IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Wednesday, 13 June

06:40

US repeals net neutrality rules, what happens now? Help Net Security

Net neutrality rules have been officially repealed in the US on Monday, as the Restoring Internet Freedom Order by the Federal Communications Commission went into effect. The decision to repeal the net neutrality rules, which were put in place when the FCC reclassified broadband ISPs as common carriers in February 2015, happened in December 2017 when three of the five FCC commissioners voted for it. The vote was split down party lines, with democrats Mignon More

The post US repeals net neutrality rules, what happens now? appeared first on Help Net Security.

05:03

Fooling security tools into believing malicious code was signed by Apple Help Net Security

The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security researcher has discovered. Security, incident response, and forensics processes and personnel use code signing to weed out trusted code from untrusted code. To undermine a code signing implementation for a major OS would break a core security construct that many depend on for day to day security More

The post Fooling security tools into believing malicious code was signed by Apple appeared first on Help Net Security.

01:49

Re: Are `su user' and/or `sudo -u user sh' considered dangerous? Open Source Security

Posted by Todd C. Miller on Jun 12

Up until recently there were issues with background processes being
killed when the pty went away. Using a pty will become the default
in a future release.

- todd

01:45

Re: Are `su user' and/or `sudo -u user sh' considered dangerous? Open Source Security

Posted by Jordan Glover on Jun 12

Why this isn't default? Where's the catch?

Jordan

01:42

Starch can replace normal plastic in food packaging Lifeboat News: The Blog

Eventually all petroleum-based material in food packaging will have to be replaced with bio-based material. Research done at Karlstad University shows that a mixture of starch and other polymers forms an equally effective protective barrier.

Food packaging has to protect and extend the of food, and should also work during transport, says Asif Javed, doctor in Chemical Engineering at Karlstad University. To meet these demands, a protective barrier is needed in paper-based packing such as those used for juice or dairy.

01:36

Britain fines Yahoo UK Services for 2014 email hack The Hill: Technology Policy

Britains data watchdog on Tuesday fined Yahoo roughly $334,000 for its handling of a massive email cyberattack in 2014 that exposed the personal data of millions of users worldwide.The Information...

01:30

3D Print A Remote Control Flame Thrower Hackaday

We all have a weakness for a good flamethrower project, but sometimes they can look a little hairy, even if losing hairs to them seems to be the order of the day. [Hyper_Ion] has a thrower that might satisfy the need for fire among the cautious though, because hes created a remote control flamethrower.

Fuel for the flames is provided from a butane canister held within a 3D-printed frame, and is delivered via a piece of copper tube to a welding nozzle. A plunger beneath the can is connected to a rack-and-pinion driven by a servo, connected to a straightforward radio control receiver. The position of the can is adjusted until there is just enough gas to sustain a pilot flame at the nozzle, and a command to the servo releases a burst of gas that results in a satisfying puff of fire.

This is more of a static stage effect than the wearable flamethrowers or flamethrower guitar projects weve seen in the past, but it is no less a neat project. And unlike many other flamethrowers, its simple to build. We have to deliver the usual exhortation though: take care with your fire, wed prefer not to be writing either obituaries of Fail Of The Week posts about smoking ruins.

01:22

Is Inflammaging Started by Microbial Burden? Lifeboat News: The Blog

Today we are going to take a look at the emerging theory that inflammaging, a chronic, age-related background of inflammation, is caused by alterations to the populations of intestinal microbes.

What is inflammaging?

Inflammaging is a term coined to describe the chronic, smoldering background of inflammation that accompanies the aging process. It is constant, low-grade inflammation that interferes with stem cell mobility, cellular communication, and the immune systems ability to operate correctly.

01:10

White House Confirms its Chief of Staff's E-Mail Account was Hacked SoylentNews

A personal email account of White House Chief of Staff John Kelly was hacked, according to an email obtained by Buzzfeed via a Freedom of Information Act (FOIA) request. "As we discussed ... my folks are nervous about the emails you send and ask that you no longer include them on any postings," Kelly wrote. "Then there is hacking which one of my own personal accounts has suffered recently. I do almost everything now by phone or face-to-face comms."

The FOIA email confirms previous reports from Politico that Kelly used a compromised smartphone for months. If it's the same incident (the White House never confirmed the original reports), the attack happened during Trump's transition in late 2016 while Kelly was secretary of homeland security.

https://www.engadget.com/2018/06/11/john-kelly-hacked-foia-request/


Original Submission

Read more of this story at SoylentNews.

01:04

Dems question FCC's claim of cyberattack during net neutrality comment period The Hill: Technology Policy

A pair of Democratic senators are demanding answers from the Federal Communications Commission (FCC) on a 2017 cyberattack following a media report raising questions about the agencys official story.Sens. Brian Schatz (D-Hawaii) and Ron Wyden (D-...

01:04

Signature Validation Bug Let Malware Bypass Several Mac Security Products The Hacker News

A years-old vulnerability has been discovered in the way several security products for Mac implement Apple's code-signing API that could make it easier for malicious programs to bypass the security check, potentially leaving millions of Apple users vulnerable to hackers. Josh Pitts, a researcher from security firm Okta, discovered that several third-party security products for Macincluding

01:01

The EPOs Expert Georg Weber is Still Advocating Software Patents in Europe (But He Disguises Them Using Buzzwords) Techrights

Georg Weber
Photo source

Summary: The EPOs overzealous support for software patents continues unabated while the European Parliament looks the other way; this is part of the plan to expand patent scope in Europe and flood the continent with low-quality patents (causing a ruinous litigation boom like in China)

THE MANAGEMENT of the EPO does not obey very basic laws, so why obey patent law? Or honour European Parliament? Or even the German parliament (or Bavarian authorities) for that matter?

As long as one works for Battistelli, one will never be punished or held accountable for anything.This core problem, which is lawlessness, prevails and runs deep inside the EPO these days. As long as one works for Battistelli, one will never be punished or held accountable for anything. Extrapolated immunity? These people just protect one another and if one snitches on a colleague in management theres risk of retaliation; sooner or later, like in the Mafia, people start hiring from their own family to assure blind loyalty or sometimes hire famous criminals whom they have moral leverage over. This is todays EPO.

Just like last year (and later in the same year), in the very same event, Georg Weber promotes software patents. He knows the law and he understands the problem, but using new buzzwords Georg Weber is promoting the same abomination again. As the EPO put it a few hours ago: EPO expert Georg Weber is speaking at #CEBIT18 about patents for #Industry40.

like in the Mafia, people start hiring from their own family to assure blind loyalty or sometimes hire famous criminals whom they have moral leverage over. This is todays EPO.Industry 4.0, ICT, CII, 4IR and other marketing nonsense can be viewed as surrogates for software patents. The EPO recently organised a co...

00:59

French company fined 250,000 euros for a data leak Help Net Security

CNIL, the French data protection authority, has decided to impose a 250,000 euro fine on Optical Center, a French company selling eye and hearing aids, because it failed to secure the data of customers that ordered products via its website.   The CNIL was first informed of a significant data leak affecting the companys site (www.optical-center.fr) in July 2017. After an online check they discovered that, by entering several URLs in a browsers address bar, More

The post French company fined 250,000 euros for a data leak appeared first on Help Net Security.

00:57

Two Quantum Computing Bills Are Coming to Congress cryptogon.com

Disclosure: I am long Quantum Resistant Ledger (QRL). Via: Gizmodo: Quantum computing has made it to the United States Congress. If this field of quantum information is the new space race, the US doesnt want to fall behind. After all, China has funded a National Laboratory for Quantum Information Sciences, set to open in []

00:48

Sweden Tries to Halt Its March to Total Cashlessness cryptogon.com

Via: Bloomberg: A key committee of Swedish lawmakers wants to force the countrys biggest banks to handle cash in an effort to halt the nations march toward complete cashlessness. The move is a response to Swedens rapid transformation as it becomes one of the most cashless societies in the world. Thats led to concerns []

00:43

Stable kernel updates LWN.net

Stable kernels 4.17.1, 4.16.15, and 4.14.49 have been released. They all contain important fixes and users should upgrade.

00:42

Microsoft deploys underwater Datacenter off the Scottish coast TechWorm

Microsoft deploys underwater datacenter off the Scottish coast

Microsoft tested a self-sustaining underwater datacenter called Project Natick, which according to the company is quick to deploy and can be used to save the energy needed to cool the servers on land. The U.S. tech giant submerged the experimental data center fitted under a shipping container-size prototype, off the Orkney archipelago in northern Scotland on Wednesday.

For those unaware, Project Natick is an initiative by Microsoft to test the feasibility of an energy-efficient, low-latency cloud computing facility on the ocean floor and to bring cloud computing infrastructure closer to big cities near large water bodies. Microsofts vision is to see self-contained data centers placed hundreds of feet below sea level removing the biggest cost of running these operations on land Air Conditioning.

In July 2014, Microsoft kicked off the first phase of Project Natick but it was formally unveiled to the public only in February 2016. Microsoft then announced that the team had deployed a lab-built proof-of-concept datacenter prototype in 30 feet of water off the Californian coast, which was operational for 105 days.

This time in the second phase, the Northern Isles datacenter deployed by Microsoft consists of a 40-foot (12.2 meters) long white cylinder comprising of 864 servers, which is enough to store five million movies and sits at 117 feet below the ocean surface. The current datacenter can hold data and process information for up to five years without requiring any maintenance.

Microsoft in a blog post said, Project Naticks 40-foot long Northern Isles datacentre is loaded with 12 racks containing a total of 864 servers and associated cooling system infrastructure. The data center was assembled and tested in France. Later the data center was shipped to Scotland on a flatbed truck. There it was attached to a ballast-filled triangular base for deployment on the seabed.

To get the data center to the seafloor, the team used winches, cranes, a gantry barge, and a remotely operated vehicle to retrieve a cable containing the fiber optic and power wiring from the seafloor. It then brought it to the surface where it was checked and attached to the data center before switching it on.

The region is home to tidal currents, which at their peak can reach up to nine miles per hour, with 10-foot waves that can climb to as high as 60 feet during a storm.

We know if we can put something in here and it survives, we are good for just about any place we want to go, said Ben Cutler, a project manager in the special projects group in Microsofts research organization that leads the Project Natick team.

At full capacit...

00:41

Seattle reverses course on business tax after Amazon pressure The Hill: Technology Policy

Just weeks after passing a new tax on big businesses, Seattle political leaders signaled late Monday they would reverse course and repeal it.Mayor Jenny Durkan and city council President Bruce Harrell said in statements that they would end the tax,...

00:41

Police Dogs Trained to Find Hidden Electronic Storage Devices cryptogon.com

Via: cnet: Only one out of every 50 dogs tested qualifies to become an electronic storage detection, or ESD, dog, says Kerry Halligan, a K-9 instructor with the Connecticut State Police. Thats because its a lot harder to detect the telltale chemical in electronics than it is to sniff out narcotics, bombs, fire accelerants or []

00:36

Security updates for Tuesday LWN.net

Security updates have been issued by Debian (perl), Red Hat (kernel), SUSE (slurm), and Ubuntu (gnupg, gnupg2, imagemagick, kernel, libvirt, linux, linux-aws, linux-gcp, linux-kvm, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-raspi2, linux-azure, linux-hwe, linux-gcp, linux-oem, linux-lts-trusty, linux-lts-xenial, linux-aws, and qemu).

00:32

Microsoft acquires Four Gaming Studios including ninja theory TechWorm

Microsoft buys four game studios to boost Xbox exclusives

Xbox chief Phil Spencer at an Xbox briefing at the Electronic Entertainment Expo 2018 (E3 2018) held in Los Angeles on Sunday, announced that Microsoft has acquired four gaming studios to help the company bring more titles to Xbox and PC.

There has never been a more exciting time to be part of the gaming industry, with creators large and small showcasing incredible new games for the more than two billion players around the world, said Spencer.

While Microsoft has acquired Playground Games (Forza Horizon series), it has also signed letters of intent to buy another three studios: Ninja Theory (Hellblade and DmC), Undead Labs (State of Decay 2), and Compulsion Games (We Happy Few). Once the acquisitions are completed, Microsoft will have 11 game development studios.

The U.S. tech giant also announced that it was forming a new studio of its own called The Initiative in Santa Monica, Calif., to be headed by former Crystal Dynamics head of studio Darrell Gallagher.

We embarked on a quest to find creative teams that have the mastery of our art, Spencer said. We found innovative game designers, master storytellers, and exceptional world builders.

According to analysts, if Microsoft focusses on more first-party content, it will help its gaming unit in the future.

It will take time to reap the rewards of this more expansion strategy, but puts Microsoft on a much stronger footing, Piers Harding-Rolls, head of games research at IHS Markit, said in a note on Sunday.

All the new studios will fall under the Microsoft Studios brand. Microsoft Studios already includes groups like Halo-maker 343 Industries and the team behind Minecraft, which was acquired by Microsoft for $2.5 billion in 2014.

Microsoft displayed a record 52 games at the E3 pre-show event including 18 console launch exclusives and 15 world premieres. The E3 2018 kicks off from today.

The post Microsoft acquires Four Gaming Studios including ninja theory appeared first on TechWorm.

00:20

[$] Handling I/O errors in the kernel LWN.net

The kernel's handling of I/O errors was the topic of a discussion led by Matthew Wilcox at the 2018 Linux Storage, Filesystem, and Memory-Management Summit (LSFMM) in a combined storage and filesystem track session. At the start, he asked: "how is our error handling and what do we plan to do about it?" That led to a discussion between the developers present on the kinds of errors that can occur and on ways to handle them.

00:20

Why You Should Consider VIN Check Before Buying A Used BMW TechWorm

A BMW is a strong brand. That is why people struggle to get a model of BMW. A price for an item is quite expensive. It makes people buy used vehicles instead of new ones.

Not too old BMWs are usually in an excellent technical condition. They cost much less than brand new vehicle. That is why buyers struggle to get a used BMW because they get good quality for considerable money.

Why Buyer Needs To Get Full VIN Check

For buyers of expensive BMW cars, vehicle identification check is obligatory. Such a check can be provided partially for free. However, full overall expertise is not that costly. Value of the VIN report has can hardly be overestimated. Here are some data you will get from a VIN check report.

  • Basic information about a vehicle. Such type of data is provided for free. It includes year of car production, country of production. This type of information  BMW buyer has to consider immediately. If a BMW has been manufactured outside Germany, it can be of a lower quality.
  • Odometer reading. Odometer reading is a indicator drivers pay precise attention to. The lower it is, the better it is. It is important to get real odometer reading. Sellers of used cars often manually decrease the number of miles the vehicle has covered.
  • Accidents history. Each new owner would like to know if a vehicle had been in any accidents. During accidents, a car can get not only external damage, but also profound technical defects not obvious from the first sight. Without a VIN check, it is impossible to understand a real technical state of an automobile.
  • Theft history. A BMW is one of those autos that gets stolen quite often. That is why it is indispensable to get full VIN report to know the theft history of the vehicle. A car you intend to buy could have been stolen. If you buy it, you can even go to jail for this.
  • Insurance details. You should know what type of insurance a vehicle has. It will help evaluate the pay off an insurance company can pay if a vehicle gets damaged.
  • State inspections data. Each BMW car undergoes a state inspection each year. A potential buyer should be aware of the inspection results.

These are the main types of data that a buyer will get from a VIN check report. VIN check reveals very important information about any automobile. It will help you to buy a car that is truly in its best technical condition.

Where the VIN Number Is Located

Each manufacturer locates a vehicle identification number on a different place on a car. Here is where to find a VIN on a BMW vehicle:

  • It is usually located on a right suspension turret on models that were manufactured in Europe.
  • It can be located on windshield from a passenger side.
  • In models that were manufactured in North America you can find VIN inside drivers door jamb.

These are the most...

00:05

ITIF claims police use of Amazon Rekognition is "patriotic" MassPrivateI

image credit: Now the End Begins

A few weeks ago, the Information Technology & Innovation Foundation (ITIF) released a letter claiming that Amazon's Rekognition technology was "patriotic and can benefit society".


The ITIF went on to claim that police body cameras hold "law enforcement accountable and there is no reason to suggest the same cannot be true for facial recognition technology."

Let's discuss ITIF's claim that body cameras hold police accountable.

A 2017 article in Ars Technica reveals that body camera footage is generally not available to the public.

"Body cam footage is routinely turned over to defense attorneys as part of the pre-trial discovery process. But when it comes to supplying the public with footage, there's a hodgepodge patchwork of state laws and local laws nationwide. And the general default is that the footage is not a public record."

A similar article in the Verge warns everyone that police departments are trying to make body camera footage a state secret.

A recent article in LifeHacker reveals that police body camera footage is difficult to procure and...

00:03

Systemd Services: Reacting to Change

Title: 
Systemd Services: Reacting to Change

00:00

Getting Good at FPGAs: Real World Pipelining Hackaday

Parallelism is your friend when working with FPGAs. In fact, its often the biggest benefit of choosing an FPGA. The dragons hiding in programmable logic usually involve timing chaining together numerous logic gates certainly affects clock timing. Earlier, I looked at how to split up logic to take better advantage of parallelism inside an FPGA. Now Im going to walk through a practical example by modeling some functions. Using Verilog with some fake delays we can show how it all works. You should follow along with a Verilog simulator, Im using EDAPlayground which runs in your browser. The code for this entire article is been pre-loaded into the simulator.

If youre used to C syntax, chances are good youll be able to read simple Verilog. If you already use Verilog mostly for synthesis, you may not be familiar with using it to model delays. Thats important here because the delay through gates is what motivates us to break up a lot of gates into a pipeline to start with. You use delays in test benches, but in that context they mostly just cause the simulator to pause a bit before introducing more stimulus. So it makes sense to start with a bit of background on delays.

Delays in Verilog

For our purposes, delay in Verilog is pretty simple. The simulator uses a unitless time interval that you can set using the `timescale directive. The reality is, that timescale really doesnt do anything special but label what that lowest-level tick is. I used 1ns/1ps as a timescale which makes each tick worth 1ns with the measurements in picoseconds. However, it really doesnt matter in this case as long as you think of ticks.

There are several different kinds of delays and several ways Verilog can model them. For what we want, we only need a very simple delay from the output of some piece of code until it is sent somewhere else. You often hear about inertial delay and transport delay. A wire or gate with an inertial delay will lose any input that doesnt at least meet the delay time. So a gate with a delay of 5 (youll see how to specify that shortly) would miss a pulse of width 2, for example. With a transport delay, the entire signal is simply shifted in time no matter what. So the pulse of width 2 would still appear in the output, just 5 time units later.

For our examples, we dont care much. We just want to make some combinatorial logic take a long time so well keep it simple. If you want to read a lot more about delays in Verilog and why most people are doing them wrong, theres a great...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 12 June

23:58

23:48

Distribution Release: Univention Corporate Server 4.3-1 DistroWatch.com: News

Univention Corporate Server (UCS) is a Debian-based server distribution that offers an integrated management system for central administration of servers, Microsoft Active Directory-compatible domain services, and functions for parallel operation of virtualised server and desktop operating systems. The Univention team has published a point release update for the....

23:44

Anti-Piracy Lawyers Sentenced to Years in Prison For Defrauding Copyright Holders TorrentFreak

In the early 2000s, international and Danish entertainment industry groups joined forces to tackle the rising threat of piracy affecting movies, TV shows, music, and similar products.

The result was the anti-piracy group Antipiratgruppen (now RettighedsAlliancen / Rights Alliance), an organization dedicated to tackling the problem of unlicensed sharing.

Like all such operations, Antipiratgruppen needed legal representation and local law firm Johan Schlter was hired for the job, representing groups including the MPAA.

In subsequent years, Johan Schlter (which was founded by a lawyer of the same name) was involved in numerous anti-piracy cases. However, something was seriously amiss in this company that had long claimed to protect the interests of its entertainment industry clients.

Following an investigation into the companys accounts by auditing company Deloitte, financial irregularities amounting to millions of dollars were reported in the media during 2015.

The Johan Schlter law firm should have been distributing huge sums to movie and TV industry associations and their underlying rightsholders but its three partners Johan Schlter himself, Lars Halgreen and Susanne Fryland had been lining their own pockets instead. Massive sums were siphoned away from their clients.

Yesterday, after more than 20 hearings during which the defendants maintained their innocence (with Schlter and Halgreen painting themselves as victims of Frylands actions), all three were found guilty of fraud and false accounting to the tune of 100 million Danish kroner (US$15.83m).

Johan Schlter was sentenced to four years in prison, Susanne Fryland was ordered to serve five and a half years, and Lars Halgreen was sentenced to nine months. Because of his age, Schlters sentence is conditional. Due to his relatively minor role, so is Halgreens.

The court has ruled that gross economic crime has been committed. And the prison sentences take into account the crime committed, special prosecutor Malene Stage Christensen told DR News.

The Johan Schlter law firm went bankrupt in 2015 and, during the trial, events leading up to its demise were placed under the spotlight.

It transpired that in addition to being a partner in the law firm, Susanne Fryland was also a director of a subsidiary company which was responsible for managing registration, collection and administration rights for various film and...

23:40

The Pirate Bay Is Down; 3 Best Torrent Sites Like TPB TechWorm

King of torrent websites, The Pirate Bay is down again, here are 3 best torrent sites like TPB

The Pirate Bay is down again and throwing Cloudflare Error 522 Message. which means that CloudFlare was unable to send the HTTP request to the origin because a network connection to the origin server could not be established.

This is not very new for TPB, the torrent website has a history of going down regularly.

While the reason for the outage is still not known, you can check on to these best torrent site alternatives for the pirate bay.

  1. YTS aka YIFY.ag : YTS.ag is not the original YTS or YIFY website but a good clone. After the demise of original YIFY/YTS this website took its place and since it has gained lots of popularity with its unique style website look.
  2.  RARBG : RARBG gained quick popularity and provides torrent files and magnet links to facilitate p2p file sharing. The site has been blocked by UK, Saudi Arabia, Denmark, Portugal and several other countries.
  3. isoHunt : isoHunt.to, a de facto replacement of the original isoHunt, is the most advanced BitTorrent and best P2P torrent search engine. While it is the same old isoHunt from the outside, it is very different from the inside. It has nothing in common with the isoHunt Inc. that made the original website. isoHunt is an online torrent files index and repository, where visitors can browse, search, download or upload torrents of various digital content of mostly entertainment nature.

The Pirate Bay is currently the largest torrent website with the global alexa ranking of 124.

The post The Pirate Bay Is Down; 3 Best Torrent Sites Like TPB appeared first on TechWorm.

23:33

Global Investment in Wind, Solar Exceeds That of Fossil Fuels SoylentNews

World spending on renewable vitality is outpacing investment decision in electric power from coal, natural gasoline and nuclear energy plants, pushed by slipping costs of manufacturing wind and solar ability.

More than 50 % of the energy-producing capacity extra all-around the entire world in current several years has been in renewable sources this kind of as wind and solar, in accordance to the International Vitality Company.

In 2016, the newest calendar year for which data is out there, about $297 billion was used on renewablesmore than two times the $143 billion spent on new nuclear, coal, gas and gas oil electric power plants, according to the IEA. The Paris-based organization assignments renewables will make up 56% of net producing potential additional through 2025.

The moment supported overwhelmingly by hard cash-back incentives, tax credits and other authorities incentives, wind- and solar-era charges have fallen continually for a 10 years, earning renewable-energy financial commitment additional competitive.

Renewable charges have fallen so significantly in the earlier number of yrs that "wind and photo voltaic now symbolize the least expensive-charge selection for building electrical energy," claimed Francis O'Sullivan, study director of the Massachusetts Institute of Technology's Energy Initiative.

Sustained government assistance in Europe and other formulated economies spurred the development of renewable vitality. But expenses have fallen for other factors. China invested closely in a domestic photo voltaic-producing market, generating a glut of affordable solar panels. Innovation assisted makers make for a longer period wind-turbine blades, generating devices ready to generate significantly far more ability at a reduced expense.

Quoted Article: http://relatednews.net/31303/global-investment-in-wind-and-solar-energy-is-outshining-fossil-fuels/

Originally Submitted Article [paywalled]: https://www.wsj.com/articles/global-investment-in-wind-and-solar-energy-is-outshining-fossil-fuels-1528718400


Original Submission

Read more of this story at SoylentNews.

23:07

LF Deep Learning Foundation Announces Project Contribution Process

The LF Deep Learning Foundation, a community umbrella project of The Linux Foundation with the mission of supporting artificial intelligence, machine learning and deep learning open source projects, is working to build a self-sustaining ecosystem of projects.  Having a clear roadmap for how to contribute projects is a first step. Contributed projects operate under their own technical governance with collaboration resources allocated and provided by the LF Deep Learning Foundations Governing Board.

23:02

Systemd 239 Is Being Prepped For Release With Many Changes Phoronix

It has already been three months since the release of systemd 238 and as such release preparations are now underway for systemd 239...

22:49

DefenseCode ThunderScan SAST Advisory: WordPress WP Google Map Plugin Multiple SQL injection Security Vulnerabilities Bugtraq

Posted by Defense Code on Jun 12

DefenseCode ThunderScan SAST Advisory: WordPress WP Google Map Plugin
Multiple SQL injection Security Vulnerabilities

Advisory ID: DC-2018-05-002
Advisory Title: WordPress WP Google Map Plugin Multiple SQL injection
Vulnerabilities
Advisory URL: http://www.defensecode.com/advisories.php
Software: WordPress WP Google Map plugin
Language: PHP
Version: 4.0.4 and below
Vendor Status: Vendor contacted, no response
Release...

22:41

DefenseCode ThunderScan SAST Advisory: WordPress Ultimate Form Builder Lite Plugin Multiple Vulnerabilities (XSS and SQLi) Bugtraq

Posted by Defense Code on Jun 12

DefenseCode ThunderScan SAST Advisory: WordPress Ultimate Form Builder
Lite Plugin Multiple Vulnerabilities (XSS and SQLi)

Advisory ID: DC-2018-05-009
Advisory Title: WordPress Ultimate Form Builder Lite Plugin Multiple
Vulnerabilities (XSS and SQLi)
Advisory URL: http://www.defensecode.com/advisories.php
Software: WordPress Ultimate Form Builder Lite plugin
Language: PHP
Version: 1.3.7 and below
Vendor Status: Vendor...

22:22

VMware addresses a critical remote code execution vulnerability in AirWatch Agent Security Affairs

VMware has found a critical remote code execution vulnerability in the AirWatch Agent applications for Android and Windows Mobile.

The agent is installed by users on a mobile device in order to allow the AirWatch to manage it.

The flaw, tracked as CVE-2018-6968, may allow for unauthorized creation and execution of files in the Agent sandbox and other publicly accessible directories such as those on the SD card by a malicious administrator.

Due to an authorization flaw in the real-time File Manager capability for Android and Windows Mobile devices and Registry Manager for Windows Mobile devices, it is possible for a remote attacker with knowledge of specific enrolled devices within an AirWatch instance to add or remove files from a device, remotely execute commands on the device, or modify or set Registry Key values for Windows Mobile devices that are configured to use AirWatch Cloud Messaging (AWCM). reads the advisory published by VMware.

This vulnerability is identified by CVE-2018-6968 and is documented in VMSA-2018-0015 

The attacker does not need access to the Workspace ONE UEM Console. Access to read and store files on Android devices is limited to files within the Agent sandbox and other publicly accessible directories such as those on the SD card. Access to files on Windows Mobile/CE devices involves the entire device directory, it added.

VMware airwatch

Experts also provided a workaround for Android users who can choose C2DM/GCM instead of AWCM as their preferred push notification service.

The security updates address the vulnerability by disabling the flawed file, task, and registry management capabilities. VMware will deprecate the functionality in the next months.

Through mitigation of this security vulnerability, the File, Task & Registry Management capabil...

22:19

KDE Plasma 5.13 Ships As The Best Plasma 5 Release Yet Phoronix

The much anticipated Plasma 5.13 is now available as the latest installment of the maturing KDE Plasma 5 desktop...

22:02

Linux Kernel Patches Appear For A Line Of Intel MIPS SoCs Phoronix

It appears Intel is launching a line of SoCs based on the MIPS architecture...

22:00

How employee behavior impacts cybersecurity effectiveness Help Net Security

A recent OpenVPN survey discovered 25 percent of employees, reuse the same password for everything. And 23 percent of employees admit to very frequently clicking on links before verifying they lead to a website they intended to visit. Sabotaging corporate security initiatives Whether accidental or intentional, an employees online activities can make or break a companys cybersecurity strategy. Take password usage as one example. Employees create passwords they can easily remember, but this usually results More

The post How employee behavior impacts cybersecurity effectiveness appeared first on Help Net Security.

21:51

AI-Generated Film - the Next Frontier SoylentNews

Do we need another [HB]ollywood blockbuster? Apparently not if it is up to the future of AI:

...goal of having Benjamin [the AI] "write, direct, perform and score" this short film within 48 hours, without any human intervention...

Maybe it is not perfection yet, but it looks like reality is slowly catching up with science fiction. https://arstechnica.com/gaming/2018/06/this-wild-ai-generated-film-is-the-next-step-in-whole-movie-puppetry

Two years ago, Ars Technica hosted the online premiere of a weird short film called Sunspring, which was mostly remarkable because its entire script was created by an AI. The film's human cast laughed at odd, computer-generated dialogue and stage direction before performing the results in particularly earnest fashion.

That film's production duo, Director Oscar Sharp and AI researcher Ross Goodwin, have returned with another AI-driven experiment that, on its face, looks decidedly worse. Blurry faces, computer-generated dialogue, and awkward scene changes fill out this year's Zone Out, a film created as an entry in the Sci-Fi-London 48-Hour Challengemeaning, just like last time, it had to be produced in 48 hours and adhere to certain specific prompts.

The result is both awful, funny and impressive. Especially with the background knowledge that it was done by an AI in just 48 hours and limited resources. Maybe we are on the path of robotic entertainment sooner than later. You'll know who'll be the boss when you start hearing discussions for the AI's necessity for copyright ownership of the AI's creation.


Original Submission

Read more of this story at SoylentNews.

21:45

With the GDPR, companies face new era of compliance and transparency Help Net Security

A new Avecto survey explored IT and securitys role in helping companies achieve compliance with the new guidelines for the collection and processing of personal information of individuals within the EU. 500 IT and cybersecurity professionals in the UK, North America, and Germany were included in the study to understand familiarity with the regulation, the data protection measures in place, and the protections they added to secure personal data. Even with the GDPR going into More

The post With the GDPR, companies face new era of compliance and transparency appeared first on Help Net Security.

21:42

How to Use Social Media Effectively as a Small Business TechWorm

Social media is an excellent tool for marketing certain businesses, but for others it is an inefficient time drain they wish to avoid. The smaller the business, the more difficult a time they have dealing with both monitoring social media and posting to it because they have fewer personnel resources.

Here are some suggested ways to approach dealing with social media as an SME to make it more manageable.

Choosing the Right Social Network

When youre running a business that doesnt have a great deal of time available for social media, you must make it accessible. Its no good trying to manage 5-10 social media channels because a being everywhere, all the time strategy isnt something that a busy SME can realistically handle. In a sense, companies must pick their battles, so to speak.

It is much better to post semi-regularly and be responsive to commenters and direct messages on one or two social platforms than attempt to cover all the major ones. Therefore, narrowing down which social media channels are the most useful for your company is the first step. One way to do this is to look at what your businesss peers are doing. If theres a consistent approach of focusing on one or 2 social channels while limiting activity on the others, its best to follow the same strategy unless your company has a strategic reason not to do so.

Use software like HootSuite or SproutSocial to make managing multiple social accounts easier.

Protecting the Brand

A social media marketing agency is useful to advise about a content marketing strategy as it relates to social media. They have experts in this field who may even be experienced enough to specialize in a single social channel. Certainly, your business should have registered on all the other major social networks to protect the brand. If thats not been done, then an agency can help accomplish that to lock up the accounts before a competitor or someone else decides to register them.  

What to Post on Your Channels?

Each social media channel has a different focus and tone.

Since Facebook started off life as a social sharing site, it has more of a personal feel. Business pages were almost an afterthought for the company and it still fe...

21:40

Speak at ELC + OpenIoT Summit EU - Proposals due by Sunday, July 1

Share your expertise! Submit your proposal to speak at ELC + OpenIoT Summit Europe by July 1.

21:39

Re: Are `su user' and/or `sudo -u user sh' considered dangerous? Open Source Security

Posted by Jakub Wilk on Jun 12

* Georgi Guninski <guninski () guninski com>, 2018-06-12, 13:17:

This class of vulnerabilities has been known since at least 2005:
https://bugzilla.redhat.com/show_bug.cgi?id=173008 (CVE-2005-4890)

It was last discussed on oss-security in 2017:
http://seclists.org/oss-sec/2017/q2/412

For sudo, there's the "use_pty" flag. (It's not enabled by default.)

21:39

Are US Call Centers the Best Option to Support Tech SMEs? TechWorm

When you produce a SAAS app or offer a service for sale, what tech entrepreneurs dont always realize is the amount of pre-sale, sales, and after-sales support thats required. Potential buyers have questions that arent always answered through the help option inside an app or the frequently asked questions section of a service-based website.

For SMEs, they dont necessarily have the size of facility or technical experience to host and manage a call center operation; this is especially true on the tech side where theres often a tiny development team and no one else.

Using an outsourced call center to deal with the simpler, non-technical calls often becomes the solution to the problem. Paying for call handling instead of gearing up for a larger office, all the phone lines and other equipment needed, avoids a company becoming overwhelmed in an area where staff have no prior experience.

Some Call Centers Have Often Gone Offshore

Some call centers are still based in the US and others are based offshore. Going offshore is usually less expensive, but executives must fly out to these centers to train the staff. Cultural differences and language difficulties often make it challenging to obtain the level of customer service that both the company expects, and customers deserve. As a result, many companies that go offshore later decide to pull their call center outsourcing back to the US.

Benefits of US Call Centers

When theres any level of complexity to the product or service offering, then using a US call center is highly beneficial. The staff will understand the type of product or service being offered which makes a huge difference for customers who can tell when the rep on the phone knows their product or service. Its easier to understand the rep over the phone and calls are handled much quicker because of the lack of confusion. When you visit Ameridial, you can see how a professional call center is operated to deliver best-in-class service to every caller on behalf of the clients they serve.

Indirect Cost Benefits of Onshore Call Centers

Its true that at first glance, US call centers are dearer than offshore ones. Howev...

21:30

Thousands of Android Devices Running Insecure Remote ADB Service The Hacker News

Despite warnings about the threat of leaving insecure remote services enabled on Android devices, manufacturers continue to ship devices with open ADB debug port setups that leave Android-based devices exposed to hackers. Android Debug Bridge (ADB) is a command-line feature that generally uses for diagnostic and debugging purposes by helping app developers communicate with Android devices

Protecting consumers from mobile and IoT threats Help Net Security

A new report by Allot Communications revealed a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves. Mobile and Internet of Things continue to be primary attack vectors, contributing to a spike in cryptojacking, adware, and DDoS attacks. The Telco Security Trends Report is based on anonymous data gathered from four communications service providers (CSPs) across Europe and Israel, who between them, protect seven million customers. It found More

The post Protecting consumers from mobile and IoT threats appeared first on Help Net Security.

21:00

Fail of the Week: Two Rotors Are Not Better Than Four Hackaday

Fair warning: [Pawe Spychalski]s video is mostly him talking about how bad his dualcopter ended up. There are a few sequences of the ill-fated UAV undergoing flight tests, most of which seem to end with it doing a reasonable impression of a post-hole auger. We have to admit that its a pretty poor drone. But one can only truly fail if one fails to have some fun doing it, [Pawe] enjoyed considerable success, at least judging by the glee with which he repeatedly cratered the craft.

The overall idea seems to make sense, with coaxial props mounted in the middle of a circular 3D-printed frame. Mounted below the props are crossed vanes controlled by two servos. The vanes sit in the rotor wash and provide pitch and roll control, while yaw and thrust are controlled by varying the speeds of the counter-rotating props. [Pawe] knew going in that this was a sketchy aerodynamic design, and was surprised it performed as well as it did. But with ground effects limiting roll and pitch control close to the ground, the less-than-adequate thrust due to turbulence between the rotors, and the tendency for the center of mass and the center of gravity to get out whack with each other, all made for a joyously unstable and difficult to control aircraft.

Despite the poor performance, [Pawe] has plans for a Mark II dualrotor, a smaller craft with some changes based on what he learned. Hes no slouch at pushing the limits with multirotors, with 3D-printed racing quad frames and using LoRa for control beyond visual range. Still, were sure hed appreciate constructive criticism in the comments, and we wish him luck with the next one.

20:58

Trouble at CopperheadOS LWN.net

LWN reviewed CopperheadOS, a security-enhanced Android distribution, in 2016. Unfortunately, the company behind CopperheadOS appears to have run into internal trouble; we don't dare venture a guess as to the specifics, even after watching the situation for a few days, beyond the fact that there is clearly a dispute between the founders. This Reddit post is apparently a letter to co-founder Daniel Micay essentially kicking him out of the company. Users of CopperheadOS may want to be considering alternatives.

20:50

Are `su user' and/or `sudo -u user sh' considered dangerous? Open Source Security

Posted by Georgi Guninski on Jun 12

From
https://j.ludost.net/blog/archives/2018/06/12/are_su_user_andor_sudo_-u_user_sh_considered_dangerous/index.html

Per vague memory I discussed half of this with some linux crowd and
they said "won't fix" long ago.

`su user' and `sudo -u user sh' give the user the fd of root's tty
and it is readable and writable. After closing the session, the
user can keep it and on root's tty potentially do:

1. inject...

20:40

[SECURITY] [DSA 4226-1] perl security update Bugtraq

Posted by Salvatore Bonaccorso on Jun 12

-------------------------------------------------------------------------
Debian Security Advisory DSA-4226-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
June 12, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : perl
CVE ID : CVE-2018-12015
Debian Bug :...

20:38

AST-2018-008: PJSIP endpoint presence disclosure when using ACL Bugtraq

Posted by Asterisk Security Team on Jun 12

Asterisk Project Security Advisory - AST-2018-008

Product Asterisk
Summary PJSIP endpoint presence disclosure when using ACL
Nature of Advisory Unauthorized data disclosure
Susceptibility Remote Unauthenticated Sessions
Severity Minor...

20:34

AST-2018-007: Infinite loop when reading iostreams Bugtraq

Posted by Asterisk Security Team on Jun 12

Asterisk Project Security Advisory - AST-2018-007

Product Asterisk
Summary Infinite loop when reading iostreams
Nature of Advisory Denial of Service
Susceptibility Remote Authenticated Sessions
Severity Critical...

20:32

Operation WireWire Law enforcement arrested 74 individuals involved in BEC scams Security Affairs

US authorities announced the arrest of 74 individuals as part of an international law enforcement operation dubbed operation WireWire targeting BEC scams.

On Monday, the U.S. authorities announced the arrest of 74 individuals as part of an international law enforcement operation dubbed operation WireWire targeting business email compromise (BEC) scams.

The authorities conducted the investigation for over six months, 42 suspects have been arrested in the United States, 29 in Nigeria, the remaining in Canada, Mauritius, and Poland.

Law enforcement seized roughly $2.4 million and was able to recover of roughly $14 million in fraudulent wire transfers.

Operation WireWirewhich also included the Department of Homeland Security, the Department of the Treasury, and the U.S. Postal Inspection Serviceinvolved a six-month sweep that culminated in over two weeks of intensified law enforcement activity resulting in 74 arrests in the U.S. and overseas, including 42 in the U.S., 29 in Nigeria, and three in Canada, Mauritius, and Poland. reads the press note released by the Department of Justice and the FBI.

The operation also resulted in the seizure of nearly $2.4 million and the disruption and recovery of approximately $14 million in fraudulent wire transfers. 

bec operation wirewire

During Operation WireWire, law enforcement executed more than 51 domestic actions, including search warrants, asset seizure warrants, and money mule warning letters

The suspects have been involved in schemes targeting businesses of all sizes and individual victims.

According to the DoJ, 23 individuals were charged in the Southern District of Florida with laundering at least $10 million obtained from BEC scams. in one case the suspects tricked...

20:14

DRM Leasing / Display Patches Updated For Mesa's Vulkan Drivers Phoronix

Keith Packard's patches for improving the Linux infrastructure around VR HMD devices have landed within the mainline Linux kernel as well as in X.Org Server 1.20, but for rounding out the work, there still are pending patches for the Mesa Vulkan drivers...

20:12

"Appalling" Conditions Reported at Foxconn Plant That Makes Amazon Devices SoylentNews

Submitted via IRC for SoyCow8317

Foxconn Technology Group says it is investigating a factory it operates that makes Amazon devices, including Kindles, after an in-depth report by advocacy group China Labor Watch criticized its "appalling working conditions," including excessive hours and over-reliance on temporary workers.

"We are carrying out a full investigation of the areas raised by the report, and if found to be true, immediate actions will be taken to bring the operations into compliance with our Code of Conduct," Taiwan-based Foxconn, also known as Hon Hai Precision Industry Co., Ltd., told Reuters.

New York-based China Labor Watch says its investigators were sent to the factory, which is located in south central China in Hunan Province's Hengyang city and also makes Amazon's Echo Dot Bluetooth speakers and tablets, from August 2017 to April 2018.

During that time, the group says it found that dispatch, or temporary, workers made up more than 40% of the workforce, far exceeding the 10% limit set by Chinese law. Dispatch workers were also treated very differently than regular workers, receiving far less safety training and no overtime wages. Instead, dispatch workers were paid the same rate, or 14.5 RMB ($2.26) an hour for both normal and overtime hours.

Source: https://techcrunch.com/2018/06/10/after-report-on-appalling-conditions-foxconn-will-investigate-plant-that-makes-amazon-devices/


Original Submission

Read more of this story at SoylentNews.

20:02

Living Forever The Secret to Not Aging Lifeboat News: The Blog

While were not off the hook for paying taxes, Dr. Aubrey de Grey believes that we may be able to avoid (or at least prolong) our until-now inevitable mortality.

LIKE us on Facebook: https://www.facebook.com/InmanNews
FOLLOW us on Twitter: https://www.twitter.com/InmanNews
FOLLOW us on Instagram: https://www.instagram.com/InmanNews

Join us at Inman Connect: https://www.inman.com/events

20:02

Linux 4.18 Supports The Qualcomm Snapdragon 845 & DT For NES Classic Edition, Steam Link Phoronix

The ARM SoC/platform changes have been submitted and already pulled into the merge window for the Linux 4.18 kernel...

19:59

Apple Bans Cryptocurrency Mining Apps From Its App Stores The Hacker News

Due to the surge in cryptocurrency prices, not only hackers but also legitimate websites and mobile apps are increasingly using cryptocurrency miners to monetize by levying the CPU power of your PC and phones to mine cryptocurrencies. However, Apple wants to protect your Mac and iPhone battery from shady cryptocurrency mining apps, and therefore, the company has put restrictions on such apps

19:43

8 Roles on a Cross-Functional DevOps Team

If youre just getting started with a squad model, you may not be sure what roles youll need for your team to function smoothly. Our squad model in the IBM Digital Business Group is based on the Spotify Squad framework. At a high level, a squad is a small, cross-functional team that has autonomy to deliver on their squad mission. The squad missions and cross-squad priorities are set at an organizational level.

19:37

R Consortium Looks for Feedback on R Package Best Practices

The R Consortium Infrastructure Steering Committee (ISC) is exploring the benefits of recommending that R package authors, contributors, and maintainers adopt the Linux Foundation (LF) Core Infrastructure Initiative (CII) Best Practices Badge.

19:36

DragonFlyBSD Gets Better Hardened Against CPU Speculative Execution Bugs Phoronix

While the DragonFlyBSD kernel has already landed its mitigation for Spectre V1/V2 and Meltdown CPU vulnerabilities, a fresh round of CPU bug hardening work was just merged into their kernel...

19:22

Why fascism is so tempting and how your data could power it Lifeboat News: The Blog

In a profound talk about technology and power, author and historian Yuval Noah Harari explains the important difference between fascism and nationalism and what the consolidation of our data means for the future of democracy. Appearing as a hologram live from Tel Aviv, Harari warns that the greatest danger that now faces liberal democracy is that the revolution in information technology will make dictatorships more efficient and capable of control. The enemies of liberal democracy hack our feelings of fear and hate and vanity, and then use these feelings to polarize and destroy, Harari says. It is the responsibility of all of us to get to know our weaknesses and make sure they dont become weapons. (Followed by a brief conversation with TED curator Chris Anderson)

Check out more TED Talks: http://www.ted.com

The TED Talks channel features the best talks and performances from the TED Conference, where the worlds leading thinkers and doers give the talk of their lives in 18 minutes (or less). Look for talks on Technology, Entertainment and Design plus science, business, global issues, the arts and more.

Follow TED on Twitter: http://www.twitter.com/TEDTalks
Like TED on Facebook: https://www.facebook.com/TED

18:26

Unpublished Chinese Censorship Document Reveals Effort to Eradicate Online Political Content SoylentNews

The Globe and Mail covers an unpublished Chinese censorship document revealing sweeping effort to eradicate online political content.

Chinese authorities have tightened their grip on the country's online broadcasting platforms, banning a long list of content everything from tattoos to religious proselytizing, violations of "mainstream values," flirtatious dancing, images of leaders and Western political critiques as the government seeks to stamp out any venue that could be used for dissent or behaviour it considers obscene, according to an unpublished censorship directive obtained by The Globe and Mail.

The meteoric growth of online video services in China has offered a vibrant venue for creativity and, occasionally, obscenity and political protest unleashing a daily riptide of user-made cat videos, pranks and glimpses of everyday life. Hundreds of millions of people in China watch short video clips and live-stream video every month.

Chinese authorities have responded with strict new rules, ordering online broadcasters to eradicate a wide range of content, according to the document obtained by The Globe, which is entitled "Management requirements for live service information and content."

The document is being used as a master guideline for content blocking by some of the country's most-used video sites, multiple sources in the industry told The Globe. It began circulating early this year, and is believed to have been issued by the powerful Cyberspace Administration of China, China's central Internet authority, which did not respond to requests for comment.

Comments from Amnesty International and other organizations are included. The document outlines ten basic categories of banned content and provides insight into the Chinese government's goals.


Original Submission

Read more of this story at SoylentNews.

18:00

555 Ways to Speed Control A DC Motor Hackaday

The 555 timer IC is a handful of active components all baked into one beautifully useful 8 pin package. Originally designed for timing purposes, they became ubiquitous parts that can achieve almost anything. In this case, theyre being used to create a  basic PWM motor controller.

The trick is to set the 555 up in astable mode, and use diodes and a potentiometer in the charge/discharge loop. By hanging a diode off either side of a potentiometer, leading to the charge and discharge pins, and connecting the center lug to the main capacitor, you can vary the resistance seen by the capacitor during charge and discharge. By making charging take longer, you increase the pulse width, and by making discharge take longer, you reduce the pulse width. The actual frequency itself is determined largely by the capacitor and total resistance of the potentiometer itself.

This is a very old-school way to generate a PWM signal, which could be used to vary intensity of a light or make noise on a buzzer. However, in this case, the output of the 555 is connected to a MOSFET which is used to vary the speed of a computer fan motor.

Its an excellent way to learn about both PWM motor control and the use of 555 timers, all with a very low parts cost and readily available components. Weve seen such setups before, used as easy-to-build dimmer switches, too.

17:45

Feds Arrest 74 Email Fraudsters Involved in Nigerian BEC Scams The Hacker News

The United States Department of Justice announced Monday the arrest of 74 email fraudsters across three continents in a global crackdown on a large-scale business email compromise (BEC) scheme. The arrest was the result of a six-month-long operation dubbed "Operation Wire Wire" that involved the US Department of Justice, the US Department of Homeland Security, the US Treasury, and the US Postal

17:33

BitTorrent Sells to TRON Cryptocurrency Founder Justin Sun TorrentFreak

Last month we were the first to report that Justin Sun, the entrepreneur behind the popular cryptocurrency TRON, was in the process of acquiring BitTorrent Inc.

The San-Francisco based file-sharing company confirmed the interest from Sun but noted that the acquisition was not yet 100% finalized.

This position appears to have shifted in the weeks that followed. Last week Suns company Rainberry Aquisition filed paperwork related to a merger at California Secretary of State, Variety reports, and BitTorrent did the same.

BitTorrent changed its name to Rainberry last year, and new information suggests that the acquisition by Sun was recently finalized.

This is further backed up by Variety which learned that BitTorrent management informed employees about the deal last week. The staffers were told not to share any information with the press, but word got out eventually.

Its unclear how much was paid for the acquisition. Suns plans for BitTorrent also remain a mystery.

In the short term, not much is expected to change. However, it could be that Sun will eventually use BitTorrents user base of over 100 million users to popularize TRON even further. With the acquisition, Sun will also own several BitTorrent patents, including one for P2P live streaming.

TRON is one of the hottest and most controversial cryptocurrencies. After a successful ICO, it now has a market cap of more than $3 billion, which is surpassed by few others.

The TRON mainnet, which went live two weeks ago, has the ultimate goal to decentralize the web. BitTorrent would fit well in this picture, especially since the TRON whitepaper mentions torrents as one of its pillars.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

17:20

Battistellis EPO is Outdoing North Korea When It Comes to Propaganda and Abuses Against Staff Techrights

Battistelli fire and fury

Summary: Battistellis scorched Earth approach his sole legacy at the EPO has left many workers in mental breakdowns (if not dead), but to celebrate the Battistelli years three weeks before the end of his term the Office issues new propaganda material (pertaining exclusively to the Battistelli years, 2010 to 2018) while Battistelli-leaning media offers cover

THE EPO has just issued a Battistelli whitepaper (peak propaganda we might as well call it).

Its accompanied by this distasteful Benot Battistelli puff piece (warning: epo.org link) and a tweet which says: Modernising the EPO for excellence and sustainability a summary of our achievements 2010-2018 can now be downloaded from our website

Is it already too late to hold Battistelli accountable while hes still in Office? Probably. Thats what happened with Sarkozy.The EPO now calls turning itself into a den of corruption with literal criminals in charge an Achievement. This is like seeing North Korea in patent office form. Already widely ridiculed by Moreno and various other EPO observers, this report is a classic example of hogwash. The EPO should come under a criminal investigation for hundreds of abuses/counts, but it is effectively immune from prosecution and the international community doesnt want to rattle this snake. Is it already too late to hold Battistelli accountable while hes still in Office? Probably. Thats what happened with Sarkozy.

The Corcoran story which we took note of yesterday helps demonstrate that merely talking about Team Battistellis very serious abuses causes endless abuse to oneself. If this turns out to be correct, one insider wrote yesterday, it would be another very black day in the history of the European Patent Off...

17:11

Crooks used multi-stage attacks aimed at Russian Service Centers Security Affairs

Fortinet recently observed a series of cyber-attacks targeting Russian service centers offering maintenance and support for various electronic goods.

Security researchers from Fortinet have recently spotted a series of cyber-attacks targeting Russian service centers offering maintenance and support for various electronic goods.

Experts highlighted the hackers conducted multi-stage attacks but excluded the involvement of a nation-state actor.

Attackers leveraged spear-phishing messages using weaponized Office documents exploiting the 17-Year-Old MS Office flaw CVE-2017-11882 that was addressed by Microsoft updates in October.

The first attacks were observed at the end of March when crooks sent spear-phishing emails to a service company that repairs Samsungs electronic devices.

The messages were written in Russian and contained a file named Symptom_and_repair_code_list.xlsx.

Russian service centers

FortiGuard Labs discovered a series of attacks targeted at service centers in Russia. These service centers provide maintenance and support for a variety of electronic goods. reads the post published by Fortinet.

Experts noticed that the content of the email was the result of a translation made by a translator service, analyzing the headers of the email the experts discovered that the IP address of the sender wasnt associated with to the domain in the From field.

 

The attackers...

17:00

Trump-Kim Meeting Set for Private Island in Singapore Terra Forming Terra




This is happening today.

I expect it to be thoroughly scripted but maybe not.  The removal of three generals gives me confidence that the underlying regime will stay in line and prevent outbursts of more typical Korean behavior which is long on gratuitous bullying.  In fact Trump's response to the one round of that we had likely drove that lesson home.

I do think that the deal is done and that the North Koreans are all profoundly relieved.  They have spent 65 years trapped in an Orwellian nightmare that no one could really end even when all knew it was not working.

Let us all pray that this is as scripted as it should well be...

Trump-Kim Meeting Set for Private Island in Singapore

By Ivan Pentchoukov and Petr Svab

June 6, 2018 7:01 pm Last Updated: June 7, 2018 11:00 am

Sentosa island in Singapore on June 6, 2018. (Roslan Rahman/AFP/Getty Images)

https://www.theepochtimes.com/trump-kim-meeting-set-for-private-island-in-singapore_2552251.html

The June 12 meeting between President Donald Trump and North Korean leader Kim Jong Un will take place on a private island in Singapore, according to White House Press Secretary Sarah Sanders.

Sanders said the two leaders will meet at the Capella hotel on Singapores Sentosa island. She also thanked Singaporeans for their hospitality.

Trump told reporters at the White House on Tuesday that plans for the historic summit are moving along very well.

A lot of relationships being built, a lot of negotiations going on before the trip, he said. Well see what happens. But its very importantitll be a very important couple of days.

Sentosa lies by the southern edge of the island nation. Less than three miles across, its known for its beaches, hotels, casino, and a Universal Studios theme...

17:00

Q Drops pending Full IG Report Terra Forming Terra




We continue to wait for the full IG report which will include the Clinton investigation as well.  The EO will surely order the roll-up of all participants using the assistance of the Marine Corp.  We now have over 35,000 sealed indictments and a complete roll up is plausible and possible.


What I have here is the full Intel drop we have been provided with which clarifies a lot.  It follows that we will have the IG report and the actual contents of those 35,000 indictments to work from.  It certainly tells us a tale of treason at the highest levels.


The public shock will surely be horrific.



Jun 11 20181463
Anonymous ID: 17fc97 No.1704039 NEW
Jun 11 2018 16:51:46 (EST)seth_rich_cover.582cd87e07107.jpg  


>>1704013
Q !CbboFOtcZs ID: 22318c No.1704083 NEW
Jun 11 2018 16:53:30 (EST)
>>1704039
Patriot.
Q
1462
Anonymous ID: 511266 No.1703935 NEW
Jun 11 2018 16:45:41 (EST)JulianAssange_Smile.gif ...

17:00

The Rabbi and the Monk Terra Forming Terra




This is a neat story and worth the read as it really underlines a fundamental divide between followers and leadership that we poorly understand.

Communities of followers do respond to leadership and that leadership needs to be subtle as well as been dramatic and plausible.  This is a wonderful tale of directed subtlety.

We need a collection of such tales as leader all need this type of direction.


THE RABBI AND THE MONK

http://theperfectsystem.com/45-the-rabbi-and-the-monk/

This is a story told to me by my dear friend and value-based business consultant, Ron Mandel.

There was a cloister of monks in a monastery in Northern Israel. The senior Monk became concerned about the relevance of his Monastery. The Monks had been there a long time, they were getting older, and he noticed that visitors to the Monastery were becoming less. The Monastery had been a favorite visitor destination for picnics and sightseeing. He also noticed more disturbingly that his fellow Monks were not appreciating each other as they once had when they first started their cloister, even to the point of them taking each other for granted. And, to top things off, he had no new enquiries from young men wanting to join the Order. To the Head Monk, the Monastery was slowly dying.

Living near the Monastery was a well known and revered Rabbi. The two had become good friends.

The head Monk went to see this Rabbi and to discuss his dilemma and get his advice. This Rabbi was known to be very wise. His wisdom was coupled with his humility, so his door was always open to his dear friend.

The head Monk described the situation to this revered Rabbi. And this is the advice he gave:

Privately, tell everyone, one by one, that I had a vision that one of the monks in the cloister was a hidden Saint. The key word is hidden because great Saints never have the need to reveal themselves.

The effort was profound and...

17:00

Project Veritas Founder Discusses Teachers Union Cover-Up of Child Abuse Terra Forming Terra




Yes, it makes total sense that the Unions will be working to protect their errant members. After all they are the other source of authority and the administration has been uniformly active in protecting members.

That those exposing such abuse will get worked is also expected.  None of this detracts from the banal reality of child abuse.

Be aware that a lot of this type of information is been bled into modern consciousness at the present as we have a grassroots global counter attack under way that is flushing information out...

Project Veritas Founder Discusses Teachers Union Cover-Up of Child Abuse (Part 2 of 2)
Efforts to tell the truth through undercover reporting opposed by half-truths, false framing, and ridicule
By Joshua Philipp, The Epoch Times
June 7, 2018 3:45 pm Last Updated: June 8, 2018 9:14 am


James O'Keefe, founder and president of the nonprofit Project Veritas, in New York on Oct. 31, 2017. (Benjamin Chasteen/The Epoch Times)
https://www.theepochtimes.com/project-veritas-founder-discusses-teacher-union-cover-up-of-child-abuse-part-2-of-2_2553717.html


Project Veritas, which specializes in undercover journalism, has recently exposed cases of teachers unions covering up the physical and sexual abuse of children. The president and founder of Project Veritas, James OKeefe, recently appeared on Declassified, a news program of The Epoch Times, where he discussed his latest findings.
Project Veritas has been the target of half-truths, false framing, and ridicule for its undercover work exposing corruption in government, special interest groups, news outlets, and unions. OKeefe noted that many of the groups it has exposed are among the sacred cows of the political machine.
Among the...

17:00

Desert Air Will Give Us Water - Facts So Romantic Nautilus


A partial solution to the problem of punishing droughts may be to snatch water from the air, Dune-style.Photograph by NASAs Marshall Space Flight Center / Flickr

Last year, after a punishing four-year drought, California lifted emergency water-scarcity measures in all but four counties. Residents could sigh in relief but not without resignation. This drought emergency is over, but the next drought could be around the corner, California Governor Jerry Brown said at the time. Conservation must remain a way of life.

Hes right. In April, a study in Nature Climate Change, based on climate model simulations, concluded that a 25 percent to 100 percent increase in extreme dry-to-wet precipitation events is projected for the rest of this century, despite only modest changes in mean precipitation. Such hydrological cycle intensification would seriously challenge Californias existing water storage, conveyance and flood control infrastructure. In 2015, when a record-setting low of California mountain snowpack was being set, Richard Saykally, a water chemist at UC Berkeley, told me it wouldnt be unprecedented for the drought to last for decades. There has been a record of far worse droughts than what were experiencing now, he said, referring to tree-ring data which
Read More

16:41

Notorious Kindle Unlimited Abuser Has Been Booted From the Bookstore SoylentNews

Submitted via IRC for SoyCow8317

A few levels past the bestsellers and sci-fi/romance/adventure titles on Kindle Unlimited, in the darkest corners of the Kindle Direct Publishing market, there are books that are made entirely out of garbage designed to make scammers hundreds of dollars a day. One user, who called his or herself Chance Carter, was one of the biggest abusers of the KDP system and, more important, made over $15 per book they uploaded to the system, over and over, for books that contained no real content.

Carter, according to the Digital Reader, would create large novels out of other books. The books, which were simple hack jobs written by Fiverr writers, were hundreds of pages long and, on the first page, featured a recommendation to flip to the last page to get a free giveaway. KDP pays authors for both paid downloads as well as for pages read and it doesn't sense reading speed, just the highest number of pages reached. Therefore Chance's "readers" were instantly sending him or her about twenty dollars a read.

Source: https://techcrunch.com/2018/06/11/notorious-kindle-unlimited-abuser-has-been-booted-from-the-bookstore/


Original Submission

Read more of this story at SoylentNews.

16:40

0N9.COM SALE: 15% DISCOUNT OF WINDOWS 10 AND OFFICE 2016 TechWorm

0N9.COM offer the large range of PC games/expansion packs, Xbox live subscriptions & games, PlayStation Network cards/games and more. We provide the best price possible on the internet, instant delivery without wasting time for searching. Save money and enjoy your game quickly and safety!
Now 0n9.com sells software products such as Windows 10 Professional OEM Key and Microsoft Office 2016 Professional Plus Retail Key. People can click https://www.0n9.com/microsoft-office-2016-professional-plus-retail-key.html and https://www.0n9.com/windows-10-professional-oem-key.html to know more about them.By the way, there is also a 15% discount about our software by using the coupon SOFTTECH.

The post 0N9.COM SALE: 15% DISCOUNT OF WINDOWS 10 AND OFFICE 2016 appeared first on TechWorm.

16:34

IPBC, a Patent Trolls-Funded Event of IAM, is Advancing the Attacks on Section 101/Alice Techrights

Agenda up for sale

Cheque writing

Summary: Andrei Iancu preaches to the litigation industry in an event (lobbying opportunity) organised by the patent trolls lobby, IAM

THE patent trolls lobby, IAM, has received plenty of money from patent trolls (in Europe as well, e.g. Sisvel among others). Its all right there in the Sponsors page for IPBC. Even Microsoft and several of its trolls and/or front groups (we can count at least six right there) are paying IAM. Just remember that IAMs authors have their hands tied; they know where the money comes from and what to deliver in return, e.g. in terms of bias or agenda.

So when USPTO Director Iancu goes to speak at IPBC we more or less know the audience he speaks to. He too knows the audience. Yesterday morning Joff Wild (IAMs editor) said:

In a couple of hours, the educational part of the event begins with a keynote presentation from USPTO Director Andrei Iancu. That will be followed by a debate on the motion This house believes that despite recent negative developments, the United States remains and will continue to be the driving force of the global patent market.

Iancus talk was mentioned by Watchtroll last night and Mr. Lloyd (IAM), who has been lobbying Iancu, helps the bashing of Section 101. From the events rather long report:

Iancu on dysfunctional 101 For his keynote speech to open this years IPBC Global, USPTO Director Andrei Iancu addressed one of the meatiest and most problematic issues facing the US patent system. As any market observer knows, determining what is patentable under section 101 of the US statute has been the...

16:03

PTAB Carries on Undeterred and Unabated, Courts Are Becoming Less Tolerant of Low-Quality Patents Techrights

Cleaning up the patent mess/maze

Cleaning up

Summary: With the shift away from the Eastern District of Texas (EDTX) and with PTAB applying growing levels of scrutiny to patents the likelihood that abstract patents will endure at the patent office or the courts is greatly diminished

THE Patent Trial and Appeal Board (PTAB), defended by the lions share of rulings from the Federal Circuit and still reluctantly supported by the new Director of the USPTO, Mr. Iancu (more on that in our next post; he has no choice but to fully support PTAB as per Oil States), has just been brought up by this latest Docket Report, which cites SAS Institute, Inc. v Iancu. As it turns out, PTAB receives some extra work in DermaFocus LLC v Ulthera, Inc. (in light of that recent SCOTUS case) but the final outcome will likely be the same anyway. To quote:

The court denied plaintiffs motion to lift a stipulated stay pending inter partes review because the PTAB had not resolved two uninstituted claims following the Supreme Courts decision in SAS Institute, Inc. v. Iancu, 138 S. Ct. 1348 (2018).

In light of the SCOTUS ruling on TC Heartland (last mentioned this past weekend), Watchtroll has published this piece about the District of Massachusetts. The patent maximalists are generally very worried for Texas and its demise (notably EDTX), but they hope litigation will go elsewhere in spite of low likelihood of success (as in, winning patent cases). To quote:

In a post-TC Heartland era, litigants may have fewer choices as to where to fight their legal patent battles. They do, however, still have choices. It remains to be seen whether new Local Rule 16.6 will be the magnet the bench hopes it will to draw more cases here to Massachusetts.

T...

16:02

What If The Universe Stopped Expanding? Lifeboat News: The Blog

What if all the galaxies, stars, planets everything stopped moving away from everything else? #WhatIf

15:33

Apple v Samsung Not Over, Hearing on a New Design Patent Trial Next Month Techrights

In Tokyo

Summary: Apples legal battles against phones that have Linux inside them simply arent ending; meanwhile, theres more evidence that Apple would be wise to simply push for patent reforms, namely further restrictions on patent scope

APPLES legal battles against Android never seem to end. The USPTO granted questionable patents on rather trivial designs, causing a great deal of controversy. Yesterday the patent maximalists rushed to write about Calculating design patent damages after Apple v Samsung, but the case is far from over. Or so it seems based on reports like these [1, 2]. The latter says:

It turns out that $539 million is more than Samsung is willing to pay Apple after it was found to have infringed on several patents.

The trial over how much the chaebol was to pay in damages that ended two weeks ago after six years of overlapping litigation may restart in just two weeks. Were learning through Law360 that Samsung has filed a post-trial motion that reiterated its case for why it should only pay $28 million instead.

The company said that Judge Lucy Kohs instructions allowed the jury to not identify what the article of manufacture that each of three iPhone-related design patents applied to for example, did the patent covering a colorful grid of icons apply to just the software component or the whole iPhone when it comes to potential lost sales Apple wants to claim?

[...]

Law360 reports that Apple may respond to the motion by June 21 and a hearing on a new trial will take place July 26.

We quit following these cases (at least closely) a very long time ago because they never seem to end. It has been nearly 8 years since Apple officially began its patent war on Android and nowadays there are newer cases like...

15:03

Elon Musk's Boring Co. Delivers First 1,000 Flamethrowers SoylentNews

Six months after Elon Musk raised the eyebrows of sane people everywhere by announcing his Boring Co. would sell flamethrowers for $500 a pop, the first 1,000 deliveries were made Saturday for customers who showed up at the company's headquarters in Hawthorne, Calif.

The flamethrowers went like, well, flaming hotcakes when they went on sale in late January, selling out in just four days. In all, 20,000 were sold, raising about $10 million in revenue for Musk's tunnel-boring startup. The devices, technically called "Not a Flamethrower" to skirt federal shipping regulations, shoot a two-foot flame.

[...] Despite concerns about the wisdom of allowing personal flamethrowers in wildfire-prone California, state legislators last month shelved legislation that would have required them to come with a safety warning.

[...] 2017 was California's most destructive wildfire season ever, with more than 9,000 fires burning acreage the size of Delaware and killing at least 46 people.


Original Submission

Read more of this story at SoylentNews.

15:00

Understanding a MOSFET Mixer Hackaday

A mixer takes two signals and mixes them together. The resulting output is usually both frequencies, plus their sum and their difference. For example, if you feed a 5 MHz signal and a 20 MHz signal, youd get outputs at 5 MHz, 15 MHz, 20 MHz, and 25 MHz. In a balanced mixer, the original frequencies cancel out, although not all mixers do that or, at least, dont do it perfectly. [W1GV] has a video that explains the design of a mixer with a dual gate MOSFET, that you can see below.

The dual gate MOSFET is nearly ideal for this application with two separate gates that have effectively infinite input impedance. [Stan] takes you through the basic circuit and explains the operation in whiteboard fashion.

Oddly, you think of a mixer as adding two signals, but it really multiplies them if you think about the trigonometry involved. Consider a sine wave:

f=A*sin(*t+)

In this formula, A is the amplitude, is the radian frequency (that is 2 times pi times the frequency in Hertz) and is the phase (in radians). Of course, t is time. Now, consider two frequencies:

f1=A1*sin(1*t+1)   f2=A2*sin(2*t+2)

Keep in mind a cosine wave is just a sine wave with 90 degrees added to the phase. If you simply add these two together you would get f1+f2, but to get the frequencies to add we really need 1+2 and 1-2 to appear in the output. Remember that sin(a)sin(b)=1/2[cos(a-b)-cos(a+b)] or if you cant remember, look it up.  So multiplying two sine waves results in two phase shifted sine waves (cosine waves) of the sum and difference frequency. This is why the symbol for a mixer has an X in it and not a plus sign.

Mixers are a fundamental part of all but the simplest transmitters and receivers. Many times, youll see people use an IC like the NE602 or NE612 that incorporate an oscillator and a mixer together. There are other chips out there, too.

13:26

A Serious New Hurdle for CRISPR: Edited Cells Might Cause Cancer, Find two Studies SoylentNews

Editing cells' genomes with CRISPR-Cas9 might increase the risk that the altered cells, intended to treat disease, will trigger cancer, two studies published on Monday warn a potential game-changer for the companies developing CRISPR-based therapies.

[...] The CEO of CRISPR Therapeutics, Sam Kulkarni, told STAT the results are "plausible." Although they likely apply to only one of the ways that CRISPR edits genomes (replacing disease-causing DNA with healthy versions) and not the other (just excising DNA), he said, "it's something we need to pay attention to, especially as CRISPR expands to more diseases. We need to do the work and make sure edited cells returned to patients don't become cancerous."

Another leading CRISPR scientist, who asked not to be named because of involvement with genome-editing companies, called the new data "pretty striking," and raised concerns that a potential fatal flaw in some uses of CRISPR had "been missed."

[...] "We found that cutting the genome with CRISPR-Cas9 induced the activation of ... p53[*]," said Emma Haapaniemi, the lead author of the Karolinska study. That "makes editing much more difficult."

The flip side of p53 repairing CRISPR edits, or killing cells that accept the edits, is that cells that survive with the edits do so precisely because they have a dysfunctional p53 and therefore lack this fix-it-or-kill-it mechanism.

https://www.statnews.com/2018/06/11/crispr-hurdle-edited-cells-might-cause-cancer/

I've been skeptical about this for awhile, and arguing this exact point: double stranded breaks would induce the majority of cells with the target sequence to self-destruct, lyse, or go senescent. I've seen this reflected in the data on cell counts of almost every paper that includes it. Things are much worse than I thought if "leading CRISPR scientists" are now acting surprised at this.

Read more of this story at SoylentNews.

12:53

Facebook gives 500 pages of answers to lawmakers' data privacy questions The Hill: Technology Policy

Facebook said Monday that it is committed to improving its data security practices and is still investigating the extent of the Cambridge Analytica leaks in a nearly 500-page response to questions from lawmakers.In many cases, Facebook provided...

12:02

Transhumanist Technologies to Live Forever, Become Bionic and Build a Better Political System with Zoltan Istvan Lifeboat News: The Blog

My new 45 minute interview out on #transhumanism via Fringe FM:


Zoltan Istvan Gyurko (@zoltan_istvan) is an American transhumanist, journalist, entrepreneur and Libertarian futurist who ran for President of the United States in 2016 to raise awareness for transhumanism. In 2017, Istvan announced his intent to run for Governor of California in the 2018 election as a member of the Libertarian Party see his website: zoltanistvan.com for more.

Formerly a reporter for the National Geographic Channel, Istvan now writes futurist, transhumanist, libertarian and secular themed articles for major publications including Vices Motherboard, Wired, The Huffington Post., TechCrunch and Newsweek. Istvan also regularly appears on television and video channels discussing futurist topics and is one of the worlds most influential transhumanists believing transhumanism will grow into a mainstream social movement in the next decade.

Istvan is also the author of The Transhumanist Wager, a philosophical science fiction novel.

12:00

A Close Eye on Power Exposes Private Keys Hackaday

Hardware wallets are devices used exclusively to store the highly sensitive cryptographic information that authenticates cryptocurrency transactions. They are useful if one is worried about the compromise of a general purpose computer leading to the loss of such secrets (and thus loss of the funds the secrets identify). The idea is to move the critical data away from a more vulnerable network-connected machine and onto a device without a network connection that is unable to run other software. When designing a security focused hardware devices like hardware wallets its important to consider what threats need to be protected against. More sophisticated threats warrant more sophisticated defenses and at the extreme end these precautions can become highly involved. In 2015 when [Jochen] took a look around his TREZOR hardware wallet he discovered that maybe all the precautions hadnt been considered.

Lets start with a discussion of some common threats to a microcontroller and how they might be mitigated. When developing firmware its pretty common to use a serial console to print debug messages. Its obvious that if this is enabled when the final product is shipped, you shouldnt print out sensitive information (like private keys) during operation, lest someone connect a serial adapter and see the messages! Of course you can try hiding the physical pins the serial console is connected to, but the common wisdom about such security by obscurity is that it is ineffective and thus insufficient. What about wherever you physically store the data? If its in an external device (SD card, NAND/NOR flash, EEPROM, etc) can someone tap the lines between that and the microprocessor and see the key-related messages pass by? Can they just remove the external storage and read it themselves? They probably can, in which case you can encrypt the data, but then where do you put that key? Some microcontrollers have one time programmable (OTP) flash onboard for saving such secrets. For many products storing keys in OTP, disabling debug access, and turning off the debug console is sufficient. But for a security focused product like a hardware wallet, whose primary feature is security, more stringent measures are required.

...

11:49

Court Orders Payment of $259,900.50 to Bruce Perens' Attorneys SoylentNews

Bruce Perens has a blog post on his site stating that the court has ordered Open Source Security, Inc. and Bradley Spengler to pay $259,900.50 to his attorneys. At issue was Bruce getting sued for pointing out that Grsecurity and their customers are involved in contributory infringement and breach of contract by deploying their product in conjunction with the Linux kernel under the no-redistribution policy employed by Grsecurity.

The court has ordered Open Source Security, Inc, and Bradley Spengler to pay $259,900.50 in legal fees to my attorneys, OMelveny and Meyers. The court awarded about half what we asked for, courts usually do reduce awards. There is no new comment at this time, but please see my comment upon asking for the award of legal fees.

Here are all of the case documents.

Earlier on SN:
Bruce Perens Wants to Anti-SLAPP GRSecurity's Brad Spengler With $670,000 in Legal Bills (2018)
Grsecurity's Defamation Suit Against Bruce Perens Dismissed (2017)
Bruce Perens Warns of Potential Contributory Infringement Risk for Grsecurity Customers (2017)


Original Submission

Read more of this story at SoylentNews.

10:12

President Trump Set to Meet Kim Jong-un at 9 PM EDT (01:00 UTC, 9 AM Singapore) SoylentNews

President Trump meets Kim Jong Un

President Trump and North Korea's Kim Jong Un will meet in just a few hours. Here's what to watch for and when, according to the White House schedule.

  • 8 p.m. ET (June 11) / 8 a.m. Singapore (June 12): President Trump departs Shangri-La Hotel en route to Capella Singapore, where the two leaders will meet.
  • 8:20 p.m. ET (June 11) / 8:20 a.m. Singapore (June 12): Trump arrives at Capella Singapore.
  • 9 p.m. ET (June 11) / 9 a.m. Singapore (June 12): President Trump and Kim Jong Un greet each other. This is the big moment. Cameras will be there to capture their expected handshake.
  • 9:15 p.m. ET (June 11) / 9:15 a.m. Singapore (June 12): President Trump and Kim Jong Un participate in a one-on-one bilateral meeting.
  • 10 p.m. ET (June 11) / 10 a.m. Singapore (June 12): President Trump and Kim Jong Un participate in an expanded bilateral meeting.
  • 11:30 p.m. ET (June 11) / 11:30 a.m. Singapore (June 12): President Trump and Kim Jong Un have a working lunch.
  • 4 a.m. ET (June 12) / 4 p.m. Singapore: President Trump is expected to speak with reporters.
  • 6:30 a.m. ET / 6:30 p.m. Singapore: President Trump departs Capella Singapore for Paya Lebar Air Base Singapore.
  • 7 a.m. ET / 7 p.m. Singapore: Trump departs Paya Lebar Air Base, Singapore, en route to Andersen Air Force Base, Guam. From there, he will travel on to the United States.

Kim Jong Un tours Singapore, takes selfie ahead of summit

Trump Kim: US says N Korea negotiations making quick progress

For All His Deals, Trump Has Never Faced an Adversary Like Kim Jong-un

Kim-Trump summit rife with opportunity for US


Original Submission

Read more of this story at SoylentNews.

10:09

Facebook faces new data firestorm The Hill: Technology Policy

Facebook is under new scrutiny from lawmakers after revelations the social network had data-sharing agreements with device-makers, including a Chinese company that many officials believe is a national security threat.The latest controversy touched...

10:00

HPR2572: What's in my tool kit Hacker Public Radio

The bag is a Dell backpack laptop carrier has 5 pockets 2 small side pockets small front accessory pockets medium middle tool pockets large main pocket with interior zippered pocket the padded laptop section is well padded and roomy enough for 2 slim 15&quot; laptops Asus Z54C (W/ 120Gb SSD/ 4Gb Ram ) laptop running Sabayon linux Dell 5570 laptop for work-sometimes running Win 10 enterprise/pro chargers for both, Sony noise cancelling headphones Logitech wireless mouse maglite led flash light multi tip screwdriver 1 philips, 1 flat head 6 tip screwdriver 2x philips 2x flat head 2x nut drivers punchdown tool shammy cloth folder for paperwork/ current tasks one subject notebook asstd pens &amp; mechanical pencils wall wart phone charger micro USB cable Lightning USB cable 2 6&quot; velcro tie straps 15' ethernet patch cable, 10' ethernet patch cable 7' ethernet patch cable 5' ethernet patch cable 2x 3' ethernet patch cable 6&quot; ethernet patch cable laptop lock cable USB to ethernet adapter 6' HDMI cable Display port to DVI-D adapter digital voice recorder portable powerpack/charger (gimmie from Wired Mag) 2x 16GB usb thumb drives 1 blank 1 portable apps tools including libre office, and wireshark 6' power strip/ surge protector Reading glasses alcohol prep wipes latex gloves Band aids Excedrin bottle and migraine meds 1/2 dose for emergencies If I expand the definition of tool kit to include the tool box on my pickup truck, I also have... 10' telephone cord analogue telephone (princes style) for testing 3 spare usb keyboards 1 spare ps/2 keyboards 2 usb mice 2x 6' dvi-d cables adjustable wrench pliers needle nose pliers craftsman precision screwdriver set X-acto knife set socket set Ratchet straps 50' cotton bond rope 1/2&quot; diameter 50' nylon 1/2&quot; rope 7'x 8' medium weight tarp Fluke #117 multimeter Fluke Link runner AT 1000 and toner probe machete jumper cables analog linemans handset/ butt s

09:47

FCC chair says his family is still being threatened over net neutrality repeal The Hill: Technology Policy

Federal Communications Commission (FCC) Chairman Ajit Pai told The Wall Street Journal on Monday that he and his family are still being threatened in the months since the agency voted to roll back Obama-era net neutrality rules.Pai visited the...

09:36

Tips for an Information Security Analyst/Pentester career - Ep. 61 - Blue Hacking The S@vvy_Geek Tips Tech Blog

Back in February, I had the pleasure of participating in a PeerTalk panel discussion.
Over said discussion, Kimberly Dowsett launched a concept that I'd summarize as blue hacking.

In other words, hacking in support of blue teamers: creating tools helping defenders sift through the huge amount of data going through the servers they have to monitor.
I think this is absolutely paramount.
Every professional in my same role struggles with the same problem: filtering out noise and false positive from our data.

There's too much stuff to sift through and I'm always concerned something could go undetected because of this.

This concept sat in my mind for a while and I set it aside, but kept thinking about it.

Then yesterday I happened to see a great YouTube video about this very topic, demoing some excellent PowerShell tools that can be very helpful for these purposes.

Therefore I built a Windows domain with two computers, a Windows Server 2012 R2 domain controller and a Windows 10 client, and gave these tools a shot.

Results are pretty amazing.

Check on the availability of the most common Windows privilege escalation methods

...

09:32

09:23

Lasiks Risks Are Coming Into Sharper Focus Lifeboat News: The Blog

Some patients who undergo the eye surgery report a variety of side effects. They may persist for years, studies show.

09:23

Drug-free bandage heals diabetic wounds faster Lifeboat News: The Blog

Because diabetics often have both nerve damage and poor circulation, they will often not notice when they receive skin wounds, which proceed to heal very slowly. Those wounds can thus become chronic, sometimes even leading to amputations. A new regenerative bandage, however, could help keep this from happening.

Led by Prof. Guillermo Ameer, a team from Illinois Northwestern University started with a protein known as laminin. Found in the skin and most of the bodys other tissues, it communicates with cells, prompting them to differentiate, migrate and adhere to one another.

The scientists were able to identify a specific segment of the protein, which plays a key role in the wound-healing process. That segment is made up of just 12 amino acids (the building blocks of proteins), and its called A5G81. Because A5G81 is so much smaller and simpler than the entire laminin protein, its much cheaper and easier to synthesize in the lab.

09:22

Intel is now capable of producing full silicon wafers of quantum computing chips Lifeboat News: The Blog

Last year, Intel was able to take a few steps forward towards the commercialization of quantum computing. A 17-qubit superconducting chip was built followed by CEO Brian Krzanich showing off a test chip at CES 2018 with 49 qubits.

Unlike previous quantum efforts at Intel, this latest batch of wafers are focusing on spin qubits instead of superconducting qubits. This secondary technology is still a few years behind superconducting quantum efforts but could turn out to be more easily scalable.

Moving forward, Intel now has the capability to produce up to five silicon wafers every week containing up to 26-qubit quantum chips. This achievement means that Intel has greatly increased the number of quantum devices in existence and could be looking to increase the number of qubits steadily in the coming years.

09:22

Evidence for a new property of quantum matter revealed Lifeboat News: The Blog

A theorized but never-before detected property of quantum matter has now been spotted in the lab, a team of scientists reports.

09:00

A Guide To Audio Amps For Radio Builders Hackaday

For hams who build their own radios, mastering the black art of radio frequency electronics is a necessary first step to getting on the air. But if voice transmissions are a goal, some level of mastery of the audio frequency side of the equation is needed as well. If your signal is clipped and distorted, the ham on the other side will have trouble hearing you, and if your receive audio is poor, good luck digging a weak signal out of the weeds.

Hams often give short shrift to the audio in their homebrew transceivers, and [Vasily Ivanenko] wants to change that with this comprehensive guide to audio amplifiers for the ham. He knows whereof he speaks; one of his other hobbies is jazz guitar and amplifiers, and it really shows in the variety of amps he discusses and the theory behind them. He describes a number of amps that perform well and are easy to build. Most of them are based on discrete transistors many, many transistors but he does provide some op amp designs and even a design for the venerable LM386, which he generally decries as the easy way out unless its optimized. He also goes into a great deal of detail on building AF oscillators and good filters with low harmonics for testing amps. We especially like the tip about using the FFT function of an oscilloscope and a signal generator to estimate total harmonic distortion.

The whole article is really worth a read, and applying some of these tips will help everyone do a better job designing audio amps, not just the hams. And if building amps from discrete transistors has you baffled, start with the basics: [Jenny]s excellent Biasing That Transistor series.

[via Dangerous Prototypes]

08:39

Uber May Try to Buy Citi Bike Parent Company Motivate SoylentNews

Submitted via IRC for Fnord666

Uber and Lyft are reportedly battling it out to buy Citi Bike's parent company, Motivate

Lyft might have thought its plan to buy bike-sharing company Motivate was a done deal. Uber, it seems, has other plans. Reports last week suggested that Lyft had struck a deal for upwards of $250 million to buy Motivate. But Uber is considering muscling in with its own offer, Axios reports.

Motivate is behind Citi Bike in New York and Ford GoBike in San Francisco, along with bike-sharing programs in other cities including Boston, Chicago, and Washington, DC. Commuters used its bikes 3.18 million times last month.

As the battlegrounds get more intense for the companies' non-ridesharing offerings, Uber and Lyft are exploring electric scooters and, yes, bike sharing. Uber recently bought Jump, which has an exclusive permit to run a dockless bike share system in San Francisco, so Motivate would expand its portfolio of urban services.

Both Uber and Lyft have reportedly applied for licenses to run electric scooters in San Francisco; scooters were recently pulled from the city's streets pending a licensing process, in part because they've proven a nuisance for many. There are more ways than cars to get people around cities, and both companies seem to be focusing more on alternative transport methods. Bike sharing, at the very least, would be a stopgap until flying cabs come along.

Source: https://www.engadget.com/2018/06/08/uber-motivate-citi-bike-acquisition-lyft-bikesharing/


Original Submission

...

08:23

Senators strike deal to include ZTE penalties in must-pass defense bill The Hill: Technology Policy

Senators announced Monday that legislation keeping in place penalties against Chinese telecommunications giant ZTE will be included in a must-pass defense policy bill.By including this provision to undo the ZTE deal in the defense...

07:56

Hillicon Valley: Net neutrality ends | What repeal means and what's next | Treasury sanctions Russian firms for aiding cyberattacks | How trolling became diplomacy's new trend | Feds crack down on email scams | Defense bill cyber update The Hill: Technology Policy

The Cyber and Tech overnights have joined forces to give you Hillicon Valley, The Hill's new comprehensive newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team,...

07:48

07:26

Meet Summit, worlds fastest AI-powered supercomputer HackRead

By Waqas

Scientists at IBM along with researchers at Mellanox, Nvidia and RedHat have unveiled an Artificial

This is a post from HackRead.com Read the original post: Meet Summit, worlds fastest AI-powered supercomputer

07:16

What the net neutrality repeal means The Hill: Technology Policy

After a protracted and vicious fight, the Federal Communications Commissions (FCC) on Monday officially repealed net neutrality rules requiring internet providers to treat all web content equally. The Republican-led FCCs decision to scrap the Obama...

07:15

Tens of thousands of Android devices are leaving their debug port exposed Graham Cluley

Countless Android devices are leaving themselves open to attack after being shipped with a critical port left unsecured.

Read more in my article on the Hot for Security blog.

07:12

AT&T Imposes Another $5 Price Hike on Grandfathered Unlimited Data Plans SoylentNews

Submitted via IRC for Fnord666

AT&T is imposing another $5-per-month price increase on customers who have held onto a decade-old grandfathered unlimited data plan. The new price will be $45 a month.

The data plan's price was $30 monthly for seven years until AT&T raised it to $35 in February 2016. A second $5 bump brought the price to $40 a month in January 2017. The third $5 increase in three years will kick in next month.

"Customers who have a grandfathered $40 data plan will receive notifications of a $5 per month rate increase for the data plan," AT&T said in the price increase announcement. "The rate increase will take effect starting with the customers July, 2018 service."

The $45 monthly fee is for wireless data only. These customers pay additional fees for phone calling and texting, roughly doubling the overall price.

AT&T could force these customers to move to newer plans because their contracts ran out years ago. Instead, the carrier has been implementing yearly price hikes and encouraging users to change plans. AT&T urged the customers to "learn more about the benefits of our currently available unlimited rate plans," while noting that customers who switch to a different plan "will not be able to switch back to their current grandfathered unlimited data plan in the future."

[...] AT&T claimed that it is imposing the latest price increase simply to "make sure we continue to provide the best service for all of our customers," because the use of mobile data is hitting "record levels."

Read more of this story at SoylentNews.

07:11

Links 11/6/2018: Qt 5.9.6 and Weblate 3.0.1 Released Techrights

GNOME bluefish

Contents

GNU/Linux

  • Server

    • ORNL Launches Summit Supercomputer

      The U.S. Department of Energys Oak Ridge National Laboratory today unveiled Summit as the worlds most powerful and smartest scientific supercomputer.

      With a peak performance of 200,000 trillion calculations per secondor 200 petaflops, Summit will be eight times more powerful than ORNLs previous top-ranked system, Titan. For certain scientific applications, Summit will also be capable of more than three billion billion mixed precision calculations per second, or 3.3 exaops. Summit will provide unprecedented computing power for research in energy, advanced materials and artificial intelligence (AI), among other domains, enabling scientific discoveries that were previously impractical or impossible.

    • America Unveils the Worlds Fastest Supercomputer (And Yes: It Runs Linux)

      The United States has taken the shrink-wrap off Summit, its all-new $200 million supercomputer.

      And boy is it quick.

      Summit is now the fastest supercomputer in the America and the fastest supercomputer in the world, toppling Chinas Sunway TaihuLight system from the apex of petaflop achievement.

      But it gets even better.

    • Andrew Hutton of the OLS Needs Your Help, US Debuts Worlds Fastest Supercomputer, FCCs Repeal of Net Neutrality Goes into Effect Today and More

      The US now has the worlds fastest supercomputer, named Summit, reclaiming its speediest computer on earth title from China and its Sunway TaihuLight system, OMG Ubuntu reports. And of course, the Summit, which boasts 200 petaflops at peak performance, runs LinuxRHEL to be exact. See the U.S. Department of Energys Oak Ridge National Laboratorys post for more details.

    ...

06:49

06:42

This Innovative Technology Harvests Water from Cooling Towers Lifeboat News: The Blog

Water-scarce cities could get a new source of the precious resource through a simple and cost-effective technology.

06:31

How to open DNS port 53 using ufw on Ubuntu/Debian Linux nixCraft

How do I allow incoming DNS tcp/udp port 53 connections from a specific IP address or subnet on a Ubuntu or Debian Linux server using ufw? How can I open DNS port 53 using ufw firewall?

The post How to open DNS port 53 using ufw on Ubuntu/Debian Linux appeared first on nixCraft.

06:26

06:10

Coverage of Netconf 2018 LWN.net

Netconf, the Linux kernel networking development conference, has provided coverage of this year's event, which was held in Boston, MA, May 31-June 1.

Day 1 looks at the following sessions:

  • DPDK (Stephen Hemminger)
  • BPF, Cilium, and bpfilter (Daniel Borkmann)
  • Netflix and BPF; future work on BPF tracing (Brendan Gregg)
  • BPF offload; NIC switchdev mode; killing tc egdev (Jakub Kicinski)
  • Networking Traffic Control (Cong Wang)
  • TCP work (Eric Dumazet)
  • Layer 1 boring stuff (Florian Fainelli)

Day 2 covers:

  • Being Less Indirect (David S. Miller)
  • TC Flower Tunneling (Simon Horman)
  • Who Fears the Spectres? (Paolo Abeni)
  • TLS, Crypto, and ULP's (Dave Watson)
  • TC changes and "ethlink" (Jiri Pirko)
  • RX Batching, GRO, Megaflow merging, ARFS, BPF Verifier (Edward Cree)
  • SCTP offload and tunnel ICMP handling (Xin Long)
  • BPF and the Future of Kernel Extensibility (Alexei Starovoitov)

06:02

Wastewater treatment plants are key route into UK rivers for microplastics Lifeboat News: The Blog

Water samples from UK rivers contained significantly higher concentrations of microplastics downstream from wastewater treatment plants, according to one of the first studies to determine potential sources of microplastics pollution.

Scientists from the University of Leeds measured microplastics concentrations up and downstream of six wastewater treatment plants and found that all of the plants were linked to an increase in microplastics in the riverson average up to three times higher but in one instance by a factor of 69.

Lead author Dr. Paul Kay, from the School of Geography at Leeds, said: Microplastics are one of the least studied groups of contaminants in river systems. These tiny plastic fragments and flakes may prove to be one of the biggest challenges in repairing the widespread environmental harm plastics have caused. Finding key entry points of microplastics, such as wastewater treatment plants, can provide focus points to combating their distribution.

06:00

Tricking A Vintage Clock Chip Into Working On 50-Hz Power Hackaday

Thanks to microcontrollers, RTC modules, and a plethora of cheap and interesting display options, digital clock projects have become pretty easy. Choose to base a clock build around a chip sporting a date code from the late 70s, though, and your build is bound to be more than run-of-the-mill.

This is the boat that [Fran Blanche] finds herself in with one of her ongoing projects. The chip in question is a Mostek MK50250 digital alarm clock chip, and her first hurdle was find a way to run the clock on 50 Hertz with North American 60-Hertz power. The reason for this is a lesson in the compromises engineers sometimes have to make during the design process, and how that sometimes leads to false assumptions. It seems that the Mostek designers assumed that a 24-hour display would only ever be needed in locales where the line frequency is 50 Hz. [Fran], however, wants military time at 60 Hz, so she came up with a circuit to fool the chip. It uses a 4017 decade counter to divide the 60-Hz signal by 10, and uses the 6-Hz output to turn on a transistor that pulls the 60-Hz output low for one pulse. The result is one dropped pulse out of every six, which gives the Mostek the 50-Hz signal it needs. Sure, the pulse chain is asymmetric, but the chip wont care, and [Fran] gets the clock she wants. Pretty clever.

[Fran] has been teasing this clock build for a while, and were keen to see what it looks like. We hope shell be using these outsized not-quite-a-light-pipe LED displays or something similar.

05:47

Buffer Overflow in pppd EAP-TLS implementation Open Source Security

Posted by Luciano Bello on Jun 11

- Software: pppd, in particular the EAP-TLS patch[1]

- Summary: Several buffer overflows can be trigger even when pppd is not
configured to take EAP-TLS (but the binary was patched with the
extension).

- CVE: CVE-2018-11574

- Credit:
Ivan Gotovchits <ivg () ieee org>, from Carnegie Mellon University Binary
Analysis Team

- Background:
We, the Debian security team, received the report and contacted the
package maintainer and upstream....

05:43

Ask Soylent: Suggestions for a Minimalist Journaling System? SoylentNews

Imagine being isolated off-grid for an unknown number of years. Maybe you're stuck somewhere like Davidge or Mark Watney; or perhaps you've chosen a life of isolation like Yoda or Obi-Wan Kenobi. Maybe you're a survivor of the $Apocalypse. Wouldn't keeping a journal be a great idea? You could pass on your knowledge, keep track of daily activities, maybe even keep yourself from going insane!

Forget all the wastefulness, extravagance, and complexity of most modern devices, you've got survival to think about! Obviously power usage would be a major concern, but ergonomics, searchability, repairability, and data robustness would be important too. Keeping in mind that this is a dedicated device for journaling and barring the old Russian pencil and paper, what would the best solution look like with off-the-shelf modern technology?


Original Submission

Read more of this story at SoylentNews.

05:30

Analyst research: ROI of Pen Testing as a Service Help Net Security

Dr. Chenxi Wang, industry thought leader and analyst, examined the Return on Investment that organizations may realize by using Cobalts Pen Testing as a Service (PTaaS) platform. This study took a detailed look at the benefits and costs of deploying Cobalts services in comparison with using traditional penetration testing consultancies. For this study, Dr. Wang conducted in-depth interviews with current Cobalt customers. The organizations interviewed represent a wide swath of different industry segments, including SaaS, More

The post Analyst research: ROI of Pen Testing as a Service appeared first on Help Net Security.

05:17

Introduction to the NI MIMO Prototyping System Hardware IEEE Spectrum Recent Content full text

As more devices are connected wirelessly, the need for wireless technologies that can handle increased data and capacity demands has grown exponentially.

Overview

As more devices are connected wirelessly, the need for wireless technologies that can handle increased data and capacity demands has grown exponentially. The coming onslaught of Internet of Things (IoT) devices threatens to overwhelm existing wireless networks while the proliferation of video streaming and virtual reality technology requires faster data rates than are currently available. Multiple input, multiple output (MIMO) is one technology that has the potential to solve these problems by enabling the next generation of wireless. By using more than one antenna, multiple data signals can be sent in the same time and frequency domain to offer huge gains in capacity, throughput, reliability, or a combination of the three. As leading researchers and wireless companies rush to explore new communications technologies, MIMO will be a crucial topic. 


Some of the theory behind MU-MIMO and Massive MIMO has been laid out, but researchers need to innovate faster by building real-world prototypes. The NI MIMO Prototyping System is a testbed that enables researchers to prototype these 5G MIMO systems and achieve rapid results.

MIMO Prototyping System Hardware

The MIMO Prototyping System includes USRP RIO radio heads, FlexRIO FPGA co-processors, clock distribution modules, PCIe routing hardware, and a PXIe chassis and controller. The system can be configured in a variety of sizes to meet the requirements of a wide range of MIMO applications including single user MIMO (SU-MIMO), multiple user MIMO (MU-MIMO), and Massive MIMO.  The various system components and configurations will be discussed in detail in this paper. Application software is discussed in MIMO Application Framework white paper.    

USRP Software Defined Radio

The USRP RIO software defined radio (SDR) features an integrated 2x2 MIMO transceiver and a high-performance Xilinx Kintex-7 FPGA, all contained in a half-width 1U rack-mountable enclosure, to accelerate baseband proces...

05:16

Automotive Applications of Device-to-Device Communication in 5G Networks IEEE Spectrum Recent Content full text

Device-to-device (D2D) communication refers to the technology that allows user equipment (UE) devices to communicate with each other with or without the involvement of network infrastructures such as an access point or base stations.

Overview

Device-to-device (D2D) communication refers to the technology that allows user equipment (UE) devices to communicate with each other with or without the involvement of network infrastructures such as an access point or base stations. D2D is promising because it makes ultra-low latency communication possible. But who is using D2D and what are the real applications behind this technology? In this white paper, learn about D2D and how it enables fifth generation (5G) wireless network communication from short-range wireless to vehicle-to-vehicle communications

What Is D2D?

D2D enables the communication between devices such as cell phones or vehicles. This technique enables new device-centric communication that doesnt require direct communication with the network infrastructure. Thus, it is expected to solve part of the network capacity issue as 5G promises to connect more devices in faster, more reliable networks.

D2D Applications

Dedicated short-range communications (DSRC) technology is often tied to 802.11p, which is the Wi-Fi standard specific to the automotive industry that leads the next generation of connected cars. In a February 15 news release, Volkswagen announced that it will provide

WLANp as standard equipment on all its cars in Europe starting in 2019. This announcement could create ripple effects in the industry to promote accident-free driving and, ultimately, autonomous driving.

However, the challenge with 802.11p technology is that it works only with cars that can transceive its protocol. Though 802.11p technology communicates safety-related information for driving such as what the weather is like at the end of a tunnel, it works only with cars that can transceive its protocol. To support complete autonomous driving, communication via cellular networks is essential. This new area is called C-V2X, where X is everything such as another car (V2V), pedestrians (V2P), networks (V2N), and so on. In this white paper, C-V2X mainly refers to LTE-V2X.

C-V2X delivers the major benefit of using the existing LTE network infrastructure, according to the initial V2V standard completion announcement by 3GPP in September 2016. It promotes high data rates, high coverage, lower latency with 5G, and more. Based on these great expectations, virtually every automotive company is looking at C-V2X as the next it technology that will pave the path to completely autonomous driving.

Consider the following scenario.

...

04:42

The asteroid trillionaires Lifeboat News: The Blog

With private companies turning their attention to the riches of asteroids, the first trillionaire could be made in space. Andrew Glester explores the challenges of mining space rocks.

04:40

Verity Studios Raises $18M for Safe Swarming Drone Displays IEEE Spectrum Recent Content full text

Safe and reliable swarming drone tech could be making its way into consumer drones Photo: Cirque du Soleil/Richard Termine In 2016 Verity Studios worked with Cirque du Soleil to bring flying lampshade drones to its show Paramour.

Verity Studios, which took precision drone swarm technology from ETH Zurich and turned it into a spectacular live event display system, has announced a round of Series A funding totaling US $18 million from Fontinalis Partners, Airbus Ventures, Sony Innovation Fund, and Kitty Hawk. This is a lot of money for a company that most people may not know exists even if they view a Verity-powered  drone show firsthand, but thats part of what makes Verity special: Everything they do is reliable, seamless, and safe, leading to experiences that have a truly mesmerizing effect.

The reason we follow companies like Verity so closely, and the reason why were happy when they get funded, is because theyve managed to transition some fairly amazing robotics research into a successful business, which is a very difficult thing to do.

The kinds of things that make Verity special come from over a decade of work at the Flying Machine Arena at ETH Zurich, led by Professor Raffaello DAndrea, a lot of which weve covered in the past. For example, Veritys drones are fully redundant, able to recover from a failed battery, a failed motor, a failed connector, a failed propeller, a failed sensor, or a failure of any other component ... through the duplication of critical components and the use of proprietary algorithms, which enable safe emergency responses to component failures. Heres what this looks like, based on research that we covered in 2014.

Verity says it has made a significant amount of progress with its drone swarm control and safety systems, although much of that will probably be wrapped up in custom and proprietary technologiesthe kind of stuff that makes Verity worth that $18M Series A.

...

04:30

PCBs As Linear Motors Hackaday

PCBs are exceptionally cheap now, and that means everyone gets to experiment with the careful application of copper traces on a fiberglass substrate. For his Hackaday Prize entry, [Carl] is putting coils on a PCB. What can you do with that? Build a motor, obviously. This isnt any motor, though: its a linear motor. If youve ever wanted a maglev train on a PCB, this is the project for you.

This project is a slight extension of [Carl]s other PCB motor project, the aptly named PCB Motor. For this project, [Carl] whipped up a small, circular PCB with a few very small coils embedded inside. With the addition of a bearing, a few 3D printed parts, and a few magnets, [Carl] was able to create a brushless motor thats also a PCB. Is it powerful enough to use in a quadcopter? Probably not quite yet.

Like [Carl]s earlier PCB motor, this linear PCB motor follows the same basic idea. The track, if you will, is simply a rectangular PCB loaded up with twelve coils, each of them using 5 mil space and trace, adding up to 140 turns. This is bigger than the coils used for the (circular) PCB motor, but that only means it can handle a bit more power.

As for the moving part of this motor, [Carl] is using a 3D printed slider with an N52 neodymium magnet embedded inside. All in all, its a simple device, but thats not getting to the complexity of the drive circuit. Were looking forward to the updates that will make this motor move, turning this into a great entry for The Hackaday Prize.

The HackadayPrize2018 is Sponsored by:

04:15

Core i7 8700K vs. Ryzen 7 2700X For Vulkan Gaming With Thrones of Britannia Phoronix

Published this weekend was a 25-way Linux graphics card comparison for the newest major Linux game release, A Total War Saga: Thrones of Britannia, that was released natively for Linux days ago by Feral Interactive and ported from Direct3D to Vulkan in the process. As a result of premium requests, here are some additional tests for this Linux game when comparing the performance on Intel Core i7 8700K and Ryzen 7 2700X processors.

04:15

Bees Understand the Concept of Zero SoylentNews

https://www.sciencedaily.com/releases/2018/06/180607141031.htm

By demonstrating that even tiny brains can comprehend complex, abstract concepts, the surprise finding opens possibilities for new, simpler approaches to developing Artificial Intelligence. In research published in the journal Science, Australian and French researchers tested whether honey bees can rank numerical quantities and understand that zero belongs at the lower end of a sequence of numbers.

Associate Professor Adrian Dyer, from RMIT University in Melbourne, Australia, said the number zero was the backbone of modern maths and technological advancements.

"Zero is a difficult concept to understand and a mathematical skill that doesn't come easily -- it takes children a few years to learn," Dyer said. "We've long believed only humans had the intelligence to get the concept, but recent research has shown monkeys and birds have the brains for it as well. What we haven't known -- until now -- is whether insects can also understand zero."

As well as being a critical pollinator, the honeybee is an exceptional model species for investigating insect cognition, with previous research showing they can learn intricate skills from other bees and even understand abstract concepts like sameness and difference. But bee brains have fewer than 1 million neurons -- compared with the 86,000 million neurons of a human brain -- and little was known about how insect brains would cope with being tested on such an important numeric skill.

RMIT PhD researcher Scarlett Howard set out to test the honeybee on its understanding, marking individual honeybees for easy identification and luring them to a specially-designed testing apparatus. The bees were trained to choose an image with the lowest number of elements in order to receive a reward of sugar solution. For example, the bees learned to choose three elements when presented with three vs. four; or two elements when presented with two vs. three.

When Howard periodically tested the bees with an image that contained no elements versus an image that had one or more, the bees understood that the set of zero was the lower number -- despite never having been exposed to an "empty set."

Read more of this story at SoylentNews.

04:11

Wine 3.10 Features Updated Vulkan, D3D12 Swapchain Support Phoronix

Wine's bi-weekly release cycle for new development releases is slightly off target with it surfacing today rather than last Friday, but the changes are worthwhile...

04:07

Schumer blames congressional GOP for net neutrality repeal The Hill: Technology Policy

Senate Minority Leader Chuck Schumer (D-N.Y) is blaming congressional Republicans for the repeal of the Federal Communications Commissions (FCC) net neutrality rules, a shift which goes into effect Monday.In a statement, Schumer said that House...

03:48

Technical Analysis: Can it predict future asset value? Lifeboat News: The Blog

I love clearing the air with a single dismissive answer to a seemingly complex question. Short, dismissive retorts are definitive, but arrogant. It reminds readers that I am sometimes a smart a*ss.

Is technical analysis a reasoned approach for
investors to predict future value of an asset?

In a word, the answer is Hell No!. (Actually, thats two words. Feel free to drop the adjective). Although many technical analysts earnestly believe their craft, the approach has no value and does not hold up to a fundamental approach.

One word arrogance comes with an obligation to substantiateand, so, lets begin with examples of each approach.


Investment advisors often classify their approach to studying an equity, instrument or market as either a fundamental or technical analysis. For example

  • Fundamental research of a corporate stock entails the analysis of the founders backgrounds, competitors, market analysis, regulatory environment, product potential and risks, patents (age and legal challenges), track record, and long term trends affecting supply and demand.A fundamental analysis may study the current share price, but only to ascertain the price-to-earnings ratio compared to long term prospects. That is, has the market bid the stock up to a price that lacks a basis for long term returns?
    .
  • On the other hand, a technical approach tries to divine trends from recent performancetypically charting statistics and pointing to various graph traits such as resistance, double shoulders, and number of reversals. The approach is more concerned with assumptions and expectations of investor behavioror hypotheses and superstition related to numerologythan it is with customers, products, facts and market demand.

Do you see the difference? Fundamental analysis is rooted in SWOT: Study strengths, weaknesses, opportunities, and threats. Technical analysis dismisses all of that. If technical jargon and approach sound a bit like a Gypsy fortune teller, thats because it is exactly that! It is not rooted in revenue and market realities. Even if an analyst or advisor is earnest, the approach is complete hokum.

I have researched, invested, consulted and been an economic columnist for years. I have also made my mark in the blockchain space. But until now, I have hesitated to call out technical charts and advisors for what they are

...

03:40

I was going blind Lifeboat News: The Blog

Blind Man

I was going blind which is not a good thing when you need to see to run a growing nonprofit. Luckily, it is 2018 and technology is advancing at an exponential rate so I had some options. Following is my story which is relevant for many reasons including that we virtually all develop eye problems over time and the state of the art available is constantly changing.

MY STORY

I finally couldnt read text at normal resolution on my 60 monitor which is about 4 feet from my face (and normally at 1600x900 resolution to make the text bigger) so it was time to go to the optician again. The optician considerably upgraded my prescription to 17.25 diopters on my left eye and 12.25 diopters on my right eye but warned me that this might not improve my vision much due to the beginning of cataracts in my eyes. So unlike in the past where I bought my glasses from outside the country due to restrictions on being able to purchase thin lenses in the U.S. that were implemented during the Nixon administration, I ordered glasses locally so I could speed up the process.

I was unable to see well with the new glasses so it was time to visit an ophthalmologist that my optician recommended. The ophthalmologist had the following assessment:

Dry Eye Syndrome of Bilateral Lacrimal Glands
Combined Forms of Age-related Cataract, Bilateral
Lattice Degeneration of Retina, Bilateral
Other Vitreous Opacities, Right Eye
Hemorrhage in Optic Nerve Sheath, Right Eye
Myopia, Bilateral

There were parts of both eyes that should have retina but didnt because the eyes were so stretched. (This isnt affecting my vision.)

The lattice degeneration of the retina concerned my ophthalmologist so he then sent me to a retinologist where he expected the retinologist to operate on me before the ophthalmologist could operate. Luckily, the retinologist said he didnt need to operate on me so I went from needing 4 surgeries to needing 2 surgeries.

For those who dont know, cataract surgery replaces the broken biological lens of your eye with an artificial lens called an intraocular lens (IOL). This surgery usually uses a femtosecond laser.

Before my first surgery, the ophthalmologists assistants ran multiple tests on my eyes so they could determine what size lens would fit in them. This was tricky because my eyes are extra long (31 mm left and 30 mm right) and machines have a problem with eyes that long. A few days after my tests were done, the ophthalmologists office called me to say the doctor was unsatisfied...

03:39

ASUS wanted to integrate 10 GB RAM on its gaming smartphone TechWorm

ASUS apparently was looking to include 10GB of RAM on its flagship smartphone

Earlier this week, the Taiwanese manufacturer ASUS unveiled its first dedicated high-end gaming smartphone, the ROG (Republic of Gamers) smartphone, designed for gamers at the Computex 2018 in Taipei. With this smartphone, the company is looking to follow companies such as Razer and Xiaomi, both of whom have launched smartphones like Razer Phone and Black Shark respectively, especially for gamers.

Designed for mobile gaming, the ROG features a 6-inch full HD+ (1080 x 2160 pixels) and comes with an 18:9 aspect ratio. Its AMOLED display blends a 90Hz refresh rate and 1ms response time. The display on the ROG Phone is also certified for HDR and has the DCI-P3 color gamut. ASUS has added the worlds fastest 2.96GHz octa-core Qualcomm Snapdragon 845 SoC coupled with a Qualcomm Adreno 630 GPU to the device. Besides this, the ROG Phone comes with 8GB of RAM, and 512GB of onboard storage (with two other options of 128GB and 256GB of storage).

While the specifications do sound crazy, it has come to light that ASUS was apparently experimenting with a 10GB of RAM in an unnamed flagship smartphone about 10 months ago.

According to Twitter tipster Roland Quandt, ASUS had planned to include 10GB of RAM in an upcoming flagship, but it seems that the idea was dropped by the company due to size constraints in the phones body. RAM is usually placed on top of the processor but there was insufficient space to fit the necessary chips.

With ASUS already experimenting with the possibility of including 10GB of RAM in a smartphone, there are chances that the company may come up with such a device in the near future by finding a way through the obstacle.

We have already heard about smartphones having RAMs that are between 4GB 6GB, with one or two exceptions consisting 8GB of RAM. Do you think that we need smartphones with 10GB of RAM? Le...

03:38

Neovim 0.3 Text Editor Released With Various Improvements Phoronix

Neovim, the fork of Vim focused on offering better extensibility and usability, has issued their v0.3 release...

03:29

Bill Joy, Silicon Valley Visionary, on the Future of Batteries, Electric Airplanes, and the "Internet of Energy" IEEE Spectrum Recent Content full text

He says solid-state batteries will be cheaper than today's lithium-ion batteries and help move the grid to 100 percent renewables Photo: Ionic Materials

According to Silicon Valley visionary and Sun Microsystems co-founder Bill Joy, much about the future of energy and climate change hinges on a simple question: How soon can the worlds electric grid get its battery pack?

As a partner in the Menlo Park, Calif. venture capital company Kleiner Perkins Caufield and Byers from 2005 to 2014, Joy says he focused on what they called the big hard aggressive goals or BHAGs. And from climate to water desalination to electric grid stability, the real challenges of BHAGs often circled back to cheap, safe, scalable, and reliable grid-scale energy storage.

Last month, Joy was in Woburn, Mass. for the ribbon cutting of new facilities for a solid state battery company hes an advisor to and investor in, Ionic Materials. Ionic Materials has developed a plastic electrolytethe medium in a battery through which energy-storing ions flow between cathode and anode and back again. This specially designed plastic conducts ions like a metal conducts electrons. And switching from todays flammable liquid electrolytes to flame-retardant solid electrolytes, the company says, could bring about a new generation of lighter, more powerful, non-flammable rechargeable devices.

Joy sat down with IEEE Spectrum for a conversation about the promise of solid-state lithium (and rechargeable alkaline) batteries, the Internet of energy, and the coming electrification of airplanes.

IEEE Spectrum: As you have said, the English language doesnt have a single word for the kind of battery breakthrough thats neededa solid conductor of ions, a solid electrolyte.

Joy: Theres this evolution of language. Like we had telephone, and then we had the touch-tone phone. And then the phones that werent touch-tone suddenly were rotary phones. And then you called on cellphones. But now when you say phone you mean a mobile phone, and if you want to talk about the other phone you need to say landline.

Now heres this thing weve never...

03:26

Distribution Release: NethServer 7.5 DistroWatch.com: News

Alessio Fattorini has announced the release of NethServer 7.5. The NethServer distribution is based on CentOS and provides a friendly, web-based administration panel. The project's latest release includes the Fail2Ban security software, the ability to set up wi-fi hotspots and more flexible control over software updates. "We have....

03:17

F2FS File-System Gets Discard Improvements, Nobarrier Fsync Mode For Linux 4.18 Phoronix

Flash-Friendly File-System (F2FS) maintainer Jaegeuk Kim has submitted the file-system updates intended for the Linux 4.18 kernel...

03:00

Ask Hackaday: What Color Are Your PCBs? Hackaday

A decade ago, buying a custom-printed circuit board meant paying a fortune and possibly even using a board houses proprietary software to design the PCB. Now, we all have powerful, independent tools to design circuit boards, and there are a hundred factories in China that will take your Gerbers and send you ten copies of your board for pennies per square inch. We are living in a golden age of printed circuit boards, and they come in a rainbow of colors. This raises the question: which color soldermask is most popular, which is most desirable, and why? Seeed Studio, a Chinese PCB house, recently ran a poll on the most popular colors of soldermask. This was compared to their actual sales data. Which PCB color is the most popular? It depends on who you ask, and how you ask it.

But first, lets examine the rainbow of PCB options. Seeeds Fusion PCB service offers six different colors of soldermask for every PCB order: white, black, red, blue, green, or yellow. These are the colors youll find at most board houses, and remain constant with few exceptions; OSH Park only offers purple, but you can get purple from a few other manufacturers. There are rumors of orange soldermask. Matte black and matte green are generally the seventh and eighth colors available from any PCB manufacturer. Weve seen pink PCBs in the wild, as well.

...

02:52

Twitter CEO responds to backlash after eating at Chick-fil-A during Pride Month The Hill: Technology Policy

Twitter CEO Jack Dorsey responded to backlash online after he ate at a Chick-fil-A over the weekend, saying he "completely forgot about" the fast-food chain CEO's perspective on gay marriage.The outcry began after Dorsey, 41, shared...

02:49

02:47

Lunar Warming - Yup - Did That, Then "Hid" the Data. SoylentNews

Science Alert has a story about a long running Lunar temperature measurement that apparently was lost and forgotten for decades.

Between 1971 and 1977, Apollo scientists conducting experiments on the Moon discovered that the surface of our li'l satellite buddy got mysteriously warmer. But the data from 1974 onwards went missing, and the strange warming phenomenon remained an enigma. The experiment was called the heat flow experiment, and it was designed to determine the rate at which the interior of the Moon loses heat.

Astronauts with Apollo 15 and 17 drilled holes into the lunar surface, up to depths of 2.3 metres, and probes measured the temperature at several depths in the holes.

These were long-term experiments, left in place after the astronauts departed, and transmitting data back to Earth.

The measurements revealed that the temperature of the moon at all measured depths got warmer from the date the experiment started in 1971 all the way till measurements ended in 1977.
That's a relatively short period of time on a planetary time frame. A rate of warming that rapid would have the moon surface incandescent well before we were began squabbling over who got to live in the best caves.

Various theories were put forth, but in the end people pretty much agreed it must be our fault.

Read more of this story at SoylentNews.

02:36

[$] Year-2038 work in 4.18 LWN.net

We now have less than 20 years to wait until the time_t value used on 32-bit systems will overflow and create time-related mayhem across the planet. The grand plan for solving this problem was posted over three years ago now; progress since then has seemed slow. But quite a bit of work has happened deep inside the kernel and, in 4.18, some of the first work that will be visible to user space has been merged. The year-2038 problem is not yet solved, but things are moving in that direction.

02:30

Turn Your Raspberry Pi into a Tor Relay Node

Title: 
Turn Your Raspberry Pi into a Tor Relay Node

02:09

Trolling becomes new trend in international diplomacy The Hill: Technology Policy

When Irans supreme leader tweeted criticism of Israel on Sunday, Israels Embassy in the United States fired back with an image from the movie Mean Girls to poke fun at Ayatollah Ali Khamenei. While dismissed as internet trolling, experts...

01:57

Worldwide server revenue grew 33.4% in Q1 2018 Help Net Security

The growth at the end of 2017 continued for the worldwide server market in the first quarter of 2018 as worldwide server revenue increased 33.4 percent and shipments grew 17.3 percent year over year, according to Gartner. Worldwide: Server Vendor Revenue Estimates, 1Q18 The server market was driven by increases in spending by hyperscale as well as enterprise and midsize data centers. Enterprises and midsize businesses are in the process of investing in their on-premises More

The post Worldwide server revenue grew 33.4% in Q1 2018 appeared first on Help Net Security.

01:30

Bike-Driven Scarf Knitter is an Accessory to Warmth Hackaday

Despite all our technological achievements, humans still spend a lot of time waiting around for trains. Add a stiff winter breeze to the injury of commuting, and youve got a classic recipe for misery. [George Barratt-Jones] decided to inject some warmth into this scene by inviting people to knit a free scarf for themselves by riding a bike.

All a person has to do is ride the Cyclo-Knitter for five minutes and marvel at their handiwork. By the time the scarf is finished, theyve cycled past being cold, and they have something to hold in the warmth. Cyclo-Knitter is essentially an Addi Express knitting machine being belt-driven by a stationary bike. Power is transferred from the bike through large, handmade wooden gears using old bike tire inner tubes as belts. [George] built a wooden tower to hold the machine and give the growing scarf a protected space to dangle.

We love the utility of this project as much as the joy it inspires in everyone who tries it. Check out their scarves and their reactions after the break. We havent seen people this happy to see something they werent expecting since that billboard that kills Zika mosquitoes.

Via [r/woodworking]

01:22

How traffic signals favour cars and discourage walking Lifeboat News: The Blog

We need more walkable cities and fewer cars! If aliens came to our planet they would conclude that cars are the dominant species!


Traffic signals give priority to motor vehicles over pedestrians. This inequality undermines many of the stated goals of transport, health and environment policy.

State and city governments say they want to encourage walking and biking for many reasons:

01:22

Researchers Reverse Cognitive Impairments in Mice with Alzheimers Lifeboat News: The Blog

FDA-approved asthma drug appears to be effective against dementia in mice.


For the first time in an animal model, researchers at the Lewis Katz School of Medicine at Temple University showed that the tau pathology that accompanies Alzheimers disease can be reversed using the asthma drug zileuton [1].

Abstract

01:19

Pocket Projector Uses Raspberry Pi SoylentNews

[janrinok:] We covered a story a few months ago regarding a watch that also contained a projector which could be used to show an enlarged image on any nearby surface, including the hand that is wearing the watch. Well somebody decided to look a little more closely at making his own small projector - although not quite to the same degree of miniaturisation.

Who doesnt want a pocket projector? Nothing will impress a date more than being able to whip out a PowerPoint presentation of your latest trip to the comic book convention. The key to [MickMake] build is the $100 DLP2000EVM evaluation module from Texas Instruments. This is an inexpensive light engine, and perfect for rolling your own projector. You can see the result in the video below.

If you dont need compactness, you could drive the module with any Rasberry Pi or even a regular computer. But to get that pocket form factor, a Pi Zero W fits the bill. A custom PCB from [MickMake] lets the board fit in with the DLP module in a very small form factor. DLP chips use lots of microscopic mirrors that you can move roughly 20 degrees under computer control. So you can reflect light into the lens or bounce it away so it makes the image black. For color, an RGB LED cycles through the primary colors and you have to time your mirror movements to the color you want to project. Of course, the module takes care of all this for you behind the scenes.

The module can output up to 30 lumens (by default, though, it is 20 lumens) and has I2C and 8/16/24-bit parallel RGB video interfaces. If you dont want to go with a custom board, the device supports the BeagleBone Black right out of the box. The DLP resolution is nHD. That is the mirror array is 640360. While you might think the n stands for not, it actually stands for ninth, as in one-ninth. The current release of the adapter board lacks an audio amplifier, although that may change in a future release. For now, you can play audio from the Pi via Bluetooth.


Original Submission

Read more of this story at SoylentNews.

01:02

A new system optimises electric transmission from offshore wind farms Lifeboat News: The Blog

Scientists from Universidad Carlos III de Madrid (UC3M) have designed a new control system for wind turbines in offshore wind farms that allows power transmission to the coast in a more flexible and cheaper way than current solutions.

This innovation allows the use of a diode rectifier station in the offshore platform of a high voltage direct current (HVDC) link. In this way, the turbines alternating current (AC) can be easily converted into direct current (DC) for HVDC transmission.

The researchers have developed a distributed control system to synchronise and regulate the electrical voltage and frequency of the of the . This allows the transmission of energy to the general network through an HVDC link with a diode rectifier station. It is less complicated, cheaper and more flexible than other current solutions, explains co-author Santiago Arnaltes Gmez, head of the UC3M Power Control Group.

01:02

In desert trials, next-generation water harvester delivers fresh water from air Lifeboat News: The Blog

Last October, a University of California, Berkeley, team headed down to the Arizona desert, plopped their newest prototype water harvester into the backyard of a tract home and started sucking water out of the air without any power other than sunlight.

The successful field test of their larger, next-generation harvester proved what the team had predicted earlier in 2017: that the harvester can extract drinkable water every day/night cycle at very low humidity and at low cost, making it ideal for people living in arid, water-starved areas of the world.

There is nothing like this, said Omar Yaghi, who invented the technology underlying the harvester. It operates at ambient temperature with ambient sunlight, and with no additional energy input you can collect water in the desert. This laboratory-to-desert journey allowed us to really turn water harvesting from an interesting phenomenon into a science.

01:02

Security updates for Monday LWN.net

Security updates have been issued by Arch Linux (chromium, firefox, flashplugin, krb5, and p7zip), Debian (firefox-esr, gnupg, gnupg1, gnupg2, libvncserver, and openjdk-7), Fedora (batik, qt3, remctl, and slurm), openSUSE (curl, glibc, ImageMagick, kernel-firmware, libvirt, libvorbis, MozillaFirefox, mozilla-nss, mupdf, prosody, qemu, slf4j, and xen), Red Hat (chromium-browser, flash-plugin, and Red Hat Virtualization), Slackware (gnupg2), and SUSE (libvirt, mailman, and xen).

01:01

Soccer League Turns App Users Into Piracy Spies TorrentFreak

Even though sports streaming services are widely available in most countries, people are not always willing to pay for them.

This applies to individuals, who turn to pirate sites or other unauthorized channels, but also to businesses such as bars and restaurants.

The latter group is seen as a thorn in the side by many rightsholders. This includes the Spanish soccer league La Liga, which broadcasts some of the most viewed matches in the world.

In an effort to curb this type of piracy, La Liga has recently started to use modern technology, and its users, to its advantage. In an unprecedented move, the soccer league has turned its official Android app into a piracy spying machine.

The app in question, which has been installed by millions of users, will use the microphone and GPS readings of the devices its installed on to report possible instances of streaming piracy.

With consent from the user, the app will analyze the audio in its surroundings to check if one of La Ligas matches is being played. It then pairs that with GPS data to see if that location is an authorized broadcaster.

Protect your team, users read when they are prompted to enable this type of data collection.

Protect your team (photo: Jorge Morell Ramos)

The unusual functionality is detailed in the privacy policy which mentions tackling piracy as one of the main purposes.

The purposes for which this functionality will be used are: (i) to develop statistical patterns on soccer consumption and (ii) to detect fraudulent operations of the retransmissions of LaLiga football matches (piracy).

The microphone will only be activated when La Liga is broadcasting its football matches, the policy further clarifies.

The spying tool was spotted by Eldiario.es, which reached out to La Liga for additional information.

The Spanish soccer league informed the publication that nobody accesses the audio fragments captured by the microphone as the audio automatically becomes a signal, a binary code. This happens only in Spain and without storing any recording or content.

The organization states that it has to resort to these kinds of measures since piracy is resulting in losses of up to 150 mil...

00:45

FCC chair promises consumers will be protected after net neutrality repeal The Hill: Technology Policy

Ajit Pai, the Republican chairman of the Federal Communications Commission (FCC), is promising that consumers will be protected as his repeal of the 2015 net neutrality rules goes into effect Monday.In an op-ed for CNET on Monday, Pai wrote that the...

00:42

Bad .Men at .Work. Please Dont .Click Krebs on Security

Web site names ending in new top-level domains (TLDs) like .men, .work and .click are some of the riskiest and spammy-est on the Internet, according to experts who track such concentrations of badness online. Not that there still arent a whole mess of nasty .com, .net and .biz domains out there, but relative to their size (i.e. overall number of domains) these newer TLDs are far dicier to visit than most online destinations.

There are many sources for measuring domain reputation online, but one of the newest is The 10 Most Abused Top Level Domains list, run by Spamhaus.org. Currently at the #1 spot on the list (the worst) is .men: Spamhaus says of the 65,570 domains it has seen registered in the .men TLD, more than half (55 percent) were bad.

According to Spamhaus, a TLD may be bad because it is tied to spam or malware dissemination (or both). More specifically, the badness of a given TLD may be assigned in two ways:

The ratio of bad to good domains may be higher than average, indicating that the registry could do a better job of enforcing policies and shunning abusers. Or, some TLDs with a high fraction of bad domains may be quite small, and their total number of bad domains could be relatively limited with respect to other, bigger TLDs. Their total badness to the Internet is limited by their small total size.

More than 1,500 TLDs exist today, but hundreds of them were introduced in just the past few years. The nonprofit organization that runs the domain name space the Internet Corporation for Assigned Names and Numbers (ICANN) enabled the new TLDs in response to requests from advertisers and domain speculators even though security experts warned that an onslaught of new, far cheaper TLDs would be a boon mainly to spammers and scammers.

And what a boon it has been. The newer TLDs are popular among spammers and scammers alike because domains in many of these TLDs can be had for pennies apiece. But not all of the TLDs on Spamhaus list are prized for being cheaper than generic TLDs (like .com, .net, etc.). The cheapest domains at half of Spamhaus top ten baddest TLDs go for prices between $6 and $14.50 per domain.

Still, domains in the remaining five Top Bad TLDs can be had for between 48 cents and a dollar each.

Security firm Symantec in March 2018 published i...

00:42

A New Paradigm For Cyber Threat Hunting The Hacker News

Its no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are very high that threats have already penetrated their defenses and are lurking in their network. Pinpointing such threats quickly is essential, but traditional approaches to finding these needles in the haystack often fall short. Now there is a unique

00:32

00:09

U.S. Builds World's Fastest Supercomputer Summit The Hacker News

China no longer owns the fastest supercomputer in the world; It is the United States now. Though China still has more supercomputers on the Top 500 list, the USA takes the crown of "world's fastest supercomputer" from China after IBM and the U.S. Department of Energy's Oak Ridge National Laboratory (ORNL) unveiled "Summit." Summit is claimed to be more than twice as powerful as the current

00:02

The robot will see you now: how AI could revolutionise NHS Lifeboat News: The Blog

NHS hospital bosses are debating a reform involving widespread adoption of artificial intelligence and full automation.


From diagnosis to recovery, machines could take on a range of jobs, a new report suggests.

Health policy editor.

00:01

Hacking When It Counts: The Magnetron Goes to War Hackaday

In 1940, England was in a dangerous predicament. The Nazi war machine had been sweeping across Europe for almost two years, claiming countries in a crescent from Norway to France and cutting off the island from the Continent. The Battle of Britain was raging in the skies above the English Channel and southern coast of the country, while the Blitz ravaged London with a nightly rain of bombs and terror. The entire country was mobilized, prepared for Hitlers inevitable invasion force to sweep across the Channel and claim another victim.

Weve seen before that no idea that could possibly help turn the tide was considered too risky or too wild to take a chance on. Indeed, many of the ideas that sprang from the fertile and desperate minds of British inventors went on to influence the course of the war in ways they could never have been predicted. But there was one invention that not only influenced the war but has a solid claim on being its key invention, one without which the outcome of the war almost certainly would have been far worse, and one that would become a critical technology of the post-war era that would lead directly to innovations in communications, material science, and beyond. And the risks taken to develop this idea, the cavity magnetron, and field usable systems based on it are breathtaking in their scope and audacity. Heres how the magnetron went to war.

Short But Powerful

For most of the early days of radio, most of the innovation was geared toward providing communication at a distance. Whether it be radiotelegraphy, radiotelephony, or even radio broadcasting, distance was the driver. The further a single transmitter could reach, the fewer links would be required to make a communicate between any two points, and the larger the audience that could be reached with a broadcast. Due to the physics of radio frequency propagation, this put all the action in the longer wavelengths, the space on the spectrum with wavelengths between about 10 meters and 100 meters or so.

Some researchers were looking further up the spectrum, where wavelengths better measured in centimeters are found. These frequencies wouldnt be of much use for long-haul communications or broadcasting, but they needed to be explored and exploited, and so the tools and technologies needed to produce them would have to be developed.

...

00:00

A Look At How The AMD EPYC Linux Performance Has Evolved Over The Past Year Phoronix

This month marks one year since AMD returned to delivering high-performance server CPUs with the debut of their EPYC 7000 series processor line-up. It's been a triumphant period for AMD with the successes over the past year of their EPYC family. Over the past year, the Linux support has continued to improve with several EPYC/Zen CPU optimizations, ongoing Zen compiler tuning, CPU temperature monitoring support within the k10temp driver, and general improvements to the Linux kernel that have also helped out EPYC. In this article is a comparison of a "2017" Linux software stack as was common last year to the performance now possible if using the bleeding-edge software components. These Linux benchmarks were done with the EPYC 7351P, 7401P, and 7601 processors.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 11 June

23:45

Automation Wont Take Your Job Until The Next Recession Threatens It SoylentNews

Good news! Automation capable of erasing white collar jobs is coming, but not for a decade or more. And thats also the bad news because interest in automation accelerates during economic downturns, so once tech that can take your job arrives youll already have lived through another period of economic turmoil that may already have cost you your job.

That lovely scenario was advanced yesterday by professor Mirko Draca of The London School of Economics, who yesterday told Huaweis 2018 Asia-Pacific Innovation Day 2018 that the world is currently in an era of investment and experimentation with technology. The effects of such eras, he said, generally emerge ten to fifteen years in the future.

Innovation in the 1980s therefore sparked the PC and internet booms of the mid-to-late 1990s, and were still surfing [SIC - suffering?] the changes they unleashed. Our current era of mobile tech doesnt measure up to the radical 1990s, he said, as shown by the fact that productivity gains appear to have stalled for a decade or more.

[...] We predict that AI and robotics will lead to some sort of productivity surge in ten to fifteen years, he said, adding that there is no clear evidence that a new wave of technologies that threaten jobs has started.

But he also said that it will once businesses see the need to control costs.


Original Submission

Read more of this story at SoylentNews.

23:42

NASA confirms its $1 billion Jupiter mission will cheat death for at least 3 more years Lifeboat News: The Blog

Hooray for Juno!


Though NASAs Juno spacecraft has probed Jupiters secrets for nearly two years, the $1 billion mission was set to crash into the planets clouds in July. Now, however, the agency has confirmed Business Insiders previous report that Juno will get three additional years of flight.

23:40

[SRP-2018-01] Reverse engineering tools for ST DVB chipsets (public release) Bugtraq

Posted by Security Explorations on Jun 11

Hello All,

We have decided to release to the public domain our SRP-2018-01 security
research project related to the security of STMicroelectronics chipsets.

The research material (70+ pages long technical paper accompanied by two
reverse engineering tools) can be downloaded from the SRP section of our
portal (Past SRP materials):

http://www.security-explorations.com/en/srp.html

The release of SRP-2018-01 is a direct consequence of the...

23:35

Experts warn hackers have already stolen over $20 Million from Ethereum clients exposing interface on port 8545 Security Affairs

Cybercriminal group has managed to steal a total of 38,642 Ether, worth more than $20,500,000, from clients exposing the unsecured interface on port 8545.

Cybercriminals have raked over 20 million dollars in the past few months by hijacking poorly configured Ethereum nodes exposed online are continuing their operations.

In March, security experts from Qihoo 360 Netlab reported a hacking campaign aimed at Ethereum nodes exposed online, crooks were scanning for port 8545 to find wallets that exposed their JSON-RPC.

According to the researchers, the cybercrime gang stole 3.96234 Ether (between $2,000  and $3,000)., but currently, they have tracked another criminal gang that already stolen an amazing amount of funds that are available in their wallets.

Researchers claim the cybercriminal group has managed to steal a total of 38,642 Ether, worth more than $20,500,000.

If you have honeypot running on port 8545, you should be able to see the requests in the payload, which has the wallet addresses, states Qihoo 360 Netlab team. And there are quite a few IPs scanning heavily on this port now.

Geth is a popular client for running Ethereum node allowing users to manage them remotely through the JSON-RPC interface.

Developers can use this programmatic API to build applications that can retrieve private keys, transfer funds, or retrieve personal details of the owner of the wallet.

The hackers moved stolen funds to the Ethereum account having the address 0x957cD4Ff9b3894FC78b5134A8DC72b032fFbC464.

23:22

The Rejuvenation Roadmap Lifeboat News: The Blog

One of the most commonly asked questions we receive is How is progress going in aging research? It is something we are asked so often that we decided to provide the community with a resource that will help them to keep track of progress directly.

To that end, today we have launched our new curated database, The Rejuvenation Roadmap, which will be tracking the progress of the many therapies and projects in the rejuvenation biotechnology field. This database aims to give a quick visual summary of the status of each drug or therapy along with some additional information for people interested in learning more about them.

We believe that an informed community is an effective one, and this was one of our motivations for developing this new database. There are many resources for scientists, such as the superb databases of the Human Ageing Genomic Resources maintained by Dr. Joo Pedro de Magalhes, which are excellent for researchers. However, we noticed that there was no database that tracked the efforts of the many researchers and projects in the field, and while some people do maintain lists, they are often not public facing, easy to access, or user-friendly.

23:06

Crack Open ACRN A Device Hypervisor Designed for IoT

As the Internet of Things has grown in scale, IoT developers are increasingly expected to support a range of hardware resources, operating systems, and software tools/applications. This is a challenge given many connected devices are size-constrained. Virtualization can help meet these broad needs, but existing options dont offer the right mix of size, flexibility, and functionality for IoT development.

23:00

Moscow is Building New Civic Services on 5G IEEE Spectrum Recent Content full text

The Russian capital wants to use 5G to file traffic reports, remotely park cars, and stream soccer matches Photo: Dmitry Serebryakov/TASS/Getty Images

5G report logo, link to report landing page

When the national football teams of Morocco and Iran take the field at Krestovsky Stadium in Saint Petersburg during the 2018 FIFA World Cup on 15 June, more than 60,000 fans will be there to cheer them on. And, courtesy of more than a dozen specially installed high-definition cameras, residents of Moscow, about 600 kilometers away, will watch the game over a high-speed 5G connection.

The capital of Russia will have what Evgeniy Novikov, an advisor for the Deputy Minister of Communications of Moscow, calls a 5G zone, an area where viewers can don VR glasses and switch between camera views to watch the game in real time.

Like previous bombastic 5G demonstrations, including Verizons livestream of the Super Bowl in Minneapolis last February, and multiple virtual reality demonstrations by South Korean telecom companies during the Winter Olympics in Pyeongchang, Moscows stunt will showcase the unparalleled video streaming capabilities of the next wireless generation.

But for Moscow, the World Cup demonstrations are just the first in a series of ambitious 5G tests and rollouts. The citys government is confident in the capabilities offered by 5G, though carriers, standards groups, and federal agencies are still sorting out how exactly the technology will work.

Its not yet entirely clear which frequencies 5G will operate at within the country. We dont have any legal frequency for 5G, says Novikov. The government is currently researching which frequencies it should make available. Two likely candidates are 3.5 and 28 gigahertz, since companies are currently leasing those bands for temporary demonstrations. For example,...

22:55

Bitcoin price takes a dive after another cryptocurrency exchange hack Graham Cluley

Theres bad news if youre a cryptocurrency investor. Billions of dollars worth of wealth were wiped out this weekend after a South Korean cryptocurrency exchange was hacked.

22:34

[SECURITY] [DSA 4225-1] openjdk-7 security update Bugtraq

Posted by Moritz Muehlenhoff on Jun 11

-------------------------------------------------------------------------
Debian Security Advisory DSA-4225-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
June 10, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : openjdk-7
CVE ID : CVE-2018-2790 CVE-2018-2794...

22:31

Former GCHQ chief Hannigan warns of Russias aggressive approach to the cyberspace Security Affairs

According to former GCHQ chief, the recently discovered VPNFilter botnet is the demonstration that Russia appears to be live-testing cyberattacks.

Former GCHQ chief Robert Hannigan has warned that the availability of hacking tools in the main marketplaces is rapidly changing the threat landscape. Hannigan served as the director of the UK intelligence agency between November 2014 until January 2017.

Threat actors have an easy access to attack tools even without having specific knowledge.

Hannigan spoke had a keynote speech titled Weaponising the web: Nation-state hacking and what it means for enterprise cybersecurity at the Infosec conference in London last week.

Hannigan highlighted the risks associated with the operation conducted by nation-state actors that had dramatically increased over the last five years.

State-sponsored hackers pose a serious risk for enterprises as well as governments, the former GCHQ chief warned of Government APT group using crime gangs as a proxy machine hard the attribution.

Nation state attacks using criminal group as a proxy is a fairly new issue. Hacking tools are becoming a commodity for threat actors and represent problem companies.

Hannigan mentioned the activity conducted by North Korea-linked APT and Iranian state-sponsored hackers.

North Korean APT groups, like the infamous Lazarus APT crew, focused its activity on SWIFT network as well as crypto exchanges to steal funds.

This is a rational state pursuing rational objectives, explained Hannigan.

Hannigan warned of the intensification of the Iranian hackers that also targeted financial institutions.

Which is the greatest threat?

Russia, of course! Russia-linked APT groups are very sophistication and continuously target infrastructure worldwide. in some cases they demonstrated destructive abilities, like the attacks against the Ukrainian power grid.

...

22:30

[SECURITY] [DSA 4221-1] libvncserver security update Bugtraq

Posted by Moritz Muehlenhoff on Jun 11

-------------------------------------------------------------------------
Debian Security Advisory DSA-4221-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
June 08, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : libvncserver
CVE ID : CVE-2018-7225

Alexander...

22:28

[slackware-security] gnupg2 (SSA:2018-159-01) Bugtraq

Posted by Slackware Security Team on Jun 11

[slackware-security] gnupg2 (SSA:2018-159-01)

New gnupg2 packages are available for Slackware 13.37, 14.0, 14.1, 14.2, and
-current to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/gnupg2-2.0.31-i586-1_slack14.2.txz: Upgraded.
Sanitize the diagnostic output of the original file name in verbose mode.
By using a made up file name in the message it was possible to...

22:27

[SECURITY] [DSA 4223-1] gnupg1 security update Bugtraq

Posted by Salvatore Bonaccorso on Jun 11

-------------------------------------------------------------------------
Debian Security Advisory DSA-4223-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
June 08, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : gnupg1
CVE ID : CVE-2018-12020
Debian Bug :...

22:27

Qt 5.9.6 + Qt Creator 4.6.2 Released Phoronix

For those making use of the Qt 5.9 long-term support series, Qt 5.9.6 was outed today by The Qt Company...

22:21

Facebook/Instagram vs. Twitch and YouTube SoylentNews

Facebook.gg: New video game streaming service to rival Twitch

Facebook has launched its own video game streaming hub. Facebook.gg, which launched on Thursday, will compete directly with popular platforms like Twitch and Mixer.

It's part of the social media site's continued efforts to become a destination for video content. The new service suggests streams based on who individual users follow, and highlights content chosen by Facebook.

Instagram is targeting one of YouTube's weaknesses with plans for long-form video

Instagram is gunning for YouTube with a plan to allow longer-form video, according to the owner of an influencer network whose clients have talked with the Facebook-owned company, as well as numerous media reports.

Allowing long video could help Instagram court social media stars and their millions of fans to use its platform as their primary online home, instead of relying on YouTube, where many have fewer followers. And when the users move, so will the marketers, meaning Facebook stands to gain advertising revenue at Google-owned YouTube's expense.

[...] The news of the Facebook-owned platform embracing longer videos was first reported by The Wall Street Journal, which said Instagram would soon allow users to upload videos up to 60 minutes to their profiles. TechCrunch added on Thursday that Instagram was talking to social media influencers and publishers to create shows for an upcoming section for dedicated-to-video content, similar to Snapchat Discover.


Original Submission

Read more of this story at SoylentNews.

22:20

[SECURITY] [DSA 4220-1] firefox-esr security update Bugtraq

Posted by Moritz Muehlenhoff on Jun 11

-------------------------------------------------------------------------
Debian Security Advisory DSA-4220-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
June 08, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2018-6126

Ivan Fratric...

22:17

[SECURITY] [DSA 4224-1] gnupg security update Bugtraq

Posted by Salvatore Bonaccorso on Jun 11

-------------------------------------------------------------------------
Debian Security Advisory DSA-4224-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
June 08, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : gnupg
CVE ID : CVE-2018-12020

Marcus Brinkmann...

22:17

Bugtraq

Posted by ch . sangsakul on Jun 11
# Date: 08-06-2018
# Software Link: https://symfony.com/
# Exploit Author: HaMM0nz (Chakrit S.), a member of KPMG Cyber Security team in Thailand
# CVE: CVE-2018-12040
# Category: webapps

1. Description

Symfony is a set of PHP Components, a Web Application framework, a Philosophy, and a Community...

22:13

Linux Audio Conference videos available LWN.net

The 2018 Linux Audio Conference has just concluded in Berlin. A substantial set of videos of talks from the event has already been published, with the rest slated to appear in the near future.

22:09

How third-party risk affects your GDPR compliance Help Net Security

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses third-party risk and how it affects the GDPR compliance of your organization. Heres a transcript of the podcast for your convenience. Hello. My name is Darron Gibbard, and I am the Chief Technical Security Officer at Qualys. In this Help Net Security session today, I am going to be covering third-party risk how does this affect your GDPR compliance? One are More

The post How third-party risk affects your GDPR compliance appeared first on Help Net Security.

22:08

MIPS Finally Posts GCC Compiler Patch For P6600 Series, But Might Be Rejected Phoronix

The MIPS P6600 processor was announced in 2015 as one of the Warrior Processors based upon MIPS64 Release 6. The P6600 is based on a 28nm process, clock speeds up to 2.0GHz, and is the fastest performing of the MIPS Warrior cores. Only now has MIPS posted an enablement patch for the MIPS P6600 with GCC...

22:08

[SECURITY] [DSA 4222-1] gnupg2 security update Bugtraq

Posted by Salvatore Bonaccorso on Jun 11

-------------------------------------------------------------------------
Debian Security Advisory DSA-4222-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
June 08, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : gnupg2
CVE ID : CVE-2018-12020

Marcus Brinkmann...

22:01

Gridbox extension for Joomla! <= 2.4.0 Reflected Cross Site Scripting (XSS) Bugtraq

Posted by yavuz atlas on Jun 11

I. VULNERABILITY
-------------------------
Gridbox extension for Joomla! <= 2.4.0 Reflected Cross Site Scripting (XSS)

II. CVE REFERENCE
-------------------------
CVE-2018-11690

III. VENDOR
-------------------------
https://extensions.joomla.org/extension/gridbox/

IV. REFERENCES
-------------------------
https://vulmon.com/vulnerabilitydetails?qid=CVE-2018-11690...

22:00

Securing microservices and containers: A DevOps how-to guide Help Net Security

There is a simple reason for developers adopting the cloud and cloud-native application architectures. These tools and methods allow developers to accelerate innovation and feature delivery in the service of meeting business demands and keeping their enterprise competitive. While these tools and methods make noticeable improvements for DevOps teams, their new operational model creates security concerns and headaches for security practitioners. DevOps methods disaggregate the neatly packaged n-tier, VM-bound application into distributed architectures. The cloud More

The post Securing microservices and containers: A DevOps how-to guide appeared first on Help Net Security.

21:53

Bootloader vulnerability in OnePlus 6 lets an attacker take control of the device HackRead

By Waqas

An IT security researcher has discovered a critical vulnerability in OnePlus

This is a post from HackRead.com Read the original post: Bootloader vulnerability in OnePlus 6 lets an attacker take control of the device

21:45

Patch management is not just ITs responsibility, get your whole team on board Help Net Security

I have been on the road for a few weeks now and surprisingly the topic of discussion has predominantly been patch management. Why is patch such a prevalent topic? Patching responsibility As we near Patch Tuesday this month I wanted to share a few thoughts and observations with you all from my recent travels. Recently I attended RiskSec in New York, and last week I was at Infosecurity Europe. At RiskSec I had the pleasure More

The post Patch management is not just ITs responsibility, get your whole team on board appeared first on Help Net Security.

21:16

Monday marks ends of net neutrality rules The Hill: Technology Policy

Monday marks the end of net neutrality rules in the U.S., following GOP members of the Federal Communications Commission (FCC) voting to end the protections last year.The FCC announced the June 11 end date in May after the...

21:00

[James Bruton] Is Making A Dog: OpenDog Project Hackaday

There was a time when a two-legged walking robot was the thing to make. But after seeing years of Boston Dynamics amazing four-legged ones, more DIYers are switching to quadrupeds. Now we can add master DIY robot builder [James Bruton] to the list with his openDog project. Whats exciting here is that with [James] extensive robot-building background, this is more like starting the challenge from the middle rather than the beginning and we should see exciting results sooner rather than later.

James' motor and ball screwsJames motor and ball screws

Thus far [James] has gone through the planning stage, having iterated through a few versions using Fusion 360, and hes now purchased the parts. Its going to be about the same size as Boston Robotics SpotMini and uses three motors for each leg. He considered going with planetary gearboxes on the motors but experienced a certain amount of play, or backlash, with them in his BB-9E project so this time hes going with...

20:50

Zx Vega+: Indiegogo Calls "Game Over" on Sinclair Console SoylentNews

Crowdfunding site Indiegogo has called time on a high-profile British project to create a retro handheld console.

[...] "Indiegogo asked for proof that we are ready to ship the product and requested that we send them a unit to their San Francisco office," added Dr David Levy, RCL's chairman

"We responded yesterday saying that we would sooner give a demonstration of a unit to their UK representative, and asking Indiegogo to request that he contact us to fix an appointment. Their reaction was this latest statement."

[...] The Vega+ campaign raised a total of 512,790 from more than 4,700 people on Indiegogo before the US firm blocked it from accepting more funds in March 2017.

[...] RCL has missed multiple deadlines over the past two years and given a variety of reasons for doing so, ranging from problems with the buttons of the Vega+ to disputes with former company directors - the details of which are contested.

The company had originally pledged to deliver the console in the summer of 2016.


Original Submission

Read more of this story at SoylentNews.

20:31

This Week in Numbers: Managing JavaScript Packages with NPM and Yarn

This week we analyze more data from the Node.js Foundationuser survey. Almost three-quarters (73 percent) of survey respondents said they use a package manager. NPM was used by 60 percent and Yarn cited by 13 percent.

20:18

OpenBSD at BSDCan 2018 OpenBSD Journal

BSDCan 2018 has concluded, and materials for (some of) the OpenBSD-related tutorials and talks can be found in the usual place.

Highlights include the unveiling of unveil(), hinted at by Bob Beck (beck@) in his p2k18 report, and "Speculating about Intel", by Theo de Raadt (deraadt@). [An unofficial video of the latter presentation is available.]

At the time of writing, official video recordings are not yet available.

20:15

Hackers Stole Over $20 Million in Ethereum from Insecurely Configured Clients The Hacker News

Security researchers have been warning about cybercriminals who have made over 20 million dollars in just past few months by hijacking insecurely configured Ethereum nodes exposed on the Internet. Qihoo 360 Netlab in March tweeted about a group of cybercriminals who were scanning the Internet for port 8545 to find insecure geth clients running Ethereum nodes and, at that time, stole 3.96234

19:59

Helm vs Kapitan vs Kustomize

TLDR;

  • Kapitan (and presumably Ksonnet) is the more flexible and customizable (json and jsonnet)
  • Kustomize if the more straightforward, just released so well need a bit more documentation on built-in functions (yaml only)
  • Helm combines a package approach and releases management that is powerful, with the caveats of Tiller for the release management part (additional source of truth)

19:58

What Is Digital Twin Technology? [And Why It Matters]

Digital twins are virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed. They are also changing how technologies such as IoT, AI and analytics are optimized.

Digital twin technology has moved beyond manufacturing and into the merging worlds of the Internet of Things, artificial intelligence and data analytics.

19:44

Vulkan 1.1.77 Released With Clarifications & Fixes Phoronix

Kicking off a new week is the Vulkan 1.1.77 specification update...

19:41

Estonian Citizens (via Estonian Cybercrime Bureau) - 655,161 breached accounts Have I Been Pwned latest breaches

In June 2018, the Cybercrime Bureau of the Estonian Central Criminal Police contacted HIBP and asked for assistance in making a data set of 655k email addresses searchable. The Estonian police suspected the email addresses and passwords they obtained were being used to access mailboxes, cryptocurrency exchanges, cloud service accounts and other similar online assets. They've requested that individuals who find themselves in the data set and also identify that cryptocurrency has been stolen contact them at cybercrime@politsei.ee.

19:36

VirGL Now Capable Of OpenGL 4.1 With Latest Mesa Phoronix

The VirGL stack for offering OpenGL hardware acceleration to guest virtual machines with KVM is now capable of utilizing OpenGL 4.1...

19:26

Latest Docket Reports Show That the American Courts/Legal System Still Anything But Patents-Hostile Techrights

It just depends on what the patents cover, e.g. chemistry in this case

Damages from patents trebled

Summary: Damages (or so-called harm) from patent infringement, as demonstrated in the US earlier this month, still an overrated concept which leads to overinflated compensation for infringement; the patent microcosms claims that US courts have become anti-patent are laughable at best

THE EPO has its share of scandals that still severely affect EPO staff, but what about accused individuals and firms, especially cash-strapped ones?

Disproportionate sizes in litigation have long been an issue.Docket Navigators Docket Report about a BASF (German giant) case speaks of a discredited expert report. As Docket Navigator summarised it (along with some excerpts from the original): The court granted plaintiffs motion to strike report of defendants contract expert regarding whether defendant sold anticipating prior art before the critical date because the testimony was unhelpful.

Its so concise that its confusing (what actually happened there). But whats noteworthy here is that a relatively small defender (its workforce size is less than a tenth of BASFs) is being sort of denied the right to/of a defense. Disproportionate sizes in litigation have long been an issue.

Its almost as though law is being composed for the purpose of deterrence/retaliation rather than justice.Another new Docket Report (regarding Sabinsa Corporation v Olive Lifesciences Pvt. Ltd., a herbal products manufacturer in Bengaluru, India) shows what happens when patents not only cause major fines but also treble the &#8216...

19:22

Sweden distributes be prepared for war leaflet to all 4.8m homes Lifeboat News: The Blog

Society is vulnerable, so we need to prepare ourselves as individuals, said Dan Eliasson of the Swedish civil contingencies agency, which is in charge of the project. Theres also an information deficit in terms of concrete advice, which we aim to provide.


Defence pamphlet shows how population can prepare in event of attack and contribute to countrys total defence

European affairs correspondent.

19:11

Set TV Suddenly Goes Offline But is the ACE Lawsuit to Blame? TorrentFreak

Unauthorized IPTV services that provide competition to traditional broadcasters and VOD providers are a huge thorn in the side of mainstream entertainment industry companies.

As a result, the Alliance for Creativity and Entertainment (ACE), an anti-piracy partnership forged between Hollywood studios, Netflix, Amazon, and more than two dozen other companies, is now fighting on the front line, attempting to bring these competitors down.

Two early targets were the Kodi-powered Tickbox and Dragonbox services, who are both been tackled in US courts.

Earlier this year, ACE members launched similar action against Florida-based Set Broadcast, LLC, the company behind the popular IPTV service SET TV. The complaint, filed at a California federal court in April, claimed that Set TV was nothing but a piracy tool which offered copyright-infringing streams to a large number of subscribers.

Despite the threats and a lawsuit, Set TV has continued to provide service to thousands of customers who access media via set-top boxes, laptops, tablets, phones and various other hardware devices. Just before the weekend, however, trouble appeared on the horizon.

A message published on Set TVs homepage indicated that the platform might be facing difficulties.

Set TV down

Given that Set TV is under intense pressure from ACE, many observers and some media reports put two and two together, concluding that Set TV had probably buckled under the pressure and thrown in the towel.

While that might still transpire at a later date, no official messages appeared on Set TVs social media accounts to confirm or deny. So, to learn more, TorrentFreak contacted Set TV who emailed back a short message Sunday.

We apologize for this inconvenience. We are working on getting our system back online, the company said in response.

A call to the companys support line was met with a similar message.

This morning Set TVs service still appears to be down and no updates are available detailing when (or indeed if) the platform will return. The statement that efforts are underway to bring the service back suggest that technical issues may be behin...

19:10

Drug Combination Offers More Effective Care For Patients Suffering Miscarriage SoylentNews

A combination of the drugs mifepristone and misoprostol can help bring closure to some women and their families suffering from miscarriage, and reduces the need for surgical intervention to complete the painful miscarriage process. Results of a new clinical trial led by researchers at the Perelman School of Medicine at the University of Pennsylvania, show that while the standard drug regimen using misoprostol on its own frequently fails to complete the miscarriage, a combination of misoprostol and the drug mifepristone works much more reliably. The report is published today in the New England Journal of Medicine.

Each year in the United States alone approximately 1 million women have miscarriages. When the body does not expel the pregnancy tissue on its own -- the final part of a miscarriage -- women need to undergo a surgical procedure or take the drug misoprostol. Though often preferable for its convenience and privacy -- patients can take it in the comfort of their own homes -- misoprostol does not always work, and many women who use misoprostol are still left with no option but to undergo an invasive procedure they wished to avoid, prolonging an already physically and emotionally difficult situation.

"Though rarely discussed openly, miscarriage is the most common complication of pregnancy, and the public health burden is both physical and psychological. For too many women, misoprostol alone just leads to frustration. I have seen my patients suffer from the insult of the treatment failure added to the injury of the initial loss," said study lead author Courtney A. Schreiber, MD, MPH, chief of the division of Family Planning and an associate professor of Obstetrics and Gynecology at the Perelman School of Medicine at the University of Pennsylvania. "As physicians, we have to do better for these patients, and our new study shows that by combining mifepristone with misoprostol, we can."


Original Submission

Read more of this story at SoylentNews.

18:36

Saint Regis Mohawk Tribe Blind to Its Participation in a Scam Around Patents on Nature Techrights

Recent: Allergan/Mohawk Sovereign Immunity Patent Scam (Dodging PTAB) Backfires Spectacularly

Tired man
Without even shedding a tear over what theyve done (a betrayal to Native American values)

Summary: For over $20,000,000 (so far) the Saint Regis Mohawk Tribe has agreed to pretend that it has something to do with controversial patents of Allergan, in effect grossly abusing the concept of tribal immunity while at the same time enabling privatisation of nature

THIS SITE typically focuses on software patents and Alice. But a few other high-level decisions, notably Mayo, impact patent scope as well. There are many bogus USPTO patents which are well overdue for a review by the Patent Trial and Appeal Board (PTAB) and maybe the Federal Circuit as well. That includes patents of Allergan, which is visibly afraid of PTAB, knowing perhaps that its patents are questionable and would likely be voided upon closer scrutiny.

Allergan hired some dodgy law firm that bullies bloggers like myself; they are maximalists of patent law who are resorting to outright "scams" now (many people call it a scam).

Allergan hired some dodgy law firm that bullies bloggers like myselfPatently-Os Dennis Crouch has in fact just given the platform to these patent scammers who misuse tribal immunity to cushion/shield monopoly of Allergan (based on bogus patents). Michael Gulliford, an advisor to the Saint Regis Mohawk Tribe and the Founder of Soryn IP Group, uses terms like controversial and death squad to refer to PTAB. He compares judges and courts to assassins basically. What a lunatic.

He admits upfront that the tribe takes $13.75 million upfront, with continuing royalty payments of $3.75 million per quarter to participate in a scam of Allergan. This is pure greed...

18:27

OnePlus 6 Flaw Allows to Boot Any Image Even With Locked Bootloader The Hacker News

Have you recently bought a OnePlus 6? Don't leave your phone unattended. A serious vulnerability has been discovered in the OnePlus 6 bootloader that makes it possible for someone to boot arbitrary or modified images to take full admin control of your phoneeven if the bootloader is locked. A bootloader is part of the phone's built-in firmware and locking it down stops users from replacing

18:01

Top 10 Most Pirated Movies of The Week on BitTorrent 06/11/18 TorrentFreak

This week we have two newcomers in our chart.

Tomb Raider is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This weeks most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (1) Tomb Raider 6.6 / trailer
2 (7) Pacific Rim: Uprising 5.8 / trailer
3 (2) Avengers: Infinity War (HDCam) 9.1 / trailer
4 (5) Love, Simon 8.0 / trailer
5 () 211 4.3 / trailer
6 (3) A Quiet Place 8.0 / trailer
7 (6) Black Panther 7.9 / trailer
8 () ...

18:00

FPGA Persistently Rick Rolls You Hackaday

When [Im-pro] wants a display, he wants it to spin.  So he built a persistence of vision (POV) display capable of showing a 12-bit color image of 131 x 131 pixels at 16 frames per second. You can see a video about the project below, but dont worry, you can view it on your normal monitor.

The project starts with a Java-based screen capture on a PC. Data goes to the display wirelessly to an ESP8266. However, the actual display drive is done by an FPGA that drives the motor, reads a hall effect index sensor, and lights the LEDs.

Perhaps the most interesting part of the project is the FPGA-based mapping of the rectangular coordinates of the incoming video to the polar coordinates required by the display. There are 4 arms of LEDs or wings and a 3D printed structure that is all included in the post.

The FPGA is a Cmod S6 which is a breakout board for a Xilinx Spartan 6 with more than enough horsepower to handle the workload. There are also custom PCBs involved, so when you think about it, it is a fairly wide-ranging project. Java software, ESP8266 software, FPGA configurations, a 3D-printed design, and PCB layouts. If you want something simple to tackle that has a bit of everything in it, this might be your next project.

Most of the POV displays we see dont have this kind of color-depth and resolution. Weve seen displays built around fans. Our favorite, though, is the dog speedometer.

17:34

NSF Supports Development of New Nationwide Data Storage Network SoylentNews

Submitted via IRC for Fnord666

The National Science Foundation (NSF) is announcing a $1.8 million grant for the initial development of a data storage network over the next two years. A collaborative team will combine their expertise, facilities and research challenges to develop the Open Storage Network (OSN). OSN will enable academic researchers across the nation to work with and share their data more efficiently than ever before.

[...] NSF's investment in OSN builds on a seed grant by Schmidt Futures a philanthropic initiative founded by former Google Chairman Eric Schmidt to enable the data transfer systems for the new network. These systems are designed to be low-cost, high-throughput, large-capacity, and capable of matching the speed of a 100-gigabit network connection with only a small number of nodes. This configuration will help to ensure that OSN can eventually be deployed in many universities across the U.S. to leverage prior investments and establish sustainable management for the overall storage network.

Source: NSF Supports Development of New Nationwide Data Storage Network


Original Submission

Read more of this story at SoylentNews.

17:22

Ultra-capacitor hybrid radically boosts power and efficiency of lithium batteries Lifeboat News: The Blog

Combining the unique strengths of lithium batteries with crazy-fast charging, carbon ultra-capacitors could save a ton of weight and add significant range and power to electric vehicles, according to Nawa Technologies. Based outside Marseilles, this fascinating French startup is working on a new type of battery it believes could offer some huge advantages in the EV space, among many others.

17:22

In-orbit services poised to become big business Lifeboat News: The Blog

A transition is happening in the satellite business. Fast-moving technology and evolving customer demands are driving operators to rethink major investments in new satellites and consider other options such as squeezing a few more years of service out of their current platforms.

Which makes this an opportune moment for the arrival of in-orbit servicing.

Sometime in early 2019, the first commercial servicing spacecraft is scheduled to launch. The Mission Extension Vehicle built by Orbital ATK on behalf of subsidiary SpaceLogistics, will the first of several such robotic craft that are poised to compete for a share of about $3 billion worth of in-orbit services that satellite operators and government agencies are projected to buy over the coming decade.

17:00

Seedballs Terra Forming Terra





This has recently been  modified in Africa in order to sow woodlands using a carbon rich mix which is an excellent idea. This also confirms that knowledge of bio char has how penetrated the global agricultural base.  This is wonderful news.  The global agricultural movement marches on.

The quoted cost there is a penny per ball, cheap enough for broad application everywhere.  We even see folks tossing the balls out of helicopters.

These balls sit there until hit by a rain fall which naturally activated the seed. 

This idea was presented to me in the 1980's using cross linked polymers as a carrier and for reforestation.  It never got off the ground and this approach has the advantage that it is user friendly for all dirt farmers in particular who do need exactly this technology.
..

MAKING SEEDBALLS: AN ANCIENT METHOD OF NO-TILL AGRICULTURE

JUNE 18, 2014 


BY ANDREW SCHREIBER

https://permaculturenews.org/2014/06/18/making-seedballs-ancient-method-till-agriculture/




Dried and Finished Clay Dumplings


Whats a Seed ball?

Seeds balls are an ancient technique for propagating plants from seeds without opening up soil with cultivation tools such as a plow.

The rediscovery and popularization of seedballs (or Clay Dumplings as he called them) in modern times is typically ascribed to Japanese natural farmer and philosopher Masanobu Fukuoka.

As with many natural farmers, Fukuoka believed that tillage over large areas is laborious, destructive to soil health, and ultimately not needed and thus a waste of time and energy. Thus, seedballs have become an important aspect of many natural farming and conservation enterprises around the world.





Bill Mollison and Masanobu Fukuoka two great folks


After many years of observation and experimentation, Fukuoka developed a method of growing rice, barley, vegetables and fruit over his small farm with very...

17:00

Breaking the Educational Cartel Terra Forming Terra


 
 
It is all here, isn't it.  There is plenty wrong about the massive educational establishment as it stands.  The first and most important problem is poor individual guidance and spotty product delivery.  I personally experienced all that and it was to my detriment.  It is still a performance problem that exists always.
 
That technology allows it to be solved is wonderful.  That means we can re-frame the other problem with modern education.  The Cost.
 
Students need a personal tutor who is understanding of his line of endeavor and little else.  Even the lab sciences are properly given by advanced students because we are talking about skill development.
 
Because of distance learning it now happens that all course material is available presented by the best presenters available along with the best written material available.  It makes sense to assemble seminars of students with one of their tutors to attend such presentations.  This allows a friendly discussion with the tutor to resolve difficulties. Other techniques additionally enhance the value of this approach.
 
Truth is, most of our professors are not leaders in their field and are themselves reliant on their own past training..
 
Breaking the Educational Cartel

06/06/2018
 
Gary North

https://mises.org/wire/breaking-educational-cartel


Every society has rites of passage. If you want to begin to understand any society, study its rites of passage.

In the Christian West, there are three acknowledged rites of passage: baptism, marriage, and funeral. Obviously, a funeral is a rite of passage for the survivors. Nobody wears street clothes other than a mortician's street clothes when he is invited by somebody else to one of these rites of passage.

Every society has additional rites of passage. There is usually a rite of passage associated with...

17:00

Giuliani: Trump forced North Koreas Kim to beg for meeting and Muellar Attempt to Frame Trump. Terra Forming Terra




Yes he did and the summit starts in a couple of days.  I also observe three NK generals were also summarily dismissed.  Perhaps they pushed bad advice?

Thus it may well be possible to settle all this.  Those were the last kicks from the old guard.  In the meantime, by now they have hundreds of pages of agreements printed out ready for signing and we will see a road map ten years long that will create an united Korea.

At the same time, Rudy has commented that Muellar and team are attempting to frame Trump.  I do not think that they are really trying to do this but i do think that this is a deliberate ploy to introduce the framing meme into the public conversation.


Evidence to date has established that the Obama Whitehouse did operate a criminal entrapment scheme against Trump during and after the election and this is about to become a big thing with the IG report.


Also we are now at 35,000 sealed indictments and we just lost Anthony Boudain and Kate Slade to suicide this week.  It does not make you feel good knowing all this.



Giuliani: Trump forced North Koreas Kim to beg for meeting


https://apnews.com/13219b17364444fd9509ef6499ac093f


JERUSALEM (AP) Former New York Mayor Rudy Giuliani on Wednesday boasted that Donald Trumps tough line had forced the North Korean leader to beg to re-schedule a high-profile summit after the president abruptly called off the meeting.


After the cancellation, Kim Jong Un got back on his hands and knees and begged for it, which is exactly the position you want to put him in, Giuliani told a business conference in the Israeli city of Tel Aviv.


In an interview later with The Associated Press, Giuliani rejected suggestions that such comments might sour the atmosphere ahead of next weeks summit, saying that the North Korean leader must understand that the United States is in a position of strength.

...

17:00

Evidence Found for a New Fundamental Particle - Facts So Romantic Nautilus


Reprinted with permission from Quanta Magazines Abstractions blog.

An experiment at the Fermi National Accelerator Laboratory near Chicago has detected far more electron neutrinos than predicteda possible harbinger of a revolutionary new elementary particle called the sterile neutrino.Photograph of nside the MiniBooNE tank, photodetectors capture the light created when a neutrino interacts with an atomic nucleus, by Reidar Hahn / Fermilab

Physicists are both thrilled and baffled by a new report from a neutrino experiment at Fermi National Accelerator Laboratory near Chicago. The MiniBooNE experiment has detected far more neutrinos of a particular type than expected, a finding that is most easily explained by the existence of a new elementary particle: a sterile neutrino thats even stranger and more reclusive than the three known neutrino types. The result appears to confirm the anomalous results of a decades-old experiment that MiniBooNE was built specifically to double-check.

The persistence of the neutrino anomaly is extremely exciting, said the physicist Scott Dodelson of Carnegie Mellon University. It would indicate that something is indeed going on, added Ane Slosar of Brookhaven National Laboratory.

As for what, no one can say.

Im very excited about this result, but I am not ready to say Eureka! said 
Read More

The Yuge Picture - DEEP STATE faces Armagedon. Terra Forming Terra





A lot more bits and pieces have trickled in to help complete the overall narrative which may well have an inflexion point today around the release of the IG report.  What has become clearer is what is meant by 'the plan' and the centrality of the Uranium One Treason.

What you do need to understand here though is that Russia had no need to ever buy USA Uranium, but Iran needed weapons grade Uranium and only the USA could successfully supply them without being in contravention of a host of international treaties with the USA or at least USA acquiescence was central. 

When this was proposed, Russia cooperated, knowing full well that it was all criminal as hell, but gave them huge leverage in the USA political sphere.  I also must say that anyone else would also have cooperated for the same reason and then look for a way to blow it all away after all had been entrapped to your advantage.  The alternative was worse inasmuch as you would lose control.

I suspect that the scheme was concocted between the CIA and the Iranians in order to establish Iran as a viable nuclear treat and for blackmail leverage accruing to the CIA as they had done with North Korea.  Thus the whole scheme is full of CIA assets and Deep State players and plenty of the unwitting.

Thus we have the Genesis of Uranium One. For it to proceed, a whole raft of regulatory constraints and agencies in the USA had to be rendered compliant.  The money itself would have to come from frozen Iranian cash, now locked since the Carter years.  What was set in motion was a huge bribery scheme that naturally captured most aspects of the DEEP STATE.

Understand that we are not talking about just the heads of those agencies, but also the types of professionals who actually needed to sign of within the respective departments.  Non compliant actors would also need to be transferred as well.  It is easy to envisage hundreds of folks ultimately been p...

16:43

Scientists Can Design Better Babies. Should They? Lifeboat News: The Blog

Advances in reproductive technology have put genetic choices within reach of perspective parents. But critics warn of ethical peril.

16:43

Rutgers physicists create new class of 2D artificial materials Lifeboat News: The Blog

In 1965, a renowned Princeton University physicist theorized that ferroelectric metals could conduct electricity despite not existing in nature.

For decades, scientists thought it would be impossible to prove the theory by Philip W. Anderson, who shared the 1977 Nobel Prize in physics. It was like trying to blend fire and water, but a Rutgers-led international team of scientists has verified the theory and their findings are published online in Nature Communications.

Its exciting, said Jak Chakhalian, a team leader of the study and Professor Claud Lovelace Endowed Chair in Experimental Physics at Rutgers University-New Brunswick. We created a new class of two-dimensional artificial materials with ferroelectric-like properties at room temperature that dont exist in nature yet can conduct electricity. Its an important link between a theory and an experiment.

16:43

AI cancer detectors Lifeboat News: The Blog

Researchers suggest artificial intelligence is now better and faster at detecting cancer than clinicians.

16:43

South Korean Cryptocurrency Exchange Coinrail hacked, hackers stole over $40M worth of ICO tokens Security Affairs

Cryptocurrency Exchange continues to be a privileged target for hackers, news of the day is the hack of the South Korean exchange Coinrail.

The hack has happened during the weekend, on Sunday Coinrail announced the cyberheist. Attackers stole over $40M worth of ICO tokens that were maintained in the servers of the exchange.

The company published a data breach notification on its website that currently appears in maintenance mode.

The exchange explained that attackers stole tokens issued during the initial coin offerings (ICOs) of Pundi X (NPXS), NPER (NPER), and Aston (ATX).

Most notably, the hackers got away with $19.5 million-worth of NPXS tokens that were issued by payment project Pundi Xs ICO. Added to that they scored a further $13.8 million from Aston X, an ICO project building a platform to decentralize documents, $5.8 million in tokens for Dent, a mobile data ICO, and over $1.1 million Tron, a much-hyped project originating from China. reported TechCrunch.

Thats according to a wallet address that has been identified as belonging to the alleged attacker, who also got hold of smaller volumes of a further five tokens from Coinrail.

South Korea is one of the countries with the highest cryptocurrency trading activity, but Coinrail is one of its smaller exchanges operating over there.

According to coinmarketcap.com, the South Korean exchange ranks in worlds top 90 based on trading volume.

After the discovery of the hack, Coinrail immediately put offline its wallets to secure its cryptocurrency assets, it is currently working with the affected ICO companies to freeze the stolen funds.

...

16:43

20 Years of Earth Data Now at Your Fingertips Lifeboat News: The Blog

Powerful Earth-observing instruments aboard NASAs Terra and Aqua satellites, launched in 1999 and 2002, respectively, have observed nearly two decades of planetary change. Now, for the first time, all that imagery from the first operational image to imagery acquired today is available for exploration in Worldview.

16:42

Isaac Launches New Era of Autonomous Machines Lifeboat News: The Blog

ComputexNVIDIA today announced the availability of NVIDIA Isaac, a new platform to power the next generation of autonomous machines, bringing artificial intelligence capabilities to robots for manufacturing, logistics, agriculture, construction and many other industries.

Launched at Computex 2018 by NVIDIA founder and CEO Jensen Huang, NVIDIA Isaac includes new hardware, software and a virtual-world robot simulator.

AI is the most powerful technology force of our time, said Huang. Its first phase will enable new levels of software automation that boost productivity in many industries. Next, AI, in combination with sensors and actuators, will be the brain of a new generation of autonomous machines. Someday, there will be billions of intelligent machines in manufacturing, home delivery, warehouse logistics and much more.

15:55

New York City Bans Use of Activated Charcoal in Food and Drink-Serving Establishments SoylentNews

And Just Like That, Goth-Friendly Charcoal Foods Were Canceled

It turns out those highly Instagrammable, pitch-black "goth" foods were far edgier than we could have ever imagined. According to a new report in Eater, the Department of Health says that activated charcoal is currently banned from all food- and drink-serving establishments in NYC. A spokesperson for DOH told Eater that the rule isn't new, but enforcement has increased.

Morgenstern's Finest Ice Cream, that NYC ice cream shop that caused a mini frenzy in 2016 over their popular jet-black ice cream, reportedly had to dump "$3,000 worth of product during a routine inspection," per owner Nick Morgenstern. The ice cream shop posted a cryptic Instagram in late May that hinted something was afoot. The ice cream, which they've been making since 2015, uses coconut asha form of activated charcoal. "I don't see any evidence that this is actually a question of public health safety," Morganstern told Eater. "I would challenge someone to identify the public health safety risk of that ingredient."


Original Submission

Read more of this story at SoylentNews.

15:48

Post-AIA, Post-Alice/ 101 USPTO Still Granting Software Patents in Defiance of the (Case)Law Techrights

Nationality or sovereignty defined by ones patent scope; the danger is, by granting patents in error they associate their patents with weak enforceability

Some questions

Summary: The patent microcosm, which looks for new ways to patent algorithms (in spite of Alice), actually dooms the US patent system by filling it up with invalid patents software patents that are just waiting to be thrown out by courts which can better assess subject matter (no financial incentive to grant aplenty)

THE LITIGATION climate the US became renowned/notorious for is no more; at least as far as patent litigation is concerned. As we said yesterday, a lot of the litigation drifts eastwards to Europe and China, owing to patent maximalism at the EPO and SIPO. Its estimated that this year by years end the USPTO will have marked a decline in patent filings.

We are sadly seeing a failure to reject software patent applications, which eventually perish somewhere like the Federal Circuit or Patent Trial and Appeal Board (PTAB) at a vastly higher cost!The improving patent quality is good news; its bad news to lawyers, but theyre just a tiny minority or a non-producing, unproductive niche. Based on yesterdays advertisement of an upcoming webinar of theirs, theyre trying to come up with new patenting tricks (getting patents on what otherwise would get rejected). The Practising Law Institute (PLI), a patent maximalists group, will cover 35 U.S.C. Sections 101/102/103 and 35 U.S.C. 101: The Complete Guideline Breakdown of Alice, Myriad and Mayo (basically what places restrictions on abstract patents). Theres also...

15:35

InvisiMole Spyware is a powerful malware that went undetected for at least five years Security Affairs

Malware researchers from ESET have spotted a new sophisticated piece of spyware, tracked as InvisiMole, used in targeted attacks in Russia and Ukraine in the last five years.

Experts still havent attributed the malware to any threat actor, InvisiMole could be a nation-state malware developed for cyber espionage purpose or the result of a development of a financially-motivated group.

The researchers have discovered only a few dozen samples in the wild, the malicious code implements a broad range of features thanks it modular architecture that make the threat very versatile.

Our telemetry indicates that the malicious actors behind this malware have been active at least since 2013, yet the cyber-espionage tool was never analyzed nor detected until discovered by ESET products on compromised computers in Ukraine and Russia. reads the report published by ESET.The campaign is highly targeted no wonder the malware has a low infection ratio, with only a few dozen computers being affected.

At the time the experts still havent discovered the attack vector and there is no info about the types of campaigns in which it was involved.

Experts dont exclude any infection vector, including installation facilitated by physical access to the machine.

The modular structure of the InvisiMole spyware is composed of a wrapper DLL that leverages two other backdoor modules that are embedded in its resources to conduct its activities.

InvisiMole spyware

According to the researchers, the authors of the InvisiMole spyware have removed any clue that could attribute the malware to a specific actor, the unique exception is represented by the compilation data of a single file (dating to October 13, 2013). Compilation dates for all the remaining files have been removed by the authors.

The main module is called RC2FM and supports 15 commands that allow the attacker to search and exfiltrate data from the infected system.

The RC2FM supports commands for gathering system information an...

15:35

Pennsylvania Corporate Tax Records Were Available to Public Privacy Log

I work for a company where we recently applied for a grant through the Pennsylvania Department of Community and Economic Development. At some point in the application process you need to upload tax records and other documents. However, I learned that these records can be downloaded by anybody -- actually anybody could download all the records. DCED administers over 100 different funding programs and so many tax records for businesses (mostly small businesses) in Pennsylvania were affected.

Here are the main topics of this story: how do you responsibly disclose a vulnerability to government if you, or somebody you know, may have broken federal laws to find it? How do you ensure that it gets fixed? And how do you get credit?

The exploit

First, let's show off the actual exploit. DCED includes a centralized application process for programs and grants that all applicants must follow. Here is the vulnerable step in the application process:


So here is the key part zoomed in:


And if you click it you can verify the file you uploaded. Here's the URL for the tax records I just uploaded: https://www.esa.dced.state.pa.us/AddendaStream.aspx?SurveyUploadUid=104097

So I read out the URL to my coworker sitting next to me, or maybe I typed it in on another computer, honestly I forget. And don't you know, somebody else's application or tax records or something came up. What?

Well it turns out the typed in URL had an 8 at the end. I immediately recognized what happened, closed the browser, did not save the file, and understood the implications:

* The files are numerically sequenced
* The files are accessible by anybody
* You do not have to be logged in to access the files

And the consequences of these three tenets are:

* Anybody could download all the tax records from the system by loading starting at SurveyU...

15:22

Another Victim of Corrupt Benot Battistelli Techrights

Thuggery at the EPO is taking its toll on the mental health of staff

Mafia Battistelli

Summary: The judge whom Battistelli attacked, Judge Corcoran, is rumoured to be in a psychiatric hospital after 3.5 years of legal battles and defamation against him

THE plague of suicides at the EPO is undeniable and it can directly be linked to Battistellis policies, (mis)behaviour, and sheer abuses.

Topi is known for causing that (in Croatia), just like Battistelli.Causing ones perceived opponents to commit suicide or sink into depression isnt a novel tactic. Topi is known for causing that (in Croatia), just like Battistelli. We know for a fact that both have been bullying in several courtrooms (and countries) Judge Corcoran and in a recent press dialogue/interview Corcorans lawyer said she thankful that Mr. Corcoran is still alive after all the abuse he was subjected to by Battistelli and his bulldog.

Prowling around the corridors of the Isar building, Mrpel learnt unfortunate news, Mrpel wrote last night. It appears that Mr. Corcoran is in hospital. Mrpel heard he was sent to be treated for psychiatric reasons. Mrpel has no access to the medical file and cats are not familiar of psychiatric hospitals, but there are few reasons to be sent to a psychiatric hospital in Germany. The most common one is when the patient is in danger of committing suicide.

Benot Battistelli, if he has any morsel of guilt left in him, might be able to medicate himself with some wine, having repeatedly abused people who dared (or had the courage) to mention his corruption.

15:00

Custom Buttons For Your Game Controller Hackaday

Console gamers have relatively few options when it comes to hardware hacking, unless they wish to partake of some extreme modifications that threaten the very integrity of their machines. So without reaching for a Dremel, how can you insert a little individuality into the same standard components all your friends have?

It seems one answer is to customise your controller with some different buttons. There are commercial outfits that will supply your needs in this direction, but they arent always cheap, and plenty of older machines have no products available. This isnt  a problem for [RockerGaming] though, who shows us how to cast your own set of custom buttons using a silicone mold taken from the originals.

The video is a step-by-step walkthrough of the molding process that could just as easily be applied to any other small plastic parts and is not unique to console buttons. The subjects come from a Sega Saturn controller, in the video a beige model, which raises a passing interest among European Hackaday scribes who remember the Saturn as a black console.

We see the preparation of the original buttons and mold. An acrylic golf ball trophy display case is pressed into service. (Who knew those were even a thing!) A dye is added to the two-part silicone to provide a visual mixing aid, and once the cast mold is separated from the buttons the final resin is poured into it. The cloned buttons are tidied up underneath with a Dremel, and the controller is reassembled.

A set of custom buttons will not improve your gaming, but underlying this is the fact that resin casting is a useful skill. Its somewhere weve been before in depth, so its worth reading our guide from back in 2016.

Thanks [Andrea Campanella] for the tip.

14:22

Researchers Have Invented an Awesome And Scary Nuclear Battery Pack Lifeboat News: The Blog

Are we ready?


Batteries powered by radioactive materials have been around for more than a century, but what they promise in power they usually lose in bulk.

Not so with a new kind of power source, which combines a novel structure with a nickel isotope to pack ten times more power than an electrochemical cell of the same size. The only question is, are we ready to go nuclear?

A team of Russian researchers have put a new spin on technology that uses the beta decay of a radioactive element to create differences in voltage.

14:22

Another missing component could revolutionize electronics Lifeboat News: The Blog

Business Impact

Another missing component could revolutionize electronics.

A new theory predicts the existence of an electronic device that works like an inverse transistor. It could make circuits, smaller, faster, and less power hungry.

    14:18

    Real Estate Booming in Chinese-NK Border Town SoylentNews

    Real Estate Jumps In Chinese City Bordering North Korea

    [...] Occasional trains are some of the only traffic left on the China-Korea Friendship Bridge. This is the crossing point for 70 percent of goods entering North Korea from China things like coal, fuel and household appliances which are typically transported from Dandong, a gleaming metropolis, to drab Sinuju, the North's second-largest city.

    But these are atypical times: United Nations sanctions on North Korea for its nuclear and weapons tests have reduced traffic on this bridge to a trickle. The effects are hitting the economy of this Chinese city hard as well. But in April, Dandong's hopes were suddenly lifted. A historic meeting between leaders of North and South Korea provided raised optimism here that the closed country across the river may soon open for business. The summit planned for next week between President Trump and North Korea's leader Kim Jong Un has added more fuel to the anticipation. And investors from across China have flooded in to this border city of 2.4 million. [...] "I've never seen anything like this in Dandong," says [Bob] Li, as workers scurry around him. "We'd have several buyers coming in from all over China buying up apartments. To them, the homes were very cheap, so they would buy as many as possible."

    [...] "The rumor around town is that if the North opens up, it'll finally build a road to the new bridge, and our city will be linked to Seoul by road," says Li. "Pyongyang would just be a stop on the way."

    Also at Reuters.


    Original Submission

    Read more of this story at SoylentNews.

    14:14

    Instead of Smearing the Judges of the Patent Trial and Appeal Board (PTAB) Check Why Abstract Patents Are Being Granted in the First Place Techrights

    Hours ago: Do Know Evil? Then Stop Patenting Software, Google

    Judges as moral reasoners - Oxford Journals - Oxford University Press
    Full paper: Judges as moral reasoners Oxford Journals Oxford University Press [PDF]

    Summary: PTAB is taking a lot of heat (albeit always from patent maximalists) for simply applying the law, which ought to have been applied by the Office at the time of examination; confidence in US patents depends on the Offices ability to discern/distinguish patentable subject matter from clearly unpatentable subject matter

    The Patent Trial and Appeal Board (PTAB) has made a few headlines this past week. Michael Loney, who is based in New York, took note of some precedential decisions:

    The PTAB has de-designated Idle Free and Master Image in response to Aqua Products. Fiscal year 2018s first half set a motion to amend record for two consecutive quarters

    The Patent Trial and Appeal Board (PTAB) has de-designated as precedential MasterImage 3D v RealD, Case IPR2015-00040 (PTAB July 15, 2015) (Paper 42) and has de-designated as informative Idle Free Sys v Bergstrom, Case IPR2012-00027 (June 11, 2013) (Paper 26).

    Much of the coverage about PTAB, however, has been hostile. As expected, it came from longtime PTAB bashers and anti-PTAB sites. Those sites have a proven disdain for patent quality. Rather than ignore those sites wed like to quickly respond to these.

    Referring to a case from the first of June, Watchtroll now cherry-picks one of those rare cases where the Federal Circuit either overrules or vacates/remands after PTAB declares some patent/s to be invalid. Deception by omission in the patent trolls l...

    14:02

    Playing piano with a mind-controlled robotic arm Lifeboat News: The Blog

    The arm/hand probably intended for the ATLAS robot. Id be curious if they are already playing with attaching it on to the robot.


    The first person to live with a mind-controlled robotic arm is teaching himself piano. Johnny Matheny has spent the last five months with an advanced prosthetic, designed to replace the human hand and arm.

    The robot arm is part of a research project run through the Johns Hopkins University Applied Physics Lab, and funded, in part, by the US Department of Defense. Data that researchers collect could revolutionize future mind-controlled robotics.

    This is the second video in a series following Johnny has he spends the year with the arm.

    Watch the arm being delivered: https://youtu.be/xKUn0-Bhb7U

    SUBSCRIBE: https://goo.gl/kdDpXu

    FOLLOW QUARTZ:
    Facebook: https://goo.gl/DsmLvx
    Twitter: https://goo.gl/rY7pSX

    Check out the rest of our videos: https://goo.gl/A8gZvx

    13:22

    The International Trade Commission (ITC/USITC) Will Possibly Get Abolished Unless It Can Reform Itself Techrights

    Example from last month, impacting a Japanese firm

    Nintendo faces Switch patent infringement investigation in the US

    Summary: The International Trade Commission (actually US, its not an international agency) continues to overzealously guard US interests, even if that means blocking the competition from abroad, based on some sketchy patents with burden of proof on the accused

    The ITC is the US embargo (e.g. imports ban) agency, at least for patent complaints; it often seems like its just serving exceptionally large US corporations that can afford access to it; its rare to see small companies or foreign companies utilising ITC. Microsoft used ITC for one of the earlier instances of patent aggression (against rival computer mice) and in recent years weve been covering several instances of ITC misuse of laws or failing to respect tribunals such as the Patent Trial and Appeal Board (PTAB), even if the Federal Circuit later affirmed its decisions. Something is clearly not working right at the ITC (law not being applied correctly, or sanctions applied prematurely without proper due process) and it could use a reboot if not just the boot. According to this short report (behind a paywall), ITC changes its rules. To quote Managing IP:

    The International Trade Commission (ITC) has implemented 11 rule changes in an attempt to modernise and clarify the existing system. Coming into effect today, some changes simply formalise existing practices; others may cause complainants to rethink their approach.

    If ITC fails to reform itself, which has thus far been the case, then it might simply perish. Agencies like ITC stigmatise themselves as uncaring for justice/legal process.

    12:55

    Do Know Evil? Then Stop Patenting Software, Google Techrights

    Google is patenting algorithms (sometimes not even its own)

    Google patent

    Summary: Complaints that Google is claiming credit for other peoples work and then patenting that, in effect pulling an Edison to stockpile questionable patents while occasionally resorting to patent aggression

    LAST year someone told us the story of how Google had used Alex Converse to patent someone else's work. This was particularly disturbing not just because of prior art but also because of patent scope.

    It would be bad if Google ever got granted any patent on anything related to asymmetric numeral systems (ANS) because its an algorithm.Well, the originator of the method speaks out again. Jarek Duda was making some headlines last year and now hes back. Rather than walk away and apologise Google seems to be doubling down on its bad practice, which involves patenting software:

    When Jarek Duda invented an important new compression technique called asymmetric numeral systems (ANS) a few years ago, he wanted to make sure it would be available for anyone to use. So instead of seeking patents on the technique, he dedicated it to the public domain. Since 2014, Facebook, Apple, and Google have all created software based on Dudas breakthrough.

    But now Google is seeking a patent that would give it broad rights over the use of ANS for video compression. And Duda, a computer scientist at Jagiellonian University in Poland, isnt happy about it.

    Google denies that its trying to patent Dudas work. A Google spokesperson told Ars that Duda came up with a theoretical concept t...

    12:38

    Medical Video of a Freshly-Removed Human Brain is Strangely Beautiful SoylentNews

    Even though you use your brain to do a lot of thinking, you probably don't think about your brain that often.

    It's an incredibly complex, incredibly precious organ. It's also incredibly squishy, as you can see in an amazing teaching video that demonstrates a freshly removed brain straight from autopsy.

    As the neuroanatomist handles the vulnerable blob with the utmost care, it's awe-inspiring to realise that each one of us has a squishy brain just like it - and it contains all our memories and thoughts.

    [...] And that's actually one of the purposes of the video - apart from being a teaching material, the university wanted "to stress the vulnerability of the brain to highlight the importance of wearing helmets, seat belts, and taking care of this very precious tissue."

    https://www.sciencealert.com/what-human-brain-really-looks-like-video-incredible


    Original Submission

    Read more of this story at SoylentNews.

    12:22

    Nucleus of the cell mapped in 3D Lifeboat News: The Blog

    For the first time, researchers have mapped the cell nucleus in 3D, revealing the packaging and organization of a cells DNA in unprecedented detail.


    June 8 (UPI) The nucleus of the cell is where the action happens, but its not easy to analyze the behavior of a massive genome inside an area 50 times smaller than the width of a human hair.

    Now, for the first time, researchers have mapped the cell nucleus in 3D, revealing the packaging and organization of a cells DNA in unprecedented detail.

    Inside each cell is the same massive chain of DNA. But most of the coding lies dormant. The combination of genetic sequences within in the chain that are turned off or on and expressed via RNA determines the role and functionality of each cell.

    12:00

    WebSound 2GB KVM w/ 4 cores & 100GB HDD @ ~$6.68/mo and more! Low End Box

    Callum from WebSound.co.uk has sent over another awesome offer for us all to enjoy! Theyve been around since 2013 and have had nothing but great feedback around our community.

    Theyre a registered company in the UK (VAT Number: GB 203028955). They accept PayPal, Debit/Credit Card (Stripe) or BitCoin (Coinify). You can find their ToS/Legal Documents here.

    In their own words: 

    WebSound is an affordable, reliable hosting provider launched in 2013 We have previously featured on LEB before and frequent offers around the LET community, however, we feel its time to bring a new, exclusive offer for the LEB community themselves again. We specialize in offering a variety of affordable VPS and Web Hosting services to cater for the needs of a wide range of clients, and our previous VPS hosting offers have been very popular among the community in the past, we hope that this offer can be met with the same popularity and demand as previously as we try to deliver something new and some updated features within our control panel since our last offering.

    Exclusive Offer: LEB-KVMH50 gets 50% recurring off of all KVMH plans on any billing cycle, PLUS double disk space OR double bandwidth, open a support ticket on ordering to choose which double benefit you receive!

    KVMH256
    • 256MB RAM (256MB SWAP)
    • 1 x CPU
    • 15GB HDD
    • 1TB Transfer
    • 1 x IPv4
    • /64 IPv6 Available
    • KVM (Virtualizor)
    • Promo Code: LEB-KVMH50
    • 11/yr($14.69)
    • [ORDER]
    KVMH512
    • 512MB RAM (512MB SWAP)
    • 2 x CPU
    • 25GB HDD
    • 2TB Transfer
    • 1 x IPv4
    • /64 IPv6 Available
    • KVM (Virtualizor)
    • Promo Code: LEB-KVMH50
    • 1.50/mo($2.00)
    • [ORDER]
    KVMH1024
    • 1GB RAM (1GB SWAP)
    • 2 x CPU
    • 50GB HDD
    • 3TB Transfer
    • 1 x IPv4
    • /64 IPv6 Available
    • KVM (Virtualizor)
    • Promo Code: LEB-KVMH50
    • 2.50/mo($3.34)
    • [ORDER]
    KVMH2048
    • 2GB RAM (1GB SWAP)
    • 4 x CPU
    • 100GB HDD
    • 4TB Transfer...

    12:00

    High Voltage Switching with MOSFETs Hackaday

    Using a MOSFET as a switch is generally pretty simple. Make the gate voltage sufficient with respect to the source and current flows through the channel. However, if you are switching higher voltages, you may need some additional circuitry to protect the devices gate and possibly the microcontroller driving the whole thing, too. [Lewis] discusses high voltage switching in the latest in his series of videos dealing with MOSFETs. You can see the video below.

    Youll see in the video a breadboard setup driving a 50 V load and also a higher-voltage H-bridge. There are three major topics covered: Using an optoisolator, using a gate bleeder resistor, and using a zener diode to limit gate voltage.

    Of course, an optoisolator isnt necessary with or without the high voltage, as long as everything works well. It can, however, prevent high-frequency noise from conducting from the FET channel through the gate acting as a capacitor. It can also be useful for saving the controller if there is a failure that shorts the channel to the gate.

    The bleeder resistor isnt specific to high voltages, either. Because the gate is practically an open circuit at DC, it is a good idea to add a resistor like this so that when the gate drive is off, you dont have to wait for the charge on the gate to dissipate. In addition, the resistor offers some protection against electrostatic discharge (ESD) damage, since the ESD will tend to flow through the resistor instead of punching through the gate oxide on the device.

    The zener sees service in two ways. At first, the circuit uses it to derive 12 V from the 50 V supply. However, in a later incarnation, the design uses it as a clamp to keep a P-channels gate at 12 V. These are both important because the maximum rating of the gates is 20 V.

    Although the devices in the video are IRF630s and IRF9630s, the principles apply to lots of different kind of FETs. Just remember what you kind you have and understand the datasheet before you finalize your design.

    If you want something more basic, there are plenty of tutorials. Weve even looked at high-side switches in detail.

    11:02

    Jurassic World: Can we really resurrect a dinosaur? Lifeboat News: The Blog

    This summer, the fifth instalment of the Jurassic Park franchise will be on the big screen, reinforcing a love of dinosaurs that has been with many of us since childhood. There is something awe inspiring about the biggest, fiercest, and deadest creatures that have ever walked the planet. But the films have had an additional benefit they have sparked an interest in dinosaur DNA.

    The Mr DNA sequence in the original movie is a great piece of science communication and the concept of extracting DNA from the bodies of dino blood-engorged mosquitoes is an outstanding piece of fiction. It is, however, just fiction.

    11:01

    iPhone Always Tracks your Movements SoylentNews

    A feature called Significant Locations collects a detailed history of places you visit on a regular basis. The feature can be disabled via Settings > Privacy > Location Services > System Services > Significant Locations. The feature can be disabled, and history of data collected can be deleted. Apple claims that Significant Locations are encrypted and cannot be read by anyone except the phone owner. Yet, most iPhone users are unaware that their phone records their current location and calculates which locations are significant. Why hasn't Apple made people more aware of this potential violation of their privacy?


    Original Submission

    Read more of this story at SoylentNews.

    10:42

    A Biotech Entrepreneur Aims To Help Us Stay Young While Growing Old Lifeboat News: The Blog

    Startup, Unity Biotechnology, prevents agingand its not as crazy as it seems.


    Now on his fifth startup, Ned David has the blueprint for creating a lucrative biotech. His latest project: a company that will take on the ravages of aging.

    10:16

    DistroWatch Weekly, Issue 767 DistroWatch.com: News

    This week in DistroWatch Weekly: Review: Android-x86 7.1-r1News: Running Linux From Scratch with Debian package management, TrueOS changes course, OpenMediaVault and pfSense react to GDPR, ArchLabs leaves GitHub, Haiku ports LibreOfficeTips and tricks: OpenSSH, pipes and file transfersReleased last week: Devuan 2.0.0, GeckoLinux 150Torrent corner: Archman, AUSTRUMI, Berry,....

    10:02

    America is unprepared for the jobs apocalypse automation will bring Lifeboat News: The Blog

    Millions of low-skilled workers who are already being pushed out will need to adapt to the new economy.

    10:00

    HPR2571: Kill Dr. Lucky Hacker Public Radio

    Details about Kill Doctor Lucky on Paizo.com.

    09:42

    India Increases Its Massive 2022 Renewable Energy Target Lifeboat News: The Blog

    For the last several years, CleanTechnica has covered renewable energy development in India quite closely. Several years ago, India set what seemed like a lofty target of 175 gigawatts of wind and solar energy by March 2022. Few believed that was a practical target, but then India plowed forward and happily impressed the world. This week that goal was increased to 227 gigawatts!

    Currently, India has added a little more than 70 gigawatts of that goal. Assessing the progress to date on a linear scale, the trend would seem to indicate the country is behind. However, renewable energy growth is not linear.

    09:36

    Week in review: Zip Slip, GDPR and the US, why creativity is key to security Help Net Security

    Heres an overview of some of last weeks most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos researchers have news about the VPNFilter malware, and it doesnt look good. Why creativity is key to security Security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business innovation by imposing restrictions on access, rules and controls, and responding with no. Given More

    The post Week in review: Zip Slip, GDPR and the US, why creativity is key to security appeared first on Help Net Security.

    09:30

    Bitcoin falls after Korean exchange loses $40M following hack attack HackRead

    By Waqas

    Coinrail, a South Korea-based cryptocurrency exchange has suffered a massive

    This is a post from HackRead.com Read the original post: Bitcoin falls after Korean exchange loses $40M following hack attack

    09:00

    Hackaday Links: Benchoff Rants On Flying Cars Hackaday

    Need a reverse engineering challenge? Heres something from American Science and Surplus. Its a 48 x 12 LED matrix, loaded up with driver ICs and power regulators. $20 a piece, so stock up and save.

    Finally, the main event. The biggest story in aviation this week is that a media embargo has lifted on the Kitty Hawk Flyer. Kitty Hawk is a startup funded by Larry Page, CEOd by Sebastian Thrun, and has received $6.5 M in funding. The Flyer, a one-man decacopter, was announced to the world through CNN Money and Casey Neistat. It should be noted that in the entire media landscape, these are the two outlets most ignorant of aviation: CNN needs no explanation, and Neistat flies quadcopters through the Hudson River Corridor at 1000 feet AGL. Additionally, Kitty Hawk is not exhibiting at AirVenture next month, which leads me to believe Kitty Hawk is trying to stay out of the aviation industry or simply doesnt want knowledgeable people asking them questions. But I digress.

    The Kitty Hawk Flyer is being promoted by the company as a personal flying vehicle to make flying part of everyday life and a machine that will give you, a world free from traffic. It is being billed by CNN and Neistat as a flying car. Kitty Hawk is just fine with allowing the media to call it as such. Additionally, Sebastian Thrun is making claims about the Flyer that are disingenuous at best, outright illegal at worst, and should draw the ire of any investors.

    In the CNN Money piece, Thrun claims the Flyer is capable of traveling at 100 miles per hour, which would be illegal. The Flier is certified as a Part 103 Ultralight, and under that regulation the Flyer is not capable of more than 55 knots calibrated airspeed at full power...

    08:40

    Fresh Water from Air SoylentNews

    Submitted via IRC for Fnord666

    In desert trials, next-generation water harvester delivers fresh water from air

    Scientists who last year built a prototype harvester to extract water from the air using only the power of the sun have scaled up the device to see how much water they can capture in arid conditions in Arizona. Using a kilogram of MOF[*], they were able to capture about 7 ounces of water from low-humidity air each 24-hour day/night cycle. A new and cheaper MOF could double that.

    [...] "There is nothing like this," said Omar Yaghi, who invented the technology underlying the harvester. "It operates at ambient temperature with ambient sunlight, and with no additional energy input you can collect water in the desert. This laboratory-to-desert journey allowed us to really turn water harvesting from an interesting phenomenon into a science."

    [*] Metal-organic frameworks (MOFs) are:

    compounds consisting of metal ions or clusters coordinated to organic ligands to form one-, two-, or three-dimensional structures. They are a subclass of coordination polymers, with the special feature that they are often porous. The organic ligands included are sometimes referred to as "struts", one example being 1,4-benzenedicarboxylic acid (BDC).

    Also at Berkeley News.

    Practical water production from desert air (open, DOI: 10.1126/sciadv.aat3198) (DX)


    Original Submission

    Read more of this story at SoylentNews.

    07:42

    Til Deletion Do Us Part: Discovering Love in a Virtual Future Lifeboat News: The Blog

    What does it mean to fall in love in the 21st century? Originally, the number of people you could fall in love with were limited to the amount that lived within relative close proximity of you (a few miles, at best). In todays world, however, it isnt that uncommon for people to fall in love online.


    As we move forward into a future of VR and AI, how might our abilities to fall in love change in a world where non-biological life is teeming just as much as biological life?

    07:22

    Scientists Discovered a New Part of Your Sperm and It Could Explain Infertility Lifeboat News: The Blog

    Scientists have discovered that sperm contain two centrioles, as opposed to one and that additional centriole could explain infertility.

    07:22

    Berkeleys desert water extractor is taking us one step closer to harvesting water out of thin air Lifeboat News: The Blog

    Right now, there are roughly 16 sextillion liters of water suspended in the atmosphere. The air around you is a river, you just cant see it.

    Harvesting water from air would be a game-changing solution to tackling freshwater scarcity, which is increasing as the world warms. It would be especially vital in places with very little humidity in the air, like the desert. But while its technically possibleyou just need to get the water content in the air to condense around somethingdoing so efficiently has been difficult, until now.

    The challenge with this technology is cooling. Water vapor will only condense into a liquid if the material it condenses on is cooler than the surrounding air. Thats why droplets of condensation will appear on a soda can the moment you take it out of the fridge. But how do you leave a piece of machinery in the desert sun all day and keep it cooler than the surrounding air? One way would be to install a cooling system. But it takes a a lot of energy to perpetually cool an object in a hot place, and isnt feasible in places where energy is expensive. We also dont want to increase the amount of energy demand in a world already struggling to reduce emissions.

    06:46

    Early PHP 7.3 Performance Benchmarks Are Looking Good Phoronix

    Released this week was the first alpha of PHP 7.3 and I decided to take it for a spin with some benchmarks. While not as dramatic as going from PHP5 to PHP 7.0, the performance of PHP7 continues getting better...

    06:19

    Remarkable Skill of Ancient Peru's Cranial Surgeons SoylentNews

    Submitted via IRC for Fnord666

    [...] After all, who needs a hole in the head? Yet for thousands of years, trepanation -- the act of scraping, cutting, or drilling an opening into the cranium -- was practiced around the world, primarily to treat head trauma, but possibly to quell headaches, seizures and mental illnesses, or even to expel perceived demons.

    [...] "In Incan times, the mortality rate was between 17 and 25 percent, and during the Civil War, it was between 46 and 56 percent. That's a big difference. The question is how did the ancient Peruvian surgeons have outcomes that far surpassed those of surgeons during the American Civil War?"

    [...] Whatever their methods, ancient Peruvians had plenty of practice. More than 800 prehistoric skulls with evidence of trepanation -- at least one but as many as seven telltale holes -- have been found in the coastal regions and the Andean highlands of Peru, the earliest dating back to about 400 B.C. That's more than the combined total number of prehistoric trepanned skulls found in the rest of the world.

    Source: Remarkable skill of ancient Peru's cranial surgeons


    Original Submission

    Read more of this story at SoylentNews.

    06:00

    Super Chromatic Peril Sensitive Sunglasses Hackaday

    The Joo Janta 200 super-chromatic peril-sensitive sunglasses were developed to help people develop a relaxed attitude to danger. By following the principle of, what you dont know cant hurt you, these glasses turn completely opaque at the first sign of danger. In turn, this prevents you from seeing anything that might alarm you.

    Here we see the beginnings of the Joo Janta hardware empire. For his Hackaday Prize entry, [matt] has created Nope Glasses. Is that meeting running long? Is your parole officer in your face again? Just Nope right out of that with a wave of the hand.

    The Nope Glasses are two LCD shutters mounted in a pair of 3D printed glasses. On the bridge of the glasses is an APDS 9960 gesture sensor that tracks a hand waving in front of the glasses. Waving your hand down in front of the glasses darkens the shutters, and waving up makes them clear again. Waving left flashes between clear and dark, and waving right alternates each shutter.

    In all seriousness, there is one very interesting thing about this project: how [matt] is attaching these LCD shutters to his glasses. This was done simply by taking a picture of the front and top of his glasses, converting those to 1-bit BMPs, and importing that into OpenSCAD. This gave him a pretty good idea of the shape of his glasses, allowing him to create an attachment for his glasses. Its great work, and wed really like to see more of this technique.

    The HackadayPrize2018 is Sponsored by:

    04:49

    Links 10/6/2018: Devuan ASCII 2.0.0 and Tails 3.7.1 Techrights

    GNOME bluefish

    Contents

    GNU/Linux

    • Desktop

      • Linux Apps (Crostini) Headed To A Lot More Chromebooks

        The Chromium developers have been very busy as of late bringing life to the Crostini Project that will give users the ability to run Linux apps natively on Chrome OS. While Linux on Chromebooks isnt a new trick, the Crostini UI presents a clean, hack-free method to launch Linux apps from the terminal app that will eventually live in Chrome OSs app drawer when enabled.

        Initially birthed in Googles own Pixelbook, Linux apps on Chrome OS has now spread to ARM in the form of the Samsung Chromebook Plus. Although its still in its infancy, its becoming clear that developers are pushing to make the Crostini project a stable part of the Chromebook ecosystem.

      • Battery on my new Librem 13

        Being lazy, I wanted a way to automate that when using my new Librem laptop. Again, I could look into a power/charging threshold for the Librem. But for less than $20, I picked up a power strip that had a timer (Century 8 Outlet Surge Protector with Mechanical Timer). Four outlets on the strip are always on, and four are connected to a built-in timer. That allows me to plug in my monitor and LED desk light to an always-on outlet, and my laptop to a timed outlet. I still turn the power strip off when Im not using the computer, but thats a habit Ive had for ages, so thats not a big deal.

        The power needs for a laptop arent that big, so Im not worried about over-taxing the power strip. This thing is built to run high-load devices like an aquarium water pump and light, or a heat lamp for a terrarium. The Librem runs a pretty light load in comparison: about 60-80W when charging the battery, according to user Derriell on the Purism forum.

        Im still tweaking the duty cycle. My goal is to exercise the battery somewhere between 20% and 80%. The Librem 13 will run on battery for roughly seven to nine h...

    04:22

    Ethical Artificial Intelligence is the need of the hour Lifeboat News: The Blog

    At a time when governments and organisations across the world are trying to harness the powerful technology, the need for an ethical AI has never been more important.

    Kul Bhushan

    04:22

    Cancer hasnt got a chance with this new immunotherapy technique Lifeboat News: The Blog

    Researchers now have an antibody that specifically targets cancer cells, while leaving healthy ones alone.

    03:58

    Real-Time Drone Surveillance System for Violent Individuals Identification SoylentNews

    A new algorithm has been used to detect violence in drone-captured video footage:

    A drone surveillance system capable of highlighting "violent individuals" in a crowd in real time has been built by [researchers].

    The artificially intelligent technology uses a video camera on a hovering quadcopter to study the body movements of everyone in view. It then raises an alert when it identifies aggressive actions, such as punching, stabbing, shooting, kicking, and strangling, with an accuracy of about 85 per cent. It doesn't perform any facial recognition it merely detects possible violence between folks. And its designers believe the system could be expanded to automatically spot people crossing borders illegally, detect kidnappings in public areas, and set off alarms when vandalism is observed.

    The inventors are based at the University of Cambridge, in England, India's National Institute of Technology, and the Indian Institute of Science. They hope their autonomous spy drones will help cops crush crime and soldiers expose enemies hiding in groups of innocents.

    Also at Science Magazine.

    Eye in the Sky: Real-time Drone Surveillance System (DSS) for Violent Individuals Identification using ScatterNet Hybrid Deep Learning Network (arXiv:1806.00746)


    Original Submission

    Read more of this story at SoylentNews.

    03:42

    Project Daedalus, Qiao Chen Lifeboat News: The Blog

    A concept of a space ship. Made by 3dsmax.

    03:30

    Search Engines in Russia cannot link to banned VPN services and Internet proxy services Security Affairs

    Russia strengthens online censorship by announcing fines for search engines that link to VPN serviced banned in the country.

    Russian Government has approved a new bill to punish search engines that are not aligned with Moscow and that allows its users to find VPN services, and anonymization tools that allow circumventing the censorship.

    According to the amendments to the Code of Administrative Offenses of the Russian Federation, Duma will also impose fines on search engines if they will continue to provide results about queries on an up-to-date database of blocked domains upon users request.

    Fines for individuals will range between 3,000 and 5,000 rubles (roughly $48 to $80), while officials will face fines up to 50,000 rubles (roughly $800), and legal entities will face fines between 500,000 to 700,000 (roughly $8,019 to $11,227).

    The failure of the operator to perform the search system to connect to this system entails the imposition of an administrative fine on citizens in the amount of three thousand to five thousand rubles; on officials from thirty thousand to fifty thousand rubles; on legal entities from five hundred thousand to seven hundred thousand rubles, - reads the press release published by the Duma.

    Russians ordinary use VPN services and other anonymizing services to access blocked content and bypass censorship, in the following graph we can see the continuous growth for the number of Tor users in Russia.

    Search Engines Tor User VPN Russia

     

    In 2017, Russias parliament voted to ban web tools that could be used by people to surf outlawed websites, and the Duma approved the proposed bill to oblige anyone usi...

    03:22

    New game Star Wars Jedi: Fallen Order will let you play a Jedi Lifeboat News: The Blog

    It will be set between Revenge of the Sith and A New Hope.


    Titanfall developer Respawns Vince Zampella gave us a small teaser during todays EA conference at E3, and while there arent many details yet, what we know so far sounds juicy. Yes, theres a new Star Wars game dropping holiday 2019 called Jedi: Fallen Order, and its being made by the people behind one of the best shooters of this generation, Titanfall 2.

    According to the games website, Jedi: Fallen Order will take place during the period shortly after Revenge of the Sith, following a surviving Padawan during the dark times of the franchise when the Jedi are being hunted down. Zampella said on Twitter that itll be a single-player story game thats dark and gritty.

    Thats not much to got on, as Respawn didnt release a trailer, key art, or anything else, but Zampella did note that youll get to wield a lightsaber. Given that Respawn is behind the game, theres plenty of reason to be excited.

    03:22

    Priests and scientists talk neuroscience, cosmology, and philosophy Lifeboat News: The Blog

    The typical contemporary view assumes that there is going to be some deep tension between faith and science. From our perspective thats an illusion.


    Washington D.C., Jun 10, 2018 / 05:00 am (CNA).- A Thomistic philosopher, an evolutionary biologist, and a Harvard astronomy professor walk into a bar. Well, not a bar.

    But they did walk into a Washington, D.C. symposium this week, at which graduate students, professors, religious sisters, and other curious Catholics discussed highly technical scientific questions over bourbon and pecan pie, late into the night.

    The three-day conference, co-sponsored by the Thomistic Institute and the Society of Catholic Scientists, brought together nearly 70 professors and graduate students from Princeton, Harvard, Yale, MIT, the University of Chicago, and other universities across the country to examine the intersection of faith and science.

    03:22

    The asteroid rush sending 21st-century prospectors into space Lifeboat News: The Blog

    A race is on to mine billions of dollars in resources from the solar systems asteroids, fuelling our future among the stars.

    03:00

    Joe Grand is Hiding Data in Plain Sight: LEDs that Look Solid but Send a Message Hackaday

    Thursday night was a real treat. I got to see both Joe Grand and Kitty Yeung at the HDDG meetup, each speaking about their recent work.

    Joe walked us through the OpticSpy, his newest hardware product that had its genesis in some of the earliest days of data leakage. Remember those lights on old modems that would blink when data is being transmitted or received? The easiest way to design this circuit is to tie the status LEDs directly to the RX and TX lines of a serial port, but it turns out thats broadcasting your data out to anyone with a camera. You cant see the light blinking so fast with your eyes of course, but with the right gear you most certainly could read out the ones and zeros. Joe built an homage to that time using a BPW21R photodiode.

    Transmitting data over light is something that television manufacturers have been doing for decades, too. How do they work in a room full of light sources? They filter for the carrier signal (usually 38 kHz). But what if youre interested in finding an arbitrary signal? Joes bag of tricks does it without the carrier and across a large spectrum. It feels a bit like magic, but even if you know how it works, his explanation of the hardware is worth a watch!

    The demos of OpticSpy pulling data out of a seemingly solid red LED were a blast to see. Im glad that Joe also spend time walking through the circuit:

    ...

    03:00

    Ankur Bargotra joins our blog team with the post What Is Cognitive Computing (How AI Will Think). Lifeboat News

    Ankur Bargotra joins our blog team with the post "What Is Cognitive Computing (How AI Will Think)".

    02:40

    Re: Re : Re: [oss-security] CVE-2018-12020 in GnuPG Open Source Security

    Posted by Yves-Alexis Perez on Jun 10

    Hi Stepian,

    Not entirely sure what you mean here, but if you're talking about the apt
    package managers (which relies on gpgv for signature verification), it's
    currently investigated.

    ecurity-tracker.debian.org/tracker/CVE-2018-12020

    Regards,

    01:59

    What Is Cognitive Computing (How AI Will Think) Lifeboat News: The Blog

    Recommended Books

    Life 3.0 https://amzn.to/2KZdRU0
    The Master Algorithm https://amzn.to/2jV1egi
    Superintelligence https://amzn.to/2rCXzqQ

    This video is the eleventh in a multi-part series discussing computing. In this video, well be discussing what cognitive computing is and the impact it will have on the field of computing.

    [0:285:09] Starting off well discuss, what cognitive computing is, more specifically the difference between current computing Von Neuman architecture and more biologically representative neuromorphic architecture and how these two paired together will yield massive performance and efficiency gains!

    [5:0910:46] Following that well discuss, the benefits of cognitive computing systems further as well as current cognitive computing initiatives, TrueNorth and Loihi.

    [10:4617:11] To conclude well extrapolate and discuss the future of cognitive computing in terms of brain simulation, artificial intelligence and brain-computer interfaces!

    01:44

    JT4G detection algorithm for DSLWP-B Daniel Estvez

    Now that DSLWP-B has already been for 17 days in lunar orbit, there have been several tests of the 70cm Amateur Radio payload, using 250bps GMSK with an r=1/2 turbo code. Several stations have received and decoded these transmissions successfully, ranging from the 25m radiotelescope at PI9CAM in Dwingeloo, the Netherlands (see recordings here) and the old 12m Inmarsat C-band dish in Shahe, Beijing, to much more modest stations such as DK3WNs, with a 15.4dBic 20-element crossed yagi in RHCP. The notices for future tests are published in Wei Mingchuan BG2BHCs twitter account.

    As far as I know, there have been no tests using JT4G yet. According to the documentation of WSJT-X 1.9.0, JT4G can be decoded down to -17dB SNR measured in 2.5kHz bandwidth. However, if we dont insist on decoding the data, but only detecting the signal, much weaker signals can be detected. The algorithm presented here achieves reliable detections down to about -25dB SNR, or 9dB C/N0.

    This possibility is very interesting, because it enables very modest stations to detect signals from DSLWP-B. In comparison, the r=1/2 turbo code can achieve decodes down to 1dB Eb/N0, or 25dB C/N0. In theory, this makes detection of JT4G signals 16dB easier than decoding the GMSK telemetry. Thus, very small stations should be able to detect JT4G signals from DSLWP-B.

    As described in the WSJT-X documentation, the JT4 family uses 4FSK at 4.375baud. A total of 206 symbols are transmitted over the 47.09s that a complete message lasts. A pseudo-random 206 bit sync vector is used for time and frequency synchronization. The sync vector is the following (note that there is an error in the WSJT-X documentation):

    000110001101100101000000011000000000000101101101011111010001
    001001111100010100011110110010001101010101011111010101101010
    111001011011110000110110001110111011100100011011001000111111
    00110000110001011011110101
    

    The autocorrelation function of this sequence is shown below, both in a linear scale and in dB units.

    ...

    01:42

    Elon Musk has job openings for more than 500 people at SpaceX heres who the rocket company wants to hire Lifeboat News: The Blog

    SpaceXs careers page shows that the rocket company, which Elon Musk founded in 2002, is on a hiring spree. New hires seem to be working on the Starlink

    01:39

    SpaceX Plans to Expand Presence at Kennedy Space Center SoylentNews

    SpaceX plans to build an Operations Area on 63-67 acres between the Kennedy Space Center's Vehicle Assembly Building and Industrial Center. The highlights include 300-foot tall tower housing a launch and landing control center, a booster and fairing processing and storage facility, and a rocket garden:

    It will be an operational monument to Elon Musk's vision: a towering SpaceX launch control center, a 133,000-square-foot hangar and a rocket garden rising in the heart of Kennedy Space Center.

    According to plans detailed in a draft environmental review published recently by KSC, SpaceX will undertake a major expansion of its facilities at the space center sometime in the not-too-distant future.

    The review says SpaceX is seeking more room and a bigger presence "in its pursuit of a complete local, efficient, and reusable launch vehicle program."

    The expansion would enable SpaceX to store and refurbish large numbers of Falcon rocket boosters and nose cones at the operations center down the road from NASA's Vehicle Assembly Building.


    Original Submission

    Read more of this story at SoylentNews.

    01:17

    Rampant Kodi Malware? Its Time to Either Put Up or Shut Up TorrentFreak

    Faced with a tsunami of pirated movies and TV shows being accessed at will through millions of piracy-enabled set-top boxes, entertainment industry groups have had to come up with a new anti-piracy strategy.

    The main goal seems to demonize these devices in the press, creating the impression that anyone using them puts themselves in danger, either due to fire risk or exposure to the perils of viruses and malware.

    These claims are perfect tabloid material. Newspapers, particularly in the UK, gobble up press releases and quickly spin them out, whether they have any substance to them or not. While theres little evidence that the scare stories are working as a deterrent among the pirating masses, they are a continuous source of irritation for those who know better.

    This week a new Kodi-related video appeared on YouTube. Filmed at the RSA conference and presented by CyberScoop editor Greg Otto, it consists of a short interview with Kurtis Minder, CEO of security company GroupSense. How malware is growing on the Kodi/XMBC platform was the topic.

    After a brief introduction on so-called Kodi boxes, Otto put it to Minder that his company had been looking into the malware that has been floating through these boxes and asked him to elaborate.

    Minder said his company started its research around two months ago, working with the Digital Citizens Alliance (DCA). Of course, DCA has been one of the main sources of Kodi-related malware stories, ostensibly for the protection of consumers.

    However, DCA is affiliated with the entertainment industries and there is little doubt theyre being used to promote an anti-piracy agenda. There is nothing inherently wrong with companies trying to protect their content, of course, but doing so in a way that has the potential to mislead the public is bound to raise questions.

    Back to the video, Minder told interviewer Otto that his company had been looking at what the attack footprint would be for malware on the media that would show up on any given Kodi box that would be in someones home.

    Its a curious statement to talk about the streaming media itself providing an attack vector but Minder doubled down, stating that theyd discovered several places on the dark web where people are selling malware-enabled media.

    Otto didnt ask Minder to elaborate on these claims and Minder didnt respond to TFs request for comment, so we still have n...

    01:06

    25-Way NVIDIA/AMD Linux Graphics Comparison For Vulkan-Powered Thrones Of Britannia Phoronix

    This week Mac/Linux game porting company released the Linux port of A Total War Saga: THRONES OF BRITANNIA, just two months after this game was released for Windows. With the Linux port of this strategy game the Vulkan API is being used for graphics rendering, which makes it interesting for benchmarking. Here is our extensive look at the performance of this major Linux game port when testing twenty-five different AMD Radeon and NVIDIA GeForce graphics cards to see how this game is performing on Ubuntu Linux.

    01:04

    Re : Re: [oss-security] CVE-2018-12020 in GnuPG Open Source Security

    Posted by Stiepan on Jun 10

    Hello to both,

    This responsibility discussion is all well and fine, but now that this is half-public, may we know for sure whether we
    are affected :
    1. as debian(-like) package consumers
    2. as users of GPG for other purposes, such as webmail (have CC-ed protonmail to that regard)
    and since when, so as to do proper rollbacks or other applicable mitigations (w.r.t packages) ?
    By the way, this is why I think disclosure of such issues and...

    00:32

    Vote to End Fractional Reserve Banking in Switzerland cryptogon.com

    Via: Reuters: A radical plan to transform Switzerlands financial landscape by barring commercial banks from creating money when they lend looked set to fail, according to initial projections on Sunday. The vote, called under Switzerlands system of direct democracy after gathering more than 100,000 signatures, wanted to make the Swiss National Bank (SNB) the []

    Sunday, 10 June

    22:51

    Facebook provided user data to some third parties after promising to limit access: report The Hill: Technology Policy

    Facebook reportedly made agreements to share certain user data with a handful of companies even after it had said it no longer allowed such practices, raising new questions about the companys privacy policies.The Wall Street Journal reported Sunday...

    IndyWatch Science and Technology News Feed Archiver

    Go Back:30 Days | 7 Days | 2 Days | 1 Day

    IndyWatch Science and Technology News Feed Today.

    Go Forward:1 Day | 2 Days | 7 Days | 30 Days

    IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

    Resource generated at IndyWatch using aliasfeed and rawdog