IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Wednesday, 31 January


Naked Mole Rats Show Few Signs of Aging "IndyWatch Feed Tech"

Naked mole rats defy the biological law of aging

In the world of animal models, naked mole rats are the supermodels. They rarely get cancer, are resistant to some types of pain, and can survive up to 18 minutes without oxygen. But perhaps their greatest feat, a new paper suggests, is that they don't age.

The first study to analyze the life histories of thousands of naked mole rats has found that their risk of death doesn't go up as they grow older, as it does for every other known mammalian species. Although some scientists caution against any sweeping conclusions, many say the new data are important and striking.

"This is remarkably low mortality," says Caleb Finch, a biogerontologist at the University of Southern California in Los Angeles who was not involved in the new study. "At advanced ages, their mortality rate remains lower than any other mammal that has been documented."

Scientists have long noted that naked mole ratsburrowing rodents with wrinkled, pink skin and large protruding teeth that live in large, subterranean coloniesshow few signs of aging and far surpass the life span expected of a rodent this size. Mice in captivity live at most 4 years; based on their size, naked mole rats would not be expected to live past 6 years. Instead, some live beyond 30 years, and even at that age breeding females stay fertile.

The scientists behind the research work at Calico, Google's biotechnology and anti-aging subsidiary.

Also at Calico and BGR.

Naked mole-rat mortality rates defy Gompertzian laws by not increasing with age (open, DOI: 10.7554/eLife.31157.001) (DX)

Related: Silicon Valley's Quest to Extend Life 'Well Beyond 120'
Google is Super Secretive About its Anti-Aging Research



The problematic Wannacry North Korea attribution "IndyWatch Feed Tech"

Last month, the US government officially "attributed" the Wannacry ransomware worm to North Korea. This attribution has three flaws, which are a good lesson for attribution in general.

It was an accident

The most important fact about Wannacry is that it was an accident. We've had 30 years of experience with Internet worms teaching us that worms are always accidents. While launching worms may be intentional, their effects cannot be predicted. While they appear to have targets, like Slammer against South Korea, or Witty against the Pentagon, further analysis shows this was just a random effect that was impossible to predict ahead of time. Only in hindsight are these effects explainable.

We should hold those causing accidents accountable, too, but it's a different accountability. The U.S. has caused more civilian deaths in its War on Terror than the terrorists caused triggering that war. But we hold these to be morally different: the terrorists targeted the innocent, whereas the U.S. takes great pains to avoid civilian casualties. 

Since we are talking about blaming those responsible for accidents, we also must include the NSA in that mix. The NSA created, then allowed the release of, weaponized exploits. That's like accidentally dropping a load of unexploded bombs near a village. When those bombs are then used, those having lost the weapons are held guilty along with those using them. Yes, while we should blame the hacker who added ETERNAL BLUE to their ransomware, we should also blame the NSA for losing control of ETERNAL BLUE.

A country and its assets are different

Was it North Korea, or hackers affilliated with North Korea? These aren't the same.

It's hard for North Korea to have hackers of its own. It doesn't have citizens who grow up with computers to pick from. Moreover, an internal hacking corps would create tainted citizens exposed to dangerous outside ideas. Update: Some people have pointed out that Kim Il-sung University in the capital does have some contact with the outside world, with academics granted limited Internet access, so I guess some tainting is allowed. Still, what we know of North Korea hacking efforts largley comes from hackers they employ outside North Korea. It was the Lazurus Group, outside North Korea, that did Wannacry.

Instead, North Korea deve...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 30 January


No warrant needed for police departments to share your license plate data "IndyWatch Feed Tech"

image credit: Plugout

A recent story about automatic license plate readers (ALPR) revealed that police departments in numerous states share your license plate data without a warrant.

Three days ago an article in the Orange Leader, revealed how police in Texas share motorists ALPR data with law enforcement in other states.

"Law enforcement agencies equipped with license-plate readers share collected data, even across state lines in pursuit of drug traffickers, individuals with outstanding warrants, stolen vehicles, or other activities of interest."

What does law enforcement mean by 'other activities of interest'?

Two years ago, I revealed that 'other activities of interest' is just a euphemism for police hotlists.

These hotlists can include things like traffic scofflaws, 'terrorist watch lists' and secret watch lists, like the Law Enforcement Agencies Data System.

Police boast of sharing license plate data without a warrant...

No longer does an officer have to take a stack of warrants and go door-to-door in the hopes of tracking someone down, Police Chief Rod Carroll said.

As far as I can tell only...


New Species of Titanosaur Found in Egypt "IndyWatch Feed Tech"

Lost history of African dinosaurs revealed

A new species of dinosaur found in the Egyptian desert is shedding light on Africa's missing history of dinosaurs. Few fossils have been unearthed from the last days of the dinosaurs, between 100 and 66 million years ago, on the continent. Scientists say the dinosaur, which lived about 80 million years ago, is an "incredible discovery".

The giant plant-eater was the length of a school bus and weighed about the same as an elephant. [...] Named Mansourasaurus shahinae, the new species is regarded as a critical discovery for science.

[...] Dinosaur fossils in Africa are rare as much of the land is now covered in lush vegetation, rather than the exposed rock that has yielded dinosaur treasure troves elsewhere. There is a huge gap in the fossil record during the Late Cretaceous, when the continents were coming towards the end of huge geological changes.

Also at Ohio University ( and USA Today.

New Egyptian sauropod reveals Late Cretaceous dinosaur dispersal between Europe and Africa (DOI: 10.1038/s41559-017-0455-5) (DX)

Original Submission

Read more of this story at SoylentNews.


Cisco plugs critical hole in many of its enterprise security appliances "IndyWatch Feed Tech"

Theres an eminently exploitable remote code execution flaw in the Adaptive Security Appliance (ASA) Software running on a number of Cisco enterprise appliances, and admins are advised to plug the hole as soon as possible. The Cisco Product Security Incident Response Team (PSIRT) says that it is aware of public knowledge of the vulnerability, but not of any current malicious use of it. Nevertheless, active exploitation might be close at hand. Also, details about the More


Red Hat Is Acquiring CoreOS "IndyWatch Feed Tech"

Red Hat's betting big on the container game getting bigger with making public this afternoon their agreement to acquire CoreOS for $250 million USD...


Oracle Releases Solaris 11.4 Public Beta With GNOME 3 Desktop, Secure UEFI Boot "IndyWatch Feed Tech"

After all the Oracle/Solaris controversies last year, it's good to see Oracle today releasing their first public beta of Solaris 11.4 as an update to the Solaris 11 operating system...


How to prepare for the future of digital extortion "IndyWatch Feed Tech"

Digital extortion has evolved into the most successful criminal business model in the current threat landscape, and Trend Micro researchers predict that it will continue to grow rampant because its cheap, easy to commit, and many times the victims pay. Attackers can go after a wide variety of targets The line between blackmail and extortion is blurred in the digital realm. Many digital crimes we normally think of as blackmail are, in fact, extortion More


Forget Self-Driving Cars, Robot Delivery Vans Are Here "IndyWatch Feed Tech"

A secretive startup has unveiled its new grocery-getter, one of many automakers that are leaving people out of the equation.


Repairs You Can Print: Broken Glue Gun Triggers Replacement "IndyWatch Feed Tech"

Picture this: you need to buy a simple tool like a glue gun. Theres usually not a whole lot going on in that particular piece of technology, so you base your decision on the power rating and whether it looks like it will last. And it does last, at least for a few yearsjust long enough to grow attached to it and get upset when it breaks. Sound familiar?

[pixelk] bought a glue gun a few years ago for its power rating and its claims of strength. Lo and behold, the trigger mechanism has proven to be weak around the screws. The part that pushes the glue stick into the hot end snapped in two.

It didnt take much to create a replacement. [pixelk] got most of the measurements with calipers and then got to work in OpenSCAD. After printing a few iterations, it fit well enough, but [pixelk] saw a chance to improve on the original design and added a few teeth where the part touches the glue stick. The new part has been going strong for three months.

We think this entry into our Repairs You Can Print contest is a perfect example of the everyday utility of 3D printers. Small reproducible plastic parts are all around us,...


Diligent Robotics Bringing Autonomous Mobile Manipulation to Hospitals "IndyWatch Feed Tech"

Autonomous mobile manipulation is the cutting edge of robotics right now, but Diligent Robotics is already bringing it to market Photo: Carla Diana

To experience the state-of-the-art in autonomous mobile manipulation, youll want to find some well-funded academic lab to visit. Or maybe check out Google, or Amazon, or Toyota Research, or drop in on the RoboCup@Home competition. Really, the only other place youre likely to find an autonomous mobile manipulator is in a relatively structured environment in a factory or warehouse, and even that is pretty rare. Mobile manipulation is super hard, especially when you try to do it in a less structured environment which may be full of all sorts of horribly unpredictable things (like humans).

Diligent Robotics, a startup founded by Andrea Thomaz and Vivian Chu, is undaunted by the challenge of autonomous mobile manipulation in semi-structured environments. Over the past year, theyve been testing a one-armed mobile robot named Poli in several hospitals in Austin, Texas, where its learning how to help nurses with simple fetching tasks. And when we say simple tasks, we mean navigating through hallways full of busy people, picking up supplies, not dropping those supplies, and then navigating back again without running anyone over. In other words, from the robots perspective, not simple tasks at all.

Diligent has kept a relatively low profile in the robotics startup world, but just a few weeks ago, they announced a U.S. $2.1 million seed round. Heres a video from December 2016 showing a Poli prototype undergoing tech feasibility testing last year at Seton Medical Center at the University of Texas in Austin:

If you didnt catch that, Thomaz pointed out that expensively trained and highly skilled nurses spend around 30 percent of their time on tasks that could be called hunting and gathering: Searching for supplies, and then bringing those supplies to where theyre needed. This isnt what the nurses want to be doing; its not what the patients want the nurses to be doing; and its not what the hospital wants the nurses to be doing. Its just one of those things that has to be done, and it sucks that it has to be done by humans.

Diligent wants robots to take over tedious, time-consumin...


California Senate Rejects License Plate Privacy Shield Bill "IndyWatch Feed Tech"

The California Senate has rejected a bill to allow drivers to protect their privacy by applying shields to their license plates when parked. The simple amendment to state law would have served as a countermeasure against automated license plate readers (ALPRs) that use plates to mine our location data.

As is the case with many privacy bills, S.B. 712 had received strong bipartisan support since it was first introduced in early 2017. The bill was sponsored by Sen. Joel Anderson, a prominent conservative Republican from Southern California, and received aye votes from Sens. Nancy Skinner and Scott Wiener, both Democrats representing the Bay Area.  

Each recognized that ALPR data represents a serious threat to privacy, since ALPR data can reveal where you live, where you work, where you worship, and where you drop your kids at school. Law enforcement exploits this data with insufficient accountability measures. It is also sold by commercial vendors to lenders, insurance companies, and debt collectors. 

Just last week, news broke that Immigrations & Customs Enforcement would be exploiting a database of more than 6.5 billion license plate scans collected by a private vendor.

This measure was a simple way to empower people to protect information about where they park their cars, be it an immigration resource center, a reproductive health center, a marijuana dispensary, a place of worship, or a gun show. 

Under lobbying from law enforcement interests, senators killed the bill with a 12-18 vote. 

Privacy on our roadways is one of the most pressing issues in transit policy. The federal governmentincluding the Drug Enforcement Agency and Immigrations & Customs Enforcementare ramping up their efforts to use ALPR data, including data procured from private companies.  Major vulnerabilities in computer systems are revealing how dangerous it can be for government agencies and private data brokers to store our sensitive personal information. 

If the Senate is going to begin 2018 killing a driver privacy measure, it is incumbent on them to spend the rest of the year prob...


Ways AI Will Fight the Cybersecurity Battles of the Future "IndyWatch Feed Tech"

Cybersecurity risks are on the rise. While the high-profile breaches at Target and Yahoo! captured our attention, they have also distracted us from the prevalence of cybersecurity risks in everyday life. The number of cyber-security breaches has more than doubled over the past few years. In the third quarter of 2016, over 18 million new forms of malware were discovered. That is nearly a quarter of a million new types of malware every single day.

Unfortunately, some of the most vulnerable companies are those that are least equipped to address these concerns. Industry experts estimate that 45% of all cyber-attacks are launched against small businesses. Almost half of all small businesses have been attacked, although most of them dont know it. Nearly 70% of small businesses are forced into bankruptcy within six months of a particularly severe cyber-attack.

Despite the risks, small businesses are under greater pressure to cut costs. They cant always afford top-tier protection.


64-bit ARM Gets Mitigations For Spectre & Meltdown With Linux 4.16 "IndyWatch Feed Tech"

The 64-bit ARM (ARM64 / AArch64) architecture code changes were mailed in a short time ago for the Linux 4.16 kernel and it includes mitigation work for Spectre and Meltdown CPU vulnerabilities...


Volvo Becomes the First Premium Car Maker to Go All Electric "IndyWatch Feed Tech"

Volvo cars is taking a bold step forward, the company explained in a video on Volvos official Twitter account, heralding the end of an era for the pure internal combustion engine.

While other companies have yet to take the leap, Volvo knows investing in electric car production makes good sense from a business perspective: This is about the customer, Hkan Samuelsson, Volvo Car Groups president and CEO, said in a press release. People increasingly demand electrified cars and we want to respond to our customers current and future needs.

Its also a decision rooted in a sense of environmental responsibility, We are determined to be the first premium car maker to move our entire portfolio of vehicles into electrification, Samuelsson said in the video. This is a clear commitment towards reducing our carbon footprint, as well as contributing to a better air quality in our cities.


Apple to Include its Own Chips Inside More Macs "IndyWatch Feed Tech"

Apple reportedly planning three more Macs with its own chips inside them

Apple plans to put custom processors inside at least three more Macs by the end of the year, according to Bloomberg. There are no details on what the chips will be used for, but the report says they'll appear in updated laptops and a new desktop.

Though Apple has been making custom chips for its phones, tablets, and wearables for years now, the company is only just starting to bring its house-made chips to the Mac. That started in a small way in 2016 with the high-end MacBook Pro with Touch Bar, which included a chip that was used to run the Touch Bar and Touch ID. Then last month, Apple included a custom chip inside the iMac Pro that handled, among other things, audio, camera processing, and encryption.

The Bloomberg article includes a detailed history of Apple's chip designs.

Related: Google Hires Key Chip Designer Manu Gulati From Apple
Apple to Design its Own Power Management Chips
Qualcomm Joins Others in Confirming its CPUs Suffer From Spectre, and Other Meltdown News

Original Submission

Read more of this story at SoylentNews.


AMD AOCC 1.1 Shows Compiler Improvements vs. GCC vs. Clang "IndyWatch Feed Tech"

A few days ago we found out that at the end of 2017 AMD quietly released their AOCC 1.1 C/C++ compiler. AOCC is AMD's compiler succeeding AMD Open64 that existed years ago as their optimized Fortran/C/C++ compiler for past CPU microarchitectures while the "AMD Optimizing C/C++ Compiler" is designed for current-generation Zen processors. Here are benchmarks of the new AMD AOCC 1.1 release compared to GCC 7, GCC 8, Clang 5.0, Clang 6.0, and Clang 7.0 SVN.


Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily "IndyWatch Feed Tech"

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Futures Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.

If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about...


Code Review Isn't Evil. Security Through Obscurity Is. "IndyWatch Feed Tech"

On January 25th, Reuters reported that software companies like McAfee, SAP, and Symantec allow Russian authorities to review their source code, and that "this practice potentially jeopardizes the security of computer networks in at least a dozen federal agencies." The article goes on to explain what source code review looks like and which companies allow source code reviews, and reiterates that "allowing Russia to review the source code may expose unknown vulnerabilities that could be used to undermine U.S. network defenses."

The spin of this article implies that requesting code reviews is malicious behavior. This is simply not the case. Reviewing source code is an extremely common practice conducted by regular companies as well as software and security professionals to ensure certain safety guarantees of the software being installed. The article also notes that Reuters has not found any instances where a source code review played a role in a cyberattack. At EFF, we routinely conduct code reviews of any software that we elect to use.

Just to be clear, we dont want to downplay foreign threats to U.S. cybersecurity, or encourage the exploitation of security vulnerabilities on the contrary, we want to promote open-source and code review practices as stronger security measures. EFF strongly advocates for the use and spread of free and open-source software for this reason.

Not only are software companies disallowing foreign governments from conducting source code reviews, trade agreements are now being used to prohibit countries from requiring the review of the source code of imported products. The first such prohibition in a completed trade agreement will be in the Comprehensive and Progressive Trans-Pacific Partnership (CPTPP, formerly just the TPP), which is due to be signed in March this year. A similar provision is proposed for inclusion in the modernized North American Free Trade Agreement (NAFTA), and in Europes upcoming bilateral trade agreements. EFF has...


Making the Case for Open Source Medical Devices "IndyWatch Feed Tech"

Engineering for medical, automotive, and aerospace is highly regulated. Its not difficult to see why: lives are often at stake when devices in these fields fail. The cost of certifying and working within established regulations is not insignificant and this is likely the main reason we dont see a lot of work on Open Hardware in these areas.

Ashwin K. Whitchurch wants to change this and see the introduction of simple but important Open Source medical devices for those who will benefit the most from them. His talk at the Hackaday Superconference explores the possible benefits of Open Medical devices and the challenges that need to be solved for success.

Ashwin discusses a sobering statistic from the World Heath Organization to start off his presentation: about 90% of the worlds investment in medical research benefits only the most affluent 10% of its population. Called the 10/90 gap, this statistic is debated by some, but we think all can agree that applying science and technology to help the sick no matter their position in life is a virtue. How can we focus our Open Hardware movement to make advances in medical care available for more people?

Were delighted that a few of Ashwins products which try to address this need were entries in the 2017 Hackaday Prize. His HealthyPi V3 claimed 2nd place and is a patient monitor that records ECG, respiration, pulse-ox, skin temp, and blood pressure. Its a hat for a Raspberry Pi and can be run with or without a screen for the readout. His HeartyPatch project was a Best Product finalist. Based on an ESP8266, it is a wearable single-lead ECG monitor.

These two are interesting products to compare to devices you would find in hospitals in high-income countries. FDA approved patient monitors will cost between $2,000 and $10,000. There are unbranded machines available on markets like AliExpress which cost between $200 and $1,000 but these do not come with certifications and theyre not open source when they need to be calibrated or repaired what are your options? An ideal Open Source solution would be independently certifiable and calibrated by the care giving institution since proper documentation on doing so would exist. And there is another cost benefit: they can utiliz...


Financial regulators subpoena major bitcoin exchange: report "IndyWatch Feed Tech"

U.S. regulators are probing one of the worlds largest cryptocurrency trading platforms with ties to a controversial digital currency. The U.S. Commodity Futures Trading Commission (CFTC) sent subpoena letters last month to Bitfinex, a...


T-Mobile Blocks Pirate Sites Then Reports Itself For Possible Net Neutrality Violation "IndyWatch Feed Tech"

For the past eight years, Austria has been struggling with the thorny issue of pirate site blocking. Local ISPs have put up quite a fight but site blocking is now a reality, albeit with a certain amount of confusion.

After a dizzying route through the legal system, last November the Supreme Court finally ruled that The Pirate Bay and other structurally-infringing sites including and can be blocked, if rightsholders have exhausted all other options.

The Court based its decision on the now-familiar BREIN v Filmspeler and BREIN v Ziggo and XS4All cases that received European Court of Justice rulings last year. However, there is now an additional complication, this time on the net neutrality front.

After being passed in October 2015 and coming into force in April 2016, the Telecom Single Market (TSM) Regulation established the principle of non-discriminatory traffic management in the EU. The regulation still allows for the blocking of copyright-infringing websites but only where supported by a clear administrative or judicial decision. This is where T-Mobile sees a problem.

In addition to blocking sites named specifically by the court, copyright holders also expect the ISP to block related platforms, such as clones and mirrors, that arent specified in the same manner.

So, last week, after blocking several obscure Pirate Bay clones such as, the ISP reported itself to the Austrian Regulatory Authority for Broadcasting and Telecommunications (RTR) for a potential net neutrality breach.

It sounds paradoxical, but this should finally bring legal certainty in a long-standing dispute over pirate sites. T-Mobile Austria has filed with regulatory authority RTR a kind of self-report, after blocking several sites on the basis of a warning by rights holders, T-Mobile said in a statement.

The background to the communication to the RTR, through which T-Mobile intends to obtain an assessment by the regulator, is a very unsatisfactory legal situation in which operators have no opportunity to behave in conformity with the law.

The service provider is forced upon notification by the copyright owner to even judge about possible copyright infringements. At the...


Will law enforcement put license plate readers in car washes? "IndyWatch Feed Tech"

image credit: ELSAG

Why is the Department of Justice and Homeland Security allowing a foreign company to use covert license plate readers (ALPR) to spy on American motorists?

Selex ES and their sister company ELSAG a Leonardo company are using ALPR's to spy on Americans in real-time. Fyi, Selex ES and Leonardo are an Italian owned corporation.

"Our ALPR systems scan license plates in real time, so your operators receive immediate alerts of any hot or white list matches. Instant data lends your law enforcement the edge on offenders, aiding in your duty to stop crime and promote community safety".   

Did you catch that?

A foreign company is creating hot lists and white lists of American motorists. (Click here to see how the NHL secretly uses watch lists to spy on fans.)

ELSAG offers law enforcement six different ways to spy on motorists.
  1. Mobile Plate Hunter
  2. Fixed Plate Hunter
  3. Plate Hunter Custom Solutions
  4. ...


DOJ, SEC investigating Apple over iPhone slowdowns: report "IndyWatch Feed Tech"

The Department of Justice (DOJ) and the Securities and Exchange Commission (SEC) are investigating tech giant Apple over its admission that it released an update designed to slow down older iPhones to improve performance, Bloomberg News reported on...


Dridex gang follows trends, also created FriedEx ransomware "IndyWatch Feed Tech"

The gang behind the infamous banking Trojan Dridex has also created the FriedEx (aka BitPaymer) ransomware, ESET researchers confidently claim. The similarities between Dridex and FriedEx By analyzing and comparing the code of both threats, the researchers discovered a handful of similarities: Both malware use the same function for generating UserID (i.e., that generates a unique string from several attributes of the victims machine) Most of the other functions that correspond to the specific malware More


[$] Increasing open-source inclusivity with paper circuits "IndyWatch Feed Tech"

Open-source software has an inclusiveness problem that will take some innovative approaches to fix. But, Andrew "bunnie" Huang said in his fast-moving 2018 talk, if we don't fix it we may find we have bigger problems in the near future. His approach to improving the situation is to make technology more accessible by enabling people to create electronic circuits on paper and write code for them.


Amazon, Berkshire Hathaway, and JPMorgan Chase to Offer Their Own Health Care to U.S. Employees "IndyWatch Feed Tech"

Amazon, Berkshire Hathaway and JPMorgan Team Up to Disrupt Health Care

Amazon, Berkshire Hathaway and JPMorgan Chase announced on Tuesday that they would form an independent health care company to serve their employees in the United States. The three companies provided few details about the new entity, other than saying it would initially focus on technology to provide simplified, high-quality health care for their employees and their families, and at a reasonable cost. They said the initiative, which is in the early planning stages, would be a long-term effort "free from profit-making incentives and constraints."

The partnership brings together three of the country's most influential companies to try to improve a system that other companies have tried and failed to change: Amazon, the largest online retailer in the world; Berkshire Hathaway, the holding company led by the billionaire investor Warren E. Buffett; and JPMorgan Chase, the largest bank in the United States by assets.

Various health insurance and pharmacy companies were hit by the news:

The move sent shares of health-care stocks falling in early trading. Express Scripts Holding Co. and CVS Health Corp., which manage pharmacy benefits, slumped 6.7 percent and 5.5 percent, respectively. Health insurers Cigna Corp. and Anthem Inc. also dropped. The health-care industry has been nervously eyeing the prospect of competition from Amazon for months. While the new company created by Amazon, Berkshire and JPMorgan would be for their U.S. staff only, this is the first big move by Amazon into the industry. The new collaboration could pressure profits for middlemen in the U.S. health-care supply chain.

Related: $54 Billion Anthem-Cigna Health Insurer Merger Rejected by U.S. Judge
CVS Attempting $66 Billion Acquistion of Health Insurer Aetna

Original Submission

Read more of this story at SoylentNews.


The Git community mourns Shawn Pearce "IndyWatch Feed Tech"

Shawn Pearce, a longtime contributor to the Git community (and beyond), has passed away. The thread on the Git mailing list makes it clear that he will be missed by many people.


Three Dutch banks and Tax Agency under DDoS Attacks is it a Russian job? "IndyWatch Feed Tech"

Three Dutch Banks (ABN AMRO, ING Bank, Rabobank) and Tax Agency were targeted by a coordinated DDoS Attacks a few days the revelation of the Russian APT Hack.

Early this week a massive DDoS attack targeted three Dutch banks, ABN AMROING BankRabobank, and the Dutch Taxation Authority (Belastingdienst).

The attack against the system of ABN AMRO started over the weekend, while both ING Bank and Rabobank suffered coordinated DDoS attacks on Monday.
while the other two banks were hit on Monday.

The DDoS attacks caused severe accessibility problems to the bank infrastructure, they prevented customers from accessing the web services.

The attack against the Dutch Tax Authority prevented taxpayers filing tax-related documents.

DDoS attack three dutch banks ABN_AMRO_Hoofdkantoor_04

Who is behind the attack?

According to security experts from ESET, the origins of the attacks are servers in Russia.

The DDoS attacks that hit...


House lawmakers clash over broadband infrastructure "IndyWatch Feed Tech"

Lawmakers expressed support across party lines for efforts to bolster broadband infrastructure during a House Energy and Commerce Committee hearing on Tuesday; however, Democrats and Republicans clashed on how to best approach this goal. ...


Jill Tarter: Searching for E.T. "IndyWatch Feed Tech"

What must it be like to devote your life to answering a single simple but monumental question: Are we alone? Astronomer Jill Tarter would know better than most what its like, and knows that the answer will remain firmly stuck on Yes until she and others in the Search for Extraterrestrial Intelligence project (SETI) prove it otherwise. But the path she chose to get there was an unconventional as it was difficult, and holds lessons in the power of keeping you head down and plowing ahead, no matter what.

Endless Hurdles

To get to the point where she could begin to answer the fundamental question of the uniqueness of life, Jill had to pass a gauntlet of obstacles that by now are familiar features of the biography of many women in science and engineering. Born in 1944, Jill Cornell grew up in that postwar period of hope and optimism in the USA where anything seemed possible as long as one stayed within established boundaries. Girls were expected to do girl things, and boys did boy things. Thus, Jill, an only child whose father did traditional boy things like hunting and fixing things with her, found it completely natural to sign up for shop class when she reached high school age. She was surprised and disappointed to be turned down and told to enroll in Home Economics class like the other girls.

Doing boy things with Dad. Source: SETI Institute

She eventually made it to shop class, but faced similar obstacles when she wanted to take physics and calculus classes. Her guidance counselor couldn&#8217...


Private Censorship Is Not the Best Way to Fight Hate or Defend Democracy: Here Are Some Better Ideas "IndyWatch Feed Tech"

From Cloudflares headline-making takedown of the Daily Stormer last autumn to YouTubes summer restrictions on LGBTQ content, there's been a surge in voluntary platform censorship. Companiesunder pressure from lawmakers, shareholders, and the public alikehave ramped up restrictions on speech, adding new rules, adjusting their still-hidden algorithms and hiring more staff to moderate content. They have banned ads from certain sources and removed offensive but legal content.

These moves come in the midst of a fierce public debate about what responsibilities platform companies that directly host our speech have to take downor protectcertain types of expression. And this debate is occurring at a time in which only a few large companies host most of our online speech. Under the First Amendment, intermediaries generally have a right to decide what kinds of expression they will carry. But just because companies can act as judge and jury doesnt mean they should.

To begin with, a great deal of problematic content sits in the ambiguous territory between disagreeable political speech and abuse, between fabricated propaganda and legitimate opinion, between things that are legal in some jurisdictions and not others. Or theyre things some users want to read and others dont. If many cases are in grey zones, our institutions need to be designed for them.

We all want an Internet where we are free to meet, create, organize, share, associate, debate and learn. We want to make our voices heard in the way that technology now makes possible. No one likes being lied to or misled, or seeing hateful messages directed against them, or flooded across our newsfeeds. We want our elections free from manipulation and for the speech of women and marginalized communities to not be silenced by harassment. We should all have the ability to exercise control over our online...


Drugs Tripped Up Suspects In First Known ATM Jackpotting Attacks in the US "IndyWatch Feed Tech"

On Jan. 27, 2018, KrebsOnSecurity published what this author thought was a scoop about the first known incidence of U.S. ATMs being hit with jackpotting attacks, a crime in which thieves deploy malware that forces cash machines to spit out money like a loose Las Vegas slot machine. As it happens, the first known jackpotting attacks in the United States were reported in November 2017 by local media on the west coast, although the reporters in those cases seem to have completely buried the lede.

Isaac Rafael Jorge Romero, Jose Alejandro Osorio Echegaray, and Elio Moren Gozalez have been charged with carrying out ATM jackpotting attacks that force ATMs to spit out cash like a Las Vegas casino.

On Nov. 20, 2017, Oil City News a community publication in Wyoming reported on the arrest of three Venezuelan nationals who were busted on charges of marijuana possession after being stopped by police.

After pulling over the van the men were driving, police on the scene reportedly detected the unmistakable aroma of pot smoke wafting from the vehicle. When the cops searched the van, they discovered small amounts of pot, THC edible gummy candies, and several backpacks full of cash.

FBI agents had already been looking for the men, who were allegedly caught on surveillance footage tinkering with cash machines in Wyoming, Colorado and Utah, shortly before those ATMs were relieved of tens of thousands of dollars.

According to a complaint filed in the U.S. District Court for the District of Colorado, the men first hit an ATM at a credit union in Parker, Colo. on October 10, 2017. The robbery occurred after business hours, but the cash machine in question was located in a vestibule available to customers 24/7.

The complaint says surveillance videos showed the men opening the top of the ATM, which housed the computer and hard drive for the ATM but not the secured vault where the cash was stored. The video showed the subjects reaching into the ATM, and then closing it and exiting the vestibule. On the video, one of the subjects appears to be carrying an object consistent with the size and appearance of the hard drive from the ATM.



A real-life armed robbery of an online Bitcoin exchange "IndyWatch Feed Tech"

Suspects thumb

The criminals left empty-handed. Which, let's face it, is probably the likely outcome for many Bitcoin investors too.


FSF Receives One Million Dollars Worth Of Bitcoin "IndyWatch Feed Tech"

The Free Software Foundation's largest-ever single contribution came in the form of one million dollars worth of Bitcoin...


Khronos GDC Developer Day Set For 19 March "IndyWatch Feed Tech"

The Khronos Group has published their tentative list of sessions behind held at their Developer Day event coinciding with the Game Developers Conference in March...


NASA Releases 2018 Edition of Spinoff "IndyWatch Feed Tech"

NASA tries to justify its existence yet again:

The 2018 edition of NASA's annual Spinoff publication, released Tuesday, features 49 technologies the agency helped create that are used in almost every facet of modern life. These include innovations that help find disaster survivors trapped under rubble, purify air and surfaces to stop the spread of germs, and test new materials for everything from airplanes to athletic shoes.

[...] In Spinoff 2018, you'll learn how:

  • Ultra-sensitive radar technology used to detect gravity fluctuations was repurposed to identify the vital signs of disaster survivors trapped under rubble;
  • A technique developed to preserve plants in a spacecraft led to devices that eliminate bacteria, viruses, molds and volatile organic compounds from air, surfaces and even laundry;
  • One company's work on high-speed stereo photogrammetry for space shuttle analysis now enables low-cost, highly-accurate materials testing to improve designs for everything from running shoes to jetliners.

[...] Other highlights include: artificial intelligence that helps drones avoid collisions and could one day enable self-driving cars; a business jet that is both the fastest and the most efficient in its class; and a computer program that, 50 years after its creation, is still used to design cars, buildings and much more.

[...] The book also features a Spinoffs of Tomorrow section that highlights 20 NASA technologies ripe for commercial application and available for licensing. These include an algae photobioreactor that cleans wastewater while producing biofuels, a revolutionary all-in-one gear and bearing, and the combined technologies of the highly dexterous humanoid robot Robonaut 2.

Spinoff 2018.

Original Submission

Read more of this story at SoylentNews.


Ethereum Startup Leaves Penis for Investors & Vanishes with $11 "IndyWatch Feed Tech"

By Waqas

Another Ethereum Startup Prodeum Vanished Into Thin Air After Collecting

This is a post from Read the original post: Ethereum Startup Leaves Penis for Investors & Vanishes with $11


Vivo Xplay7 may be the first smartphone to feature a massive 10GB of RAM "IndyWatch Feed Tech"

Leaked: Vivo Xplay7 to feature 10GB of RAM and 4K OLED display

Vivo, the Chinese mobile phone manufacturer, recently launched the first smartphone, Vivo X20 Plus UD, with an under-display fingerprint sensor in China. Now, the company is looking to make some more noise in the smartphone market with its next high-end flagship that is reportedly rumored to feature 10GB of RAM, suggests latest leaks.

If this happens, the device dubbed as Vivo Xplay 7 will be the first ever smartphone to be powered by 10GB of RAM. Apart from this, the Xplay 7 will feature a 4K OLED display with an edge-to-edge display on the front giving it a 92.9% screen-to-body ratio. It will be powered by the Snapdragon 845 SoC coupled with 10GB of RAM. The smartphone will be available in two in-built storage options: 256GB and 512GB, according to the leaks.

The Xplay7 will also feature the under-display fingerprint sensor from Synaptics. The device is also expected to include FaceUnlock 2.0, the next generation of Vivos facial recognition technology, for improving the security. It will even sport a dual rear camera setup which will offer 4X lossless zoom capacity.

Theres currently no word on the pricing or availability of the smartphone. Therefore, we suggest you to take these details about the Xplay7 with a pinch of salt until official announcement is made.

The post Vivo Xplay7 may be the first smartphone to feature a massive 10GB of RAM appeared first on TechWorm.


The Lobby for Software Patents Including Microsoft-Connected Law Firms Clings Onto One Patent From a Microsoft-Sponsored Patent Troll "IndyWatch Feed Tech"

It helps to follow the money

Microsoft Finjan stake

Summary: Theres no evidence that software patents are coming back to the US any time soon, but lobbyists of this cause (like the firm of Bill Gates father) obsess over a single patent of the Microsoft-sponsored Finjan, hailing it as some sort of evidence of a resurgence

THE UNITED STATES is certainly moving away from software patents. Dont be misled by those who claim otherwise. Theyre typically those who stand to gain (financially) from the practice of patenting algorithms not because they actually develop software/write code but because they work for law firms that milk coders. I have been writing about it since my early 20s and I know how these people think. Theyre not honest. They tend to be pretty greedy and they justify their lies to themselves (e.g. about coders needing patents and about software patents having teeth in the UK).

Earlier today the Indian press published something titled Where is Indian science headed? It looked OK until the following sentence: Software patents have been on the rise vis-a-vis pharma patents and this is MNC-driven, especially at the US end.

What planet is he living on?! The US cracks down on software patents. The only thing on the rise is invalidation of software patents.

Record year for PTAB, as we noted here before, is something that even foes of PTAB find themselves having to admit today (IAMs own headline said PTAB breaks records a few hours ago). PTAB is very important because it eliminates many USPTO-granted software patents, even when theres no lawsuit but merely a threat of one (trolls do this a lot, especially to poor people/businesses because it keeps the racket safer from scrutiny). Theres nothing new to see in that IAM article; IAM is just reprinting charts from RPX and Unified Patents. Lets pretend for a moment that IAM is serious journalism and not just lobbying. Oh, wait; never mind that would be hard to pr...


UK critical operators risk 17m fines for poor cybersecurity practices "IndyWatch Feed Tech"

UK essential service operators risk fines of up to 17 million if they fail to implement robust protections against cyber attack. The penalties will apply to energy, transport, water, digital infrastructure, and health firms. A simple, straightforward reporting system will be set up to make it easy to report cyber breaches and IT failures so they can be quickly identified and acted upon. It will also cover other threats affecting IT such as power outages, More


Chiariglione: A crisis, the causes and a solution "IndyWatch Feed Tech"

Worth a read: this blog posting from Leonardo Chiariglione, the founder and chair of MPEG, on how (in his view) the group is being destroyed by free codecs and patent trolls. "Good stories have an end, so the MPEG business model could not last forever. Over the years proprietary and 'royalty free' products have emerged but have not been able to dent the success of MPEG standards. More importantly IP holders often companies not interested in exploiting MPEG standards, so called Non Practicing Entities (NPE) have become more and more aggressive in extracting value from their IP." (Thanks to Paul Wise).


Reduced Gbp1 causes mitochondrial dysfunction and cellular senescence in macrophages "IndyWatch Feed Tech"

We have talked about the polarization of macrophages in a number of previous articles, but, in short, macrophages can have multiple behavioral profiles that determine what roles they play; this is known as polarization. A new study has identified a regulatory protein that controls this process.

Macrophage Polarization

For the purposes of this article, we are interested in the M1 and M2 polarization. The M1 type is pro-inflammatory and aggressive towards invading pathogens, while the M2 type of macrophage is anti-inflammatory in nature, suppressing inflammatory responses and facilitating tissue repair.


FCC votes to improve delivery of emergency alerts "IndyWatch Feed Tech"

The Federal Communications Commission (FCC) on Tuesday voted to require wireless providers to deliver more geographically precise emergency alerts after a string of natural disasters.Wireless services will now be required to deliver alerts to an...


How to disable bash shell history in Linux "IndyWatch Feed Tech"

I do not want to save root users' shell history. How do I force Linux or Unix server to forget bash shell history? How to disable bash shell history on Linux for the root user?

The post How to disable bash shell history in Linux appeared first on nixCraft.


Roll Your Own Magnetic Encoder Disks "IndyWatch Feed Tech"

[Erich] is the middle of building a new competition sumo bot for 2018. Hes trying to make this one as open and low-cost as humanly possible. So far its going pretty well, and the quest to make DIY parts has presented fodder for how-to posts along the way.

One of new bots features will be magnetic position encoders for the wheels. In the past, [Erich] has used the encoder disks that Pololu sells without issue. At 69 each, they dont exactly break the bank, either. But shipping outside the US is prohibitively high, so he decided to try making his own disks with a 3D printer and the smallest neodymium magnets on Earth.

The pre-fab encoder disks dont have individual magnetstheyre just a puck of magnetic slurry that gets its polarity on the assembly line. [Erich] reverse-engineered a disk and found the polarity using magnets (natch). Then got to work designing a replacement with cavities to hold six 1mm x 1mm x 1mm neodymium magnets and printed it out. After that, he just had to glue them in place, matching the polarity of the original disk. We love the ingenuity of this project, especially the pair of tweezers he printed to pick...


Security updates for Tuesday "IndyWatch Feed Tech"

Security updates have been issued by Arch Linux (curl, lib32-curl, lib32-libcurl-compat, lib32-libcurl-gnutls, libcurl-compat, libcurl-gnutls, and rsync), Debian (curl), Fedora (clamav and java-1.8.0-openjdk), openSUSE (apache2), Oracle (kernel), and Ubuntu (linux-kvm and thunderbird).


FCC says false missile alert in Hawaii was sent by employee who thought attack was real "IndyWatch Feed Tech"

The employee who sent a false emergency alert of an incoming missile on Hawaii earlier this month did not realize it was a drill and thought the attack was real, Federal Communications Commission (FCC) investigators announced on Tuesday.The Jan...


Hans Peter Luhn and the Birth of the Hashing Algorithm "IndyWatch Feed Tech"

The IBM engineers hashing algorithm gave computers a way to quickly search documents, DNA, and databases Photo: IBM

photo Photo: IBM Information Scientist: Starting in the 1940s, Luhn devised machines and schemes for parsing information, most notably the now widely used hashing algorithm, which he suggested as a way to sort both numbers and text.

In November 1958, at a six-day international conference devoted to scientific information, the inventor Hans Peter Luhn demonstrated a series of his electromechanical machines. They looked rather ordinary. Much like other computing devices of the day, they were boxy and utilitarian, designed to scoop and sort tall stacks of punch cards into slots and bins.

Unlike other computers, however, Luhns devices were not designed to work with numbers and calculations but rather with words and sentences. One machine that drew particular attention implemented an algorithm that Luhn called KWIC, for Key Word in Context. Taking in a large number of textstypically, articles from 500 to 5,000 words in lengththe KWIC system could quickly and automatically construct a kind of index.

At the time, indexing, classifying, and organizing written information was a painstaking process, even for the most experienced specialists. And the volume of information in many fields was growing too rapidly for anyone to keep up. A better means for abstracting and summarizing was desperately needed. For the otherwise staid gathering of librarians and information scientists in Washington, D.C., the demonstration of KWIC was nothing short of earthshaking, with newspapers across the United States reporting on Luhns astounding invention.

By the early 1960s, KWIC had become central to the design of hundreds of computerized indexing systems, including those used by the Chemical Abstracts Service, Biological Abstracts, and the Institute for Scientific Information. One expert called KWIC the greatest thing to happen in chemistry since the invention of the test tube. Luhn, a senior...


Attackers can Bypass Fingerprint Authentication in Lenovo devices "IndyWatch Feed Tech"

By Uzair Amir

Vulnerability in Lenovo Devices Allows Attacker to Bypass Fingerprint Authentication

This is a post from Read the original post: Attackers can Bypass Fingerprint Authentication in Lenovo devices


Governments Defence of Proposed CSE Act Falls Short "IndyWatch Feed Tech"

The Government of Canada introduced new national security legislation in the summer of 2017. Bill C-59, National Security Act, 2017 (Bill C-59 or the Bill), would significantly change how Canadas signals intelligence agency, the Communications Security Establishment (CSE) operates. These reforms are largely contained in the proposed Communications Security Establishment Act (CSE Act) in Part 3 of the Bill.

Since the Bill was first proposed, a range of civil society groups and academics have called for significant amendments to the proposed CSE Act. A co-authored report by the Citizen Lab and the Canadian Internet Policy & Public Interest Clinic (CIPPIC) represents the most detailed and comprehensive analysis of these reforms to date. Calls for amendment have principally focused on:

  • Concerns related to the new active and defensive cyber operations powers, which would let the CSE use its expertise to engage in state-sponsored hacking
  • The need to improve the review and oversight framework to ensure that they provide an adequate level of protection given the risk to the Charter-protected rights of Canadians and persons in Canada as well as internationally recognized human rights abroad
  • The risk that the proposed CSE Act would normalize foreign-facing mass surveillance activities, which are neither inherently necessary nor proportionate
  • The sweeping exceptions to the CSEs general prohibition on directing its activities at Canadians, including exceptions that allow the CSE to acquire publicly available information, a definition broad enough to include information stolen or otherwise illegally obtained by the seller
  • ...


Dell Is Considering Selling Itself To A Company It Already Owns "IndyWatch Feed Tech"

VMware may acquire Dell in reverse merger process

It may turn out to be the biggest and unusual deal ever in the tech industry, if Dell Technologies plans to sell itself to Palo Alto-based VMWare, its own subsidiary company.

Dell currently owns and controls 80% of VMware, a company worth $55 billion. Dell, a private technology company that was once public, may again decide to become public by selling itself to VMware in a process thats known as a reverse merger, according to CNBC.

For those unaware, Dell, once a publicly traded company became private back in 2013 when its founder and CEO Michael Dell was able to purchase the company for $24.4 billion by teaming up with private equity firm Silver Lake Management.

According to people familiar with the matter, through the reverse merger process, VMware would actually buy the larger company Dell in this case, which would then allow the latter to be traded publicly without having to go through a formal listing process, reports CNBC.

If a reverse merger happens, it would allow investors who backed Dells move to go private in 2013 to sell their shares on the public market and monetize their investment, while helping Dell pay off some of its $50 billion in debt.

Dell is considering various options, including a public stock offering, but has not settled on an option right now. The companys board is expected to meet later this month to discuss the possible options to increase revenue and raise funds.

Dell and VMware spokespeople declined to comment on the report.

Source: CNBC

The post Dell Is Considering Selling Itself To A Company It Already Owns appeared first on TechWorm.


Two ex-Google engineers built an entirely different kind of self-driving car "IndyWatch Feed Tech"

Nuro is focused on last-mile deliveries with its completely driverless prototype.


NASA Tests Light, Foldable Plane Wings for Supersonic Flights "IndyWatch Feed Tech"

NASA is experimenting with planes whose outer wing sections can fold up or down depending on the current flight conditions. Even more interesting is that they are doing it with "shape memory alloy" rather than hydraulics.

The foldable wings will give typical planes like commercial airliners a way to adapt to different flight conditions. They can give pilots more control over their aircraft and could even lead to more fuel efficient flights. Planes designed to fly at supersonic speeds (faster than the speed of sound), however, will get more out of this technology.

As Matt Moholt, the principal director of the Spanwise Adaptive Wing project, said:

"There's a lot of benefit in folding the wing tips downward to sort of 'ride the wave' in supersonic flight, including reduced drag. This may result in more efficient supersonic flight. Through this effort, we may be able to enable this element to the next generation of supersonic flight, to not only reduce drag but also increase performance, as you transition from subsonic to supersonic speeds. This is made possible using shape memory alloy."

Video: NASA Examines Technology To Fold Aircraft Wings In Flight

Original Submission

Read more of this story at SoylentNews.


The Failure of ILOs Administrative Tribunal Highlights Poor State of Justice in Europe and Worldwide "IndyWatch Feed Tech"

Administrative Tribunal of ILO: President may set aside judgment according to opinions of the disciplinary committee. So workers are at the mercy of arbitrary [sic] why a disciplinary committee?

Summary: As the EPO and the UPC serve to demonstrate, were back to being ruled by kings or governed by monarchies while tribunals serve only (or primarily) a theatrical role

THE EPO is wasting millions of euros (stakeholders money) on lawyers, simply in order for them to help cover up Battistellis abuses. That also means crushing staff (his victims, whose legal budget isnt limitless). We wrote about it earlier today. The EPO has said nothing about it. The EPOs Twitter feed is full of fluff (You just came up with some buzzword/acronym and then claim that many things belong to it, I told them; they pay the media to plant some puff pieces about this at the expense of stakeholders/EPO budget, conveniently forgetting that they're supposed to be a patent office).

The EPO is wasting millions of euros (stakeholders money) on lawyers, simply in order for them to help cover up Battistellis abusesl.The Presidential Palace of Battistelli...


These Are the Most Exciting Industries and Jobs of the Future "IndyWatch Feed Tech"

Weve all read the headlines: the robots are coming, and they will take our jobs. In fact, up to 45 percent of tasks workers perform can be automated using current technology, let alone future forecasts.

However, there is a side of this story that is often overlooked: while emerging technologies will destroy many jobs, they will also create many new ones. In fact, over half of the jobs current middle school students will be doing in the future do not even exist today. Widespread innovation is continuing to give birth to exciting new industries, all of which are sources of new jobs.

More often than not, we have used our imaginations to envision dystopian futures where we submit to robots that leave us feeling jobless and purposeless. But we can also imagine an exciting parallel future in which technology has created even more opportunities for the workforce.


Making the Case for Slackware in 2018 "IndyWatch Feed Tech"

If you started using GNU/Linux in the last 10 years or so, theres a very good chance your first distribution was Ubuntu. But despite what you may have heard on some of the elitist Linux message boards and communities out there, theres nothing wrong with that. The most important thing is simply that youre using Free and Open Source Software (FOSS). The how and why is less critical, and in the end really boils down to personal preference. If you would rather take the easy route, who is anyone else to judge?

Having said that, such options have not always been available. When I first started using Linux full time, the big news was that the kernel was about to get support for USB Mass Storage devices. I dont mean like a particular Mass Storage device either, I mean the actual concept of it. Before that point, USB on Linux was mainly just used for mice and keyboards. So while I might not be able to claim the same Linux Greybeard status as the folks who installed via floppies on an i386, its safe to say I missed the era of easy Linux by a wide margin.

But I dont envy those who made the switch under slightly rosier circumstances. Quite the opposite. I believe my understanding of the core Unix/Linux philosophy is much stronger because I had to tough it through the early days. When pursuits such as mastering your init system and compiling a vanilla kernel from source werent considered nerdy extravagance but necessary aspects of running a reliable system.

So what should you do if youre looking for the classic Linux experience? Where automatic configuration is a dirty word, and every aspect of your system can be manipulated with nothing more exotic than a text editor? It just so happens there is a distribution of Linux that has largely gone unchanged for the last couple of decades: Slackware. Lets take a look at its origins, and what I think is a very bright future.

A Deliberate Time Capsule

Its not as if its an accident that Slackware is the most old school of all Linux distributions. For one, its literally the oldest actively maintained distribution at 24 years. But more to the point, Slackware creator and lead developer Patrick Volkerding simply likes it that way:

The Official Release of Slackware Linux by Patrick Volkerding is an advanced Linux operating system, designed with the twin goals of ease of use and stability as top priorities. Including the latest popular software while retaining a sense of tradition, providing simplicity and ease of use alongside flexibility and power, Slackware brings the best of all worlds to the tab......


Linux Kernel 4.15: 'An Unusual Release Cycle' "IndyWatch Feed Tech"

Linux Kernel 4.15: 'An Unusual Release Cycle'


Achieving zero false positives with intelligent deception "IndyWatch Feed Tech"

Cyber attacks are not single events. When attackers compromise an asset, they dont know which asset is infected. They must determine where they are in the network, the network structure and where they can find valuable information. That means attackers carefully try to find out as much as possible about the organization. This is precisely the behavior that intelligent deception technology can exploit in order to thwart attackers and protect organizations. Breadcrumbs are clues for More


Salesforce Towers Above Adobe, Facebook, and Google in Study of Best Places to Work in Tech "IndyWatch Feed Tech"

Indeeds 2018 top tech companies report puts Salesforce on top Photo: Salesforce The new Salesforce tower rises above the San Francisco skyline

Job search firm just released its list of the top tech companies to work for in 2018. The rankings, based on average employee ratings for internet/software and computer/electronic companies with at least 50 reviews between October 2015 and December 2017, put 15 companies on its  list (see table, below), with Salesforce on top, followed by Adobe, Facebook, Google, and SAP

Looking at the last time Indeed put out a top tech companies list, 2016, there have been a few changes.  (An Indeed spokesperson pointed out that the methodology may have been slightly different; the 2016 list came from a general study of best workplaces; the 2018 list zeroed in more closely on tech.)

Indeeds data analysts pointed out that its also worth noting which tech behemoths didnt make the charts this year: Oracle and IBM.

The analysts also took a deeper look at the reviews to see what makes a top-five engineering workforce. Pay and benefits, job security and advancement opportunities, and corporate culture count for a lot, of course.

More specifically, for Salesforce, they noted, highlights noted include volunteer time off and flexible scheduling. Facebook employees appreciate the companys dedication to its mission of connecting the world and motivating and encouraging environment. Google employees know how to have fun and say managers are very kind. Adobe employees praise the companys work-life balance. And SAP employees like the firms remote work options and volunteer opportunities.

Best, of course, is in the eye of the beholderor at least the firm collecting the data. Job search firm Glassdoor in December released a broader review of best places to work in the U.S. for 2018, including tech and non-tech companies. In that ranking,...


RADV/RadeonSI Benchmarks On Mesa 18.0 "IndyWatch Feed Tech"

With Mesa 18.0 now well into its feature freeze and this quarterly update to Mesa OpenGL/Vulkan drivers bringing many new features and improvements as covered in our Mesa 18.0 feature overview here are some benchmarks comparing the Mesa 18.0 RadeonSI/RADV driver performance to the current 17.3 stable series and the older 17.2 series as well.


What is a security data lake? "IndyWatch Feed Tech"

The concepts of the data lake and the specialized security data lake are relatively new. While data lakes have a bit of a head start in adoption largely among data science teams some security teams are beginning to look into security data lakes to keep afloat in the wash of security log data they amass every day. Understanding the capabilities and differences between the two types of repositories will help determine if implementing More


German Shock at Car Exhaust Tests on Humans and Monkeys "IndyWatch Feed Tech"

An Anonymous Coward writes:

The German government has denounced experiments funded by German carmakers in which humans and monkeys reportedly inhaled diesel exhaust fumes.

On Thursday The New York Times reported that the EUGT research was designed to counter a 2012 decision by the World Health Organization to classify diesel exhaust as a carcinogen.

It said that in 2014, EUGT had exposed 10 monkeys to fumes - in an air-tight chamber - from several cars, including a diesel VW Beetle. The testing took place at a lab in Albuquerque, New Mexico.

Then at the weekend Germany's Stuttgarter Zeitung and SWR radio reported that 19 men and six women had inhaled diesel fumes in another EUGT experiment.

During a month of tests at a lab in Aachen, west Germany, they were exposed to various concentrations of diesel fumes, which contain toxic nitrogen oxides (NOx). The BBC has not seen the study itself, but German media say it was published in 2016.

At the time the carmakers were arguing that modern technology had cut pollution from diesel engines to safe levels. But VW was later found to have fitted "cheat" devices that rigged the emissions data.

Original Submission

Read more of this story at SoylentNews.


Amazon, Berkshire Hathaway and JP Morgan Chase join to tackle health care costs "IndyWatch Feed Tech"

Amazon, Berkshire Hathaway and JPMorgan Chase announced on Tuesday that theyre working together to create a new health-care venture for their own staff aimed at improving employee satisfaction and reducing costs.The three say that they...


Stop dilly-dallying. Block all ads on YouTube "IndyWatch Feed Tech"

Stop dilly-dallying. Block all ads on YouTube

Even Google, one of the world's largest advertising companies, seems to be incapable of guaranteeing a stream of safe ads.


Links 30/1/2018: Godot 3.0 and ncurses 6.1 "IndyWatch Feed Tech"

GNOME bluefish



  • Desktop

    • Refreshing old computers with Linux

      Its nearly impossible to enter a school these days without seeing an abundance of technology. Despite this influx of computers into education, funding inequity forces school systems to make difficult choices. Some educators see things as they are and wonder, Why? while others see problems as opportunities and think, Why not?

      Andrew Dobbie is one of those visionaries who saw his love of Linux and computer reimaging as a unique learning opportunity for his students.

  • Kernel Space

    • Btrfs Gets More RAID 5/6 Fixes In Linux 4.16

      The Btrfs file-system updates were mailed in and subsequently pulled today to the mainline tree for the Linux 4.16 kernel merge window.

      There are some minor improvements like a zero range mode for fallocate, code clean-ups, improved bio merging on multiple devices, compression heuristic changes, and other small work.

    • ...


Cisco ASA software is affected by a flaw with 10 out of 10 severity rating. Patch it asap "IndyWatch Feed Tech"

Cisco released security updates to address a critical security vulnerability, tracked as CVE-2018-0101, in Cisco ASA software

Cisco addressed a critical security flaw, tracked as CVE-2018-0101, in Adaptive Security Appliance (ASA) software.

The vulnerability could be exploited by a remote and unauthenticated attacker to execute arbitrary code or trigger a denial-of-service (DoS) condition causing the reload of the system.

The vulnerability was discovered by the researcher Cedric Halbronn from NCC Group, he will disclose technical details on February 2 at the Recon Brussels 2018 conference.

The flaw resides in the Secure Sockets Layer (SSL) VPN feature implemented by CISCO ASA software.

According to CISCO, it is related to the attempt to double free a memory region when the webvpn feature is enabled on a device. An attacker can exploit the vulnerability by sending specially crafted XML packets to a webvpn-configured interface.

A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. reads the security advisory published by CISCO.

The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device.

Below the list of affected CISCO ASA products:

  • 3000 Series Industri...


Crypto Subsystem Sees ARM Improvements With Linux 4.16 "IndyWatch Feed Tech"

Herbert Xu has submitted the crypto subsystem updates for the Linux 4.16 kernel. This time around there are a number of ARM/ARM64 related improvements...


Crypto Mining Malware being distributed through Googles DoubleClick "IndyWatch Feed Tech"

According to a report by a security firm named TrendMicro, numerous users in Asia and Europe were distributed cryptocurrency mining malware with the help of Google ads or commonly known as Google DoubleClick ad service. TrendMicro published a Blog on their Security and Intelligence section stating that a JavaScript program called CoinHive which mines Monero

The post Crypto Mining Malware being distributed through Googles DoubleClick appeared first on Hacker News Bulletin | Find the Latest Hackers News.


U.S.-Based "Cult" Telling Parents to Make Children Drink Bleach to Cure Their Autism "IndyWatch Feed Tech"

A "cult" has been implicated in cases of parents forcing their children to drink bleach as an autism cure (and surprisingly, it's not the cult known as 4chan):

Parents are making their children drink industrial bleach to cure them of autismwith the potentially deadly practice linked back to a U.S. cult. According to British tabloid the Sunday People, six British police forces have probed cases in which children as young as two have been forced to undergo the potentially lethal treatment.

The treatment being administered is CD (Chloride Dioxide) or MMS (Miracle Mineral Solution)with a secret Facebook group touting its use to desperate parents in the U.K. The method has been promoted by a controversial U.S. church with a branch in Los Angeles - the secretive Genesis II Church, founded by Jim Humble, a former scientologist.

A 2016 investigation by Eyewitness News and ABC News found an underground network clustered in southern California promoting MMS on Facebook as a cure for ailments including cancer, Parkinsons, and autism in children.

The previous year the BBC exposed a secret conference in which leading figures from the church travelled to the U.K. to promote the use of MMS, which it claims is a non-dangerous religious sacrament. They believe that autism is caused by pathogens and parasites, which Chloride Dioxide kills. Doctors say that the claims of adherents are groundless, the solution is untested and can cause serious harm.

Bleach: the drink of choice for sophisticated memers.

Original Submission

Read more of this story at SoylentNews.


Bioquark Inc. Grognostics Ira Pastor "IndyWatch Feed Tech"

Part #1 of an awesome show with Steve and Jason on Grognostics merging together discussions on biotech, craft beer, human potential, as well as a comedic journey into the world of 2039


BMWs artificially intelligent motorcycle "IndyWatch Feed Tech"

Really Love this!!

A few steps ahead, BMW is designing for 2040.


Be the Electronic Chameleon "IndyWatch Feed Tech"

If you want to work with wearables, you have to pay a little more attention to color. It is one thing to have a 3D printer board colored green or purple with lots of different color components onboard. But if it is something people will wear, they are going to be more choosy. [Sdekon] shows us his technique of using Leuco dye to create items that change color electrically. Well, technically, the dye is heat-sensitive, but it is easy to convert electricity to heat. You can see the final result in the video, below.

The electronics here isnt a big deal just some nichrome wire. But the textile art processes are well worth a read. Using a piece of pantyhose as a silk screen, he uses ModPodge to mask the screen. Then he weaves nichrome wire with regular yarn to create a heatable fabric. Dont have a loom for weaving? No problem. Just make one out of cardboard. Theres even a technique called couching, so theres lots of variety in the textile arts used to create the project.

We get that this is just an example, but wed love to see a more practical use. Maybe a camera and OpenCV could create smart camouflage, for example.  We had to wonder how big you could make RGB pixels and still have some effective use as a crude display.

Adding this to OLED-impregnated fabric could be interesting. If you want to know more about using sewing in projects, we have just the post for you.




Privacy of fitness tracking apps in the spotlight after soldiers exercise routes shared online "IndyWatch Feed Tech"

People exercising on far-flung military bases are being exposed by their fitness tracker.

Read more in my article on the We Live Security blog.


Crooks target ATMs with Ploutus-D malware, these are the first confirmed cases of Jackpotting in US "IndyWatch Feed Tech"

Cybercriminals are targeting ATM machines in the US forcing them to spit out hundreds of dollars with jackpotting attacks.

According to a senior US Secret Service official, the organization has managed to steal more than $1m from ATM machines using this technique.

Once crooks gain physical access to the ATM, they will infect it with a malware or specialized electronics that is designed to instruct the machine to deliver money in response to specific commands.

The jackpotting technique was first proposed by white hat hacker Barnaby Jack in 2010.

Barnaby Jack Jackpotting video

The popular investigator Brian Krebs obtained an alert issued by ATM maker manufacturers Diebold Nixdorf this month, the company warns of an ongoing campaign conducted by a gang in the US.

On Jan. 21, 2018, KrebsOnSecurity began hearing rumblings about jackpotting attacks, also known as logical attacks, hitting U.S. ATM operators. I quickly reached out to ATM giant NCR Corp. to see if theyd heard anything. NCR said at the time it had received unconfirmed reports, but nothing solid yet. wrote Krebs.

On Jan. 26, NCR sent an advisory to its customers saying it had received reports from the Secret Service and other sources about jackpotting attacks against ATMs in the United States.

While at present these appear focused on non-NCR ATMs, logical attacks are an industry-wide issue, the NCR alert reads. This represents the first confirmed cases of losses due to logical attacks in the US. This should be treated as a call to action to take appropriate steps to protect their ATMs against these forms of attack and mitigate any consequences.

The crooks are infecting the ATM with the Ploutus-D malware, the vendor warns that Opteva 500 and 700 s...


Index: A Focus on the Future of Code and Community "IndyWatch Feed Tech"

One of the most significant challenges developers face is keeping up with the increasingly rapid pace of change in our industry. With each new innovation comes a new crop of vendors and best practices, and staying on top of your game can become a second profession in itself.

Cloud, containers, data, analytics, IoT, AI, machine learning, serverless architecture, blockchain: Behind all of these rapidly evolving technologies are the programming languages and developers who are leading the charge into the next era of innovation.


Spinach leaf veins help cardiac patients heal "IndyWatch Feed Tech"

Spinach leaf veins can be used in place of human blood vessels.


Scientists Think Theyve Found a Way to Stop Allergic Reactions Before They Happen "IndyWatch Feed Tech"

If youre one of the unlucky millions of people burdened by allergies, you know that sometimes theres only so much antihistamines can do to help.

Researchers have been working to find more effective allergy treatments, and now theyve discovered how a particular antibody can stop an allergic reaction from happening altogether.

An allergic reaction is the immune systems way of completely overreacting to a normally benign substance, from proteins in cat saliva to surprisingly deadly peanuts.


Nuro Raises $92 Million for Adorable Autonomous Delivery Vehicles "IndyWatch Feed Tech"

Somewhere between a delivery truck and a sidewalk robot, Nuro's robotic vehicles want to deliver your groceries Photo: Nuro

It seems like we've gotten to the point with self-driving vehicles where it's no longer enough to "just" be developing a car that could at some point be used as an autonomous rideshare vehicle. That space has gotten super crowded over the last few years and although it may not seem like it, the giant piles of money that self-driving vehicle (SDV) startups require are not infinite. So, what we're seeing instead is more specialization into niches where specific sorts of SDVs can fulfill specific business cases.

The most popular (and realistic in the near term) niche is almost certainly delivery, because delivering stuff is what vehicles do when they're not delivering people. This niche is being tackled at all scales, from Tesla's autonomous semi trucks to sidewalk delivery robots from Starship and Piaggio Fast Forward. And now, somewhere in the middle, there's Nuro.

Today, Nuro is announcing not only the fact that it exists, but also that it's got one of those aforementioned giant piles of money ($92 million in Series A funding) along with a fully autonomous self-driving vehicle "designed to transform local commerce" by bringing things you want from local businesses directly to your home.

We started Nuro to make products that will have a massive impact on the things we do every day, said Nuro Co-founder Dave Ferguson. Our world-class software, hardware, and product teams have spent the past 18 months applying their expertise to deliver on this mission. The result is a self-driving vehicle designed to run your errands for you. It is poised to change the way that businesses interact with their local customers.

Nuros new vehicle is designed specifically to move goods between and among businesses, neighborhoods, and homes. The fully autonomous vehicle is unmanned and about half the width of a passenger car. Its built with ultra-light materials and designed for neighborhoods. These combined design elements will make it one of the safest vehicles on the road.



Tuhi Is A New Project To Support Wacom SmartPads On Linux "IndyWatch Feed Tech"

Tuhi is a new open-source project started by Red Hat's Peter Hutterer and Benjamin Tissoires to support Wacom SmartPad devices on Linux...


U.S. Government Reportedly Wants to Build a 5G Network to Thwart Chinese Spying "IndyWatch Feed Tech"

Trump security team sees building U.S. 5G network as option

President Donald Trump's national security team is looking at options to counter the threat of China spying on U.S. phone calls that include the government building a super-fast 5G wireless network, a senior administration official said on Sunday. The official, confirming the gist of a report from, said the option was being debated at a low level in the administration and was six to eight months away from being considered by the president himself.

The 5G network concept is aimed at addressing what officials see as China's threat to U.S. cyber security and economic security. [...] "We want to build a network so the Chinese can't listen to your calls," the senior official told Reuters. "We have to have a secure network that doesn't allow bad actors to get in. We also have to ensure the Chinese don't take over the market and put every non-5G network out of business."

[...] Major wireless carriers have spent billions of dollars buying spectrum to launch 5G networks, and it is unclear if the U.S. government would have enough spectrum to build its own 5G network. [...] Another option includes having a 5G network built by a consortium of wireless carriers, the U.S. official said. "We want to build a secure 5G network and we have to work with industry to figure out the best way to do it," the official said, speaking on condition of anonymity. Axios published documents it said were from a presentation from a National Security Council official. If the government built the network, it would rent access to carriers, Axios said.

Will it include "responsible encryption"?

Also at Newsweek and Axios.

Related: U.S. Lawmakers Urge AT&T to Cut Ties With Huawei

Original Submission

Read more of this story at SoylentNews.


Fedora 28 Planning For VA-API 1.0 Support "IndyWatch Feed Tech"

The latest work by Fedora developers on feature work for Fedora 28 is shipping with VA-API 1.0 support for updated capabilities around the Video Acceleration API...


A Look Inside Facebook's Open Source Program "IndyWatch Feed Tech"

Open source becomes more ubiquitous every year, appearing everywhere from government municipalities to universities. Companies of all sizes are also increasingly turning to open source software. In fact, some companies are taking open source a step further by supporting projects financially or working with developers.


Microsoft Hyper-V Guests Get PCID Support With Linux 4.16 "IndyWatch Feed Tech"

With the in-development Linux 4.16 kernel there is now support for PCID with Microsoft Hyper-V virtualization guests...


Chinas Patent Policy Likely to Drive Out Foreign Companies and Maybe Thats Just the Intention "IndyWatch Feed Tech"

From manufacturing powerhouse to litigation hub; what would that cause to investment though?

Pudong skyline
Pudong, a district of Shanghai, China

Summary: While corporate media focuses on trade war (e.g. US almost banning Huawei-branded phones) theres a broader picture which includes patent aspects (Huawei and other Chinese giants use patents for sanctions)

AS we noted in our last post, its becoming a liability for firms to operate (e.g. sell) in China, manufacture in China, or be based in China because it makes them susceptible to more patent lawsuits. Korean, Japanese, European and American firms might learn this sooner or later.

As IAM put it yesterday, Shenzhen will play host to one of the first patent-related domestic court clashes between Chinese mobile device manufacturers following Coolpads launch of a suit against Xiaomi

IAM loves it, as its funding sources are litigators and even trolls. But what does that mean for the rest of us, who are neither litigators nor trolls?

IAM covered this latest twist in the Coolpad case (mentioned here last week), alluding to news from late on Friday:

Chinese smartphone maker Coolpad announced late Friday night that it has sued larger rival Xiaomi for infringing three Chinese invention patents. The cases will play out in the city where Coolpad is headquartered, at the Shenzhen Intermediate Peoples Court. Notably, it will be one of the first major patent clashes between major players in Chinas smartphone sector to play out in domestic courts.

In a voluntary disclosure filed with the Stock Exchange of Hong Kong, Coolpad said that six separate cases have been accepted by the Shenzhen Intermediate Peoples Court. The plaintiff is a subsidiary of the group called Yulong Computer Telecommunication Scientific.

Korean companies like Samsung are also being legally harassed in China by patent giants and trolls. Its not the sort of environment it used to be; its a lot more hostile. There are even embargoes being imposed by the state (to protect state-connected...


ETICAS Releases First Ever Evaluations of Spanish Internet Companies' Privacy and Transparency Practices "IndyWatch Feed Tech"

Its Spain's turn to take a closer look at the practices of their local Internet companies, and how they treat their customers personal data.

Spain's Quien Defiende Tus Datos? (Who Defends Your Data?) is a project of ETICAS Foundation, and is part of a region-wide initiative by leading Iberoamerican digital rights groups to shine a light on Internet privacy practices in Iberoamerica. The report is based on EFF's annual Who Has Your Back? report, but adapted to local laws and realities (A few months ago Brazils Internet Lab, Colombias Karisma Foundation, Paraguay's TEDIC, and Chiles Derechos Digitales published their own 2017 reports, and Argentinean digital rights group ADC will be releasing a similar study this year).

ETICAS surveyed a total of nine Internet companies. These companies logs hold intimate records of the movements and relationships of the majority of the population in the country. The five telecommunications companies surveyedMovistar, Orange, Vodafone-ONO, Jazztel, MsMviltogether make up the vast majority of the fixed, mobile, and broadband market in Spain. ETICAS also surveyed the four most popular online platforms for buying and renting housesFotocasa, Idealista, Habitaclia, and ETICAS, in the tradition of Who Has Your Back?, evaluated the companies for their commitment to privacy and transparency, and awarded stars based on their current practices and public behavior. Each company was given the opportunity to answer a questionnaire, to take part in a private interview, and to send any additional information they felt appropriate, all of which was incorporated into the final report. This approach is based on EFFs earlier work with Who Has Your Back? in the United States, although the specific questions in ETICAS study were adapted to match Spains local laws and realities.

ETICAS rankings for Spanish ISPs and phone companies are below; the full report, which includes detai...


China enlists top scientists in mission to become military tech superpower "IndyWatch Feed Tech"

China has gathered 120 researchers from around the military to work for its top research institute as part of a push to develop military applications for artificial intelligence and quantum technology, state media reported.

Experts from within the military to work for its top research institute as China modernises its armed forces to give them cutting-edge equipment and arms.


A Korean Android OEM is Bullied by Patent Trolls Which Microsoft Gave Patents to and Paid "IndyWatch Feed Tech"

LG is the latest victim, but lets carry on pretending that Microsoft loves Linux

LG phone

Summary: Even though LG already pays Microsoft protection money for alleged patent infringements in Linux (since 2007) the trolls that are connected to Microsoft carry on chasing it with lawsuits in East Texas, so Microsofts protection is illusionary at best and Microsoft is a back-stabbing ally

THE malicious MOSAID (now known as Conversant and led by Boris Teksler) is a patent troll. It was armed by Microsoft some years ago and it now attacks Android OEMs. The latest victim? LG. As IAM put it yesterday: Over the last four years the licensing dispute between Conversant subsidiary Core Wireless and LG has had all the familiar traits of a modern day infringement spat as the battle has dragged on in two separate district court cases.

Its the district court in East Texas and, as a reminder, Conversant acquired the Core Wireless portfolio of around 2,000 assets from Nokia in 2011. Remember that Microsoft guided the transfer of patents from Nokia to Conversant (known as MOSAID back then). We have been writing a lot about that. Boris Teksler is aware of it.

LG has also just been attacked by Uniloc, which Microsoft paid a lot of money back in the days (we wrote many articles about that). Again its in Texas, but the troll now preys on Korean firms. The English-speaking mainstream media in Korea wrote about that yesterday:

A nonpracticing entity filed a series of patent infringement lawsuits last year against South Koreas information technology giants, including Samsung Electronics and LG Electronics, in an apparent move to ride their recently improved sales in the US market, a local intellectual property service provider said Monday.



Q&A on Machine Learning and Kubernetes with David Aronchick of Google from Kubecon 2017 "IndyWatch Feed Tech"

At the recently concluded Kubecon in Austin, TX, attended by over 4000 engineers, Kubernetes was front, left and center. Due to the nature of workloads and typical heavy compute requirements in training algorithms, Machine Learning topics and its synergy with Kubernetes was discussed in many sessions.

Kubeflow is a platform for making Machine Learning on Kubernetes easy, portable and scalable by providing manifests for creating:


Elon Musk's Boring Company Sells Flamethrowers "IndyWatch Feed Tech"

Elon Musk wants to sell you a flamethrower for $500 and it seems to be legal in California

Elon Musk, the mastermind behind PayPal, Tesla and SpaceX, has another innovative product up in his sleeve: a $500 flamethrower. Musk announced the flamethrower on Saturday, after weeks of teasing a possible flamethrowing product for his newest venture, The Boring Company. The Boring Company's mission is to excavate a low-cost but fast-digging tunnel through Los Angeles to help alleviate its notorious car traffic.

Musk's announcements on Instagram and Twitter about the flamethrower has all been in tongue-in-cheek tone, but his legions of followers have lapped up the chance to buy a flamethrower from The Boring Company. Over 2,000 people have pre-ordered the device so far, according to Musk on Twitter.

Pre-orders are expected to ship in the spring, according to The Boring Company's website. "When the zombie apocalypse happens, you'll be glad you bought a flamethrower," tweeted Musk. "Works against hordes of the undead or your money back!"

The California Health and Safety Codes 12750 to 12761 outline that owning or selling flamethrowers is illegal without a permit granted from the state fire marshal, joining Maryland as the only two states in the country to have flamethrower regulations. The state has defined flamethrowers as "any nonstationary and transportable device designed or intended to emit or propel a burning stream of combustible or flammable liquid a distance of at least 10 feet." But since The Boring Company's flamethrower emits fire less than the defined 10 feet, they did not have to get a permit to sell, according to the company's spokesman.

At time of this story being posted, the pre-order count had climbed to 10k.

Update: One California lawmaker wants to ban the flamethrower. But it's puny compared to other flamethrowers.

Also at CNN, MarketWatch, and...


Why You Should Care About Diversity and Inclusion "IndyWatch Feed Tech"

Aubrey Blanche, Global Head of Diversity and Inclusion at Atlassian, joins us in this latest edition of The New Stack Makers podcast to talk about the difference between diversity and inclusion and why anyone should care.

Diversity is being invited to the party, she said. Inclusion is being glad youre there.


Flashing Light Prize 2018: This Time with Neon "IndyWatch Feed Tech"

The Flashing Light Prize is back this year with a noble twist. And judging from the small set of entries thus far, this is going to be an interesting challenge.

Last years Flashing Light Prize was an informal contest with a simple goal: flash an incandescent lamp in the most interesting way possible. This years rules are essentially the same as last year, specifying mainly that the bulb itself has to light up no mechanical shutters and that it has to flash at 1 Hz with a 50% duty cycle for at least five minutes. But where last years contest specified incandescent lamps, this year youve got to find a way to flash something with neon in it. It could be an off-the-shelf neon pilot light, a recycled neon sign, or even the beloved Nixie tube. But we suspect that points will be awarded for extreme creativity, so it pays to push the envelope. Last years winner used a Wimhurst machine to supply the secondary of an ignition coil and flash a pair of bulbs connected across the primary, so the more Rube Goldberg-esque, the better your chances.

There are only a handful of entries right now, with our favorite being [Ben Krasnow]s mashup of electricity, mechanics, chemistry, and physics. Youve got until March 15th to post your flashing neon creation, and there are two categories this year, each with a 200 prize. Get your flash on and win this one for Hackaday.


St. Regis Mohawk Nation Now Exploited as a Lobby and an Attack Vector Against PTAB "IndyWatch Feed Tech"

CAFC and SCOTUS should definitely take note of the Koch Brothers' role in that lobby (which harms technology companies)

Koch Network Plans to Spend $400 Million in U.S. Midterm Cycle
Reference (in the news 2 days ago): Koch Network Plans to Spend $400 Million in U.S. Midterm Cycle

Summary: The anti-PTAB lobby, which is basically attempting to influence Oil States v Greene's Energy (imminent Supreme Court decision), still tries hard to find scandals or make up scandals; the Mohawk tribe became a convenient channel for that (paid to participate in a scam)

THE biggest PTAB story of 2017 was probably the Mohawk patent scam. It carries on; its piggybacked by patent extremists. The USPTO granted some dubious patents and now theyre being shielded using a tribe which has absolutely nothing to do with them. An unethical lawyer paid them some money through shell entities for this (makes one wonder where the money really comes from). Heres a long new article by Kevin E. Noonan. Its about the amicus briefs which support the scam (the patent microcosm would rather focus on these):

In what everyone (including the Patent Trial and Appeal Board) considers an unprecedented administrative action, the PTAB late last year set out an order (Patent Trial and Appeal Boards Order, 2017 WL 5067421, P.T.A.B. Nov. 3, 2017) inviting amicus briefing on the question of whether the transfer of patent rights from Allergan to the St. Regis Mohawk Nation should lead the Board to dismiss several consolidated inter partes review actions (Nos. IPR2016...


New Anti-Piracy Coalition Calls For Canadian Website Blocking "IndyWatch Feed Tech"

In recent years pirate sites have been blocked around the world, from Europe, through Asia, and even Down Under.

While many of the large corporations backing these blockades have their roots in North America, blocking efforts have been noticeably absent there. This should change, according to a new anti-piracy coalition that was launched in Canada this week.

Fairplay Canada, which consists of a broad range of organizations with ties to the entertainment industry, calls on the local telecom regulator CRTC to institute a national website blocking program.

The coalitions members include Bell, Cineplex, Directors Guild of Canada, Maple Leaf Sports and Entertainment, Movie Theatre Association of Canada, and Rogers Media, which all share the goal of addressing the countrys rampant piracy problem.

The Canadian blocklist should be maintained by a yet to be established non-profit organization called Independent Piracy Review Agency (IPRA) and both IPRA and the CRTC would be overseen by the Federal Court of Appeal, the organizations propose.

What we are proposing has been effective in countries like the UK, France, and Australia, says Dr. Shan Chandrasekar, President and CEO of Asian Television Network International Limited (ATN), who is filing Fairplay Canadas application.

We are ardent supporters of this incredible coalition that has been formed to propose a new tool to empower the CRTC to address online piracy in Canada. We have great faith in Canadian regulators to modernize the tools available to help creators protect the content they make for Canadians enjoyment.

The proposal is unique in the sense that its the first of its kind in North America and also has support from major players in the Telco industry. Since most large ISPs also have ties to media companies of their own, the latter is less surprising as it may seem at first glance.

Bell, for example, is not only the largest Internet provider in Canada but also owns the television broadcasting and production company Bell Media, which applauds the new plan.

Bell is pleased to work with our partners across the industry and the CRTC on this important step in ensuring the long-term viability of the Canadian creative sector, says Randy Lennox, President of Bell Media.

Digital rights holders need up-to-date tools to combat piracy where its happening, on the Internet, and the process proposed by the coalition will provide just that, fairly, openly and effectively, he adds.

Thus far the Government...


A Danish Company Has Just Collapsed Due to Patent Quality Issues at the EPO "IndyWatch Feed Tech"

Forward PharmaSummary: Rushed examination at the EPO is taking its toll on companies that need legal certainty and instead get just Early Certainty (which is no certainty at all, just an excuse to fake production numbers for Battistelli)

THE EPO may have become worse than the USPTO when it comes to patent quality if its true that its now easier to get software patents at the EPO than at the USPTO (as some law firms publicly claim). Then theres the aspect of patents on life.

This is alarming because the EPO used to be the best bar none when it comes to patent quality. A European Patent (EP) offered very high legal certainty, e.g. in case a lawsuit gets filed.

Yesterday, IAMs editor was reposting for Haseltine Lake LLP. Its about that latest study of theirs (first mentioned by us about 3 weeks ago). It is, however, preceded by his introduction, which goes as follows (after calling the Battistelli era highly controversial a gross understatement).

As President Battistelli sees out his final months, the big question is how much of an impact the changes have had. Well, if research by James Ward and Frances Wilding, partners at Haseltine Lake LLP, is correct, the answer is a great deal. In the following overview of detailed number-crunching they have done, the pair explain that the amount of grants the office made in 2017 is likely to have exceeded 100,000 for the very first time, while the examination backlog could be on the way down; though the number of oppositions is on the rise. What the numbers cannot tell us is whether there has been any impact on the quality of the rights the EPO issues that, of course, will always be subjective (IAM readers have always seen the office as being the leader of the pack among the IP5).

IAM cites IAM to maintain the illusion that patent quality is OK under Battistelli. This is also...


Company Pays Seven Figures for VR Film That Premiered at the Sundance Film Festival "IndyWatch Feed Tech"

A VR Movie Set in Space Just Landed a 7-Figure Deal at Sundance. Yes, You Read That Right

Every year the biggest news out of the Sundance Film Festival is always the hefty sums handed over to independent filmmakers for their passion projects. From Fox Searchlight dropping $1 million for future Oscar nominee Beasts of the Southern Wild in 2012 to Amazon Studios' massive $12 million buy of The Big Sick at last year's fest, everyone in Park City is hustling to make a deal. But that hustle has always been reserved for traditional films, not the virtual reality ones. Until now.

In an unprecedented move, VR financing and distribution venture CityLights announced today that it is acquiring Spheresa three-part series that lets viewers explore the depths of space in VRin a massive seven-figure deal. Neither side is revealing the exact figure, but for a medium that's never sold at Sundance, it's still a very big deal, and one that demonstrates VR filmmaking has the clout and buzz of its traditional film predecessors. It might even show that 360-degree immersive films will one day be as big a part of festivals as movies themselves.

"This is a historic moment for the VR industry; it signifies that a viable storytelling medium has emerged," says Jess Engel, who produced Spheres along with Arnaud Colinart, and Dylan Golden. "Deals like this establish VR as its own marketplace for independent creators, producers, and investors."

The Sundance Film Festival is held in January in Park City, Utah.

Also at Variety, LA Times, and Engadget.

Original Submission

Read more of this story at SoylentNews.


Intel reportedly alerted Chinese companies before US Government about Meltdown and Spectre flaws "IndyWatch Feed Tech"

According to the Wall Stree Journal, Intel reportedly alerted Chinese companies before US Gov about Meltdown and Spectre vulnerabilities.

There is no peace for Intel, according to a report published by The Wall Street Journal the company warned Chinese tech giants about the Meltdown and Spectre vulnerabilities before notifying them to the US government.

Citing unnamed people familiar with the matter and some of the companies involved, The WSJ revealed that the list of Chinese companies includes Lenovo and Alibaba.

It is not clear when Intel notified the flaw to Lenovo, but a leaked memo from Intel to computer makers suggests the company reported the issues to an unnamed group of on November 29 via a non-disclosure agreement. The same day, the Intel CEO Brian Krzanich sold off his shares.

Last week, French tech publication LeMagITs Christophe Bardy disclosed the first page of the Technical Advisory issued by the Intel Product Security Incident Response Team.

Of course, security experts speculate the companies might have passed this information to the Chinese Government, but Alibaba spokesman refused any accusation.

I personally believe that the Chinese Government was informed by the companies about the Meltdown and Spectre vulnerabilities and it is disconcerting that the US intelligence agencies neither US CERTs were not aware of the flaws.

Meltdown Spectre patches

We also know that the Meltdown flaw is easy to exploit, this means that it is likely that threat actors might have triggered it to extract passwords and other sensitive data from a target machine. The situation is worrisome in cloud-computing environments were many customers share the same servers, in this scenario...


ILO Has Once Again Let Down Labour at the EPO by Siding With Union Busters "IndyWatch Feed Tech"

So much for Labour Org

ILO and Battistelli

Summary: ILO continues to protect Battistelli as the ILOAT fails to see a pretty blatant union-busting campaign for what it really is

THE EPO has already come under several legal actions in Dutch courts. It sometimes even refused to obey court orders from Dutch judges whilst attacking Dutch nationals like Elizabeth Hardon (an EPO staff representative). It was around that time that the EPO funneled money to better control (mislead/silence/bribe) Dutch media with FTI Consulting's outside help. Battistelli, in his typical fashion, sought to derail journalism (nowadays the EPO does the same to academia). He tried hard; he just flings EPO budget at whatever official he needs a vote from, so why not publications too?

FNV, which we mentioned here before [1, 2] (its mentioned a lot in Dutch articles), is in the news again [1, 2, 3, 4]. These articles are all in Dutch and they might be translated by SUEPO some time soon (into English and maybe French). An automated translation of the original from FNV says this: The FNV called Prime Minister Mark Rutte and Minister of Social Affairs and Employment Wouter Koolmees in a letter to intervene at...


The EPOs Central Staff Committee Explains How Battistellis Attacks on Judge Corcoran Annul Any Perception of Independence "IndyWatch Feed Tech"

And the German Constitutional Court should thus can the UPC

Fair trial

Summary: The letter regarding the exile of Patrick Corcoran (currently in DG1) is trickling out in spite of efforts to suppress its publication (even internally)

THE staff representatives of the EPO have plenty to worry about because ILO and the AC remain in Battistellis pocket and he seems capable of doing whatever he wants without any consequences.

A report which we saw last week mentioned a letter regarding the forced removal (exile) of a judge to The Hague, under the direction (his DG!) of Battistelli. Since then we have tried getting hold of that letter, hoping someone will eventually send it to us.

The EPO is currently censoring the publication on the Intranet of a CSC open letter to the Delegations of the AC, SUEPO wrote. Following a request from the CSC we hereby publish the letter with its accompanying text.

So here we have censorship by the EPO yet again. Heres the accompanying text:

AC Disciplinary Case [D1/15] settled?

In its Communiqu of 19 December 2017, the Administrative Council announced that it took a final decision in a disciplinary case [D1/15] against an employee appointed by the Council a case which had attracted significant public attention. and for which the ILO Administrative Tribunal already delivered Judgments 3958 and 3960 ordering the immediate reinstatement of the suspended member of the Boards of Appeal (BoA), whom the Council then declined to re-appoint. The employee was first reinstated in the BoA in Munich for a few days.

In January 2018, the Office informed him that he will be permanently transferred in February 2018 to a post of Senior Expert in Classification expressly created for him in The Hague, pursuant to Art. 41(3) ServRegs.

However, the employee never performed classification work and is instead specialised in substantive examination and legal matters. The assignment to completely new duties is clearly against the interests of the service and betrays the aim of the Office Administration: impose a further covert disciplinary sanction and ultimately engineer a situation of constructive dismissal for professional incompetence under Art. 52 ServRegs.

This decision will reopen the discussion on a case meant to be settled.

In its Communiqu, the Council underlined its expectation that now after a long period of intense debate lega...


Astronauts Can Look Forward to Eating Their Own Waste Converted Into a "Smear of 'Microbial Goo'" "IndyWatch Feed Tech"

Microbes may help astronauts transform human waste into food

Human waste may one day be a valuable resource for astronauts on deep-space missions. Now, a Penn State research team has shown that it is possible to rapidly break down solid and liquid waste to grow food with a series of microbial reactors, while simultaneously minimizing pathogen growth.

"We envisioned and tested the concept of simultaneously treating astronauts' waste with microbes while producing a biomass that is edible either directly or indirectly depending on safety concerns," said Christopher House, professor of geosciences, Penn State. "It's a little strange, but the concept would be a little bit like Marmite or Vegemite where you're eating a smear of 'microbial goo.'"

[...] "Each component is quite robust and fast and breaks down waste quickly," said House. "That's why this might have potential for future space flight. It's faster than growing tomatoes or potatoes."

Today, astronauts aboard the International Space Station recycle a portion of water from urine, but the process is energy intensive, said House. Solid waste management has been a bigger hurdle. This currently is ejected into the Earth's atmosphere where it burns up.

"Imagine if someone were to fine-tune our system so that you could get 85 percent of the carbon and nitrogen back from waste into protein without having to use hydroponics or artificial light," said House. "That would be a fantastic development for deep-space travel."

Coupling of anaerobic waste treatment to produce protein- and lipid-rich bacterial biomass (DOI: 10.1016/j.lssr.2017.07.006) (DX)

Original Submission

Read more of this story at SoylentNews.


The Engineering Case for Fusing Your LED Strips "IndyWatch Feed Tech"

Modern LED strips are magical things. The WS2812 has allowed the quick and easy creation of addressable RGB installations, revolutionizing the science of cool glowy things. However, this accessibility means that its easy to get in over your head and make some simple mistakes that could end catastrophically. [Thomas] is here to help, outlining a common mistake made when building with LED strips that is really rather dangerous.

The problem is the combination of hardware typically used to run these LED strings. Theyre quite bright and draw significant amounts of power, each pixel drawing up to 60 mA at full-white. In a string of just 10 pixels, the strip is already drawing 600 mA. For this reason, its common for people to choose quite hefty power supplies that can readily deliver several amps to run these installations.

Its here that the problem starts. Typically, wires used to hook up the LED strips are quite thin and the flex strips themselves have a significant resistance, too. This means its possible to short circuit an LED strip without actually tripping the overcurrent protection on something like an ATX power supply, which may be fused at well over 10 amps. With the resistance of the wires and strip acting as a current limiter, the strip can overheat to the point of catching fire while the power supply happily continues to pump in the juice. In a home workshop under careful supervision, this may be a manageable risk. In an unattended installation, things could be far worse.

Thankfully, the solution is simple. By installing an appropriately rated fuse for the number of LEDs in the circuit, the installation becomes safer, as the fuse will burn out under a short circuit condition even if the power supply is happy to supply the current. With the example of 10 LEDs drawing 600 mA, a 1 amp fuse would do just fine to protect the circuit in the event of an accidental short.

Its a great explanation of a common yet dangerous problem, and [Thomas] backs it up by using a thermal camera to illustrate just how hot things can get in mere seconds. Armed with this knowledge, you can now safely play with LEDs instead of fire. But now that youre feeling confident, why not check out these eyeball-searing 3 watt addressable LEDs?





Why Elon Musk is selling flamethrowers "IndyWatch Feed Tech"

Elon Musks latest product is the next in a long line of PR stunts for companies like Tesla, The Boring Company and more.


Authentication Today: Moving Beyond Passwords "IndyWatch Feed Tech"

Submitted via IRC for TheMightyBuzzard

A global study from IBM Security examining consumer perspectives around digital identity and authentication today, found that people now prioritize security over convenience when logging into applications and devices.

Generational differences also emerged showing that younger adults are putting less care into traditional password hygiene, yet are more likely to use biometrics, multifactor authentication and password managers to improve their personal security.

With millennials quickly becoming the largest generation in today's workforce, these trends may impact how employers and technology companies provide access to devices and applications in the near future. Overall, respondents recognized the benefits of biometric technologies like fingerprint readers, facial scans and voice recognition, as threats to their digital identity continue to mount.


Original Submission

Read more of this story at SoylentNews.


[SECURITY] [DSA 4098-1] curl security update "IndyWatch Feed Tech"

Posted by Alessandro Ghedini on Jan 29

Debian Security Advisory DSA-4098-1 security () debian org Alessandro Ghedini
January 26, 2018

Package : curl
CVE ID : CVE-2018-1000005 CVE-2018-1000007...


[security bulletin] HPESBHF03811 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Multiple Vulnerabilities "IndyWatch Feed Tech"

Posted by security-alert on Jan 29


Document ID: hpesbhf03811en_us
Version: 1

HPESBHF03811 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date:...


[slackware-security] mozilla-thunderbird (SSA:2018-025-01) "IndyWatch Feed Tech"

Posted by Slackware Security Team on Jan 29

[slackware-security] mozilla-thunderbird (SSA:2018-025-01)

New mozilla-thunderbird packages are available for Slackware 14.2 and -current
to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
patches/packages/mozilla-thunderbird-52.6.0-i586-1_slack14.2.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:...


Secunia Research: LibRaw Multiple Denial of Service Vulnerabilities "IndyWatch Feed Tech"

Posted by Secunia Research on Jan 29


Secunia Research 2018/01/29

LibRaw Multiple Denial of Service Vulnerabilities

Table of Contents

Affected Software....................................................1...


[SECURITY] [DSA 4099-1] ffmpeg security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jan 29

Debian Security Advisory DSA-4099-1 security () debian org Moritz Muehlenhoff
January 27, 2018

Package : ffmpeg
CVE ID : CVE-2017-17081



Artificial Intelligence May Have Cracked Freaky 600-Year-Old Manuscript "IndyWatch Feed Tech"

The Vonyich manuscript (Image: Beinecke Rare Book & Manuscript Library, Yale University) Since its discovery over a hundred years ago, the 240-page Voynich manuscript, filled with seemingly coded language and inscrutable illustrations, of has confounded linguists and cryptographers. Using artificial intelligence, Canadian researchers have taken a huge step forward in unraveling the documents hidden meaning. Named after Wilfrid Voynich, the Polish book dealer who procured the manuscript in 1912, the document is written in an unknown script that encodes an unknown languagea double-whammy of


[security bulletin] HPESBHF03812 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Multiple Vulnerabilities "IndyWatch Feed Tech"

Posted by security-alert on Jan 29


Document ID: hpesbhf03812en_us
Version: 1

HPESBHF03812 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date:...


[security bulletin] HPESBHF03814 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Unauthorized Modification "IndyWatch Feed Tech"

Posted by security-alert on Jan 29


Document ID: hpesbhf03814en_us
Version: 1

HPESBHF03814 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Unauthorized Modification

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date:...


[SYSS-2017-026] Microsoft Surface Hub Keyboard - Cryptographic Issues (CWE-310), Insufficient Protection against Replay Attacks "IndyWatch Feed Tech"

Posted by matthias . deeg on Jan 29

Advisory ID: SYSS-2017-026
Product: Microsoft Surface Hub Keyboard
Manufacturer: Microsoft
Affected Version(s): n/a
Tested Version(s): n/a
Vulnerability Type: Cryptographic Issues (CWE-310)
Insufficient Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2017-10-20
Solution Date: -
Public Disclosure: 2018-01-29
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg...


[SECURITY] [DSA 4100-1] tiff security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jan 29

Debian Security Advisory DSA-4100-1 security () debian org Moritz Muehlenhoff
January 27, 2018

Package : tiff
CVE ID : CVE-2017-9935 CVE-2017-11335...


[SECURITY] [DSA 4101-1] wireshark security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jan 29

Debian Security Advisory DSA-4101-1 security () debian org Moritz Muehlenhoff
January 28, 2018

Package : wireshark
CVE ID : CVE-2018-5334 CVE-2018-5335...


KL-001-2018-001 : Sophos Web Gateway Persistent Cross Site Scripting Vulnerability "IndyWatch Feed Tech"

Posted by KoreLogic Disclosures on Jan 29

KL-001-2018-001 : Sophos Web Gateway Persistent Cross Site Scripting Vulnerability

Title: Sophos Web Gateway Persistent Cross Site Scripting Vulnerability
Advisory ID: KL-001-2018-001
Publication Date: 2018.01.26
Publication URL:

1. Vulnerability Details

Affected Vendor: Sophos
Affected Product: Web Gateway
Affected Version: 4.4.1
Platform: Embedded Linux...


[security bulletin] HPESBHF03810 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Disclosure of Information "IndyWatch Feed Tech"

Posted by security-alert on Jan 29


Document ID: hpesbhf03810en_us
Version: 1

HPESBHF03810 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date:...


[security bulletin] HPESBHF03813 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution "IndyWatch Feed Tech"

Posted by security-alert on Jan 29


Document ID: hpesbhf03813en_us
Version: 1

HPESBHF03813 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24...


[security bulletin] HPESBHF03808 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution "IndyWatch Feed Tech"

Posted by security-alert on Jan 29


Document ID: hpesbhf03808en_us
Version: 1

HPESBHF03808 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24...


[security bulletin] HPESBHF03815 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution "IndyWatch Feed Tech"

Posted by security-alert on Jan 29


Document ID: hpesbhf03815en_us
Version: 1

HPESBHF03815 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-01-24...


Advances in Lasers Get to the Long and Short of it "IndyWatch Feed Tech"

A new way of modifying the dipole moment of cholesteric liquid crystals allows for researchers to select between the different band-edge modes experimentally for the first time.

Since lasers were first developed, the demand for more adaptable lasers has only increased. Chiral nematic liquid crystals (CLCs) are an emerging class of lasing devices that are poised to shape how lasers are used in the future because of their low thresholds, ease of fabrication, and ability to be tuned across wider swaths of the electromagnetic spectrum. New work on how to select band-edge modes in these devices, which determine the lasing energy, may shine light on how lasers of the future will be tuned.

The laser cavities are formed of a chiral nematic liquid crystal doped with a fluorescent dye. The liquid crystal creates a photonic bandgap in the laser cavity. An international team of researchers demonstrated a technique that allows the laser to electrically switch emission between the long- and short-wavelength edges of the photonic bandgap simply by applying a voltage of 20 V. They report their work this week in Applied Physics Letters, from AIP Publishing.

"Our contribution is to find a way to change the orientation of the transition dipole moment of the gain medium [the fluorescent dye] in the CLC structure and achieve mode selection between long- and short-wavelength edges without tuning the position of the photonic bandgap," said Chun-Ta Wang, an author of the paper. "We also demonstrated a polymer-stabilized CLC system, which improved the laser's stability, lasing performance and threshold voltage."

CLC lasers work through a collection of liquid crystals that self-assemble into helix-shaped patterns, which then act as the laser's cavity. These helices are chiral, meaning they corkscrew in the same direction, which allows them to be tuned across a wide range of wavelengths. While many lasers, like the laser diodes used in DVD players, are fixed at one color, many CLC lasers can be tuned to multiple colors in the visible light spectrum and beyond.

Chun-Ta Wang, Chun-Wei Chen, Tzu-Hsuan Yang, Inge Nys, Cheng-Chang Li, Tsung-Hsien Lin, Kristiaan Neyts and Jeroen Beeckman. Electrically assisted bandedge mode selection of photonic crystal lasing in chiral nematic liquid crystals. Applied Physics Letters Jan. 22, 2018 (DOI: 10.1063/1.5010880.



Dr. Martin Pall, Ph.D.: Electromagnetic Field Exposure The Cellular Effect on Humans "IndyWatch Feed Tech"

Id like for someone to convince me that Dr. Pall is wrong, or making a mountain out of a molehill, etc. Does anyone out there want to attempt to refute what hes saying? Electromagnetic fields act via activation of voltage-gated calcium channels to produce beneficial or adverse effects by Martin L Pall Research []


Looking Back at Microsoft Bob "IndyWatch Feed Tech"

Every industry has at least one. Automobiles had the Edsel. PC Hardware had the IBM PCJr and the Microchannel bus. In the software world, theres Bob. If you dont remember him, Bob was Microsofts 1995 answer to why computers were so darn hard to use. [LGR] gives us a nostalgic look back at Bob and concludes that we hardly knew him.

Bob altered your desktop to be a house instead of a desk. He also had helpers including the infamous talking paper clip that suffered slings and arrows inside Microsoft Office long after Bob had been put to rest.

Microsoft had big plans for Bob. There was a magazine and add-on software (apparently there was only one title released). Of course, if you want to install Bob yourself, youll need to boot Windows 3.1 this is 1995, remember.

To log in you had to knock on the big red door and then tell the helpful dog all your personal information. Each user had a private room and all users would share other rooms.

We like to feature retrocomputing of the great old computers of our youth. This is kind of the anti-example of this. Bob was a major fail. PC World awarded it 7th place in the 25 worst tech products of all time and CNet called it the number one worst product of the decade.

Once youve had enough of 1995 failed software, you can always read up on some more successful Z80 clones. Or you can further back in the way back machine and see what user interfaces were like in the 1960s and 1970s.


15 Years of Multiverse Mania "IndyWatch Feed Tech"

Today is the 15th anniversary of the event that kicked off the Multiverse Mania that continues to this day, recently taking the form of a concerted attack on conventional notions of science. 2018 has seen an acceleration of this attack, with the latest example appearing this weekend.

On January 29, 2003, Kachru, Kallosh, Linde and Trivedi submitted a paper to the arXiv that outlined a construction of a supposed model of a metastable string theory state that had all moduli fixed. Ever since the first explosion of interest in string theory unification in 1984-5, it had been clear that a big problem with using string theory to get anything that looks like known physics was the so-called moduli problem. If you try and use 10d superstring theory to describe our universe, you need to somehow hide six of the dimensions, and the best way to do that seemed to be to argue that superstring theory implied one could do this by compactifying on an unobservably small approximately Calabi-Yau manifold. Such manifolds however come in families labeled by moduli parameters, which can be thought of as describing the size and shape of the Calabi-Yau. These moduli will show up as zero mass fields generating new long-range forces unless some dynamical mechanism could be found to fix their values. It was this that KKLT claimed to have found. I wont even try to describe the complex KKLT proposal, which was aptly described by Lenny Susskind as a Rube Goldberg mechanism.

What string theorists had been hoping for was a moduli stabilization mechanism that would pick out specific moduli field values, getting rid of the unwanted dozens of new long-range forces and providing a way to make physical predictions. While the KKLT mechanism got rid of the unwanted forces, it had been observed three years earlier by Bousso and Polchinski, working with just parts of the Rube Goldberg mechanism, that this sort of thing led to not one specific value of the moduli fields, but an exponentially large number of possibilities. They had noted that this could allow an anthropic solution to the cosmological constant problem, and the KKLT fixing of all the moduli provided a model that accomplished this (without the long range forces).


Btrfs Gets More RAID 5/6 Fixes In Linux 4.16 "IndyWatch Feed Tech"

The Btrfs file-system updates were mailed in and subsequently pulled today to the mainline tree for the Linux 4.16 kernel merge window...


Surprising Discovery Links Sour Taste to the Inner Ear's Ability to Sense Balance "IndyWatch Feed Tech"

Scientists at the USC Dornsife College of Letters, Arts and Sciences have discovered an entirely new class of ion channels. These channels let protons (H+ ions) into cells, are important in the inner ear for balance, and are present in the taste cells that respond to sour flavors.

The findings were published Thursday, Jan. 25 in Science.

Protons control whether a solution is acidic or basic. They set pH. Not surprisingly, protons do not cross cell membranes; they must be transported across the membrane through special proteins like ion channels.

Although a gene encoding an ion channel that lets protons leave cells has been identified, whether one gene or several genes were necessary to form an ion channel that lets protons into cells was unknown. Now, research into sour taste has identified the otopetrin family of genes as encoding proton-conducting ion channels.

[...] "We never in a million years expected that the molecule that we were looking for in taste cells would also be found in the vestibular system," Liman said. "This highlights the power of basic or fundamental research."

Source: ScienceDaily

Yu-Hsiang Tu, Alexander J. Cooper, Bochuan Teng, B. Rui Chang, Daniel J. Artiga, Heather N. Turner, Eric M. Mulhall, Wenlei Ye, Andrew D. Smith, Emily R. Liman. An evolutionarily conserved gene family encodes proton-selective ion channels. Science, 2018; eaao3264 DOI: 10.1126/science.aao3264

Original Submission

Read more of this story at SoylentNews.


Robotic Habitats imagines a self-sustaining AI ecosystem "IndyWatch Feed Tech"

As artificial intelligence advances at an unprecedented pace, we tend to see its arrival in emotional terms usually, either excitement or fear. But Noumena, a collective of designers, engineers and architects, is looking at AI and robots more practically. What form will they take, how will they survive and develop, and where will they live? It aims to explore those idea with an exhibition entitled Robotic Habitats.

Noumenas project assumes that deep learning systems will grow out of their narrow Go-playing abilities and soon match humans at many, if not most, tasks. While that would put them on par with us, it doesnt mean they would live the same way, though. Society will need to develop a framework for both to thrive, explains Neumena on its website. A new form of artificial life will emerge, finding space at the peripheries of humanity in order to not compete for human-dominated resources.


Holy Grail of dinosaur fossils discovered in Egyptian desert "IndyWatch Feed Tech"

A new species of dinosaur has been uncovered in the Egyptian desert, a rare discovery in a part of the world not known for dino fossils.

The huge animal, which was roughly the size of a school bus, is an incredible discovery, scientists said in a new study that was published Monday.

This was the Holy Grail a well-preserved dinosaur from the end of the age of dinosaurs in Africa that we paleontologists had been searching for for a long, long time, said Matt Lamanna of the Carnegie Museum of Natural History in Pittsburgh, one of the authors of the study.


When Trading Track Records Means Less Privacy "IndyWatch Feed Tech"

Sharing your personal fitness goalslowered heart rates, accurate calorie counts, jogging times, and GPS pathssounds like a fun, competitive feature offered by todays digital fitness trackers, but a recent report from The Washington Post highlights how this same feature might end up revealing not just where you are, where youve been, and how often youve traveled there, but sensitive national security information.

According to The Washington Post report, the fitness tracking software company Stravawhose software is implemented into devices made by Fitbit and Jawboneposted a heat map in November 2017 showing activity of some of its 27 million users around the world. Unintentionally included in that map were the locations, daily routines, and possible supply routes of disclosed and undisclosed U.S. military bases and outposts, including what appear to be classified CIA sites.

Though the revealed information itself was anonymizedmeaning map viewers could not easily determine identities of Strava customers with the map alonewhen read collectively, the information resulted in a serious breach of privacy.

 Shared on Twitter, the map led to several discoveries, the report said.

Adam Rawnsley, a Daily Beast journalist, noticed a lot of jogging activity on the beach near a suspected CIA base in Mogadishu, Somalia.

Another Twitter user said he had located a Patriot missile system site in Yemen.

Ben Taub, a journalist with the New Yorker, homed in on the location of U.S. Special Operations bases in the Sahel region of Africa.

On Monday, according to a follow-up report by The Washington Post, the U.S. military said it was reviewing guidelines on how it uses wireless devices.

As the Strava map became more popular, the report said, Internet users were able to further de-anonymize the data, pairing it to information on Stravas website.



Intel Informed Chinese Companies of Meltdown Bug Before the U.S. Government "IndyWatch Feed Tech"

Intel informed Chinese companies, including Lenovo and Alibaba, of the Meltdown and Spectre flaws in its processors before the U.S. government found out from reading press reports:

Intel Corporation initially warned a handful of customers, including several Chinese technology firms, about security flaws within its processor chips, while at the same time not telling the U.S. government, The Wall Street Journal reported Sunday.

Security experts told the newspaper that the decision could have allowed Chinese tech companies to flag the vulnerabilities to Beijing, giving the Chinese government opportunity to exploit them.

Jake Williams, head of the security company Rendition Infosec and former National Security Agency (NSA) employee, told the Journal that it is a "near certainty" the Chinese government knew about the flaws from the Intel correspondence with Chinese tech companies, as Beijing keeps tabs on such communications.

The Journal reported that Alibaba Group, a top selling Chinese cloud-computing services company, was among the firms notified of the flaw early on.

The NSA is more likely to spy on you than China.

Intel CEO sold shares on same day OEMs informed of bugs: report

Also at TechCrunch and Engadget.

Original Submission

Read more of this story at SoylentNews.


New Part Day: I2C In, Charlieplexed LEDs Out "IndyWatch Feed Tech"

It seems that most of the electrical engineering covered on Hackaday concerns exactly one problem domain: how to blink a bunch of LEDs furiously. There are plenty of LED drivers out there, but one of the more interesting in recent memory came from ISSI in the form of a chip that turns I2C into a Charlieplexed LED array. You may have seen this chip the IS31FL3731 in the form of an Adafruit LED matrix and some stupid thing some idiot made, but with it youre only ever going to get 144 LEDs in an array, not enough if you want real blinky bling.

Now ISSI has released a more capable chip that turns I2C into many more Charlieplexed LEDs. The IS31FL3741 will drive up to 351 LEDs in a 399 matrix, or if youre really clever, an 1818 single color LED matrix.

Features of this chip include reverse/short detection for each individual LED, 8-bit PWM, dimming functions, a de-ghosting feature that guarantees a LED is either on or off, a configurable row/column matrix, and a few other handy tools that you would like to see in a LED matrix driver chip. The most impressive chip in this series will be available for under $2/piece in quantities of 2500, although unlike the IS31FL3731, it appears this new chip will only be available in a QFN package.

Speaking from experience, this is a really great chip for driving a whole boatload of LEDs, provided you have a pick and place machine. Yes, you can hand-solder a QFN and several hundred 0402 LEDs, but I wouldnt recommend it. I really, really wouldnt recommend it. That said, this is the perfect chip for maximum blinky bling, and the press material from ISSI gives us the great idea of using one of these chips as the backlight controller for RGB LED mechanical keyboards. Thats a great application, and the chip is pretty cheap, too.

You can check out ISSIs blinky demo video of this chip below.


HPR2477: Reading Audio Books While Distracted "IndyWatch Feed Tech"

Just a quick and dirty episode on my attempt to solve the problem of listening to audio books at work or anytime you can't fully concentrate on the important thing, the audio book, of course. Problem I have more time to listen to books than to read them. I have no issues listening to audio books on my commute or when taking walks. The problem occurs at work. I have about 4 hours a day I could be listening to audio books. Over the years I've tried countless times, all with the same result. I get distracted by work and find I've missed key parts of the story and end up listening to music or podcasts I don't mind missing instead. There's nothing wrong with music or podcasts I don't mind missing but that doesn't help with my growing list of books I want to 'read'. I decided to treat this like a regular problem and break it down to see if I can find a solution to this problem. Here are the variable I have to play with. These might be different for you. Book in one file or broken into chapters Listening speed Design goals Be able to listen to an audio book and have reasonable comprehension. Super Simple. I can't be seen as messing around with my player more than whatever it is that's keeping me from my player :) Normally I listen to books in one large file because at one point in time it was easier for me to keep track of them in my player and bookmarking was easier for my little brain to handle. But I got to thinking this might solve the problem of wasted time when needing to repeat sections of the book. If the book were broken into pieces, I wouldn't need to repeat as often. I tried listening to 3 chapters at a time and had two issues. The first is that 3 chapters is still quite a bit of time and I was repeating sections I didn't need to repeat. For example, I might have been able to follow along with chapter 1 but not chapters 2 and 3. This meant repeating chapter 1 or messing around to manually skip chapter 1 when I repeat. Not good. The second issue I had when listening to 3 chapter chunks was spoilers. If I got distracted during chapter 1 but not chapter 3, chapter 3 would contain spoilers for chapter 1 and chapter 1 would be spoiled on the re-listen :) Solution As it turns out listening in 1 chapter chunks solved both of these issues. So now I play one chapter on a loop until I feel I comprehend it well enough and then move to the next. This reduces the time when I need to re-listen because I was distracted and is simple because I only need to mess with the player when I'm ready to move to the next chapter. It also reduces the spoiler issue. While there are still spoilers, they are limited to spoiling the same chapter. A good enough compromise for me. As far as playback speed goes, I like to speed audio up when I can concentrate on the audio but prefer to listen at normal speed when I can't. Other considerations Some content might lend itself more to being broken into chunks by time rather than chapters. After all, not all c......


House chair hits reports of Intel notifying Chinese firms about chip vulnerabilities before US "IndyWatch Feed Tech"

House Energy and Commerce Committee Chairman Greg Walden (R-Ore.) said Monday that reports about Intel notifying Chinese companies about major chip vulnerabilities before the U.S. government were troublesome."If true, I think The Wall Street...


Overnight Tech: White House says 'no decisions made' on 5G network takeover | Plan sparks broad pushback | Facebook's privacy changes | Crypto exchange under scrutiny after massive theft "IndyWatch Feed Tech"

WHITE HOUSE: 'NO DECISIONS' ON 5G: The White House said Monday there had been "no decisions" made about creating a nationalized 5G broadband network after reports about the proposal sparked fierce blowback."Right now we're in the very earliest...


It's Time to Make Student Privacy a Priority "IndyWatch Feed Tech"

Last month, the Federal Trade Commission and the U.S. Department of Education held a workshop in Washington, DC. The topic was Student Privacy and Ed Tech. We at EFF have been trying to get the FTC to focus on the privacy risks of educational technology (or ed tech) for over two years, so we eagerly filed formal comments.

Weve long been concerned about how technology impacts student privacy. As schools and classrooms become increasingly wired, and as schools put more digital devices and services in the hands of students, weve been contacted by a large number of concerned students, parents, teachers, and even administrators.

They want to know: What data are ed tech providers collecting about our kids? How are they using it? How well do they disclose (if at all) the scope of their data collection? How much control (if any) do they give to schools and parents over the retention and use of the data they collect? Do they even attempt to obtain parental consent before collecting and using incredibly sensitive student data?

In the spring of 2017, we released the results of a survey that we conducted in order to plumb the depths of the confusion surrounding ed tech. And as it turns out, students, parents, teachers, and even administrators have lots of concernsand very little clarityover how ed tech providers protect student privacy.

Drawing from the results of our survey, our comments to the FTC and DOE touched on a broad set of concerns:

  • The FTC has ignored our student privacy complaint against Google. Despite signing a supposedly binding commitment to refrain from collecting student data without parental consent beyond that needed for school purposes, Google openly harvests student search and browsing behavior, and uses that data for its own purposes. We filed a formal complaint with the FTC more than two years ago but have heard nothing back.
  • There is a consist...


Yaghmour: Ten Days in Shenzhen "IndyWatch Feed Tech"

On his blog, embedded developer Karim Yaghmour has written about his ten-day trip to Shenzen, China, which is known as the "Silicon Valley of hardware". His lengthy trip report covers much that would be of use to others who are thinking of making the trip, but also serves as an interesting travelogue even for those who are likely to never go. "The map didn't disappoint and I was able to find a large number of kiosks selling some of the items I was interested in. Obviously many kiosks also had items that I had seen on Amazon or elsewhere as well. I was mostly focusing on things I hadn't seen before. After a few hours of walking floors upon floors of shops, I was ready to start focusing on other aspects of my research: hard to source and/or evaluate components, tools and expanding my knowledge of what was available in the hardware space. Hint: TEGES' [The Essential Guide to Electronics in Shenzhen] advice about having comfortable shoes and comfortable clothing is completely warranted. Finding tools was relatively easy. TEGES indicates the building and floor to go to, and you'll find most anything you can think of from rework stations, to pick-and-place machines, and including things like oscilloscopes, stereo microscopes, multimeters, screwdrivers, etc. In the process I saw some tools which I couldn't immediately figure out the purpose for, but later found out their uses on some other visits. Satisfied with a first glance at the tools, I set out to look for one specific component I was having a hard time with. That proved a lot more difficult than anticipated. Actually I should qualify that. It was trivial to find tons of it, just not something that matched exactly what I needed. I used TEGES to identify one part of the market that seemed most likely to have what I was looking for, but again, I could find lots of it, just not what I needed."


Godot 3.0 Open-Source Game Engine Released "IndyWatch Feed Tech"

The open-source game engine developers behind the huge Godot 3.0 update out before the end of January as planned...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 29 January


Jackpotting attacks hit U.S. ATMs; spit out cash in seconds "IndyWatch Feed Tech"

By Waqas

Jackpotting is an attack/technique to exploit ATMs to make them dispense

This is a post from Read the original post: Jackpotting attacks hit U.S. ATMs; spit out cash in seconds


ATM Makers Warn of 'Jackpotting' Hacks on U.S. Machines "IndyWatch Feed Tech"

Diebold Nixdorf Inc and NCR Corp, two of the world's largest ATM makers, have warned that cyber criminals are targeting U.S. cash machines with tools that force them to spit out cash in hacking schemes known as "jackpotting."

The two ATM makers did not identify any victims or say how much money had been lost. Jackpotting has been rising worldwide in recent years, though it is unclear how much cash has been stolen because victims and police often do not disclose details.

The attacks were reported earlier on Saturday by the security news website Krebs on Security, which said they had begun last year in Mexico.

The companies confirmed to Reuters on Saturday they had sent out the alerts to clients.

Source: Reuters

Article at Krebs on Security.

Original Submission

Read more of this story at SoylentNews.


Browserling has helped Cameroonians restore Internet freedom "IndyWatch Feed Tech"

Last month Cameroonians discovered that they could use Browserling to easily bypass government censorship and get back online and use social media websites. I did a write-up about it in my previous blog post.

Today I heard from Godwill and my other new Cameroonian friends that the government has lifted the censorship and they have full access to all websites. I'm happy I was able to help Cameroonians at least a little bit to restore their Internet freedom.

Go237 service and Godwill Tetah, local Cameroon tech leader.

Until next time!


#ThinkBeyond Security solutions from market leaders may all fail in your particular environment "IndyWatch Feed Tech"

Buying solutions proposed by analyst firms without carefully analyzing your organization expose it to cyber threats. Its time to #ThinkBeyond this broken paradigm.

The cybersecurity market is expected to double by 2022, analysts estimated the growth could reach three hundred thousand dollars, at a Compound Annual Growth Rate (CAGR) of 11.0%. In the same period, the number of cyber attacks are expected to increase, hackers will adopt new sophisticated techniques while the surface of attacks of companies and organizations is enlarging due to the adoption of paradigms such as the Internet of Things, Cloud computing, and mobile computing.

Another important element that will characterize the next months it the adoption of new regulations and directives, such as the GDPR and the NIS directive, that will influence the evolution of the market.

Businesses will face the perfect storm, the ideal condition for security firms that continue to develop new solutions designed to cover a specific portion of the market instead of responding to the real needs for cyber security of their customers.

The increasing number of successful cyber attacks and the daily security breaches reported by experts demonstrate that most of the companies are still far from an adequate security posture.

In origin it was mainly a problem of awareness on cyber threats, but now the critical issue is represented by the ability of businesses and decision makers in buying security solutions that match their needs.

The purchase of a new security solution or a service is often driven by the recommendations of analysts that produce any kind of report to influence the final decision of the management and the IT staff.

The emulation is part of the human nature, for C-Level personnel is easy to select their business partners by choosing them from the companies listed in authoritative studies and publications such as the Gartner Magic Quadrant.

Evidently, this approach is not sufficient to ensure the resilience to cyber attacks of a modern business.

In many cases the same security companies suggested by these reports were involved in embarrassing incidents, this is the case of the accountancy firm Deloitte that was awarded as the best Security Consulting Services providers by Gartner, but that was victims itself of a sophisticated hack that compromised its global email server in 2016.

These studies could influence a blind and an unaware choice of security solutions, they could give businesses a false sense of security.

It is absurd to compose a security infrastructure only by implementing the recommendations of the analyst firms while the events in the threat landscape demonstrate that such an approach is ruinous.



Linux kernel 4.15 has been released "IndyWatch Feed Tech"

From KernelNewbies


Summary: Besides the latest code to deal with Meltdown/Spectre, this release includes modesetting and advanced display features for the amdgpu driver; improved power management support of systems with SATA Aggressive Link Power Management; a port for the open RISC-V CPUs; initial support for virtualized memory encryption in AMD CPUs; support for the Intel User Mode Instruction Prevention feature; support of the CPU controller in cgroups v2; a new mmap(2) flag to allow direct writes to persistent memory managed by filesystems; and many new drivers and other improvements.


1.1. Meltdown/Spectre

A /sys/devices/system/cpu/vulnerabilities/ directory has been added that will show the vulnerabilities affecting your CPU and the mitigations being currently applied.


1.4. New architecture: RISC-V

This release includes the main parts of the port to RISC-V CPUs. RISC-V is an open instruction set architecture that, unlike proprietary CPUs, can be freely used for any purpose, permitting anyone to design, manufacture and sell RISC-V chips and software.

The port is definitely a work in progress. While builds and boots, it's a bit hard to actually see anything happen because there are no device drivers yet.
Have any LQ members updated to 4.15?



Links 29/1/2018: Parrot 3.11, OPNsense 18.1 "IndyWatch Feed Tech"

GNOME bluefish



  • Desktop

    • Advice for Buying and Setting Up Laptops When Youre Traveling or On-Call

      The key to a good on-call or travel laptop is to get something cheap. As computers have continued to get faster, the fact is that many people can get their general work done (especially in a pinch) with laptops that are many years old. This is especially true on a Linux desktop, even if you arent someone who spends a decent amount of time on a terminal.

      Used Thinkpads are a great choice for travel laptops, because they have good Linux compatibility and are rugged and easy to repair with replacement parts that are easy to find. Because so many organizations have used them as company laptops, you almost always can find a used one cheap on an auction site. Keep an eye out for a model that is listed as having no OS. Those laptops tend to be cheaper because people want to avoid having to install an OS, but as Linux users, we would just overwrite the OS anyway! Ive consistently found that if Im patient, I can get a Thinkpad with reasonable specs for less than $50 on auction sites. If you are willing to splurge on extra RAM or an SSD, these old machines can be surprisingly speedy.

      Another option, especially if you want a more portable laptop, is a Chromebook. Although these machines normally are designed to run a limited, secured OS that centers on Google services, they also can run Linux well once you switch into developer mode. Some peo...


Dridex banking Trojan and the FriedEx ransomware were developed by the same group "IndyWatch Feed Tech"

Security researchers from ESET have tied another family of ransomware, dubbed FriedEx (aka BitPaymer), to the authors of the Dridex Trojan.

The Dridex banking Trojan that has been around since 2014, it was involved in numerous campaigns against financial institutions over the years and crooks have continuously improved it.

In April 2017, millions of people were targeted by a phishing campaign exploiting a Microsoft Word 0day and aimed to spread the Dridex Banking Trojan, a few days ago security researchers at Forcepoint spotted a new spam campaign that is abusing compromised FTP servers as a repository for malicious documents and infecting users with the Dridex banking Trojan.

Now, security researchers from ESET have tied another strain of ransomware, dubbed FriedEx (aka BitPaymer), to the authors of the Dridex Trojan.

FriedEx was first spotted in July, and in August it was responsible for infections at NHS hospitals in Scotland.

The FriedEx ransomware was involved in attacks against high profile targets, researchers believe it was delivered via Remote Desktop Protocol (RDP) brute force attacks.

The ransomware encrypts each file using a randomly generated RC4 key that is then encrypted with a hardcoded 1024-bit RSA public key.

Initially dubbed BitPaymer, based on text in its ransom demand web site, this ransomware was discovered in early July 2017 by Michael Gillespie. In August, it returned to the spotlight and made headlines by infecting NHS hospitals in Scotland. states the analysis published by ESET.

FriedEx focuses on higher profile targets and companies rather than regular end users and is usually delivered via an RDP brute force attack. The ransomware encrypts each file with a randomly generated RC4 key, which is then encrypted using the hardcoded 1024-bit RSA public key and saved in the corresponding .readme_txt file.

The analysis of FriedEx code revealed...


Handheld device sequences human genome "IndyWatch Feed Tech"

Reading human DNA used to take laboratories, a pile of cash and a long time.


Diamonds show promise for spintronic devices "IndyWatch Feed Tech"

Conventional electronics rely on controlling electric charge. Recently, researchers have been exploring the potential for a new technology, called spintronics, that relies on detecting and controlling a particles spin. This technology could lead to new types of more efficient and powerful devices.

In a paper published in Applied Physics Letters, researchers measured how strongly a charge carriers spin interacts with a in diamond. This crucial property shows diamond as a promising material for spintronic devices.

Diamond is attractive because it would be easier to process and fabricate into spintronic devices than typical semiconductor materials, said Golrokh Akhgar, a physicist at La Trobe University in Australia. Conventional quantum devices are based on multiple thin layers of semiconductors, which require an elaborate fabrication process in an ultrahigh vacuum.


Repairs You Can Print: Take a deep breath thanks to a 3D printed fume extractor "IndyWatch Feed Tech"

If you are a maker, chances are that you will be exposed to unhealthy fumes at some point during your ventures. Whether they involve soldering, treating wood, laser cutting, or 3D printing, it is in your best interest to do so in a well ventilated environment. What seems like sound advice in theory though is unfortunately not always a given in practice in many cases, the workspace simply lacks the possibility, especially for hobbyists tinkering in their homes. In other cases, the air circulation is adequate, but the extraction itself could be more efficient by drawing out the fumes right where they occur. The latter was the case for [Zander] when he decided to build his own flexible hose fume extractor that he intends to use for anything from soldering to chemistry experiments.

Built around not much more than an AC fan, flex duct, and activated carbon, [Zander] designed and 3D printed all other required parts that turns it into an extractor. Equipped with a pre-filter to hold back all bigger particles before they hit the fan, the air flow is guided either through the active carbon filter, or attached to another flex duct for further venting. You can see more details of his build and how it works in the video after the break.

Workspace safety is often still overlooked by hobbyists, but improved air circulation doesnt even need to be that complex for starters. Theres also more to read about fumes and other hazardous particles in a maker environment, and how to handle them.


British cryptocurrency traders robbed of Bitcoin at gunpoint "IndyWatch Feed Tech"

Cryptocurrency heists are usually covert affairs that leave users with empty wallets, but not fearing for their life. Still, there are always some unlucky individuals who get the worst of everything. Case in point: Bitcoin traders Danny Aston and Amy Jay, who were robbed at gunpoint on January 22 in their home in Moulsford, Oxfordshire (UK). The two are directors of Aston Digital Currencies, and Aston traded cryptocurrency online under the pseudonym Goldiath. He has More


Distribution Release: Emmabunts 9-1.01 "IndyWatch Feed Tech"

Emmabunts is a desktop Linux distribution with editions based on based on Xubuntu and Debian's Stable branch. It strives to be beginner-friendly and reasonably light on resources so that it can be used on older computers. The project's latest release is based on Debian and includes several....


Montana to FCC: You Can't Stop Us From Protecting Net Neutrality "IndyWatch Feed Tech"

The Montana governor's office has a message for the Federal Communications Commission and Internet service providers: the state can't be stopped from protecting net neutrality, and ISPs that don't like it don't have to do business with state agencies.

Governor Steve Bullock signed an executive order to protect net neutrality on Monday, as we reported at the time. But with questions raised about whether Bullock is exceeding his authority, the governor's legal office prepared a fact sheet that it's distributing to anyone curious about potential legal challenges to the executive order.

ISPs are free to violate net neutrality if they only serve non-government customersthey just can't do so and expect to receive state contracts. "Companies that don't like it don't have to do business with the Statenothing stops ISPs from selling dumpy Internet plans in Montana if they insist," the fact sheet says.

The FCC's repeal of net neutrality rules attempts to preempt states and localities from issuing their own similar rules. But Bullock's executive order doesn't directly require ISPs to follow net neutrality rules. Instead, ISPs that accept contracts to provide Internet service to any state agency must agree to abide by net neutrality principles throughout the state.

Source: Ars Technica

Original Submission

Read more of this story at SoylentNews.


Block Updates Land In The Linux 4.16 Kernel "IndyWatch Feed Tech"

The block subsystem updates have now landed in Linus Torvalds' Git tree during the first full day of the Linux 4.16 kernel merge window...


Zuckerberg promises to show users more local news "IndyWatch Feed Tech"

Mark Zuckerberg said Monday that Facebook will now start showing users more local news stories in their feeds the latest in a string of reforms the company has announced this year.Local news helps build community  both on and offline,...


ICE Accesses a Massive Amount of License Plate Data. Will California Take Action? "IndyWatch Feed Tech"

The news that Immigrations & Customs Enforcement is using a massive database of license plate scans from a private company sent shockwaves through the civil liberties and immigrants rights community, who are already sounding the alarm about how mass surveillance will be used to fuel deportation efforts.

The concerns are certainly justified: the vendor, Vigilant Solutions, offers access to 6.5 billion data points, plus millions more collected by law enforcement agencies around the country. Using advanced algorithms, this informationoften collected by roving vehicles equipped with automated license plate readers (ALPRs) that scan every license plate they passcan be used to reveal a drivers travel patterns and to track a vehicle in real time.

ICE announced the expansion of its ALPR program in December, but without disclosing what company would be supplying the data. While EFF had long suspected Vigilant Solutions won the contract, The Verge confirmed it in a widely circulated story published last week.

In California, this development raises many questions about whether the legislature has taken enough steps to protect immigrants, despite passing laws last year to protect residents from heavy-handed immigration enforcement.

But California lawmakers should have already seen this coming. Two years ago, The Atlantic branded these commercial ALPR databases, an unprecedented threat to privacy.

Vigilant Solutions tells its law enforcement customers that accessing this data is as easy as adding a friend on your favorite social media platform. As a result, California agencies share their data wholesale with hundreds of entities, ranging from small towns in the Deep South to a variety of federal agencies.

An analysis by EFF of records obtained from local police has identified more than a dozen California agencies that have already been sharing ALPR data with ICE through their Vigilant Solutions accounts. The records show that ICE, through its Homeland Security Investigations offices in Newark, New Orleans, and Houston, has had access to data from more than a dozen California police departments for years.

At least one ICE office has access to ALPR data collected by the following police agencies:



White House says there are 'no decisions' yet on 5G network "IndyWatch Feed Tech"

The White House says it is in "the very earliest stages of the conversation" about a nationalized 5G broadband network, but the idea is already getting sharp pushback after a memo leaked showing the administration considering it.During a White House...


Bevy of Robot Swans Explore Singaporean Reservoirs "IndyWatch Feed Tech"

Swanbots monitor water quality while blending in with their surroundings Photo: NUS

When Singapore decided that they needed a new smart water assessment network to track pollution in their reservoirs, they obviously went with a robot, because otherwise you wouldnt be reading about it here. They also decided that the robot had to be aesthetically pleasing in order to promote urban livability. But how to do that?

The answer came from researchers at the National University of Singapore (NUS), who proposed developing a Smart Water Assessment Network: Yes, thats right, a SWAN.

In the past, water monitoring was done by humans in boats, which was time consuming and expensive. The NUSwan robots can autonomously putter about while measuring water characteristics, including pH, dissolved oxygen, turbidity, and chlorophyll. The data are wirelessly uploaded to the cloud to be analyzed in real time, so that whoever is in charge of whether Singapores water is drinkable or not can immediately be notified if it isnt.

Each robotic swan can do its business for several hours before heading back to home base to recharge, so a small team of them can trade off to monitor a reservoir continuously. In the future, the NUSwan robots could be trained to autonomously employ adaptive sampling techniques, dynamically updating their navigation plans to collect data most efficiently. The researchers also mention something about adding diving capability, which is fun to imagine.

The developers of the robots say that the NUSwans are sturdy enough to survive encounters with kayaks and small boats, which can only mean that the kayaks and small boats do not survive those encounters. In other words, mess with these robots at your peril, and in that respect, theyre just like real swans. And they do look just like real swans, convincingly enough that most people exploring Singapores u...


How to redirect standard error in bash "IndyWatch Feed Tech"

I am trying to redirect bash message into file named output.log. But, it is not getting redirected. How do I redirect both standard output and standard error in bash shell? In Linux, how do I redirect error messages? Standard error (also known as stderr) is the default error output device. Use stderr to write all Continue reading "How to redirect standard error in bash"

The post How to redirect standard error in bash appeared first on nixCraft.


3D Printed Battery Pack Keeps Old Drill Spinning "IndyWatch Feed Tech"

The greatest enemy of proprietary hardware and components is time. Eventually, that little adapter cable or oddball battery pack isnt going to be available anymore, and youre stuck with a device that you cant use. Thats precisely what happened to [Larry G] when the now antiquated 7.2V NiCd batteries used by his cordless drill became too hard to track down. The drill was still in great shape and worked fine, but he couldnt power the thing. Rather than toss a working tool, he decided to 3D print his own battery pack.

The 3D modeling on the battery pack is impeccable

He could have just swapped new cells into his old pack, but if youre going to go through all that trouble, why not improve on things a little? Rather than the NiCd batteries used by the original pack, this new pack is designed around readily available AA NiMH batteries. For the light repairs and craft work he usually gets himself into, he figures these batteries should be fine. Plus he already had them on hand, and as we all kno...


Jailhouse Guest Support To Be Included With Linux 4.16 "IndyWatch Feed Tech"

With Linux 4.16 is initial support for the Jailhouse hypervisor to support native Linux guests in non-root cells...


SpaceX's Falcon Heavy Demo Flight Set for Tuesday 2018-02-06 @ 1830-2130 UTC (1:30-4:30 p.m. EST) "IndyWatch Feed Tech"

Engadget is reporting that the Flacon Heavy demo flight has been scheduled:

It looks as though it's finally happening. SpaceX's Falcon Heavy rocket may have a launch date, according to Chris G. of The rocket will launch no earlier than February 6th, with a window of 1:30 PM ET to 4:30 PM ET. There's a backup window on February 7th, just in case. We've reached out to SpaceX for confirmation.

Update 1/27: Elon Musk has confirmed that SpaceX is "aiming for" a February 6th launch.

Aiming for first flight of Falcon Heavy on Feb 6 from Apollo launchpad 39A at Cape Kennedy. Easy viewing from the public causeway.

Elon Musk (@elonmusk) January 27, 2018

Spaceflight Now has these launch details:

Launch window: 1830-2130 GMT (1:30-4:30 p.m. EST)
Launch site: LC-39A, Kennedy Space Center, Florida
A SpaceX Falcon Heavy rocket will launch on its first demonstration flight. The heavy-lift rocket is formed of three Falcon 9 rocket cores strapped together with 27 Merlin 1D engines firing at liftoff. The first Falcon Heavy rocket will attempt to place a Tesla Roadster on an Earth escape trajectory into a heliocentric orbit.

SpaceX Conducts Successful Static Fire Test of Falcon Heavy
SpaceX Falcon Heavy Testing Delayed by Government Shutdown
Falcon Heavy Readied for Static Fire Test
SpaceX's Falcon Heavy Rocket Sets Up at Cape Canaveral Ahead of Launch

SpaceX Successfully Tests Falcon Heavy First Stage Cores

Original Submission



African countries have taken the first major step towards cheaper continental flights By Yomi Kazeem | Quartz "IndyWatch Feed Tech"

Yesterday (Jan. 28), 23 African countries launched the Single African Air Transport Market (SAATM) initiative by the African Union (AU).

Read more


The OpenBSD Foundation 2018 Fundraising Campaign "IndyWatch Feed Tech"

Details of the 2018 campaign have been added to the Foundation's website. The goal for the year is for $300,000. The total for "smaller" donations has already taken the OpenBSD community to bronze level sponsorship!

Please show your support by contributing.


A Beam-Steering Antenna for 5G Mobile Phones "IndyWatch Feed Tech"

For the first time, a beam-steering antenna is integrated into the metal casing of a mobile phone Photo: Shanghai University/IEEE

5G report logo, link to report landing page

The final architecture of 5G cellular networks has yet to be carved in stone. However, it looks as though millimeter waves, with their ability to obtain wider bandwidths, will play an important role in 5Gthe next generation of mobile phones. The combination of these bands along withdirectional phased-array antennas, in which radio waves can be steered electronically in a desired direction, will constitute one of the key technologies in future 5G cellular systems.

While there have been a number of research efforts that have demonstrated that these phased-array antennas can be added into mobile phones using low-cost substrate boards, no one had demonstrated that its possible to build these antennas into phones with full metallic casings, as can be found in the high-end mobile devices from numerous manufacturers.

Now researchers from the Shanghai Institute for Advanced Communication and Data Science at Shanghai University in China have developed a 28 Gigahertz (GHz) beam-steering antenna array that can be integrated into the metallic casing of 5G mobile phones.

The antenna elements and arrays are easily integrated on the metallic frame or casing of a mobile phone, which is more suitable for industry mobile phone design, said Danny Yu, the lead author of the research in the journal I EEE Transactions on Antennas and Propagation . Compared to all other existing works for mm-Wave 28 GHz band, this work is totally unique in such a sense that it is very close to what th...


Lenovo Fingerprint Manager Pro is full of fail "IndyWatch Feed Tech"

Lenovo Fingerprint Manager Pro, a piece of software that allows users to log into their PCs or authenticate to configured websites using fingerprint recognition, has been found seriously wanting in the security department. The problems are several: the software contains a hard-coded password, and is accessible to all users with local non-administrative access to the system it is installed in. Also, the data it stores users Windows logon credentials and fingerprint data, among other More


GOP rep rejects idea of nationalizing 5G: 'We're not Venezuela' "IndyWatch Feed Tech"

Rep. Greg Walden (R-Ore.), the chairman of the House Energy and Commerce Committee, rejected the idea of nationalizing the countrys 5G network on Monday, following the leak of a White House memo that had floated the idea.Were not Venezuela we...


Development Release: Q4OS 3.1 Testing "IndyWatch Feed Tech"

Q4OS, a Debian-based distribution featuring the Trinity desktop environment, has launched a new development branch. The project's new testing branch, Q4OS 3.1 Testing, carries the code name "Centaurus" and uses packages from Debian's Testing "Buster" branch. "We introduce the initial development build of the new major Q4OS version....


The Challenges in High Volume Manufacturing of Photonic Devices for Data Center Applications "IndyWatch Feed Tech"

Photonic devices such as optical transceivers play vital roles in modern data centers. Demand for photonic devices is at an unprecedented level. And the technology upgrades are expected to happen at the same time of this volume ramp, e.g. 40G to 100G and to 200G/400G and beyond.

Internet traffic has been growing at an exponential level, continuously driven by video streaming, 3D imaging, IoT, VR/AR, and other emerging data applications. The data generated by internet traffic is enormous and data centers are crucial to support data communications, storage and processing through cloud computing. Photonic devices such as optical transceivers play vital roles in modern data centers. Demand for photonic devices is at an unprecedented level. And the technology upgrades to support this demand are expected to happen at the same time as this volume ramps, e.g. 40G to 100G and to 200G/400G and beyond.

These requirements have posed significant challenges to photonic device manufacturing. To support data center build-up, the photonic device companies need to maintain an elastic capacity model to respond fast to data center customers demands, and at the same time to maintain low manufacturing costs to produce profits. This calls for much higher levels of manufacturing automation than the photonic industry has ever experienced. In addition, the co-existence of many product standards requires that manufacturing automation is flexible to allow multiple products, e.g., single die Fabry-Perot (FP) laser submount and multiple die electro-absorption laser (EML) submount assembly, to go through the same production lines without sacrificing throughput. Furthermore, more and more advanced technologies demand higher and higher precision in assembly automations, again without sacrificing speed and throughput. High speed, high precision, and high flexibility for the high volume manufacturing of photonic devices require closer collaboration than ever between device designers, process developers, manufacturing engineers, and automation equipment suppliers. This webinar will discuss these trends, challenges, and opportunities.



Smaller and Smarter: The Electron Rocket Takes Flight "IndyWatch Feed Tech"

On January 21st, 2018 at 1:43 GMT, Rocket Labs Electron rocket lifted off from New Zealands Mahia Peninsula. Roughly eight minutes later ground control received confirmation that the vehicle entered into a good orbit, followed shortly by the successful deployment of the payload. On only their second attempt, Rocket Lab had become the latest private company to put a payload into orbit. An impressive accomplishment, but even more so when you realize that the Electron is like no other rocket thats ever flown before.

Not that you could tell from the outside. If anything, the external appearance of the Electron might be called boring. Perhaps even derivative, if youre feeling less generous. It has the same fin-less blunted cylinder shape of most modern rockets, a wholly sensible (if visually unexciting) design. The vehicles nine first stage engines would have been noteworthy 15 years ago, but today only serve to draw comparisons with SpaceXs wildly successful Falcon 9.

But while the Electrons outward appearance is about as unassuming as they come, under that jet-black outer skin is some of the most revolutionary rocket technology seen since the V-2 first proved practical liquid fueled rockets were pos...


After a "Major" Launch Anomaly, Satellites Scrambling to Reach Orbits "IndyWatch Feed Tech"

On Wednesday night, an Ariane 5 booster took off from Kourou, a launch site in French Guiana operated by a European rocket company. The launch proceeded normally until shortly before nine minutes and 26 seconds into the flight, when ground tracking stations lost contact with the rocket. It was feared that the launch vehicle and its two satellites were lost.

But later Wednesday night, and again on Thursday, both of the satellite operators, SES and Eutelsat, separately confirmed that they were in contact with their respective spacecraft, the SES-14 satellite and the Al Yah 3 satellite. They were not in their proper geostationary orbits, but that could be fixed, the satellite companies said.

Just how far off those orbits became clear publicly later on Thursday, when data about them started appearing in satellite trackers. According to one orbital expert, Jonathan McDowell, each of the satellites had reached near the 45,000km heights where they need to be, but the inclinations were way off.

[...] "I characterize this as a major anomaly, but I score it a partial success for launch vehicle statistics," McDowell said. "The orbit is usable but will require several years worth of satellite station-keeping propellant to get the payloads to the right final orbit." This is obviously preferable to losing the satellites entirely.

Source: ArsTechnica

See also:

Previously: NASA's GOLD Makes It Into Orbit After Fears It Was Lost

Original Submission

Read more of this story at SoylentNews.


[$] QUIC as a solution to protocol ossification "IndyWatch Feed Tech"

The TCP protocol has become so ubiquitous that, to many people, the terms "TCP/IP" and "networking" are nearly synonymous. The fact that introducing new protocols (or even modifying existing protocols) has become nearly impossible tends to reinforce that situation. That is not stopping people from trying, though. At 2018, Jana Iyengar, a developer at Google, discussed the current state of the QUIC protocol which, he said, is now used for about 7% of the traffic on the Internet as a whole.


Udemy Targets Pirate Site Giving Away its Paid Courses For Free "IndyWatch Feed Tech"

While theres no shortage of people who advocate free sharing of movies and music, passions are often raised when it comes to the availability of educational information.

Significant numbers of people believe that learning should be open to all and that texts and associated materials shouldnt be locked away by copyright holders trying to monetize knowledge. Of course, people who make a living creating learning materials see the position rather differently.

A clash of these ideals is brewing in the United States where online learning platform Udemy has been trying to have some of its courses taken down from, a site that makes available premium tutorials and other learning materials for free.

Early December 2017, counsel acting for Udemy and a number of its individual and corporate instructors (Maximilian Schwarzmller, Academind GmbH, Peter Dalmaris, Futureshock Enterprises, Jose Marcial Portilla, and Pierian Data) wrote to with DMCA takedown notice.

Pursuant to 17 U.S.C. 512(c)(3)(A) of the Digital Millennium Copyright Act (DMCA), this communication serves as a notice of infringement and request for removal of certain web content available on, the letter reads.

I hereby request that you remove or disable access to the material listed in Exhibit A in as expedient a fashion as possible. This communication does not constitute a waiver of any right to recover damages incurred by virtue of any such unauthorized activities, and such rights as well as claims for other relief are expressly retained.

A small sample of Exhibit A

On January 10, 2018, the same law firm wrote to Cloudflare, which provides services to FreeTutorials. The DMCA notice asked Cloudflare to disable access to the same set of infringing content listed above.

It seems likely that whatever happened next wasnt to Udemys satisfaction. On January 16, an attorney from the same law firm filed a DMCA subpoena...


Uber lays out infrastructure principles "IndyWatch Feed Tech"

Uber laid out a set of principles Monday that it hopes the Trump administration will address in its promised infrastructure proposal.The ride-sharing company wants the government to ramp up investments in improving the nations roads and public...


Bringing the Sharing Economy to the Airwaves Will Boost Your Bandwidth "IndyWatch Feed Tech"

The U.S. is launching an experiment to free up jealously guarded radio spectrum Illustration: James Provost

5G report logo, link to report landing page

People routinely share houses through Airbnb and cars through Uber. Now the sharing economy is expanding to include another scarce resource: radio spectrum.

Spectrum is scarce because we cant make any more of it and our appetite for it just keeps growing. By 2020, 20 billion devices will be onlineup from 8 billion today. To handle this explosive growth, the capacity of wireless networks must triple over the next four years.

Meanwhile there are entire frequency bands reserved for the U.S. Department of Defense, which uses them for secure military communications, including the air-traffic-control radar systems on Navy aircraft carriers and assault ships. When in use, this spectrum serves an important purpose. But outside of coastal regions this military spectrum is essentially never used.

Early this year the U.S. government will start sharing that Navy spectrum, the 3.5-gigahertz band, under a new three-tiered spectrum-sharing framework called the Citizens Broadband Radio Service. This framework is the first of its kind; in fact, when the idea was initially proposed in 2012, the technology to pull it off didnt yet exist, and no one knew quite how to build it.

Since then, advances in machine learning algorithms and cloud computing have allowed us to create scalable software that makes real-time decisions about who gets access to what portion of the spectrum. The idea is for unlicensed, licensed, and federal users all to be able to use the 3.5-GHz band (found between 3.5 and 3.7 GHz) at the same time.

In December 2016, the FCC awarded provisional certification to seven vendors, including Virginia-based Federated Wireless, where I am chief technology officer, to operate a system, based on these advances and others, that could allow three types of users [see below] to peacefully share the same frequency band. That technology is now ready to boost the capacity of wireless networks at 3.5 GHz. And if its rolled out across more frequencies, it c...

NVIDIA 390.25 Linux Driver Released With GTX 1060 5GB & Quadro P620 Support "IndyWatch Feed Tech"

After rolling out the 390.12 beta Linux driver in early January as the first public driver in the 390 series, NVIDIA is ending January by the first 390 stable release: 390.25...


Strava user heatmap reveals patterns of life in western military bases "IndyWatch Feed Tech"

In November 2017, online fitness tracker Strava published a heatmap of the activity many of its users around the world engage in (and track) daily. But what might have seemed as a harmless sharing of anonymized, aggregated data turned out to reveal potentially sensitive information about (mostly western) military bases and secret sites. The revelation was made and shared over the weekend by Nathan Ruser, an Australian university student and founding member of Institute for More


Phishing Scam: Hackers Steal $150,000 in Ethereum from Experty ICO "IndyWatch Feed Tech"

By Waqas

Just a week after the biggest hack in the history of

This is a post from Read the original post: Phishing Scam: Hackers Steal $150,000 in Ethereum from Experty ICO


Security updates for Monday "IndyWatch Feed Tech"

Security updates have been issued by Arch Linux (glibc, lib32-glibc, and zziplib), Debian (clamav, ffmpeg, thunderbird, tiff, tiff3, and wireshark), Fedora (firefox, mingw-libtasn1, and webkitgtk4), Gentoo (fossil), Mageia (webkit2), openSUSE (chromium, clamav, and thunderbird), and SUSE (clamav and kernel).


Free Software Directory meeting recap, January 2018 "IndyWatch Feed Tech"

Every week free software activists from around the world come together in #fsf on to help improve the Free Software Directory. We had an exciting month working on the Directory with our wonderful stable of volunteers. These folks show up week in and week out to improve the Directory. It's also important to note the valiant efforts of those volunteers who can't make an appearance at the meeting proper, but still plug away at Directory entries during the week.

The new year kicked off to a great start, with the Directory finally crossing over 16,000 packages! This past year, we focused a lot on cleaning up and updating already existing entries. The Directory is much better for the effort. But it's great to see that we were able to continue growing the Directory even while we focused on fixing it up.

We followed that up with some big plans for the future, creating Project Teams to focus and lead the effort on particular issues on the Directory. Some projects have been ongoing, such as cataloging IceCat Plugins. Other projects are just kicking off, or still in need of team captains. Adding this little bit of structure should help get these projects up and running.

The month rounded out with more new additions to the Directory, as well as working on software projects related to radio. All in all, a great start to the new year, and we have much more to look forward to in the months to come.

If you would like to help update the directory, meet with us every Friday in #fsf on from 12 p.m. to 3 p.m. EST (16:00 to 19:00 UTC).


RADV Reworking Pipeline Emitting To Improve CPU Usage "IndyWatch Feed Tech"

While using Vulkan lowers the CPU utilization compared to OpenGL, in our testing of NVIDIA versus the open-source Radeon drivers we generally have found the red team's drivers to consume more CPU resources. Thus it's good to hear that RADV co-conspirator Bas Nieuwenhuizen is working on reworking how this Radeon Vulkan driver handles pipeline emitting...


Re: CVE-2017-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0 "IndyWatch Feed Tech"

Posted by Michael Orlitzky on Jan 29

They look pretty similar. The symlink issue was fixed as far as I can
tell -- I tried to exploit them, and failed. The tmpfiles code is using
a clever trick:

xsprintf(fn, "/proc/self/fd/%i", fd);
if (chown(fn, ...

On Linux, the proc stuff is magic, and that just does the right thing,
even though a priori it looks like "chown" will follow symlinks.

Hard links were a different story, and there was no attempt made to...


Spiral Laser Cut Buttons Make A Super-Slim USB MIDI Board "IndyWatch Feed Tech"

We see a huge variety of human-computer interface devices here at Hackaday, and among them are some exceptionally elegant designs. Of those that use key switches though, the vast majority employ off the shelf components made for commercial keyboards or similar. It makes sense to do this, there are some extremely high quality ones to be had.

Sometimes though we are shown designs that go all the way in creating their key switches from the ground up. Such an example comes from [Brandon Rice], and it a particularly clever button design because of its use of laser cutting to achieve a super-slim result. Hes made a sandwich of plywood with the key mechanisms formed in a spiral cut on the top layer. Hes a little sketchy on the exact details of the next layer, but underneath appears to be a plywood spacer surrounding a silicone membrane with conductive rubber taken from a commercial keyboard. Beneath that is copper tape on the bottom layer cut to an interweaving finger design for the contacts. An Adafruit Trinket Pro provides the brains and a USB interface, and the whole device makes for an attractive and professional looking peripheral.

You can see the results in action as hes posted a video, which weve included below the break.

Weve shown you spiral structures for flexibility in the past, with flexible materials made via 3D printing.


Revolutionary gene edited T cell therapy to treat lymphoma shows promise and little toxicity "IndyWatch Feed Tech"

This revolutionary gene modified T cell therapy is bearing fruit in treating a type of lymphoma, a resistant form of cancer.

Summary: After years of effort, this revolutionary gene-modified T cell therapy is bearing fruit in treating a type of lymphoma, a resistant form of cancer. [This article first appeared on the website Author: Brady Hartman. ]

Thirty-seven-year-old Nick Asoian of Denver unsuccessfully fought Hodgkins Lymphoma using conventional cancer treatments for two years. In 2008, while in New Zealand for a ski race, Nick was diagnosed with Hodgkins Lymphoma. Two bone marrow transplants and two years of chemotherapy combined with radiation therapy didnt bring his cancer to heel.

Then, a few years ago the avid skier got wind of clinical trial using T cell therapy at the Center for Cell and Gene Therapy at the Baylor College of Medicine in Texas. After speaking with Dr. Bollard and Vicky Torrano, the physicians conducting the trial, Asoian decided to give it a shot.


BYU researchers create Star Wars inspired 3D images "IndyWatch Feed Tech"

Researchers create true Star Wars like 3D holograms with tiny particles, lasers

Do you remember the scene from the sci-fi film Star Wars where the R2-D2 beams a hologram of Princess Leia into thin air? Looks like it might not take long before the true Princess Leia hologram experience becomes a reality.

Apparently, researchers at Utahs Brigham Young University (BYU) uses the method dubbed as optical trap display that is capable of projecting 3D volumetric images into thin air. According to a study published in Natures journal, the technology can be used to project small floating 3D volumetric images that can be viewed and interacted from all angles. Viewers can walk around the projections and even place a finger below them.

Often, when we think of an image thats floating in space thats 3D, we think of a hologram, explains the lead researcher, Daniel Smalley, the studys lead author and a BYU electrical and computer engineering professor and holography expert. But really, a hologram cannot make the Princess Leia image, or the Avatar table, or the Iron Man display. A 3D image that floats in [the air], that you can walk all around and see from every angle, this image is called a volumetric image.'

The Optical Trap Display uses colorful lasers to capture physical particles, which are then moved around to create the 3D image. You capture a particle in an invisible, or almost invisible tractor beam, explains the lead researcher, Daniel Smalley, the studys lead author and a BYU electrical and computer engineering professor and holography expert, then you drag that around to every point of an image. When its in the right place, you shoot it with red, green and blue lasers to make it illuminate, and build up an image point by point, dragging this cellulose particle around as you go.

Smalley compares the technology to a 3D printer for light because it works through a combination of multi-color laser beams and tiny plant fiber particles called cellulose. A scientific phenomenon known as Photophoresis allows you to push a particle in the air by blasting it with a beam of light.

Were using a laser beam to trap a particle, and then we can steer the laser beam around to move the particle and create the image, said Erich Nygaard, a researcher on the team in a statement.

Several tiny images have been 3D-light-printed by Smalley and his team, such as a butterfly, a prism, the stretch-Y BYU logo, animated rings and an individual in a lab coat bent in a position similar to Princess Leia as she begins her projected message.



Initial Tests of NASA's Kilopower Nuclear System Successful "IndyWatch Feed Tech"

Initial tests of NASA's Kilopower nuclear power system have been successful, and full-power testing will be done in March. Each Kilopower unit is expected to provide between 1 kW to 10 kW of electric power:

Months-long testing began in November at the energy department's Nevada National Security Site, with an eye toward providing energy for future astronaut and robotic missions in space and on the surface of Mars, the moon or other solar system destinations.

A key hurdle for any long-term colony on the surface of a planet or moon, as opposed to NASA's six short lunar surface visits from 1969 to 1972, is possessing a power source strong enough to sustain a base but small and light enough to allow for transport through space. "Mars is a very difficult environment for power systems, with less sunlight than Earth or the moon, very cold nighttime temperatures, very interesting dust storms that can last weeks and months that engulf the entire planet," said Steve Jurczyk, associate administrator of NASA's Space Technology Mission Directorate. "So Kilopower's compact size and robustness allows us to deliver multiple units on a single lander to the surface that provides tens of kilowatts of power," Jurczyk added.

[...] Lee Mason, NASA's principal technologist for power and energy storage, said Mars has been the project's main focus, noting that a human mission likely would require 40 to 50 kilowatts of power. The technology could power habitats and life-support systems, enable astronauts to mine resources, recharge rovers and run processing equipment to transform resources such as ice on the planet into oxygen, water and fuel. It could also potentially augment electrically powered spacecraft propulsion systems on missions to the outer planets.

NASA's next Mars mission is InSight, a stationary lander scheduled to launch in May. It will use two MegaFlex solar arrays from Orbital ATK. NASA's Mars 2020 rover is scheduled to launch in July 2020. It will use 4.8 kg of plutonium dioxide to provide no more than 110 Watts of power.

The Juno mission is the first mission to Jupiter to use solar panels. Juno uses...


Re: CVE-2017-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0 "IndyWatch Feed Tech"

Posted by Florian Weimer on Jan 29

Isn't it a duplicate of CVE-2013-4392?



Re: CVE-2017-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0 "IndyWatch Feed Tech"

Posted by Michael Orlitzky on Jan 29

Correction to the CVE-ID: it's 2017, not 2018. So CVE-2017-18078.


CVE-2018-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0 "IndyWatch Feed Tech"

Posted by Michael Orlitzky on Jan 29

Product: systemd (systemd-tmpfiles)
Versions-affected: 236 and earlier
Author: Michael Orlitzky
Acknowledgments: Lennart Poettering who, instead of calling me an idiot
for not realizing that systemd enables fs.protected_hardlinks by
default, went out of his way to harden the non-default configuration.

== Summary ==


Magnetic Hammer Drives Tiny Medical Robot Through Brain Tissue "IndyWatch Feed Tech"

This millirobot has already probed a goat brain, and may someday maneuver through a human Photo: University of Houston

Photo: University of Houston Hammer Away: A prototype containing a steel bead rests in front of two magnetic coils.

A tiny robot that jackhammers its way through the body sounds like the stuff of science fiction nightmares. But such a robot exists, and it could play an important role in the future of medicine.

A new study on the concept shows that millimeter-scale robots (known as millirobots) can penetrate lamb and goat brain tissue by responding to changes in the magnetic field generated by hospital medical scanners. That achievement could pave the way for fantastic voyages of biomedical discovery.

Many medical researchers have experimented with magnetic fields that push and pull tiny robots to move them around inside the human body. In this case, University of Houston researchers also created a magnetic hammer inside a bullet-shaped robot that would produce enough force to drive it into animal brains.

The robot contains a stainless-steel bead that is pulled back and forth inside the robots transparent acrylic body by directional changes in the magnetic field produced by a magnetic resonance imaging (MRI) scanner. When pulled in one direction, the bead compresses a mechanical spring at the back of the robot, which propels the bead forward when released to strike the robots front end, hammering it deeper into bodily tissue.

The robot is the combination of the MRI system and this relatively simple component that could be mass produced, says Aaron Becker, an assistant professor in electrical and computer engineering at the University of Houston.

Such a robot could leverage standard MRI scanners in hospitals, which means physicians could simultaneously perform MRI imaging of patients and move millirobots around inside their bodies. The research by Becker and his colleagues was published in January in IEEE Robotics and Automation Letters .




Waterfall Security and HCNC collaborate to provide OSIsoft PI offerings to the Korean market "IndyWatch Feed Tech"

Waterfall Security Solutions, a global leader in cybersecurity technologies for critical infrastructure and industrial control systems, announced a partnership with HCNC Co., a systems integrator based in Korea, to further extend Waterfalls and HCNCs OSIsoft product offering within the region. HCNC specializes in integrating OSIsoft PI solutions throughout a wide spectrum of industries including power, oil and gas, utilities and transportation. HCNCs combination of strong, local support coupled with extensive knowledge of and services for More


Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases "IndyWatch Feed Tech"

Every one of us now has at least one internet-connected smart device, which makes this question even more prominent how much does your smart device know about you? Over the weekend, the popular fitness tracking app Strava proudly published a "2017 heat map" showing activities from its users around the world, but unfortunately, the map revealed what it shouldn'tlocations of the United States


Learning From First Principles Demis Hassabis "IndyWatch Feed Tech"

Between 0409 December 2017, thousands of researchers and experts gathered for at the largest and most influential AI and Thirty-first Annual Conference on Neural Information Processing Systems (NIPS) in Long Beach, California. This is the conferences 40th year, and its most-attended, at 7,229 registrations.

Demis Hassabis, the founder and CEO of DeepMind and an expert chess player himself, presented further details of the system, called Alpha Zero, at an Artificial Intelligence Conference in California. The program often made moves that would seem unthinkable to a human chess player.

It doesnt play like a human, and it doesnt play like a program, Hassabis said at the Neural Information Processing Systems (NIPS) conference in Long Beach. It plays in a third, almost alien, way.


Artificial brains could soon be reality: Superconducting switch, which can learn like human brain, developed "IndyWatch Feed Tech"

Researchers have developed a superconducting switch that can make future computers think like the human brain.


[SECURITY] [DSA 4097-1] poppler security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jan 29

Debian Security Advisory DSA-4097-1 security () debian org Moritz Muehlenhoff
January 25, 2018

Package : poppler
CVE ID : CVE-2017-14929 CVE-2017-1000456...


GNU Linux-libre 4.15-gnu Deblobs Two New Drivers, Drops More Upstream References "IndyWatch Feed Tech"

Once again being punctual with their releases, the GNU Linux-libre volunteers managed to release the GNU Linux-libre 4.15-gnu kernel a short time after Linus Torvalds on Sunday released the official Linux 4.15 kernel...


Stravas Global Heat Map Exposes User Locations Including Military Bases "IndyWatch Feed Tech"

By Waqas

Strava is a GPS tracking and fitness-tracker app manufacturer that

This is a post from Read the original post: Stravas Global Heat Map Exposes User Locations Including Military Bases


Fitness Tracker Strava's Geolocation "Lights Up" U.S. Military Bases "IndyWatch Feed Tech"

Strava, a smartphone app that tracks "athletic activity" using GPS, published an interactive heatmap of user activity around the world. That heatmap included some U.S. military bases:

Military personnel around the world have been publicly sharing their exercise routes online - including those inside or near military bases.

Online fitness tracker Strava has published a "heatmap" showing the paths its users log as they run or cycle. It appears to show the structure of foreign military bases in countries like Syria and Afghanistan, as soldiers move around inside.

The US military is examining the heatmap, a spokesman said. Air Force Colonel John Thomas, a spokesman for US Central Command, told the Washington Post that the US military was reviewing the implications.

Strava said it had excluded activities marked as private from the map. Users who record their exercise data on Strava have the option of making their movements public or private. Private data, the company said, has never been included.

The "private" option is for people who like to track their step count during sexual activity, not protecting the operational security of the military base you're stationed at.

Also at The Guardian, which contains more examples than the BBC for those who don't want to enable JavaScript to view the interactive one linked to above.

Original Submission

Read more of this story at SoylentNews.


Military personnel improperly used Fitness Strava Tracker exposed their bases "IndyWatch Feed Tech"

Military worldwide have publicly shared online their exercise routes recorded through the fitness tracker Strava revealing the fitness sessions conducted inside or near military bases

We discussed many times privacy risks related to IoT devices, here we are to discuss an alarming case, fitness tracker Strava revealed details of Military Bases.

American and allied military worldwide have publicly shared their exercise routes online revealing the fitness sessions conducted inside or near military bases, including Afghanistan, Iraq, and Syria.

This leak of information has happened because military personnel turned on their fitness Strava tracker while making exercises at the bases.

A map showing exercise routes recorded by users of a tracking app reveals sensitive information about military personnel in locations around the world, including Afghanistan, Iraq, and Syria.

Such kind of information could be used by enemies and terrorists to plan an attack.

Obviously while in some regions of the globe it is impossible to distinguish the activity of the military personnel, in other locations the routes immediately stand out.

For example, examining the map of Iraq you can notice that the entire region is dark, except for a series of well-known military bases used by the American military and its allies.

The list of the bases easy to locate thank to the map associated to the fitness tracker Strava includes Taji north of Baghdad, Qayyarah south of Mosul, Speicher near Tikrit and Al-Asad in Anbar Province and a number of minor sites highlighted in northern and western Iraq.

Searching for bases in Afghanistan, it is easy to locate the Bagram Air Field in the north of Kabul along with other smaller sites south of the country.

Strava Tracking app military bases

The movements of soldiers within Bagram air base the largest US military facility in Afghanistan Source BBC

Similarly, in Syria it is  Qamishli in the northwest, a stronghold of US-allied Kurdish forces, is clearly visible.

Tobias Schneider, one of the secur...


Inventing The Microprocessor: The Intel 4004 "IndyWatch Feed Tech"

We recently looked at the origins of the integrated circuit (IC) and the calculator, which was the ICs first killer app, but a surprise twist is that the calculator played a big part in the invention of the next world-changing marvel, the microprocessor.

There is some dispute as to which company invented the microprocessor, and well talk about that further down. But who invented the first commercially available microprocessor? That honor goes to Intel for the 4004.

Path To The 4004

Busicom calculator motherboard based on 4004 (center) and the calculator (right)Busicom calculator motherboard based on 4004 (center) and the calculator (right)

We pick up the tale with Robert Noyce, who had co-invented the IC while at Fairchild Semiconductor. In July 1968 he left Fairchild to co-found Intel for the purpose of manufacturing semiconductor memory chips.

While Intel was still a new startup living off of their initial $3 million in financing, and before they had a semiconductor...


Spectre / Meltdown Code Gets Cleaned Up, Improvements For Linux 4.16 "IndyWatch Feed Tech"

After the page table isolation (K)PTI support was added late in the Linux 4.15 kernel cycle in light of the Meltdown CPU vulnerability, improvements to this code are on the way with Linux 4.16...


How to Use DockerHub "IndyWatch Feed Tech"

How to Use DockerHub


Silicon Valleys Secret Test Track for Self-Driving Cars "IndyWatch Feed Tech"

Crows Landing hosts some of the worlds stealthiest autonomous vehicle startups Cars: IEEE Spectrum; Background: Getty Images

Youve probably heard of Mcity, the fake city built by the University of Michigan to test self-driving cars in Ann Arbor. GoMentum Station in the Bay Area has also been in the news, with Apple and Otto looking for a secure location to put highly automated vehicles through their paces.

But there is a facility in rural California where companies have quietly tested autonomous vehicles for decades without anyone noticing. Crows Landing Air Facility is a 1,500-acre former air base near Modesto with two vast concrete runways, surrounded by farmland.

According to documents sourced by IEEE Spectrum through public records requests, some of Silicon Valleys hottest automotive startups have used Crows Landing for secret self-driving tests. In the past 18 months, Faraday Future, Lucid, Torc, Rivian, and Zoox have all tested prototype cars there, along with automated semi-trucks from Peloton and Embark. Mercedes Benz and Bosch also carry out regular automotive experiments at the facility.

We have multiple year-over-year relationships with several car companies and vehicle testing firms, confirmed Keith Boggs, Assistant Executive Officer for Stanislaus County, which owns Crows Landing. The reason why these firms are so attracted to Crows Landing is because its so remote.

Crows Landings nearest neighbours are empty fields, but it is just one mile from Interstate 5, and only about 90 minutes by car from San Jose. And it has other advantages. Unlike GoMentum Station, which is still partly controlled by the military, Crows Landing has no restrictions on foreign nationals, who make up a significant part of many autonomous technology engineering teams. Crows Landing is also cheap, costing as little as $600 a day to rent the entire facility, accordin...


Dutch Agencies Provide Crucial Intel About Russias Interference In US Elections "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

Hackers from the Dutch intelligence service AIVD have provided the FBI with crucial information about Russian interference with the American elections. For years, AIVD had access to the infamous Russian hacker group Cozy Bear. That's what de Volkskrant and Nieuwsuur have uncovered in their investigation.

It's the summer of 2014. A hacker from the Dutch intelligence agency AIVD has penetrated the computer network of a university building next to the Red Square in Moscow, oblivious to the implications. One year later, from the AIVD headquarters in Zoetermeer, he and his colleagues witness Russian hackers launching an attack on the Democratic Party in the United States. The AIVD hackers had not infiltrated just any building; they were in the computer network of the infamous Russian hacker group Cozy Bear. And unbeknownst to the Russians, they could see everything.

That's how the AIVD becomes witness to the Russian hackers harassing and penetrating the leaders of the Democratic Party, transferring thousands of emails and documents. It won't be the last time they alert their American counterparts. And yet, it will be months before the United States realize what this warning means: that with these hacks the Russians have interfered with the American elections. And the AIVD hackers have seen it happening before their very eyes.

The Dutch access provides crucial evidence of the Russian involvement in the hacking of the Democratic Party, according to six American and Dutch sources who are familiar with the material, but wish to remain anonymous. It's also grounds for the FBI to start an investigation into the influence of the Russian interference on the election race between the Democratic candidate Hillary Clinton and the Republican candidate Donald Trump.

Translated by: Lisa Negrijn

It's quite an interesting read.

Original Submission

Read more of this story at SoylentNews.


FCC chair opposes nationalizing 5G network "IndyWatch Feed Tech"

Ajit Pai, the chairman of the Federal Communications Commission, is opposing a reported White House proposal to nationalize a 5G network currently being developed by the private sector.The main lesson to draw from the wireless sectors...


File Your Taxes Before Scammers Do It For You "IndyWatch Feed Tech"

Today, Jan. 29, is officially the first day of the 2018 tax-filing season, also known as the day fraudsters start requesting phony tax refunds in the names of identity theft victims. Want to minimize the chances of getting hit by tax refund fraud this year? File your taxes before the bad guys can!

Tax refund fraud affects hundreds of thousands, if not millions, of U.S. citizens annually. Victims usually first learn of the crime after having their returns rejected because scammers beat them to it. Even those who are not required to file a return can be victims of refund fraud, as can those who are not actually due a refund from the IRS.

According to the IRS, consumer complaints over tax refund fraud have been declining steadily over the years as the IRS and states enact more stringent measures for screening potentially fraudulent applications.

If you file your taxes electronically and the return is rejected, and if you were the victim of identity theft (e.g., if your Social Security number and other information was leaked in the Equifax breach last year), you should submit an Identity Theft Affidavit (Form 14039). The IRS advises that if you suspect you are a victim of identity theft, continue to pay your taxes and file your tax return, even if you must do so by paper.

If the IRS believes you were likely the victim of tax refund fraud in the previous tax year they will likely send you a special filing PIN that needs to be entered along with this years return before the filing will be accepted by the IRS electronically. This year marks the third out of the last five that Ive received one of these PINs from the IRS.

Of course, filing your taxes early to beat the fraudsters requires one to have all of the tax forms needed to do so. As a sole proprietor, this is a great challenge because many companies take their sweet time sending out 1099 forms and such (even though theyre required to do so by Jan. 31).

A great many companies are now turning to online services to deliver tax forms to contractors, employees and others. For example, I have received several notices via email regarding the availability of 1099 forms online; most say they are sending the forms in snail mail, but that if I need them sooner I can get them online if I just create an account or enter some personal information at some third-party site.

Having seen how so m...


6 Ways to Improve Your Relationship Marketing Strategy "IndyWatch Feed Tech"

Businesses spend a lot of time, effort and money building their brand and chasing down leads.

For many years, traditional marketing strategies have been used to build and grow customer relationships. However, the desire to do better has pushed businesses to seek marketing strategies that focus on building long-term relationships and customer loyalty.

6 Ways to Improve Your Relationship Marketing Strategy

This is where relationship marketing comes in.

As more and more businesses realize the need to improve their customer relationships with a goal of engaging them for longer, getting to buy more products, and recommend their brand to friends and family were set to see more businesses embracing relationship marketing in a big way.

Here are six ways how to improve your relationship marketing strategy.

Invest in Customer Relationship Management (CRM) Solutions

Customer relationship management is all about recording and storing important details about your customers, specifically their personal information, how often they visit your website, their purchases and other details.

Having a standardized way of collecting and sharing customer data, and also cataloging customer interactions with your business through CRM software is key to implementing an effective relationship marketing strategy.

Consumer Targeted Campaigns and Referrals

Some of the worlds biggest brands hold consumer targeted campaigns to get in touch with their customers directly. For instance, an electronic appliance company may opt to hold free service campaigns, so that they can encourage their customers to bring defective products that will be repaired free of charge and spare parts provided at a subsidized price.

Another great strategy is referral campaigns, and while its a relatively new concept, referral marketing is being used successfully by some of your favorite brands to generate more business.

Referral marketing helps empower your customers to share your services and products with their networks, therefore, generating more business leads. If done properly, a strong referral campaign can amplify 1 sale, turning a single customer, into many customers through trusted referrals and recommendations. A great example of software to launch a campaign like this is Ambassador Referral Software.



Ncurses 6.1 Released With A Variety Of Improvements & Other Changes "IndyWatch Feed Tech"

It has been more than two years since the release of Ncurses 6.0 as the GNU project for developing terminal-independent text-based user-interfaces while this weekend marked the availability of the big Ncurses 6.1 update...


Generations of Philly Families Are Incarcerated Together "IndyWatch Feed Tech"

Via: The Inquirer: Since that day in 2011, Cintron Jr., 38, has lived on the same cell block as his father, who is 58. Recently, the cell next door to his dads became available, so he moved in. Each evening, by 9 p.m., they lock themselves into cells 86 and 87 of A Block for []


All living organisms on Earth owe a debt to these protein-based Legos of life "IndyWatch Feed Tech"

As an added bonus, these tiny building blocks could even be used to split water, creating a clean-burning and near infinite source of energy.


Stockton Gets Ready to Experiment With Universal Basic Income "IndyWatch Feed Tech"

Via: KQED: Wage stagnation. Rising housing prices. Loss of middle-class jobs. The looming threat of automation. These are some of the problems facing Stockton and its residents, but the citys mayor, Michael Tubbs, says his city is far from unique. I think Stockton is absolutely ground zero for a lot of the issues we are []


How to Convert and Copy a DVD to Your PC, iOS and Android Gadgets? "IndyWatch Feed Tech"

Sometimes, you may want a copy of your DVD collection on your computer. Therefore you can watch it at any time, and dont have to necessarily have the DVD disc on hand every time. Or perhaps, you need to make a backup of DVD just in case of losing the DVD content when its damaged.

To meet the demands, we highly recommend a program that allows you to copy protected DVDs on your PC and convert the content into one of common formats. That is WonderFox DVD Ripper Pro, which is excellent and can accomplish copying a DVD to your computer with just a few steps.

Note: WonderFox DVD Ripper Pro can be used to keep backups of your purchased DVDs for personal use. Please dont use it for illegal sale.

Now, lets start to learn more about the program. And also, here below is how to copy and convert a protected DVD to your PC with WonderFox DVD Ripper Pro.

WonderFox DVD Ripper Pro is one of the best Windows 10 DVD Ripper programs which help you create copies of DVDs and save them to your computer and portable devices. It is an alternative to HandBrake and DVD Shrink, giving the user the possibility to enjoy safe DVD movie backup without difficulty.

The software is full-featured. And after installing the program, you can see that it has an intuitive interface. There are 3 source options: DVD Disc, ISO Image, and DVD Folder. That means it can also convert and copy video_ts to MP4, MOV, and more common formats.

How to Convert and Copy a DVD to Your PC, iOS and Android Gadgets?

We press the DVD Disc button. And the program begins to analyze and decrypts the DVD. The time for analyzing depends on DVD data amount, your hard drive, etc. After a little while, well see a new interface. See the image below. The program has already selected the right main movie of the DVD. Well, you can also choose the other content, such as A...


CNCF to Host the Rook Project to Further Cloud-Native Storage Capabilities "IndyWatch Feed Tech"

Today, the Cloud Native Computing Foundation (CNCF) Technical Oversight Committee (TOC) voted to accept Rook as the 15th hosted project alongside Kubernetes, Prometheus, OpenTracing, Fluentd, Linkerd, gRPC, CoreDNS, containerd, rkt, CNI, Envoy, Jaeger, Notary and TUF.


Simple, Energy-Efficient Recycling Process for Lithium-Ion Batteries "IndyWatch Feed Tech"

A new recycling process requires half the energy of conventional techniques and produces ready-to-use cathode materials Photo: David Baillot/UC San Diego Jacobs School of Engineering

A simple new recycling process restores old lithium battery cathodes to mint condition using half the energy of current processes. Unlike todays recycling methods, which break down cathodes into separate elements that have to be put together again, the new technique spits out compounds that are ready to go into a new battery.

The method works on the lithium cobalt oxide batteries used in laptops and smartphones, and also on the complex lithium-nickel-manganese-cobalt batteries found in electric cars.

Lithium batteries have anodes made of graphite and cathodes made of lithium metal oxides, where the metal is some combination of cobalt, nickel, manganese, and iron. Less than five percent of old lithium batteries are recycled today. As millions of large EV batteries retire in the next decade, were going to send even bigger mountains of flammable, toxic battery waste to landfills. Plus, that waste contains valuable metals. There is serious concern that supplies of critical metals like cobalt and lithium are dwindling. Recycling is going to be key if were to keep up with battery demand.

Several companies, mostly in China, already reprocess batteries. The standard procedure requires crushing batteries, and then either melting them or dissolving them in acid. What comes out at the end is separate metals like cobalt, lithium, nickel, and manganese. In addition to using intense amounts of energy, the methods destroy whats most valuable about battery cathodes, says Zheng Chen, a professor of nanoengineering at the University of California, San Diego.

The material is in the form of beautiful, well-designed particles with a specific microscopic structure that determines the performance of the battery, he says. A lot of engineering, energy, and time go into making these structures.

The simple method Chen and his colleagues developed preserves that microstructure. The researchers first cycled commercial lithium cells until they had lost half...


U.S. Government Owned 5G Network? "IndyWatch Feed Tech"

Update: Trump Team Idea to Nationalize 5G Network to Counter China Is Rejected Via: Reuters: President Donald Trumps national security team is looking at options to counter the threat of China spying on U.S. phone calls that include the government building a super-fast 5G wireless network, a senior administration official said on Sunday. The []


Facebook releases privacy principles "IndyWatch Feed Tech"

Facebook released a set of privacy principles Monday aimed at helping users understand how the social media giant handles their data and what they can do to shield their information from other users.The principles include giving users control of...


Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner "IndyWatch Feed Tech"

Lenovo has recently rolled out security patches for a severe vulnerability in its Fingerprint Manager Pro software that could allow leak sensitive data stored by the users. Fingerprint Manager Pro is a utility for Microsoft Windows 7, 8 and 8.1 operating systems that allows users to log into their fingerprint-enabled Lenovo PCs using their fingers. The software could also be configured to


Artificial Intelligence Is Going to Supercharge Surveillance "IndyWatch Feed Tech"

Via: The Verge: Artificial intelligence is giving surveillance cameras digital brains to match their eyes, letting them analyze live video with no humans necessary. This could be good news for public safety, helping police and first responders more easily spot crimes and accidents and have a range of scientific and industrial applications. But it also []


F-35s Continue to Have Problems, Acquisition Costs Increase "IndyWatch Feed Tech"

Testing Director says the expensive F-35s are not combat-ready, unreliable, and components need redesign

Overall fleet-wide monthly availability rates remain around 50 percent, a condition that has existed with no significant improvement since October 2014, despite the increasing number of new aircraft. One notable trend is an increase in the percentage of the fleet that cannot fly while awaiting replacement parts indicated by the Not Mission Capable due to Supply rate.

[...] Total acquisition costs for Lockheed Martin Corp.'s next-generation fighter may rise about 7 percent to $406.5 billion, according to figures in a document known as a Selected Acquisition Report. That's a reversal after several years of estimates that had declined to $379 billion recently from a previous high of $398.5 billion in early 2014.

$122 billion has been spent on the F35 program up until the end of 2017. $10-15 billion will be spent each year through 2022. This is detailed in a 100 page F-35 spending summary report.

FY17 DOD PROGRAMS: F-35 Joint Strike Fighter (JSF)

Related: The F-35 Fighter Plane Is Even More of a Mess Than You Thought
The F-35: A Gold-Plated Turkey
Flawed and Potentially Deadly F-35 Fighters Won't be Ready Before 2019
Lockheed Martin Negotiating $37 Billion F-35 Deal
Does China's J-20 Rival Other Stealth Fighters?

Original Submission

Read more of this story at SoylentNews.


What Happens When You Want to Create a Special File with All Special Characters in Linux? "IndyWatch Feed Tech"

What Happens When You Want to Create a Special File with All Special Characters in Linux?


Its time to get serious about email security "IndyWatch Feed Tech"

In todays hyper-connected world, email is the foundation of every organizations collaboration, productivity, and character. And despite annual rumors of its demise, theres no reason to believe well be writing its eulogy anytime soon. With its ubiquity and universal appeal, email is a treasure trove of sensitive business information. Thats why emails leaks arent just data loss events. Theyre direct attacks on your brand and reputation. Despite team collaboration and communication tools like Slack and More


Authentication today: Moving beyond passwords "IndyWatch Feed Tech"

A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience when logging into applications and devices. Authentication methods perceived as most secure (global perspective) Generational differences also emerged showing that younger adults are putting less care into traditional password hygiene, yet are more likely to use biometrics, multifactor authentication and password managers to improve their personal security. With millennials quickly becoming the More


Mesa 18.0-RC3 Released With 50+ Changes "IndyWatch Feed Tech"

Emil Velikov announced the release today of Mesa 18.0-RC3 with 50+ changes comprising of many Intel ANV and Radeon RADV Vulkan driver fixes...


How can we avoid another record year for breaches and ransomware? "IndyWatch Feed Tech"

More than 14.5 billion emails laced with malware were sent in 2017 according to the annual Global Security Report issued by AppRiver. The majority of cyber threats were initiated in the US and persisted throughout the year, with significant peaks in August, September and October. In the first half of 2017, 1.9 billion data records were lost or stolen as a result of cyberattacks. This followed a tough year in 2016, when losses totaled $16 More


Nearly 2000 WordPress Websites Infected with a Keylogger "IndyWatch Feed Tech"

More than 2,000 WordPress websites have once again been found infected with a piece of crypto-mining malware that not only steals the resources of visitors' computers to mine digital currencies but also logs visitors' every keystroke. Security researchers at Sucuri discovered a malicious campaign that infects WordPress websites with a malicious script that delivers an in-browser


Chasing the Electron Beam at 380,000 FPS "IndyWatch Feed Tech"

Analog TV is dead, but that doesnt make it any less awesome. [Gavin and Dan], aka The Slow Mo Guys recently posted a video about television screens. Since they have some incredible high-speed cameras at their disposal, we get to see the screens being drawn, both on CRT and more modern LCD televisions.

Now we all know that CRTs draw one pixel at a time, drawing from left to right, top to bottom. You can capture this with a regular still camera at a high shutter speed. The light from a TV screen comes from a phosphor coating pained on the inside of the glass screen. Phosphor glows for some time after it is excited, but how long exactly? [Gavin and Dans] high framerate camera let them observe the phosphor staying illuminated for only about 6 lines before it started to fade away. You can see this effect at a relatively mundane 2500 FPS.

Cranking things up to 380,117 FPS, the highest speed ever recorded by the duo, we see even more amazing results. Even at this speed, quite a few pixels are drawn each frame. [Gavin] illustrates that by showing how Super Marios mustache is drawn in less than one frame of slow-mo footage. You would have to go several times faster to actually freeze the electron beam. We think its amazing that such high-speed analog electronics were invented and perfected decades ago.

Switching from CRT to LCD, the guys show us how the entire screen stays lit, while refresh runs top to bottom. Experimenting on an iPhone 7+ showed that the screen refresh is always from the top of the screen down, toward the home button. If you change the phone to landscape orientation, it will appear to be refreshing from left to right. All pretty intere...


Over the weekend Microsoft rolled out out-of-band updates to disable mitigations for Spectre v2 attacks "IndyWatch Feed Tech"

Over the weekend, Microsoft rolled out out-of-band updates to disable mitigations for one of the Spectre attack variants because they can cause systems to become unstable.

The situation is becoming embarrassing! Just after the release of the Meltdown and Spectre security updates Intel excluded any problems for their deployments citing testing activities of conducted by other tech giants.

At the same time, some companies were claiming severe issued, including performance degradation and in some cases crashes.

Last week, Intel changed its position on the security patches, it first published the results of the test conducted on the Meltdown and Spectre patches and confirmed that the impact on performance could be serious, then it recommended to stop deploying the current versions of Spectre/Meltdown patches.

Over the weekend, Microsoft rolled out out-of-band updates to disable mitigations for one of the Spectre attack variants because they can cause systems to become unstable.

Our own experience is that system instability can in some circumstances cause data loss or corruption. states the security advisory published by Microsoft.

While Intel tests, updates and deploys new microcode, we are making available an out of band update today, KB4078130, that specifically disables only the mitigation against CVE-2017-5715 Branch target injection vulnerability. In our testing this update has been found to prevent the behavior described. 

Microsoft was among the first companies that provided security updates for Meltdown and Spectre vulnerabilities, anyway, the patches caused severe issues to AMD architectures.

The decision follows the similar actions adopted by other tech giants like Red HatHP, Dell, Lenovo, VMware.



Linux 4.16 Getting Tweak For Smarter Task Migration, Yielding Better Scalability "IndyWatch Feed Tech"

Ingo Molnar began sending in his various Git pull requests this morning for targeting the Linux 4.16 kernel merge window, including the scheduler updates...


Fully Electric Tesla of the Canals Set to Make Maiden Voyage This Summer "IndyWatch Feed Tech"

The battery-powered autonomous ships will move goods across Belgium and the Netherlands, helping pull up to 23,000 polluting trucks off the road.


NASA tests light, foldable plane wings for supersonic flights "IndyWatch Feed Tech"

The foldable wings will give typical planes like commercial airliners a way to adapt to different flight conditions. They can give pilots more control over their aircraft and could even lead to more fuel efficient flights. Planes designed to fly at supersonic speeds (faster than the speed of sound), however, will get more out of this technology.


Chinese scientists just cloned two monkeys, moving one step closer to cloning humans "IndyWatch Feed Tech"

By Ben Hirschler

LONDON (Reuters) Chinese scientists have cloned monkeys using the same technique that produced Dolly the sheep two decades ago, breaking a technical barrier that could open the door to copying humans.

Zhong Zhong and Hua Hua, two identical long-tailed macaques, were born eight and six weeks ago, making them the first primates the order of mammals that includes monkeys, apes and humans to be cloned from a non-embryonic cell.


10 New VM Escape Vulnerabilities Discovered in VirtualBox "IndyWatch Feed Tech"

10 new VM escape vulnerabilities discovered in VirtualBox

Oracle has released patches for ten vulnerabilities in VirtualBox which allow attackers to break out of guest operating systems and attack the host operating system that VirtualBox runs on. Exploits using this method, known as a "virtual machine escape," have been the subject of intense interest among security researchers following the disclosure of the Venom vulnerability in 2015.

The vulnerabilities are collectively published as CVE-2018-2676, CVE-2018-2685, CVE-2018-2686, CVE-2018-2687, CVE-2018-2688, CVE-2018-2689, CVE-2018-2690, CVE-2018-2693, CVE-2018-2694, and CVE-2018-2698. While they all share the same resultant effect, the method involvedand subsequently the ease with which attackers can leverage the vulnerabilityvaries.

Original Submission

Read more of this story at SoylentNews.


Week ahead in tech: Lawmakers push to improve broadband access "IndyWatch Feed Tech"

A House panel will look into ways to build out the nation's broadband infrastructure in the coming week.The issue is getting added attention as President Trump is set to discuss his long-promised $1.7 trillion infrastructure proposal during Tuesday'...


It's Going To Take More Time To Get Vega Compute Support With The Mainline Kernel "IndyWatch Feed Tech"

This weekend I wrote how the AMDKFD discrete GPU support should be in place for the next kernel cycle, Linux 4.17. This is going to allow discrete Radeon GPUs to have ROCm working off the mainline kernel for OpenCL/compute support, but for 4.17 it's unlikely RX Vega GPUs will have compute working...


L2 CDP Added To Linux 4.16 For L2 Cache Partitioning On Intel CPUs "IndyWatch Feed Tech"

L2 Code and Data Prioritization (L2 CDP) is a feature of Intel's Resource Director Technology (RDT) that will now be supported with the Linux 4.16 kernel...


Scientists Just Created Rain and Snow on Demand in Idaho With Cloud Seeding "IndyWatch Feed Tech"

The ability to modify the weather has long belonged in the realm of science fiction, but now a team of scientists in Idaho think theyve figured out how to make it happen outside a lab.


Never-Before-Seen Viruses With Weird DNA Were Just Discovered in The Ocean "IndyWatch Feed Tech"

The ocean is crowded. As many as 10 million viruses can be found squirming in a single millilitre of its water, and it turns out they have friends we never even knew about.

Scientists have discovered a previously unknown family of viruses that dominate the ocean and cant be detected by standard lab tests. Researchers suspect this viral multitude may already exist outside the water maybe even inside us.

We dont think its ocean-specific at all, says environmental microbiologist Martin Polz from MIT.


Tesla Semi Spotted on California Street "IndyWatch Feed Tech"

Tesla has managed to ship several high-end electric vehicles to consumers, but commercial trucking is the companys next big move. After showing off its design for an electric semi truck, the company has been working on an aggressive release schedule. However, the vehicle hasnt been spotted in real life until now. A video uploaded to YouTube shows Teslas sleek electric semi cruising down a road in California.

There are few details to glean from this short clip (below). The original prototype trucks Tesla unveiled several months back did not have side mirrors, leading some to suspect Tesla had some fancy alternative in mind. The truck just spotted in the wild does have mirrors, though. Thats necessary for it to be street-legal, so Tesla probably just omitted the mirrors for the announcement to make the truck look cooler.

As you can see in the video, the front of the semi is narrower than standard diesel trucks. It doesnt need a giant engine, and the cab is slightly smaller with a centered drivers seat. Its vastly quieter than a regular semi as well. The truck doesnt even drown out other road noise as it passes the camera. Theres someone behind the wheel of the truck, but Tesla is touting the autopilot features of the vehicle. Although, many have pointed out Teslas self-driving tech is far behind the curve.


How to Optimize Your Home for Robot Servants "IndyWatch Feed Tech"

Robots can walk, talk, run a hotel and are entirely stumped by a doorknob. Or a mailbox. Or a dirty bathtubzzzzt, dead. Sure, the SpotMini, a doglike domestic helper from Boston Dynamics, can climb stairs, but it struggles to reliably hand over a can of soda. Thats why some roboticists think the field needs to flip its perspective. There are two approaches to building robots, says Maya Cakmak, a researcher at the University of Washington. Make the robot more humanlike to handle the environment, or design the environment to make it a better fit for the robot. Cakmak pursues the latter, and to do that, she studies so-called universal designthe ways in which buildings and products are constructed for older people or those with disabilities. Robot cant handle the twisting staircase? Put in a ramp. As for that pesky doorknob? Make entryways motion-activated. If you want droids at your beck and call someday, start thinking about robo-fitting your digs now.

1. Wide-Open Floor Plan Any serious sans-human housekeeping needs a wheeled robotic butler with arms, Cakmak says. That means fewer steps, plus hallways wide enough for U-turns. Oh, and hardwood floors. Thick carpeting slows a bots roll.

2. Visual Waypoints Factory robots work so fast in part because their world is highly structuredconveyor belt here, truck over there. So for your robo-home, create landmarks that anchor the bots in spacea prominent light fixture, say, that tells them, Youre in the dining room. (RFID tags will help bots locate smaller objects, like cleaning supplies.)


7 Ways to Automate Kubernetes at Scale in Production "IndyWatch Feed Tech"

The Kubernetes open source container orchestration engine is not a management platform, nor should it be mistaken for one. The whole point of orchestration is to reliably enable an automated system to facilitate the deployment and management of applications at scale, without the need for human intervention at each and every step. If the tools you use with and for Kubernetes dont enable automation, then youre not truly taking advantage of the benefits of orchestration.


Linux 4.16 Is Tightening Up Access To /dev/mem By Default "IndyWatch Feed Tech"

One of the security improvements to Linux 4.16 is improving the default behavior for restricted access to /dev/mem for x86/x86_64 and ARM64 systems...


New Memristor Design Can Hold Up to 128 Memory States Per Switch "IndyWatch Feed Tech"

Scientists develop new technology standard that could shape the future of electronics design

In a study published in the journal Scientific Reports [open, DOI: 10.1038/s41598-017-17785-1] [DX], researchers show how they have pushed the memristor a simpler and smaller alternative to the transistor, with the capability of altering its resistance and storing multiple memory states to a new level of performance after experimenting with its component materials.

[...] The University of Southampton team has demonstrated a new memristor technology that can store up to 128 discernible memory states per switch, almost four times more than previously reported.

In the study, they describe how they reached this level of performance by evaluating several configurations of functional oxide materials the core component that gives the memristor its ability to alter its resistance.

[...] Professor Prodromakis and his colleagues will be showcasing the technology, and presenting seven original research papers, at ISCAS 2018, an international circuits and systems conference, in Florence, Italy, in May.

"Almost four times more"?

Original Submission

Read more of this story at SoylentNews.


Researchers Use a Blockchain to Boost Anonymous Torrent Sharing "IndyWatch Feed Tech"

The Tribler client has been around for over a decade. We first covered it in 2006 and since then its developed into a truly decentralized BitTorrent client.

Even if all torrent sites were shut down today, Tribler users would still be able to find and add new content.

The project is not run by regular software developers but by a team of quality researchers at Delft University of Technology. There are currently more than 45 masters students, various thesis students, five dedicated scientific developers, and several professors involved.

Simply put, Triber aims to make the torrent ecosystem truly decentralized and anonymous. A social network of peers that can survive even if all torrent sites ceased to exist.

Search and download torrents with less worries or censorship, Tribers tagline reads.

Like many other BitTorrent clients, Tribler has a search box at the top of the application. However, the search results that appear when users type in a keyword dont come from a central index. Instead, they come directly from other peers.

Thribers search results

With the latest release, Tribler 7.0, the project adds another element to the mix, its very own blockchain. This blockchain keeps track of how much people are sharing and rewards them accordingly.

Tribler is a torrent client for social people, who help each other. You can now earn tokens by helping others. It is specifically designed to prevent freeriding and detect hit-and-run peers. Tribler leader Dr. Johan Pouwelse tells TF.

You help other Tribler users by seeding and by enhancing their privacy. In return, you get faster downloads, as your tokens show you contribute to the community.

Pouwelse, who aims to transform BitTorrent into an ethical Darknet, just presented the latest release at Stanford University. In addition, the Internet Engineering Task Force is also considering the blockchain implementation as an...


A Step-by-Step Guide to Git "IndyWatch Feed Tech"

If you've never used Git, you may be nervous about it. There's nothing to worry aboutjust follow along with this step-by-step getting-started guide, and you will soon have a new Git repository hosted on GitHub.


On Saturday Malwarebytes delivered a buggy update that caused excessive memory usage and crashes. "IndyWatch Feed Tech"

On Saturday Malwarebytes issued a buggy update to its home and enterprise products that caused serious problems for the users, including excessive memory usage, connectivity issues, and in some cases system crashes.

A buggy update rolled out over the weekend by Malwarebytes to its home and enterprise products caused serious problem for the users, including excessive memory usage, connectivity issues, and in some cases system crashes.

Malwarebytes issued the buggy update on Saturday morning (PST) and according to the security firm the software was only available only for 16 minutes before it removed it.

On the morning of Saturday, January 27th, 2018 protection update v1.0.3798 was released for all versions of Malwarebytes for Windows. As endpoints updated to this release, customers noticed their machines were reporting many Internet block notifications, and a sudden large increase in RAM usage reads the Root Cause Analysis published by Malwarebytes.

There are detection syntax controls in place to prevent such events as the one experienced in this incident. Recently we have been improving our products so that we can show the reason for a block, i.e. the detection category for the web protection blocks. In order to support this new feature, we added enhanced detection syntaxes to include the block category in the definitions. The unfortunate oversight was that one of the syntax controls was not implemented in the new detection syntax, which cause the malformed detection to be pushed into production.

malwarebytes buggy update

Some users reported problems to their connections that were blocked by the security software after the installation of the buggy update. Another displeasing problems reported by the users is the abnormal memory usage, the process associated with the application had used up more than 10 Gb of the (RAM), in some cases were also observed system crashes.



The Effects of the Spectre and Meltdown Vulnerabilities "IndyWatch Feed Tech"

Spectre and Meltdown aren't anomalies. They represent a new area to look for vulnerabilities and a new avenue of attack. They're the future of security -- and it doesn't look good for the defenders.


Distortion of the Patent System Masked Behind Acronyms Like CAFC/PTAB and Foreign-Sounding Jargon Like Estoppel or Inter Partes Review (IPR) "IndyWatch Feed Tech"

Its no secret, some argue, that lawyers make it difficult to understand the law so that youll always need them to help

Reference: Estoppel at Wikipedia

Summary: A quick look at some recent decisions/developments from the higher/highest patent courts in the US and PTABs judgments that help improve patent quality (and are therefore hated by the patent industry)

CAN one patent a GUI at the USPTO? The Court of Appeals for the Federal Circuit (CAFC) does not understand GUIs/software development [1, 2], so it recently defended a patent on a GUI, contrary to common sense. As somebody from Texas put it (Jonathan Szarzynski): Nice Precedential win for Core Wireless at the CAFC. A precedential opinion that discusses 101 and eligibility, and finds that a user interface that speeds a users navigation through various views and windows is patentable subject matter.

The case involves Synopsys, which now owns the nefarious, Microsoft-connected Black Duck.This is a potentially dangerous decision. Cascading menus are nothing new and to uphold a patent on those would open the floodgates to all sorts of trivial lawsuits (like Apples slide to unlock).

Recently, CAFC also looked at the case of patent assignor Hsiun (mentioned here before). The case involves Synopsys, which now owns the nefarious, Microsoft-connected Black Duck. The case is...


The Doomsday Clock Just Moved Closer to Midnight. Heres What You Need to Know "IndyWatch Feed Tech"

The Bulletin of the Atomic Scientists moved the doomsday clock closer to midnight on Thursday morning, warning the world that it is as close to catastrophe in 2018 as it has ever been.

They say the world is as close to catastrophe as it has been in the nuclear age.


Employers Want JavaScript, but Developers Want Python "IndyWatch Feed Tech"

When it comes to which programming languages are in demand by employers, JavaScript, Java, Python, C++, and Cin that ordercame out on top in a recent developer survey. Developers, however, want to learn languages like PythonGo, and Kotlin.


The Noisiest Seven-Segment Display Ever "IndyWatch Feed Tech"

Few mechanical clocks are silent, and many find the sounds they make pleasant. But the stately ticking of an old grandfather clock or the soothing sound of a wind-up alarm clock on the nightstand are nothing compared to the clattering cacophony that awaits [ProtoG] when he finishes the clock that this electromechanical decimal to binary to hex converter and display will be part of.

Undertaken as proof of concept before committing to a full six digit clock build, wed say [ProtoG] is hitting the mark. Yes, its loud, but the sound is glorious. The video below shows the display being put through its paces, and when the clock rate ramps up, the rhythmic pulsations of the relays driving the seven-segment flip displays is hypnotizing. The relays, one per segment of the Alfa Zeta flip displays, have DPDT contacts wired to flip a segment by reversing polarity. As a work in progress, [ProtoG] hasnt shared many more details yet, but he promises to keep us up to date on the converter aspect of the circuit. Right now it just seems like a simple but noisy driver. Well be following this one with interest.

If you prefer your clocks quieter but still like funky displays, check out this mixed media circus-themed clock.


A new report from MALWAREBYTES reveals a rise of 90% on ransomware detection in business "IndyWatch Feed Tech"

A new report from MALWAREBYTES titled Malwarebytes Annual State of Malware Report reveals a rise of 90% on ransomware detection in business.

The report brings to light new trends on hackers activities and threats especially the rise of ransomware as a tool of choice.

Researchers from MALWAREBYTES had gathered an enormous amount of data from the telemetry of their products, intel teams, and data science from January to November 2016 and to January to November 2017 to consolidate the evolution of the threat landscape of malware.

It is taken into account the tactics of infection, attack methods, development and distribution techniques used by hackers to target and compromise business and customers alike. There was a surge of 90% in ransomware detection for business customers in such way that it had become the fifth most detected threat. Regarding its modus operandi, the researchers found out a change in the distribution of malicious payloads, which includes banker Trojans and cryptocurrency miners.

Ransomware was on the rise, but it was not the only method employed by hackers. The report reveals that hackers had used banking trojans, spyware and hijackers to steal data, login credentials, contact lists, credit card data and spy on the user as an alternative way to compromise system security. The report discovered that hijackers detection grew 40% and spyware detection grew 30%. The report lists the Top 10 business threat detections with the five most significant threats being: Hijacker, Adware, Riskware Tool, Backdoor, and Ransomware respectively.


While the report covers a variety of threats, it emphasizes how malware outbreak had evolved. A game changer to the ransomware outbreak like WannaCry was the government exploit tool EternalBlue that was leaked and has been employed to compromise update processes and increased geo-targeting att...


Cloud Seeding For Snow: Does It Work? Scientists Report First Quantifiable Observations "IndyWatch Feed Tech"

Cloud Seeding For Snow: Does It Work? Scientists Report First Quantifiable Observations

Arthur T Knackerbracket has found the following story:

For the first time, scientists have obtained direct, quantifiable observations of cloud seeding for increased snowfall -- from the growth of ice crystals, through the processes that occur in clouds, to the eventual snowfall.

[...] Throughout the Western U.S. and in other semi-arid mountain regions across the globe, water supplies are maintained primarily through snowmelt. Growing human populations place a higher demand on water, while warmer winters and earlier springs reduce snowpack and water supplies. Water managers see cloud seeding as a potential way of increasing winter snowfall.

"But no one has had a comprehensive set of observations of what really happens after you seed a cloud," says Jeff French, an atmospheric scientist at the University of Wyoming (UW) and SNOWIE principal investigator. "There have only been hypotheses. There have never been observations that show all the steps in cloud seeding."

French is the lead author of a paper reporting the results, published in today's issue of the journal Proceedings of the National Academy of Sciences. Co-authors of the paper are affiliated with the University of Colorado- Boulder, University of Illinois at Urbana-Champaign, the National Center for Atmospheric Research, and the Idaho Power Company.

[...] "This research shows that modern tools can be applied to longstanding scientific questions," says Nick Anderson, a program director in NSF's Division of Atmospheric and Geospace Sciences, which funded the study. "We now have direct observations that seeding of certain clouds follows a pathway first theorized in the mid-20th century."

[...] "In the long-term, we will be able to answer questions about how effective cloud seeding is, and what conditions may be needed," says French. "Water managers and state and federal agencies can make decisions about whether cloud seeding is a viable option to add additional water to supplies from snowpack in the mountains."

Original Submission

Read more of this story at Soy...


Cybersecurity week Round-Up (2018, Week 4) "IndyWatch Feed Tech"

Cybersecurity week Round-Up (2018, Week 4) -Lets try to summarize the most important event occurred last week in 3 minutes.

The threats that most of all characterized this week are IoT botnets and malvertising.

Security experts at NewSkys believe the operators of the recently discovered Satori botnet are launching a new massive hacking campaign against routers to infect and recruit them in the botnet dubbed Masuta. The Masuta botnet targets routers using default credentials, one of the versions analyzed dubbed PureMasuta relies on the old network administration EDB 38722 D-Link exploit.

A new botnet called Hide N Seek (HNS botnet) appeared in the threat landscape, the malware is rapidly spreading infecting unsecured IoT devices, mainly IP cameras. The number of infected systems grew up from 12 at the time of the discovery up to over 20,000 bots.

Malware experts at CSE Cybsec uncovered a massive malvertising campaign dubbed EvilTraffic leveraging tens of thousands compromised websites. Crooks exploited some CMS vulnerabilities to upload and execute arbitrary PHP pages used to generate revenues via advertising.

The problems with Meltdown and Spectre security patches continue, Intel recommended to stop deploying the current versions of Spectre/Meltdown patches, while the Linux father Linus Torvalds defined the Spectre updates utter garbage.

Bell Canada suffers a data breach for the second time in less than a year.

Crooks continue to focus their interest on cryptocurrencies, researchers at PaloAlto Networks uncovered Monero Crypto-Currency Mining Operation impacted 30 Million users worldwide.

Maersk chair revealed its company reinstalled 45,000 PCs and 4,000 Servers after NotPetya Attack.

The week ended with a clamorous incident, the Japan-based digital exchange...


Top 10 Most Pirated Movies of The Week on BitTorrent 01/29/18 "IndyWatch Feed Tech"

This week we have three newcomers in our chart.

Thor Ragnarok is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This weeks most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (2) Thor Ragnarok 8.1 / trailer
2 (1) The Shape of Water (DVDScr) 8.0 / trailer
3 (3) Jumanji: Welcome to the Jungle (HDTS) 7.3 / trailer
4 () Bright 6.5 /...


What to Do When Your Brain Insists Youre Always on a Boat - Facts So Romantic "IndyWatch Feed Tech"

Chris Perry had felt the world bobbing beneath her feet for nearly four months, suffering from a disorder rather poetically dubbed Mal de Debarquement syndrome.Photograph by Zvonimir Orec / Shutterstock

A few years ago, Chris Perry went on an Alaskan cruise with her family to celebrate her parents 50th wedding anniversary. When she boarded the massive Norwegian Sun cruise ship, she felt a little woozy and weird from the boats gentle rocking, she remembers, but the sensation quickly faded. Perry didnt feel seasick at all during the rest of the cruise, and spent a happy week marveling at the glaciers. But while standing in the Anchorage airport to catch her flight home to San Francisco, she suddenly felt the ground moving under her, undulating with the gentle rhythm of waves.

Many people have experienced this sensation after getting off a boat; they may sway or stagger until their vestibular system re-adapts to stationary ground and they get their land legs back. For most people, the feeling vanishes within minutes or hours. But in rare cases, and for mysterious reasons, the illusion persists for months or even years. Perry is one of those unlucky ones, a sufferer from the disorder rather poetically dubbed
Read More

08:50 - 181,871 breached accounts "IndyWatch Feed Tech"

In November 2017, the open television database known as suffered a data breach. The breached data was posted to a hacking forum and included 182k records with usernames, email addresses and MySQL password hashes.


PCI DSS 3.2 will unveil compliance cramming culture "IndyWatch Feed Tech"

February 1, 2018 marks the deadline for businesses to adopt the new industry standard, PCI DSS 3.2, aimed at reducing and better responding to cyber attacks resulting in payment data breaches. Originally announced in 2016, the industry has had almost two years to prepare for these increased requirements but a significant percentage of businesses are still not prepared, secure payment solutions provider, PCI Pal, warns. The industry has developed a culture of compliance cramming, treating More


10,000-Year-Old "Crayon" Found "IndyWatch Feed Tech"

Archaeologists find 10,000-year-old crayon in Scarborough

An ochre crayon thought to have been used to draw on animal skins 10,000 years ago has been found by archaeologists. The crayon, which is just 22mm long, was discovered near the site of an ancient lake which is now covered in peat near Scarborough, North Yorkshire.

An ochre pebble was found at another site on what would have been the opposite side of the lake. The area is near one of the most famous Mesolithic sites in Europe, Star Carr. [...] The ochre - a pigment made from clay and sand - pebble has a heavily striated surface that is likely to have been scraped to produce a red pigment powder.

[...] Lead author of the study Dr Andy Needham said the latest discoveries help further our understanding of Mesolithic life. [...] He added: "One of the latest objects we have found looks exactly like a crayon, the tip is faceted and has gone from a rounded end to a really sharpened end, suggesting it has been used."

Also at University of York.

The application of micro-Raman for the analysis of ochre artefacts from Mesolithic palaeo-lake Flixton (DOI: 10.1016/j.jasrep.2017.12.002) (DX)

Original Submission

Read more of this story at SoylentNews.


Opt-Out Fitness Data Sharing Leads to Massive Military Locations Leak "IndyWatch Feed Tech"

People who exercise with fitness trackers have a digital record of their workouts. They do it for a wide range of reasons, from gathering serious medical data to simply satisfying curiosity. When fitness data includes GPS coordinates, it raises personal privacy concerns. But even with individual data removed, such data was still informative enough to spill the beans on secretive facilities around the world.

Strava is a fitness tracking service that gathers data from several different brands of fitness tracker think Fitbit. It gives athletes a social media experience built around their fitness data: track progress against personal goals and challenge friends to keep each other fit. As expected of companies with personal data, their privacy policy promised to keep personal data secret. In the same privacy policy, they also reserved the right to use the data shared by users in an aggregated and de-identified form, a common practice for social media companies. One such use was to plot the GPS data of all their users in a global heatmap. These visualizations use over 6 trillion data points and can be compiled into a fascinating gallery, but theres a downside.

This past weekend, [Nathan Ruser] announced on Twitter that Stravas heatmap also managed to highlight exercise activity by military/intelligence personnel around the world, including some suspected but unannounced facilities. More worryingly, some of the mapped paths imply patrol and supply routes, knowledge security officers would prefer not to be shared with the entire world.

This is an extraordinary blunder which very succinctly illustrates a folly of Internet of Things. Stravas anonymized data sharing obsfucated individuals, but didnt manage to do the same for groups of individuals like the fitness-minded active duty military personnel whose workout habits are clearly defined on these heat maps. The biggest contributor (besides wearing a tracking device in general) to this situation is that the data sharing is enabled by default and must be opted-out:

You can opt-out of contributing your anonymized public activity data to Strava Metro and the Heatmap by unchecking the box in this section. Strava Blog, July 2017

Weve seen individual fitness trackers hacked and weve seen...


Google Launches Chronicle, Combining Cybersecurity With Machine Learning "IndyWatch Feed Tech"

Alphabet/Google has launched "Chronicle", a company that combines cybersecurity with machine learning. It was started under Google's X "moonshot"-producing group:

Alphabetthe parent company of Google, Nest, Waymo, and a million other companiesis launching a new company under the Alphabet umbrella. It's called "Chronicle," and the new company wants to apply the usual Google tenets of machine learning and cloud computing to cybersecurity.

The company is already up and running with an absolutely awesome URL, "," along with two introductory blog posts (1, 2), a logo, a Twitter account, and a vague sales pitch for some kind of security analysis product. The Chronicle team started in February 2016 under Alphabet's "Moonshot factory" X group and, before now, had been in stealth mode.

Stephen Gillett, the new CEO of Chronicle, explained the company best by writing:

We want to 10x the speed and impact of security teams' work by making it much easier, faster and more cost-effective for them to capture and analyze security signals that have previously been too difficult and expensive to find. We are building our intelligence and analytics platform to solve this problem.

10x? We verbed that. Google that fact.

Original Submission

Read more of this story at SoylentNews.


Over 60 years ago, Albert Einsteins brain was stolen, dissected and sent in pieces all around the world "IndyWatch Feed Tech"

Einsteins secret to an incredibly intelligent brain may be in part to how well his brain aged

Samples of his brain revealed he was missing a protein Lipofuscin, a not so well understood compound which contains lipid residues of lysosomal digestion that accumulates in the brain liver kidney, heart muscle, retina, adrenals, nerve cells, and ganglion cells.

Lipofuscin busting drugs could have a lot of potential for anti-aging therapies for the future.


AMD AOCC Compiler 1.1 Released For Zen CPUs "IndyWatch Feed Tech"

AOCC 1.1 is the second public release of the AMD Optimizing C/C++ Compiler designed for Ryzen/Threadripper/EPYC processors...


The Court of Appeals for the Federal Circuit (CAFC) Revisits Divided Infringement "IndyWatch Feed Tech"

Judge OMalley on Travel Sentry v Tropp

Divided infringement
Reference: Divided infringement

Summary: Alluding again to the Akamai case (a famous GNU/Linux user), the Federal Circuit debates the practice of working around patents in creative ways

IN a recent case which is not about patent scope, the Court of Appeals for the Federal Circuit (CAFC) ruled on divided infringement.

While more radical sites such as Watchtroll wrote about it, so did more moderate sites. This recent interpretation of the Akamai test may at the very least make it more difficult for accused infringers to have divided infringement cases dismissed at the summary judgement stage, said a blog a couple of weeks ago.

Divided infringement is explained below:

Enforcing a patent with claims that raise the specter of divided infringement can be a difficult plight for patent owners. Even under the more liberal standard set forth in the Federal Circuits en banc decision in Akamai v. Limelight, it has proven difficult for patent owners to establish the necessary levels of control or cooperation between two or more parties who together perform the steps of a method claim. However, the Federal Circuit decision in Travel Sentry, Inc. v. Tropp suggests that the requisite level of cooperation or control should be considered broadly. This recent interpretation of the Akamai test may at the very least make it more difficult for accused infringers to have divided infringement cases dismissed at the summary judgement stage.


The Federal Circuit was authored by Judge OMalley and joined by Judges Lourie and Taranto.

Divided infringem...


Re: SQUID-2018:2 Denial of Service issue in HTTP Message processing "IndyWatch Feed Tech"

Posted by Amos Jeffries on Jan 28


Amos Jeffries
The Squid Software Foundation


Re: SQUID-2018:1 Denial of Service issue in ESI Response processing "IndyWatch Feed Tech"

Posted by Amos Jeffries on Jan 28


Amos Jeffries
The Squid Software Foundation


The Anti-PTAB (Patent Trial and Appeal Board) Lobby is Partly Funded by the Koch Brothers and the Right Wing "IndyWatch Feed Tech"

All fees ought to be paid/accommodated for by the party that pursued bogus patents

Inside How the Federalist Society & Koch Brothers Are Pushing for Trump to Reshape Federal Judiciary
Reference: Inside How the Federalist Society & Koch Brothers Are Pushing for Trump to Reshape Federal Judiciary

Summary: The Conservative effort to bypass the legal process (e.g. by exploiting Native Americans for their immunity) and defend terrible patents; more examples of awful attempts to simply dodge justice like those defended by the blowhards of the patent microcosm (Watchtroll et al)

THE Patent Trial and Appeal Board (PTAB) is a wonderful thing. To oppose PTAB is to oppose patent quality itself.

Who would oppose PTAB? Check out this upcoming event from a right-wing think tank. In it, Microsofts front group the Business Software Alliance (BSA) is trying to change policy so as to enable a scam around PTAB (Michael Shore the "scammer" is there also, not just the Vice President of Global Policy at BSA). Its a stacked panel.

Who promotes this thing? Mr. Mossoff, a Koch-funded scholar best known for defending patent trolls and other predatory behaviour. He speaks of abuses of PTAB as if PTAB itself is abusive. Its like these people come from another planet.

Patently-O, which has engaged in endless PTAB bashing for a very long time, spoke about patent games the other day. A patent was deemed unpatentable, whereupon came not an objection but games:



"Blockchain" Stocks Collapse by 40% to 90% "IndyWatch Feed Tech"

Short sellers are in Nirvana with these creatures that had surged by hundreds or even thousands of percent in days after they announced a switch to "blockchain" in their business model or added "Blockchain" to their name. Their shares are now crashing.

I have written about a number of these outfits and their crazy share-price moves and their silly stock manipulation schemes on the way up. Now, not much later, here's an update on how they're doing on the way down.

This is a true gem. On January 9, the SEC halted trading in UBIA shares, citing two reasons: "accuracy" in UBI's disclosures and very funny trading activity. This froze the share price at $22. The trading halt came 11 days after I'd lambasted the shenanigans by the company and its executives. On Tuesday (January 23), shares trading resumed and have since plunged to $8.25.

What caused the surge was the December 15 announcement a mix of gobbledygook, hype, and silliness, as I called it that it had acquired a "Blockchain-empowered solutions provider," etc. etc. What was not in the announcement was that the acquired "assets" belonged to a Singapore corporation that is 95% owned by Longfin's CEO and chairman. This was disclosed in the SEC filings, but no one betting on this crazy stuff reads SEC filings.

[...] For speculators that were able to get into and out of these scams in time, it worked. A 1,000% gain obtained in a few days by hook or crook is nothing to sneeze at. But it's ending in tears for those who got into these scams too late and whose despised fiat currency just ended up providing the exit grease for early speculators. And short sellers, the lucky ones that got the timing right, are laughing all the way to the hated legacy banks.

But not all will get the timing right. Short sellers, when they want to take profits, have to buy their shares back in order to cover their short position, and many of the stocks are thinly traded, and covering a big short position can cause shares to bounce violently. So there will be some serious snap-backs, which might take the fun out of shorting these stocks.



Does our telomere length play a role in our health? (a look back) "IndyWatch Feed Tech"

The debate over telomeres length is now back in the spotlight Here is a brief review of the top articles on telomere length, telomerase and human diseases such as cancer

A review of the top articles on telomerase and telomere length which play a role in the chronic diseases of aging, such as cancer.


Its No Longer Simply About Patent Quantity. Its About Quality. "IndyWatch Feed Tech"

Says the patent microcosm

Writing a check

Summary: Quality assessment of US patents is becoming a hotter topic now that PTAB cleans up the mess and courts oftentimes reject asserted patents (which are, on average, considered to be better)

THE truth of the matter is, many patents are of low quality, but those that end up in court are typically the better ones. A few days ago we stumbled upon this post from Finnegan, Henderson, Farabow, Garrett & Dunner LLP. It tracks PTABs progress reassessing particularly bad US patents:

The Patent Trial and Appeal Board issued 61 IPR and CBM Final Written Decisions in December, including decisions following remands from the Federal Circuit, cancelling 852 (73.83%) instituted claims while declining to cancel 301 (26.08%) instituted claims. Patent owners conceded only 1 claim (0.09%) through motions to amend or disclaimer in cases reaching a final decision. For comparison, the cumulative average rate of instituted claims cancelled in IPR and CBM Final Written Decisions is about 75%.

investors have become much more sophisticated. Its no longer simply about patent quantity. Its about quality, Finnegan wrote in another new article. Heres the relevant part:

Not so long ago, during investment rounds, the IP due diligence typically conducted by a VC or CVC involved little more than asking, How many patents does your company have? A satisfactory number provided in response often ended the inquiry.

Today however, investors have become much more sophisticated. Its no longer simply about patent quantity. Its about quality. Now, investors often spend the time between the term sheet and the closing carefully assessing the blocking power of the investments patent portfolio. They examine the IP with a magnifying glass. If investors are not satisfied with the strength of a patent portfolio, they walk away from the deal or lower the valuation.



More Than Just An Atari Look-Alike "IndyWatch Feed Tech"

The Raspberry Pi has been a boon for hackers with a penchant for retro gaming. Redditor [KaptinBadkruk] Wanted to get on board the game train and so built himself an Atari 2600-inspired Raspberry Pi 3 console!

A key goal was the option to play Nintendo 64 titles, so [KaptinBadkruk] had to overclock the Pi and then implement a cooling system. A heatsink, some copper pads, and a fan from an old 3D printer all secured by a 3D printed mount worked perfectly after giving the heatsink a quick trim. An old speaker and a mono amp from Adafruit and a few snags later had the sound set up, with the official RPi touchscreen as a display.

After settling on an Atari 2600-inspired look, [KaptinBadkruk] laboured through a few more obstacles in finishing it off namely, power. He originally intended for this  project to be portable, but power issues meant that idea had to be sidelined until the next version. However that is arguably offset by [KaptinBadkruk]s favourite part: a slick 3D Printed item box from Mario Kart front and center completes the visual styling in an appropriately old-meets-new way.

That item block isnt the first time a lightshow has accompanied an Atari console, but dont let that sto...


Washington State Bill Would Make Hard-to-Repair Electronics Illegal "IndyWatch Feed Tech"

A number of states are considering right to repair bills, legislation which if passed would make it easier for individuals and repair shops to replace or repair electronics parts. reports that 17 states have already introduced bills this year and while most aim to make repair parts and manuals accessible, Washington's proposed legislation would straight up ban electronics that prevent easy repair. "Original manufacturers of digital electronic products sold on or after January 1, 2019, in Washington state are prohibited from designing or manufacturing digital electronic products in such a way as to prevent reasonable diagnostic or repair functions by an independent repair provider," says the bill. "Preventing reasonable diagnostic or repair functions includes permanently affixing a battery in a manner that makes it difficult or impossible to remove."

[...] Naturally, tech groups have jumped to make their opposition clear. In a letter to Morris, groups such as the Consumer Technology Association, the Telecommunications Industry Association and the Computer Technology Industry Association said the bill was "unwarranted" and added, "With access to technical information, criminals can more easily circumvent security protections, harming not only the product owner but also everyone who shares their network."

Source: Engadget

Original Submission

Read more of this story at SoylentNews.


How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI "IndyWatch Feed Tech"

A look at Lt. Gen. Paul Nakasones public statements about artificial intelligence, offense, and defense.

The Army general likely to be tapped to head U.S. Cyber Command and the NSA has some big plans for deploying cyber forces and using artificial intelligence in information attacks.

Lt. Gen. Paul Nakasone, who currently leads U.S. Army Cyber Command, is expected to nominated in the next few months to replace Adm. Michael Rogers, as first reported by The Cipher Brief (and confirmed by the Washington Post and a Pentagon source of our own). But caution is in order: the rumor mill says several other contenders are in the running, including Army Lt. Gen. William Mayville. Neither Cyber Command nor the Pentagon would comment about the potential nomination.


R600 Gallium3D Now Effectively At OpenGL 4.4, A Nudge Away From GL 4.5 "IndyWatch Feed Tech"

As a follow-up to the article a few days ago about nearly complete OpenGL 4.4~4.5 support for R600g, this pre-GCN older Radeon Gallium3D driver has landed in Mesa 18.1-dev Git support for its final OpenGL 4.4 extension...


NASA's Long-Lost IMAGE Satellite Found to be Still Transmitting "IndyWatch Feed Tech"

NASA's Imager for Magnetopause-to-Aurora Global Exploration, which was launched in 2000 and unexpectedly ceased operations in 2005, may still be operational and transmitting data:

After years in darkness, a NASA satellite is phoning home. Some 12 years since it was thought lost because of a systems failure, NASA's Imager for Magnetopause-to-Aurora Global Exploration (IMAGE) has been discovered, still broadcasting, by an amateur astronomer. The find, which he reported in a blog post this week, presents the possibility that NASA could revive the mission, which once provided unparalleled views of Earth's magnetosphere.

The astronomer, Scott Tilley, spends his free time following the radio signals from spy satellites. On this occasion, he was searching in high-Earth orbit for evidence of Zuma, a classified U.S. satellite that's believed to have failed after launch. But rather than discovering Zuma, Tilley picked up a signal from a satellite labeled "2000-017A," which he knew corresponded to NASA's IMAGE satellite. Launched in 2000 and then left for dead in December 2005, the $150 million mission was back broadcasting. It just needed someone to listen.

After Tilley revealed the discovery, word rocketed around to former members of IMAGE's science team, says Patricia Reiff, a space plasma physicist at Rice University in Houston, Texas, who was a co-investigator on the mission. "The odds are extremely good that it's alive," Reiff says. There also appears to be data beyond telemetry in the signal, perhaps indicating some of the satellite's suite of six instruments are working.

Original Submission

Read more of this story at SoylentNews.


DistroWatch Weekly, Issue 748 "IndyWatch Feed Tech"

This week in DistroWatch Weekly: Review: siduction 2018.1.0News: openSUSE 42.2 reaches EOL, SolydXK releases 32-bit community editions, building an Ubuntu robot, Ubuntu 18.04 to use Xorg by default, Mint improves testing processQuestions and answers: Desktop-friendly Debian and systemd boot timesReleased last week: Proxmox 5.0 "Mail Gateway", Netrunner 2018.01....


Ryzen Threadripper 1900X Should Report The Correct Temperature With Linux 4.16 "IndyWatch Feed Tech"

While the just-released Linux 4.15 kernel brings AMD Zen CPU temperature reporting support for Ryzen/Threadripper/EPYC processors, an oversight in the k10temp driver code is yielding an incorrect temperature for the Threadripper 1900X...


The Future Is Automated And Every Job Is At Risk [Automation, Pt. 1] "IndyWatch Feed Tech"

Robots are already changing jobs as an endless array of robots enter our everyday lives. From trucking to service work to high-end jobs like doctors and lawyers, this documentary explores how robotics and artificial intelligence are changing the workplace.

AJ+s documentary series on automation explores how advancements in artificial intelligence, robotics, machine learning and automated vehicles will affect jobs, cities and inequality. From trucking to radiology, new technology is already changing white collar and blue collar occupations, reshaping cities and concentrating wealth in the hands of the few. Robots are taking over the world as companies like Tesla, Amazon, Uber and Google are using robots to automate.

Subscribe for more videos:

Like us on Facebook:

Download the AJ+ app at

Follow us on Twitter:


Hackaday Links: January 28, 2018 "IndyWatch Feed Tech"

In case you havent heard, we have a 3D printing contest going on right now. Its the Repairs You Can Print Contest. The idea is simple: show off how you repaired something with a 3D printer. Prizes include $100 in Tindie credit, and as a special prize for students and organizations (think hackerspaces), were giving away a few Prusa i3 MK3 printers.

[Drygol] has made a name for himself repairing various home computers over the years, and this time hes back showing off the mods and refurbishments hes made to a pile of Amiga 500s. This time, hes installing some new RAM chips, fixing some Guru Meditations by fiddling with the pins on a PLCC, adding a built-in modulator, installing a dual Kickstart ROM, and installing a Gotek floppy adapter. Its awesome work that puts all the modern conveniences into this classic computer.

Heres an FPGA IoT Controller. Its a Cyclone IV and a WiFi module stuffed into something resembling an Arduino Mega. Heres the question: what is this for? There are two reasons you would use an FPGA, either doing something really fast, or doing something so weird normal microcontrollers just wont cut it. I dont know if there is any application of IoT that overlaps with FPGAs. Can you think of something? I cant.

Tide pods are flammable.

You know whats cool? Sparklecon. Its a party filled with a hundred pounds of LEGO, a computer recycling company, a plasmatorium, and a hackerspace, tucked away in an industrial park in Fullerton, California. Its completely chill, and a party for our type of people those who like bonfires, hammer Jenga, beer, and disassembling fluorescent lamps for high voltage transformers.



HPR2476: Gnu Awk - Part 9 "IndyWatch Feed Tech"

Awk Series Part 9 - printf The printf function allows for greater control over the output, in comparison to print. To follow along, you can either use these show notes or refer to the gawk manual. There are 3 main areas to cover: Basic printf syntax Format Control letters Format modifiers Syntax printf format, item1, item2, The big difference in the syntax of printf statements is the format argument. It allows you to use complex formatting and layouts for outputs. Unlike print, printf does not automatically start a new line after the function. This can be useful when you want to print all of the items in a column on a single line. For example, remember the example file, file1.csv: name,color,amount apple,red,4 banana,yellow,6 strawberry,red,3 grape,purple,10 apple,green,8 plum,purple,2 kiwi,brown,4 potato,brown,9 pineapple,yellow,5 Look at the difference between the following outputs: awk -F, 'NR!=1{print "Color", $2, "has", $3}' file1.csv and awk -F, 'NR!=1{printf "Color %s has %s. ", $2, $3}' file1.csv Control Letters Control letters control or cast the output to specific types. Use it as a way to convert ints to floats, ints to chars, etc. %c = to char. printf "%c", 65 prints a %i, %d = to int. printf "%i", 3.4 prints 3 %f = to float. printf "%c", 65 prints 65.000000 %e, %E = to scientific notation. printf "%e", 65 prints 6.500000e+01. If you use %E will use a capital E instead of e. %g = to either scientific notation or int. printf "%.2g", 65 prints 65, while printf "%.1g", 65 prints 6e+01 %s = to string. printf "%s", 65 prints 65 %u = to unsigned int. printf "%u", -6 prints 18446744073709551610 There are others. See documentation. Formatting N$ = positional specifier. printf "%2$s %1$s", "second", "first" n = spaces to the left of the string. -n = spaces to the right of string. space = prefix positive numbers with a space, negative numbers with a - + = prefix all numbers with a sign (either + or -) 0n = leading 0's before input. printf "%03i", 65 prints 065. ' = comma place holder for thousands. printf "%'i", 6500 prints 6,500 Below is an (crude) illustration of how I like to think when formatting output: 7 2 Color: RedXXXX Sum: X6 18 3 Total Sum:XXXXXXXX X34 See the following awk file BEGIN { FS=","; } NR != 1 { a[$2]+=$3; c+=$3; d+=1; } END { for (b in a) { printf "Color: %-7s Sum: %2in", b, a[b]; } print "----------------------" printf "%-18s %3in", "Total Sum:", c; printf "%-18s %3in&quot...


With Teen Mental Health Deteriorating Over Five Years, Theres a Likely Culprit "IndyWatch Feed Tech"

All signs point to the screen. Via: The Conversation: Around 2012, something started going wrong in the lives of teens. In just the five years between 2010 and 2015, the number of U.S. teens who felt useless and joyless classic symptoms of depression surged 33 percent in large national surveys. Teen suicide attempts []


Amazons New Supermarket Could Be Grim News for Human Workers "IndyWatch Feed Tech"

Sheelah Kolhatkar on whether the technology in Amazons new automated grocery store, Amazon Go, in Seattle, could eventually eliminate millions of retail jobs.



Distribution Release: Parrot Security OS 3.11 "IndyWatch Feed Tech"

Parrot Security OS is a Debian-based, security-oriented distribution featuring a collection of utilities designed for penetration testing and computer forensics. The project's latest release, Parrot Security OS 3.11, includes fixes for Metasploit and PostgreSQL as well as a new automobile hacking menu which includes tools for testing real....


Nissan Made Self-Parking Slippers Based on ProPilot Tech "IndyWatch Feed Tech"

Submitted via IRC for AndyTheAbsurd

It's even wackier than that autonomous chair Nissan made last year.

[...] Nissan this week unveiled its ProPilot Park Ryokan. Based on a traditional Japanese inn, or ryokan, the automaker added its tech to a number of items, including slippers, tables and floor cushions.

Each item is capable of moving back to a specified location after being moved, similar to how Nissan's ProPilot Park system is capable of using the steering, brakes and throttle to maneuver a vehicle into a parking space without human input. That means everything at the ryokan is always in the correct spot, and I imagine anyone staying there would get a kick out of watching slippers and tables move about without help.

But can they escape getting chewed on by the dog?


Original Submission

Read more of this story at SoylentNews.


CrossRAT keylogging malware targets Linux, macOS & Windows PCs "IndyWatch Feed Tech"

By Waqas

Another day, another malware This time, it is CrossRAT malware

This is a post from Read the original post: CrossRAT keylogging malware targets Linux, macOS & Windows PCs

Sunday, 28 January


The 4.15 kernel is out "IndyWatch Feed Tech"

Linus has released the 4.15 kernel. "After a release cycle that was unusual in so many (bad) ways, this last week was really pleasant. Quiet and small, and no last-minute panics, just small fixes for various issues. I never got a feeling that I'd need to extend things by yet another week, and 4.15 looks fine to me." Some of the more significant features in this release include: the long-awaited CPU controller for the version-2 control-group interface, significant live-patching improvements, initial support for the RISC-V architecture, support for AMD's secure encrypted virtualization feature, and the MAP_SYNC mechanism for working with nonvolatile memory. This release also, of course, includes mitigations for the Meltdown and Spectre variant-2 vulnerabilities though, as Linus points out in the announcement, the work of dealing with these issues is not yet done.


Supersonic air travel just took another big step toward rebirth "IndyWatch Feed Tech"


We are one step closer to an affordable reboot of supersonic flight. Japan Airlines (JAL) has invested $10 million in the Denver-based aerospace company, Boom Supersonic, thats planning to resurrect the method of travel. In exchange for their funding, JAL will be able to pre-order 20 of the new aircraft. The airlines president, Yoshiharu Ueki, said in a press release from December 5: Through this partnership, we hope to contribute to the future of supersonic flight with the intent of providing more time to our valued passengers while emphasizing flight safety.

Its been 14 years since British Airways and Air France grounded their Concorde fleets, and commercial air travel hasnt hit supersonic speeds since. Fourteen of these planes ferried first-class passengers from New York to London at speeds of 1,353 mph (2177.44 kph) twice as fast as the speed of sound making the jaunt across the pond in only 3.5 hours. Thats about half the time it takes a normal passenger plane to cross the Atlantic Ocean.


Social media giants pressed on foreign bots after memo campaign "IndyWatch Feed Tech"

An internet campaign pushing for the release of a classified memo produced by Republicans on the House Intelligence Committee has brought new scrutiny to how foreign groups can use social media to manipulate U.S. politics.Social media giants Twitter...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog