campaigns. Im sure the authors have considerably more expertise on the details and ground realities of political campaigns than I do. Still, theres some additional content that I believe is worth sharing, perhaps it will be of use to someone.dont fear the trolls, f#*k with them.
Rule #1: your objective is not dont get hacked, your objective is dont let the adversary get useable information
The first and most important thing to keep in mind that your goal is to deny the adversary useful information. Not getting hacked is certainly the first step towards that goal, but it is not the final step.
Rule #2: authenticity is the only thing that people believe.
If the worst case scenario happens and the adversary begins leaking your data, verify that it hasnt been tampered with or altered. The Soviets preferred a mixture of 9 parts truth to 1 part dezinfomatsiya for their influence operations. When you encounter an alteration or manipulation, you must immediately expose it by showing the original. This robs the adversary of authenticity. Their lost credibility is your gain.
Rule #3: the e in email stands for evidence
Do not use email for anything that isnt routine or mundane (anyone hungry? Lets get lunch, is ok, gossip or rumours is not.) Communications are critical and in descending order of preference:
Rule #4: use deception to lure the adversary out
Get a Canary for your office network and configure it as a file or email server. They are ridiculously easy to setup, theyre cheap, they have essentially zero false positives. This means that an alert from the Canary is highly likely to be indicative of malicious activity on your network.
Rule #5: use deception to consume the adversarys analytic resources
Your team can focus on a limited number of real files whil...
Intel continues bringing up support for the 2019 Icelake processors within the open-source compiler toolchains...
In our view, to get the most from space-science programmes in terms of impacts on research and reputation government agencies and institutions need to choose, manage and assess missions in ways that optimize the scientific outputs. As heads of space-science agencies and institutes from around the world gather at a forum next week in Beijing to identify principles for maximizing returns on such missions, we call on them to put science first.
Put research goals first when prioritizing and managing national and international projects, urge Ji Wu and Roger Bonnet.
Just days after David Airlie landed R600g image shader support and other patches for this Radeon HD 2000 through HD 6000 series open-source driver, he's enabled support for another GL4 extension...
A bug bounty hunter shared evidence; DJI called him a hacker and threatened with CFAA.
DJI, the Chinese company that manufactures the popular Phantom brand of consumer quadcopter drones, was informed in September that developers had left the private keys for both the "wildcard" certificate for all the company's Web domains and the keys to cloud storage accounts on Amazon Web Services exposed publicly in code posted to GitHub. Using the data, researcher Kevin Finisterre was able to access flight log data and images uploaded by DJI customers, including photos of government IDs, drivers licenses, and passports. Some of the data included flight logs from accounts associated with government and military domains.
Finisterre found the security error after beginning to probe DJI's systems under DJI's bug bounty program, which was announced in August. But as Finisterre worked to document the bug with the company, he got increasing pushbackincluding a threat of charges under the Computer Fraud and Abuse Act (CFAA). DJI refused to offer any protection against legal action in the company's "final offer" for the data. So Finisterre dropped out of the program and published his findings publicly yesterday, along with a narrative entitled, "Why I walked away from $30,000 of DJI bounty money."
-- submitted from IRC
Read more of this story at SoylentNews.
Fn, a new serverless open source project was announced at this years JavaOne. Theres no risk of cloud lock-in and you can write functions in your favorite programming language. You can make anything, including existing libraries, into a function by packaging it in a Docker container. We invited Bob Quillin, VP for the Oracle Container Group to talk about Fn, its best features, next milestones and more.
This unusual activity was first spotted by The Next Webs Director Matt Navarra along with some users who flocked across different social media sites complaining about facing the same problem.
Its not just you!
Facebook seems to have removed the Delete post option
Matt Navarra (@MattNavarra) November 17, 2017
Some suggested that it could be a temporary bug and some claiming that Facebook has intentionally deleted this feature.
However, a newest update confirmed that the company didnt remove the delete post button and its still in its beta period. Instead, it appears that the delete post option was disabled for a large group of users leading to the rumor that one would no longer be able to remove posts. For desktop users looking to access the delete post option can still see it in the activity log section.
On the other hand, there were many others who reported to still have the delete post option in their profiles, which leaves one guessing if Facebook has restored the feature after a lot of users started complaining about the inability to delete something they posted on Twitter and on Facebook.
While the company has yet to officially address this issue, it makes one think if Facebook has again played mind games with its users. In the past, the company had deliberately labelled posts as Fake News to test peoples reaction. This is a developing story and we shall keep you updated once we receive information on it.
The post Did Facebook remove delete post option from the desktop website? appeared first on TechWorm.
AT&T says its not enough to deploy white box hardware and to orchestrate its networks with the Open Network Automation Platform (ONAP) software. Each individual machine also needs its own operating system, writes Chris Rice, senior vice president of AT&T Labs, Domain 2.0 Architecture, in a blog post.
[Sean Hodgins]s calls his three-part video series an Arduino Neural Network Robot but wed rather call it an enjoyable series on prototyping, designing a board with surface mount parts, assembling it, and oh yeah, putting a neural network on it, all the while offering plenty of useful tips.
In part one, prototype and design, he starts us out with a prototype using a breadboard. The final robot isnt on an Arduino, but instead is on a custom-made board built around an ARM Cortex-M0+ processor. However, for the prototype, he uses a SparkFun SAM21 Arduino-sized board, a Pololu DRV8835 dual motor driver board, four photoresistors, two motors, a battery, and sundry other parts.
Once hes proven the prototype works, he creates the schematic for his custom board. Rather than start from scratch, he goes to SparkFuns and Pololus websites for the schematics of their boards and incorporates those into his design. From there he talks about how and why he starts out in a CAD program, then moves on to KiCad where he talks about his approach to layout.
Part two is about soldering and assembly, from how he sorts the components while still in their shipping packages, to tips on doing the reflow in a toaster oven, and fixing bridges and parts that arent on all their pads, including the microprocessor.
In case you want to replicate this, [Sean]s provided a GitHub page with BOM, code and so on. Check out all three parts below, or watch just the parts that interest you.
[Sean]s neural network is one that learns using supervised learning, an approach where you iterate through a table of inputs and expected outputs. If you instead want your robot to learn from experimenting in its environment, called unsupervised learning, then c...
This is what I get when I log in
O-called social networks (Ive coined the term social control networks for these) are supposed to facilitate a diversity of views. Not threats. Not calls for genocide. These strands of speech constitute violations of very particular laws and for defensible reasons. But the point being, let people express their views, even if and when you disagree with these views.
I am not vulgar, I dont really curse, and I dont write negatively about vulnerable groups; my criticisms are usually directed at large organisations, institutions, corporations, political parties and so on. I never really considered myself worthy of censorship of any kind, yet Twitter has, on several occasions, shadowbanned me for no reason at all or simply because I was being bullied (shadowban by algorithms can lead to that). Time-limited shadowbans are not so severe because the user is typically not aware of them and can still post (albeit the audience is severely limited, its almost like talking to oneself sometimes).
Twitter, to its credit, never ever suspended me. Ever. The funny thing is that people in Mastodon say that I should delete Twitter and not participate in it. Eventually, as it turns out, its actually Mastodon that censors me. Its an actual suspension for which I have not been given reason other than some people reporting me (as if that alone merits action, DMCA-style).
I am guessing that the suspension will eventually be undone, but that may still result in self-censorship. I was actually very surprised when it happened and spent over an hour investigating what I assumed to be a technical fault. The above says error; it does not tell me that I got suspended.
As Mastodon has just suspended me
mastodon.technology to be precise), I believe it can
do it to virtually anyone. Apparently all it takes is a complaint
citing something from the rather vague ToS, which can be
interpreted as dont cause people offense (or make an oppressive
environment whatever exactly that may mean). Even without insulting
any other user let alone a mention of another user ones views/links
can apparently get one the boot, without as little as due process
of some kind.
Mastodon was always known to be tough on Nazis; it was known that they were strict on free speech only to a degree. After the treatment that I received yesterday, however, I can no longer recommend Mastodon. It may be Free software, but its very weak on free speech.
The most insul......
The researcher Will Dormann from the Carnegie-Mellon CERT has discovered the Address Space Layout Randomisation (ASLR) isnt properly implemented in versions of Microsoft Windows 8 and newer.
Actually, with Windows 7 and EMET System-wide ASLR, the loaded address for eqnedt32.exe is different on every reboot. But with Windows 10 with either EMET or WDEG, the base for eqnedt32.exe is 0x10000 EVERY TIME.
Conclusion: Win10 cannot be enforce ASLR as well as Win7! pic.twitter.com/Jp10nqk1NQ
Will Dormann (@wdormann) November 15, 2017
The Address Space Layout Randomization (ASLR Protection) is a security mechanism used by operating systems to randomize the memory addresses used by key areas of processes, it makes hard for attackers to find the memory location where to inject their malicious code.
The Address Space Layout Randomisation is particularly effective against stack and heap overflows and is able to prevent arbitrary code execution triggered by any other buffer overflow vulnerability. The security measures are present in almost any modern operating system, including Windows, Linux, macOS, and Android.
Applications running on Windows 8 and newer versions were allocated addresses with zero entropy, this means that it was possible to predict where the code is allocated in memory due to the failure of the randomisation. Windows 10 has the problem, too.
The CERT/CC published a security advisory late last, Dormann found the ASLR issue while he was analyzing a recently fixed bug in Microsofts equation editor, tracked as CVE-2017-11882, that could be exploited by remote attackers to install a malware without user interaction.
Microsoft Windows 8 introduced a change in how system-wide mandatory ASLR is implemented. This change requires system-wide bottom-up ASLR to be enabled for mandatory ASLR to receive entropy. Tools that enable system-wide ASLR without also setting bottom-up ASLR will fail to properly randomise executables that do not opt in to ASLR. states the security advisory.
Quoted from the http://tidbits.com/article/17633: "If you're running macOS 10.12 Sierra or earlier, and do not want to upgrade to 10.13 High Sierra right now, be careful because Apple has started pushing High Sierra to older Macs and making it all too easy to upgrade inadvertently." [...]
Read more of this story at SoylentNews.
The Algerian state telecom operator Algerie Telecom confirmed on Friday that it was hit by a series of cyber attacks aimed to hack and disrupt its system.
The company was able to repel the attack and security services managed to identify and arrest the attackers.
At the time of writing, there are no further details about the attacks or the motivation of the hackers.
According to a statement issued by the company, its staff was able to protect the operational infrastructure with the help of security services.
The rapid increase in the number of cyber attacks is raising concerns in Algeria especially over the security of recently launched services, such as the recently adopted e-payment system for electricity and water bills.
Iman Houda Faraoun, Minister of Post, Information and Communication Technologies and Digital Economy, said the e-commerce bill, which had been approved by the Council of Ministers, will come into force as soon as it is approved by the parliament. reported the Xinhuanet.com website.
She promised that the e-commerce process will be fully protected, as e-financial transactions data, invoices and postal and bank cards will remain confidential.
(Security Affairs Algerie Telecom, hacking)...
I like to get things done. Who doesn't. Often to get things done you need to break the problem you're solving into many smaller subproblems, then use many tiny helper programs to solve these subproblems, and then merge results back to solve the original problem. These tiny helper programs often just do one tiny task such as extract, convert, format, and filter data. Usually they are one-liners but often you'd just google for a tool that does what you need. I used to google for tools like "url encode" and "convert json to text" all the time and I would end up on garbage websites filled with ads, popups, blinking download buttons or tools that don't work. I hated this so much that over the last two years I built Browserling's programmer tools. It's a collection of useful tools for developers. I added 300+ tools in this collection. Each tool in the collection does one thing and one thing only and all tools work the same way. You enter input, press button, and get result. There are no ads, useless configuration options or other garbage. Just tools for getting tiny tasks done. These tools are now used by hundreds of thousands of users monthly.
I want even more people using my tools and getting things done, so my team and I at Browserling are launching a network of tools websites. Each website covers one set of tools. The first site in the network is Online CSV Tools. It's all about working with Comma Separated Values (CSV) files and data. Just like Browserling's tools, online tools are also simple, free and easy to use.
The next site is going to be Online JSON Tools (now live) for working just with JSON data, then Online XML Tools (now live), then Online String Tools (now live), then onlineRANDOMtools (now live!), then Online TSV Tools (for working with Tab Separated Values), then Online YAML Tools, then Online Image Tools, then Online Browser Tools, then Online Crypto Tools, then Online PDF Tools and so on. There will be more than 25 websites total. We'll be releasing them all one by one over the next few years.
Here's a list of all CSV tools on this website:
Chipmaker Marvell Technology Group Ltd (MRVL.O) said it would buy smaller rival Cavium Inc (CAVM.O) in a $6 billion deal, as it seeks to expand its wireless connectivity business in a fast consolidating semiconductor industry.
[...] Hamilton, Bermuda-based Marvell makes chips for storage devices while San Jose, California-based Cavium builds network equipment. "With Marvell facing secular challenges on its core chip business, this acquisition is a smart strategic move which puts the company in a stronger competitive position for the coming years," said GBH Insights analyst Daniel Ives.
Marvell, which has been trying to diversify from its storage devices business, had come under pressure from Starboard Value LP last year, when the activist investor called the company undervalued. "This is an exciting combination of two very complementary companies that together equal more than the sum of their parts," Marvell's Chief Executive Matt Murphy said in a statement.
Also at Ars Technica.
Related: HPC Chips Abound
Read more of this story at SoylentNews.
In July of 2016 a game was released that quickly spread to every corner of the planet. Pokemon Go was an Augmented Reality game that used a smart phones GPS location and camera to place virtual creatures into the persons real location. The game was praised for its creativity and was one of the most popular and profitable apps in 2016. Its been download over 500 million times since.
Most of its users were probably unaware that they were flirting with a new and upcoming technology called Augmented Reality. A few day ago, [floz] submitted to us a blog from a student who is clearly very aware of what this technology is and what it can do. So aware in fact that they made their own Augmented Reality system with Python and OpenCV.
In the first part of a multi-part series the student (we dont know their name) walks you through the basic structure of making a virtual object appear on a real world object through a camera. He 0r she gets into some fairly dense math, so you might want to wait until you have a spare hour or two before digging into this one.
Thanks to [floz] for the tip!
[...] Torvalds has long been unafraid to express himself in whatever language he chooses on the kernel and has earned criticism for allowing it to become a toxic workplace. He's shrugged off those accusations with an argument that his strong language is not personal, as he is defending Linux rather than criticising individuals. On this occasion his strong language is directed at a team and Cook's approach to security, rather than directly at Cook himself. It's still a nasty lot of language to have directed at anyone.
PULL] usercopy whitelisting for v4.15-rc1
[Linus' Response]: Re: [GIT PULL] usercopy whitelisting for v4.15-rc1
Read more of this story at SoylentNews.
LibreELEC is a minimal operating system dedicated to running the Kodi media centre. LibreELEC runs on x86 personal computers and ARM-based computers, such as the Raspberry Pi. The project has released LibreELEC 8.2.1 which features time zone fixes and security improvements to Samba network shares. "LibreELEC 8.2.1 is....
Over at Newsweek, Hannah Osborne is reporting - First Human Head Transplant Successfully Performed on Corpse, Sergio Canavero Announces Key bits:
Scientists have carried out a head transplant on a human corpse, the neurosurgeon behind the operation has announced.
At a press conference in Vienna, Austria, Sergio Canavero said his team was able to remove the head from one body and connect it to the body of another by fusing the spine, nerves and blood vessels. He said the next step will be to carry out the operation on a living person, The Telegraph reports.
"The first human transplant on human cadavers has been done. A full head swap between brain dead organ donors is the next stage, he said. "And that is the final step for the formal head transplant for a medical condition which is imminent.
Canavero said a high number of people have volunteered to be his first head transplant patient. It is thought he will carry out the operation in China in December.
Because, of course, some of us are aware of the special dynamics of the intersection between Ethics, Journalism, and the Chinese government.
And then the next kicker to sufficiently anti-bait the click:
The Italian neurosurgeon did not present any evidence of his claims at the conference.
But, who knows what gruesome story we'll hear about in December.
Read more of this story at SoylentNews.
He said, she said.
Kaspersky: Yes, we obtained NSA secrets. No, we didnt help steal them.
Moscow-based AV provider challenges claims it helped Russian spies.
Posted by Graham Leggett on Nov 20CVE-2017-15044: DocuWare FullText Search - Incorrect Access Control vulnerability
Its often said that Less is More, and we think that the chic ESP8266 environmental monitor posted by Thingiverse user [bkpsu] definitely fits the bill. Dubbed Kube, the device is a 3D printed white cube with an OLED display in the center, which [bkpsu] says was designed specifically for the approval of his wife. Weirdly, she didnt like the look of bare PCBs on the wall.Multiple Kubes allow for whole-house monitoring.
Inside, things are a little more complex. The Kube uses the NodeMCU development board, and a custom breakout that [bkpsu] designed to interface with the display and sensors. For temperature and humidity monitoring, the Kube is using the ever-popular DHT22, and [bkpsu] mentions that he has future plans for things like motion sensors and direct control of RGB LED strips. All the data collected by the Kube is piped into openHAB via MQTT.
On the very detailed Thingiverse page, [bkpsu] gives background information on his design goals for the project, tips for printing out a high-quality case, a parts list with Amazon links, and pinout information for getting it all wired up. The PCB is even available on OSH Park for those who want a Kube of their own.
Even with all the stick home monitoring and automation products on the market today,...
The Texas Rangers have served Apple a warrant for iPhone and iCloud data connected to the recent mass shooter Devin Patrick Kelley. However, it is unknown whether Kelley actually used iCloud to store data, and unlikely that Apple will be able or willing to help unlock the iPhone:
Texas Rangers investigating the mass shooting in Sutherland Springs have served a search warrant on Silicon Valley giant Apple Inc. and are seeking digital photos, messages, documents and other types of data that might have been stored by gunman Devin Patrick Kelley, who was found with an iPhone after he killed himself.
Court records obtained by the San Antonio Express-News show Texas Ranger Kevin Wright obtained search warrants on Nov. 9 for files stored on Kelley's iPhone, a second mobile phone found near his body and for files stored in Kelley's iCloud account Apple's digital archive that can sync iPhone files.
The iCloud feature is an optional service. Obtaining such records, if they exist, directly from Apple could aid authorities investigating the worst mass shooting in modern Texas history. Apple's policy regarding iCloud content states that material may be provided to law enforcement agencies if they obtain search warrants.
In addition, the FBI may have already screwed it up.
Read more of this story at SoylentNews.
Technology has been developed to approach, grasp, manipulate, modify, repair, refuel, integrate, and build completely new platforms and spacecraft on orbit, he said. But the lack of clear, widely accepted technical and safety standards for on-orbit activities involving commercial satellites remains a major obstacle to the expansion of the industry.
Musk seems to be talking about something different, a sports car that could hop over obstacles. The emphasis would, presumably, still be on performance and practicality with four wheels on the ground.
Hi all customers!
- I have team group hacked the cvv and many tools,update everyday for sell.
- I do business professional and quality.
- I'm a seller good,honest and always sell cvv good and fresh with high balance.
- My tools has tested before sell.
- I hope to get many good customers and will be long time
- I have sell cvv,fullz ,track,dumps,rdp,leads,paypal account,bank login,walmart,shell,smtp,ups,aliexpress, discover
ICQ:698019125>sell cvv,fullz ,track,dumps,rdp,leads,paypal account,bank login,walmart,shell,smtp,ups
Former Executive Secretary to UNFCCC, Christiana Figueres has laid down a challenge to UNEP FIs banking members, and the wider finance industry to increase their allocations to low carbon investments to avoid a 2 degrees scenario. Watch her recording which she made for participants at UNEP FIs Europe Regional Roundtable on Sustainable Finance which took place in October 2017.
Former Vice President and Chairman of Generation Investment Management, Al Gore, introduces PRI, UNEP FI and The Generation Foundations Fiduciary duty in the 21st century programme. The project finds that, far from being a barrier, there are positive duties to integrate environmental, social and governance factors in investment processes.
Federal Communications Commission (FCC) Chairman Ajit Pai will reportedly seek to completely repeal net neutrality rules put in place under former President Obama, according to a Monday report.Sources close to the matter tell Politico that...
Fifty years since the first United Nations Conference on the Exploration and Peaceful Uses of Outer Space (1968 2018): UNISPACE+50 United Nations Office for Outer Space Affairs (UNOOSA) "IndyWatch Feed Tech"
UNISPACE+50 will celebrate the fiftieth anniversary of the first United Nations Conference on the Exploration and Peaceful Uses of Outer Space. It will also be an opportunity for the international community to gather and consider the future course of global space cooperation for the benefit of humankind.
From 20 to 21 June 2018 the international community will gather in Vienna for UNISPACE+50, a special segment of the 61 st session of the Committee on the Peaceful Uses of Outer Space (COPUOS).
As some additional work past the KVM changes for Linux 4.15 submitted last week, a few more feature items have been queued...
When [James] moved to Lima, Peru, he brought his jogging habit with him. His morning jaunts to the coast involve crossing a few busy streets that are often occupied by old, smoke-belching diesel trucks. [James] noticed that his throat would tickle a bit when he got back home. A recent study linking air pollution to dementia risk made him wonder how cities could monitor air quality on a street-by-street basis, rather than relying on a few scattered stations. Lima has a lot of taxis, so why wire them up with sensors and monitor the air quality in real-time?
This taxi data loggers chief purpose is collect airborne particulate counts and illustrate the pollution level with a Google Maps overlay. [James] used a light-scattering particle sensor and a Raspi 3 to send the data to the cloud via Android Things. Since the Pi only has one native UART, [James] used it for the particle sensor and connected the data-heavy GPS module through an FTDI serial adapter. Theres also a GPS to locate the cab and a temperature/humidity/pressure sensor to get a fuller environment...
Klaatu covers the very very basics of servers: what they are, how to know one when you see one, what one ought to run, and why we have them.
A statement I commonly hear in tech-utopian circles is that some seeming inefficiency cant actually be inefficient because the market is efficient and inefficiencies will quickly be eliminated. A contentious example of this is the claim that companies cant be discriminating because the market is too competitive to tolerate discrimination. A less contentious example is that when you see a big company doing something that seems bizarrely inefficient, maybe its not inefficient and you just lack the information necessary to understand why the decision was efficient.
Nebraska regulators approved an alternative route Monday for the proposed Keystone XL pipeline. It was the last major regulatory hurdle facing project operator TransCanada Corp., though opponents say another round of federal approval may now be needed.
The Nebraska Public Service Commission's ruling was on the Nebraska route TransCanada has proposed to complete the $8 billion, 1,179-mile (1,897-kilometer) pipeline to deliver oil from Alberta, Canada, to Texas Gulf Coast refineries. The proposed Keystone XL route would cross parts of Montana, South Dakota and most of Nebraska to Steele City, Nebraska.
The long-delayed project was rejected by President Barack Obama in 2015, citing concerns about carbon pollution. President Donald Trump revived it in March, approving a permit.
[...] The five-member Nebraska Public Service Commission was forbidden by law from factoring pipeline safety or the risk of spills into its decision because pipeline safety is a federal responsibility. So, it couldn't take into account a spill of 210,000 gallons (790,000 liters) of oil on the existing Keystone pipeline in South Dakota announced on Thursday.
Read more of this story at SoylentNews.
Microsoft is taking advantage of unused airwaves between TV stations or white spaces to provide wireless internet in Puerto Rico after its broadband infrastructure was severely damaged during Hurricane Maria. The U.S. territory is still...
In a joint research, IT security researchers at Avast, ESET, and
This is a post from HackRead.com Read the original post: BankBot banking malware found in flashlight and solitaire apps
Top House Democrats want the Federal Communications Commission (FCC) to force Sinclair Broadcasting Group to sell off some television stations if the agency approves its proposed merger with Tribune Media.House Minority Leader Nancy Pelosi (D-Calif...
A federal judge has ruled that EFF need not obey an Australian injunction ordering EFF to take down a Stupid Patent of the Month blog post and never speak of the patent owners intellectual property again.
It all started when Global Equity Management (SA) Pty Ltd (GEMSA)s patent was featured as the June 2016 entry in our Stupid Patent of the Month blog series. GEMSA wrote to EFF accusing us of false and malicious slander. It subsequently filed a lawsuit and obtained an injunction from a South Australia court purporting to require EFF to censor itself. We declined and filed a suit in the U.S. District Court for the Northern District of California seeking a declaration that EFFs post is protected speech.
The court agreed, finding that the South Australian injunction cant be enforced in the U.S. under a 2010 federal law that took aim against libel tourism, a practice by which plaintiffsoften billionaires, celebrities, or oligarchssued U.S. writers and academics in countries like England where it was easier to win a defamation case. The Securing the Protection of Our Enduring and Established Constitutional Heritage Act (SPEECH Act) says foreign orders arent enforceable in the United States unless they are consistent with the free speech protections provided by the U.S. and state constitutions, as well as state law.
The court analyzed each of GEMSAs claims for defamation, and found [n]one of these claims could give rise to defamation under U.S. and California law, and accordingly EFF would not have been found liable for defamation under U.S. and California law. For example, GEMSAs lead complaint was that EFF had called its patent stupid. GEMSA protested that its patent is not in fact stupid but the court found that this was clearly protected opinion. Moreover, the court found that the Australian court lacked jurisdiction over EFF, and that this constitutes a separate and independent reason that EFF would prevail...
The tasty Japanese seaweed nori is ubiquitous today, but that wasn't always true. Nori was once called "lucky grass" because every year's harvest was entirely dependent on luck. Then, during World War II, luck ran out. No nori would grow off the coast of Japan, and farmers were distraught. But a major scientific discovery on the other side of the planet revealed something unexpected about the humble plant and turned an unpredictable crop into a steady and plentiful food source.
Fortunately, on an island at the other end of Eurasia, Kathleen Drew-Baker had recently gotten fired. She had been a lecturer in botany at the University of Manchester where she studied algae that reproduced using spores rather than flowers. But the university did not employ married women. So when she got married to fellow academic Henry Wright-Baker she was kicked off the faculty and relegated to a job as an unpaid research fellow.
Drew-Baker focused on a type of nori unfamiliar to nearly everyone: Porphyra umbilicalis. It's a leafy seaweed that grows off the coast of Wales. Locals harvest it, grind it up, and use it to make bread or soup. Known colloquially as laver, it's still eaten in Britain but has not attained the international standing of nori.
Thanks to Drew-Baker's work, Segawa was able to invent the industrial process that lead to the stable, predictable production of nori, for which everyone with a taste for sushi should be grateful.
If not for her work, sushi rolls would probably not be eaten today.
Read more of this story at SoylentNews.
Raspberry Slideshow (RSS) is a operating system for Raspberry Pi computers which provides a system which displays a series of images or videos in sequence. Marco Buratto has announced the release of Raspberry Slideshow 10.0 which is based on Raspbian Stretch. "Marco Buratto has just released Raspberry Slideshow....
For the first time ever astronomers have studied an asteroid that has entered the Solar System from interstellar space. Observations from ESOs Very Large Telescope in Chile and other observatories around the world show that this unique object was traveling through space for millions of years before its chance encounter with our star system. It appears to be a dark, reddish, highly-elongated rocky or high-metal-content object. The new results appear in the journal Nature on 20 November 2017.
On 19 October 2017, the Pan-STARRS 1 telescope in Hawaii picked up a faint point of light moving across the sky. It initially looked like a typical fast-moving small asteroid, but additional observations over the next couple of days allowed its orbit to be computed fairly accurately. The orbit calculations revealed beyond any doubt that this body did not originate from inside the Solar System, like all other asteroids or comets ever observed, but instead had come from interstellar space. Although originally classified as a comet, observations from ESO and elsewhere revealed no signs of cometary activity after it passed closest to the Sun in September 2017. The object was reclassified as an interstellar asteroid and named 1I/2017 U1 (Oumuamua) .
We had to act quickly, explains team member Olivier Hainaut from ESO in Garching, Germany. Oumuamua had already passed its closest point to the Sun and was heading back into interstellar space.
International Centre for Free and Open Source Software (ICFOSS), an autonomous institution under Government of Kerala and Society for Promotion of Alternative Computing and Employment (SPACE), an NGO promoting free software, have been conducting Women Hackers, a project to bring more women into free software. The programme involves intensive residential workshops on college campuses.
It was during one such hackathon that the idea for I install was put forward by the students of LBS College of Engineering, Kasaragod. A GNU/Linux installation camp, the event aims to promote the idea of taking control over the technology that you use. Those students who received training at the hackathon will be part of I install where they impart their learning to other students.
A server is a computer software or a machine that offers services to other programs or devices, referred to as clients. There are different types of servers: web servers, database servers, application serv...
Of the many changes coming for Linux 4.15, as detailed this weekend Radeon GPU and AMD CPU customers have a lot to be thankful for with this new kernel update currently in development. Here are some initial benchmarks of the Linux 4.15 development kernel using an AMD EPYC 7601 32-core / 64-thread setup...
Consider this: Deputy Attorney General Rod Rosenstein has been going around talking about responsible encryption for some time now proselytizing for encryption thats somehow only accessible by the governmentsomething we all know to be unworkable. If the Department of Justice (DOJ) is taking this aggressive public position about what kind of access it should have to user data, it begs the questionwhat kind of technical assistance from companies and orders for user data is the DOJ demanding in sealed court documents? EFFs client The Stranger, a Seattle-based newspaper, has filed a petition with one court to find out.
In a democracy, we as citizens deserve to know what our government is up to, especially its interpretation of the law. A major reason we all knew about the government using the All Writs Acta law originally passed in 1789to compel Apple to design a backdoor for the iOS operating system is because the court order was public. However, there are many instances where we may not know what the government is asking. For example, could the government be asking Amazon to turn on the mic on its smart assistant product, the Echo, so they can listen in on people? This is not without precedent. In the past, the government has tried to compel automobile manufacturers to turn on mics in cars for surveillance.
Beyond the All Writs Act, we need to know what kind of warrantless surveillance the government is conducting under statutes like the Stored Communications Act (SCA) and the Pen Register Act. For instance, under certain authorities of the SCA, the government can obtain very private details about peoples email records, such as who they communicate with and when, and that in itself can be revealing regardless of the content of the messages.
The privacy problems of these non-warrant orders is compounded by the secrecy associated with them. The government files papers asking for such orders under seal, giving the public no opportunity to scrutinize them or to see how many are actually filed with the court. The people deserve to know and we support The Strangers efforts to seek access to these records....
Heres something only 90s kids will remember. In 1998, the Air Hogs Sky Shark, a free-flying model airplane powered by compressed air was released. This plane featured foam stabilizers, wings, a molded fuselage that served as a reservoir, and a novel engine powered by compressed air. The complete Sky Shark setup included an air pump. All you had to do was plug the plane into the pump, try to break the pressure gauge, and let the plane fly off into a tree or a neighbors rooftop. Its still a relatively interesting mechanism, and although were not going to see compressed air drones anytime soon its still a cool toy.
Since [Tom Stanton] is working at the intersection of small-scale aeronautics and 3D printing, he thought he would take a swing at building his own 3D printed air motor. This is an interesting challenge the engine needs to be air-tight, and it needs to produce some sort of usable power. Is a standard printer up to the task? Somewhat surprisingly, yes.
The design of [Tom]s motor is more or less the same as what is found in the Air Hogs motor from twenty years ago. A piston is attached to a crank, which is attached to a flywheel, in this case a propeller. Above the cylinder, a ball valve keeps the air from rushing in. A spring is mounted to the top of the piston which pushes the ball out of the way, allowing air into the cylinder. At the bottom of the stroke, the ball closes the valve and air escapes out of the bottom of the cylinder. Simple stuff, really, but can it be printed?
Instead of the usual printer [Tom] uses for his builds, he pulled out an old delta slightly modified for higher quality prints. Really, this is just a 0.2 mm nozzle and a few tweaks to the print settings, but the air motor [Tom] designed came out pretty well and was smoothed to a fine finish with acetone.
After assembling the motor, [Tom] hooked it up to a soda bottle serving as a compressed air reservoir. The motor worked, although its doubtful a plane powered with this motor would fly for very long. You can check out [Tom]s video below.
Uber has reached an agreement with Volvo to purchase a fleet of driverless cars as the ride-hailing firm seeks to deploy autonomous vehicle technology.As part of the deal, Uber will buy as many as 24,000 XC90 Volvo SUVs between 2019 to...
Uber has entered into an agreement with carmaker Volvo to purchase 24,000 of its XC90 SUVs between 2019 and 2021 to form a fleet of autonomous vehicles, according to Bloomberg News. The XC90 is the base of Uber's latest-generation self-driving test car, which features sensors and autonomous driving computing capability installed by Uber after purchase on the XC90 vehicle.
The deal is said to be worth around $1.4 billion, per the Financial Times, with the XC90 starting at $46,900 in the U.S. in terms of base model consumer pricing. Uber is already testing the XC90 in Arizona, San Francisco and Pittsburgh in trials with safety drivers on board to help refine and improve their software. Uber also paired up with Volvo to jointly develop autonomous driving and a vehicle ready for self-driving implementation, with investment from both sides committed last year.
Also at NYT.
Read more of this story at SoylentNews.
iRobot is testing software that will be able to make sense out of all the rooms in your house Illustration: IEEE Spectrum; Roomba: iRobot iRobot is testing software to make sense of all the rooms in your house.
Based on conversations weve had with iRobot CEO Colin Angle, were expecting that within the next six months or so, robot vacuums will be able to understand our homes on a much more sophisticated and useful level than ever before. Specifically, theyll be able to generate maps that persist between cleaning sessions, and these maps will allow the robots to identify and remember specific rooms and adjust their cleaning behavior accordingly. (Neato is also implementing this kind of capability .) For example, if your robot vacuum knows where your kitchen is, it can respond to commands like Go clean the kitchen, or autonomously clean there as often as it needs to.
At IROS in September, we got a bit of a sneak peak into how iRobot is going to make this happen, and how much of a difference it can make to the speed and efficiency of home navigation. Its a big difference, and it can even work on your older (and affordable) Roomba that only has bump sensors on it.
The problem that iRobot is trying to solve here is how to turn a cluttered, messy occupancy grid into something useful. An occupancy grid is a sort of binary map, a representation of whether a given space has something in it or not. As a robot like a Roomba roams around, it adds to the occupancy grid whenever it bumps into something, whether that thing is a wall, a table leg, or a shoe. As you might expect, the occupancy grid that a robot vacuum creates isnt a very accurate representation of the rooms in your house, but with a little image processing, it doesnt look all that far off:Image: iRobot
The next step is the tricky one. Using the kind of CPU power that even old Roombas have, the occupancy grid needs to be segmented into a bunch of different rooms in a way that would make sense to a human. Once thats done, the robot can plan the most efficient path possible.Image: iRobot
iRobot has developed a method called RoomsSeg thats able to turn a clut...
The cloud computing company Amazon Web Services (AWS) announced on Monday that its launching a new service capable of hosting government data classified as secret.AWSs new Secret Region is part of its $600 million cloud services contract with...
A former Facebook employee is calling for the company to be strictly regulated to prevent it from abusing the mass amounts of user data it handles.Sandy Parakilas, a former platform operations manager for Facebook, wrote in an op-ed for The New...
First, two local events, involving well-known physics bloggers:
For a Q and A with another well-known physics blogger, theres Tommaso Dorigo at Physics Today.
For a couple of encouraging indications that the theoretical physics community may finally be taking seriously the need to give up on failed thinking and try something new, theres
Basically, all the textbooks on quantum field theories out there use an old framework that is simply too narrow, in that it assumes the existence of a Lagrangian.
This is a serious issue, because when you try to come up e.g. with a theory beyond the Standard Model, people habitually start by writing a Lagrangian but that might be putting too strong an assumption.
We need to do something
In General Relativity related news, theres a new edition out of Misner, Thorne and Wheeler, the book from which many of us learned both geometry and GR. It comes with new prefaces from David Kaiser as well as Misner and Thorne (which an appropriate search on the Amazon preview might show you). In other Wheeler-related news, Paul Halpern has a new book out,...
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.
And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.
Which means that you will be able to benefit from a daily update of the following:
Infosec professionals agree that the Cyber Daily is an essential tool:
"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Futures Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.
So, what are you waiting for?
Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.
If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about...
At Browserling we're building a network of online tools websites. Each site in the network focuses on one and only one tool category. Each tool does one and only one thing. The first three websites in the network are Online CSV Tools, which is all about working with Comma Separated Values data, Online JSON Tools, which is all about working with JSON data, Online XML Tools, which is all about working with XML documents.
Now we're releasing the fourth site.
The fourth site in our network is Online String Tools. Online String Tools is a collection of simple, free and easy to use string manipulation utilities. There are no ads, popups or other garbage. Just string utilities that work in your browser. Load a string and instantly get result.
There will be over 100 tools in this site. So far we've added 40 and it's time to release. We love to release early and often. We'll be adding the remaining tools over next few months.
Here's a list of all string tools so far:
At Browserling we're building a network of online tools websites. Each site in the network focuses on one and only one tool category. Each tool does one and only one thing. The first website in the network is Online CSV Tools, which is all about working with Comma Separated Values data.
Now we just finished the second site.
The second site in our network is Online JSON Tools. Online JSON Tools is a collection of simple, free and easy to use JSON utilities. There are no ads, popups or other garbage. Just JSON utilities that work in your browser. Load JSON and instantly get result.
Here's a list of all JSON tools on this website:
Here are upcoming JSON tools that we'll be adding to this site:
At Browserling we're building a network of online tools websites. Each site in the network focuses on one and only one tool category. Each tool does one and only one thing. The first two websites in the network are Online CSV Tools for working with CSV (Comma Separated Values) files and Online JSON Tools for working with JSON data structures.
Now we just finished the third site.
The third site in our network is Online XML Tools. Online XML Tools is a collection of simple, free and easy to use XML utilities. There are no ads, popups or other garbage. Just XML utilities that work in your browser. Load XML and instantly get result.
Here's a list of all XML tools on this website:
Here are upcoming XML tools that we'll be adding to this site:
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog