IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 20 November

02:08

Ex-Google Executive Is Starting His Own Artificial Intelligence Church TechWorm

Highly influential former Google engineer is developing an AI god

Anthony Levandowski, the former Google and Uber executive has filed paperwork with the IRS to officially register a religion centered around super-smart artificial intelligence (AI).

According to IRS documents, the new church of AI will aim to develop and promote the realization of a Godhead based on artificial intelligence and through understanding and worship of the Godhead [to] contribute to the betterment of society. Levandowski would be the leader in this case dean of the religion.

The robot god will head a non-profit religious organization called Way Of The Future (WOTF). According to the website (wayofthefuture.church), the movement is about creating a peaceful and respectful transition of who is in charge of the planet from people to people + machines.'

The basis of this new religion is that Levandowskis believes that AI will one day grow to such efficiency that it surpass and overpower humans.

Given that technology will relatively soon be able to surpass human abilities, we want to help educate people about this exciting future and prepare a smooth transition, the site explains. In recent years, we have expanded our concept of rights to both sexes, minority groups and even animals, lets make sure we find a way for machines to get rights too.

Lets stop pretending we can hold back the development of intelligence when there are clear massive short term economic benefits to those who develop it and instead understand the future and have it treat us like a beloved elder who created it, the site argues.

In a rare interview with WIRED, Levandowski shed more light on his new church WOTF. The gospel of the religion would be called The Manual, and will have rituals and even a physical place of worship.

According to WIRED, the religions activities will concentrate on the realization, acceptance, and worship of a Godhead based on Artificial Intelligence (AI) developed through computer hardware and software.

The church will perform outreach to AI industry leaders and professionals to network with those who are interested in the worship of a Godhead based on AI.

What is going to be created will effectively be a god, he said. Its not a god in the sense that it makes lightning or causes hurricanes. But if there is something a billion times smarter than the smartest human, what else are you going to call it?

He added, I would love for the machine to see us as its beloved elders that it respects and takes care of. We would want this intelligence...

02:01

Real-Life Electronic Neurons Hackaday

All the kids down at Stanford are talking about neural nets. Whether this is due to the actual utility of neural nets or because all those kids were born after AIs last death in the mid-80s is anyones guess, but there is one significant drawback to this tiny subset of machine intelligence: its a complete abstraction. Nothing called a neural net is actually like a nervous system, there are no dendrites or axions and you cant learn how to do logic by connecting neurons together.

NeruroBytes is not a strange platform for neural nets. Its physical neurons, rendered in PCBs and Molex connectors. Now, finally, its a Kickstarter project, and one of the more exciting educational electronic projects weve ever seen.

Regular Hackaday readers should be very familiar with NeuroBytes. It began as a project for the Hackaday Prize all the way back in 2015. There, it was recognized as a finalist for the Best Product, Since then, the team behind NeuroBytes have received an NHS grant, theyre certified Open Source Hardware through OSHWA, and there are now enough NeuroBytes to recreate the connectome of a flatworm. Its doubtful the team actually has enough patience to recreate the brain of even the simplest organism, but is already an impressive feat.

The highlights of the NeuroBytes Kickstarter include seven different types of neurons for different sensory systems, kits to test the patellar reflex, and what is probably most interesting to the Hackaday crowd, a Bra...

01:02

Experts discuss warning signs of eruption at Yellowstone super volcano Lifeboat News: The Blog

  • Geology
  • Volcanic Eruption

Experts discuss warning signs of eruption at Yellowstone super volcano

By.

01:02

Dark cloud over future force with current strain on troops, says DoDs top personnel official Lifeboat News: The Blog

A new survey is worrying the leader of DoDs personnel and readiness office about how the military will recruit in the future.

01:00

The Big Changes So Far For The Linux 4.15 Kernel - Half Million New Lines Of Code So Far Phoronix

We are now through week one of two for the merge window of the Linux 4.15 kernel...

00:43

Robert Mugabe Removed From Power in Zimbabwe by Military Coup SoylentNews

Zimbabwe awaits news on Mugabe's future

Zimbabweans are waiting to see what steps the military will take next after seizing control of the country. President Robert Mugabe is said to be under house arrest but the whereabouts of his wife Grace, who was bidding to succeed him as president, are unknown.

South African ministers have been in the capital Harare meeting the army and political parties. The Southern African Development Community (SADC) regional bloc will hold emergency talks on Thursday.

President Mugabe, 93, has been in control of Zimbabwe since it gained independence from Britain in 1980. But the power struggle over who might succeed him, between Mrs Mugabe and her rival former vice-president Emmerson Mnangagwa, has split the ruling Zanu-PF party in recent months.

More about Zimbabwe and former President Robert Mugabe.

Here is your emoji: . Use it well.

CNN: Zimbabwe: Talks underway to form transitional government, source says
NYT editorial: For Zimbabwe, a Coup Isn't the Answer

Extras from BBC: Zimbabwe: Did Robert Mugabe finally go too far? - BBC News
Zimbabwe latest: How can you tell if a coup is happening?

Update: 'Mugabe Must Go': Thousands in Zimbabwe Rally Against Leader
Zimbabwe: Zanu-PF leaders meeting to decide Mugabe future
Pressure weighs on Mugabe to quit after mass protests

Update 2: Zanu-PF has removed Mugabe as party leader, and he may be impeached if he does not resign the Presidency by Monday.


Original Submission

Read more of this story at SoylentNews.

00:07

FOSDEM 2018 Will Be Hosting A Wayland / Mesa / Mir / X.Org Developer Room Phoronix

This year at the FOSDEM open-source/Linux event in Brussels there wasn't the usual "X.Org dev room" as it's long been referred to, but for 2018, Luc Verhaegen is stepping back up to the plate and organizing this mini graphics/X.Org developer event within FOSDEM...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 19 November

23:32

De-authentication attack on Amazon Key could let crooks to disable your camera Security Affairs

Researchers with Rhino Security Labs demonstrated how to disable the camera on Amazon Key, which could let a rogue courier to access the customers home.

Earlier this month, Amazon announced for its Prime members the Amazon Key, a program that would allow a delivery person to enter your home under video surveillance, securely drop off the package, and leave with the door locking behind them. The system could also be used to grant access to the people you trust, like your family, friends, or house cleaner.

Sincerely, I dont like this idea, but many Prime users will appreciate it for sure.

Well, these users have to know that experts from the security firm Rhino Security Labs demonstrated how easy it is to hack the Amazon Key allowing unauthorized people to access your home.

The researchers have discovered a flaw in Amazons Key delivery service and Cloud Cam security camera that could be exploited by a rogue courier to tamper with the camera and knock it offline, making it appear no one is entering home.

Amazon Key app.png

Homeowners can use the Amazon Key app to remotely monitor their front door via a video feed and receive Amazon delivery alerts, the app used by Prime customers could be used to unlock and lock their door.

Experts from Rhino Labs developed an application that can forge a request from the Wi-Fi router the Cloud Cam device is connected to instruct the camera to halt displaying a frozen image on the video feed making it appear the users front door is closed.

The experts published a video PoC of so-called de-authentication attack. The attack sees  a courier unlocks the front door using the Amazon Key app,  then the attacker sends a de-authorization command to the Cloud Cam for turning off the camera.

The attack repeatedly blocks the Wi-Fi signal causing the Amazon Key app displaying a frozen image until the attackers cease the jamming.

The camera is very much something Amazon is relyin...

23:28

The Linux Kernel Is Still Rectifying The Year 2038 Problem Phoronix

The Linux kernel is still working to rectify the Year 2038 problem whereby the time values stored as signed 32-bit integers will wrap around...

23:13

Libre Computer Board Launches Another Allwinner/Mali ARM SBC Phoronix

The Tritium is a new ARM single board computer from the Libre Computer Board project...

23:01

Play A Claw Machine From Your Armchair Hackaday

Have you ever been seduced by a claw machine in an arcade, only to have your hopes of a cuddly toy dashed as it fails to hang onto your choice? Then youre in luck, because now you can play to your hearts content online. [Ryan Walmsley] wants you to control his Raspberry Pi-driven claw machine.

Hardware-wise hes replaced the original 8052 microcontroller and relay control with the Pi and a custom H-bridge PCB. We particularly light the warning: Highish voltage, and we feel it should appear more often. There is some code in his GitHub repository, but we suspect it doesnt have everything.

We had a lot of fun digging into the documentation on this one. From his initial thoughts through some prototyping and a board failure, to the launch of the online version and finally a run-down of how it all works, hes got it covered.

Sadly the machine itself isnt online all the time, it seems to be only online when [Ryan] is at home, so if you live on the other side of the world from his British base you may be out of luck. Fortunately though his previous live streams are online, so you can see it in action on a past outing below the break.

Of course what kind of swag do you load up in a claw machine like this one? On his Twitter feed weve seen tests of the aliens from Toy Story (who start their existence in a claw machine so quite fitting). The majority of items show in is recorded games now numbering over 2000 have been our beloved companion cube.

There have been a few claw machines here over the years, from this large custom build to this one built for a childs birthday.

Via...

22:57

Intel Icelake Support Added To LLVM Clang Phoronix

Initial support for Intel's Icelake microarchitecture that's a follow-on to Cannonlake has been added to the LLVM/Clang compiler stack...

22:42

Pope to lawmakers: Protect all people with health care laws Lifeboat News: The Blog

Increasingly, sophisticated and costly treatment are available to ever more limited and privileged segments of the population, and this raises questions about the sustainability of health care delivery and about what might be called a systemic tendency toward growing inequality in health care, the pope said.


VATICAN CITY Pope Francis on Thursday urged lawmakers to ensure that health care laws protect the common good, decrying the fact that in many places only the privileged can afford sophisticated medical treatments.

The comments came as U.S. lawmakers in Washington, D.C., have been debating how to overhaul the nations health insurance laws.

In a message to a medical association meeting at the Vatican, Francis expressed dismay at what he called a tendency toward growing inequality in health care. He said in wealthier countries, health care access risks being more dependent on peoples money than on their need for treatment.

22:42

Chinese robot becomes worlds first machine to pass medical exam Lifeboat News: The Blog

Its developer iFlytek Co Ltd, a leading Chinese artificial intelligence company, said on Thursday that the robot scored 456 points, 96 points higher than the required marks.

The artificial-intelligence-enabled robot can automatically capture and analyze patient information and make initial diagnosis. It will be used to assist doctors to improve efficiency in future treatments, iFlytek said.

This is part of broader efforts by China to accelerate the application of AI in healthcare, consumer electronics, and other industries.

22:33

Only review good products Techmoan

Video Title: 'This is a Review of Object A'
Me "Today I'm going to be reviewing object A"
(Long section in the middle)
Me "So there you go that was my review of object A"
Comments "Why did you review object A - there are a thousand alternative devices that may be better"
Me "But I can only review one - hence the review of object A, so now you know how good object A is"
Comments "But it turned out to be rubbish that's why you should have reviewed something else"
Me "But you've only drawn that conclusion because you just watched my review of it"
Comments "I don't understand why you'd buy this one anyway, you should have known it would be rubbish"
Conclusions
i) Read out the press release and don't go into any detail (like other reviews of this product).
ii) Don't point out any faults you experience along the way (because no one wants to know about your problems).
iii) Don't really review a product, just promote it.

22:22

Section 230 of the Communications Decency Act - 20 Years of Protecting Intermediaries SoylentNews

The Recorder reports on efforts to weaken Section 230 of the Communications Decency Act:

[...] 230 has proven to be one of the most valuable tools for protecting freedom of expression and innovation on the Internet. In the past two decades, we've (EFF) filed well over 20 legal briefs in support of 230, probably more than on any other issue, in response to attempts to undermine or sneak around the statute. Thankfully, most of these attempts were unsuccessful.

[...] The first wave of attacks on 230's protections came from plaintiffs who tried to plead around 230 in an attempt to force intermediaries to take down online speech they didn't like.

[...] The second wave of attacks came from plaintiffs trying to deny 230 protection to ordinary users who reposted content authored by others

[...] Another wave of attacks, also in the mid-2000s, came as plaintiffs tried to use the Fair Housing Act to hold intermediaries responsible when users posted housing advertisements that violated the law.

[...] We are now squarely in the middle of a fourth wave of attackefforts to hold intermediaries responsible for extremist or illegal online content. The goal, again, seems to be forcing intermediaries to actively screen users and censor speech. Many of these efforts are motivated by noble intentions, and the speech at issue is often horrible, but these efforts also risk devastating the Internet as we know it.

Read more of this story at SoylentNews.

22:16

Ericsson Demonstrates 5G In India: Throughput Of 5.7Gbps And Ultra-low Latency TechWorm

5G to generate $27 billion revenue potential for Indian telcos by 2026

Swedish communications technology firm Ericsson on Friday demonstrated the first-ever live 5G end-to-end demonstration in India using its 5G test bed and 5G New Radio (NR) delivering a throughput of 5.7 Gbps and ultra-low latency of 3 millisecond.

We are strengthening our commitment to the Indian market by pioneering the first live 5G demonstration in the country. The 5G technology showcase has been organised in the direction of creating a robust 5G eco system in the country even as the Government plans to have 5G network roll outs by 2020. 5G research and development is natural for Ericsson thanks to our innovation, R&D focus, technology leadership and thought leadership, said Nunzio Mirtillo, Head of Market Area SE Asia, Oceania and India, Ericsson.

The 5G technology exhibition at the Ericsson Connect 2017 featured several 5G use cases and live demonstration of essential technologies on the road to 5G like Gigabit LTE (1 GBPS download speeds) and License Assisted Access (LAA) technology.

The LAA live demo showcased how this technology can influence wireless network resources using higher frequency bands on a small cell architecture.

Other technology innovations presented in the showcase included advancements in Radio Network Evolution, 5G Ready Transport and Network Slicing. Ericssons new 5G platform comprises the 5G core, radio and transport portfolios, with digital support systems, transformation services and security.

5G will bring new level of performance and characteristics to the telecom networks, enabling new services and creating new ecosystems. New revenue streams will open for operators. 5G has the potential to enable 43 per cent incremental revenue opportunity for the Indian operators by 2026, added Nitin Bansal, Managing Director, Ericsson India.

According to the Ericsson 5G business report, 5G technology will enable a $27.3 billion revenue potential for the Indian telecom operators by 2026. This will be besides the revenue generated from traditional services, which is expected to grow up to $63 billion by 2026.

We have MoUs (agreements) with 36 operators globally. In India, we have recently tied up with Bharti Airtel for 5G technology, said Mirtillo. However, he did not divulge any financial details about the partnership.

Ericsson, who is already a vendor to Bharti Airtel in areas like managed services and 4G will work with Bharti Airtel on creating a planned roadmap for evolution of the network to the next-gen 5G technology.

The largest opportunity will be seen in sectors like manufacturing, energy and utilities followed by public safety and health sectors, a report by Ericsson said.

5G is expected to play a major role in digitalization of industries. 5G will bring new level of performance and characteristi...

21:52

Harm Still Caused by Granted Software Patents Techrights

KEEP CALM AND CRUSH PATENT TROLLSSoftware patents remain a trolls weapon of choice

Summary: A roundup of recent (past weeks) announcements, including legal actions, contingent upon software patents in an age when software patents bear no real legitimacy

SOFTWARE patents are bunk, but if you throw 26 of them at a rival (in six lawsuits which have software patents in the mix) you hope a settlement will be cheaper than justice. This is exactly what happened some days ago [1, 2, 3] and the aggressor said in its press release:

Align Technology, Inc. (NASDAQ: ALGN) today announced that it has filed six patent infringement lawsuits asserting 26 patents against 3Shape A/S, a Danish corporation, and a related U.S. corporate entity, asserting that 3Shapes Trios intraoral scanning system and Dental System software infringe Align patents.

The accused has responded in this press release:

We have today read the news of Align Technologys lawsuits against 3Shape in the USA. The said lawsuit and infringement claims are completely unfounded and without merit. 3Shape will vigorously defend itself against such claims.

How many of these are software patents we dont know for sure because we didnt look at 26 pertinent patents. But whats at stake here is definitely software. Unfortunately, the...

21:52

Danes Deploy Disruption Machine to Curb Online Piracy TorrentFreak

Over the years copyright holders have tried a multitude of measures to curb copyright infringement, with varying levels of success.

By now its well known that blocking or even shutting down a pirate site doesnt help much. As long as there are alternatives, people will simply continue to download or stream elsewhere.

Increasingly, major entertainment industry companies are calling for a broader and more coordinated response. They would like to see ISPs, payment processors, advertisers, search engines, and social media companies assisting in their anti-piracy efforts. Voluntarily, or even with a legal incentive, if required.

In Denmark, local anti-piracy group RettighedsAlliancen has a similar goal and they are starting to make progress. The outfit is actively building a piracy disruption machine that tackles the issue from as many sides as it can.

The disruption machine is built around an Infringing Website List (IWL), which is not related to a similarly-named initiative from the UK police. This list is made up of pirate sites that have been found to facilitate copyright infringement by a Danish court.

The IWL is a part of the disruption machine that RettighedsAlliancen has developed in collaboration with many stakeholders in the online community, the groups CEO Maria Fredenslund tells TorrentFreak.

The stakeholders include major ISPs, but also media companies, MasterCard, Google, and Microsoft. With help from the local government they signed a Memorandum of Understanding. Their goal is to make the internet a safe and legitimate platform for consumers and businesses while limiting copyright infringement and associated crime.

MoU signees

There are currently twelve court orders on which the list is based and two more are expected to come in before the end of the year. As a result, approximately 600 pirate sites are on the IWL, making them harder to find.

Every time a new court order is handed down, RettighedsAlliancen distributes an updated list to their the network of stakeholders.

Currently, all major ISPs in Denmark have agreed to implement the IWL in their systems based on a joint Code of Conduct. This means that all the ISPs jointly will block their customers access to infringing services thus amplifying the impact of a blocking order by magnitudes, Fredenslund explains.

Thus far ISPs are active...

21:20

Worlds first human head transplant carried out on corpses, claims controversial scientist TechWorm

Worlds first human head transplant successfully performed, scientists say

Dr. Sergio Canavero, the controversial Italian doctor and Director of the Turin Advanced Neuromodulation Group, made headlines last year when he announced his plans to perform the first human head transplant.

At a press conference in Vienna, Austria on Friday, Canavero has claimed a surgical team led by his collaborator Dr Xiaoping Ren of Harbin Medical University, China have successfully performed a groundbreaking 18-hour operation on a corpse reconnecting the spine, nerves and blood vessels of a severed head. For those unaware, Dr Ren had grafted a head onto the body of a monkey last year.

The first human transplant on human cadavers has been done, the maverick surgeon said in a video of the conference that he posted to Facebook.

While no evidence was provided to back the transplant, Dr Canavero said that details of the surgery, led by a team from Harbin Medical University in China, would be released within days by a surgical journal.

Speaking at the press conference, Dr Canavero said: For too long nature has dictated her rules to us. Were born, we grow, we age and we die. For millions of years humans has evolved and 110 billion humans have died in the process. Thats genocide on a mass scale. We have entered an age where we will take our destiny back in our hands. It will change everything. It will change you at every level.

He added, The first human head transplant, in the human mode, has been realised. The surgery lasted 18 hours. The paper will be released in a few days. Everyone said it was impossible, but the surgery was successful.

His teams next imminent step would be to perform the procedure on a living human paralysed from below the neck.

A full head swap between brain-dead organ donors is the next stage. And that is the final step for the formal head transplant for a medical condition which is imminent. It will be for a medical, neurological condition, not for life-extension, Dr Canavero said.

When asked if after initial tests in China, whether live procedures would go worldwide, Dr Canavero said, Given the amount of mean criticism we received I dont think we should go international. For instance, if you still stick to the Frankenstein schtick, which doesnt make sense, then no. This is a medical condition for people who are suffering awfully so it isnt a joke.

But not everyone in the medical community is convinced that Dr Canavero could actually ever achieve a successful head transplant. They claimed that while the surgery is both unethical and dangerous,, it could also cau...

20:01

3D Printed Cookie Molds for the Best Speculoos Hackaday

Experiencing nostalgia for the outstanding Belgian cuisine [Adam], currently stuck in Ohio, found himself in craving some home-made speculoos. For the uninitiated, speculoos is what those brown cookies usually served with coffee on planes dream of becoming one day.

To add some extra regional flavour, [Adam] decided to print his own molds featuring motifs from Brussels. The risks of 3D prints in the kitchen are the subject of a lively discussion. They are addressed in this project by recommending the use of food safe filament and sealant for the molds. The fact that the dough will be removed from the molds almost instantly and that the molds dont go into the oven puts the risks in the vicinity of using plastic cutting boards in your kitchen.

[Adam]s write up features solid, well illustrated baking instructions that should enable any of you to replicate this delicacy. Some links to additional references and two recipes are thrown in for good measure. The article finishes with detailed instructions for designing your own molds that take the properties of the medium into account, to ensure your custom motif will still be recognizable after baking. Line art with a stroke width of around 2-3 mm seems to work best. It is that time of year and we hope to see a lot more tricks to take your cookie and edible house designs to the next level so dont forget to send in a tip.

With 3D printed molds having been used to shape resin, silicone and even metal, we are at a point where cookie dough looks like a natural progression.


Filed under: 3d Printer hacks, cooking hacks

20:01

Hollywood Strikes Back Against Illegal Streaming Kodi Add-Ons SoylentNews

An anti-piracy alliance supported by many major US and UK movie studios, broadcasters and content providers has dealt a blow to the third-party Kodi add-on scene after it successfully forced a number of popular piracy-linked streaming tools offline. In what appears to be a coordinated crackdown, developers including jsergio123 and The_Alpha, who are responsible for the development and hosting of add-ons like urlresolver, metahandler, Bennu, DeathStreams and Sportie, confirmed that they will no longer maintain their Kodi creations and have immediately shut them down.

[...] The crackdown suggests the MPA/MPAA-led Alliance for Creativity and Entertainment has a thorough understanding of how owners of so-called "Kodi boxes" are able to stream TV shows and films illegally. While Colossus merely hosts the tools, urlresolver and metahandler did much of the heavy lifting for streamers. Their job was to scrape video hosting sites for relevant streaming links and serve them up for tools like Covenant inside Kodi. Streamers will find it very difficult to find working video streams of their favorite content without them, but they could reappear via a new host in the future.

Source: Hollywood strikes back against illegal streaming Kodi add-ons

Additional info at TorrentFreak and TVAddons.


Original Submission

Read more of this story at SoylentNews.

19:35

A second variant of the new Cryptomix Ransomware released in a few days Security Affairs

Malware researchers at MalwareHunterTeam discovered a new variant of the CryptoMix ransomware, the second one in just a few days.

A new variant of the CryptoMix ransomware was recently discovered by the experts at the MalwareHunterTeam, it is the second release of new variants this week.

The latest variant appends the. 0000 extension to encrypted files and uses new contact emails, for example, a test file encrypted by this variant has an encrypted file name of 0D0A516824060636C21EC8BC280FEA12.0000.

CryptoMix ransomware

The ransom note maintained the same file name  _HELP_INSTRUCTION.TXT, but now uses the y0000@tuta.io, y0000@protonmail.com, y0000z@yandex.com, and y0000s@yandex.com emails for a victim to contact for payment information.

This variant of the CryptoMix ransomware contains 11 public RSA-1024 encryption keys that will be used to encrypt the AES key used to encrypt the files on the victims PC.

This allows the ransomware to work completely offline with no network communication. This variants 11 public RSA keys are the same as the previous XZZX Cryptomix Ransomware variant. wrote Abrams.

As usual, let me suggest to backup your data and test the backup files to avoid ugly surprises.

Install a security software and maintain it and any other application up to date. It cou...

19:02

First-of-Its-Kind Satellite Launches to Track Earths Weather Like Never Before Lifeboat News: The Blog

The first in a series of four advanced polar-orbiting satellites launched to space on its third try early Saturday (Nov. 18), turning its watchful eye to improving the accuracy of weather forecasts and Earth observations.

The new Joint Polar Satellite System-1 satellite, or JPSS-1, launched into orbit atop a United Launch Alliance-built Delta II rocket at 4:47 a.m. EST (0947 GMT), lighting up the predawn sky over its Vandenberg Air Force Base in California. The successful liftoff came after two scrubbed launch attempts earlier this week due to high winds and boats inside the launch range restriction zone offshore.

Things went absolutely perfect today, NASA launch manager Omar Baez said after the JPSS-1 launch. The nations got another wonderful weather asset up in space. [The JPSS-1 Weather Satellites Mission in Pictures].

18:31

Brits: Make A Vote, Put Cash A Hackerspaces Way Hackaday

Those of you who have been involved in the running of a hackerspace or makerspace will know the never-ending struggle to maintain financial solvency, and the quest for sources of income to move your organisation forward. Its certainly a topic upon which Hackadays crew have some experience, more than one of us has helped run a space.

A good avenue to explore lies with community grants: money from organisations on a philanthropic basis to invest in community organisations. These can come from charities, governmental organisations, or even from companies as part of their corporate social responsibility. Its this last source of grant money that claims our attention today, because we are in the final days of voting for the Aviva Community Fund, in which the British financial and insurance company makes grants for worthy causes across the country. The causes compete to gain as much support as they can, and hope to thus win their prize.

Among the many worthy recipients of the cash are a selection of hackerspaces. First up are Hitchin Hackspace, whose Big Hak full-size rendition of a Milton Bradley Big Trak toy was featured in our coverage of EMF Camp 2016. They are building a new space in what well call a redundant community facility because it sounds better than Former public toilet, and winning a grant will help them a lot in that aim.

Then we have East London Makerspace. They have secured an unused garage to turn into a makerspace, as the capitals population of our community swells to support ever more spaces in its different suburbs. Like Hitchin, the money would go to the essential work involved in creating a functioning space where previously there was nothing.

Finally, we have the unexpected, a heating system from Milton Keynes Men In Sheds. If you know about Men In Sheds as a community organisation for older people, youll be wondering why this is listed here. What we havent told you is that MK Makerspace is a subgroup of the MK Shed that occupies the upstairs portion of their building, and what warms the Shedders also warms the hacker community of one of Britains new towns.

These appear to be the only hackerspaces bidding for grant money, but votes can usefully be given to other allied causes. Linlithgow Remakery and Tool Library, for instance could use a boost, as could the other Men In She...

17:46

Inside Google's Struggle to Filter Lies From Breaking News SoylentNews

Facebook has a fake news problem. Google has an evil unicorn problem.

"Evil unicorns" a term some Google engineers once coined, according to a former executive are unverified posts on obscure topics, full of lies. They pop up from time to time on the web and find their way into Google's search results. In an ideal world, Google's search algorithm should force these fake, pernicious creatures so low in search results that they are buried deep in the web where few can find them.

Here's the problem: These unicorns no, they've got nothing to do with highly valued startups are designed to surface in a void. And after a breaking news event, like a mass shooting, there's scant verified information for Google's engine to promote. As Jonathan Swift once wrote, falsehood flies, and the truth comes limping after it.

[...] After the Oct. 1 Las Vegas shooting, several accounts seemed to coordinate an effort to smear Geary Danley, a man misidentified as the shooter, with false claims about his political ties. There were no existing web pages or videos broadcasting that Danley was innocent, and in the absence of verified information, Google's algorithms rewarded the lies, placing inaccurate tweets, videos and posts at the top of search results. A month later, when Devin Patrick Kelley shot and killed 26 people in Sutherland Springs, Texas, YouTube videos and tweets mislabeled him as "antifa," a term for radical, anti-fascist protesters. This was not true, yet Google displayed these posts prominently.

[...] This is a familiar headache for the company. For years, Google fought and won a similar battle with spammers, content farms and so-called search engine optimization experts over which web pages should be shown at the top of search results. But these latest web manipulators are causing greater havoc by targeting a slightly different part of Google its real-time news and video results.

Source: Inside Google's Struggle to Filter Lies from Breaking News


Original Submission

Read more of this story at SoylentNews.

17:01

Huge 74181 is a Classic ALU You Can Actually Understand Hackaday

You can no longer buy a brand-new 74181, theyve been out of production for years. All is not lost though, for [Daves Dev Lab] have created a facsimile of one on a printed circuit board, using modern single-gate 74-series chips.

Why on earth would you want an oversized replica of an outdated logic chip from nearly five decades ago, we hear you ask? The answer lies in education. If you were to embark on learning about the internals of a microprocessor by taking a modern example such as the one that powers the device on which you are reading this, you would find it to be a daunting task. Over six decades of progress in computer technology have delivered the performance enhancements that put a supercomputer in your smartphone, but at the expense of a contemporary microprocessor being an extremely complex machine which you cant peer into for any level of understanding.

Simple enough to work your way throug...

16:57

Transforming Education through Imagination even for Tech Execs Lifeboat News: The Blog

 

Why do Silicon Valley technology executives send their children to an almost tech-free school? Several authors have explored this question, including New York University professor Adam Alter. In his book Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked Alter explores the case of a San Francisco Steiner-Waldorf school where 75% of students are the children of Silicon Valley tech execs. How ironic. 

In this piece I propose some additional reasons why imaginative education is becoming an approach of choice for parents wanting their children to become innovative, ecologically aware and even, as Whitehead suggests, to develop genius.  

The three factors of genius are the habit of action, the vivid imagination, and the discipline of judgment. Alfred North Whitehead, 1916.

When we offer children a lifeless, stale education, we not only destroy their vitality, but we dumb them down. Through industrial era excesses we have altered the biosphere to the extent that our planetary homeland may in the foreseeable future become inhospitable for human habitation. Climate crisis is recognised as a global geo-political issue. How can young people be expected to contend with such catastrophic futures? How can we turn around dead, stale thinking, awaken ecological thinking and bring education back to life?

Evolution of consciousness research tells us that 19th century...

15:25

Keystone Pipeline Leaks 210,000 Gallons of Oil in South Dakota SoylentNews

Keystone Pipeline leaks 210,000 gallons of oil in South Dakota

Keystone Pipeline leaks 210,000 gallons of oil in South Dakota

"A total of 210,000 gallons of oil leaked Thursday (Nov 16, 2017) from the Keystone Pipeline in South Dakota, the pipeline's operator, TransCanada, said.

Crews shut down the pipeline Thursday morning, and officials are investigating the cause of the leak, which occurred about three miles southeast of the town of Amherst, said Brian Walsh, a spokesman for the state's Department of Environment and Natural Resources.

This is the largest Keystone oil spill to date in South Dakota, Walsh said. The leak comes just days before Nebraska officials announce a decision on whether the proposed Keystone XL Pipeline, a sister project, can move forward."

Keystone pipeline - major leak/spill

Elsewhere there are notes of smaller spills in the same pipeline--this AC submitter is wondering about the long term use of a pipeline that is leaking when it's nearly brand new. Doesn't sound good for the long term.

PBS has a followup article from today (Saturday), 'We need to know' more about Keystone oil pipeline leak, tribal chairman says

The leak comes as the debate over the proposed path of the Keystone XL pipeline rages on. Nebraska's Public Service Commission is scheduled to announce its decision Monday on whether to permit TransCanada to build Keystone XL along its proposed route in the state, the Omaha World-Herald reported. A spokeswoman for the commission told the AP that the board's members will only use information provided during public hearings and official public comments in order to make their decision.

Related:
US District Court: Approval of Dakota Access Pipeline Violated the Law
Dakota Access Pipeline Suffers Oil Leak Even Before Becoming Operational
Company Behind Dakota Access Oil Pipeline Sues Greenpeace


Original Submission #1 Original Submission #2

Read more of this story at SoylentNews.

14:29

Original Torrentz Domain Names Listed For Sale TorrentFreak

Last year, the torrent ecosystem lost two of its biggest sites. First KickassTorrents was taken down following a criminal investigation by the FBI, resulting in indictments against the operators.

A few days later, Torrentz.eu decided to close its doors as well, albeit voluntarily. Without prior warning, all torrent listings were removed from the meta-search engine, which was the third largest torrent site at the time.

The sites operator kept the website online, but instead of offering links to the usual torrents, its users were left with the following message: Torrentz will always love you. Farewell.

Today, more than a year later, not much has changed. Torrentz is still online but the torrent search engine is still not functional. This role was taken over by an unrelated site carrying the name Torrentz2, which has millions of daily visitors itself now.

However, according to a message posted on the original Torrentz site, things may change in the near future. The original Torrentz domain names, including Torrentz.eu, Torrentz.com and Torrentz.in, are for listed sale.

Torrentz for sale

Considering the history of the site and the fact that it still has quite a bit of traffic, this may pique the interest of some online entrepreneurs.

For sentimental Torrentz fans, a sale can go both ways. It could either be used for a new torrent related venture, or someone could scoop it up just to fill it with ads, or even worse.

One thing potential buyers have to be aware of is that the site is still blocked in several countries, including the UK. This, despite the fact that it hasnt carried any links to infringing content for over a year.

TorrentFreak reached out to the owner of Torrentz to find out why he decided to sell the site now. At the time of writing we havent heard back yet, but its clear that hes ready to move on.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

...

14:01

DS212 Oscilloscope Review: Open Source and Great for Hacking Hackaday

Weve seen plenty of oscilloscopes that look like repurposed cell phones. Usually, though, they only have one channel. The DS212, has two channels and a signal generator! [Marco] gives his review and a quick tear down in the video below.

The scope isnt going to replace a big bench instrument, but for a portable scope with a rechargeable battery, it isnt bad. The 1 MHz analog bandwidth combines with a 10 megasample per second front end and 8K of sample memory. The signal generator can produce basic waveforms up to 1 MHz. We were somewhat surprised the unit didnt sport a touch screen, which is why you can see [Marcos] fingers in the screenshot above. He seems to like the dual rotary encoder system the devices uses for navigation.

Where this really stands out is that it is open source for the the firmware running on the STM32 processor inside. We so rarely see this for commercially available bench tools and it makes this a fine hacking platform. It&#8217...

13:04

Interstellar Asteroid Named: Oumuamua SoylentNews

The solar system's first "interstellar interloper" has been named 1I/Oumuamua. It is the first known "hyperbolic asteroid" from outside the solar system:

The first known asteroid to visit our Solar System from interstellar space has been given a name. Scientists who have studied its speed and trajectory believe it originated in a planetary system around another star.

The interstellar interloper will now be referred to as 'Oumuamua, which means "a messenger from afar arriving first" in Hawaiian. The name reflects the object's discovery by a Hawaii-based astronomer using an observatory on Maui. It was discovered on 19 October this year by Rob Weryk, a postdoctoral researcher at the University of Hawaii Institute for Astronomy.

[...] Scientists who have made observations of 'Oumuamua, say that despite its exotic origins, the asteroid is familiar in appearance. In a paper submitted to Astrophysical Journal Letters, they argue that its size, rotation, and reddish colour are similar to those of asteroids in our Solar System. Measuring about 180m by 30m, it resembles a chunky cigar.

"The most remarkable thing about ['Oumuamua'] is that, except for its shape, how familiar and physically unremarkable it is," said co-author Jayadev Rajagopal from the US National Optical Astronomy Observatory (NOAO).

Also at the National Optical Astronomy Observatory and Scientific American.

Previously: Possible Interstellar Asteroid/Comet Enters Solar System


Original Submission

Read more of this story at SoylentNews.

12:00

Linux 4.15 Is A Huge Update For Both AMD CPU & Radeon GPU Owners Phoronix

Linux 4.15 is shaping up to be a massive kernel release and we are just half-way through its merge window period. But for AMD Linux users especially, the 4.15 kernel release is going to be rocking...

11:38

Links 18/11/2017: Raspberry Digital Signage 10, New Nano Techrights

GNOME bluefish

Contents

GNU/Linux

11:01

Drill the Wet Side Wet and the Dry Side Dry Hackaday

Working mostly in metal as he does, [Tuomas Soikkeli] has invested in some nice tools. So when his sweet magnetic-base drill was in need of a new home, he built this two-in-one drilling station to maximize shop space and add some versatility to boot.

For the non-metalworkers out there, a mag-base drill is basically a portable drill press where the base is replaced with a strong electromagnet like the one shown here. Theyre often used in the construction trades to drill holes in steel beams or columns, and often include nice features like a built-in coolant system.

[Tuomas] effectively turned his mag-base drill into a very beefy drill press by mounting it to a disused miter saw stand. A thick piece of plate steel forms the base, and with holes and drain channels machined into it, used coolant can be captured in a drain pan below for reuse. A second base for a benchtop drill press means hes got a dry drilling station too, and the original support arms on the miter stand are ready for drilling long stock. The drawer below the dry side is a nice touch too.

Theres a lot to learn about fabrication from [Tuomas] video and the others on his channel, which is well worth checking out. And if you want to convert your drill press into a mag-base drill, why not check out...

10:59

Boston Dynamics' Atlas Can Now Backflip SoylentNews

Atlas, the hulking humanoid robot from Boston Dynamics, now does backflips.

To be clear: Humanoids aren't supposed to be able to do this. It's extremely difficult to make a bipedal robot that can move effectively, much less kick off a tumbling routine. The beauty of four-legged robots is that they balance easily, both at rest and as they're moving, but bipeds like Atlas have to balance a bulky upper body on just two legs. Accordingly, you could argue that roboticists can better spend their time on non-human forms that are easier to master.

But there's a case to be made for Atlas and the other bipeds like Cassie (which walks more like a bird than a human). We live in a world built for humans, so there may be situations where you want to deploy a robot that works like a human. If you have to explore a contaminated nuclear facility, for instance, you'll want something that can climb stairs and ladders, and turn valves. So a humanoid may be the way to go.

Source: https://techxplore.com/news/2017-11-atlas-robot-backflip.html

Also: https://www.wired.com/story/atlas-robot-does-backflips-now/

takyon: Don't forget the new SpotMini as seen at The Verge, Quartz, and Popular Mechanics. Even Ethanol-fueled couldn't stop it.


Original Submission #1   Original Submission #2

Read more of this story at SoylentNews.

09:18

Exfiltration of Personal Data by Session-Replay Javascript SoylentNews

The Freedom to Tinker has a post on using Javascript to facilitate the exfiltration of personal data by session-replay scripts.

You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make. But lately, more and more sites use "session replay" scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send them to third-party servers. Unlike typical analytics services that provide aggregate statistics, these scripts are intended for the recording and playback of individual browsing sessions, as if someone is looking over your shoulder.

The stated purpose of this data collection includes gathering insights into how users interact with websites and discovering broken or confusing pages. However the extent of data collected by these services far exceeds user expectations [1]; text typed into forms is collected before the user submits the form, and precise mouse movements are saved, all without any visual indication to the user. This data can't reasonably be expected to be kept anonymous. In fact, some companies allow publishers to explicitly link recordings to a user's real identity.

Though the post refers to scripts added by the web server intentionally, if third party, such an ISP, competiting company, or government agency, is in control of a certificate already loaded into a target's browser, either overtly or covertly, a Man-in-the-Middle attack is trivial with SSL/TLS and exfiltration scripts can be sent as payload. If you want to see the latency burden that even ostensibly well-behaved scripts cause, press ctrl-shift-i in the browser, select "network" and then reload the page.


Original Submission

Read more of this story at SoylentNews.

09:12

Intel Planning To End Legacy BIOS Support By 2020 Phoronix

Intel is planning to end "legacy BIOS" support in their new platforms by 2020 in requiring UEFI Class 3 or higher...

08:28

Turbo Boost Max 3.0 Support For Skylake Fixed With Linux 4.15 Phoronix

The platform-drivers-x86 updates have been sent in for Linux 4.15 and include a range of improvements for Intel hardware support. One of the bigger items is support for Skylake CPUs with Turbo Boost Max 3.0...

08:22

New Video Shows a Creepily Human-Like Robot Doing a Backflip Lifeboat News: The Blog

And with an apparently adequate battery too! None of the power lines are visible anymore!

Welcome to the NINJA-singularity!

So wax on.

Then wax off! wink


A new disaster robot has amazing human-like capabilities.

08:01

3D Printed WiFi Reflectors Custom Designed for the Building Hackaday

Are you a wizard at antenna design? Chances are youve never even given it a try, but this tool could change that. Most home-made WiFi signal boosting antenna plans around the Internet share one feature: they are directional antennas or reflectors. But WiPrint is a tool for designing custom WiFi reflectors that map to the specific application.

If we want to increase the signal strength in two or three different locations the traditional solution is an omnidirectional antenna. The problem is, although a good omnidirectional antenna increases the signal power in those locations we want, it also increases the signal power where we dont want.

A team of researchers led by Dartmouth College created WiPrint to allow users to input a floor plan, the location of the WiFi access point and a desired signal map into the system. The software uses an optimization algorithm to produce a custom reflector shape for that floor plan. The reflector can then be fabricated and placed next to the access point antenna to reflect and concentrate the signal in the specified area, while decreasing signal strength outside of it. The best thing is: you can actually 3D print the reflector and just glue tin foil on it!

The results show that optimized reflectors can weaken or enhance signals in target areas by up to 10 or 6 dB, respectively, and resulting in throughput changes by up to -63.3% or 55.1%. That is not the only advantage, as the researchers point out:

Our approach provides four benefits. First, it provides strong physical security by limiting the physical reach of wireless signals, hence creating a virtual wall for wireless signals. Second, it relies on a low-cost ($35), reproducible 3D reflector, which can be easily replaced upon substantial changes in the environment or coverage requirement. Third, it offers an easily accessible and easy-to-configure solution to non-expert users. Users only need to specify coverage requirements and a coarse environment model, with which our system computes a reflector shape tailored to the built environment. Finally, it is applicable to commodity low-end Wi-Fi APs without directional or multiple antennas.

The sad part is that, for now, no software is available. The study and results have just been presented at ACMs BuildSys 2017. It would be great to see something like this open-sourced. Meanwhile, this is further proof that [Brian Benchoff] knew what he was doing when he told you to use duct tape for superior WiFi range.


Filed under: wireless hacks ...

07:45

Paging Dan Mangan Noise to Signal

(A robot speaking to a heartbroken robot) I am sorry that my leaving causes you pain. But the algorithm wants what the algorithm wants.

What the cheque is in the mail was to the 20th century, and it must have been spam-filtered was to the first 15 years of the 21st, its the algorithms fault will be for the foreseeable future: the perfect all-purpose excuse.

Of course, excuses only work if they ring true. Plenty of cheques were delayed by postal services. Spam filters (which are themselves based on algorithms) still sometimes trap urgent emails from your nearest and dearest. And an algorithm can do a lot of damage, from...

07:41

23,000 Posts Techrights

Leaving 22 behind

Apple pie

Summary: 23,000 blog posts milestone reached in 11 years

THE SITE TECHRIGHTS recently turned 11 (earlier this month) and today it turns a new page. Were in the 23,000+ posts region and still growing in terms of visitorship, too. We have always been 100% financially independent and intend to always remain so. To help us be heard please spread the overall message (verbally or links); thats the best support we could ask for.

07:22

Eugenics 2.0: Were at the Dawn of Choosing Embryos Lifeboat News: The Blog

Nathan Treff was diagnosed with type 1 diabetes at 24. Its a disease that runs in families, but it has complex causes. More than one gene is involved. And the environment plays a role too.

So you dont know who will get it. Treffs grandfather had it, and lost a leg. But Treffs three young kids are fine, so far. Hes crossing his fingers they wont develop it later.

Now Treff, an in vitro fertilization specialist, is working on a radical way to change the odds. Using a combination of computer models and DNA tests, the startup company hes working with, Genomic Prediction, thinks it has a way of predicting which IVF embryos in a laboratory dish would be most likely to develop type 1 diabetes or other complex diseases. Armed with such statistical scorecards, doctors and parents could huddle and choose to avoid embryos with failing grades.

07:20

BlackBerry Cannot Sell Phones and Apple Looks Like the Next BlackBerry (a Pile of Patents) Techrights

Just in time for pie/cake day

Blackberries

Summary: The lifecycle of mobile giants seems to typically end in patent shakedown, as Apple loses its business to Android just like Nokia and BlackBerry lost it to Apple

THIS past autumn we started a Wiki page about BlackBerry because BlackBerry made it clear that it had become somewhat of a parasite; some in the mainstream media go as far as alleging that BlackBerry is still operating in troll mode something which is only likely to exacerbate in years to come.

When BlackBerry adopted Android we were hoping it would move away from patent aggression and/or passage of patents to dubious entities. BlackBerrys patent strategist is now out (maybe he got kicked out), but his legacy remains. Based on this days-old press release and early coverage from a BlackBerry news site, theres another patent deal that smells familiar (similar to previous deals):

BlackBerry continues to sign new patent licensing deals and the latest to be announced is a strategic licensing agreement with Teletry. As part of the agreement between Teletry and BlackBerry, Teletry will have the right to sublicense a broad range of BlackBerry patents to a majority of global smartphone manufacturers.

Based on later coverage from broader scope news sites (e.g. [1, 2]), BlackBerry has entered into a strategic patent licensing deal with Teletry. As per the agreement, Teletry can sub-license a host of BlackBerry patents to global smartphone manufacturers. The financial terms of the deal have not been disclosed yet.

One can imagine that BlackBerry will receive a modest bucket of money and many of the patents in question cover software. BlackBerry has got almost nothing left but patents; other companies too...

06:57

Fintech Firms in South Wales Facing Skilled Staff Battle SoylentNews

Some of the fastest growing financial technology firms in Wales are at risk of being held back by skills shortages, a leading specialist lawyer has warned.

Cerian Jones said so-called fintech companies have told her they are "chasing fish in the same small pool".

She said those firms not actually trying to fill a recruitment gap "are trying to retain staff so they don't go elsewhere".

Cardiff is facing competition from London and Bristol among other cities.

Ms Jones, a patents attorney and partner at UDL in Cardiff, said: "When I talk to software companies about what their biggest challenge is, nine times out of 10 it's recruitment.

"These are very skilled positions, needing skilled graduates with the right coding and development skills."

She said there was a lure of working in London and firms in south Wales were having to be creative in trying to entice people "in a candidates' market".

Some were finding it difficult, even when offering 60,000 salaries.

There you have it. You can code to make banks richer. In Cardiff.


Original Submission

Read more of this story at SoylentNews.

06:42

EFF and CCIA Use Docket Navigator and Lex Machina to Identify Stupid Patents (Usually Software Patents That Are Not Valid) Techrights

Lex MachinaSummary: In spite of threats and lawsuits from bogus inventors whom they criticise, EFF staff continues the battle against patents that should never have been granted at all

Judge Finds Stupid Patent Web Story is Protected Speech; thats the headline of a new report (found via Slashdot, which has a summary and comments). For those who forgot, the EFF has been sued or threatened with lawsuits for running series which merely criticise or bash particular patents clearly an act of free speech. The judge too saw it that way:

An Australian court cant make a California-based digital rights watchdog take down a web article that mocks a companys patent as stupid, a federal judge ruled Friday.

San Francisco-based Electronic Frontier Foundation sued Global Equity Management (SA) Pty Ltd., or GEMSA, in April, claiming the Australian firm exploited its home countrys weaker free speech protections to secure an unconstitutional injunction against EFF.

Kurt Opsahl, EFFs deputy executive director and general counsel, hailed the ruling as a victory for free speech.

This wasnt the first and maybe not the last legal action, either. Imagine a world where one is not allowed to criticise particular patents. Not too long ago (just before the weekend) it was said in Stupid Patent Data of the Month: the Devil in the Details that the EFF along with CCIA make use of particular tools that we often mention in relation to patent reform. To quote the EFF:

Bad patents shouldnt be used to stifle competition. A process to challenge bad patents when they improperly issue is important to keeping consumer costs down and encouraging new innovation. But according to a recent post on a patent blog, post-grant procedures at the Patent Office regularly get it wrong, and improperly invalidate patents. We took a deep dive into the data being relied upon by patent lobbyists to...

06:10

GNU Nano Text Editor Can Now Record & Replay Keystrokes Phoronix

GNU Nano 2.9 is now available as the latest feature release of this popular CLI text editor and it's bringing several new capabilities...

06:03

Official OpenBSD 6.2 CD set - the only one to be made! OpenBSD Journal

Our dear friend Bob Beck (beck@) writes:

So, again this release the tradition of making Theo do art has continued!

Up for sale by auction to the highest bidder on Ebay is the only OpenBSD 6.2 CD set to be produced.

The case and CD's feature the 6.2 artwork, custom drawn ans signed by Theo.

All proceeds to support OpenBSD

Go have a look at the auction

As with previous OpenBSD auctions, if you are not the successful bidder, we would like to encourage you to donate the equivalent of you highest bid to the project.

06:02

Why Waiting for Perfect Autonomous Vehicles May Cost Lives Lifeboat News: The Blog

Some people think autonomous vehicles must be nearly flawless before humans take their hands off the wheel. But RAND research shows that putting AVs on the road before theyre perfect improves the technology more quicklyand could save hundreds of thousands of lives over time.

05:42

Waiting for Perfect Autonomous Vehicles May Cost Lives Lifeboat News: The Blog

Putting autonomous vehicles on the road when they perform just better than human drivers could save hundreds of thousands of lives over time. This article explains: r.rand.org/5y4v

05:35

The Australian Productivity Commission Shows the Correct Approach to Setting Patent Laws and Scope Techrights

Well done, Australia

Australian stamp

Summary: Australia views patents on software as undesirable and acts accordingly, making nobody angry except a bunch of law firms that profited from litigation and patent maximalism

Rebuttals to the latest attacks on IP Australia are necessary. Theyre under attack* for cementing if not extending the ban on software patents. Even though Australia has, for a long time in fact, merely limited software patents, it has just banned software patents in a more explicit way. This should be very big news, but we hardly saw any press coverage about it (in spite of the language being English) and this new interview with the Director General of IP Australia mentions none of that either. What it does, however, mention is the motivation for some of the latest changes in lieu with recommendations from the Australian Productivity Commission (PC).

Rather than the outcomes of the judicial process with regard to IP, recent focus has been on improving access to the judicial system to pursue IP issues. The Australian Productivity Commission (PC) recently made international comparisons suggesting that Australia has robust IP enforcement arrangements, but that more can be done to improve the ability of rights holders to utilise Australias enforcement infrastructure, in particular for small to medium enterprises (SMEs). We have recently seen both the Federal Court of Australia and the Federal Circuit Court of Australia make efforts to improve accessibility and efficiency.

IP Australia is also committed to helping SMEs to understand that alternative methods of dispute resolution are available outside of the courts. We have recently launched an IP Mediation Referral Service, and we are working with the insurance sector to explore possibilities for trade mark defense insurance. It is early days for these initiatives and we continue to look for ways to assist in the enforcement area.

Mediation is already better; in the case of software, copyright is already enough.
_____
* Shelston IP has just paid to...

05:28

The Commercial Usenet Stinks on All Sides, Anti-Piracy Boss Says TorrentFreak

Dutch anti-piracy group BREIN has targeted pirates of all shapes and sizes over the past several years.

Its also one of the few groups keeping a close eye on Usenet piracy. Although Usenet and associated piracy are a few decades old already and relatively old-fashioned, the area still has millions of frequent users. This hasnt escaped the attention of law enforcement.

Last week police in Germany launched one of the largest anti-piracy operations in recent history. Houses of dozens of suspects connected to Usenet forums were searched, with at least 1,000 gigabytes of data and numerous computers seized for evidence.

In their efforts, German authorities received help from international colleagues in the Netherlands, Spain, San Marino, Switzerland and Canada. Rightfully so, according to BREIN boss Tim Kuik, who describes Usenet as a refuge for pirates.

Usenet was originally for text only. People were able to ask questions and exchange information via newsgroups. After it became possible to store video and music as Usenet text messages, it became a refuge for illegal copies of everything. Thats where the revenue model is based on today, Kuik says.

BREIN states that uploaders, Usenet forums, and Usenet resellers all work in tandem. Resellers provide free accounts to popular uploaders, for example, which generates more traffic and demand for subscriptions. Thats how resellers and providers earn their money.

The same resellers also advertise on popular Usenet forums where links to pirated files are shared, suggesting that they specifically target these users. For example, one of the resellers targeted by BREIN in the past, was sponsoring one of the sites that were raided last week, BREIN notes.

Last year BREIN signed settlements with several Usenet uploaders. This was in part facilitated by a court order, directing Usenet provider Eweka to identify a former subscriber who supposedly shared infringing material.

Following this verdict, several Dutch Usenet servers were taken over by a San Marino company. But, according to BREIN this company can also be ordered to share customer information if needed.

It is not unthinkable that this construction has been called into existence by Usenet companies who find themselves in hot water, Kuik says.

According to BREIN its clear. Large parts of Usenet have turned into a playground for pirates and people who profit from copyright infringement. This all happens while the legitimate rightsholders dont see a penny.

For a long time, thereR...

05:00

MiSTer Upgrades Vintage Computer Recreations Hackaday

The MiST project provides an FPGA-based platform for recreating vintage computers. We recently saw an upgraded board MiSTer with a similar goal but with increased capability. You can see a video of the board acting like an Apple ][ playing Pac Man, below.

The board isnt emulating the target computer. Rather, it uses an FPGA to host a hardware implementation of the target. There are cores for Apple, Atari, Commodore, Coleco, Sega, Sinclair and many other computers. There are also many arcade game cores for games like Defender, Galaga, and Frogger.

The MISTer uses a Terasic DE-10 board that sports an Altera Cyclone V SE. That FPGA has 110,000 logic elements and about 5K bits of block RAM. It also contains two ARM Cortex A9 CPUs running at 800 MHz. Theres a gigabyte of DDR3 RAM that the FPGA and the CPU can share. The ARM CPUs can boot Linux and you can emulate some or all things in software if you prefer. While there is a VGA output, theres also a video scaler making it possible to drive a standard HDMI output.

What makes MiSTer more than just an FPGA demo board are the three daughterboards (and, of course, the software and FPGA configurations). There is an SDRAM daughterboard, an I/O board, and an optional real time clock board. The project is open source, with all the schematics and Gerber files available.

The I/O board provides legacy VGA output and connections for audio outputs (analog and digital). It is optional if you dont want those features.

We looked at the original MiST impersonating a Macintosh if you want to compare the two boards. Maybe this set up is just what we need to create the computers that never existed.


Filed under: classic hacks, FPGA

Linux 4.14 File-System Benchmarks: Btrfs, EXT4, F2FS, XFS Phoronix

Our latest Linux file-system benchmarking is looking at the performance of the mainline Btrfs, EXT4, F2FS, and XFS file-systems on the Linux 4.14 kernel compared to 4.13 and 4.12.

04:38

Plastics Found in the Stomachs of Deep Sea Creatures SoylentNews

Plastics found in stomachs of deepest sea creatures

Animals from the deepest places on Earth have been found with plastic in their stomachs, confirming fears that manmade fibres have contaminated the most remote places on the planet.

The study, led by academics at Newcastle University, found animals from trenches across the Pacific Ocean were contaminated with fibres that probably originated from plastic bottles, packaging and synthetic clothes.

Dr Alan Jamieson, who led the study, said the findings were startling and proved that nowhere on the planet was free from plastics pollution. "There is now no doubt that plastics pollution is so pervasive that nowhere no matter how remote is immune," he said.

Evidence of the scale of plastic pollution has been growing in recent months. Earlier this year scientists found plastic in 83% of global tapwater samples, while other studies have found plastic in rock salt and fish. Humans have produced an estimated 8.3bn tonnes of plastic since the 1950s and scientists said it risked near permanent contamination of the planet.

Also at Newcastle University.


Original Submission

Read more of this story at SoylentNews.

04:08

An honest review of my personal experience with the Sky Soundbox (so far) Techmoan

The title says it all. I bought a Sky Soundbox and here's a video where I talk about my experiences with it.

As predicted this video has brought on a thousand cries of why did you get that why not use item X instead. Why why why and why.

The answers of course are all in the video...you can lead a horse to water etc, but needless to say this review of a Sky Soundbox is a review of a Sky Soundbox, not a review of any of the other speakers on the market that do similar things. 

There was also the usual, 'you are doing it wrong'...and of course the old classic, 'well it worked fine for me'. Now this isn't my first rodeo, if there's one thing I'm good at, it's setting up AV systems. In fact I'd say it was my number one skill far and above everything else.

Here's some more information copied from the updates in the video description text box.

So just to clarify my issues with the Soundbox. 

1) I couldnt get the Sky Q Soundbox Option menu to appear on my main TV...does this also mean the speaker isnt receiving the custom equalisation profiles delivered from the Sky Q box...your guess is as good as mine on that.      
      
2) I was prepared to live with number 1, its not too big a concern, the sound was good anyway....but the real problem for me, the one that killed this stone dead for my requirements is the fact the Soundbox doesnt auto-wake from standby when a video signal is sent through it from the Sky Q box.   
Also for those asking...the LG 65EF950V TV is running the latest available firmware 04.25.56
...but dont worry too much about the LG Firmware as the failure to wake issue is common to all three TVs I own.  
     
UPDATE 1: (15 November 2017)  I have been informed that the Soundbox *is* supposed to automatically wake up whenever the attached Sky Q box is brought out of standby. Some Soundbox owners have reported that this feature is working for them (and some others say it isnt). As mentioned in the video, I have tested this speaker on one Sky Q 2TB box and two different Sky Q Miniboxes connected to three different TVs..and it doesnt wake up for any of them. So thats 0% success on this feature for me. Your mileage may of course vary.     
       
UPDATE 2: (16 November 2017) Sky have issued a new firmware for the Skybox (however haven't said what it fixes or improves) https://www.sky.com/help/articles/update-your-sky-soundbox I...

04:03

YouTube terminated its own channel Citizentube for multiple or severe violations HackRead

By Waqas

In April 2007, YouTube launched its official channel on the

This is a post from HackRead.com Read the original post: YouTube terminated its own channel Citizentube for multiple or severe violations

04:02

Russia to go to the moon in new 30m spaceship Lifeboat News: The Blog

Russia is building a 30million space ship to explore the moon as part of its ambitious plan to become a superpower in space.

The Luna-25 will explore its south pole and collect soil samples to be sent back to earth for analysis.

No astronauts will travel in the lunar orbiter, which comes 40 years since Moscows last mission to the moon in the Luna-24.

03:57

Happy birthday, Security Affairs celebrates its Anniversary Today Security Affairs

Happy BirthDay Security Affairs!

Six years together, I launched Security Affairs for passion in November 2011 and every day dozens of new friends join in my community.

It is a dream that comes true, thank your support, I started with a daily single post, today I try to cover the best news almost in real time ;-).

Im very happy and proud to be here with you for the sixth year. I want to thank you for the support and the interest in the subject. Six years passed away, the cyber security is assuming a crucial role in modern society.

Today it is much easier to speak about cyber security, Information warfare and cybercrime thanks to the work of Security Affairs, and many other media outlets and blogger that do it for passion.

I started for joke saying that Security is everyones responsibility, this is my idea of cyber security that is becoming the spot of government organizations worldwide.

Ill continue to spread awareness, it is essential to improve the resilience to cyber attacks on our infrastructure. The information sharing is a pillar of any cyber security strategy, spreading and sharing the information on a cyber threats is possible to mitigate them.

I have many ideas to improve our experience, but the time seems to be not enough 

I really appreciate your suggestions (pierluigi.paganini@securityaffairs.co), Ill do all the best to make better.

I wish all the best for you and your families

Sincerely, Thank you!

Pierluigi

Security Affairs

Thank you, Grazie!

...

03:26

A new EMOTET Trojan variant improves evasion techniques Security Affairs

Security experts at Trend Micro had recently observed a new variant of the EMOTET banking Trojan that implements new evasion features.

EMOTET, aka Geodo, is linked to the dreaded Dridex and Feodo (Cridex, Bugat)  malware families.

In past campaigns, EMOTET was used by crooks to steal banking credentials and as a malicious payload downloader.

The experts observed a re-emergence in the EMOTET activity in September, but the resents attacks present a few significant changes to elude sandbox and malware analysis.

Based on our findings, EMOTETs dropper changed from using RunPE to exploiting CreateTimerQueueTimer. states Trend Micro.

The CreateTimerQueueTimer is a Windows application programming interface (API) that creates a queue for lightweight objects called timers that enable the selection of a callback function at a specified time.

The original function of the API is to be part of the process chain by creating a timer routine, but here, the callback function of the API becomes EMOTETs actual payload. EMOTET seems to have traded RunPE for a Windows API because the exploitation of the former has become popular while the latter is lesser known, theoretically making it more difficult to detect by security scanners, continues Trend Micro.

Other malware already abused this Windows API, such as the Hancitor banking Trojan and VA...

03:22

UN panel agrees to move ahead with debate on killer robots Lifeboat News: The Blog

A U.N. panel agreed Friday to move ahead with talks to define and possibly set limits on weapons that can kill without human involvement, as human rights groups said governments are moving too slowly to keep up with advances in artificial intelligence that could put computers in control one day.

Advocacy groups warned about the threats posed by such killer robots and aired a chilling video illustrating their possible uses on the sidelines of the first formal U.N. meeting of government experts on Lethal Autonomous Weapons Systems this week.

More than 80 countries took part.

03:22

Hopping R2D2 bot to blast off to the lunar surface in 2019 Lifeboat News: The Blog

The MX-1E spacecraft is slated to fly before the end of the year aboard a Rocket Lab Electron booster, which launches from New Zealand and will attempt to win the $20M Google Lunar XPRIZE

The firm is is developing a fleet of low-cost robotic spacecraft that can be assembled like Legos to handle increasingly complex missions.

The initial spacecraft, known as MX-1E, is a similar size and shape to the R2D2 droid from Star Wars, and is slated to fly before next year aboard a Rocket Lab Electron booster, which launches from New Zealand.

03:09

Darling Is Still Active With A Goal To Run macOS Apps On Linux Phoronix

It's been one year and a few days when last researching a status update on "Project Darling" for running macOS/OSX applications on Linux. While the project hasn't been generating too much buzz this year, it still is being developed...

02:33

Trump regulators signal new antitrust approach with AT&T merger The Hill: Technology Policy

The Trump administrations antitrust enforcers have fired a warning shot to AT&T and other companies hoping to pull off massive mergers.Makan Delrahim, the Justice Departments antitrust chief, is reportedly expected to take AT&T to court...

02:17

Amazon Key Flaw Could Let Rogue Deliverymen Disable Your Camera SoylentNews

WHEN AMAZON LAUNCHED[sic] its Amazon Key service last month, it also offered a remedy for anyonerealistically, most peoplewho might be creeped out that the service gives random strangers unfettered access to your home. That security antidote? An internet-enabled camera called Cloud Cam, designed to sit opposite your door and reassuringly record every Amazon Key delivery.

But now security researchers have demonstrated that with a simple program run from any computer in Wi-Fi range, that camera can be not only disabled but frozen. A viewer watching its live or recorded stream sees only a closed door, even as their actual door is opened and someone slips inside. That attack would potentially enable rogue delivery people to stealthily steal from Amazon customers, or otherwise invade their inner sanctum.

Source: https://www.wired.com/story/amazon-key-flaw-let-deliverymen-disable-your-camera/

Previously: Walmart Wants to Deliver Groceries Directly Into Your Fridge
Amazon Wants to Deliver Purchases into Your Home


Original Submission

Read more of this story at SoylentNews.

02:11

Elon Musks Tesla Unveils Electric Semi Truck And Roadster TechWorm

Tesla unveils electric sports car and semi truck

The new convertible four-seater Roadster prototype, which sped into the event, can accelerate from 0 to 60 mph in just 1.9 seconds, and 0 to 100 mph in only 4.2 seconds.

This is the first time that any production car has broken nine seconds in a quarter mile, Musk said. The new Tesla roadster will be the fastest production car ever made period.

On the other hand, the two Tesla Semi trucks, one silver, and one a Batman-ish matte black, will achieve 0-60 mph in 5 seconds.  Its not like any truck that youve ever driven, Musk said.

The new Roadster has a top speed north of 250 mph and 620 miles (1,000 km) of estimated range on a single charge. These numbers sound nutty but theyre real, Musk insisted. Youll be able to travel from L.A. to San Francisco and back without recharging.

Musk described the Roadster as a hardcore smackdown to gasoline cars making driving a gasoline sports car feel like driving A steam engine with a side of quiche.

The Tesla Semi can pull the max allowable payload of 80,000 pounds over a distance of 500 miles at highway speeds on one charge even if its fully loaded. It also comes with a million-mile guarantee on its powertrain. Another guarantee is a full refund if the windscreen doesnt survive a thermonuclear blast Musk said it will be able to keep up a speed of 65 mph while going up a 5 percent grade.

Prices of the new Roadster start at $250,000 for the first 1,000 cars that will start production in 2020, with later models starting at $2,00,000. This would help Tesla raise $250 million plus the $50,000 deposits on reservations.

On the other hand, production of the truck is expected to start in 2019. While no price was released for the Tesla Semi trucks, it will be half the price of diesel semis and even less expensive than rail transport, said Musk. Customers who order now would get the vehicles in two years, Musk added.

J.B. Hunt, trucking and freight company, after the unveiling announced that it had placed a reservation to buy multiple Tesla Semi tractors, which it plans to use primarily on the West Coast.

Reserving Tesla trucks marks an important step in our efforts to implement industry-changing technology, J.B. Hunt President and CEO John...

02:03

15,000 Scientists Just Gave a Catastrophic Warning About The Fate of Humanity Lifeboat News: The Blog

Is this accurate?


A new, dire warning to humanity about the dangers to all of us has been written by 15,000 scientists from around the world.

The message updates an original warning sent from the Union of Concerned Scientists that was backed by 1,700 signatures 25 years ago. But the experts say the picture is far, far worse than it was in 1992, and that almost all of the problems identified then have simply been exacerbated.

Mankind is still facing the existential threat of runaway consumption of limited resources by a rapidly growing population, they warn. And scientists, media influencers and lay citizens arent doing enough to fight against it, according to the letter.

02:03

Another set of stable kernel updates LWN.net

The latest stable kernel updates are 4.13.14, 4.9.63, 4.4.99, and 3.18.82. Each contains the usual set of important fixes and updates.

02:03

US Missile Defenses Need Better Sensors, and Soon Lifeboat News: The Blog

Gaps in coverage leave interceptors less-equipped to defeat the threats of tomorrow.

No missile defense is better than the sensors that tell the interceptors where to go and what to kill. The Ground-based Midcourse Defense system, or GMD, draws upon considerably more sensors for homeland defense than when operations began in 2004, but shortfalls remain. The North Korean and other missile threats are not diminishing, and its time to get this right.

In a forthcoming report, we recommend that the Defense Department and Missile Defense Agency take several steps to improve the sensor backbone of Americas homeland missile defenses, including fielding a space layer, filling radar gaps, adding omnidirectional focus, and improving command and control. Unfortunately, the budget for missile defense sensors has fallen considerably over the past decade, exactly the wrong trend for our changing security environment.

02:00

Problems that Plagued an Edible Marble Machine Hackaday

Gears are three layers, stacked and cemented with sugar glue, and coated with a hard edible shine.

The original idea was to assemble laser-cut gingerbread parts to make the machine. Gingerbread can be laser-cut quite well, and at first all seemed to be going perfectly well for [Martin]. However, after a few days the gingerbread was sagging badly. Fiddling with the recipe and the baking was to no avail, and it was clear [Martin] needed to find something other than gingerbread to work with. After experimenting, he settled on a modified sugar paste which kept its shape and dried hard enough to work with. (While appearing to stretch most people...

01:23

German Regulators Ban Smartwatches for Kids, Urge Parents to Destroy Them Lifeboat News: The Blog

There is almost no privacy anymore.


Saying the technology more closely resembles a spying device than a toy, Germany regulators have banned the sale of smartwatches designed for kids, urging the parents who were dumb enough to buy them in the first place to destroy them.

01:23

Introducing SENS Lifeboat News: The Blog

The SENS Research Foundation is taking a repair based approach to aging to prevent the diseases and ill health of old age. Visit http://www.sens.org/ to learn more about their work.

01:03

Funtin SFF-8639: U.2 NVMe SSD To PCI-E Card Adapter Phoronix

With our review this week of the Intel Optane SSD 900P 280GB U.2 SSD there was a discussion in the forums about using U.2 SSDs in desktop systems, etc. If your system doesn't have a U.2 slot, an adapter like the Funtin SFF-8639 makes it easy to pop the SSD into a PCI-E x4 slot...

01:02

Terabytes of US military social media surveillance miserably left wide open in AWS S3 buckets Security Affairs

Three AWS S3 buckets containing dozen of terabytes resulting from surveillance on US social media were left wide open online.

It has happened again, other three AWS S3 buckets containing dozen of terabytes resulting from surveillance on US social media were left wide open online.

The misconfigured AWS S3 buckets contain social media posts and similar pages that were scraped from around the world by the US military to identify and profile persons of interest.

The huge trove of documents was discovered by the popular data breach hunter Chris Vickery, the three buckets were named centcom-backup, centcom-archive, and pacom-archive.

CENTCOM is the abbreviation for the US Central Command, the US Military command that covers the Middle East, North Africa and Central Asia, similarly PACOM is the for US Pacific Command that covers the Southern Asia, China and Australasia.

Vickery was conducting an ordinary scan for the word COM in publicly accessible S3 buckets when spotted the unsecured buckets, one of them contained 1.8 billion social media posts resulting from automatic craping activities conducted over the past eight years up to today. According to Vickery, it mainly contains postings made in central Asia, in many cases comments made by  US individuals.

Documents reveal that the archive was collected as part of the US governments Outpost program, which is a social media monitoring and narrowcasting campaign designed to target youngsters and educate them to  despise the terrorism.

The archive discovered by Vickery in fact includes the Outpost development, configuration files, as well as Apache Lucene indexes of keywords designed to be used with the open-source search engine Elasticsearch.

While public information about this firm is scant, an internet search reveals multiple individuals who worked for VendorX describing work building Outpost for CENTCOM and the Defense Department reads the blog post published by Upguard.

...

00:46

Google for Jobs adds new features to its job listings search tool TechWorm

Searching jobs made simpler, as Google updates tools to show salaries and location-based results

Google is looking to make search job easier for its job seekers. Back in June, it had introduced its job listing search feature that will help job seekers find a job right from the Search.

The internet giant on Wednesday announced in a blog post that it has updated its Google for Jobs platform, which is integrated into Googles search engine. The new function will now let users add salary-related information, location settings and job application choices based on which the details about open position will display in the Search results.

Now, based on feedback from job seekers, were introducing some new features to help make the process more efficient. Directly in Search, you can access salary information for job postings, improved location settings, job application choices, and in a couple of weeks, the ability to save individual jobs, said Nick Zakrasek, product manager for the job search platform, Google, in a blog post.

While these tools roll out immediately, Google also plans to add the ability to save individual job postings right in Google Search in a few weeks across all devices supporting internet access.

We all know the job hunt can be stressful, so Google is here to help. We review every piece of feedback we receive, and well continue to add tools to help make the job search easier for you, added Zakrasek.

With the newly added features, people searching for jobs will see estimated pay ranges for positions based on things such as job title, location and the company posting the job. Google has additionally updated its location filters to make it simpler for users to choose jobs between 2 to 200 miles (or anywhere) based on the flexibility of the job seeker.

The added tools have been added after an extensive research by a team found that an estimated 85 percent of job listings in the U.S. have salary information missing. Hence, Google have collaborated with job sources including Glassdoor, PayScale, LinkedIn, and Paysa among others to outline salary ranges based on the post as well as comparability to the estimated remuneration for the mentioned job post.

According to Google, since the job listing function has been rolled out five months ago, 60 percent of employers are now showing jobs in search results.

Unfortunately, it appears the service will be limited strictly to the U.S.

Source: Gadgets 360

The post...

00:28

KVM & Xen Don't Change Much With Linux 4.15 Phoronix

There are a ton of exciting improvements building up in Linux 4.15, but not too much on the virtualization front...

00:02

Neuroscience Is Helping Us Build a Machine With Consciousness Lifeboat News: The Blog

I always wondered if this was possible.


In a paper published, Science describes a team of neuroscientists striving to grasp the computational aspect of consciousness, and port it to a machine.

00:02

AI could be the perfect tool for exploring the Universe Lifeboat News: The Blog

Yes I agree.very good resource for this job!


In our efforts to understand the Universe, were getting greedy, making more observations than we know what to do with. Satellites beam down hundreds of terabytes of information each year, and one telescope under construction in Chile will produce 15 terabytes of pictures of space every night. Its impossible for humans to sift through it all. As astronomer Carlo Enrico Petrillo told The Verge: Looking at images of galaxies is the most romantic part of our job. The problem is staying focused. Thats why Petrillo trained an AI program to do the looking for him. Petrillo and his colleagues

00:02

Two Teams Have Simultaneously Unearthed Evidence of an Exotic New Particle Lifeboat News: The Blog

Very interesting!!


A few months ago, physicists observed a new subatomic particleessentially an awkwardly-named, crazy cousin of the proton. Its mere existence has energized teams of particle physicists to dream up new ways about how matter forms, arranges itself, and exists.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 18 November

23:56

HTC Cancels U.S. Release of a Google Daydream VR Headset, Reveals Own Standalone Headset SoylentNews

HTC will not widely commercialize a planned Google Daydream headset, but released more details about the Vive Focus, a standalone VR headset with integrated positional tracking:

HTC has officially revealed the Vive Focus, its all-in-one VR headset. As previously announced, the Vive Focus runs on a Qualcomm Snapdragon 835 chip and uses inside-out positional tracking. It should be the first standalone six-degrees-of-freedom VR headset to see release, though HTC isn't saying exactly when it'll be available.

[...] HTC has only announced plans for the Vive Focus in China just yet, and even then there aren't any details on pricing or a release date. If you were holding out for that Vive-branded standalone Google Daydream headset, meanwhile, there's bad news HTC and Google have cancelled their plans to bring it to the US.


Original Submission

Read more of this story at SoylentNews.

23:42

Emacs Tutorial New Think Tank

We'll cover how to move around, editing, repeating commands, regions, searching, buffers, frames, shells, macros and programming

23:18

Facebook Releases HHVM 3.23 With OpenSSL 1.1 Support, Experimental Bytecode Emitter Phoronix

HHVM 3.23 has been released as their high performance virtual machine for powering their Hack programming language and current PHP support...

23:05

Freedreno Gallium3D Supports A Fair Amount Of OpenGL 4.x Phoronix

The Freedreno Gallium3D driver that provides reverse-engineered OpenGL support for Qualcomm Adreno graphics processors is able to handle quite a bit of OpenGL 4...

23:00

Becoming Your Own ISP, Just for Fun Hackaday

When moving into a new house, its important to arrange for the connection of basic utilities. Electricity, water, and gas are simple enough, and then its generally fairly easy to set up a connection to an ISP for your internet connection. A router plugs into a phone line, or maybe a fiber connection and lovely packets start flowing out of the wall. But if youre connected to the internet through an ISP, how is the ISP connected? [Kenneth] answers this in the form of an amusing tale.

It was during the purchase of data centre rack space that [Kenneth]s challenge was laid down by a friend. Rather then simply rely on the connection provided by the data centre, they would instead rely on forging their own connection to the net, essentially becoming their own Internet Service Provider.

This is known as creating an Autonomous System. To do this involves several challenges, the first of which is understanding just how things work at this level of networking. [Kenneth] explains the vagaries of the Border Gateway Protocol, and why its neccessary to secure your own address space. Theres also an amusing discussion on the routing hardware required for such a feat and why [Kenneth]s setup may fall over within the next two years or so.

Its not for the faint hearted, and takes a fair bit of paperwork, but [Kenneth] has provided an excellent guide to the process if you really, really just need to own your own corner of the internet. That said, there are other networking tricks to cut your teeth on if youd like a simpler challenge, like tunneling IP over ICMP.

 


Filed under: internet hacks, slider

22:46

Linux 4.16 Will Be Another Big Cycle For Intel's DRM Driver Phoronix

We are just through week one of two for the Linux 4.15 merge window followed by eight or so weeks after that before this next kernel is officially released. But Intel's open-source driver developers have already begun building up a growing stack of changes for Linux 4.16 when it comes to their DRM graphics driver...

21:39

Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices SoylentNews

A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered in millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo.

As estimated during the discovery of this devastating threat, several IoT and smart devices whose operating systems are often updated less frequently than smartphones and desktops are also vulnerable to BlueBorne.

BlueBorne is the name given to the sophisticated attack exploiting a total of eight Bluetooth implementation vulnerabilities that allow attackers within the range of the targeted devices to run malicious code, steal sensitive information, take complete control, and launch man-in-the-middle attacks.

What's worse? Triggering the BlueBorne exploit doesn't require victims to click any link or open any fileall without requiring user interaction. Also, most security products would likely not be able to detect the attack. What's even scarier is that once an attacker gains control of one Bluetooth-enabled device, he/she can infect any or all devices on the same network.

These Bluetooth vulnerabilities were patched by Google for Android in September, Microsoft for Windows in July, Apple for iOS one year before disclosure, and Linux distributions also shortly after disclosure. However, many of these 5 billion devices are still unpatched and open to attacks via these flaws.

Source: https://thehackernews.com/2017/11/amazon-alexa-hacking-bluetooth.html


Original Submission

Read more of this story at SoylentNews.

21:33

The Truth Behind the Kodi Boxes Can Kill Their Owners Headlines TorrentFreak

Another week, another batch of Kodi Box Armageddon stories. This time it hasnt been directly about the content they can provide but the physical risks they pose to their owners.

After being primed in advance, the usual British tabloids jumped into action early Thursday, noting that following tests carried out on illicit streaming devices (aka Android set-top devices), 100% of them failed to meet UK national electrical safety regulations.

The tests were carried out by Electrical Safety First, a charity which was prompted into action by anti-piracy outfit Federation Against Copyright Theft.

A series of product safety tests on popular illicit streaming devices entering the UK have found that 100% fail to meet national electrical safety regulations, a FACT statement reads.

The news is all the more significant as the Intellectual Property Office (IPO) estimates that more than one million of these illegal devices have been sold in the UK in the last two years, representing a significant risk to the general public.

After reading many sensational headlines stating that Kodi Boxes Might Kill Their Owners, please excuse us for groaning. This story has absolutely nothing NOTHING to do with Kodi or any other piece of software. Quite obviously, software doesnt catch fire.

So, suspecting that there might be more to this than meets the eye, we decided to look beyond the press releases into the actual Electrical Safety First (ESF) report. While we have no doubt that ESF is extremely competent in its field (it is, no question), the front page of its report is disappointing.

Despite the items sent for testing being straightforward Android-based media players, the ESF report clearly describes itself as examining illicit streaming devices. Its terminology that doesnt describe the subject matter from an electrical, safety or technical perspective but is pretty convenient for FACT clients Sky and the Premier League.

Nevertheless, the full picture reveals rather more than most of the headlines suggest.

First of all, its important to know that ESF tested just nine devices out of the million or so allegedly sold in the UK during the past two years. Even more importantly, every single one of those devices was supplied to ESF by FACT.

Now, were not suggesting they were hand-picked to fail but its clear that the samples werent provided from a neutral source. Also, as well learn shortly, its possible to determine in advance if an item will fail to meet UK standards simply by looking at its packaging and casing.

...

21:20

Book review: Mastering Vim Quickly From WTF to OMG in no time nixCraft


The vim editor is a free and open source text editor. It is a clone of vi text editor. Vim is extremely popular among the Linux, macOS and Unix-like system users. Vim has many commands. It comes with a pretty extensive built-in manual too. One might get lost in the built-in manual. Let us see if "Mastering Vim Quickly From WTF to OMG in no time" can help a new or experienced vim user to increase productivity.

20:42

Antibiotic overuse is a ticking time bomb for Asia Lifeboat News: The Blog

Globally, antimicrobial resistance or AMR is becoming a core political, social and economic problem. The implications could never be more real than in Asia where, if no immediate action is taken, by 2050 about five million people are projected to die every year of conditions linked to bacterial infections resistant to antibiotics. This figure will be more than estimated cancer fatalities.


Katinka De Balogh says governments, individuals and health care professionals must all act to curb misuse before antibiotic-resistant bacteria creates a public health calamity.

20:37

Misconfigured Amazon S3 Buckets Exposed US Militarys Social Media Spying Campaign HackRead

By Waqas

UpGuards security researcher Chris Vickery has discovered three misconfigured AWS

This is a post from HackRead.com Read the original post: Misconfigured Amazon S3 Buckets Exposed US Militarys Social Media Spying Campaign

20:00

Upgraded Hotel Room Coffee Hackaday

The secret of cold-brew coffee is out. Department stores are selling gimmicks to make it at home or you can make it with a mason jar in good old-fashioned DIY style. This method is for the on-the-go hacker who may not have even the most spartan of equipment to brew a cold cup of Joe. Many hotel rooms are outfitted with a cheap percolating coffee machine and proprietary pods. The pods are just a sachet of filter paper with ground coffee inside.

Leave that percolating fire hazard unplugged and brew those pods overnight in a glass of water. In eight hours, you have a cup of rocket fuel. Compost the spent pod and away you go. Dont heat your brew in the coffee maker, thatll probably wreck it. Nuke it if you need it hot.

If coffee implements are your bag, heres a 3D printed coffee bean grinder but be sure to read up on 3D printing and food safety. If coffee isnt your cup of tea, how about a perfectly timed cup of tea?


Filed under: lifehacks

19:38

Researchers demonstrate Amazon Key system can be hacked HackRead

By Waqas

Rhino Security Labs researchers have discovered a vulnerability in Amazons

This is a post from HackRead.com Read the original post: Researchers demonstrate Amazon Key system can be hacked

19:30

City of Spring Hill in Tennessee still hasnt recovered from ransomware attack Security Affairs

In early November, the City of Spring Hill, Tenn, suffered a ransomware attack, but it still hasnt recovered from attack attack.

In early November, the City of Spring Hill, Tenn, suffered a ransomware attack, but government officials refused to pay a $250,000 ransom demanded by the crooks and attempted to restore the database recovering the content from backups.

The malware caused serious damages to the city, many of the ordinary activities were affected, city workers were not able to access their email accounts, and residents were  not able to make online payments or even use payment cards to pay utility bills or court fines, or conduct any other business transaction.

The situation is worse for emergency responders, the emergency dispatchers have had to log the calls, writing them by hand on a dry-erase board.

This keeps track of our active police officers and medics out on a call, said Director Brandi Smith about the white board.

We write it down on paper, take the call number, put it behind them, so no matter who is working they know where the officer is, because despite all this, officer safety is still important to us, she told News 2.

ransomware attack

According to WKRN, the ransomware attack has shut down all mobile data terminals in the citys police cars.

City officials announced that 911 system and city emails have been restored since Tuesday, the situation is more complicated for restoring direct deposits and online payments.

Investigators believe that the crooks havent stolen information from the citys server.

19:26

Massive U.S. Military Social Media Spying Archive Left Wide Open in AWS S3 Buckets cryptogon.com

Via: The Register: Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing dozens of terabytes of social media posts and similar pages all scraped from around the world by the US military to identify and profile persons of interest. The archives were found by UpGuards veteran security-breach hunter []

19:18

Feds Indict AlphaBay's PR Man SoylentNews

Friends don't let friends talk about drugs.

A 24-year-old man from Illinois has been accused by federal prosecutors of being the spokesman for AlphaBay, the now-defunct online drug marketplace.

On Wednesday, Ronald L. Wheeler III of Streamwood, Ill. was charged in federal court in Atlanta with "conspiracy to commit access device fraud," according to the Associated Press.
...
Prosecutors said that Wheeler operated online under the names "Trappy" and "Trappy-Pandora." He is said to have served as AlphaBay's "public relations specialist" beginning in May 2015, mediating sales disputes and promoting AlphaBay online, including on Reddit.

It is, however, OK to do PR for a company that launders billions of dollars for drug cartels.


Original Submission

Read more of this story at SoylentNews.

19:00

China making water tunnels 7 times longer than worlds longest to irrigate the desert Terra Forming Terra



 
 
This project is major of course. It creates the equivalent of the Great valley agriculture. Even that will be a beginning.  The irrigation will produce an increase in humidity in the Gobi basin and that will allow atmospheric irrigation as well.
 
 
The whole rain shadow of the Himalayas is prime agricultural and forest lands and much larger than China itself.  thus this will be a great beginning.
 
Likely a lot more water can be diverted as well.  They need to make India a co development partner in this as they also have the necessary manpower..  . China making water tunnels 7 times longer than worlds longest to irrigate the desert
brian wang | November 3, 2017 |
Chinas longest tunnel is the eight-year-old 85km Dahuofang water project in Liaoning province, while the worlds longest tunnel is the 137km main water supply pipe beneath the city of New York.
...

19:00

Learn How Your Face Can Reveal What Part of Your Body Is Sick, and What to Do About It Terra Forming Terra

 
An interesting modality worth applying for self work.  Actual worth is hard to determine in an age when quality diet is the exception.

The source of this knowledge is empirical from an age in which uniformity of diet was the norm.  Diet was rarely a variable.  

In our age that is the source of variability.

.
Learn How Your Face Can Reveal What Part of Your Body Is Sick, and What to Do About It



  http://www.riseearth.com/2017/10/learn-how-your-face-can-reveal-what.html

...

19:00

Peter Foster: How Trump saved freedom and democracy from the Climate Industrial Complex Terra Forming Terra







This maps out what has to be the first truly global fraud.  The science was bought and all other voices of sanity were silenced.  They still pretend they are right.


The whole premise was actually scientifically silly from the get go.  We live in the 10,000 year Holocene with a one degree variance. Any such theory needs a plus one degree shift for at least a century.  Not possible.


So here we are with the  invested still singing.  Soon enough we will see a full counter movement build up steam. .


Peter Foster: How Trump saved freedom and democracy from the Climate Industrial Complex


Donald Trump as saviour not just of American democracy but global freedom? One can imagine tall foreheads exploding everywhere at such a thought. Although he doesnt express it quite that strongly, this is one inevitable conclusion from Rupert Darwalls tremendous new book, Green Tyranny: Exposing the Totalitarian Roots of the Climate Industrial Complex. Thats because Trump, by abandoning the Paris climate agreement, and reversing his predecessors attempts to bypass Congress on environmental matters, has heaved a mighty wrench into the European-based thrust to impose global bureaucratic governance under the pretext of saving the world from climate catastrophe.

 

Beyond all the blather about Trumps presidency representing the triumph of redneck ignorance and deplorable racism and whatever Trumps personal shortcomings Darwall notes that one of the main reasons for his victory was that the American left had abandoned working people in pursuit of identity politics and radical environmentalism. From being the voice of working people, writes Darwall, the Democratic Party has become the political arm of the Climate Industrial Complex, an unholy alliance of bureaucrats, NGOs, green corporate rent-seekers and Silicon Valley oligarchs. With additional funding (as they like to say on PBS) from a raft of mega-billion-dollar foundations built on capitalist success but seemingly dedicated to destroying capitalism.


Darwall wrote Green Tyranny as a sequel to his similarly incisive 2013 book, The Age of Global Warming, specifically to expand on the critical roots of environmental ideology and power-seeking in Europe in particular Sweden and Germany. He also records how the issues of acid rain and nuclear winter were in many ways political trial runs for the great assault on freedom in the name of saving the...

19:00

Lawrence Solomon: The corruption of environmental regulation goes down the swamp drain Terra Forming Terra




 Wow. Read that last gag though.  Sue and settle is a complete one stop tactic allowing the rule makers to step outside all the legislative protections.  And of course it was naturally corrupt.

This will do more than all the laws to change the culture.

It surely needed to be done.
.
Lawrence Solomon: The corruption of environmental regulation goes down the swamp drain


http://business.financialpost.com/opinion/lawrence-solomon-the-corruption-of-environmental-regulation-goes-down-the-swamp-drain

EPA board members have for years been pocketing jaw-dropping grants from the very agency theyve been advising U.S. Environmental Protection Agency (EPA) headquarters in Washington. Justin Sullivan/Getty Images


Lawrence Solomon




November 3, 2017
11:29 AM EDT



Hardly a week goes by without Donald Trump finding new ways to drain the swamp. This week is no exception, with a cleanup announced for the Environmental Protection Agency that will especially target the global warming gravy train.


Heres how the gravy train operated until now: The EPA has 22 advisory committees. Many of these committees board members charged with providing independent, unbiased scientific advice for the EPA have themselves been conducting the research they determined was needed. But they dont do it as volunteers: Instead, these board members have for years been pocketing jaw-dropping grants from the very agency theyve been advising. Of the Clean Air Scientific Advisory Committees 26 members, for example, 24 were grantees, collectively receiving US$220 million in EPA grants. This conflict of interest has been especially egregious in the field of global warming, according to the new EPA administrator, Scott Pruitt, where members have the greatest financial incentives and sometimes obtained EPA grants to the tune of literally tens of millions of dollars.


The EPAs past administrators were not being bilked, however they were buying the research results they wanted. When President Obama assumed office eight years ago, he cleaned house at the EPA of those who might question the environmental orthodoxy. Staff and board positions were st...

18:28

Re: Multiple vulnerabilities in Jenkins Open Source Security

Posted by Daniel Beck on Nov 17

CVE-2017-1000391

CVE-2017-1000392

18:27

Re: Multiple vulnerabilities in Jenkins plugins Open Source Security

Posted by Daniel Beck on Nov 17

CVE-2017-1000386

CVE-2017-1000389

CVE-2017-1000388

CVE-2017-1000387

CVE-2017-1000390

18:25

Re: Multiple vulnerabilities in Jenkins plugins Open Source Security

Posted by Daniel Beck on Nov 17

CVE-2017-1000397

CVE-2017-1000402

CVE-2017-1000403

18:24

Re: Multiple vulnerabilities in Jenkins Open Source Security

Posted by Daniel Beck on Nov 17

CVE-2017-1000393

CVE-2017-1000395

CVE-2017-1000396

CVE-2017-1000398

CVE-2017-1000399

CVE-2017-1000400

CVE-2017-1000401

17:02

Surprise! Georgia Tech Teaching Assistant Isnt Human, Shes a Robot Lifeboat News: The Blog

Ahshok Goel has been employing a robot as one of his teaching assistants. But the thing is, the students never realized that they were talking to a robot.

IBMs Watson platform has done a number of remarkable things since its inception. Robots in retail stores are now powered by Watson, as are virtual assistants, and (of course) intelligent chatbots. If you arent farmilar with it, Watson gives robots and virtual platforms the ability to understand, learn, sense, and experience.

17:00

Raspberry Pi Compute Module 3 in a GameBoy Original Hackaday

[Kite] has been making custom PCBs for GameBoys for a long time. Long enough, in fact, that other people have used his work to build even more feature-rich GameBoy platforms. Unfortunately some of their work had stagnated, so [Kite] picked it up and completed a new project: a GameBoy that uses a Raspberry Pi running on his upgraded GameBoy PCB.

For anyone looking for that retro GameBoy feel but who wants important upgrades like a backlit color screen, or the ability to play PSP games, this might be the build for you. The video below goes into details about how it all fits together. If youre looking for more of a challenge in your GameBoy hacks, though, theres an ongoing challenge to build the tiniest GameBoy possible as well.

 


Filed under: nintendo gameboy hacks

16:57

Tesla Semi Truck Will Have a 500+ Mile Range SoylentNews

Elon Musk has unveiled the Tesla Semi Truck. It supposedly boasts a single-charge range of over 500 miles, more than what analysts had expected. Tesla could begin producing the vehicles by the end of 2019 (assuming it isn't delayed):

The truck can go from zero to 60 miles per hour in five seconds without a trailer, and in 20 seconds when carrying a maximum load of 80,000 pounds, less than a third of the time required for a diesel truck, he said.

He gave no price for the truck but hinted that it would be costly. "Tesla stuff is expensive," Mr. Musk said, drawing another cheer from the crowd, gathered at an airfield outside of Los Angeles. But he also said the electric truck would be less expensive to operate, in part because it has fewer components that require regular maintenance (no engine, transmission or drive shaft). Instead, the truck, called the Tesla Semi, is powered by a giant battery beneath the cab. It has two rear axles, each outfitted with two electric motors, one for each wheel. Its acceleration and uphill speeds will allow it to cover more distance in less time than diesel trucks, he added.

As a result, Tesla is estimating it will cost $1.26 per mile to operate, compared with $1.51 a mile for a diesel truck. The cost can fall further to 85 cents a mile, according to Tesla if groups of trucks travel together in convoys, which reduces wind drag. "This beats rail," Mr. Musk said.

Also at BBC, TechCrunch, and Firstpost.

Pre-conference coverage at Bloomberg

Previously:...

16:02

FAA Approves Drone As Cell Phone Tower In The Sky For Puerto Rico Lifeboat News: The Blog

Good idea, they could use the help!!


Updated at 5 p.m. ET

The FAA announced it has approved a drone that can function as a flying cell phone tower to help restore cellular service in Puerto Rico.

The aircraft is called the Flying COW, for Cell on Wings. Developed by AT&T, it flies up to 200 feet above the ground, and can provide voice, data and Internet service for 40 square miles.

15:42

New Missile Defense Agency Interceptor Destroys Multiple ICBMs, Decoys Lifeboat News: The Blog

Wow!!


The Pentagon is developing an emerging technology able to track, target and destroy approaching ICBMs and decoys simultaneously by attaching a new Multi-Object Kill Vehicle, or MOKV, to a Ground Based Interceptor.

Development of the MOVK is intended to evolve from existing tests with the EKV, however industry and Pentagon developers do not want to rush the system in order to ensure it is well suited to destroy emerging threats anticipated five, ten or more years from now, Norm Montano, Raytheon EKV Program Director, told Scout Warrior in an interview last year.

While spoken many months ago, Montanos comments bear even greater relevance now as tensions with North Korea rise quickly and many analyze the regimes fast-advancing ability to hit US targets with an ICBM.

14:42

Investigation: Radioactive leaks at Illinois nuclear plants Lifeboat News: The Blog

Radioactive waste continues to pour from Exelons Illinois nuclear power plants more than a decade after the discovery of chronic leaks led to national outrage, a $1.2 million government settlement and a company vow to guard against future accidents, an investigation by a government watchdog group found.

Since 2007, there have been at least 35 reported leaks, spills or other accidental releases in Illinois of water contaminated with radioactive tritium, a byproduct of nuclear power production and a carcinogen at high levels, a Better Government Association review of federal and state records shows.

No fines were issued for the accidents, all of which were self-reported by the company.

14:36

CTE Can be Diagnosed in a Living Person SoylentNews

Chronic traumatic encephalopathy (CTE) has been diagnosed in a (formerly) living person and confirmed by an autopsy:

Researchers published, what they say is the first case of a living person identified with the degenerative brain disease, chronic traumatic encephalopathy, or CTE.

While unnamed in the study, lead author Dr. Bennet Omalu confirmed to CNN that the subject of the case was former NFL player, Fred McNeill -- who died in 2015.

Omalu is credited with first discovering CTE in professional football players. The only way to definitively diagnose the disease is with a brain exam after death.

The discovery was first made in 2012 using an experimental brain scan that can trace a signature protein of CTE called tau. The case study was published in the journal Neurosurgery [open, DOI: 10.1093/neuros/nyx536] [DX] this week.

[...] While the experimental technology has been used on at least a dozen other former NFL players including Pro Football Hall of Famer, Dallas Cowboy Tony Dorsett, McNeill is the first case to have the test results confirmed with an autopsy. Omalu helped develop and is invested in the diagnostic exam, which uses a radioactive "tracer" called FDDNP to bind to tau proteins in the brain. The tau proteins can then be seen on a PET scan of the brain.

Also at ESPN.

Note: Some skepticism may be warranted.

Previously: Researchers: Aaron Hernandez Had the Worst Case of CTE Ever Seen in an Athlete So Young


Original Submission

Read more of this story at SoylentNews.

14:29

Support Cryptogon with Bitcoin Cash cryptogon.com

High fees and slow confirmations have made Bitcoin very unpleasant to use. How about supporting Cryptogon with some of your cheap to use and fast confirming Bitcoin Cash? Current cryptocoin addresses are always on the support page. Want to send some other coin? Just let me know and Ill generate a wallet address for you. []

14:00

New Part Day: A fake Sun Hackaday

But the Chinese manufacturer Yuji seems to have hit the ball out of the park by introducing their BC-Series, 500 W, high CRI, high Power, COB LED. Single, 500 W COB LEDs are not new and have been available since a couple of years, but their emitting surface areas are quite large. For example, a typical eBay search throws up parts such as this one  500 W, high Power LED, 60,000 lm, 6000-6500K. It has a large, square emitting area of 47.6 x 47.6 mm. By comparison, the Yuji BC-Series are 27 mm square, with an active emitting area only 19 mm in diameter. This small emitting area makes it easier to design efficient reflector and/or lens units for the LED.

Luminous Flux is between 18,000 to 21,000 for a color temperature of 3200 K, and between 20,000 to 24,000 for the 5600 K type. Further, this high power rating is accompanied with a pretty high color rendering index (CRI) above 95. This allows the LED to faithfully reveal the natural colors of objects due to its wide spectrum. Electrically, it is rated for 12 Amps with input voltage between 35 V to 39 V. This translates to between 420 W ~ 468 W of input electrical power. Some quick math tells us that the efficiency works out to just a little over 50 lm/W, which isnt all that great. But with light sources, you can have high-efficiency or high CRI, but not both thats just how the physics of it works.

At US $ 500 a pop, these eye blinders do not come cheap and may not find much use for individual hackers. But for some applications, such as studio and theatre lighting or photography, they may be just what the Doctor prescribed. In the video after the break, you can see [Mikael] give a rundown of the LEDs features and take it for a test ride.


Filed under:...

12:26

Say Hello to $3 Trillion in Forgotten Debt cryptogon.com

Via: Bloomberg: Companies have been on a borrowing binge, but you wouldnt always know the full scale of their liabilities by looking at the balance sheet. This makes it hard for investors to compare businesses that fund their activities in different ways. Happily though, thats about to change. How come? The answer is buried in []

12:15

Australians Approve of Same-Sex Marriage in Non-Binding Vote SoylentNews

Australians have voted 61.6% to approve of same-sex marriage, and the Turnbull-led government has said it would aim to pass legislation by Christmas:

Australians decisively support same-sex marriage

Australians have overwhelmingly voted in favour of legalising same-sex marriage in a historic poll. The non-binding postal vote showed 61.6% of people favour allowing same-sex couples to wed, the Australian Bureau of Statistics said. Jubilant supporters have been celebrating in public spaces, waving rainbow flags and singing and dancing.

A bill to change the law was introduced into the Senate late on Wednesday. It will now be debated for amendments. Prime Minister Malcolm Turnbull said his government would aim to pass legislation in parliament by Christmas. "[Australians] have spoken in their millions and they have voted overwhelmingly yes for marriage equality," Mr Turnbull said after the result was announced. "They voted yes for fairness, yes for commitment, yes for love."

The issue only went to a voluntary postal vote after a long and bitter debate about amending Australia's Marriage Act. The result on Wednesday brings an end to what was at times a heated campaign. The vote itself had been criticised by same-sex marriage supporters, many of whom said it was unnecessary when parliament could debate the issue directly.

Related: (U.S.) Supreme Court Rules in Favor of Same-Sex Marriage
One in Three People Globally Think Gay Marriage Should Be Legal
Taiwanese Court Invalidates Ban on Same-Sex Marriage


Original Submission

Read more of this story at SoylentNews.

11:43

EPO Business From the United States Has Nosedived and UPC is on Its Death Throes Techrights

Issuing lots of garbage patents is not a long-term strategy but akin to organisational suicide and immesurable harm to all existing EPs

Elodie Bergot letter

Summary: Benot Battistelli and Elodie Bergot further accelerate the ultimate demise of the EPO (getting rid of experienced and thus expensive staff see above), for which there is no replacement because there is a monopoly (which means Europe will suffer severely)

THE EPOs management had bet the farm on UPC and it wasnt just unethical and reckless; it was terrible for everyone.

We already know who UPC was for. It was for few multinational giants and their litigators firms such as Bristows.

Bristows staff (AmeriKat) which was accused of "brown-nosing" Colin Birss (after he had ruled to the benefit of patent trolls) is doing it again today and quoted from within her previous post (quote from the European Judges Forum): death is a certain change of status, a passage to a better status. I believe so, and I believe the UPC will live with Orpheus and all the others that had lived a life of honor, and have died of an unjust sentence.

Another quote from that speech: Therefore, it is clear to me that we do not need the UPC, since everything is dealt with in the Court of Milan. I would suggest to pack up and go home.

Yes, things are very grim for the UPC. Even insiders say so and Bristows staff goes through the effort of translating/publishing that.

Read the latest comment on this (about how EPO itself considers that it is only obliged to be bound by G decisions):

While reference has been made to establihshed case law of the EPO, it is clear from numerous decisions that the EPO itself considers that it is...

11:32

AMDGPU DC Code Lands For Linux 4.15 Kernel Phoronix

Linus Torvalds has accepted the AMDGPU DC display code pull request for the Linux 4.15 kernel. AMD Linux users can now rejoice!..

11:00

Your Next Wearable May Not Need Electricity Hackaday

What if you could unlock a door with your shirtsleeve, or code a secret message into your tie? This could soon be a thing, because researchers at the University of Washington have created a fabric that can store data without any electronics whatsoever.  The fabric can be washed, dried, and even ironed without losing data. Oh, and its way cheaper than RFID.

By harnessing the ferromagnetic properties of conductive thread, [Justin Chen] and [Shyam Gollakota] have  proved the ability to store bit strings and 2D images through magnetization. The team used an embroidery machine to lay down thread in dense strips and patches, and then coded in ones and zeros by rubbing the threads with N and S neodymium magnets.

They didnt use anything special, either, just this conductive thread, some magnets, and a Nexus 5 to read the data. Any phone with a magnetometer (so, most of them) could decode this type of binary data. The threads stay reliably magnetized for about a week and then begin to weaken. However, their tests proved that the threads can be re-magnetized over and over.

The team also created 2D images with magnets on a 9-patch made of conductive fabric. The images can be decoded piecemeal by a single magnetometer, or all at once by an array of them. Finally, the team made a glove with a magnetized patch of thread on the fingertip. They were able to get the phone to recognize six unique gestures with 90% accuracy, even with the phone tucked away in a pocket. See it in action in their demo video after the break.

Magnetic memory is certainly not a new concept. But for the wearable technology frontier, its a novel one.

Via [ScienceDaily]


Filed under: news, wearable hacks ...

10:42

How fast things evolved! Photo Lifeboat News: The Blog

The global datasphere is expected to grow to 163 zettabytes annually by 2025, and flash memory is enabling Artificial Intelligence to manage it. http://bit.ly/2yUvZej

10:22

Dog ownership linked to lower mortality Lifeboat News: The Blog

There so sweet, just being around a dog is pure love & happiness!


Researchers found a lower risk of cardiovascular disease in owners of dogs, especially hunting breeds.

10:16

10:14

Distribution Release: Raspberry Digital Signage 10.0 DistroWatch.com: News

Raspberry Digital Signage (RDS) is an operating system designed for digital signage installations on the Raspberry Pi. It displays a full-screen browser view restricted to a specified (web) resource. The project has released a new version, Raspberry Digital Signage 10.0, which is based on Raspbian "Stretch". The release....

10:00

Peter Thiel out at influential Silicon Valley startup firm The Hill: Technology Policy

Billionaire venture capitalist Peter Thiel is no longer affiliated with the influential Silicon Valley startup accelerator Y Combinator, according to a company blog post.Edit: Peter Thiel is no longer affiliated with Y Combinator, the top of the...

09:55

How to read newspapers Errata Security

News articles don't contain the information you think. Instead, they are written according to a formula, and that formula is as much about distorting/hiding information as it is about revealing it.

A good example is the following. I claimed hate-crimes aren't increasing. The tweet below tries to disprove me, by citing a news article that claims the opposite:




But the data behind this article tells a very different story than the words.

Every November, the FBI releases its hate-crime statistics for the previous year. They've been doing this every year for a long time. When they do so, various news organizations grab the data and write a quick story around it.

By "story" I mean a story. Raw numbers don't interest people, so the writer instead has to wrap it in a narrative that does interest people. That's what the writer has done in the above story, leading with the fact that hate crimes have increased.

But is this increase meaningful? What do the numbers actually say?

To answer this, I went to the FBI's website, the source of this data, and grabbed the numbers for the last 20 years, and graphed them in Excel, producing the following graph:


As you can see, there is no significant rise in hate-crimes. Indeed, the latest numbers are about 20% below the average for the last two decades, despite a tiny increase in the last couple years. Statistically/scientifically, there is no change, but you'll never read that in a news article, because it's boring and readers won't pay attention. You'll only get a "news story" that weaves a narrative that interests the reader.

So back to the original tweet exchange. The person used the news story to disprove my claim, but going to the underlying...

09:54

Heffalump Trap SoylentNews

A very clever (imo) artist has developed a simple trap for autonomous cars --
    https://www.youtube.com/watch?v=thuN2HD6m2s
Less than 90 seconds of video, no sound. If you get it right away it's only a minute.

Oh, and if you didn't get the title, there is this,
https://en.wikipedia.org/wiki/Heffalump


Original Submission

Read more of this story at SoylentNews.

09:42

Tesla Unveils Its Electric Semi Truck, And Adds A Roadster Lifeboat News: The Blog

Would love to see inside one of these trucks.


Elon Musk unveiled the Roadsters return toward the end of an event that was supposed to be all about Teslas new Semi trucks.

09:42

Could Terrorists Hack an Airplane? The Government Just Did Lifeboat News: The Blog

Hopefully not!


Hacking experts having been warning for years that its too easy to breach a cockpits defenses. Now an alarming government test proves their point.

09:42

Boston Dynamics CEO: Robotics will be bigger than the Internet Lifeboat News: The Blog

I dont know about his comment. But, this will probably become at least as big as the auto industry. If you had a robot that could cook, clean, take care of the yard, drive, run errands, had various entertainment features, etc Then, every household in America will want one. It will just come down to getting the robots to the point where they can do all of that, and having the vision to do it, and initially selling it to the public.


The Internet lets every person reach out and touch all the information in the world. But robotics lets you reach out and touch and manipulate all the stuff in the world and so it is not just restricted to information, it is everything, says Raibert, who spoke from the Future Investment Initiative in Riyadh, Saudi Arabia, at the end of October.

Indeed, Raibert is building that reality. Boston Dynamics, which was bought by SoftBank from Alphabet in June, builds robots that look like humans and animals.

When we have robots that can do what people and animals do, they will be incredibly useful, Raibert says.

09:32

Links 17/11/2017: KDE Applications 17.12, Akademy 2018 Plans Techrights

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • 5 New & Powerful Dell Linux Machines You Can Buy Right Now

      The land of powerful PCs and workstations isnt barren anymore when we talk about Linux-powered machines; even all of the worlds top 500 supercomputers now run Linux.

      Dell has joined hands with Canonical Inc. to give Linux-powered machines a push in the market. They have launched five new Canonical-certified workstations running Ubuntu Linux out-of-the-box as a part of the Dell Precision series. An advantage of buying these canonical-certified machines is that the users wont have to worry about incompatibility with Linux.

    • How to set up a Pixelbook for programming

      The beauty of Chrome OS is that most of the state of your system is in the cloud, attached to your Google Account, but if you have any local documents those will be gone. This is because Developer Mode basically destroys the physically secure design of Chrome OS. Now youre in Linux land, and local security is your job, not Googles.

      Every time you boot up now, youll have the option to press Space bar and wipe the system again and return to the safety of vanilla Chrome OS. Press Ctrl-D to continue into the unknown.

  • Kernel Space

09:24

Re: phusion passenger CVE-2017-1000384 Open Source Security

Posted by Dave Horsfall on Nov 17

Or perhaps they meant to write the more conventional "#ifdef notdef".

09:23

A Supreme Court justices open letter to AI Lifeboat News: The Blog

Let me start with two brief stories about social change. The first concerns changing laws and values about relationships. Only in 1967in the aptly named case of Loving v. Virginiadid the United States Supreme Court recognize that laws prohibiting interracial marriage violated the United States Constitution. Nineteen years before, in 1948, the Supreme Court of California decided that such restrictions were unlawful. The California Supreme Courts decision finding a constitutional right to same-sex marriage also predated the federal decision, and reflected how, to channel William Gibson, th

09:22

Bioengineered robotic hand with its own nervous system will sense touch Lifeboat News: The Blog

The sense of touch is often taken for granted. For someone without a limb or hand, losing that sense of touch can be devastating. While highly sophisticated prostheses with complex moving fingers and joints are available to mimic almost every hand motion, they remain frustratingly difficult and unnatural for the user. This is largely because they lack the tactile experience that guides every movement. This void in sensation results in limited use or abandonment of these very expensive artificial devices. So why not make a prosthesis that can actually feel its environment?

That is exactly what an interdisciplinary team of scientists from Florida Atlantic University and the University of Utah School of Medicine aims to do. They are developing a first-of-its-kind bioengineered robotic hand that will grow and adapt to its environment. This living robot will have its own peripheral nervous system directly linking robotic sensors and actuators. FAUs College of Engineering and Computer Science is leading the multidisciplinary team that has received a four-year, $1.3 million grant from the National Institute of Biomedical Imaging and Bioengineering of the National Institutes of Health for a project titled Virtual Neuroprosthesis: Restoring Autonomy to People Suffering from Neurotrauma.

robotic hand

09:22

This Dutch scientist has grown real meat in a laboratory Lifeboat News: The Blog

This cardiologist is betting that his lab-grown meat startup can solve the global food crisis.

08:43

The Secret to Long Life? It May Lurk in the DNA of the Oldest Among Us Lifeboat News: The Blog

Interesting article about the longevity work of my friend James Clement in The New York Times: https://nyti.ms/2hw8W32 #transhumanism


James Clement has scoured the globe for supercentenarians, aged 110 and older, willing to contribute their genomes to a rare scientific cache.

08:43

Are killer robots an imminent threat? Lifeboat News: The Blog

Killer robots, an increasingly real fiction.

08:34

Re: phusion passenger CVE-2017-1000384 Open Source Security

Posted by John Lightsey on Nov 17

True enough. The removal of the call to inferApplicationInfo() is the
key part of the change.

08:30

Radeon VCN Encode Support Lands In Mesa 17.4 Git Phoronix

It's an exciting day for open-source Radeon Linux users today as besides the AMDGPU DC pull request (albeit still unmerged as of writing), Radeon VCN encoding support has landed in Mesa Git...

08:22

FDA seeks to speed development of regenerated organs for medical use Lifeboat News: The Blog

Its all a question of money. We should come up with enough money for funding this so that we can clone a perfect genetic match of every organ in the body by 2025. It will solve the organ shortage issue, and nip the illegal black market organ industry in the bud.


The FDA said it is looking into regenerative medicine.

08:22

A Global Collaboration to Create Artificial Organisms Just Went Live Lifeboat News: The Blog

Mindfire is dedicated to cracking the brain code to develop AI with human-level capabilities. The first mission will begin in the spring of next year.

08:20

Re: phusion passenger CVE-2017-1000384 Open Source Security

Posted by Jakub Wilk on Nov 17

* John Lightsey <jd () cpanel net>, 2017-11-17, 14:58:

This adds:

#ifdef false
...
#endif

But false _is_ a defined macro in this file, so this doesn't disable the
code inside. I guess they meant to write:

#if false
...
#endif

08:05

Re: phusion passenger CVE-2017-1000384 Open Source Security

Posted by John Lightsey on Nov 17

The commit for the arbitrary file read vulnerability mentioned in the
Gentoo bug report is actually this one:

https://github.com/phusion/passenger/commit/4043718264095cde6623c2cbe8c644541036d7bf

I'm not sure if the other commit was fixing an actual flaw or just
intended as hardening.

Passenger switches IDs to the user that's supposed to run the passenger
application. The problem we reported was that some of the application
data was...

08:02

Chinas nuclear spaceships will be mining asteroids and flying astronauts to the moon as it aims to overtake US in space race Lifeboat News: The Blog

State media publishes Chinese scientists ambitious plans to revolutionise space travel and exploration in coming decades.

08:01

Mindstorms Forkliftbots Gonna Take Your Job Hackaday

With every advance in robotics, we get closer to being able to order stuff from Amazon and have no human being participate in its delivery. Key step in this dream: warehouse robots, smart forklifts able to control and inventory and entire warehouse full of pallets, without the meat community getting involved. [Thomas Risager] designed just such a system as part of his Masters Thesis in Software Engineering. It consists of five LEGO Mindstorms robots working in concert (video embedded below), linked via WiFi to a central laptop. Mindstorms native OS doesnt support WiFi (!!!) so he reflashed the EV3s ARM9 chip with software developed using Java and running under LeJOS. On the laptop side [Thomas] wrote a C++ application that handles the coordination and routing of the forklifts. We can see a lot of weary forklift drivers ready to kick back and let a robot have the full-time job for a change.

The robots use WiFi to a central laptop. Mindstorms native OS doesnt support WiFi (!!!) so [Thomas] reflashed the EV3s ARM9 chip with software developed using Java and running under LeJOS. On the laptop side he wrote a C++ application that handles the coordination and routing of the forklifts. [Thomas] is sharing his forklift design.

Now to scale up maybe with DIY forklifts like we published earlier? We can see a lot of weary forklift drivers ready to kick back and let a robot have the full-time job for a change.


Filed under: toy hacks

08:00

Hacking the IKEA Trdfri Light Bulb Hackaday

[BasilFX] wanted to shoehorn custom firmware onto his IKEA Trdfri light bulb. The product consists of a GU10-size light bulb with a LED driver as well as IKEAs custom ZigBee module controlling it all. A diffuser, enclosure shell, and Edison-screw base give the whole thing the same form factor as a standard A-series bulb. The Trdfri module, which ties together IKEAs home automation products, consists of an ARM Cortex M4 MCU with integrated 2.4Ghz radio and 256 Kb of flash not bad for 7 euros!

Coincidentally, [BasilFX] had just contributed EFM32 support to RIOT-OS (the friendly OS for IoT) so he was already halfway there. He used a JTAG/SWD-compatible debugger to flash the chip on the light bulb while the chip was still attached.

[BasilFX] admits the whole project is a proof of concept with no real use yet, though he has turned his eye toward getting the radio to work, with a goal of creating a network of light bulbs. You can find more info on his code repository.

We ran a post on Trdfri hacking earlier this year, as well as one on the reverse-engineering process used to suss out the bulbs secrets.


Filed under: home hacks

07:54

Germany bans kids smartwatches, asks parents to destroy them HackRead

By Waqas

Garmanys Telecoms regulator the Federal Network Agency (The Bundesnetzagentur) which

This is a post from HackRead.com Read the original post: Germany bans kids smartwatches, asks parents to destroy them

07:48

The - Hopefully - Final Stab At Intel Fastboot Support Phoronix

Intel's Maarten Lankhorst has sent out what could be the final patches for enabling "fastboot" support by default within their DRM graphics driver...

07:33

Samuel Oschin Telescope Near San Diego Upgraded to Capture Fast-Changing Celestial Events SoylentNews

New California telescope aims to catch quickly moving celestial events

Astronomers in California have taken a telescope built before most of them were born and converted it into a new instrument dedicated to one of the newest and fastest-moving branches of astronomy: spotting objects in the sky that change from one day to the next.

The new Zwicky Transient Facility (ZTF), which today opened its eye to the sky, was created by retooling the 1.2-meter Samuel Oschin Telescope at the Palomar Observatory near San Diego, California, which, starting in 1948, took pictures of the night sky onto specially curved glass photographic plates. The ZTF, named in honor of Fritz Zwicky, the Bulgaria-born astronomer who worked for most of his career at the California Institute of Technology (Caltech) in Pasadena, has been fitted with a new camera made up of 16 charge-coupled device (CCD) detectors. That will enable it to snap single images covering an area more than 200 times the size of the full moon.

With such a wide field of viewthe biggest of any telescope more than 0.5 meters widethe ZTF can survey the whole northern sky visible from Palomar every night. By doing so, astronomers can spot anything that changes from the previous night's images, enabling them to identify quickly changing celestial phenomena, including supernovae, variable and binary stars, the active cores of distant galaxies, potentially Earth-threatening asteroids, and the flash of merging neutron stars that could also emit gravitational waves.

Although the scientific haul is expected to be high, the ZTF is also a testbed for a larger upcoming instrument, the Large Synoptic Survey Telescope (LSST), which will begin observing from Chile in 2022. The LSST is expected to be so prolific that researchers will have to automate the process of sifting through observed events to find ones worth following up, and then getting a more detailed spectrum. To build such automated systems, ZTF researchers are involved in efforts to create the necessary data processing systems and robotic follow-up telescopes. "The headline goal is to get [an automated system] working and implemented in a way that astronomers can interact with it and use it," says Adam Bolton of the National Science Foundation's National Optical Astronomy Observatory (NOAO) in Tucson, Arizona.

The LSST is expected to discover many objects in the Kuiper belt.


Original Submission

Read more of this story at SoylentNews.

07:30

Optimize Your Battery Management System Webcast IEEE Spectrum Recent Content full text

Are you responsible for designing efficient battery thermal management systems? Are battery temperature profiling measurements essential to you? If so, then join Keysight for this webcast.

Optimize Your Battery Management System Webcast

Are you responsible for designing efficient battery thermal management systems? Are battery temperature profiling measurements essential to you? If so, then join Keysight for this webcast.

You will learn how temperature profiling can
    optimize battery performance
    increase battery reliability
    avert safety issues

Techniques learned in this webcast will help decrease Li-Ion battery ambient temperature and increase its performance to meet the unrelenting demands of applications involving EV, mobile telecommunication devices, IoT devices, medical devices and more.

PRESENTERS:
 
 

Dave Tenney, Product Manager, Keysight Technologies

Dave began working at Hewlett-Packard in 1984, in the Test & Measurement group of the company. During his 30-year tenure, he has held positions in product planning and marketing for dynamic signal analyzers, data acquisition systems, and general purpose instruments including waveform generators.  Dave holds a masters degree in Engineering from the University of Cincinnati, specializing in dynamic signal analysis.

Attendance is free. To access the event please register.
NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.

07:17

phusion passenger CVE-2017-1000384 Open Source Security

Posted by Kurt Seifried on Nov 17

Assigned CVE-2017-1000384 to
https://github.com/phusion/passenger/commit/a63f1e9cd8148dfaac08b00d74ef2b59bc2c9dd4

https://bugs.gentoo.org/634452

Please note: you have to have Phusion Passenger in a dir not owned by root,
and then run it as root (hint: that's never a good idea with anything).

07:09

Linux 4.15 Gets Fixed To Report Current CPU Frequency Via /proc/cpuinfo Phoronix

A change recently in the Linux kernel led the CPU MHz reported value via /proc/cpuinfo to either be the nominal CPU frequency or the most recently requested frequency. This behavior changed compared to pre-4.13 kernels while now it's been fixed up to report the current CPU frequency...

06:39

Dip update 117/n wherestheflux

[Orig: Nov 17, 2017]
Hi everyone,
Brief post to share the graph of the latest data.  Enjoy! 
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      

06:30

5G High-Speed Interconnect Design IEEE Spectrum Recent Content full text

If you want to learn about designing high-speed interconnects for 5G and Satcom applications, tune into this webinar with guest speaker Eric Gebhard of Signal Microwave.

5G High-Speed Interconnect Design

If you want to learn about designing high-speed interconnects for 5G and Satcom applications, tune into this webinar with guest speaker Eric Gebhard of Signal Microwave.

Connector implementation is often the last part of a design that an engineer thinks of when developing and testing new digital and RF products for 5G and Satcom applications, yet it can greatly affect the performance of a design.

One of the keys to avoiding this issue is to properly design the interface between the printed circuit board and the connector, known as the board launch. Connectors and how they interact with the board launch can determine the success or failure of a design. If the signal entering or leaving the board launch through the connector is compromised, then the performance of the entire design is affected.

In this webinar, you will see a live demonstration in the COMSOL Multiphysics software of how to set up and run a simulation to evaluate and optimize the performance of a board launch. You can ask questions at the end of the webinar during the Q&A session.

PRESENTER:
 
 

Eric Gebhard, Signal Microwave

Eric Gebhard received his BS in engineering from Arizona State University, graduating in 1995. He has worked for over 20 years in various engineering and management positions in both the aerospace and RF industries, spending the last 10 years working on RF connector design and RF simulation using the COMSOL Multiphysics software. Currently, he is the vice president of Signal Microwave.

 

Jiyoun Munn, COMSOL

Jiyoun Munn is the technical product manager for the RF Module at COMSOL. He has 15 years of experience in the RF industry, developing over 150 antenna and microwave device prototypes. Jiyoun also holds patents for antenna interrogation systems. He received his MS degree in electrical engineering from the University of Michigan.

Attendance is free. To access the event please register.
...

Modernizing a 170 year old Antique Grandfather Clock Hackaday

Frankly, we let out a yelp of despair when we read this in the tip line Antique Grandfather clock with Arduino insides! But before you too roll your eyes, groan, or post snark, do check out [David Henshaw]s amazing blog post on how he spent almost eight months working on the conversion.

Before you jump to any conclusions about his credentials, we must point out that [David] is an ace hacker who has been building electronic clocks for a long time. In this project, he takes the antique grandfather clock from 1847, and puts inside it a new movement built from Meccano pieces, stepper motors, hall sensors, LEDs, an Arduino and lots of breadboard and jumper wires while making sure that it still looks and sounds as close to the original as possible.

He starts off by building a custom electro-mechanical clock movement, and since hes planning as he progresses, meccano, breadboard and jumper wires were the way to go. Hot glue helps preserve sanity by keeping all the jumper wires in place. To interface with all of the peripherals in the clock, he decided to use a bank of shift registers driven from a regular Arduino Uno. The more expensive DS3231 RTC module ensures better accuracy compared to the cheaper DS1307 or similar clones. A bank of RGB LEDs acts as an annunciator...

06:29

House panel hits Equifax with long list of investigation demands The Hill: Technology Policy

The House Energy and Commerce Committee has sent Equifax a long list of questions related to the breach that compromised more than 100 million people's personal information.The letter, dated Friday, contains seven pages of document requests and...

06:02

Charles Manson Hospitalized -- Convicted Killer Near Death, Report Claims SoylentNews

http://radaronline.com/celebrity-news/charles-manson-deathbed/

The end could be near for Charles Manson.

The legendary mass murderer is on his death bed at a Bakersfield, Ca. hospital, according to reports.

[...] Manson, 83, has spent much of the past year dealing with the aftermath of internal bleeding from a lesion on his intestines.

Insiders say he was admitted three days ago and "it's not going to get any better for him."

See also: http://www.nydailynews.com/news/national/charles-manson-grave-condition-california-hospital-article-1.3635813
http://kron4.com/2017/11/15/report-cult-leader-charles-manson-hospitalized-in-bakersfield/


Original Submission

Read more of this story at SoylentNews.

05:53

GitHub warns developers when their projects include vulnerable libraries Security Affairs

The code hosting service GitHub warns developers when including certain flawed software libraries in their projects and suggest fixes to solve the issues.

The code hosting service warns developers when including certain flawed software libraries in their projects and provides advice on how to address the issue.

GitHub has recently introduced the Dependency Graph, a feature that lists all the libraries used by a project. The new feature supports JavaScript and Ruby, and the company also plans to add the support for Python next year.

github

The new security feature is designed to alert developers when one of their projects dependencies has known flaws. The Dependency graph and the security alerts feature have been automatically enabled for public repositories, but they are opt-in for private repositories.

The availability of a dependency graph allows to notify the owners of the projects when it detects a Known security vulnerability in one of the dependencies and suggest known fixes from the GitHub community.

Today, for the over 75 percent of GitHub projects that have dependencies, were helping you do more than see those important projects. With your dependency graph enabled, well now notify you when we detect a vulnerability in one of your dependencies and suggest known fixes from the GitHub community. states GitHub on the introduction of the security alerts.

GitHub provides developers the type of flaw, the associated severity, and affected versions, the user interface includes a link that points to a page where additional details are available.

Administrators can also choose the form of warnings, including email alerts, web notifications, and warnings via the user interface, selecting also the final recipient of the message (individuals or groups).

The code hosting service relies on both Ruby gems and NPM packages on MITREs Common Vulnerabilities and Exposures (CVE) list in order to determine if a project is using flawed libraries.

Vulnerabilities that have CVE IDs (publicly disclosed vulnerabilities from the National Vulnerability Database) will be included in security alerts. However, not all vulnerabilities have CVE IDseven many publicly disclosed vulnerabilities dont have them. continues GitHub.

This is the next step...

05:30

Stanford Algorithm Can Diagnose Pneumonia Better Than Radiologists IEEE Spectrum Recent Content full text

It took Stanford AI researchers just a month to beat radiologists at the pneumonia game Photo: Stanford

Stanford researchers have developed a machine-learning algorithm that can diagnose pneumonia from a chest x-ray better than a human radiologist can. And it learned how to do so in just about a month.

The Machine Learning Group, led by Stanford adjunct professor Andrew Ng, was inspired by a data set released by the National Institutes of Health on 26 September. The data set contains 112,120 chest X-ray images labeled with 14 different possible diagnoses, along with some preliminary algorithms. The researchers asked four Stanford radiologists to annotate 420 of the images for possible indications of pneumonia. They selected that disease because, according to a press release, it is particularly hard to spot on X-rays, and brings 1 million people to U.S. hospitals each year.

Within a week, the Stanford team had developed an algorithm, called CheXnet, capable of spotting 10 of the 14 pathologies in the original data set more accurately than previous algorithms. After about a month of training, it was ahead in all 14, the group reported in a paper released this week through the Cornell University Library. And CheXnet consistently did better than the four Stanford radiologists in diagnosing pneumonia accurately.

The researchers looked at CheXnets performance in terms of sensitivitythat is, whether it correctly identified existing cases of pneumonia, and how well it avoided false positives. While some of the four human radiologists were better than others, CheXnet was better than all of them [See graph below].

Graph showing Chexnet's performance against radiologists Image: Stanford ChexNet, tested on 420 x-rays, outperformed four radiologists  in both sensitivity (identifying positives correctly) and specificity (identifying negatives correctly). Individual radiologists are represented by orange Xs, their average performance by a green X, and ChexNet by the blue curve, generated by varying the threshholds used for its diagnosis.

The Stanford approach also creates a heat map of the chest x-rays, with colors indicating areas of the image most likely to represent pneumonia; this is a tool that researchers believe could greatly assist human radiologists.

I couldnt be more thrilledand hop...

05:01

What Actually Happens At A Hardware Hacking Con Hackaday

The Hackaday Superconference was last weekend, and it was the greatest hardware con on the planet. What can you build out of a conference badge? If you answered a resin-based 3D printer you would have won a prize. If you decided to put your badge in a conference water bottle and make a stun gun youd receive adoration of all in attendance. Yeah, it got that crazy.

Yes, theres a Supercon badge in that bottle and its now a stun gun.

At other tech conferences, youll find gaggles of nerds sitting around a table with MacBooks and Thinkpads. The Superconference is different. Here, youll find soldering irons, tackle boxes filled with components, and loose WS2812s scattered about the floor. The smell of solder flux wafts through the air. You detect a hint of ozone.

The depth and breadth of hacks that came out of this were simply stunning. We a binocular virtual reality hack, an internet trolling badge, blinky add-on boards, audio add-on boards, a film festival was shot on the badge, and much more which youll find below.

We have started a Badge Hacks list and want to see details of all of the hacks. So if you were at Supercon be sure to publish them on Hackaday.io and send a DM to be added to the li...

05:00

Paywalls drive mass surveillance and give the NSA the advantage Falkvinge on Liberty

phishing-1280x720-istockphoto

Copyright Monopoly:Putting network specifications behind subscription paywalls gives the NSA and other surveillance agencies a decisive advantage against the freedom of the Internet. That is the inescapable conclusion of the recent KRACK vulnerability.

Theres been a lot of debate about paywalls lately not the least about whether so-called journalism of mainstream media is supposed to survive, as it consumes much more resources than the amateurs who are often (but not always) doing a better job at actual journalism. However, paywalls are controversial in more contexts than just mainstream legacy media theyre also highly controversial with Elseviers lockup of research papers (more in piece on this a little later), locking up building codes and similar that laws refer to (do you need to pay to read the law?), and for technical specifications that concern security.

In short, there has never been a better case to be made for the old slogan that information wants to be free. Thats free as in flight, as in uncaged, as in unrestricted; not the twisted typical commercial free which means something more like have-our-great-offer-completely-free just-pay-this-small-sum-first some-restrictions-apply not-valid-or-legal-in-all-states.

In the case of the KRACK vulnerability, which was based on an IEEE standard locked up behind a corporate-level subscription paywall, we can trivially observe two things:

1) Ordinary open source coders did not see the specification, because of the paywall, and therefore did not discover the vulnerability in it.

2) For surveillance agencies like the NSA, who have unlimited budget for all intents and purposes, paywalls do not exist. (In the rare case where they cant or dont want to pay, they can walk in and take the documents anyway.)

As a result, the NSA and other surveillance agencies had ready access to the KRACK vulnerability for 13 years, which is how long it had been sitting behind that IEEE paywall in plain-but-commercial sight.

Therefore, from this one clear example and the logic it highlights, we can observe that paywalls drive mass surveillance, as they are tilting the playing field heavily in the favor of the surveillance agencies.

Privacy remains your own responsibility.

(This is a post from Falkvinge on Liberty, obtained via RSS at...

04:29

Why Dells Gamble On Linux Laptops Has Paid Off SoylentNews

Dude, you're gettin' a Dell!

The whole juggernaut that is now Linux on Dell started as the brainchild of two core individuals, Barton George (Senior Principal Engineer) and Jared Dominguez (OS Architect and Linux Engineer).

It was their vision that began it all back in 2012. It was long hours, uncertain futures and sheer belief that people really did want Linux laptops that sustained them. Here is the untold story of how Dell gained the top spot in preinstalled Linux on laptops.

[...] This first attempt at Linux on laptops failed mainly because most non-technical users were blinded by the cheap price and didn't understand what they were actually buying.

[...] This time the duo had the right initial market. It was big, commercial web-scale operators and their developers who were crying out for a fully supported Linux laptop.

People who do technical work, like Linux. People who don't, don't.


Original Submission

Read more of this story at SoylentNews.

04:22

3 Ways Science Might Help You to Live Longer Lifeboat News: The Blog

Today, we take a look at three key emerging technologies that might add extra healthy years to your life by addressing the aging processes directly to prevent or delay age-related diseases.

Senolytics Removing aged dysfunctional cells to promote tissue regeneration

As we age, increasing amounts of our cells enter into a state known as senescence. Normally, these cells destroy themselves by a self-destruct process known as apoptosis and are disposed of by the immune system. Unfortunately, as we age, increasing numbers of these cells evade apoptosis and linger in the body.

04:14

Google launches TensorFlow Lite developer preview for machine learning on mobile devices TechWorm

Google announces developer preview of TensorFlow Lite

Now, the search giant has launched the developer preview of a new machine learning toolkit designed specifically for smartphones and embedded devices and will be available for both Android and iOS app developers. This platform will allow developers to deploy AI on mobile devices. It enables on-device machine learning inference with low latency and a small binary size. TensorFlow Lite also supports hardware acceleration with the Android Neural Networks API.

As you may know, TensorFlow already supports mobile and embedded deployment of models through the TensorFlow Mobile API, the TensorFlow team wrote in a blog post today. Going forward, TensorFlow Lite should be seen as the evolution of TensorFlow Mobile, and as it matures it will become the recommended solution for deploying models on mobile and embedded devices. With this announcement, TensorFlow Lite is made available as a developer preview, and TensorFlow Mobile is still there to support production apps.

Burke notes that it is a crucial step toward enabling hardware-accelerated neural network processing across Androids diverse silicon ecosystem.

TensorFlow Mobile allows developers to incorporate TensorFlow models that work in a desktop environment, on mobile devices. However, applications created using TensorFlow Lite will be lighter and faster than similar applications that use TensorFlow Mobile. Although, not all use cases are currently supported by TensorFlow Lite.

TensorFlow has always run on many platforms, from racks of servers to tiny IoT devices, but as the adoption of machine learning models has grown exponentially over the last few years, so has the need to deploy them on mobile and embedded devices, the TensorFlow team wrote.

There are three models that are already trained and optimized for mobile devices.

MobileNet: A class of vision models able to identify across 1000 different object classes, specifically designed for efficient execution on mobile and embedded devices.

Inception v3: An image recognition model, similar in...

04:14

Tips for an Information Security Analyst/Pentester career - Ep. 38: DNS Spoofing The S@vvy_Geek Tips Tech Blog

This post is an ideal continuation of the previous episode  but this time we're going to deal with DNS spoofing.

Along with ARP spoofing, we can launch DNS poisoning attacks, in order to redirect our victim to a fake website and grab his/her credentials.

Compared with the attack Georgia Weidman performs in her class, I brought this technique to the next level by creating a fake clone for Yahoo! through the Social Engineer Toolkit (credential harvester). I was then unsatisfied by the results and performed the same attack against Facebook, more successfully (view the embedded video for more details).



NOTATION: Credential harvester will ask you to disable Apache server, because it creates a fake website running on port 80.

You need to enter yes.

We don't need Apache server running on that same port, because that would prevent our malicious clone from running.

In her class, Georgia doesn't create a clone, but I did it here. 

Of course, the concept is exactly the same, by this I surely don't mean any disrespect or belittling of Georgia's amazing work.

For the purpose of this attack, I created a text file called hosts.txt where I stored two manual entries for https://login.yahoo.com and for www.facebook.com, matching them with the IP address of my Kali VM (192.168.1.92).

As we did for ARP spoofing, we need to make sure the extraneous tr...

04:01

This Week in Open Source: Linux Demonstrates Superpowers With Supercomputer Domination & More

Title: 
This Week in Open Source: Linux Demonstrates Superpowers With Supercomputer Domination & More

03:42

UK pressures Facebook for more on Russian election meddling The Hill: Technology Policy

Facebook is facing pressure from British lawmakers and academics to shed more light on potential Russian interference in British politics.Members of the British parliament and experts believe that Russian actors have used Facebook to influence...

03:34

Linux File-System Benchmarks On The Intel Optane 900P SSD Phoronix

Earlier this week I presented out initial Linux benchmarks of the Intel Optane 900P SSD with this 3D XPoint memory U.2 solid-state drive delivering incredible performance figures. Those tests were done with EXT4 while in this article are more tests with other mainline Linux file-systems and also testing some of the different mount options.

03:30

DIY Capacitive Rotational Encoder on the Cheap with FR4 Hackaday

Rotary encoders are critical to many applications, even at the hobbyist level. While considering his own rotary encoding needs for upcoming projects, it occurred to [Jan Mrzek] to try making his own DIY capacitive rotary encoder. If successful, such an encoder could be cheap and very fast; it could also in part be made directly on a PCB.

First prototype, two etched plates with transparent tape as dielectric material. Disc is 15 mm in diameter.

The encoder design [Jan] settled on was to make a simple adjustable plate capacitor using PCB elements with transparent tape as the dielectric material. This was used as the timing element for a 555 timer in astable mode. A 555 in this configuration therefore generates a square wave that changes in proportion to how much the plates in the simple capacitor overlap. Turn the plate, and the square waves period changes in response. Response time would be fast, and a 555 and some PCB space is certainly cheap material...

03:18

Pirate Site Owner Found Guilty, But He Can Keep The Profits TorrentFreak

Traditionally, Sweden has been rather tough on people who operate file-sharing sites, with The Pirate Bay case as the prime example.

In 2009, four people connected to the torrent site were found guilty of assisting copyright infringement. They all received stiff prison sentences and millions of dollars in fines.

The guilty sentence was upheld in an appeal. While the prison terms of Peter Sunde, Fredrik Neij and Carl Lundstrm were reduced to eight, ten and four months respectively, the fines swelled to $6.5 million.

This week another torrent related filesharing case concluded in Sweden, but with an entirely different outcome. IDG reports that the 47-year-old operator of Filmfix was sentenced to 120 hours of community service.

Filmfix.se offered community-curated links to a wide variety of pirated content hosted by external sources, including torrent sites. The operator charged users 10 Swedish Krona per month to access the service, which is little over a dollar at the current exchange rate.

With thousands of users, Filmfix provided a decent income. The site was active for more than six years and between April 2012 and October 2013 alone it generated over $88,000 in revenue. Interestingly, the court decided that the operator can keep this money.

Filmfix

While the District Court convicted the man for facilitating copyright infringement, there was no direct link between the subscription payments and pirated downloads. The paying members also had access to other unrelated features, such as the forums and chat.

Henrik Pontn, head of the local Rights Alliance, which reported the site to the police, stated that copyright holders have not demanded any damages. They may, however, launch a separate civil lawsuit in the future.

The mans partner, who was suspected of helping out and owned the company where Filmfixs money went to, was acquitted entirely by the District Court.

The 120-hours of community service stands in stark contrast to the prison sentences and millions of dollars in fines in The Pirate Bay case, despite there being quite a few similarities. Both relied on content uploaded by third parties and didnt host any infringing files directly.

The lower sentence may in part be due to a fresh Supreme Court ruling in Sweden. In the case against an operator of the now-defunct private torrent tracker Swepirate, the Court...

03:08

Banking Trojan Gains Ability to Steal Facebook, Twitter and Gmail Accounts The Hacker News

Security researchers have discovered a new, sophisticated form of malware based on the notorious Zeus banking Trojan that steals more than just bank account details. Dubbed Terdot, the banking Trojan has been around since mid-2016 and was initially designed to operate as a proxy to conduct man-in-the-middle (MitM) attacks, steal browsing information such as stored credit card information

03:07

[$] 4.15 Merge window part 1 LWN.net

When he released 4.14, Linus Torvalds warned that the 4.15 merge window might be shorter than usual due to the US Thanksgiving holiday. Subsystem maintainers would appear to have heard him; as of this writing, over 8,800 non-merge changesets have been pulled into the mainline since the opening of the 4.15 merge window. Read on for a summary of the most interesting changes found in that first set of patches.

03:00

Amid Global Electric-Car Buzz, Toyota Bullish on Hydrogen SoylentNews

Hydrogen!

At a car factory in this city named after Toyota, the usual robots with their swinging arms are missing. Instead, workers intently fit parts into place by hand with craftsmanship-like care.

The big moment on the assembly line comes when two bulbous yellow tanks of hydrogen are rolled over and delicately fitted into each car's underside.

While much of the world is going gung-ho for electric vehicles to help get rid of auto emissions and end reliance on fossil fuels, Japan's top automaker Toyota Motor Corp. is banking on hydrogen.

Toyota sells about 10 million vehicles a year around the world. It has sold only about 4,000 Mirai fuel cell vehicles since late 2014, roughly half of them outside Japan.

Is Toyota going to build the network of hydrogen-refueling stations to serve its hydrogen-powered cars?


Original Submission

Read more of this story at SoylentNews.

02:59

McAfees ClickProtect Apparently Infected Devices with Banking Malware HackRead

By Waqas

According to a French researcher, the renowned antivirus vendor McAfee

This is a post from HackRead.com Read the original post: McAfees ClickProtect Apparently Infected Devices with Banking Malware

02:57

Security updates for Friday LWN.net

Security updates have been issued by Arch Linux (couchdb), Debian (opensaml2 and shibboleth-sp2), Fedora (knot and knot-resolver), openSUSE (firefox), Slackware (libplist and mozilla), and Ubuntu (firefox and ipsec-tools).

02:30

Video Friday: Backflipping Atlas, Cozmo Lost, and MantaDroid Aquatic Robot IEEE Spectrum Recent Content full text

Your weekly selection of awesome robot videos Image: Boston Dynamics/YouTube

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next two months; heres what we have so far (send us your events!):

iREX 2017  November 29-2, 2017  Tokyo, Japan
IEEE IRC 2018  January 31-2, 2018  Laguna Hills, Calif.

Let us know if you have suggestions for next week, and enjoy todays videos.


With a title like Whats new, Atlas? for a video like this, you know that Boston Dynamics is just messing with us now:

And just to be extra infuriating, BD also released an updated video of SpotMini with zero explanation:

[ Boston Dynamics ]


Cozmo got a little bit lost in Reddit as part of an amazing publicity stunt earlier this week:

The game played out on a real set wherein Cozmo would roll through a series of trials, exploring rooms and solving puzzles which tested his ability to move, to place, stack, and turn blocks, and recognize faces and pets, testing Reddits collective will to help him. Cozmos quest: to gather three golden key cubes to be able to escape to Reddits front page. We built a live stream module with a heads up display that allowed Redditors to vote on Cozmos actions and determine his path through the platform.

Over the course of 6 hours, Redditors would help Cozmo escape to the front page-or not. As with anything Reddit, there was no telling people what to do. Cozmo could win, he could lose, he could be trapped for six hours feeding puppers, or being launched repeatedly toward a rustic rope hammock via a fully functional 1/24 scale trebuchet. It could be over in an hour, or never. We werent trusting that Reddito...

01:50

Open Source Threat Modeling

What is threat modeling?

Application threat modeling is a structured approach to identifying ways that an adversary might try to attack an application and then designing mitigations to prevent, detect or reduce the impact of those attacks. The description of an applications threat model is identified as one of the criteria for the Linux CII Best Practises Silver badge.

Friday, 17 November

22:04

Twitter crackdown sparks free speech concerns The Hill: Technology Policy

Twitter's verification program put the company at the center of another political headache this week, with the social media giant stuck between liberals who demand stricter rules about hate speech and misinformation and conservatives who fear the...

21:30

Open Source Networking Days: Think Globally, Collaborate Locally

Something that weve learned at The Linux Foundation over the years is that there is just no substitute for periodic, in-person, face-to-face collaboration around the open source technologies that are rapidly changing our world. 

The Open-Source Driving Simulator That Trains Autonomous Vehicles

Self-driving cars are set to revolutionize transport systems the world over. If the hype is to be believed, entirely autonomous vehicles are about to hit the open road.

20:30

What Can The Philosophy of Unix Teach Us About Security?

In some sense, I see security philosophy gradually going the way of the Unix philosophy. More specifically, within the areas of security operations and incident response, I believe that this transition has been underway for quite some time. What do I mean by this?  Allow me to elaborate.

5 New & Powerful Dell Linux Machines You Can Buy Right Now

The land of powerful PCs and workstations isnt barren anymore when we talk about Linux-powered machines; even all of the worlds top 500 supercomputers now run Linux.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog