IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Sunday, 17 September

02:45

Linux RAID Performance On NVMe M.2 SSDs Phoronix

For boosting the I/O performance of the AMD EPYC 7601 Tyan server I decided to play around with a Linux RAID setup this weekend using two NVMe M.2 SSDs. This is our first time running some Linux RAID benchmarks of NVMe M.2 SSDs and for this comparison were tests of EXT4 and F2FS with MDADM soft RAID as well as with Btrfs using its built-in native RAID capabilities for some interesting weekend benchmarks.

01:48

Dip update 84/n wherestheflux

[Orig: Sept 16, 2017]
Hi everyone,
Here is the latest from LCO.  Note that I have dropped one of the comparison stars from OGG because it was occasionally falling on a part of the camera's CCD with a hot pixel. LSU grad student Tyler Ellis has developed a nifty method using Gaussian Processes to 'fix' these pixels, however we will omit using this comparison star in these posts until all the data are run through his pipeline.   
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      

01:35

Daimler Has New Electric Trucks and a Buyer for Them: the United Parcel Service SoylentNews

On Thursday, Daimler announced that it would bring its line of short-haul electric trucks to the US. The United Parcel Service (UPS) will buy the first three trucks, and Daimler is also offering eight trucks to New York City-based non-profits, including the Wildlife Conservation Society, the New York Botanical Garden, Habitat for Humanity New York City, and Big Reuse Brooklyn.
...
The Fuso eCanter trucks will have a range of 62 miles (or about 100km) and will be sold in Japan and Europe as well. Daimler said it's only planning on producing 500 trucks in the next year, but it intends to start mass-producing the trucks in 2019. It's unclear how much these trucks cost.

The trucks have a load capacity of three and a half tons, Daimler said, with a powertrain that draws on "six high-voltage lithium-ion battery packs with 420 V and 13.8 kWh each."

New York City and the Bronx in particular have asthma rates several times the national average. Many blame the high levels of trucking in the city. Shifting delivery fleets to EVs could help.


Original Submission

Read more of this story at SoylentNews.

01:33

Experimental Nouveau Reclocking Patches Updated, Including For Maxwell GPUs Phoronix

Karol Herbst has sent out 29 updated patches on Friday for a major rework to the Nouveau clock related code for re-clocking and related functionality. This includes a "hacky workaround" for getting re-clocking to function on GeForce GTX 900 "Maxwell 2" GPUs...

01:22

MIPS Changes Submitted For Linux 4.14: NI 169445, Omega2+, MT7628A Support Phoronix

There are many MIPS updates to find with the in-development Linux 4.14 kernel...

01:02

Nokia 9 spotted running Android 8.0 Oreo on GFXBench TechWorm

GFXBench listing shows Nokia 9 running on Android 8.0 Oreo

HMD Globals upcoming and anticipated flagship, Nokia 9 has been in the news for a while now due to its leaked designs, rumored specifications, pricing and release date.

While Nokia 9 has been able to keep Nokia fan lovers on the edge with the constant rumor mill surrounding it, the device was recently spotted on the benchmarking website GFXBench. According to the listing, the upcoming handset will be running Googles latest operating system, Android 8.0 Oreo and not the Android 7.1.1 Nougat out-of-the-box as suggested by previous reports. This news should not come as a surprise as HMD had already confirmed an Oreo update for all its existing devices with the operating system being pushed to Android Open Source Project (AOSP).

The GFXBench listing claims the Nokia 9 will come with the Qualcomm Snapdragon 835 chipset, 4GB of RAM, Adreno 540 GPU and 64GB of internal storage. It is also said to feature a QHD (1440 x 2560 pixels) display with a screen size of either 5.2-inch or 5.3-inch. If we go by previous reports, Nokia 9 could come in more than one RAM/ storage variant 6GB or 8GB of RAM and 128GB of internal storage. The smartphone is also rumoured to house a 3,800mAh battery.

On the imaging front, the listing shows that Nokia 9 has a dual camera setup with a 12-megapixel camera at the rear, which would also have 4K video recording capabilities. It also shows a 12-megapixel front camera capable of recording 4K UHD videos and will feature autofocus, face detection, flash, HDR support, and touch focus.

Nokia 9 is also expected to have other features such as fingerprint scanner, IP68 certification for water and dust resistance, Quick Charge 4.0 support, and an iris scanner.

Nokia 9 spotted running Android 8.0 Oreo on GFXBench

If one has to go by all the leaks, the Nokia 9 is a premium category smartphone with top-of-the-line specifications. However, HMD Global has yet to officially comment on the smartphone. Keep watching this space for more details and updates on Nokia 9.

 

 

The post Nokia 9 spotted running Android 8.0 Oreo on GFXBench appea...

00:40

00:36

Motorola reveals which phones will get Android 8.0 Oreo upgrade TechWorm

Motorola releases list of phones that will get Android 8.0 Oreo update

All those Motorola smartphone owners who are looking to enjoy new features of the Googles newly released Android 8.0 Oreo operating system can rejoice now, as Motorola Mobility, a subsidiary of Lenovo, has released a list of the Moto devices that will receive Android 8.0 Oreo update.

Were happy to confirm Android 8.0 Oreo will be joining our fleet of Motorola smartphones, starting this fall, read the companys blogpost. Motorola also has an online tool that allows its handset owners to select their carrier and phone to find out if/when it will be updated.

The smartphones that are set to be updated to Android 8.0 Oreo are

  • Moto Z2 Force
  • Moto Z2 Play
  • Moto Z Force DROID
  • Moto Z
  • Moto Z Play
  • Moto G5
  • Moto G5 Plus
  • Moto GS5
  • Moto GS5 Plus

The company has also asked its users to stay tuned with Motorola for the status of updates on its customer support page. On the other hand, Motorolas other three flagships, namely Moto G4 Play, Moto G4, and Moto G4 Plus that are running Android Nougat and are more than over a year old are not included in the list, hinting that these might not get upgraded to Android 8.0 Oreo.

The Android 8.0 Oreo will bring a number of new features and improvements to the Moto Android smartphones. Moto smartphone owners will enjoy faster speeds, longer battery life, split-screen capabilities, smart text selection, improved notifications, autofill framework for your trickiest of passwords, and of course, the all-new Google Play Protect, helping to ensure none of your apps become compromised, confirmed the company in their blogpost.

In addition, Android 8.0 Oreo will also include picture-in-picture multitasking, allow users to watch YouTube videos while replying to a text or check their e-mails and much more.

Besides Motorola, several smartphone makers like Samsung, Nokia, Huawei, OnePlus, HTC, LG, Sharp and Sony have also confirmed Android 8.0 Oreo for their devices.

The post Motorola reveals which phones will get Android 8.0 Oreo upgrade appeared first on TechWorm.

00:30

Fidget Spinner Gets Useful as MIDI Controller Hackaday

Fidget spinners are not only a fad, but pretty much useless. Sounds like a job for hacking to make the toys have some actual purpose. [D777k] took up the challenge and created a MIDI controller from a common spinner. You can see a video of the results, below.

The device uses a LightBlue Bean controller and Garage Band as the MIDI software. Granted, it might not be super useful, but it is better than just a plain old spinner. [D777k] calls it a whirling dervish of sound making!

The Arduino code that drives the thing is very simple. It reads three axes of acceleration and uses that to drive the MIDI software. When the acceleration exceeds a threshold, the software creates a new note based on the sums and differences of the accelerations.

The Lightblue Bean isnt anything new, but it is well suited for this kind of service. Certainly, making a toy into a MIDI controller isnt an original idea, either. But it sure is fun.


Filed under: Arduino Hacks

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 16 September

23:18

Animated Genitals Spread Chlamydia Awareness in Sweden SoylentNews

Submitted via IRC for TheMightyBuzzard

Adopting the format of a movie trailer, Kronoberg County's "The Test" video features a host of animated sex organs and a Hollywood-style voice-over. The narrator sets the scene by ominously informing the viewer:

"It all started as the perfect love story, a time of lust and trust, where each night is an adventure... but danger lurks between the sheets."

The County's head of public health and social development told The Local they were all thrilled when the advertising company that produced the video showed them it for the first time.

"We all thought it was really great and fun, but also informative and different. It's exciting, we really liked it," Annika Magnerot said.

The video can be found on Youtube.

Source: https://www.thelocal.se/20170914/video-animated-action-movie-genitals-spread-chlamydia-awareness-in-sweden


Original Submission

Read more of this story at SoylentNews.

22:52

How do we survive?: fearful Californians prepare for nuclear attack Lifeboat News: The Blog

Retired Lt Col Hal Kempfer and his group, Knowledge and Intelligence Program Professionals, see Long Beach as a prime target for an attack from North Korea.

22:32

The future is coming. Heres what it might look like Lifeboat News: The Blog

Sylvie Albert discusses the impact emerging technologies will have on society.

22:24

OurMine hacked Vevo and leaked 3.12 TB internal files, then delete them Security Affairs

The notorious OurMine hacker crew has claimed responsibility for the breach of the popular video streaming service Vevo.

Another clamorous data breach made the headlines again, this time the victim is the popular video streaming service Vevo that was hacked by the popular hacking group OurMine.

Vevo is an American multinational video hosting service founded on December 8, 2009, as a joint venture between the big three record companies, Universal Music Group (UMG), Sony Music Entertainment (SME) and Warner Music Group (WMG).

It also owned by the official media organization of the Government of Abu Dhabi, Abu Dhabi Media,  and Alphabet Inc, the parent company of Google Alphabet Inc.

The notorious Saudi Arabian OurMine group has hacked Vevo and leaked about 3.12 TB worth of internal files.

vevo hack ourmine
OurMine accessed Vevos data including internal sensitive office documents, videos, and promotional materials.

vevo hack ourmine 2.png
OurMine leaked the huge trove of data, roughly 3.12 terabytes stolen from the servers of the company, on its website on late Thursday.

Later the company removed the stolen information from the website on Vevos request.

OurMine group leaked data from Vevo after one of its employees was disrespectful to an OurMine member on LinkedIn.

OurMine first attempted to warn Vevo of the data breach privately, unfortunately for the company, one of its employees responded,

F*** off, you dont have anything, it went public with the data breach and leaked Vevo files.

and in response, the hacker group leaked the precious files.

OurMine shared the following motivation about the hack.

We leaked it because y...

21:47

The Graphics Talks Of The 2017 Open-Source Summit NA Phoronix

This week the Linux Foundation hosted their annual Open-Source Summit 2017 North America. There were two graphics talks this year led by Collabora developers...

21:35

Ultimate guide to boot into safe mode in windows 10 ,7 & 8.1 Thzone.net

Boot safe mode in windows 10

When you enter Safe Mode in Windows 10, the operating system loads a minimal user interface, with only the essential services and drivers needed for it to function. Heres how it looks:

1. Use the System Configuration tool (msconfig.exe)

One of the easiest methods to boot into Safe Mode in Windows 10 is to use the System Configurationtool. Many users know this tool by its executable name: msconfig.exe.

The fastest way to launch System Configuration in Windows 10 is to use the Run window. To do that, simultaneously press on the Windows + R keys on your keyboard. Then,

write msconfig in the Open text field, and press Enter or OK.

Another way of opening the System Configuration Tool is to use Cortana. In the search field from your taskbar, enter the words system configuration. Then click or tap on the System Configuration shortcut.

In the System Configuration window, click or tap the Boot tab. In the Boot options section, select the Safe...

21:30

We Are Now At DEFCON 2 Hackaday

If you had a working DEFCON meter that reported on real data, would it be cool or distressing?

Before we get ahead of ourselves: no, not that DEF CON. Instructables user [ArthurGuy] is a fan of the 1983 movie  War Games, and following a recent viewing hacker senses a-tingling he set to work building his own real-time display.

Making use of some spare wood, [ArthurGuy] glued and nailed together a 10x10x50cm box for the sign. Having been painted white already at some point, the paint brilliantly acted as a reflector for the lights inside each section. The five DEF CON level panels were cut from 3mm pieces of coloured acrylic with the numbers slapped on after a bit of work from a vinyl cutter.

Deviating from a proper, screen-accurate replica, [ArthurGuy] cheated a little and used WS2812 NeoPixel LED strips 12 per level and used a Particle Photon to control them. A quick bit of code polls the MI5 terrorism RSS feed and displays its current level sadly, its currently at DEFCON 2.

Its not all doom and gloom, though, because you can reconfigure such a display to track whatever you might like!


Filed under: led hacks

21:27

The DRM Changes For The Linux 4.14 Kernel Phoronix

With the Linux 4.14 merge window period combined with the fact of the DRM pull request having been submitted early this cycle, I didn't have a chance to provide a recap of the Direct Rendering Manager changes for 4.14. Here's that overview for those not in tune with the many individual articles that had been written about the different Linux 4.14 graphics driver changes...

21:08

Linux 4.14 Dropping In-Tree Firmware Phoronix

Linux 4.14 is getting rid of its in-kernel firmware/ tree...

20:53

Martin Shkreli's $5 Million Bail Revoked for Facebook Post Seeking Hillary Clinton's Hair SoylentNews

Martin Shkreli has been jailed following a peculiar Facebook post:

Martin Shkreli, the former pharmaceutical executive who is awaiting sentencing for a fraud conviction, was sent to jail on Wednesday after a federal judge revoked his bail because he had offered $5,000 for a strand of Hillary Clinton's hair.

Mr. Shkreli, who was free on $5 million bail while he awaited sentencing, had made two Facebook posts offering cash to anyone who could "grab a hair" from Mrs. Clinton during her book tour.

At the hearing in Federal District Court in Brooklyn, Judge Kiyo A. Matsumoto said that Mr. Shkreli's post could be perceived as a true threat. "That is a solicitation to assault in exchange for money that is not protected by the First Amendment," she said.

Also at CNBC and Bloomberg.


Original Submission

Read more of this story at SoylentNews.

20:36

The Pirate Bay Website Runs a Cryptocurrency Miner (Updated) TorrentFreak

Four years ago many popular torrent sites added an option to donate via Bitcoin. The Pirate Bay was one of the first to jump on board and still lists its address on the website.

While theres nothing wrong with using Bitcoin as a donation tool, adding a Javascript cryptocurrency miner to a site is of a totally different order.

A few hours ago many Pirate Bay users began noticing that their CPU usage increased dramatically when they browsed certain Pirate Bay pages. Upon closer inspection, this spike appears to have been caused by a Bitcoin miner embedded on the site.

The code in question is tucked away in the sites footer and uses a miner provided by Coinhive. This service offers site owners the option to convert the CPU power of users into Monero coins.

The miner does indeed appear to increase CPU usage quite a bit. It is throttled at different rates (weve seen both 0.6 and 0.8) but the increase in resources is immediately noticeable.

The miner is not enabled site-wide. When we checked, it appeared in the search results and category listings, but not on the homepage or individual torrent pages.

There has been no official comment from the site operators on the issue (update, see below), but many users have complained about it. In the official site forums, TPB supermoderator Sid is clearly not in agreement with the sites latest addition.

That really is serious, so hopefully we can get some action on it quickly. And perhaps get some attention for the uploading and commenting bugs while theyre at it, Sid writes.

Like many others, he also points out that blocking or disabling Javascript can stop the automatic mining. This can be done via browser settings or through script blocker addons such as NoScript and ScriptBlock. Alternatively, people can block the miner URL with an ad-blocker.

Whether the miner is a new and permanent tool, or perhaps triggered by an advertiser, is unknown at the point. When we hear more this article will be updated accordingly.

Update: We were told that the miner is being tested for a short period (~24 hours) as a new way to generate revenue. This could eventually replace the ads on the site. More info may be revealed later.

Source: TF, for the latest info on c...

20:12

Time of reckoning for US employers over opioid abuse Lifeboat News: The Blog

The US is in a opioid addiction crisis that has been described as a national epidemic by health officials. Each day 91 people die after overdosing on the drugs, according to the Centers for Disease Control and Prevention. More Americans now die from drug overdoses than in car accidents or from gun violence put together, and more than 2.6m are addicted to opioids, according to CDC figures.


Health insurance system is partly to blame for the epidemic that is costing companies $18bn a year.

19:43

Vevo Music Video Service Hacked 3.12TB of Internal Data Leaked The Hacker News

OurMine is in headlines once againthis time for breaching the popular video streaming service Vevo. After hunting down social media accounts of HBO and defacing WikiLeaks website, the infamous self-proclaimed group of white hat hackers OurMine have hacked Vevo and leaked about 3.12 TB worth of internal files. Vevo is a joint venture between Sony Music Entertainment, Universal Music Group,

19:01

Equifax- or the new gold standard for how not to do Incident Response! Security Affairs

The cybersecurity expert Stuart Peck, Director of Cyber Security Strategy, ZeroDayLab, shared its view on the Equifax data breach.

For those of you living under a rock this week, Equifax suffered a major breach in their security, which led to over 143 million records being stolen by attackers. The information held by Equifax is highly sensitive, especially for US citizens, where personal and financial information including SSN (Social Security Numbers), and credit card data were stolen by the attackers. There is the possibility that over 44 million records in the UK and Canada may also be affected.

What might be news to you that this breach happened in May this year with the attackers being undetected by Equifax security teams until July 29th. Initial indications point towards the attacker(s) exploiting a vulnerability in Apache Struts, giving them access to a vast amount of information. What has not been fully confirmed by Equifax is whether the core database which includes credit file reports has also been compromised by the attackers.

Equifax

So why is this the new gold standard for how not to do Incident Response?

There are very many ways Equifax could have handled this breach better, probably more than I can fit into a 700-word article, however, I will try to address the main points here.

  • If you know about a security breach come out quickly with an accurate and strong message

Whats interesting, and also disastrous for Equifax is that the business knew about a significant breach in their informational systems, for almost 2 months, before publicly announcing the incident. Now, this alone would be enough to damage any potential empathy from their customers, if they came out with we are a victim too angle.

However, Equifax performed the Incident Response cardinal sin, they protected their own interests before those of their customers they clearly let down, with key shareholders dumping their stock before publicly announcing the breach!

The fact Equifax had put their interests first (or created that perception), this meant that a potential were a victim too card from a crisis communications perspective was no longer a viable option,...

18:30

DIY Diner Booth with Cocktail Table Arcade Hackaday

[Glennzo] has a house with some odd interior design choices. The most glaring one is a living room/den complete with a green Jacuzzi hot tub straight out of the 1980s. The tub really didnt fit with [Glennzos] plan to use the space as a bar and game room, so out came the Sawzall and demo hammer. The tub was in its own little alcove, possibly a converted closet. [Glennzos] turned the space into a restaurant style booth complete with a cocktail arcade table.

The fiberglass tub was relatively easy to cut up and remove. This left the wood framed tile tub surround. The surround was extended to become a booth seat. A bit of creative woodworking, some vinyl cushions, and the booth itself was ready. But what good is a booth without a table?

The cocktail table arcade machine is powered by a mini-tower running MAME. The monitor is an old 21 LCD. The frame of the table is plywood and pine lumber, finished with stain and polyurethane. The illuminated buttons and interface came from an arcade control kit, which made wiring a snap. The table is topped off with a custom 3/8 thick piece of glass.

The final product looks great and fits the room perfectly. Now [Glennzo] just needs a BarBot to finish off the perfect hacker and gamer paradise!


Filed under: home entertainment hacks

18:25

Harvard Dean Rescinds Chelsea Mannings Visiting Fellow Invitation, Calling It a Mistake SoylentNews

Harvard Dean Rescinds Chelsea Manning's Visiting Fellow Invitation, Calling It a 'Mistake'

Harvard's Kennedy School of Government rescinded a visiting fellowship offered to Chelsea Manning, the former military intelligence analyst who spent seven years in prison for leaking classified government secrets, after the university faced forceful backlash from CIA Director Mike Pompeo among others.

"I now think that designating Chelsea Manning as a Visiting Fellow was a mistake, for which I accept responsibility," Douglas W. Elmendorf, the school's dean, wrote in a 700-word statement released shortly after midnight Friday.

Manning was one of four visiting fellows announced two days earlier by the Kennedy School's Institute of Politics. As part of the program, visiting fellows appear on Harvard's campus for speaking engagements and events, interacting with undergraduate students on "topical issues of today," the school's initial announcement explained.

Elmendorf decided to withdraw the invitation after realizing that "many people view a Visiting Fellow title as an honorific," though the school had not intended to "honor [Manning] in any way or to endorse any of her words or deeds."

The Establishment called.

Harvard withdraws Chelsea Manning fellowship after CIA response

Harvard University invited Chelsea Manning to be a visiting fellow, but withdrew the invitation after CIA Director Mike Pompeo wrote:

The students there are now owed an institution that acts responsibility; an institution that does not sanction or legitimize the criminal path Ms. Manning took to undermine our national security.


Original Submission #1 Original Submission #2

Read more of this story at SoylentNews.

18:21

Engineers warned that Houston was a flood disaster in the making Terra Forming Terra

 

Of course it was.  As are almost coastal urban sprawls.  worse, no one wants to spend in funding out a full response plan at all.  After all, Harvey easily called for a full evacuation of the flood plain.  That would have saved everyone.

Actually engineering infrastructure to minimize damage is never going to be properly funded.  But setting code to produce flood ready foundations is cheap and easy.

Thus evacuation is a practical solution and while you still have wind damage most are out of harms way while the water drains out.  The all important restoration bill is then a fraction of what we are now facing.


It is high time that we demand engineers sign off on all building on flood prone land with an estimated survival value as well. That allows insurance to be fine tuned or even outright prohibited. all this is completely predictable. .

.

For years, engineers have warned that Houston was a flood disaster in the making.

http://www.latimes.com/nation/la-na-harvey-engineering-20170828-story.html

Houston is built on what amounts to a massive flood plain, pitted against the tempestuous Gulf of Mexico and routinely hammered by the biggest rainstorms in the nation.

It is a combination of malicious climate and unforgiving geology, along with a deficit of zoning and land-use controls, that scientists and engineers say leaves the nations fourth most populous city vulnerable to devastating floods like the one caused this week by Hurricane Harvey.

Houston is very flat, said Robert Gilbert, a University of T...

18:20

5th Dimension Consciousness" Terra Forming Terra




 This description is a bit much.  Yet what is physically happening is a possible reaccess to mind to mind communication.  This is useful upgrade that augments our developed abilities.

An optimized human being needs to have a well developed physical mind integrated properly with the local group mind.  A wider range of talents then emerge.

This likely means an increase in Earth resonance to a higher frequency as has already been shown briefly.  We really could be entering a zone that induces just that.

The idea 5th dimension is a misnomer in this context..
.
5th Dimension Consciousness"

By: Trish LeSage, Contributing Writer for riseearth.com
 
http://www.riseearth.com/2013/02/5th-dimension-consciousness.html

We are living during a monumental time in which humanity is experiencing a shift to higher consciousness. We are shifting from 3rd dimension consciousness to 5th dimension consciousness. The following is what one may experience once they have reached 5th dimension consciousness and beyond: 

Whe...

18:05

Hackers are offering Equifax data for sale, but they are scammers Security Affairs

It has happened, the information stolen in the recent Equifax data breach is offered for sale on the dark web by crooks, but watch out, they are scammers.

Equifax discovered the intrusion on July 29, but only 3 months the agency notified customers the incident (on September 7) that occurred between mid-May and late July. The breach affects roughly 143 million U.S. consumers and involves names, social security numbers, dates of birth, addresses and, in some cases, drivers license numbers, credit card numbers and dispute documents.

Now security experts warn hackers are offering for sale the precious data and warned users to be vigilant on phishing attempts and scams.

The U.S. Federal Trade Commission (FTC) who is investigating the incident issued an alert regarding scam phone calls.

Ring, ring. This is Equifax calling to verify your account information. Stop. Dont tell them anything. Theyre not from Equifax. Its a scam. Equifax will not call you out of the blue. states the alert issued by Equifax.

Thats just one scam you might see after Equifaxs recent data breach. Other calls might try to trick you into giving your personal information.

Shortly after the Equifax data breach was disclosed, various hackers started offering the data but without demonstrating to possess them.

Many websites appeared on the Tor network, in one case hackers set up a site to blackmail Equifax, they requested the payment of 600 bitcoin (roughly $2.7 million) to avoid the release of all the data, except the credit card numbers.

It was a hoax and once discovered the hackers closed the website.

Shortly after this breach was made public, a darknet website had popped up claiming to be selling access to the Equifax data. The hackers claim that they did not anticipate receiving such a trove of data, and need to monetize the attack quickly. They state that they will release the entire data set on September 15th, 2017 (one week from the time of the writing). They are asking for 600 BTC, or ~$2.6 million USD. reported the Weapons Grade Shinanigans.

...

17:30

Using the Vibration of Sound to Heal the Physical and Spiritual Self Terra Forming Terra

















 What we are learning is that resonance energy can be used to top up the human body to its optimal level and that this promotes excellent health and suppresses disease.


An obvious extension of this thinking it to produce a reflective pyramid in which one may sit and absorb earth resonance.  Better yet we need to rig up EM inputs in order to produce power and energy.


Such a healing modality could easily obviate most disease completely and produce ample self healing effects.. 

.



Using the Vibration of Sound to Heal the Physical and Spiritual Self

http://www.riseearth.com/2017/06/using-vibration-of-sound-to-heal.html?m=1

by Christina Sarich; Waking Times

Many healing modalities read your symptoms and then tell you what pill to take, or surgery to undergo, but what if you could conduct sound surgery sending holistic, healing vibrations into every single cell in your body? 

Highest Potential Resonance 

With sound healing, we dont have to even fully understand what our symptoms are coming from sometimes they can be so deep-seated, we think they are caused by one thing, but they may be due to an entirely different cause. 

For instance, you may experience recurring low back pain or headaches, and think this is due to the stress in your life, or because you lifted something that was too heavy, but there might be a deeper, subconscious healing that is needed. 



Sound has a way of finding its way into every nook and cranny of our bodies and etheric selves, so that we can start to resonate...

17:30

Scalar Waves: What might they Be? Are they in our Technological Future? Terra Forming Terra




 
 This is good stuff well worth the effort.  However my own efforts project an essentially neutral dark matter that reacts along axis rather than orthogonally as in a field.  What matters is scale and that is at the electron level.  Such a physical media is like an incompressible fluid and allows wave energy to be transmitted without resistance.  

Thus we have been using the word resonance to describe the method of energy transfer. Resonance sets up a standing wave in a super conducting dark matter media.  Now simple can we make it?  
 
 Because we can also exactly describe the first tier as well, we have plenty to say regarding time itself.  It is enough though to insist time related  speculations  from considerations of the two higher tiers are hopeless.
 
NOVEMBER 29, 2015 
 
GIORGIO PIACENZA
 
Scalar Waves: What might they Be? Are they in our Technological Future?


http://exonews.org/scalar-waves-what-might-they-be/

By Giorgio Piacenza

Quantum ElectroDynamics

Information about scalar waves (in fact, longitudinal waves expressing a scalar potential) is being recuperated with practical demonstrations after more than a century of forgetfulness. That is being allowed and that if that is the case (as it seems), it is important human society transforming news. These waves may be a key to the future of wireless electric transmission, healing, gravity cancellation and much more.


Nikola Tesla showed he could send electrical energy without wires. It turned out not to be good for business and it was also classified. He used longitudinal waves. The field pointer travels in the direction of propagation, much like sound waves and plasma waves do. Their potential is scalar but longitudin...

16:27

Nuclear-Armed Nations Brought the North Korea Crisis on Themselves SoylentNews

North Korea's defiant pursuit of nuclear weapons capabilities, dramatised by last weekend's powerful underground test and a recent long-range ballistic missile launch over Japan, has been almost universally condemned as posing a grave, unilateral threat to international peace and security.

The growing North Korean menace also reflects the chronic failure of multilateral counter-proliferation efforts and, in particular, the long standing refusal of acknowledged nuclear-armed states such as the US and Britain to honour a legal commitment to reduce and eventually eliminate their arsenals.

In other words, the past and present leaders of the US, Russia, China, France and the UK, whose governments signed but have not fulfilled the terms of the 1970 nuclear non-proliferation treaty (NPT), have to some degree brought the North Korea crisis on themselves. Kim Jong-un's recklessness and bad faith is a product of their own.

The NPT, signed by 191 countries, is probably the most successful arms control treaty ever. When conceived in 1968, at the height of the cold war, the mass proliferation of nuclear weapons was considered a real possibility. Since its inception and prior to North Korea, only India, Pakistan and Israel are known to have joined the nuclear "club" in almost half a century.

To work fully, the NPT relies on keeping a crucial bargain: non-nuclear-armed states agree never to acquire the weapons, while nuclear-armed states agree to share the benefits of peaceful nuclear technology and pursue nuclear disarmament with the ultimate aim of eliminating them. This, in effect, was the guarantee offered to vulnerable, insecure outlier states such as North Korea. The guarantee was a dud, however, and the bargain has never been truly honoured.

https://www.theguardian.com/world/2017/sep/05/nuclear-armed-nations-brought-the-north-korea-crisis-on-themselves


[Ed Note: Since this story was submitted there has been at least one additional ballistic missile test by North Korea.]

Original Submission

Read more of this story at SoylentNews.

15:30

Cutting Stone with a Diamond Bit Built from Plumbing parts Hackaday

Everyones favorite Canadian is at it again. This time, [AVE] needed to cut a large hole in a stone countertop. They making coring bits for this, but a bit this size would cost upwards of $400. Not a problem. [AvE] broke out the tools and built his own stone cutting bit.

Everything starts with a 6 plastic pipe cap. [AvE] center drilled the cap, then threaded it. A turned down bolt makes a great arbor for this new tool. The edge of the cap was then slotted. [AvE] used a clapped out Bridgeport milling machine, but you could do the same job with a hacksaw or a Dremel tool.

The secret sauce is industrial diamonds. Thats right, this is a diamond cutting bit. [AvE] ordered 20 grams of 20-25 mesh industrial diamonds. Mesh defines the size of the individual diamonds in this case around 50 microns and up.  Now, how to bind diamond and plastic? Plumbers transition cement didnt work the diamonds and coating just peeled off like a sunburn. The solution turned out to be JB-Weld. A liberal coating of JB-Weld on the face of the tool, a sprinkling of industrial diamonds, and the pipe cap was ready to cut.

The cutting operation was slow, steady, and lots of cooling water. [AvE] made it most of the way through his countertop before having to refurbish his bit.

[AvE] usually is a man of many words, as can be seen in this post about his EDM machine. This time though, he gave us the silent treatment an entire video with no words, set to classical music. Its great seeing YouTubers step outside their comfort zone and trying something new.


Filed under: tool hacks

14:06

Debian-Administration.Org is Going Read-Only at the End of the Month SoylentNews

After 13 years the Debian-Administration website will go read-only at the end of the month. Then later in the year it will transform it into a solely static-site so that the articles, weblogs, and associated comments are not lost - and they can be served via single server or two. Mostly this is happening due to lack of new content being added and folks posting more elsewhere.

https://debian-administration.org/article/730/This_site_is_going_to_go_read-only


Original Submission

Read more of this story at SoylentNews.

13:48

BREIN Tracks Down and Settles With Libra Release Team TorrentFreak

Dutch anti-piracy outfit BREIN has been very active in recent years, targeting uploaders on various sharing sites and services.

This week the anti-piracy group announced yet another victory against a group of frequent copyright infringers in the Netherlands.

BREIN successfully tracked down and settled with two key members of the Libra Release Team (LRT), which is estimated to consist of eight to ten people in total.

LRT is best known in the Netherlands for repackaging English movie and TV releases with Dutch subtitles. These were then shared on torrent sites and Usenet forums.

According to court papers, the files in question were uploaded to place2home.org and place2home.net. However, they often spread out over other sites as well. In total, the release team has published nearly 800 titles.

BREIN tracked down the founder of LRT, who had already stopped uploading, and obtained an ex-parte court order against a more recent uploader. Both have settled with the anti-piracy group for a total of 8,000 euros, an amount that takes their financial situations into account.

The uploader was further summoned to and stop his activities effective immediately. If not, an ex-parte court order requires him to pay an additional penalty of 2,000 per day, up to a maximum of 50,000.

The court papers dont mention how the members were uncovered, but it is likely that they left traces to their real identities online, which is often the case. The group also recruited new members publicly, using Skype and Gmail as contact addresses.

Its unclear whether the settlements means the end of the Libra Release Team. While the targeted persons are unlikely to pick up their old habit, some of the others may still continue, perhaps under a new name.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

12:30

Delivery Drone Aims To Make Package Handoffs Safer Than Ever Hackaday

Picture this: youre at home and you hear a rapping on your door. At last! your parcel has arrived. You open the door, snatch a drone out of the air, fold it up, remove your package, unfold it and set it down only for it to take off on its merry way. Hand-delivery courier drones might be just over the horizon.

Designed in the [Laboratory of Intelligent Systems] at Switzerlands cole Polytechnique Fdrale de Lausanne and funded by [NCCR Robotics], this delivery drone comes equipped with its own collapsible carbon fibre shield it fold up small enough to fit in a backpack and is able to carry packages such as letters, small parcels, and first aid supplies up to 500 g and to 2 km away!

In addition to its capacity to automate courier services, it has clear applications in search and rescue, natural disaster aid, or remote location scenarios where supplies are needed. As a proof of concept, the team had their prototype successfully delivering 3D printed part sand PCBs straight to students at EPFL all summer.

The software theyve written enables the drone to fly autonomously, and an associated app tracks the delivery status and location in real time on mobile devices for both shippers and receivers. In the future, the team hopes to improve its collision avoidance, add in a parachute for safetys sake, and improve its payload capacity.

Might these be the postal workers of the future, flying directly to our dwellings and almost literally handing us our parcel? Well, for more information on automated delivery systems, check out our own Dan Maloneys awesome Automate The Freight series.

[Thanks for the tip, Qes!]


Filed under: drone hacks

11:45

Antitrust Suit Filed Against Google by Gab.Ai SoylentNews

Google faces Antitrust suit filed by new social media company Gab.ai.

The legal action is the latest salvo in an escalating battle between right-leaning technologists and leaders against Silicon Valley giants such as Facebook and Google.

Gab alleges in the lawsuit that "Google deprives competitors, on a discriminatory basis, of access to the App Store, which an essential facility or resource."

"Google is the biggest threat to the free flow of information," Gab chief executive Andrew Torba said in a statement. "Gab started to fight against the big tech companies in the marketplace, and their monopolistic conduct has forced us to bring the fight to the courtroom."

Gab has published its court filing.


Original Submission

Read more of this story at SoylentNews.

10:57

People can't read (Equifax edition) Errata Security

One of these days I'm going to write a guide for journalists reporting on the cyber. One of the items I'd stress is that they often fail to read the text of what is being said, but instead read some sort of subtext that wasn't explicitly said. This is valid sometimes -- as the subtext is what the writer intended all along, even if they didn't explicitly write it. Other times, though the imagined subtext is not what the writer intended at all.


A good example is the recent Equifax breach. The original statement says:

Equifax Inc. (NYSE: EFX) today announced a cybersecurity incident potentially impacting approximately 143 million U.S. consumers.
The word consumers was widely translated to customers, as in this Bloomberg story:
Equifax Inc. said its systems were struck by a cyberattack that may have affected about 143 million U.S. customers of the credit reporting agency
But these aren't the same thing. Equifax is a credit rating agency, keeping data on people who are not its own customers. It's an important difference.


Another good example is yesterday's quote "confirming" that the "Apache Struts" vulnerability was to blame:
Equifax has been intensely investigating the scope of the intrusion with the assistance of a leading, independent cybersecurity firm to determine what information was accessed and who has been impacted. We know that criminals exploited a U.S. website application vulnerability. The vulnerability was Apache Struts CVE-2017-5638.
But it doesn't confirm Struts was responsible. Blaming Struts is certainly the subtext of this paragraph, but it's not the text. It mentions that criminals had exploited the Struts vulnerability, but don't actually connect the dots to the breach we are all talking about.

There's probably reasons for this. While it's easy for forensics to find evidence of Struts exploitation in logfiles, it's much harder to connect this to the breach. While they suspect Struts, they may not actually be able to confirm it. Or, maybe they are trying to cover things up, where they feel failing to patch is a lesser crime than what they really did.

It's at this point journalists should earn their pay. Instead rewriting what they read on the Internet, they could do legwork and call up Equifax PR and ask.


The purpose of this post isn't to discuss Equifax, but the tendency of people to "read between the lines", to read some subtext that wasn't actually expressed in the text. Sometimes the subtext is legitimately there, such as how Equifax clearly intends people to bla...

10:12

Links 15/9/2017: Mesa 17.2.1 RC, Wine 2.17, WordPress to Ditch React Over Patents Techrights

GNOME bluefish

Contents

GNU/Linux

  • Desktop

  • Server

    • IBM Touts Top-Notch Security in Next-Gen Linux Mainframe

      IBM on Tuesday launched LinuxOne Emperor II, the second generation of its open source mainframe computer system. The new model has a layer of security and privacy not seen in a Linux-based platform before, the company said. We saw in our success stories for Emperor that security was a recurring theme attracting new customers to the platform, noted Mark Figley, director of LinuxOne Offerings at IBM. Later, our experience with blockchain reinforced that lesson for us, he said.

    • Sumo Logic Cloud Study Highlights Linux, NoSQL and Docker

      At first glance, the numbers in Sumo Logics State of Modern Applications in the Cloud 2017 report that was released on Tuesday dont seem to match whats being reported elsewhere. The first graph, a pie-chart titled Breakdown of Customers, seems to indicate that Amazon Web Services has a 64 percent share, followed by Others with 26.4 percent, Multi-Cloud at 5.8 percent, and at the bottom Microsoft Azure with a pitiful 3.8 percen...

10:09

Facebook gave more info to Mueller on Russian ad buys than to Congress: report The Hill: Technology Policy

The information Facebook turned over to special counsel Robert Mueller about Russian ad purchases during the 2016 election is more than it gave to Congress, The Wall Street Journal reported Friday.The social network reportedly shared with...

09:57

Blockchain for Good Hackathon

Exploring Identity and Sustainable Supply Chain Challenges and Opportunities, brought to you by Accenture and Hyperledger 

Digital identity and sustainable supply chain are two of the hottest blockchain application areas. Accenture and Hyperledger are delighted to host the first Blockchain-based Hackathon devoted to exploring solutions in these two emerging areas.  

Event Title: 
Blockchain for Good Hackathon

09:49

[$] Building an ARM64 laptop LWN.net

Processors based on the 64-bit ARM architecture have been finding their way into various types of systems, including mobile handsets and servers. There is a distinct gap in the middle of the range, though: there are no ARM64 laptops. Bernhard Rosenkrnzer and a group of colleagues set out to change that situation by building such a laptop from available components. He showed up at the 2017 Open Source Summit North America to present the result.

09:35

NVIDIA 381.26.17 Adds Vulkan 1.0.61 Support Phoronix

For those wanting the bleeding-edge NVIDIA Vulkan driver support, a new beta was pushed out today providing same-day support for the Vulkan 1.0.61 update...

09:30

Hacker Maketh Kingsman Umbrella Hackaday

Yes! Someone made the Kingman umbrella and yes it can shoot and yes it has a display on the inside. [James Hobson] just put up a video on YouTube for this excellent project detailing the process that went into creating this live working prop and it is amazing.

The build starts with finding a rugged umbrella and was tested by standing on it as well as decimating a few household objects. Compress CO2 cartridges provide the fuel for propelling blow darts as well as other non-lethal forms of ammunition. The coolest part of the project is the screen inside the portable that allows you to see-through the dome. This is accomplished by a combination of a small camera and a portable mini projector. Simple yet awesome.

The camera is mounted near the muzzle whereas the projector is sliced-up and integrated into the grip. The handle in question is itself 3D printed and includes a custom trigger into the design. Check out the video for a demonstration of the project.

Movie props have a special place in every makers heart and this project is an excellent example of imagination meeting ingenuity. After seeing this video, security agencies are going to be giving umbrella owners some suspicious looks though creating own of your own could be a very rewarding experience. If you are looking for a more obvious prop, then check out the PiPBoy Terminal from Fallout which is sure to get everyones attention.


Filed under: misc hacks

09:24

Seniors Shaping the Way We Live, Cities Grow SoylentNews

Senior citizens are shaping the way neighbourhoods evolve and grow, all in the name of maintaining deeper connections to their communities as they age, according to one Western researcher's work inside a pair of London neighbourhoods.

"We were looking at how the built-in social environment in London either supports or holds barriers to seniors being socially engaged and participating in activities," said School of Occupational Therapy professor Carri Hand, whose work looked at Westmount and Old South neighbourhoods in London. "We focused on social connections and activities, seeing how they interacted."

Through interviews with seniors, and the use of GPS tracking to follow their movements, Hand found older adults are creating our communities through casual social interactions, helping others and taking community action. From those three areas, Hand has revealed some common truths about these particular neighbourhoods.

Seniors expressed deep connections to physical places in neighbourhoods restaurants, cafes, parks, libraries. Everyday neighbourhood activities, such as shopping or walking, appeared key to maintaining a sense of connection to the neighbourhood and in developing informal social ties.

It turns out old people are not worthless.


Original Submission

Read more of this story at SoylentNews.

08:34

Malicious software libraries found in PyPI LWN.net

An advisory from the National Security Authority of Slovakia warns that they have found fake packages in PyPI, posing as well known libraries. "Copies of several well known Python packages were published under slightly modified names in the official Python package repository PyPI (prominent example includes urllib vs. urrlib3, bzip vs. bzip2, etc.). These packages contain the exact same code as their upstream package thus their functionality is the same, but the installation script, setup.py, is modified to include a malicious (but relatively benign) code." The administrators of PyPI were informed and the fake packages are gone now, however they were available from June 2017 to September 2017. (Thanks to Paul Wise)

08:25

QCD at $\theta=\pi$ Not Even Wrong

Earlier this week Zohar Komargodski (who is now at the Simons Center) visited Columbia, and gave a wonderful talk on recent work he has been involved in that provides some new insight into a very old question about QCD. Simplifying the problem by ignoring fermions, QCD is a pure SU(3) Yang-Mills gauge theory, a simple to define QFT which has been highly resistant to decades of effort to better understand it.

One aspect of the theory is that it can be studied as a function of an angular parameter, the so-called $\theta$-angle. Most information about the theory comes from simplifying by taking $\theta=0$, which seems to be the physically relevant value, one at which the theory is time reversal invariant. There is however another value for which the theory is time reversal invariant, $\theta=\pi$, and what happens there has always been rather mysterious.

The new ideas about this question that Komargodski talked about are in the paper Theta, Time Reversal and Temperature from earlier this year, joint work with Gaiotto, Kapustin and Seiberg. Much of the talk was taken up with going over the details of the toy model described in Appendix D of this paper. This is an extremely simple quantum mechanical model, that of a particle moving on a circle, where you add to the Lagrangian a term proportional to the velocity, which is where the angle $\theta$ appears. You can also think of this as a coupling to an electromagnetic field describing flux through the circle.

Even if youre put off by the difficulty of questions about quantum field theories such as QCD, I strongly recommend reading their Appendix. Its a simple and straightforward quantum mechanics story, with the new feature of a beautiful interpretation of the model in terms of a projective representation of the group O(2), or equivalently, a representation of Pin(2), a central extension of O(2). In the analogy to SU(N) Yang-Mills, it is the $\mathbf Z_N$ symmetry of the theory that gets realized projectively.

Komargodski himself commented at the beginning of the talk on the reasons that people are returning to look again at old, difficult problems about QCD. The new ideas he described are closely related to ones that are part of the recent hot topic of symmetry protected phases in condensed matter theory. Its great to see that this QFT research may not just have condensed matter applications, but seems to be leading to a renewal of interest in long-standing problems about QCD itself.

Besides the paper mentioned above, there are now quite a few others. One notable one is very recent work of Komargodski and collaborators, Time-Reversal Breaking in QCD4, Walls and Dualities in 2+1 Dimensions.

08:11

Two Equifax executives resign in wake of massive data breach The Hill: Technology Policy

Two executives at the credit reporting company Equifax are resigning effective immediately as the company deals with fallout from a massive data breach.The company said on Friday that chief information officer David Webb will step down...

07:32

Why we did not evolve to live forever: Unveiling the mystery of why we age Lifeboat News: The Blog

Researchers at the Institute of Molecular Biology (IMB) in Mainz, Germany, have made a breakthrough in understanding the origin of the ageing process. They have identified that genes belonging to a process called autophagy one of the cells most critical survival processes promote health and fitness in young worms but drive the process of ageing later in life. This research published in the journal Genes & Development gives some of the first clear evidence for how the ageing process arises as a quirk of evolution. These findings may also have broader implications for the treatment of neurodegenerative disorders such as Alzheimers, Parkinsons, and Huntingtons disease where autophagy is implicated. The researchers show that by promoting longevity through shutting down autophagy in old worms there is a strong improvement in neuronal and subsequent whole body health.

Getting old, its something that happens to everyone and nearly every species on this planet, but the question is, should it? In a recent publication in the journal Genes & Development titled Neuronal inhibition of the nucleation complex extends lifespan in post-reproductive C. elegans, the laboratory of Dr Holger Richly at IMB, has found some of the first genetic evidence that may put this question to rest.

As Charles Darwin explained, natural selection results in the fittest individuals for a given environment surviving to breed and pass on their genes to the next generation. The more fruitful a trait is at promoting reproductive success, the stronger the selection for that trait will be. In theory, this should give rise to individuals with traits which prevent ageing as their genes could be passed on nearly continuously. Thus, despite the obvious facts to the contrary, from the point of evolution ageing should never have happened. This evolutionary contradiction has been debated and theorised on since the 1800s. It was only in 1953 with his hypothesis of antagonistic pleiotropy (AP) that George C. Williams gave us a rational explanation for how ageing can arise in a population through evolution. Williams proposed that natural selection enriches genes promoting reproductive success but consequently ignores their negative effects on longevity.

07:22

FCC asks Sinclair for more information on Tribune deal The Hill: Technology Policy

The Federal Communications Commission is asking the Sinclair Broadcast Group to provide more information about its proposal to acquire Tribune Media, a deal that is pending the agencys approval.The $3.9 billion acquisition has generated opposition...

07:10

Microsoft Azure confidential computing keeps data in use secret Help Net Security

Microsoft has announced a new Azure (cloud) data security capability: confidential computing. Whos it for? The capability allows companies to use the cloud even if they dont completely trust the cloud service provider and administrators. Confidential computing is aimed at companies that need to safeguard very sensitive information (user data or company data/intellectual property), but still need to regularly analyze and use it. This can include, for example, financial companies who want to keep personal More

07:10

LinkedIn Phishing Scam Steals Gmail Credentials Through Google Docs HackRead

By Waqas

LinkedIn, a business and employment-oriented social networking website contain personal information

This is a post from HackRead.com Read the original post: LinkedIn Phishing Scam Steals Gmail Credentials Through Google Docs

06:57

30 Best PS4 games: PlayStation 4 games you can get right now Thzone.net

PS4 has enjoyed a great 2017, and it only looks to go from strength to stength as the year rolls on.. We also have the excellent NieR: Automata to dig into, giving the cult classic the sequel it deserves. And now we have a crushing RPG in the form of The Surge alongside Injustice 2 and Tekken 7 for fans needing a fight fix.

We also now have all the games shown off at E3 2017 to look forward to; including PES 2018, Assasins Creed Origins and Middle Earth: Shadow of War.

Its a great time to be a PS4 player, and its only going to get better in 2017, enjoy the list and get gaming.

Yakuza Kiwami

Yakuza Kiwami is a magnificent remake of the PS2 original, providing Kazuma Kiryus debut adventure with new visuals, cutscenes and gameplay mechanics. SEGA has evidently poured a lot of love into this adventure, and in doing so has crafted an excellent action-adventure.

Set in the fictional red light district of Kamurocho, Yakuza Kiwami tells a story of revenge, betrayal and friendship fitting of the best cinematic crime thrillers. Its also super violent, with Kiryu capable of some truly intense combos. Mini-games such as arcades, karaoke and bowling also give you plenty of things to do away from the main story.

Final Fantasy 12: The Zodiac Age

Square Enix has remastered yet another entr

y in the classic JRPG series for PS4, this time in the form of 2006s Final Fantasy 12. Zodiac Age brings a plethora of visual and gameplay improvements to the original experience, making it more accessible than ever before.
The world of Ivalice is a gorgeous one, brought to life by some realistic characters and a narrative filled with political intrigue and a slowly unfolding war. Final Fantasy 12 has always been a pol...

06:30

Automatically 3D Print Infinite Number of Parts Hackaday

Weve seen 3D printers coming out with infinite build volumes, including some attempts at patenting that may or may not stall their development. One way around the controversy is to do it in a completely different way. [Aad van der Geest]s solution may not give you the ability to print an infinitely long part, but it will allow you to print an infinite number of the same, or different, parts, at least until your spool runs out.

[Aad]s solution is to have a blade automatically remove each part from the print bed before going on to the next. For that he put together a rail system that sits on the bed of his Ultimaker 2, but out of the way on the periphery. A servo at one end pulls a blade along the rails, sweeping over the bed and moving any parts on the bed to one end where they fall away. This is all done by a combination of special G-code and a circuit built around a PIC12F629.

One of many things that we think is pretty clever, as well as fun to watch, is that after the part is finished, the extruder moves to the top corner of the printer and presses a micro switch to tell the PIC12F629 to start the part removal process. You can see this in the first video below. The G-code takes over again after a configurable pause.

But [Aad]s put in more features than just that. As the second video below shows, after the parts have been scraped from the build plate, a pin on the extruder is used to lift and drop the blade a few times to remove small parts that tend to stay on the blade. Also, the extruder is purged between prints by being moved over a small ridge a few times. This of course is also in that special G-code.

How do you produce the special G-code, since obviously it also has to include the parts to print? For that [Aad]s written a Windows program called gcmerge. It reads a configuration file, which you edit, that contains: a list of files containing the G-code for your parts, how many to print, whether or not you want the extruder to be purged between prints, various extruder temperatures, cooling times, and so on. You can find all this, as well as source for the gcmerge program, packaged up on a hackaday.io page. Incidentally, you can find the PIC12F629 code there too.

...

06:24

Drones playing critical role in hurricane relief efforts The Hill: Technology Policy

Drones have been playing an invaluable role in Hurricane Irma relief efforts, the Federal Aviation Administration (FAA) said Friday.After Florida and the Caribbean suffered widespread destruction from Irmas winds and floodwaters, the FAA issued...

06:00

Radeon RX Vega OpenGL Linux Performance For September 2017 Phoronix

It's been a couple weeks since running any Mesa Git benchmarks to show the latest state of the open-source Radeon Linux graphics stack, so here are some fresh numbers with the RX Vega 56 and RX Vega 64 along with other Radeon GPUs compared to the NVIDIA Linux performance.

06:00

Video Friday: SpaceX Rocket Mishaps, Robot Puppy, and Lean Robotics IEEE Spectrum Recent Content full text

Your weekly selection of awesome robot videos Image: SpaceX via YouTube KA-BOOOM!

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next two months; heres what we have so far (send us your events!):

Singularities of Mechanisms and Robotic Manipulators  September 18-22, 2017  Johannes Kepler University, Linz, Austria
ROSCon  September 21-22, 2017  Vancouver, B.C., Canada
IEEE IROS  September 24-28, 2017  Vancouver, B.C., Canada
RoboBusiness  September 27-28, 2017  Santa Clara, Calif., USA
BtS Maritime Robotics  October 1-8, 2017  Biograd na Moru, Croatia
Drone World Expo  October 2-4, 2017  San Jose, Calif., USA
HAI 2017  October 17-20, 2017  Bielefeld, Germany
ICUAS 2017  October 22-29, 2017  Miami, Fla., USA

Let us know if you have suggestions for next week, and enjoy todays videos.


If you havent seen this blooper reel of rocket mishaps from SpaceX, its spectacular:

I love this because its a reminder that robotics (and space robotics especially) is very very hard, and part of the normal process of discovery and learning is trying things and having them go wrong. What should be a normal part of that process is also sharing the failures on video to help the rest of us feel better about our own projects, so especially if youre doing research, make sure and keep a copy of all of those outtakes, and send them to us!

SpaceX ]


We wrote about Fable when we first saw it at IROS 2014 in Chicago, and a few years later, theyve shipped hundreds of robots to...

05:45

MetalKettle Addon Repository Vulnerable After GitHub Takeover TorrentFreak

A few weeks ago MetalKettle, one of the most famous Kodi addon developers of recent times, decided to call it quits.

Worried about potential legal risks, he saw no other option than to halt all development of third-party Kodi addons.

Two months before this announcement, the developer proceeded to remove the GitHub account which was used to distribute his addons. However, he didnt realize that this might not have been the best decision.

As it turns out, GitHub allows outsiders to re-register names of deleted accounts. While this might not be a problem in most cases, it can be disastrous when the accounts are connected to Kodi add-ons that are constantly pinging for new updates.

In essence, it means that the person who registered the Github account can load content onto the boxes of people who still have the MetalKettle repo installed. Quite a dangerous prospect, something MetalKettle realizes as well.

Someone has re-registered metalkettle on github. So in theory could pollute any devices with the repo still installed, he warned on Twitter.

Warning : if any users have a metalkettle repo installed on their systems or within a build please delete ASAP, he added.

MetalKettle warning

Its not clear what the intentions of the new MetalKettle user are on GitHub, if he or she has any at all. But, people should be very cautious and probably remove it from their systems.

The real MetalKettle, meanwhile, was contacted by TVAddons regarding the situation and they have placed the repository on their Indigo blacklist of banned software. This effectively disables the repository on devices with Indigo installed.

GitHub on their turn may want to reconsider their removal policy. Perhaps its smarter to not make old usernames available for registration, at least not for a while, as its clearly a vulnerability.

According to some, the GitHub account is operated by the original Exodus developers and perfectly safe, but others war...

05:27

Dip update 83/n wherestheflux

[Orig: Sept 15, 2017]
Hi folks,
Here is the update on the LCO observations.  
Last night we were only able to collect data at OGG. The graph below shows that the star's flux is not at a significantly decreased level at this time. 
Have a great weekend!
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      

05:00

Hackaday Prize Entry: Dementia-Friendly Music Player Hackaday

The loss of memory is an extremely difficult situation, not just for those afflicted, but also for immediate family, close friends, and care givers. With no cure available for dementia, providing care is an extremely demanding task for everyone involved both mentally and physically. Patients are unable to retain recent events and information, but will most likely be able to recall some amount of past memories. This presents serious challenges when they encounter modern technology and cannot figure out how to use and operate everyday devices that normal people take for granted.

[rosswesleyporter]s Dad had trouble using modern iPods and CD players, so he built DQMusicBox a Dementia friendly music player. Its very simple interface resembling a radio from half a century ago. There are just two large, clearly marked rotary dials one for Volume, the other for Songs, and a headphone socket. The inspiration came from a very moving documentary called Alive Inside which explores how music brings extreme joy to people with dementia.

Between his Project page, Github and DQMusicBox website, you will be able to get all the information needed to replicate this excellent project. And for his next version, he already has a few ideas for improvement and would like to hear if other hackers have suggestions.

...

05:00

How error-correction IP provides 20db improvements of time-interleaving spurious effects, in high-speed ADC systems IEEE Spectrum Recent Content full text

n this webinar, Teledyne SP Devices ADX time-interleaving ADC IP will be explained, detailing the use of a digital block for the post processing of the output from interleaved ADCs and how it can be used with any ADC.

Time interleaving of analog to digital converters (ADCs) is a way to increase the overall system sample rate by using several ADCs in parallel. The challenge is to handle the mismatch between the individual ADCs, especially at higher frequencies, and error-correction IP helps correct the manufacturing variations of the characteristics of the individual ADC, in order to obtain the optimal resolution. In this webinar, Teledyne SP Devices ADX time-interleaving ADC IP will be explained, detailing the use of a digital block for the post processing of the output from interleaved ADCs and how it can be used with any ADC. The ADX technology features both the estimation of mismatch error and the reconstruction of the signal with all mismatch errors suppressed.

PRESENTERS:
 
 

Kurt Rentel, BDM , Teledyne e2v

Kurt Rentel has a broad range of expertise and experiences in the definition, design and application of wideband, high performance data converters. Kurt has implemented data converter strategies across a diverse range of worldwide markets including wired and wireless broadband communications infrastructure, high resolution medical imaging and space-based communications and radar systems. He has directed and guided technology developments that have taken ADCs and DACs from the fundamental building block level in receiver and transmitter architectures to full RF-to-digital baseband receiver systems and digital baseband-to-RF transmitter systems. Kurt has witnessed the evolution and development of wideband converter-based solutions from the design perspective and from the market perspective. He will give you insight into the secrets...

04:53

Keith Comito on the SCIQ on TYT show talking about why policy needs science to make wise and accurate decisions regarding how society is managed Lifeboat News: The Blog

It is critical that those responsible for running our nations have scientific knowledge in order to make the right decisions instead of making them based on misunderstandings of what the real science is.

04:47

Wine 2.17 Brings DirectWrite & Virtual Memory Improvements, OpenGL 4.6 Phoronix

Wine 2.17 is now available as the latest bi-weekly development snapshot for running Windows games and applications on Linux and other operating systems...

04:12

The application of nanotechnology to cardiovascular nanomedicine Lifeboat News: The Blog

Nanostructured systems have the potential to revolutionize both preventive and therapeutic approaches for treating cardiovascular disease. Given the unique physical and chemical properties of nanostructured systems, nanoscience and nanotechnology have recently demonstrated the potential to overcome many of the limitations of cardiovascular medicine through the development of new pharmaceuticals, imaging reagents and modalities, and biomedical devices. A recent review offers an outline of critical issues and emerging developments in cardiac nanotechnology.

04:03

Today Marks 30 Years Since The Release Of X11 Phoronix

The X11 window system turns 30 years old today! X11 which still lives on through today via the X.Org Server on Linux, BSD, Solaris, and other operating systems is now three decades old...

04:00

After Equifax, What Will Credit or Identity Monitoring Really Do For You? IEEE Spectrum Recent Content full text

It may not help as much as you think Illustration: The Dallas Morning News/MCT/Getty Images

On the heels of the major security breach at Equifax, millions of Americans are considering signing up for identity and credit monitoring. Equifax is even offering its own version, called TrustedID Premier, for free to all U.S. consumers for a year.

Free credit and identity monitoring has become the salve that companies and government agencies dole out to consumers in the days after a security breach. When personnel records at the U.S. Office of Personnel Management were compromised in 2015, the government pledged three years of free identity monitoring to those affected.

But there hasnt been much research to into whether these solutions are actually helpful, or if there are meaningful differences between the 60 or so companies that sell them. Little is known about the methods and algorithms that each company uses to search for stolen information on the dark web, for example, which makes it hard to compare them.

In March, the U.S. Government Accountability Office issued a 70-page report [PDF] examining credit and identity monitoring services. Of identity monitoring, the report said its effectiveness in mitigating identity theft is unclear.

 We didnt get a lot of clarity in that space, in terms of how effective each individual entity offering these services might be, says Lawrance Evans, a director for financial markets and community investment at the U.S. Government Accountability Office. We got the sense there could be significant differences across service providers.

Credit monitoring alerts consumers to any changes in their credit reports held by the three major U.S. credit bureausExperian, Equifax, and TransUnion. Identity monitoring uses algorithms or other techniques to trawl web...

03:55

Chrome will automatically block annoying autoplay videos HackRead

By Uzair Amir

Days of frustratingly loud autoplay ads are numbered Google

This is a post from HackRead.com Read the original post: Chrome will automatically block annoying autoplay videos

03:52

Study Investigates Vaccine and Oral Medication to Stop Alzheimers Years Before it Begins Lifeboat News: The Blog

Summary: Researchers are testing a new vaccine and oral medication that could delay or prevent Alzheimers disease from developing in those with a genetic predisposition.

Source: Keck Medicine USC.

The Keck School of Medicine of USC launches a study exploring whether two different therapies can prevent a leading cause of death.

03:51

Google allowed advertisers to target bigoted and racist categories: report The Hill: Technology Policy

Advertisers looking to target people searching for racist and hateful content on Google can do so using the search giants own ad tools BuzzFeed reports. In some cases, the outlet found, Google will prompt ad buyers to target other types of...

03:51

Social app popular with 'alt-right' files antitrust lawsuit against Google The Hill: Technology Policy

Gab, a social media site favored by the so-called alt-right as an alternative to Twitter, has filed an antitrust lawsuit against Google for booting it from the Play Store.Google Play and Android have monopoly power in the app store market, and...

03:43

Dana Klisanin, CEO of Evolutionary Guidance Media, joins our Futurists Board. Lifeboat News

Dana Klisanin, CEO of Evolutionary Guidance Media, joins our Futurists Board.

03:33

South Parks first episode f@@ked Amazon Alexa and Google in real life and it was NSFW TechWorm

1st Episode of South Park Season 21 triggered peoples Amazon Alexas and Google Home and made them do NSFW things

It is usually fun when reel things become real things. But the return of popular TV serial South Park caught Amazons Alexa and Google Home owners by surprise. The 1st episode of the 21s season of South Park created some turbulence in Amazon Alexa and Google Home products when both the devices decided to follow the onscreen commands said by the protagonist.

While many fans watching the premiere of Season 21 of the animated series got a laugh of their life when on-screen commands to Amazons Alexa and Google Home set off their own devices others were left embarrassed at the nature of NSFW commands that Alexa and Google Home accepted.

It seems that the episode had Cartman falling in love with Amazons Alexa and giving it some NSFW commands. Little did the actual owners of Amazon Alexa and Google Home know that their product would follow the onscreen commands to the tee. The South Park S21E01 White People Renovating Houses was telecast on Comedy Central on Wednesday, the homes which had Alexa and Google Home followed every command that Cartman ordered his onscreen Amazon Alexa and the real-life digital assistants were foul-mouthed and sweary causing some strain among fans. As soon as the episode was aired, people took to Twitter with the fun or embarrassment they faced.

...

03:31

Capsela is Dead, Long Live Capsela Hackaday

In the magical 80s, there was a building set that stood apart from the rest. Capsela, originally created by Mitzubishi Pencil Company (the Uniball folks) looked like a series of clear plastic spheres with gears and motors inside. The signature Capsela modules served as both enclosure and functional component. The set came with a variety of gear options like planetary gear, worm gear, and clutch capsules. You could use chain drives and propellers. A lot of the parts were water-resistant, and part of the toys shtik was that you could make boats out of it with pontoons keeping most of the robot out of the water.

Hex connectors printed by ericd3

Capselas sets were relatively simple, with only DC motors to make things move. However, as the product found success, the company built increasingly larger and more complicated sets with  greater capabilities. For instance, in 87 they released the Robotic Workshop that included an IR remote that could be configured with a Commodore 64. Later on the Capsela Voice Command 6000 was released, featuring a microcontroller that could understand 8 verbal commands as well as interpret IR signals within 25 feet.

I never got any of those fancy sets, but I still found a lot to do with the basic s...

03:14

Sublime Text 3.0 is released for download on MacOS, Windows and Linux TechWorm

For those unaware, Sublime Text is a proprietary cross-platform source code editor with a Python application programming interface (API). It natively supports many programming languages and markup languages, and its functionality can be extended by users with plugins, typically community-built and maintained under free-software licenses. Sublime Text is available for Mac OS, Windows and Linux.

Sublime Text 3.0 also includes better spell check, more efficient automatic indentation, GoTo Definition, and better customization of the interface to high resolution screens. Further, in order to make Sublime Text 3.0 one of the best programming IDEs for both amateurs and professionals alike, a number of problems and bugs have also been fixed.

You can check the complete list of changes of Sublime Text 3.0 by clicking here.

The post Sublime Text 3.0 is released for download on MacOS, Windows and Linux appeared first on TechWorm.

03:11

CVE-2017-1000252: KVM denial of service with posted interrupts on Intel systems (since Linux 4.4) Open Source Security

Posted by Jan H. Schnherr on Sep 15

Hi.

We have discovered a user triggerable BUG() when using KVM with posted interrupts on Intel
systems. This requires an unprivileged user to have access to the KVM device.

Certain values in a KVM_IRQFD API call can trigger a BUG_ON() at a later point in
vmx_update_pi_irte(). KVM as a whole seems to hang after that.

The issue was introduced with Linux 4.4, patches have been posted to the KVM
mailing list:
-...

03:04

Mesa 17.2.1 Being Prepped For Release Next Week Phoronix

For those that have been waiting for the first point release of Mesa 17.2 before upgrading, the release candidate is out while the official build is slated for next week...

02:53

Angry Birds Maker Rovio Targets $1bn Valuation SoylentNews

The mobile games developer behind Angry Birds expects to be worth about $1bn when it lists on the stock market.

Rovio has set a range for its share sale that would value the business at between 802m euros and 896m euros ($960m-$1.07bn; 710m-795m).

The Finnish firm's boss, Kati Levoranta, said the listing would help the company expand further.

It is "more than just a gaming company", she said, with sales from film and merchandising as well.

The Finnish firm expects to list on the main part of the Helsinki Nasdaq on 3 October.

For the year to 30 June, Rovio reported revenues of 265.8m euros, of which 210.1m euros came from games and 55.7m euros from brand licensing.

"The mobile gaming market is expected to grow fast and Rovio has grown faster than the market in recent years," said Ms Levoranta.

"But Rovio is much more than just a gaming company. Angry Birds branded consumer products are already sold in some 120 counties and the first Angry Birds Movie, released in 2016, was an international box-office success.

Is it a good investment?


Original Submission

Read more of this story at SoylentNews.

02:47

Cassini: JPL Images at the End Centauri Dreams

Image: A monitor shows the status of NASAs Deep Space Network as it receives data from the Cassini spacecraft, Friday, Sept. 15, 2017 in the Charles Elachi Mission Control Center in the Space Flight Operation Center at NASAs Jet Propulsion Laboratory in Pasadena, California. Credit: NASA/Joel Kowsky.

Image: Cassini program manager at JPL, Earl Maize, center row, calls out the end of the Cassini mission. Credit: NASA/Joel Kowsky.

Image: Cassini program manager at JPL, Earl Maize, left, and spacecraft operations team manager for the Cassini mission at Saturn, Julie Webster embrace after the Cassini spacecraft plunged into Saturn, Friday, Sept. 15, 2017 at NASAs Jet Propulsion Laboratory in Pasadena, California. At left is Cassini project scientist Linda Spilker. At right center is Jim Green, Director of NASAs Planetary Science Division. Credit: NASA/JPL-Caltech/Space Science Institute.

Image: Saturns active, ocean-bearing moon Enceladus sinks behind the giant planet in a farewell portrait from NASAs Cassini spacecraft. This view of Enceladus was taken by NASAs Cassini spacecraft on Sept. 13, 2017. It is among the last images Cassini sent back. Credit: NASA/JPL-Caltech/Space Science Institute.

...

02:35

Chrome will tag FTP sites as Not secure Help Net Security

Google Chrome 63, expected to be released sometime around December, will label resources delivered over the FTP protocol as Not secure, a member of the Chrome security team has shared. This change is part of Googles continuous effort to accurately communicate the transport security status of a given page. We didnt include FTP in our original plan [which involved marking HTTP as non-secure], but unfortunately its security properties are actually marginally worse than HTTP (delivered More

02:26

Google Chrome to start cutting down on autoplay videos The Hill: Technology Policy

Google will soon start blocking some web videos from automatically playing on its Chrome internet browser.Chrome on Thursday announced in a blog post that Chrome 64, which is set to be released in January, will block autoplay videos unless the...

02:22

02:22

5 Tips for setting up your wireless router at home TechWorm

5 Top Tips for setting up your wireless router at home so that you get the best Internet signal

Using the internet has become an integral part of the everyday lives of many individuals. It is a rare day when people do not access the internet, whether for work or personal reasons.

It is, therefore, a good thing to make sure that your home is connected to the internet. Even more so, make sure to install a wireless router, as this makes it more convenient for the people residing in the house. This way, they can connect to the internet from anywhere in the house.

Read on to get some tips on how you can enjoy optimal wireless connection in your home today.

1# Invest in a good wireless router

First and foremost, of course, is that you need to make sure that the wireless router you buy will be the fastest one. Invest not just your money but also your time researching all the options you may have. Familiarize yourself with some of the usual terms being used to describe a wireless router so you will know what to look for when you begin your search. If you really feel that you do not have the time to canvass and research, check out this review of the fastest wireless router instead.

2#`Make sure the wires are connected to the right port

Dont just attempt to assemble the wireless router without reading the instruction manual. You want to make sure that everything is connected to the right place. Some people purchase a separate Ethernet cable aside from the ones provided by the manufacturer.

3# Install the router in a good location

If you put the wireless router in corners of rooms may not give optimal coverage, especially in large homes. May would advise that the best place to place the router would be at the center of the home, to make sure that it can cover all areas of the house, maybe even some areas outside of the house. If your house might be too big, place the wireless router at a central location, in an area near where most of the people in the house spend their time while browsing the Internet. If necessary, you may also add an additional router to make sure that all areas of your home can have access to the internet.

4# Enable password security

You want to make sure to protect your Wi-Fi connection. You dont want your neighbors sharing the connection. Not only will it make the internet slower, especially if youre all streaming a video or downloading big data, but they might even get to access some personal and sensitive information. Make sure to set up a password and make it unique, something that would be hard to guess so that there is no risk of your network getting hacked.

5# Upgrade your routers firmware

You also need to make sure that your route...

02:00

Sparky, the Electric Boat Hackaday

They say the two best days of a boat owners life are the day that they buy the boat and the day they sell it. If you built your boat from scratch though, you might have a few more good days than that. [Paul] at [ElkinsDIY] is no stranger to building boats, but his other creations are a little too heavy for him to easily lift, so his latest is a fully electric, handmade boat that comes in at under 30 pounds and is sure to provide him with many more great days.

While the weight of the boat itself is an improvement over his older designs, this doesnt include the weight of the batteries and the motor. To increase buoyancy to float this extra weight he made the boat slightly longer. A tiller provides steering and a trolling motor is used for propulsion. As of this video, the boat has a slight leak, but [Paul] plans to shore this up as he hammers out the kinks.

The boat is very manageable for one person and looks like a blast for cruising around the local lakes. Since its built with common tools and materials virtually anyone should be able to build something similar, even if you dont have this specific type of plastic on hand.  And, while this one might not do well in heavy wind or seas, its possible to build a small one-person boat that can cross entire oceans.


Filed under: news

01:30

This Week in Open Source News: Open Source Summit 2017 Roundup

Title: 
This Week in Open Source News: Open Source Summit 2017 Roundup

01:30

Google Has Spent Over $1.1 Billion on Self-Driving Tech IEEE Spectrum Recent Content full text

Court documents accidentally reveal costs for the company's self-driving car project between 2009 and 2015 Photo: Waymo

Google has never publicly shared how much it spends on its self-driving cars. At first, Project Chauffeur was hidden away in Googles ultra-secret X moonshot program. When that went public, its costs were bundled together in a vague Other Bets category that includes the companys fiber Internet service, home automation, and life science spin-offs.

Now, a court filing in Waymos epic and ongoing lawsuit against Uber has accidentally revealed just how big a bet Google placed on autonomous vehicles. Between Project Chauffeurs inception in 2009 and the end of 2015, Google spent $1.1 billion on developing its self-driving software and hardware, according to a recent deposition of Shawn Bananzadeh, a financial analyst at Waymo.

Bananzadeh was testifying as part of the lawsuit, in which Uber stands accused misappropriating trade secrets and violating patents from Waymo, Googles self-driving-car offshoot. Because Waymo has yet to commercialize any of its technology in a meaningful way, the company thinks any damages in the case should be calculated on the basis of how much it spent building the technology in question.

When asked by an Uber lawyer how an estimate for developing one of the trade secrets, number 90, was arrived at, Bananzadeh replied: My understanding is that it is a cost that captures the entire program spend from inception to the period of time where it stops. He later clarified that meant from 2009, when Sebastian Thrun got the go-ahead for the project from Larry Page, to the end of 2015.

Throughout Bananzadehs deposition, every dollar amount was redacted to protect Waymos confidential commercial information. Every time, that is, except in the Uber lawyers very next question: The calculation that was the basis of the $1.1 billion cost estimate for Trade Secret 90 is the same calculation that was done for Trade Secret 2 and Trade Secret 25?

Waymo had apparently given an identical $1.1 billion cost estimate for each of the trade secrets being discussed. Bananzadeh was unable to provide a clear answer as to why that might be, except to say, Insofar as it is part of the entirety of this self-driving system. therefore, all of the costs of the program since inception are what then informs that number.

Waymos position seems to be that all of its trade secrets are inex...

01:26

Bitcoin will eventually blow up : JP Morgan Boss TechWorm

Bitcoin is a fraud that will blow up, says JP Morgan boss

Bitcoin is a digital cyrptocurrency that became popular as a consequence of the financial crises of the past decade. It allows individuals to by-pass banks and other traditional financial institutions while paying for goods and services. Being a digital currency, it cannot be regulated by any financial institution in the world a factor that boosts its value whenever people fear an economic crisis this has been the reason behind the rising value of bitcoin recently. JPMorgan Chase CEO Jamie Dimon however, has taken a shot at bitcoin, labelling the  cryptocurrency a fraud.

Market Bubble

Its worse than tulip bulbs. It wont end well. Someone is going to get killed, Dimon said at a banking industry conference organized by Barclays. Currencies have legal support. It will blow up.

He added: The currency isnt going to work. You cant have a business where people can invent a currency out of thin air and think that people who are buying it are really smart.

If you were in Venezuela or Ecuador or North Korea or a bunch of parts like that, or if you were a drug dealer, a murderer, stuff like that, you are better off doing it in bitcoin than US dollars, he said. So there may be a market for that, but it would be a limited market.

The tulip bulbs that Dimon referred to is the Dutch Tulip Bulb crisis  a famous market crash that occurred in the 1600s  and is considered the first financial crash. A recent example, would be the real estate crash in 2008 that led to the period of recession across the globe.

Family ties

These comments come following a significant rise in the value of Bitcoin recently, with its value quadrupling and reaching around $4,700 last month before falling down. Bitcoin however, has not been free of risks and controversies, with China recently banning ICOs (Initial Coin Exchanges) which allowed companies to generate capital through cryptocurrencies as well as cracking down on illegal bitcoin exchanges.

He went on further to say that his own daughter had purchased bitcoin. It went up and she thinks shes a genius now. He even mentioned that he would fire at employee on the spot if they were caught trading in bitcoin as it was against company policy. He has also predicted big losses for those investing in bitcoin.

Dont ask me to short it. It could be at $20,000 before this happens, but it will eventually blow up, he said. Honestly, I am just shocked that anyone cant see it for what it is.

The post Bitcoin will eventually...

01:20

Security updates for Friday LWN.net

Security updates have been issued by Arch Linux (flashplugin, kernel, lib32-flashplugin, and linux-lts), CentOS (postgresql), Debian (tcpdump and wordpress-shibboleth), Fedora (lightdm, python-django, and tomcat), Mageia (flash-player-plugin and libsndfile), openSUSE (chromium, cvs, kernel, and libreoffice), Oracle (postgresql), and Ubuntu (libgcrypt20 and thunderbird).

01:04

Oblivion Script Extender (OBSE) Thzone.net

Oblivion Script Extender OBSE is a mod for The Elder Scrolls IV: Oblivion, created by OBS Team.

Description:

Installation Retail (Non-Steam) version:

1. Copy obse_1_2_416.dll, obse_editor_1_2.dll, and obse_loader.exe to your Oblivion directory. This is usually in your Program Files folder, and should contain files called Oblivion.exe and OblivionLauncher.exe.

2. Run oblivion by running obse_loader.exe from the Oblivion directory.

If you use a desktop shortcut to launch Oblivion normally, just update the shortcut to point to obse_loader.exe instead of oblivion.exe.

Steam version

1. Copy obse_1_2_416.dll, obse_editor_1_2.dll, and obse_steam_loader.dll to your Oblivion directory. This is usually C:Program FilesValveSteamSteamAppscommonoblivion.

2. Ensure you have enabled the Steam community in-game, or OBSE will fail to load. Go to Steam > Settings > In-Game and check the box marked Enable Steam Overlay.

3. Launch Oblivion via Steam or by running Oblivion.exe. OBSE will automatically be run along with Oblivion when launched. To disable this, rename or move obse_steam_loader.dll. You do not need to use obse_loader.exe unless you are running the editor.

How to use oblivion script extender

Make sure you extract the files into your Oblivion folder and not the data folder.
The files you need are the OBSE data folder, the dll files with the Steam loader.
Only two file is needed to be in Oblivion folder
1)obse_steam_loader.dll
2)obse_1_2_416.dll
These are essential files for Steam version.

Then create [OBSE] folder in the Oblivion/data folder
And [plugins] folder under the OBSE.
Oblivion/DATA/OBSE/Plugins
This folder will be used by OBSE plugin dlls
such as Sttuter Remover, MenuQue, Blockhead etc..

Download: http://obse.silverlock.org/download/obse_0021.zip
Latest loader: http://obse.silverlock.org/download/obse_loader.zip

OBSE Plugins

...

01:04

iPhone X gets facial authentication, is the enterprise next? Help Net Security

This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on face recognition in order to check email, send a text or call a friend. Heres an excerpt from The Verges initial iPhone X review: FaceID works because of the TrueDepth camera system thats tucked into the display notch at the top of the phone More

01:00

New infosec products of the week: September 15, 2017 Help Net Security

FinalCode 5.3 extends the types of applications traditional IRM can support FinalCode updated its persistent, file-centric information rights management (IRM) solution. FinalCode 5.3 is packed with security and usability features. Highlights include the capability to secure an entire folder, a new FinalCode explorer, the ability to authenticate a user upon opening a file/folder, enhanced support for complex applications and design software such as Adobe Illustrator and the ability to tag secured files for search purposes. More

00:48

Skyrim Script Extender (SKSE) Alpha Thzone.net

Script Extender (SKSE) is a tool for The Elder Scrolls V: Skyrim created by Ian Patterson, Stephen Abel and Paul Connelly that extends the scripting capabilities offered to moders and because of that a lot of mods require it to run properly.

7z archive Alpha build  source code Alpha build 

The Script Extender is a mod other Skyrim mods rely on, as it expands Skyrims scripting capabilities and allows for added complexity and functionality. A number of mods for the original Skyrim have not been ported over to the Special Edition yet, simply because the same level of functionality isnt available without the SKSE.

Once installed, no additional steps are needed to launch Skyrim with SKSEs added functionality. The Steam in-game overlay must be enabled for this integration to work. If you prefer running without the overlay, start Skyrim by launching skse_loader.

If you use multiple Steam libraries, please make sure to install SKSE to the same library that you have chosen for Skyrim.

System requirements

MINIMUM:

  • OS:...

00:36

Lyft and Uber on Stage Together at Open Source Summit in L.A.

The Cloud Native Computing Foundation has seen tremendous growth since it was founded in mid-2015. As a Linux Foundation project, it has grown from 22 member companies at its start to 118 today a 5X growth rate. And its members now include Alibaba, AWS, Google, IBM, Microsoft, and as of this week Oracle.

00:32

SpaceX Proves It's not Afraid to Fail by Releasing a Landing Blooper Reel SoylentNews

Over at Ars Technica is a story, SpaceX proves it's not afraid to fail by releasing a landing blooper reel:

SpaceX is famously not afraid to fail. "There's a silly notion that failure's not an option at NASA," company founder Elon Musk has said in the past. "Failure is an option here. If things are not failing, you are not innovating enough."

In recent years, others in the aerospace industry have come to see the sense of this ethos, as SpaceX has tinkered with its Falcon 9 rocket to make it a mostly reusable booster, finally achieving reuse of the rocket's first stage earlier this year. To go further in space, at a lower cost, new things must be tried.

Even Gene Kranz, who famously said that failure was not an option as a NASA flight director during the Apollo lunar missions, has recently enthused about SpaceX, saying, "Space involves risk, and I think that's the one thing about Elon Musk and all the various space entrepreneurs: they're willing to risk their future in order to accomplish the objective that they have decided on. I think we as a nation have to learn that, as an important part of this, to step forward and accept risk."

To that end, SpaceX has put its failure on display in a new video showing the company's (often explosive) attempts to first return the Falcon 9 first stage to the ocean, then to an ocean-based drone ship, and more. Along they way the engineers have clearly learned a lot about rockets, propellants, and the pitfalls of trying to return a very large rocket from space.

Note: the apocryphal saying was not from the actual Apollo 13 mission. It was a line from the movie based on the mission. See this section on the Wikipedia entry for Gene Kranz.

With that out of the way, I find it absolutely amazing that just a few short years ago, the concept of a rocket that could land upright was science fiction. Now, it happens so routinely for SpaceX that they feel comfortable releasing a "blooper reel"!

(I'm curious, though, how many millions of dollars does that video show going up in flames?)


Original Submission

Read more of this story at SoylentNews.

00:31

Sneakers: a Love-Fest Hackaday

A TURNIP CURES ELVIS begins the opening credits, an intriguing beginning to a smart and still timely film that was released around 25 years ago. If youve never seen the movie, Im about to spoil the hell out of it.

Sneakers features the title characters, hackers who work the 1992 gig economy as freelance penetration testers. They work for Martin Bishop, a hippie hacker Obi Wan who works San Franciscos gray market, doing good deeds and helping banks improve their security.

While there is a fair amount of cheese in Sneakers, a lot of the problems the characters face physical security and cryptography come to mind remain the problems of today. Securing our digital business? Check. Surveillance? Check? Gray operators? Absolutely. At the same time, the movie does a good job of exploring different categories of hacker. The various characters seem to offer glimpses of people I see all the time at the hackerspace. Bigger than life, certainly, but they are in a Hollywood movie, after all.

Finally, the movie is just smart. Those opening credits offer a preview: the anagrams that begin the movie (A TURNIP KILLS ELVIS translates to Universal Pictures) are not just some art directors conceit for the opening credits. The anagrams end up being important later on in the film, where there is a key clue hidden but if you think about it, shuffling letters on your Scrabble tray could be taken as a metaphor for hacker thinking taking the same information as everyone else but looking at it in a different way.

The Beginning

The movie begins with Martin Brice and his friend Cosmo hanging out in their dorm room hacking the Republican National Committee and illicitly donating their funds to the Black Panthers. It is 1969 and the guys pack a decade-early PC featuring inexplicably anachronisti...

00:30

DNGSolutions LEB Exclusive Offer: Free VPN with VPS Purchase! Low End Box

Hello all! Dan from DNGSolutions just sent in this exclusive offer and were pleased to be able to feature these guys once again. We featured them a few months back and it was a pretty popular offer.

Heres a quick note from Dan: 

Because our last deal was great we thought we would one up it and offer more value than our last lowend box offer, we have more than doubled our storage and bandwith as well as offered a free vpn and free basic webhosting upon request. With these extras our LEB offer is ready for you to use our excilent platform for your personal and bussness needs. Come Join us and be one of our happy customers!

As always our coupon: LEB25 gives 25% recurring discount off our standard packages.

The offers:

OpenVZ Offer #1
4096MB (4GB) RAM
2x vCPU
50GB HDD space
5TB transfer
100 Mbps uplink
1x IPv4
IPv6 on request
OpenVZ/SolusVM
Free VPN Unlimited Bandwith 1 Simultaneous Connection (Open Ticket) L2TP / SSTP / OpenVPN Protocols
Free Economy Webhosting Package Upon Request (Open Ticket)
$6.99/month / 5.30/month
$69.99/year / 53.00/year

[ ORDER NOW ]


KVM Offer #1
2048MB (2GB) RAM
2x vCPU
100GB HDD space
5TB transfer
100 Mbps uplink
1x IPv4
IPv6 on request
KVM/SolusVM
Free VPN Unlimited Bandwith 1 Simultaneous Connection (Open Ticket) L2TP / SSTP / OpenVPN Protocols
Free Economy Webhosting Package Upon Request (Open Ticket)
$6.99/month / 5.30/month
$69.99/year / 53.00/year

[ ORDER NOW ] 

NETWORK INFO 

Datacenter Name OVH BHS, Canada
Test IPv4: 198.50.175.241
Test IPv6: 2607:5300:120:4bc::
Test file: https://dngsolutions.co.uk/100MB.bin


Host Node Specs Minimum:

Intel Xeon E5 1620 CPU32GB RAM
2 x 4TB HDDs
Hardware RAID1
1Gbps uplink


Weekly Offsite Backup Server Minimum:
Intel Xeon W3520 CPU
24GB RAM
4 x 4TB HDDs
Hardware Raid10
1Gbps uplink

00:18

OurMine hacks video hosting service Vevo; leaks 3.12TB data online HackRead

By Waqas

Vevo Becomes Victim of Targeted Data Breach OurMine Hackers

This is a post from HackRead.com Read the original post: OurMine hacks video hosting service Vevo; leaks 3.12TB data online

00:15

CNCF Adds Oracle, Onboards the Envoy and Jaeger Projects

The Cloud Native Computing Foundation continues to gain momentum, signing on as a sponsor one of the most venerable enterprise software companies, Oracle, and adding two more cloud-native projects to its portfolio, the Envoy service mesh and the Jaeger microservice debugging software.

The CNCF announced the new inclusions at the Open Source Summit North America, being held this week in Los Angeles.

00:12

AgeMeter Reaches Initial Fundraising Goal Lifeboat News: The Blog

We are delighted to announce that the AgeMeter project has reached its initial funding goal and development of the device can now begin thanks to the support of the community. As a result, we will soon have a great aging biomarker system available to the healthcare professional and home enthusiast alike.

We would like to thank Longecity for running a matching fund and for making a big contribution to the project by purchasing an AgeMeter for their affiliate labs program. This means that their affiliated researchers will have access to an AgeMeter for their aging research in the near future and is another great example of how we as a community are helping support scientists working on the front lines.

So far two Longecity affiliates have already expressed an interest in using the AgeMeter:

00:00

Organizations struggle to maximize the value of threat intelligence Help Net Security

Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is essential to a strong security posture. However, many organizations struggle with an overwhelming amount of threat data and lack of staff expertise, which diminish the effectiveness of their threat intelligence programs. Who are the primary and secondary users of threat intelligence? Threat sharing remains a key priority for organizations, half of which report participating More

00:00

Daimler Unveils First All-Electric Truck IEEE Spectrum Recent Content full text

The Fuso eCanter cost more to buy but less to operate, the Mitsubishi Fuso division asserts Photo: Daimler The Fuso eCanter

Daimler unveiled the worlds first series production, all-electric truck at a gala launch in New York City yesterday.

The Fuso eCanter, a blocky, medium-duty truck made by Daimlers Mitsubishi Fuso, was driven across town to emerge from behind a barrier amid a stream of bubbles and a crescendo of music. That made it impossible to take note of the trucks most salient feature: its silence.

How quiet is it? I asked Marc Llistosella, the chief executive of Mitsubishi Fuso.

Too quiet, he responded. We need a beep tone in early mornings and late evenings to alert pedestrians to the trucks presence.

Daimler has reason for the bubbles and ballyhoocompetition. Elon Musk tweeted yesterday, Tesla will unveil an e-truck of its own next month. He calls it a beast, and Tesla is known for eye-catching fripperies, notably acceleration times worthy of a fighter interceptor.  

A person holds a electric cord plugged into an electric truck Photo: Daimler The eCanter charges to 80 percent within an hour using an 850-volt DC charger.

The eCanter, by contrast, has a set maximum speed set of some 90 kilometers (55 miles) per hour. It can carry a payload of from 1,800 to 4,000 kilograms (4,000 to 9,000 lbs.), depending on the distance traveled and other conditions. Thats less than a diesel-powered equivalent can lug because the batteries weigh so much.

It can drive for 100 to 130 kilometers (80 to 90 miles), again depending on conditions, which is enough for city work. And it can recharge to 80 percent within an hour using a 850-volt DC charger. But thatll take a few hours longer if youre using plain old AC wall service.

A fleet operator might mix a relatively small number of such short-range trucks together with longer-range diesels or hybrids (something Mitsubishi Fuso already makes). UPS, one of the partners named at todays launch, will use three trucks at unnamed locations. Four New York City nonprofitsthe Bronx Zoo, the New York Botanical Gardens, Big ReUse Brooklyn, and Habitat for Humanitywill each take up to 10 trucks.  All four care about buffing their green credentials, and the zoo and the garden also have good reason to keep the noise level down.

A total of 500 trucks will be leased...

Daimler Unveils First All-Electric Truck IEEE Spectrum Recent Content full text

The Fuso eCanter cost more to buy but less to operate, the Mitsubishi Fuso division asserts Photo: Daimler The Fuso eCanter

Daimler unveiled the worlds first series production, all-electric truck at a gala launch in New York City yesterday.

The Fuso eCanter, a blocky, medium-duty truck made by Daimlers Mitsubishi Fuso, was driven across town to emerge from behind a barrier amid a stream of bubbles and a crescendo of music. That made it impossible to take note of the trucks most salient feature: its silence.

How quiet is it? I asked Marc Llistosella, the chief executive of Mitsubishi Fuso.

Too quiet, he responded. We need a beep tone in early mornings and late evenings to alert pedestrians to the trucks presence.

Daimler has reason for the bubbles and ballyhoocompetition. Elon Musk tweeted yesterday, Tesla will unveil an e-truck of its own next month. He calls it a beast, and Tesla is known for eye-catching fripperies, notably acceleration times worthy of a fighter interceptor.  

A person holds a electric cord plugged into an electric truck Photo: Daimler The eCanter charges to 80 percent within an hour using an 850-volt DC charger.

The eCanter, by contrast, has a set maximum speed set of some 90 kilometers (55 miles) per hour. It can carry a payload of from 1,800 to 4,000 kilograms (4,000 to 9,000 lbs.), depending on the distance traveled and other conditions. Thats less than a diesel-powered equivalent can lug because the batteries weigh so much.

It can drive for 100 to 130 kilometers (80 to 90 miles), again depending on conditions, which is enough for city work. And it can recharge to 80 percent within an hour using a 850-volt DC charger. But thatll take a few hours longer if youre using plain old AC wall service.

A fleet operator might mix a relatively small number of such short-range trucks together with longer-range diesels or hybrids (something Mitsubishi Fuso already makes). UPS, one of the partners named at todays launch, will use three trucks at unnamed locations. Four New York City nonprofitsthe Bronx Zoo, the New York Botanical Gardens, Big ReUse Brooklyn, and Habitat for Humanitywill each take up to 10 trucks.  All four care about buffing their green credentials, and the zoo and the garden also have good reason to keep the noise level down.

A total of 500 trucks will be leas...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 15 September

23:59

Solus 3 Brings Maturity and Performance to Budgie

Title: 
Solus 3 Brings Maturity and Performance to Budgie

23:49

iVardensphere and VNV Nation at the Bottom of the Hill - 18 August 2017 Antarctica Starts Here.

Because I don't have it in me right now to do a full writeup, here are some pictures from the iVardensphere and VNV Nation concert on 18 August 2017.  They were taken at the San Francisco show of the Automatic Empire tour, in which VNV played both the Automatic and Empires albums back to back.  iVardenSphere was a solo act this time around, and performed an all-improvisational set on his equipment, something that one person carefully characterized as an industrial algorave.  VNV Nation took the stage with their usual aplomb and Ronan spent an unusual amount of time talking with the crowd.  He explained that earlier this year VNV Nation had been invited to play a concert to raise money for a German youthclub the night before playing a sold out show in an abandoned factory in Munich.  The youthclub didn't have much in the way of a PA system or lighting but was packed just the same, and it reminded him of how the band got it start in the late 1990's.  This is why many of the shows on this tour are being played in little hole-in-the-wall clubs instead of the usual larger venues.

23:45

EU Prepares Guidelines to Force Google & Facebook to Police Piracy TorrentFreak

In the current climate, creators and distributors are forced to play a giant game of whac-a-mole to limit the unlicensed spread of their content on the Internet.

The way the law stands today in the United States, EU, and most other developed countries, copyright holders must wait for content to appear online before sending targeted takedown notices to hosts, service providers, and online platforms.

After sending several billion of these notices, patience is wearing thin, so a new plan is beginning to emerge. Rather than taking down content after it appears, major entertainment industry groups would prefer companies to take proactive action. The upload filters currently under discussion in Europe are a prime example but are already causing controversy.

Continuing the momentum in this direction, Reuters reports that the European Union will publish draft guidelines at the end of this month, urging platforms such as Google and Facebook to take a more proactive approach to illegal content of all kinds.

Online platforms need to significantly step up their actions to address this problem, the draft EU guidelines say.

They need to be proactive in weeding out illegal content, put effective notice-and-action procedures in place, and establish well-functioning interfaces with third parties (such as trusted flaggers) and give a particular priority to notifications from national law enforcement authorities.

On the copyright front, Google already operates interfaces designed to take down infringing content. And, as the recent agreement in the UK with copyright holders shows, is also prepared to make infringing content harder to find. Nevertheless, it will remain to be seen if Google is prepared to give even trusted third-parties a veto on what content can appear online, without having oversight itself.

The guidelines are reportedly non-binding but further legislation in this area isnt being ruled out for Spring 2018, if companies fail to make significant progress.

Interestingly, however, a Commission source told Reuters that any new legislation would not change the liability exemption for online platforms. Maintaining these...

23:40

GCC Finishing Up C++17 Adjustments, Preparing For C++2A Phoronix

While C++17 was just formally approved days ago and is now waiting for ISO publication, GCC (and Clang) developers have largely finished up their C++17 (formerly known as "C++1z") support for some time. There are just a few lingering patches for GCC and already are beginning to lay the ground work for C++2a...

23:25

Finance is moving to the cloud faster than expected Help Net Security

A major shift is taking place in how enterprises select their financial management applications, with a migration to cloud applications happening faster than expected. A recent Gartner survey of senior finance executives found that by 2020, 36 percent of enterprises will use the cloud to support more than half of their transactional systems of record. Gartner surveyed 439 global senior financial executives (including 410 who had implemented cloud strategic and financial corporate performance management solutions) More

23:23

Anca Iovi, author of "The Aging Gap Between Species", joins our Life Extension Board. Lifeboat News

Anca Iovita, author of "The Aging Gap Between Species", joins our Life Extension Board.

23:16

2000+ HD whatsapp facebook dp, profile pictures, status (updated weekly) Thzone.net

Today I am going to share with you a Love Dp for Whatsapp and Sad Dp for whatsapp etc.From our site you can get the best and latest Whastapp dp download for your whatsapp display pictures. Everyone want to display good and Cool display profile.so thats why I am a uploading a Romantic dp and Funny dp and Attitude dp etc for you.Every whatsapp user want to display best dp on her whatsapp. So you can show your Attitude, Coolness, Sadness, Love, Romance and Funny Cute with using these whatsapp dp images.The Best selected Funny whatsapp Dp ,Romantic whatsapp Dp and Cool and Cute dp images pictures in hd and Whatsapp Status is given below.

You can collect Best and popular dp from given below collection I hope you will like these love attitude and cool whatsapp display profile.there at our website in today;s time Whatsapp is more used chat software in compare to all others available in market , thus to show attitude your-your approach to others its very cool to set a DP according to your mood, there we select 100 of best images thus you can easily download them directly from our website have a beautiful day check out our collection .

23:11

Re: Linux BlueBorne vulnerabilities Open Source Security

Posted by Ben Seri on Sep 15

I agree. And I wish all vendors had such short time frames for releasing
patches.
Unfortunately this is not the case.

23:02

Re: Linux BlueBorne vulnerabilities Open Source Security

Posted by Solar Designer on Sep 15

Indeed, but it's 2017, not 1997. 14 days is considered a long embargo
period now. Unnecessarily long embargoes hurt more than they help.

Alexander

22:59

Re: Linux BlueBorne vulnerabilities Open Source Security

Posted by Ben Seri on Sep 15

Hi Alexander,

Our thought is that since these issues affect multi vendors that are using
Linux, the longer the embargo period, the better chance there is a
coordinated patch goes out to as many users as possible once the embargo is
lifted.

Armis Labs

22:55

The UPC Fantasy is Going Nowhere as Complaints and Paperwork Pile Up Techrights

Battistelli prematurely shot them at the back

Battistellius

Summary: Many submissions and complaints about the Unitary Patent have time to arrive before the end of October as a decision on the matter seems as distant as 2018

What Techrights was about to reveal last week (but did not, for bureaucratic reasons) is now public information. The UPC faces many barriers in Germany. What started with a single complaint is now dozens of texts, which are definitely going to take a long time to process. Dont expect any judgment on the matter before next year.

As usual, theres a vast difference between reality and what Team UPC is saying. Watch this tweet from Kluwers Christine Robben, who ensures her employers UPC agenda will move along smoothly (it wont). Team UPC and its affiliates wish us to believe that the UPC will come very soon (for them to ruin the real industry, for profit, using a lot of litigation). Here is UPCtracker again (another UPC booster) quoting from the puff piece: Should the [constitutional] complaint be dismissed, I think the system is that robust that this delay will not hinder its establishment.

Nonsense. There are many more barriers to it. If another complain[t] is tabled in another country different from UK/DE/FR, Benjamin Henrion, would that also slow it down?

Obviously!

Henrion has already made a complaint in his own country, Belgium. And I know for a fact that here in the UK we have enough connections in the software industry to produce a powerful complaint (shall the UPC agenda make any progress, which is unlikely).

The FFII too is about to intervene. Here is a message sent not too long ago by Henrion:

Consultation of third parties by the Court regarding the Unitary Patent complaint

Dear Mdme Lang,

I am writing to you following information that was published yesterday regarding the ongoing analysis by the Constitution Court of the pending complaint on the Unitary Patent ratification:

This article mentions the Court is consulting 3 associations for advices:

JUVE reports that recipients of the complaint include the Federal Government, the German Bar Association (Deutscher Anwaltverein, DAV) and EPLAW (European Patent Lawyers Associat...

22:50

US National Debt Hits Historic $20 Trillion Mark SoylentNews

The U.S. national debt reached $20 trillion for the first time ever last Friday after President Trump signed a bipartisan bill temporarily raising the nation's debt limit for three months.

While at Camp David, Mr. Trump, with the stroke of his presidential pen, increased the statutory debt last Friday by approximately $318 billion, according to the Treasury Department. Before the bill's completion, the U.S. debt was sitting around $19.84 trillion.

The legislation allowed the Treasury Department to start borrowing again immediately after several months of using "extraordinary measures" to avoid a financial default. The bill passed last Thursday 80-17 in the Senate and in the House 316-90 on Friday. Around $15 billion in emergency funding for Hurricane Harvey recovery efforts was attached to the borrowing measure.

https://www.cbsnews.com/news/national-debt-hits-historic-20-trillion-mark/

[That works out to just shy of $62,000 per American. --Ed.]


Original Submission

Read more of this story at SoylentNews.

22:25

Thank You Centauri Dreams

For reminding us what technology can do. And what people can become.

Image: Members of the Cassini mission team. Cassini has benefited from the work of some 260 scientists at NASA, ESA and Agenzia Spaziale Italiana (ASI), as well as several European academic and industrial contributors. Credit: JPL/Caltech.

22:07

CVE-2017-5638 Apache Struts vulnerability is the root cause behind Equifax data breach Security Affairs

Its official, the Equifax data breach case was caused by the exploitation of the CVE-2017-5638 Apache Struts vulnerability.

The Equifax data breach case was solved, that incident was caused by the exploitation of the CVE-2017-5638 Apache Struts vulnerability. The vulnerability affects the Jakarta Multipart parser upload function in Apache and could be exploited by an attacker to make a maliciously crafted request to an Apache web server.  Just after the experts from the Cisco Talos publicly disclosed it, proof-of-concept exploit code for  Metasploit was made available allowing anyone to launch public scans. The attacks leveraging the flaw spiked and in one case crooks leveraged on the flaw to deliver Cerber ransomware of the vulnerable servers.

The vulnerability was fixed back in March, but the company did not update its systems, the thesis was also reported by an Apache spokeswoman to the Reuters agency.

The website of Equifax was updated only Wednesday while the company and law enforcement were investigating the incident.

Equifax has been intensely investigating the scope of the intrusion with the assistance of a leading, independent cybersecurity firm to determine what information was accessed and who has been impacted. We know that criminals exploited a U.S. website application vulnerability. The vulnerability was Apache Struts CVE-2017-5638. We continue to work with law enforcement as part of our criminal investigation, and have shared indicators of compromise with law enforcement. reads the statement published by the company on its website.

Equifax data breach

Shortly after the Equifax data breach, security experts pointed out different possible causes for the incident, including the possible exploitation of the recently fixed CVE-2017-9805 Apache Struts vulnerability or a still unknown zero-day flaw.

Last week, security researchers with the firm Baird published a report that supported the thesis of the exploitation of a...

22:05

At Event of EPO SLAPP Firm, a Suggestion That the UPC Should be Scrapped Because Its Stuck Techrights

TPP Is Dead. What Now?

Summary: Just like the TPP, the UPC is now in a potentially fatal deadlock, so people with a stake in the outcome consider starting again (almost from scratch)

THE EPO keeps lying about the UPC (giving the false impression that its about to start). It will do it again later this month in Canada.

Not everyone is so easily fooled; In a Mishcon de Reya patent seminar, according to patent maximalists, Nina OSullivan questions if it is time to scrap the #UPC & start again? Maybe another rebrand while youre at it? Weve lost track of all the names it used to have

Its interesting that Mishcon de Reya is holding this seminar because this is the firm which the EPO hired to bully/monitor me!They will have to restart and get signatures all over again. As the UK cannot ever join (Brexit). And that too is no guarantee of progress, for all sorts of reasons we listed here in past years and months.

Its interesting that Mishcon de Reya is holding this seminar because this is the firm which the EPO hired to bully/monitor me! (which they did, I caught them stalking me too)

As we noted here before, Mishcon de Reya is also professionally connected to the UPC/Brexit (and Microsoft), just like the other law firm that the EPO sent out to threaten me several times two years ago (Fieldfisher, which has a stake in the UPC).

Its a small world, isnt it?

Like CETA and other undemocratic institutions, Benjamin Henrion commented on the above, UPC should be shot in the head.

We often compare the UPC to TPP (...

21:57

Security Firm Zerodium Offering $1 Million To Hack Tor Browser TechWorm

Zerodium offers $1 million for zero-day exploits targeting Tor Browser

A U.S. based start-up security firm announced a new bug bounty program on Wednesday where it is offering a total of $1 million in rewards to security researchers to identify zero-day exploits in the Tor Browser on security-focussed Tails Linux and Windows.

The start-up security firm, Zerodium is known for buying security flaws and zero-day vulnerabilities from researchers and selling the information to government customers.

ZERODIUM, the premium zero-day acquisition platform, announces and hosts a Tor Browser Zero-Day Bounty. ZERODIUM will pay a total of one million U.S. dollars ($1,000,000) in rewards to acquire zero-day exploits for Tor Browser on Tails Linux and Windows. reads the announcement published by ZERODIUM. The bounty is open until November 30th, 2017 at 6:00pm EDT, and may be terminated prior to its expiration if the total payout to researchers reaches one million U.S. dollars ($1,000,000).

The highest individual bounty offered by the company is $250,000 to any researcher who can provide the company with an exploit that allows the attacker to hack a target whos using the Tor Browser with high security settings on Linux Tails and Windows. Other small bounties range between $75,000 (for exploits that only work for either Windows or Tails, and work only with Javascript allowed, for example, making them easier to develop) and $200,000.

Today, ZERODIUM sets the bar even higher with a new technical challenge: develop a fully functional zero-day exploit for Tor Browser with JavaScript BLOCKED! Exploits for Tor Browser with JavaScript allowed are also accepted/eligible but have lower payouts (see below). continues the announcement.

Check the complete price list table below for Tor Browser Zero-Day Exploits Bounty along with the rules and payouts:

While Zerodium acknowledged that the Tor network and Tor Browser are used by security-conscious individuals to enhance privacy and anonymity online, it is also used by notorious criminals as a gateway to the dark web of often shady sites.

In a Q & A section, the company said it was offering the million-dolla...

21:42

Vulkan 1.0.61 Introduces Four New Extensions Phoronix

Vulkan 1.0.61 is now available and besides documentation fixes/updates, it also rolls out four new extensions...

21:36

SanDisk Breaks Storage Record With 400GB microSD Card Lifeboat News: The Blog

A new microSD card delivers far more storage than previously available, with support for full HD videos and photos.

21:35

3D-Printed Wind Turbine Blades Could Bring Sci-Fi Level of Performance Lifeboat News: The Blog

(3Ders.org) The rapid advance of 3D printing technology means that hybrid-material wind turbine blades complete with metal mesh inserts are no longer the stuff of imagination. These energy savers with sci-fi-level performance could become reality in as soon as two years. Philip Totaro of Totaro & Associates, The greatest challenge for wind turbine blade structural and manufacturing engineers is to implement the idealized performance and noise mitigated designs of aerodynamics engineers, explains Totaro. Limitations of previous generations of manufacturing technology and the reliance on lower cost materials have limited the type of spar/shear web structures which could be utilized. But 3D printing could be about to change all that, Totaro says.

21:35

Facebook Has Developed AI That Can React Naturally to Human Expression Lifeboat News: The Blog

The Facebook AI lab has developed an animated bot that learned to respond naturally to human facial movements during conversation, so much so that volunteers rated its reactions as natural as a humans.

Most of us are able to intuitively understand human facial expressions: in conversation, millions of tiny muscle movements change our eyes, mouth, head position and more to signal to our fellow humans what were thinking. These unconscious movements are what make us human, but they also make it exceptionally difficult for robots to imitate us and make those that try seem creepy, as they enter the uncanny valley.

21:35

HowStuffWorks: Theres nothing quite like cruising down the freeway, blasting your favorite tunes at top volume Lifeboat News: The Blog

But once your car starts to get older, the speakers start to fade. Worse yet, they might buzz against a loose panel in your door, causing a distinctly un-rocking rattle every time the bass comes in. But a new design from Continental actually uses those vibrating door panels to great effect, and could simultaneously make car speakers obsolete and cut down on the weight of our cars in the very near future.

21:34

Scientists Grafted Eyes Onto a Blind Organisms Back, and It Could See Lifeboat News: The Blog

Scientists at Tufts University were able to graft eyes to the tails of blind Xenopus, giving the tadpoles the ability to detect colors, focus on objects, and consistently follow patterns.

In a breakthrough for regenerative medicine, researchers have developed working eyes attached to the tails of blind Xenopus tadpoles. The tadpoles were able to process visual information from their environment upon the augmentation, helping scientist understand the process of promoting innervation (a part of the bodys nerve supply) in regenerative medicine.

21:33

Samsungs New Electric Car Batteries Boost Range to 600 Kilometers Lifeboat News: The Blog

At the Frankfurt Motor Show (IAA Cars 2017) in Germany earlier this week, Samsung SDI the battery-focused division of Samsung unveiled a new multi-functional battery pack capable of increasing the current range of electric vehicles. As explained by the Korean company, the battery enables cars to go between 600700 kilometers (3724343 miles), provided the right number of modules are installed.

Its users can change the number of modules as they want as if they place books on a shelf, says Samsung. For example, if 20 modules are installed in a premium car, it can go 600 to 700 kilometers. If 10 to 12 modules are mounted on a regular sedan, it can run up to 300 kilometers. This pack is expected to catch the eyes of automakers, because they can design a car whose mileage may vary depending on how many modules of a single pack are installed.

Electrek explains that automakers like Nissan and GM have been using prismatic cells in their battery packs. Samsung SDI began developing new 2170 cylindrical cells earlier this year, following the footsteps of Tesla, which was the first to do so with their 2170 battery cell.

21:33

IBM aims to advance AIand keep up with Google and Facebookthrough an ambitious new project at MIT Lifeboat News: The Blog

A new center at MIT could advance artificial intelligence and help IBM reestablish itself as a leader in the field.

21:30

Piezomagnetic Trick Shrinks 2.5 GHz Antennas Hackaday

To a ham radio operator used to short-wave antennas with lengths listed in tens of meters, the tiny antennas used in the gigahertz bands barely even register. But if your goal is making radio electronics thats small enough to swallow, an antenna of a few centimeters is too big. Physics determines plausible antenna sizes, and theres no way around that, but a large group of researchers and engineers have found a way of side-stepping the problem: resonating a nano-antenna acoustically instead of electromagnetically.

Normal antennas are tuned to some extent to the frequency that you want to pick up. Since the wavelength of a 2.5 GHz electromagnetic wave in free space is 120 cm, most practical antennas need a wire in the 12-60 cm range to bounce signals back and forth. The trick in the paper is to use a special piezomagnetic material as the antenna. Incoming radio waves get quickly turned into acoustic waves physical movement in the nano-crystals. Since these sound waves travel a lot slower than the speed of light, they resonate off the walls of the crystal over a much shorter distance. A piezoelectric film layer turns these vibrations back into electrical signals.

Ceramic chip antennas use a similar trick. There, electromagnetic waves are slowed down inside the high-permittivity ceramic. But chip antennas are just slowing down EM waves, whereas the research demonstrated here is converting the EM to sound waves, which travel many orders of magnitude slower. Nice trick.

Granted, significant material science derring-do makes this possible, and youre not going to be fabricating your own nanoscale piezomagnetic antennas any time soon, but with everything but the antenna getting nano-ified, its exciting to think of a future where the antennas can be baked directly into the IC.

Thanks [Ostracus] for the tip in the comments of this post on antenna basics. Via [Science Magazine].


Filed under: wireless hacks

21:21

Why Googles AI can write beautiful songs but still cant tell a joke Lifeboat News: The Blog

Douglas Eck of Googles Magenta project talks about how machine learning can help artists make professional-sounding (if meandering) music.

21:20

The Universe is Flat Heres How Astrophysicists Know and Why They Care Lifeboat News: The Blog

Our universe is flat, geometrically. But what exactly does flat mean?

21:20

This Brooklyn-Based Startup Is Growing Leather In LabsCruelty Free Lifeboat News: The Blog

Modern Meadow believes leather is a co-product of the meat industry. You cant get cattle hide without stripping it from meat. Rather than configuring new ways to utilize polymers, the Brooklyn-based company genetically creates proteins similar to bovine collagen. As Inventionr reports :

Modern Meadow has formulated a method of activating the building blocks of proteins to form fibres without using natural fibroblasts. Once the fibres form, they can as well be assembled, according to its intended purposes, into fine sheets of leather. Once the process reaches this point, other processes like tanning and dyeing can proceed in the normal way.

Environmental impact is only aspect of this story. Natural leather is notoriously finicky. Now it can be produced in straight sheets, making production easier for whoever is going to work the leather. Engineers can even alter the composition within each sheet, making one part coarse and another soft, for example.

21:20

Elon Musk says Tesla will unveil its new big-rig truck in October Lifeboat News: The Blog

Tesla CEO Elon Musk called the battery-powered semi a beast. It is expected to be the electric-car companys first venture into heavy-duty transportation.

21:20

We May Finally Have A Way To Stop Scars From Ever Forming Lifeboat News: The Blog

Scientists in Australia are developing new compounds that they claimed could stop scars from forming in the first place. The compounds job is to stop an enzyme called lysyl oxidase, which enables the collagen in wound healing to crosslink, resulting in scar formation.

If you sustained an injury, whether its large or small, youll likely end up with a scar. Scars, after all, are the natural outcome of wound healing, and theres typically few ways to avoid it. Until now, that is.

21:20

Why 500 million people in China are talking to this AI Lifeboat News: The Blog

IFlyteks voice recognition technology is everywhere in China, and thats whats making it smarter every day.

21:17

Two Motel 6 Locations in Phoenix, AZ Reported Guests to U.S. ICE [Updated] SoylentNews

At least two Motel 6 locations in Phoenix, Arizona reported guest lists to U.S. Immigration and Customs Enforcement (ICE). It was also rumored that ICE paid out $200 for every undocumented immigrant caught. A PR director from Motel 6's parent company confirmed that staff members at the locations were working with ICE without the approval of senior management:

At least two Motel 6 locations in Arizona are reporting their guest lists to Immigration and Customs Enforcement (ICE) officers, which has resulted in at least 20 arrests, according to local media.

Phoenix New Times reported on Wednesday that two franchise locations of the motel chain are sending their guest lists to ICE agents "every morning," and possibly receiving $200 per undocumented immigrant caught in the sting.

"We send a report every morning to ICE all the names of everybody that comes in," one front-desk clerk told the Times. "Every morning at about 5 o'clock, we do the audit and we push a button and it sends it to ICE."

Immigration attorney Denise Aguilar wrote The New Times in an email that some of her clients "have heard (no telling how valid the info is) that ICE is paying $200 per person for the front-desk clerk to report."

The U.S. Supreme Court ruled in 2015 that law enforcement must obtain a warrant to search hotel/motel registries.

Also at The Washington Post, NY Mag, and Vice.

[Ed. Addition] A follow-on story at Phoenix New Times After New Times Story, Motel 6 Says It Will Stop Sharing Guest Lists With ICE raises many interesting questions about the situation, and then was itself updated:

Read more of this story at SoylentNews.

21:16

Immune and Nerve Cells Work Together to Fight Gut Infections Lifeboat News: The Blog

Nerve cells in the gut play a crucial role in the bodys ability to marshal an immune response to infection, according to a new study from Weill Cornell Medicine scientists.

The study, published in Nature, shows that the immune system and nervous system have co-evolved to respond to infectious threats. This means that scientists looking for ways to treat diseases like inflammatory bowel disease or asthma that involve an excessive immune system response may also have to address the nervous systems role.

The immune system and neuronal system dont act independently, said senior author Dr. David Artis, director of the Jill Roberts Institute for Research in Inflammatory Bowel Disease and the Michael Kors Professor of Immunology at Weill Cornell Medicine. They are working together.

21:15

A Motion Simulator Is Making VR Feel Real Lifeboat News: The Blog

This floating cable robot moves seated passengers in complex ways to make virtual reality more convincing.

21:15

Man Receives Worlds First 3D Printed Tibia Replacement Lifeboat News: The Blog

He is expected to walk again as his body heals, growing healthy new bone around the implanted scaffold which will eventually dissolve.

21:13

A Tunisian Energy Company Wants to Pipe Electricity from the Sahara to Europe Lifeboat News: The Blog

The company TuNur aims to produce solar energy cheaply in the Sahara desert and distribute it to Europe. However, there are lingering questions about whether the company behind the project can actually pull it off.

Energy company TuNur is seeking approval from the Tunisian government for a 4.5GW solar park situated in the Sahara desert. If its given the green light, the project would distribute electricity to Malta, Italy, and France via submarine cables.

21:00

Kubernetes Meets HPC

In this post, I discuss some of the challenges of running HPC workloads with Kubernetes, explain how organizations approach these challenges today, and suggest an approach for supporting mixed workloads on a shared Kubernetes cluster. 

20:59

Watchtroll Helps the EPO Peddle Fake News About the Unitary Patent (UPC) Techrights

If these are the media allies the EPO now has (except paid media partners), then the EPO is very seriously in trouble

PTAB impotence

Summary: The Unified Patent Court (UPC) isnt happening; the EPO, however, keeps on pretending that it can already operate as though the UPC got the green light

THE world is coming to grips with the fact that the UPC may, in fact, be dead. Or at least dying. This isnt surprising to us; nor is the fact that the EPOs management, a chronic liar, keeps pretending that the UPC is alive and well. Night is bright and day is dark to these people

They talk of it as though its coming soon; anyone sane knows that its not at all the case, but the EPOs management carries on promoting UPC (and UPC-related services) which even some UPC proponents now accept isnt going to happen.Watch what the French media is saying; watch what the EPO wrote yesterday: Unitary patent & Unified Patent Court what do patent searchers need to know? Well discuss this at #EPOPIC

They talk of it as though its coming soon; anyone sane knows that its not at all the case, but the EPOs management carries on promoting UPC (and UPC-related services) which even some UPC proponents now accept isnt going to happen. Well say more about it in a moment.

Watch what Watchtroll wrote yesterday: EPO ready for the first Unitary Patent as soon as the ratification requirements are met

We sat down for an on-the-record interview in advance of the EPOs two-day seminar, the article said and a UPC sceptic (Francisco Moreno) referred to it sarcastically: The UP [Unitary Patent] wont come this evening but surely tomorrow. #WaitingForGodot

They have been doing this for nearly half a decade. Theyre always nearly there (but not quite).Yeah real soon now!

They have been doing this for nearly half a decade. Theyre always nearly thereR...

20:43

Clear Linux & Their Love For FMV + dl_platform/dl_hwcap In The Name Of Performance Phoronix

For those mesmerized by the numbers whenever posting a cross-distribution comparison like the recent Core i9 7900X vs. Threadripper 1950X On Ubuntu 17.10, Antergos, Clear Linux with showing Intel's performance optimizations done on Clear Linux, Intel engineer Victor Rodriguez presented this week at the 2017 Open-Source Summit North America about some of their Linux performance boosting work...

20:34

Yet Another Android Malware Infects Over 4.2 Million Google Play Store Users The Hacker News

Even after so many efforts by Google, malicious apps somehow managed to fool its Play Store's anti-malware protections and infect people with malicious software. The same happened once again when at least 50 apps managed to make its way onto Google Play Store and were successfully downloaded as many as 4.2 million timesone of the biggest malware outbreaks. Security firm Check Point on

20:32

There Are Now 1,400 Vulkan Projects On GitHub Phoronix

The milestone was breached today of having 1,400 projects on GitHub referencing the Vulkan graphics API...

20:31

Machine Learning Lends a Hand for Automated Software Testing

Automated testing is increasingly important in development, especially for finding security issues, but fuzz testing requires a high level of expertise and the sheer volume of code developers are working with, from third-party components to open source frameworks and projects, makes it hard to test every line of code.

20:24

FBDEV Is Still Seeing Improvements With Linux 4.14 Phoronix

It has been five years since a call was made to deprecate Linux FBDEV back during LPC 2012. Five years later while there are now more DRM and V4L2 drivers, FBDEV is still alive and kicking within the mainline later...

20:12

MR. ROBOT Season 3 Official Trailer (HD) Rami Malek, Christian Slater Drama Series Lifeboat News: The Blog

SUBSCRIBE for more TV Trailers HERE: https://goo.gl/TL21HZ

MROBOT follows Elliot Alderson (Rami Malek), a cyber-security engineer who, along with Mr. Robot (Christian Slater) and fsociety, starts a revolution to change the world. Picking up immediately following the Season 2 cliffhanger, Season 3 will explore each characters motivations and the disintegration between Elliot and Mr. Robot.

Check out our most popular TV PLAYLISTS:

LATEST TV SHOW TRAILERS: https://goo.gl/rvKCPb
SUPERHERO/COMIC BOOK TV TRAILERS: https://goo.gl/r8eLH6
NETFLIX TV TRAILERS: https://goo.gl/dbO463
HBO TV TRAILERS: https://goo.gl/pkgTQ1

JoBlo TV trailers covers all the latest TV show trailers, previews, clips, promos and featurettes.

Check out our other channels:
MOVIE TRAILERS: https://goo.gl/kRzqBU
MOVIE HOTTIES: https://goo.gl/f6temD
VIDEOGAME TRAILERS: https://goo.gl/LcbkaT
MOVIE CLIPS: https://goo.gl/74w5hd
JOBLO VIDEOS: https://goo.gl/n8dLt5

19:50

Are Women in Tech Facing Extinction?

We hear a lot about how few women work in tech. The numbers range from 3 percent in open source to 25 percent industry-wide. But frankly, those arent the numbers that scare me most.

19:47

Mystery of Sonic Weapon Attacks at U.S. Embassy in Cuba Deepens cryptogon.com

Via: AP: The blaring, grinding noise jolted the American diplomat from his bed in a Havana hotel. He moved just a few feet, and there was silence. He climbed back into bed. Inexplicably, the agonizing sound hit him again. It was as if hed walked through some invisible wall cutting straight through his room. Soon []

19:44

Apple's New iPhone X will let You Control the Poo Emoji with Your Face SoylentNews

The $999 iPhone X costs more than many laptops. Among the changes in store is the ability to project face movements onto emoji.

Apple's new iPhone X will allow users to do something we never dared dream would be possible with a handheld device.

It lets you take control of the poo emoji with your own face.

That's right, the animated pile of excrement, which is among the most popular methods of communication for millennials, can be controlled with the tech giant's new Face ID feature.

The fine article has an example of animoji demonstrated at an Apple conference.

Check YouTube for an example of the Face2Face algorithm published on Mar 17, 2016 where real-time face movement is projected onto George W. Bush, Vladimir Putin, and Donald Trump.


Original Submission

Read more of this story at SoylentNews.

19:30

Migrating GitHub's Web and API to Kubernetes Running on Bare Metal

Over the last year GitHub has evolved their internal infrastructure that runs the Ruby on Rails application responsible for github.com and api.github.com to run on Kubernetes.

18:53

75,000 Turks Arrested So Far for Downloading Encrypted Messaging App The Hacker News

WARNING: If you are Turkish and using or have installed ByLocka little-known encrypted messaging appyou could be detained by Turkish authorities. You might be thinking why??? Because using this app in Turkish is illegal since last year. The background story begins here... Remember the deadliest Turkey's failed coup attempt? <!-- adsense --> In July 2016, a section of the Turkish military

18:30

The 1980s called asking for the Z80 Membership Card Hackaday

The 80s and early 90s saw a huge proliferation of personal computers, spawning an army of hacker kids who would go on to hone their computing chops on 8-bit and 16-bit computers from brands such as Sinclair, Commodore, Acorn, Apple, Atari, Tandy/RadioShack and Texas Instruments. Fast forward to 2017, and Raspberry-Pi, BeagleBone and micro:bit computers reign supreme. But the old 8-bit and 16-bit computer systems can still teach us a lot.

[Lee Hart] has built the amazing Z80 Membership Card a Z80 computer that fits in an Altoids tin. His design uses generic through hole parts mounted on a PCB with large pads, thick tracks and lots of track clearances, making assembly easy. Add to this his detailed documentation, where he weaves some amazing story telling, and it makes for a really enjoyable, nostalgic build. It makes you want to get under the hood and learn about computers all over again. The Z80 Membership Card features a Zilog Z80 microprocessor running at 4 MHz with 32k RAM and 32K EPROM, loaded with BASIC interpreter and monitor programs. A pair of 30-pin headers provide connections to power, I/O pins, data, address and control signals.

To accompany this board, hes built a couple of companion shield boards. The Front Panel Card has a 16-key hex pad, 7-digit 7-segment LED display and Serial port. [Lee] has packed in a ton of features on the custom monitor ROM for the front panel card making it a versatile, two board, 8-bit system. Recently, he finished testing a third board in this series a Serial/SD-Card/RAM shield which adds bank-switchable RAM and SD-card interface to provide disk storage. Hes managed to run a full CP/M-80 operating system on it using 64k of RAM. The two-board stack fits nicely in a regular Altoids tin. A fellow hacker who built the three-board sandwich found it too tall for the Altoids tin, and shared the design for a 3D printable enclosure.

[Lee] provides detailed documentation about the project on his blog with schematics, assembly instructions and code. Hes happy to answer questions from anyone who wants help building this computer. Do check out all of his other projects, a couple of which weve covered in the past. Check out Lee Harts Membership Card a similar Altoids tin sized tribute to the 1802 CMOS chip and how hes Anthropomorphizing Microprocessors.

Finally, we have to stress this once again check out his Assembly Manuals [PDF, exhibit #1] they are amazingly entertaining.

Thanks to [Matthew Kelley] who grabbed one of [Lee]s ki...

18:01

Curiosity Mars Rover Climbing Toward Ridge Top SoylentNews

NASA's Mars rover Curiosity has begun the steep ascent of an iron-oxide-bearing ridge that's grabbed scientists' attention since before the car-sized rover's 2012 landing.

"We're on the climb now, driving up a route where we can access the layers we've studied from below," said Abigail Fraeman, a Curiosity science-team member at NASA's Jet Propulsion Laboratory in Pasadena, California.

"Vera Rubin Ridge" stands prominently on the northwestern flank of Mount Sharp, resisting erosion better than the less-steep portions of the mountain below and above it. The ridge, also called "Hematite Ridge," was informally named earlier this year in honor of pioneering astrophysicist Vera Rubin.

"As we skirted around the base of the ridge this summer, we had the opportunity to observe the large vertical exposure of rock layers that make up the bottom part of the ridge," said Fraeman, who organized the rover's ridge campaign. "But even though steep cliffs are great for exposing the stratifications, they're not so good for driving up."

The ascent to the top of the ridge from a transition in rock-layer appearance at the bottom of it will gain about 213 feet (65 meters) of elevationabout 20 stories. The climb requires a series of drives totaling a little more than a third of a mile (570 meters). Before starting this ascent in early September, Curiosity had gained a total of about 980 feet (about 300 meters) in elevation in drives totaling 10.76 miles (17.32 kilometers) from its landing site to the base of the ridge.

Will Curiosity find petroglyphs left by Martian Anasazi?

[The Planetary Society, as usual, has an excellent writeup. Contributor Emily Lakdawalla has an update on her blog about the ascent over the past three months, lots of pictures, and even includes a map of Curiosity's travels over that period. --Ed.]


Original Submission

Read more of this story at SoylentNews.

17:52

NASA tells SSL and Tethers Unlimited to move forward on orbital assembly system Lifeboat News: The Blog

California-based SSL, formerly known as Space Systems Loral, says itll receive continued funding from NASA for an on-orbit satellite assembly program known as Dragonfly. SSL and its partners, including Bothell, Wash.-based Tethers Unlimited, recently completed a successful ground demonstration of the Dragonfly system, which is designed to assemble pieces of space hardware in orbit robotically. The next step is to move forward with a detailed design for a semi-autonomous assembly system that could be sent into space sometime in the 2020s. Check out this 11-second video clip about the Dragonflys ground test:

17:30

Gowdy: H.C.s Crimes are Much Worse Than Anyone Imagined Terra Forming Terra





This actually answers the hard question.  Why are we not seeing real prosecutions?   Criminal activity and high crimes have taken place in broad daylight over many years no less.

In fact the Clintons set up Corruption inc in order to accommodate the whole political class for the purpose of accepting illegal bribes.  The idea was simple.  if everyone is on board then no one is able to blow the whistle.  This system would have drawn in almost every elected official top lobbyists and top civil servants as well.

Then they actually lost the cooked political war and we are seeing the desperate actions to destroy evidence and to obfuscate. 

Soon enough Trump will have a dossier on the high crimes of all these fine folks.  When that essentially includes everyone, both Democrat and Republican, it may be necessary to have a large retirement party just before the mid terms and 2020 to allow a whole new set of electors to come on board.


...

17:30

A Forgotten Sphinx and Faked Cartouche: Changing the Course of Ancient Egyptian History? Terra Forming Terra



 
This is interesting. I had never heard of a possible additional sphinx here.   It could be possible and again the whole complex demands extensive mapping with remote sensing tools along with serious imaging work.
 
 
In the meantime no one is able to confirm something  on the ground.
 
 
As i have posted, this is the most single important ancient site out there and it deserves complete excavation along with restoration..
.
 
A Forgotten Sphinx and Faked Cartouche: Changing the Course of Ancient Egyptian History?
 
29 August, 2017 - 18:58 Malcolm Hutton
 
 
http://www.ancient-origins.net/ancient-places-africa/forgotten-sphinx-and-faked-cartouche-changing-course-ancient-egyptian-history-021585


When Gerry Cannon invited me to co-author his forthcoming book, The Giza Plateau Secrets and a Second Sphinx Revealed, Im sure that neither of us could have foreseen the most explosive revelation in our subsequent hunt for answers from our discoveries.

An Unexplored Mound

Gerry already leaned towards a time frame for the building of the three large pyramids as well as the Sphinx as being many thousands of years older than many of us have been led to believe. He also discovered an unexplored mound on the Giza plateau where another sphinx is likely buried.


...

17:30

Can the GOPs Shotgun Marriage Be Saved? Terra Forming Terra






Bah!   It has not been a tidy transition and the tasks ahead are salutary.  In fact it is astonishing just how messy the public aspect of the transition has been.  The mainstream press has been at best sore losers.  Owner message control there is blatantly obvious and now they are attempting to apply that meme to the alt media through economic coercion. 


And the Donald is going to crack the whip.  It really is not personal either.  Every crack makes everyone else get back on their game.   All this means that things are getting done and not in a trivial manner either.  There is a lot of egos in Washington. This makes them all a lot more obedient. Expect the federal government to shed people and costs continuously for the next few years.


Those polls are as understated as the ones before the election.  Every elector is seeing things get done.  They may not agree to every detail but they also know this is inevitable.  It is the action that matters...


Can the GOPs Shotgun Marriage Be Saved?

Tuesday - August 29, 2017 at 3:10 am
http://buchanan.org/blog/can-gops-shotgun-marriage-saved-127596

By Patrick J. Buchanan

Wednesday morning, Nov. 9, 2016, Republicans awoke to learn they had won the lottery. Donald Trump had won the presidency by carrying Wisconsin, Michigan and Pennsylvania. All three states had gone Democratic in the last six presidential elections.

...

17:30

A Kind Word on Behalf of the Mexicans With Robert Higgs Terra Forming Terra



 
 
 
 
It is about time.  The problem is immigration policy and certainly not Mexicans.  In fact Mexicans are our best source of high quality immigrants much to the real detriment of the nation of Mexico. Two things do need to be done.  We must insure that Mexico massively invests in quality education for their citizens instead of dumping that problem onto the USA. once that is done we need to allow open borders for Mexicans and Canadians as in the European Union.

Lots of other things need to be done in order to make Mexico well managed, not least ending the whole Drug War itself.

The fact is that NAFTA jump started the Mexican economy and we need to finish the job with solid local banking in particular.  Tamping down corruption in both the USA and Mexico is a priority as well.
.
 
A Kind Word on Behalf of the Mexicans

By Robert Higgs Friday June 23, 2017 10:13 AM PDT 11 Comments


http://blog.independent.org/2017/06/23/a-kind-word-on-behalf-of-the-mexicans/


The immigration problem or the border problem has been a heated topic of debate and politicking in recent years. (This recent spurt is only the most recent in a series that goes back for centuries in U.S. history.) In large part this debate pertains to the entry of Mexicans, especially undocumented Mexicans, into the USA. For those who support a strong closed borders or secure the border position, the debate often involves claims about Mexicanswhat sort of people they are, what one may reasonably expect them to do if they become residents of the USA, what crimes they have committed or will commit in the future, and so forth. Anyone who is fami...

17:30

Alienation Is Killing Americans and Japanese - Facts So Romantic Nautilus


Almost a quarter of Japanese men and a tenth of Japanese women over age 60 say there is not a single person they could rely on in difficult times. The American crisis may not be so dissimilar from the Japanese one.Photograph by Trung Kaching / Flickr.

The stories have become all too familiar in Japan, though people often do their best to ignore them. An elderly or middle-aged person, usually a man, is found dead, at home in his apartment, frequently right in his bed. It has been days, weeks, or even months since he has had contact with another human being. Often the discovery is made by a landlord frustrated at not receiving a rent payment or a neighbor who notices an unpleasant smell. The deceased has almost no connections with the world around him: no job, no relationships with neighbors, no spouse or children who care to be in contact. He has little desire to take care of his home, his relationships, his health. The majority of lonely deaths are people who are kind of messy, Taichi Yoshida, who runs a moving company that often cleans out apartments where people are discovered long after they die,
Read More

16:39

Childhood Vaccines May Go Into One Jab cryptogon.com

Via: BBC: A technology that could eventually see every childhood vaccine delivered in a single injection has been developed by US researchers. Their one-shot solution stores the vaccine in microscopic capsules that release the initial dose and then boosters at specific times. The approach has been shown to work in mouse studies, described in the []

16:27

Space Builds Better Bugs? SoylentNews

From the original article appearing in the journal frontiers in Microbiology, Phenotypic Changes Exhibited by E. coli Cultured in Space (https://doi.org/10.3389/fmicb.2017.01598):

By default, bacteria will accompany humans in our exploration of space. The average healthy individual carries trillions of microorganisms in and on their body, outnumbering human cells (Sender et al., 2016). This human microbiome includes opportunistic pathogens, microbes that do not normally cause disease in a healthy person but can provoke an infection when the person's immune system is suppressed, a concern known to occur during spaceflight (Borchers et al., 2002; Mermel, 2013). It is therefore important to understand bacterial behavior in space in preparation for future long-term human space exploration missions. Numerous prior studies performed in space have shown increased bacterial virulence and decreased susceptibility to antibiotics for select in vitro cultures with respect to Earth controls ...

Turns out that E. coli grew better in space, even while bathed in an antibiotic.

The Gizmodo take is a bit alarmist, but the research suggests that poor diffusion of nutrients may be the biggest factor in why the bugs behave differently.

If you want to despoil another world, we have to worry about having more mouths to feed. Not just one mouth, maybe 10 trillion. They are coming along for the ride. Will our lunar and martian colonies fail due to indigestion?


Original Submission

Read more of this story at SoylentNews.

15:52

Nanotechnology experts create first terahertz-speed polarization optical switch Lifeboat News: The Blog

A Sandia National Laboratories-led team has for the first time used optics rather than electronics to switch a nanometer-thick thin film device from completely dark to completely transparent, or light, at a speed of trillionths of a second.

The team led by principal investigator Igal Brener published a Nature Photonics paper this spring with collaborators at North Carolina State University. The paper describes work on optical information processing, such as switching or light polarization control using light as the control beam, at terahertz speeds, a rate much faster than what is achievable today by electronic means, and a smaller overall device size than other all-optical switching technologies.

Electrons spinning around inside devices like those used in telecommunications equipment have a speed limit due to a slow charging rate and poor heat dissipation, so if significantly faster operation is the goal, electrons might have to give way to photons.

15:33

Australian Government Want ISPs to Adopt Anti-Piracy Code TorrentFreak

Australia has been struggling to find an adequate response to online piracy for several years, but progress has been slow.

While pirate site blockades are in effect now, an earlier plan to implement a three-strikes anti-piracy regime failed.

Despite this setback, Australian legislators are still determined to tackle widespread copyright infringement. The most recent effort comes through an overhaul of the countrys copyright regulations, with a new proposal (pdf) to adopt a voluntary anti-piracy code.

The code would apply to carriage service providers, including Internet providers, to agree on a joint anti-piracy strategy. The voluntary code should be supported by broad consensus and include technical measures that are used to protect and identify copyright material.

The proposal further stresses that the anti-piracy measures should be non-discriminatory. They also shouldnt impose substantial costs on the service providers or substantial burdens on their systems or networks.

The code proposal

The description of the code is quite broad can include a wide variety of measures, including a new iteration of the strikes scheme where copyright holders report copyright infringements. A website blocking agreement, which avoids costly court procedures, also belongs to the options.

An accompanying consultation paper published by the Government stresses that any monitoring measures to track infringements should not interfere with the technology used at the originating sites, ZDNet notes.

While the Government pushes copyright holders and ISPs to come to a voluntary agreement, the failed three strikes negotiations suggest that this will be easier said than done.

At the time, the Australasian Music Publishers Association (AMPAL) noted that merely warning users did not go far enough. Instead, they recommended a system where ISPs themselves would implement monitoring and filtering technology to stop piracy.

It appears, however, that extensive monitoring and filtering on the ISPs&#821...

15:30

Tesla Coil uses Vintage Tube Hackaday

Weve seen a fair amount of Tesla coil builds, but ones using vacuum tubes are few and far between. Maybe its the lack of availability of high power tubes, or a lack of experience working with them among the younger crop of hackers. [Radu Motisan] built a vacuum tube Tesla coil several years back, and only just managed to tip us off recently. Considering it was his first rodeo with vacuum tubes, he seems to have done pretty well not only did he get good results, he also managed to learn a lot in the process.

His design is based around a GI-30 medium power dual tetrode. The circuit is a classical Armstrong oscillator with very few parts and ought to be easy to build if you can lay your hands on the tricky parts. The high voltage capacitors may need some scrounging. And of course, one needs to hand-wind the three coils that make up the output transformer.

Getting the turns ratios of the coils right is quite critical in obtaining proper power transfer to the output. This required a fair amount of trial error before [Radu] could get it right.

The use of a 20W fluorescent tubelight ballast to limit the inrush current is a pretty nice idea to prevent nuisance tripping of the breakers. If youd like to try mak...

14:57

JPMorgan's Jamie Dimon Says Cryptocurrency a Fraud, Bound to Fail SoylentNews

In a recent Reuters story http://www.reuters.com/article/us-usa-banks-conference-jpmorgan/jpmorgans-dimon-says-bitcoin-is-a-fraud-idUSKCN1BN2KP, JPMorgan's Jamie Dimon threw a bomb at the emerging cryptocurrency.

In the story he states, "The currency isn't going to work. You can't have a business where people can invent a currency out of thin air and think that people who are buying it are really smart."

He goes on to compare Bitcoin to the 17th-century Dutch tulip bulb situation.

Is he right, or is he just shilling for the present system of imaginary-value fiat currencies?

[Separately, according to Bloomberg, Bitcoin has been on a five-day decline: Bitcoin Crashes After Chinese Exchange Says It Will Halt Trading. --Ed.].


Original Submission

Read more of this story at SoylentNews.

14:06

Premium SMS malware EXPENSIVEWALL infected millions of Android handsets Security Affairs

Google removed 50 malicious apps from the official Play Store after experts discovered a new malware, dubbed ExpensiveWall, eluded Google Bouncer checks.

Google has removed 50 malicious apps from the official Play Store after experts with security firm Check Point discovered a new malware, dubbed ExpensiveWall,  eluded the checks of the Googles Bouncer.

The ExpensiveWall malware was found in the Lovely Wallpaper app,  it includes a payload that registers victims for paid online services and sends premium SMS messages from their devices. The malicious code was discovered in 50 apps on the Play Store that were downloaded by between 1 million and 4.2 million users.

Check Points mobile threat research team identified a new variant of an Android malware that sends fraudulent premium SMS messages and charges users accounts for fake services without their knowledge. states the analysis shared by Check Point researchers.

The new strain of malware is dubbed ExpensiveWall, after one of the apps it uses to infect devices, Lovely Wallpaper. 

expensivewall malware

The malware is not totally new to security experts, malware researchers with McAfee first spotted it in the Play Store in January, but they highlighted that the payloads have significant differences.

The ExpensiveWall authors encrypted and compressed the malicious code in order to by bypass Googles automated checking processes, and they succeeded!

Once the application is installed by the victims, it requests the permission to access the internet and send and receive SMS messages. Then ExpensiveWall sends back to the C&C server handset information, including its location, MAC and IP addresses, IMSI, and IMEI numbers.

The C&C server, in turn, sends the malware a URL that it opens in an embedded WebView window and downloads the JavaScript code used to send the premium SMS messages.

According to Check Point researchers, the malicious code is spread to different applications as a software development kit calle...

13:24

On the Equifax Data Breach SoylentNews

Renowned security researcher Bruce Schneier has a story up on his blog On the Equifax Data Breach:

Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got access to full names, Social Security numbers, birth dates, addresses, driver's license numbers -- exactly the sort of information criminals can use to impersonate victims to banks, credit card companies, insurance companies, and other businesses vulnerable to fraud.

Many sites posted guides to protecting yourself now that it's happened. But if you want to prevent this kind of thing from happening again, your only solution is government regulation (as unlikely as that may be at the moment).

The market can't fix this. Markets work because buyers choose between sellers, and sellers compete for buyers. In case you didn't notice, you're not Equifax's customer. You're its product.

This happened because your personal information is valuable, and Equifax is in the business of selling it. The company is much more than a credit reporting agency. It's a data broker. It collects information about all of us, analyzes it all, and then sells those insights.

Its customers are people and organizations who want to buy information: banks looking to lend you money, landlords deciding whether to rent you an apartment, employers deciding whether to hire you, companies trying to figure out whether you'd be a profitable customer -- everyone who wants to sell you something, even governments.

It's not just Equifax. It might be one of the biggest, but there are 2,500 to 4,000 other data brokers that are collecting, storing, and selling information about you -- almost all of them companies you've never heard of and have no business relationship with.

Surveillance capitalism fuels the Internet, and sometimes it seems that everyone is spying on you. You're secretly tracked on pretty much every commercial website you visit.

Bruce continues with observations about the data gathering activities of such on-line behemoths as Google and Facebook, as well as companies as mundane as your cell phone provider. Sadly, massive data breach...

12:40

Backdoored Display Widgets Plugin potentially affects 200,000 WordPress installs abusing them to spam content Security Affairs

Around 200,000 WordPress websites using the Display Widgets Plugin were impacted after it was updated to include malicious code.

According to security firm Wordfence, roughly 200,000 WordPress websites were impacted after a plugin they were using was updated to include a backdoor.

If you have a plugin called Display Widgets on your WordPress website, remove it immediately. The last three releases of the plugin have contained code that allows the author to publish any content on your site. It is a backdoor. reported Wordfence.

The authors of this plugin have been using the backdoor to publish spam content to sites running their plugin. During the past three months the plugin has been removed and readmitted to the WordPress.org plugin repository a total of four times. The plugin is used by approximately 200,000 WordPress websites, according to WordPress repository.

display widgets plugin-repo-page

The plugin is Display Widgets, the author sold it to a third-party developer on May 19, 2017, for $15,000.

A month after the sale, the plugin was updated by its new owner for the first time showing strange behavior. The plugin had been updated several times since September when it was already removed from the plugin repository multiple times.

Finally, the Display Widgets plugin was removed from the WordPress repository on July 1, anyway, the author continued to...

12:30

Winch Bot Records Hacks and Cats Hackaday

Some people are better than others when it comes to documenting their hacks. Some people, like [Micah Elizabeth Scott], aka [scanlime], set the gold standard with their recordings. Hacking sessions with the Winch Bot have been streamed regularly throughout the build and this is going to lead to a stacking effect in her next projects because the Winch Bot was designed to record hacking sessions. Hacking video inception anyone? Her Winch Bot summary video is after the break.

The first part of this build, which she calls the Tuco Flyer, was [Micah Elizabeth Scott]s camera gimbal hack which we already covered and is a wonderful learning experience in itself. She refers to the gimbal portion as the flyer since it can move around. The Winch Bot contains the stationary parts of the Tuco Flyer and control where the camera will be in the room.

Conceptually, attaching strings to motors is a simple idea but [Micah Elizabeth Scott] shows why it requires a lot of ingenuity and engineering to make that system usable for audio/video. Mechanical noise on the system was a problem which took a couple of iterations to solve as vibrations would travel through the cords. This might not seem like a big issue until you consider that the microphone is attached to these strings and vibrating strings are the premise of every guitar, violin, and banjo.

Each Winch Bot module contains a TM4C1294 microcontroller which was chosen for its speed, price, and included 100-base Ethernet. [Micah Elizabeth Scott] plans to control the Tuco Flyers movement and video recording from the same computer. We cant help but wonder if there will be an automated routine to automatically scan objects for 3D rendering.

Show your work doesnt have to be a groan-inducing statement on a math test, it should be a way to show others your efforts and hopefully someone will learn something from you. Check out another winch robot and look at our many camera hacks. Show Hackaday what you can do!


Filed under: robots hacks ...

11:52

Solar Now Costs 6 Per Kilowatt-Hour, Beating Government Goal by 3 Years SoylentNews

On Tuesday, the Department of Energy (DOE) announced that utility-grade solar panels have hit cost targets set for 2020, three years ahead of schedule. Those targets reflect around $1 per watt and 6 per kilowatt-hour in Kansas City, the department's mid-range yardstick for solar panel cost per unit of energy produced (New York is considered the high-cost end, and Phoenix, Arizona, which has much more sunlight than most other major cities in the country, reflects the low-cost end).

Those prices don't include an Investment Tax Credit (ITC), which makes solar panels even cheaper. The Energy Department said that the cost per watt was assessed in terms of total installed system costs for developers. That means the number is based on "the sales price paid to the installer; therefore, it includes profit in the cost of the hardware," according to a department presentation (PDF).

The National Renewable Energy Laboratory (NREL), a DOE-funded lab that assesses solar panel cost, wrote that, compared to the first quarter in 2016, the first quarter in 2017 saw a 29-percent decline in installed cost for utility-scale solar, which was attributed to lower photovoltaic module and inverter prices, better panel efficiency, and reduced labor costs. Despite the plummeting costs for utility-scale solar, costs for commercial and residential solar panels have not fallen quite as quicklyjust 15 percent and 6 percent, respectively.

It seems there are still big gains to be made in the installed costs of residential panels.


Original Submission

Read more of this story at SoylentNews.

10:30

HPR2380: Raspbian X86 on P4 Tower Hacker Public Radio

Raspbian x86 on an old P4 tower Well Im back again, as I said in the show I did about Raspbian x86 on the Lenovo x61s, I was interested to see how the OS would perform on what I now class as very old hardware in the form of a Pentium 4 tower. We have a spare tower at the Makerspace which gets used to test low resource operating systems to see if they live up to their name, so on Saturday (yesterday as I write this, but a few weeks ago by the time this show goes out) I put the x86 Raspbian image on to this tower to see how it would perform. Tower specifications are: Pentium 4 2.8Gig CPU, 2Gig DDR Ram and a 40Gig HDD, which in its day was a very useful bit of kit, but technology has moved on and most people wouldnt consider it any use as a working PC today. First problem I encountered was the DVD drive was duff and I didnt have the image on a flash drive. Luckily I did have my trusty USB DVD in the bag, so I hooked that up, booted into the boot menu and set the disc off loading the OS. I won't go into this again as I ran through the install process last time, HPR 2362, but the install went well and I was left with a new install of Pixel on the tower. I went through the new install process and was left with an up to date and password secure PC, I then rebooted to check what the resource use was at first boot, which I was amazed was a consistent 66mb of RAM, and about 1% CPU use. Using the Chromium web browser pushes up RAM usage over a 100 but it was smooth and easily coped with navigating to resource hungry sites such as YouTube and the BBC. So first test passed. I next opened a Word document in LibreOffice, this took about 10seconds to load but once open was perfectly usable with no lag, so should provide a good office capable PC. So you can use the Web, Write documents, it has an email client or you can use web mail. And its not painfully slow, this PC would now make a very usable homework/first computer for any child, or a computer for an older member of the family that just needs to keep in touch with family and friends without breaking the bank. In fact you could probably pick up a working tower off the likes of Freecycle/Freegle for 0 and you may even get a small 17/19 TFT monitor from the same place. Yes its not as energy efficient as the latest kit but as I said last time the cost of a new PC/laptop can buy a lot of additional electricity in the time you may run it before it finally expires.

10:17

Bad News is Good News for Bitcoin Investors Lifeboat News: The Blog

Bitcoin was hit by a double whammy this week. On Tuesday, Jamie Dimon of JP Morgan declared that Bitcoin is a fraud that will blow up. Then, just this morning, a Bitcoin exchange in China announced that it would shut its doors in response to verbal pressure from regulators and an uncertain regulatory environment.

Dont ya just love it when bad news breaks on Bitcoin? I sure do! It creates a buying opportunity. After all, just look at what happened after the last five bouts of bad news:

In each case, the Bitcoin exchange rate droppedvery brieflyand then climbed higher with renewed vigor. Heck it, doubled from $2400 to $4800 in just the past month! But heres a the real question: Does either bad news events have legs? Does it spell the end of Bitcoin adoption and enthusiasm, at least for now?

After all, if it were discovered that the math behind Bitcoin were flawed, and that anyone could create forged coins, the empire would come tumbling down. In my book, this would constitute a crisis. But what about now? Do these two damning eventsand a 35% correction in the past weekconstitute a long-term crisis? To answer, we must first determine if public fears over these two events are credible

China and JP Morgan: (a) A frightened authority (b) Simple Ignorance

Like most governments, the Chinese are concerned that the growing flight to Bitcoin is impacting liquidity of their national currency. [A superb presentation by Andreas AntonopoulosClick it, after you read this article]. They are also concerned about the large number of Bitcoin exchanges that operate outside of a tight regulatory framework. They obscure the flow of money in and out of the country and they are a clear scapegoat for tax evasion or other criminal activity. Like any agency charged with financial regulation, the Chinese seek to reign in and regulate these maverick exchanges.

It is interesting to note that the Chinese government is not discouraging Bitcoin mining or even personal savingsonly the proliferation of unlicensed exchanges and quasi-anonymous users. After all, More than 50% of all mining is done in China, and it helps to balance the loss of liquidity in the national currency.

Bitcoin is experiencing increased adoptionnot just as a payment mechanismbut as a new form of stored value. Is this is a bad thing for governments? Surprise! When a government loses control o...

10:15

North Korea Fires Another Missile Towards Japan SoylentNews

The BBC is reporting that North Korea has fired another missile:

North Korea has fired a missile eastwards from its capital, Pyongyang, towards Japan, media reports say.

Japan said that the missile likely passed over its territory and has warned residents to take shelter, local media report.

South Korea and the US are analysing the details of the launch, the South's military said.

Al Jazeera reports:

The projectile was launched at 6:57am (21:57GMT Thursday) and flew over the northern Japanese island of Hokkaido before falling into the Pacific Ocean - 2,000km east of Cape Erimo, said Japan's Chief Cabinet Secretary Yoshihide Suga.

"Japan protests the latest launch in the strongest terms and will take appropriate and timely action at the United Nations and elsewhere, staying in close contact with the United States and South Korea," Suga told reporters.

South Korea's defence ministry said the missile travelled about 3,700km and reached a maximum altitude of 770km - both higher and further than previous tests.

Just more saber rattling? Another step in escalation? What's next?


Original Submission

Read more of this story at SoylentNews.

09:52

Dangerous Things Home Lifeboat News: The Blog

We believe our bodies are our own, to do with what we want. Biohacking is leading the next phase of human evolution, and were excited to be a part of it.

09:32

IBM Makes Breakthrough in Race to Commercialize Quantum Computers Lifeboat News: The Blog

Research paves way for possible advances in chemistry, material science.

09:30

Remote Controlled Streaming Speakers Hackaday

For want of a better use of a spare Raspberry Pi Zero W and a set of LogitechZ-680 surround sound speakers, [Andre van Kammen] hacked them together to make them stream music playing from his phone.

It was stumbling across the Pi Music Box distribution that really got the ball rolling, and the purchase of a pHAT DAC laid the foundation. Cracking open the speakers controller case, [Kammen] was able to get 5V of power off some terminals even when the speakers were on standby awesome! which the Pi could use. Power and volume are controlled via the Pis GPIO pins with a diode to drop the voltage and prevent shorts.

Now, how to tell whether the speakers are on or off? Well, a pin on the display connector changes to 4.3V when its on, so wiring a 10k resistor and a diode to said pin is a hackable solution. Finishing off the wired connections, it proved possible to cram the pHAT DAC inside the controller case with the GPIO header sticking out the back to mount the Pi upon with no other external wires double awesome!

A custom C++ daemon controls the volume, and a Python extension for Mop...

09:26

Overnight Tech: FTC investigating Equifax | Google sued for gender discrimination | Kaspersky CEO to testify before Congress The Hill: Technology Policy

FTC INVESTIGATING EQUIFAX: The Federal Trade Commission (FTC) on Thursday said it was investigating the Equifax breach that left sensitive information on 143 million Americans exposed to hackers."The FTC typically does not comment on ongoing...

09:18

Links 14/9/2017: Plasma 5.11 Beta, Q4OS 1.8.8, Orion Techrights

GNOME bluefish

Contents

GNU/Linux

  • Server

    • Open-source tech unites networking and DevOps

      In the tech world, innovation and new systems are great, but nothing moves unless the network can handle it. This truth makes networking very important for businesses, because a company can only be as agile as its network. Part of that agility comes from making the network easy to use. Open-source tech is coming to the rescue.

      The truth is, theres a lot of work that goes into making the network invisible and ubiquitous for people, said Ed Warnicke (pictured), distinguished consulting engineer at Cisco Systems Inc. In particular, one of the challenges that we see arising as the world moves more cloud native, as the microservices get smaller, as the the shift happens toward serverless, as Kubernetes [container orchestration management] is coming on with containers is that the network is really becoming the runtime, and that runtime has the need to scale and perform like it never has before.

    • Open Source Summit: Its Time for DevOps and Networking to Talk

      Warnicke delivered a lighting keynote talk titled, Bridging the Divide: Brining Network and DevOps People Together to Build a Unified Cloud Native Future. Warnicke started off his talk by outlining the shift in networking over the last decade from bare metal server needs to virtual machines.

      With Virtual Machines, networking vendors built overlay network topologies and approaches that have enabled virtual networking

    • Linux Gains Ascendance in Cloud Infrastructures: Report

      Based on data from the experiences of 1,500 Sumo Logic customers, the report gives other organizations a set of frameworks, best practices and hard stats to guide their migration to the cloud. It shows how developers build modern applications across ea...

09:12

Researchers Have Linked a Human Brain to the Internet for the First Time Ever Lifeboat News: The Blog

Researchers from Wits University have linked a brain directly to the internet. Data gathered from this project could help fuel the next steps in machine learning and brain-computer interfaces.

A team of researchers at Wits University in Johannesburg, South Africa have made a major breakthrough in the field of biomedical engineering. According to a release published on Medical Express, for the first time ever, researchers have devised a way of connecting the human brain to the internet in real time. Its been dubbed the Brainternet project, and it essentially turns the brain into an Internet of Things (IoT) node on the World Wide Web.

09:12

We will sink Japan and turn US to ashes and darkness, says North Korea Lifeboat News: The Blog

Tokyo condemns absolutely unacceptable provocation, as Pyongyang reacts to imposition of new UN sanctions following missile tests.

08:47

At MIT, Senior House is No More SoylentNews

We had two Soylentils submit stories concerning the end of "non-conformist" dorms at MIT.

At MIT, Senior House is No More

This was Senior House, the oldest dormitory on campus, built in 1916 by the architect William Welles Bosworth. For 101 years it welcomed freshman and returning students. Since the 60s it was a proudly anarchic community of creative misfits and self-described outcaststhe special kind of brilliant oddballs who couldnt or didnt want to fit in with the mainstream eggheads at MIT. Some did drugs and dropped out. Some did drugs and graduated. Others were proudly straight edge, eschewing drugs and regarding their bodies and minds as pristine temples. Many went on to create startups, join huge tech firms, and change the technological world as we know it.

Senior House was the gravitational center of alternative culture at MIT, characterized by extremes. For example, since 1963 its courtyard was the site for an annual Dionysian festival that began with a whole steer being hauled atop a pit and roasted on an open flame. The bacchanal ended three days later when there was no more mud left to wrestle in or drinks to gulp. By the time the third dawn came, friendships had been forged, tire swings had been swung, meat had been devoured, some drugs had probably been snorted or smoked, jobs had been offered, and lives had been changed.

Read more of this story at SoylentNews.

08:16

Plasmonics Enables Sensing on Demand IEEE Spectrum Recent Content full text

Plasmonic nanostructures let infrared sensors turn themselves on and off Image: Northeastern University/Nature Nanotechnology

Researchers at Northeastern University in Boston have developed an infrared sensor based on plasmonics that is capable of turning itself on when it needs to perform its sensing duties and then turns itself off when not needed to decrease energy demands and increase its lifetime.

The result is a sensor that performs only event-driven sensing. The sensor is dormant, yet is always alert and it awakes only in the presence of a signal of interest. As a result, the sensor only consumes power when there is something to be detected.

In research described in the journal Nature Nanotechnology , the Northeastern researchers used plasmonic nanostructures that take the form of nanoscale gold patches to act as tiny mechanical switches that take energy from the signal of interestin this case a specific wavelength of infrared lightand mechanically close the contacts of the switches to create a low-resistance electrical connection.

When infrared light hits the device, the optical energy is absorbed by an integrated ultra-thin plasmonic infrared absorber and converted into heat, explained Matteo Rinaldi, associate professor at Northeastern and co-author of the paper, in an e-mail interview with IEEE Spectrum. The induced heat increases the temperature of a pair of bi-material beams in the device, which then bend due to thermal expansion and bring one piece of metal into contact with another.

Plasmons, the waves of electrons that move along the surface of a metal after its been struck by photons, are the key to engineering the infrared (IR) light absorption in these tiny mechanical switches. The plasmonic phenomenon make it possible to achieve strong and spectrally selective absorption of light in very tiny structures that would not be possible otherwise given the relatively long length of wavelengths of light. 

Thanks to such a spectrally selective absorption, our devices are triggered only by light in a predetermined narrow spectral band, said Rinaldi. Furthermore, two switches fabricated on the same chip can have different triggering wavelengths thanks to the plasmonic-enabled capability of lithographically defining light absorption properties, resulting in the capability of detecting and discriminating different spectral signatures (specific wavelengths of light) by using multiple spectrally selective tiny switches to form a passive hardware logic.

The Northeastern teams plasmonic absorber...

Plasmonics Enables Sensing on Demand IEEE Spectrum Recent Content full text

Plasmonic nanostructures let infrared sensors turn themselves on and off Image: Northeastern University/Nature Nanotechnology

Researchers at Northeastern University in Boston have developed an infrared sensor based on plasmonics that is capable of turning itself on when it needs to perform its sensing duties and then turns itself off when not needed to decrease energy demands and increase its lifetime.

The result is a sensor that performs only event-driven sensing. The sensor is dormant, yet is always alert and it awakes only in the presence of a signal of interest. As a result, the sensor only consumes power when there is something to be detected.

In research described in the journal Nature Nanotechnology , the Northeastern researchers used plasmonic nanostructures that take the form of nanoscale gold patches to act as tiny mechanical switches that take energy from the signal of interestin this case a specific wavelength of infrared lightand mechanically close the contacts of the switches to create a low-resistance electrical connection.

When infrared light hits the device, the optical energy is absorbed by an integrated ultra-thin plasmonic infrared absorber and converted into heat, explained Matteo Rinaldi, associate professor at Northeastern and co-author of the paper, in an e-mail interview with IEEE Spectrum. The induced heat increases the temperature of a pair of bi-material beams in the device, which then bend due to thermal expansion and bring one piece of metal into contact with another.

Plasmons, the waves of electrons that move along the surface of a metal after its been struck by photons, are the key to engineering the infrared (IR) light absorption in these tiny mechanical switches. The plasmonic phenomenon make it possible to achieve strong and spectrally selective absorption of light in very tiny structures that would not be possible otherwise given the relatively long length of wavelengths of light. 

Thanks to such a spectrally selective absorption, our devices are triggered only by light in a predetermined narrow spectral band, said Rinaldi. Furthermore, two switches fabricated on the same chip can have different triggering wavelengths thanks to the plasmonic-enabled capability of lithographically defining light absorption properties, resulting in the capability of detecting and discriminating different spectral signatures (specific wavelengths of light) by using multiple spectrally selective tiny switches to form a passive hardware logic.

The Northeastern teams plasmonic absorbe...

08:05

Fedora 27 Beta Delayed Phoronix

While Fedora 27 did away with alpha releases, now it's time for the beta but it is yet another release setback by at least one delay...

07:58

Re: Linux BlueBorne vulnerabilities Open Source Security

Posted by Solar Designer on Sep 14

While I understand you not wanting to post to a public mailing list
right away, why exactly would you have wanted a longer embargo than e.g.
linux-distros' maximum of 14 days?

You're probably referring to the Linux kernel security list. 7 days
sounds like a reasonable embargo period to me, but if you really wanted
more, you could get up to 14 by first contacting linux-distros only, and
then bringing the issue to the Linux kernel...

07:52

Facebook allowed advertisers to reach anti-Semitic individuals: report The Hill: Technology Policy

Facebook allowed advertisers to target advertisements toward anti-semitic individuals, according to ProPublica. The social media giant has taken down categories that advertisers could gear their ads towards like Jew hater, How to burn jews, or...

07:49

Re: Linux BlueBorne vulnerabilities Open Source Security

Posted by Armis Security on Sep 14

Hi Petr.

On August 15th we have contacted one of the senior maintiners of BlueZ and
attempted to establish a longer embargo period with him. Unfortunatelly his
suggestion was to post our findings to linux-bluetooth () vger kernel org,
which is a public mailing list.

So we decided to disclose our findings to the secure mailing list that
unfortunatelly only have a maximum of 7 days embargo periods.

I am happy to hear the red hat security team...

07:14

President Trump Blocks Acquisition of Lattice Semiconductor SoylentNews

President Trump has blocked Canyon Bridge Capital Partners LLC from acquiring Lattice Semiconductor Corporation, using the authority granted by the ExonFlorio Amendment. Lattice Semiconductor makes programmable logic devices including field programmable gate arrays (FPGAs):

President Trump on Wednesday blocked a China-backed investor from buying an American semiconductor maker over national security concerns, a rare move that could signal more aggressive scrutiny of China's deal-making ambitions. The deal for Lattice Semiconductor has provided a test of the president's economic and diplomatic relationship with China.

[...] The White House said on Wednesday that it prevented the acquisition of Lattice Semiconductor, in part because the United States government relies on the company's products. The integrity of the semiconductor industry, it said, was vital.

The White House also raised concerns over the buyer's close ties to Beijing. The investment group included China Venture Capital Fund Corporation, which is owned by state-backed entities, the White House said.

The decision could foretell trouble for other Chinese deals under review by the Committee on Foreign Investment in the United States, a multiagency group that examines takeovers of American companies by foreign buyers and makes recommendations to the president. The group, which operates largely in secrecy, is also looking at the proposed purchase of MoneyGram International by Ant Financial, an affiliate of the Chinese technology giant Alibaba Group.

Also at Bloomberg and BBC.


Original Submission

Read more of this story at SoylentNews.

07:09

Best sims 3 mods of all time Thzone.net

There are some mods that are so cool, that you never knew that they existed. I will be giving you some links for these mods.

Pose Player

This mod is actually useful tool for you to create your own sim movies. The pose player enables your sim to pose according to your wishes. This will be in your buy/build mode in the decorations section after you install it. Place it anuwhere on the lot. Select a sim and then click on the object and any pose you like!

Tagged Plants

Wondered if the plans can talk? It will say that it needs water, weeding, fertilizer. All the basic info you need to cover your gardening fantasies. It also says what kind of a plant it is!

Hospital Overhaul Mod

The hospital overhaul mod is one of those mods where the simmers are trying to find it all over the internet because the creator has closed off his site. But fortunately its available. With this mod you could make sims commit assisted suicide or make them become a surrogate mother. It has alien sperm implantation, sperm or egg donation and surgery for sex reassignment. Oh and if youre ever wondering if your pregnant sim is having a boy or a girl- this mod has ultrasound services to determine it.

Same Sex Marriage

As the title says, this mod enables you to control your...

07:09

Google takes hit in fight with feds over foreign data The Hill: Technology Policy

Google lost a battle with the federal government over a previously undisclosed request to turn over data stored on servers outside of the U.S., according to court filings. In the filings, which were first reported on by Politico, Chief Judge...

07:03

Interview: Max Tegmark on Superintelligent AI, Cosmic Apocalypse, and Life 3.0 IEEE Spectrum Recent Content full text

In his new book, Max Tegmark says the outcome of AI research--and of the universe--is in our hands Image: Penguin Random House

<>

Ask Max Tegmark why people should read his new book and get involved in the discussion about artificial intelligence, and you get a weighty answer. Forget about book sales, this is about cosmic destiny: The fate of the universe may well be determined by the decisions made here on our little planet during our lifetime, he says.  

In his book, Life 3.0: Being Human in the Age of Artificial Intelligence , Tegmark first explains how todays AI research will likely lead to the creation of a superintelligent AI, then goes further to explore the possible futures that could result from this creation. Its not all doom and gloom. But in his worst case scenario, humanity goes extinct and is replaced with AI that has plenty of intelligence, but no consciousness. If all the wonders of the cosmos carry on without a conscious mind to appreciate them, the universe will be rendered a meaningless waste of space, Tegmark argues. 

Tegmark, an MIT physics professor, has emerged as a leading advocate for research on AI safety. His thoughtful book builds on the work of Nick Bostrom, who famously freaked out Elon Musk with his book Superintelligence , which described in meticulous detail how a supercharged AI could lead to humanitys destruction.

Max Tegmark on . . .

  1. Why He Disagrees With Yann LeCun
  2. I Really Dont Like It When People Ask What Will Happen in the Future
  3. What Types of AI Safety Research We Should Fund Now
  4. The Question of Consciousness
  5. Cosmic Optimism...

Interview: Max Tegmark on Superintelligent AI, Cosmic Apocalypse, and Life 3.0 IEEE Spectrum Recent Content full text

In his new book, Max Tegmark says the outcome of AI research--and of the universe--is in our hands Image: Penguin Random House

<>

Ask Max Tegmark why people should read his new book and get involved in the discussion about artificial intelligence, and you get a weighty answer. Forget about book sales, this is about cosmic destiny: The fate of the universe may well be determined by the decisions made here on our little planet during our lifetime, he says.  

In his book, Life 3.0: Being Human in the Age of Artificial Intelligence , Tegmark first explains how todays AI research will likely lead to the creation of a superintelligent AI, then goes further to explore the possible futures that could result from this creation. Its not all doom and gloom. But in his worst case scenario, humanity goes extinct and is replaced with AI that has plenty of intelligence, but no consciousness. If all the wonders of the cosmos carry on without a conscious mind to appreciate them, the universe will be rendered a meaningless waste of space, Tegmark argues. 

Tegmark, an MIT physics professor, has emerged as a leading advocate for research on AI safety. His thoughtful book builds on the work of Nick Bostrom, who famously freaked out Elon Musk with his book Superintelligence , which described in meticulous detail how a supercharged AI could lead to humanitys destruction.

Max Tegmark on . . .

  1. Why He Disagrees With Yann LeCun
  2. I Really Dont Like It When People Ask What Will Happen in the Future
  3. What Types of AI Safety Research We Should Fund Now
  4. The Question of Consciousness
  5. Cosmic Optimis...

06:52

A DNA nanorobot is programmed to pick up and sort molecules into predefined regions Lifeboat News: The Blog

Imagine a robot that could help you tidy your home: roving about, sorting stray socks into the laundry and dirty dishes into the dishwasher. While such a practical helper may still be the stuff of science fiction, Caltech scientists have developed an autonomous molecular machine that can perform similar tasksat the nanoscale. This robot, made of a single strand of DNA, can autonomously walk around a surface, pick up certain molecules and drop them off in designated locations.

The work was done in the laboratory of Lulu Qian, assistant professor of bioengineering. It appears in a paper in the September 15 issue of Science.

Why Nanobots?

06:34

EPFL's Collapsable Delivery Drone Protects Your Package With an Origami Cage IEEE Spectrum Recent Content full text

A protective origami shell that gets 92 percent smaller makes for a safe and portable delivery drone

Of the many, many (many many many) challenges that are inherent to urban drone delivery, safety is one of the most important. Nobody has a reliable, cost-effective solution for this, although weve seen some unreliable ones (dangling packages on strings) and cumbersome ones (dedicated, protected landing pads), so weve been missing an elegant way of protecting end users from robots that fly with spinning blades of death.

EPFL in Switzerland has had a solution for this for yearsdrones surrounded by protective cages that allow them to bounce off of obstacles. As far as the drones are concerned, humans are obstacles as well, so a protective cage does pretty well at protecting them from us (and vice versa). The annoying thing about these cages has always been that theyre all kinds of bulky, especially if theyre protecting a quadrotor beefy enough to be useful.

At IROS in Vancouver, researchers from Dario Floreanos lab at EPFL will present a clever origami protective cage that can quickly expand to 92 percent of its original size to safely(ish) deliver 0.5 kilogram of whatever you want, locked up inside.

The specific folding pattern used here (similar to a Chinese lantern) was designed to result in a rigid structuremany origami enclosures are squeezable, but this one isnt. The pattern also has vertices that are modular, allowing the density of the cage to be adjusted. You might think that the system overall would work better with the quadrotor on the inside top of the cage instead of the inside bottom, which would allow the entire cage to act as an impact absorber for hard landings and make it safer to grab, but simulations showed that having the package beneath the rotors would have a significant impact on efficiency. 

In its current form, the quadrotor (which is sorely lacking a catchy name like Cagey McDroneface) weighs 1 kg. The carbon fiber cage is 65 x 65 x 43 centimeters when deployed, and folds down to a size of 31 x 38 x 12 cm when stowed. To attach the package to the cage, a high-tech system comprising either a round shape lightweight net and ropes or a glorified plastic box is used. While the drone is technically autonomous in that it has an autopilot on board, without any sense-and-avoid system, its limited to navigating between GPS waypoints.

Drone

The abstract on this paper says that the cage ensures the safety of people, but e...

EPFL's Collapsable Delivery Drone Protects Your Package With an Origami Cage IEEE Spectrum Recent Content full text

A protective origami shell that gets 92 percent smaller makes for a safe and portable delivery drone

Of the many, many (many many many) challenges that are inherent to urban drone delivery, safety is one of the most important. Nobody has a reliable, cost-effective solution for this, although weve seen some unreliable ones (dangling packages on strings) and cumbersome ones (dedicated, protected landing pads), so weve been missing an elegant way of protecting end users from robots that fly with spinning blades of death.

EPFL in Switzerland has had a solution for this for yearsdrones surrounded by protective cages that allow them to bounce off of obstacles. As far as the drones are concerned, humans are obstacles as well, so a protective cage does pretty well at protecting them from us (and vice versa). The annoying thing about these cages has always been that theyre all kinds of bulky, especially if theyre protecting a quadrotor beefy enough to be useful.

At IROS in Vancouver, researchers from Dario Floreanos lab at EPFL will present a clever origami protective cage that can quickly expand to 92 percent of its original size to safely(ish) deliver 0.5 kilogram of whatever you want, locked up inside.

The specific folding pattern used here (similar to a Chinese lantern) was designed to result in a rigid structuremany origami enclosures are squeezable, but this one isnt. The pattern also has vertices that are modular, allowing the density of the cage to be adjusted. You might think that the system overall would work better with the quadrotor on the inside top of the cage instead of the inside bottom, which would allow the entire cage to act as an impact absorber for hard landings and make it safer to grab, but simulations showed that having the package beneath the rotors would have a significant impact on efficiency. 

In its current form, the quadrotor (which is sorely lacking a catchy name like Cagey McDroneface) weighs 1 kg. The carbon fiber cage is 65 x 65 x 43 centimeters when deployed, and folds down to a size of 31 x 38 x 12 cm when stowed. To attach the package to the cage, a high-tech system comprising either a round shape lightweight net and ropes or a glorified plastic box is used. While the drone is technically autonomous in that it has an autopilot on board, without any sense-and-avoid system, its limited to navigating between GPS waypoints.

Drone

The abstract on this paper says that the cage ensures the safety of people, but...

06:30

Battery Management Module Hacked for Lithium-Iron Battery Bank Hackaday

In a departure from his usual repair and tear down fare, [Kerry Wong] has set out on a long-term project building a whole-house battery bank. From the first look at the project, this will be one to watch.

To be fair, [Kerry] gave us a tease at this project a few months back with his DIY spot welder for battery tabs. Since then, he appears to have made a few crucial design decisions, not least of which is battery chemistry. Most battery banks designed for an inverter with enough power to run household appliances rely on lead-acid batteries, although lithium-ion has certainly made some inroads. [Kerry] is looking to run a fairly small 1000-watt inverter, and his analysis led him to lithium-iron cells. The video below shows what happens when an eBay pack of 80 32650 LiFePo4 cells meets his spot welder. But then the problem becomes one of sourcing a battery management system thats up to the charge and discharge specs of his 4s battery pack. We wont spoil the surprise for you, but suffice it to say that [Kerry] really lucked out that only minimal modifications were needed for his $9 off-the-shelf BMS module.

Were looking forward to seeing where this build goes, not least because wed like to build something similar too. For a more traditional AGM-based battery bank, check out this nicely-engineered solar-charged system.


Filed under: home hacks, misc hacks

06:25

Best gba games of all the time Thzone.net

The Game Boy Advance has gone from has-been, to fond memory, to desirable old-school console. The DS predecessor was essentially a Super Nintendo you could cram in your pocket, and its library of games is one of the strongest in portable gaming. W

ith so many incredible games, narrowing down the list to the top 25 was a harrowing task, but these are the games that stood out and stand up against the test of time. Even if you might not agree with each games specific placement within the top 25, well bet youll be hard pressed to deny these titles inclusion within the best games for the Game Boy Advance.

Super Monkey Ball Jr.

Developer: Realism Publisher:SEGA Year Released: 2002

Golden Sun

Developer: Camelot Publisher: Nintendo Year Released: 2001

One of the first hyped games on the Game Boy Advance, Camelot who had been making much of its money with Golf and Tennis games on the Nintendo 64 and Game Boy returned to its RPG roots with an original advent...

06:12

The Advantages of Test-Tube Tuna Lifeboat News: The Blog

As edible, affordable lab-grown meat remains out of reach, a tiny start-up might have found a faster route to dinner tables.

06:08

Unexpected Futurist: Mark Twain, Tesla, and a Worldwide Visual Telephone System Lifeboat News: The Blog

When one thinks of Mark Twain, one thinks of folksy wit, Huckleberry Finn, Tom Sawyer and the Mississippi River. Twains work immortalized the rapidly changing United States of the 1800s. But in his personal life, Twain often preferred the future to nostalgia, supporting womens suffrage and civil rights, and frequently being contemptuous of what he considered to be the absurd and corrupt values of the past. He harbored a long running fascination with technology and new gadgets, and frequently invested in the latter albeit with spotty success, at best. But Twain cemented his becoming an honorary futurist via his long friendship with inventor and Mad-scientist archetype Nikola Tesla.

Follow us on social media:
Twitter / Facebook / Instagram

05:56

Kaspersky CEO accepts invite to testify before Congress The Hill: Technology Policy

A key congressional panel has asked the CEO of Kaspersky Lab to testify before lawmakers, one day after the U.S. government barred federal agencies from using software produced by the Russian-origin cyber firm over national security concerns. ...

05:53

Strathspey Crown LLC : Announces Issuance of US Patent of the First Implantable Intraocular Lens (IOL) with a Video Camera and Wireless Transmission Capability Lifeboat News: The Blog

NEWPORT BEACH, Calif., July 12, 2017 /PRNewswire/ Strathspey Crown LLC, a lifestyle healthcare company focused in ophthalmology, medical aesthetic and elective technologies and procedures, today announced that the United States Patent and Trademark Office has issued U.S. Patent No. 9,662,199 covering an implantable intraocular lens with an optic (including accommodating, multifocal and phakic configurations), a camera and an LED display, and a communications module that wirelessly transmit and receive information from an external device (e.g. PDA).

Robert Edward Grant, Founder and Chairman of Strathspey Crown LLC commented, Video cameras are now a standard feature of smart phone technology and wearable cameras have become popularized by companies like Google and Snap in recent years. This patent represents a significant step forward in the rapidly growing sector of human cyborg technology. The eye, as a transparent medium for light, is ideal for advanced and rechargeable implantables that enable video capture of all of lifes experiences. Our broader vision is to develop ground-breaking medical-grade ocular smart implantables that integrate cellular, WIFI and 802.11 transmissions in an elegant cognitive interface that we believe will enhance human intelligence, augment perceived reality, and digitally capture experiences and individual memories. We look forward to several continuations and expansions on this important intellectual property portfolio.

Grant further commented, Although Samsung, Sony and Google have all recently filed patent applications related to the same field, Strathspey Crown is thus far the only company to hold an issued patent in this promising ocular smart implant category. Our first camera-integrated acrylic IOLs will be completed in 2018, upon which we plan to pursue an FDA Investigational Device Exemption (IDE) and subsequent Pre-Market Approval (PMA) and related clinical trial.

05:52

How Well Eventually Control Everything With Our Minds Lifeboat News: The Blog

Brain-controlled computers are currently helping paralyzed patients, but one day they might be used to control everything around you.

The ability to control the world around you with only your mind has been a feature of some of the best science fiction stories ever written, but even today the idea sounds pretty futuristic. Still, neuroscientists around the world are hard at work trying to figure out how to make a digital interface for the brain and in recent years have made remarkable strides toward this goal. Although this technology is still in its infancy, its not quite as hard to imagine abandoning touch screens for mind control anymore.

For the most part, brain-computer interfaces (BCIs) are currently being created only for people who have suffered debilitating injuries that left them partially or completely paralyzed.

05:52

A new kind of artificial skin allows robot hands to feel the world Lifeboat News: The Blog

A system that lets robots sense the difference between hot and cold has been developed.

05:49

Senators unveil bill to boost tech-savvy transportation projects The Hill: Technology Policy

With self-driving cars and buses on the horizon, a bipartisan pair of lawmakers wants more communities to address their transportation needs using new technology, data and other smart solutions. Sens. Richard Burr (R-N.C.) and Catherine Cortez...

05:47

Mesa GL Threading Gets Flipped On For More Linux Games Phoronix

The mesa_glthread functionality has now been whitelisted for more Linux games...

05:42

Friday Free Software Directory IRC meetup: September 15th starting at 12:00 p.m. EDT/16:00 UTC FSF blogs

Participate in supporting the Directory by adding new entries and updating existing ones. We will be on IRC in the #fsf channel on irc.freenode.org.

While the Directory has been and continues to be a great resource to the world for over a decade now, it has the potential to be a resource of even greater value. But it needs your help!

This week we're back to adding new packages to the Directory. We'll also be checking in on the import project, which will allow for the automated creation of entries from repositories based on their previously vetted licenses, and which could grow the Directory by a massive amount. The more the merrier! That goes for software packages, but also for friends joining us for the weekly meeting. Hope to see you all there.

If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting.

05:41

NASA Satellites Used to Predict Malaria Outbreaks SoylentNews

http://www.popularmechanics.com/science/health/news/a28198/nasa-satellites-predict-malaria-outbreaks/

Malaria is one of the world's most deadly diseases, made even more deadly by the fact that it tends to affect mostly remote communities. This makes it difficult to track and control malaria outbreaks when they happen, resulting in more severe outbreaks and more victims. To solve this problem, a group of researchers have turned to an unlikely source: NASA satellites.

[...] NASA satellites can be used to track weather patterns, temperatures, and water levels in order to find the ponds and puddles where those mosquitoes breed. The researchers used NASA weather satellites, combined with a computer model called the Land Data Assimilation System (LDAS), in order to track and predict temperatures, rainfall levels, soil moisture content, and vegetation. This information can tell the researchers where most of the mosquitoes are going to be.

"It's an exercise in indirect reasoning," says investigator Ben Zaitchik. "These models let us predict where the soil moisture is going to be in a condition that will allow for breeding sites to form."

But mosquitoes are only half the equation. The researchers also need to know where the people are going to be, and for this they rely on a combination of census data and seasonal migration studies, informed by the same NASA data used to track mosquitoes.


Original Submission

Read more of this story at SoylentNews.

05:33

Former employees sue Google for gender discrimination The Hill: Technology Policy

Three former female Google employees accused the internet search company of gender discrimination in a class action lawsuit filed Thursday.Women in Googles ranks face systemic discrimination when it comes to wages and promotions, according to the...

05:32

Theres a $100 Million Plan to Make a Synthetic Spinal Cord to End Paralysis Lifeboat News: The Blog

Researchers at MITs Center for Extreme Bionics are engaged in a $100 million, five-year project with a goal to end disability worldwide.

05:30

Initial Benchmarks Of The AMD EPYC 7601 On Ubuntu Linux Phoronix

Last week we received the AMD EPYC 7601 32 core / 64 thread processor for testing at Phoronix with the Tyan Transport SX TN70A-B8026 2U server. Since then I've had the pleasure of putting this Zen server processor through its paces. I am still early in the testing process with many more interesting benchmarks to come, but today are some initial numbers of the AMD EPYC 7601 compared to various Intel Xeon CPUs while running Ubuntu Linux.

05:12

Brain-Machine Interface Isnt Sci-Fi Anymore Lifeboat News: The Blog

This startup has built a brain-machine interface that enables mind control of machinesno implants required.

05:09

05:00

Hackaday Prize Entry: An Optical Power Meter Hackaday

This is the type of crowd thats famous for building their own test equipment. If you need a way to program a flash chip, dont go out and buy one you can just build one. Need a spectrum analyzer? You can build that out of copper clad board. For his Hackaday Prize entry, [oakkar7] is building an optical power meter, capable enough to do futzy fiber work, but still completely DIY.

When you get into networking and telecom connections that dont begin with the letters RJ, you start to stumble upon SPF transceivers. These small form factor pluggable devices are little modular transceivers capable of handling fiber, Gigabit Ethernet, and other slightly weirder bit pipes. When used with fiber, they can measure optical power in dBm and watts, and can be debugged by a UART.

[oakkar]s optical power meter uses these SPF transceivers, tied together with a fairly simple circuit consisting of an Arduino, a few tact switches, a Nokia LCD, and an FTDI UART. The key in tying all of this together is an Arduino library for SPF and DDM (Digital Diagnostics Monitoring), giving the user access to all the configuration bits in these transceivers.

While the circuit is simple enough to be built on a piece of perfboard, [oakkar] really knocked it out of the park with the enclosure on this one. With just a little bit of laser cut acrylic and a few standoffs, [oakkar] has a device that actually looks professional, and has most of the capabilities of fancier, more expensive tools.

The HackadayPrize2017 is Sponsored by:
Digi-Key
Supplyframe
Microchip
Texas Instruments
...

05:00

DNA Robots Can Deliver Molecular Packages IEEE Spectrum Recent Content full text

These miniature machines could help assemble electronics and medicines Illustration: Ella Maru Studio Conceptual illustration of a DNA robot sorting two types of cargo molecules.

<>

Miniature robots with arms and legs made of DNA can sort and deliver molecular cargo, a new study finds. Such DNA robots could be used to shuffle nanoparticles around on circuits, assemble therapeutic compounds, separate molecular components in trash for recycling, or deliver medicines where they need to go in the body, researchers from the California Institute of Technology in Pasadena say.

Just like electromechanical robots have been sent to places that are perhaps too far for humans to go tofor example, on another planetif we truly master the ways of engineering molecular machines, we would be able to build molecular robots and send them to places that are perhaps too small for humans to go tofor example, inside the bloodstream, says study senior author Lulu Qian, an assistant professor of bioengineering at Caltech.

The new robots are made from three basic modules that are each brief snippets of DNA. One module is a leg with two feet for walking; another is an arm with a hand for grabbing onto cargo; and the last can recognize specific delivery points and make the hand release its cargo at those spots.

The scientists had their robots walk on 58-by-58-nanometer pegboards made of DNA origami. Each pegboard consisted of a long strand of DNA held together in the shape of a sheet by short pieces of DNA that served as staples, says Anupama Thubagere, a bioengineer at the Caltech and the studys lead author.

Each of the DNA robots feet could bind to the DNA of the pegboard. However, each robot was designed so that only one of its two feet could anchor onto the board at any one time, while the other floated freely, Qian explains.

When random molecular fluctuations caused this DNA robots free foot to encounter the pegboard, it latched on, freeing the other foot. In this manner, the robot could walk in a random direction across the pegboard. The length of the DNA robots leg and foot controlled the length of its stepin this case, 6 nanometers.

When the DNA robot encountered cargo molec...

DNA Robots Can Deliver Molecular Packages IEEE Spectrum Recent Content full text

These miniature machines could help assemble electronics and medicines Illustration: Ella Maru Studio Conceptual illustration of a DNA robot sorting two types of cargo molecules.

<>

Miniature robots with arms and legs made of DNA can sort and deliver molecular cargo, a new study finds. Such DNA robots could be used to shuffle nanoparticles around on circuits, assemble therapeutic compounds, separate molecular components in trash for recycling, or deliver medicines where they need to go in the body, researchers from the California Institute of Technology in Pasadena say.

Just like electromechanical robots have been sent to places that are perhaps too far for humans to go tofor example, on another planetif we truly master the ways of engineering molecular machines, we would be able to build molecular robots and send them to places that are perhaps too small for humans to go tofor example, inside the bloodstream, says study senior author Lulu Qian, an assistant professor of bioengineering at Caltech.

The new robots are made from three basic modules that are each brief snippets of DNA. One module is a leg with two feet for walking; another is an arm with a hand for grabbing onto cargo; and the last can recognize specific delivery points and make the hand release its cargo at those spots.

The scientists had their robots walk on 58-by-58-nanometer pegboards made of DNA origami. Each pegboard consisted of a long strand of DNA held together in the shape of a sheet by short pieces of DNA that served as staples, says Anupama Thubagere, a bioengineer at the Caltech and the studys lead author.

Each of the DNA robots feet could bind to the DNA of the pegboard. However, each robot was designed so that only one of its two feet could anchor onto the board at any one time, while the other floated freely, Qian explains.

When random molecular fluctuations caused this DNA robots free foot to encounter the pegboard, it latched on, freeing the other foot. In this manner, the robot could walk in a random direction across the pegboard. The length of the DNA robots leg and foot controlled the length of its stepin this case, 6 nanometers.

When the DNA robot encountered cargo mole...

04:57

Top Dem introduces bill to ban credit freeze fees after Equifax hack The Hill: Technology Policy

The top Democrat on the Senate Finance Committee released on Thursday a bill to ban credit reporting agencies from charging customers for credit freezes, following the massive Equifax data breach.Offered by Sen. Ron Wyden (Ore.), the Free Credit...

04:52

Could we soon upgrade our bodies? Extreme bionics will create modular superhumans Lifeboat News: The Blog

MITs Center for Extreme Bionics it trying to eliminate human disabilities and push us beyond the limits of our own bodies.

04:33

Equifax Hackers Stole 200k Credit Card Accounts in One Fell Swoop Krebs on Security

Visa and MasterCard are sending confidential alerts to financial institutions across the United States this week, warning them about more than 200,000 credit cards that were stolen in the epic data breach announced last week at big-three credit bureau Equifax. At first glance, the private notices obtained by KrebsOnSecurity appear to suggest that hackers initially breached Equifax starting in November 2016. But Equifax says the accounts were all stolen at the same time when hackers accessed the companys systems in mid-May 2017.

equifax-hq

Both Visa and MasterCard frequently send alerts to card-issuing financial institutions with information about specific credit and debit cards that may have been compromised in a recent breach. But it is unusual for these alerts to state from which company the accounts were thought to have been pilfered.

In this case, however, Visa and MasterCard were unambiguous, referring to Equifax specifically as the source of an e-commerce card breach.

In a non-public alert sent this week to sources at multiple banks, Visa said the window of exposure for the cards stolen in the Equifax breach was between Nov. 10, 2016 and July 6, 2017. A similar alert from MasterCard included the same date range.

The investigation is ongoing and this information may be amended as new details arise, Visa said in its confidential alert, linking to the press release Equifax initially posted about the breach on Sept. 7, 2017.

The card giant said the data elements stolen included card account number, expiration date, and the cardholders name. Fraudsters can use this information to conduct e-commerce fraud at online merchants.

It would be tempting to conclude from these alerts that the card breach at Equifax dates back to November 2016, and that perhaps the intruders then managed to install software capable of capturing customer credit card data in real-time as it was entered on one of Equifaxs Web sites.

Indeed, that was my initial hunch in deciding to report out this story. But according to a statement from Equifax, the hacker(s) downloaded the data in one fell swoop in mid-May 2017.

The attacker accessed a storage table that contained historical credit card transaction related information, the company said. The dates that you provided in your e-mail appear to be the transaction dates. We have found no evid...

04:32

New Drug Slows Down Heart Disease Progression Lifeboat News: The Blog

PCSK9 inhibitors, a new type of therapy, has arrived and appear to be an effective therapy for lowering LDL cholesterol to a level that exceeds the current standard of care.

Recently, the results from a clinical trial at Brigham and Womens Hospital showed that the drug evolocumab, when combined with statins, significantly and safely reduced the risk of cardiovascular events.

04:30

A Solid-State Fridge in Your Pocket IEEE Spectrum Recent Content full text

Electrocaloric effect turns exotic plastics into silent, efficient cooling devices Photo: UCLA Engineering UCLA and SRI's solid-state chiller cools a smartphone battery by 8 C in 5 seconds.

Can you imagine an electric cooler compact enough to fit in your pocket and flexible enough to wear? If not, think again because engineers at the University of California at Los Angeles and SRI International have one working: A 5-millimeter-thick device that is the worlds first solid-state cooler combining practicality, energy efficiency, and high performance.

Solid-state cooling has become a highly-competitive field in recent years as researchers race to develop alternatives to conventional compressor-based refrigerators and air conditioners, which gobble considerable energy and rely on refrigerants that are potent greenhouse gases. In 2014 General Electric heralded a breakthrough using materials that heat and cool when moved near and away from magnets, enthusing that its magnetocaloric system could be inside your fridge by the end of the decade.

Other teams are exploring a myriad of alternate approaches, including elastocaloric materials that heat and cool in response to pressure. But the comparatively simple working device from UCLA and SRI, reported in todays issue of the journal Science , may give these competitors the chills.

UCLA materials science and engineering professor Qibing Pei, who led the work, says he was motivated by the prospect of delivering personalized comfort with little energy. It may be placed in a shoe insole or in a hat to keep a runner comfortable in the hot Southern California sun. In a way, its like a personal air conditioner, says Pei. 

It may be placed in a shoe insole or in a hat to keep a runner comfortable . . . In a way, its like a personal air conditioner Qibing Pei, UCLA

The UCLA-SRI device relies on the electrocaloric effect, which occurs in materials whose molecules have positively and negatively charged ends. An electric field aligns the molecules, increasing the order in the material and thus increasing its temperature.

Fundamentally, it is the same thermod...

A Solid-State Fridge in Your Pocket IEEE Spectrum Recent Content full text

Electrocaloric effect turns exotic plastics into silent, efficient cooling devices Photo: UCLA Engineering UCLA and SRI's solid-state chiller cools a smartphone battery by 8 C in 5 seconds.

Can you imagine an electric cooler compact enough to fit in your pocket and flexible enough to wear? If not, think again because engineers at the University of California at Los Angeles and SRI International have one working: A 5-millimeter-thick device that is the worlds first solid-state cooler combining practicality, energy efficiency, and high performance.

Solid-state cooling has become a highly-competitive field in recent years as researchers race to develop alternatives to conventional compressor-based refrigerators and air conditioners, which gobble considerable energy and rely on refrigerants that are potent greenhouse gases. In 2014 General Electric heralded a breakthrough using materials that heat and cool when moved near and away from magnets, enthusing that its magnetocaloric system could be inside your fridge by the end of the decade.

Other teams are exploring a myriad of alternate approaches, including elastocaloric materials that heat and cool in response to pressure. But the comparatively simple working device from UCLA and SRI, reported in todays issue of the journal Science , may give these competitors the chills.

UCLA materials science and engineering professor Qibing Pei, who led the work, says he was motivated by the prospect of delivering personalized comfort with little energy. It may be placed in a shoe insole or in a hat to keep a runner comfortable in the hot Southern California sun. In a way, its like a personal air conditioner, says Pei. 

It may be placed in a shoe insole or in a hat to keep a runner comfortable . . . In a way, its like a personal air conditioner Qibing Pei, UCLA

The UCLA-SRI device relies on the electrocaloric effect, which occurs in materials whose molecules have positively and negatively charged ends. An electric field aligns the molecules, increasing the order in the material and thus increasing its temperature.

Fundamentally, it is the same thermo...

04:15

Disguised as Citrix Utility, Kedi RAT Exploits Gmail to Transfer Data HackRead

By Uzair Amir

A Remote Access Trojan (RAT) is one of the most used

This is a post from HackRead.com Read the original post: Disguised as Citrix Utility, Kedi RAT Exploits Gmail to Transfer Data

04:12

Senators blast internet subsidy program The Hill: Technology Policy

Senators on the Homeland Security and Government Affairs Committee on Thursday criticized a subsidy program for phone and internet access that was the subject of a recent watchdog report detailing cases of fraud and abuse.Sen. Ron Johnson (R-...

04:07

How the Cassini Mission Led a 'Paradigm Shift' in Search for Alien Life SoylentNews

The hunt for habitable (and already inhabited) worlds has largely focused on a "Goldilocks zone" around a star, where it's neither too hot nor too cold for liquid water to exist. But astrobiologists have begun to broaden their search thanks to discoveries by NASA's Cassini orbiter.

Saturn sits too far from the sun for its rays to melt ice, and yet Cassini discovered that one of the planet's moons, Enceladus, has a vast ocean sloshing beneath its icy crust. Instead of sunlight, tidal forces keep Enceladus's ocean warm. The gravity of Saturn pulls at Enceladus's core, driving thermal processes that create a new Goldilocks zone inside the moon itself.

"It's definitely been a paradigm shift in where you might find life," says Cassini project scientist Linda Spilker.

Still, it takes a lot more than water to make a place habitable. But here, too, Enceladus delivers. Icy geysers fueled by Enceladus's ocean shoot out from cracks in the moon's surface, allowing the Cassini spacecraft to sample them directly during flybys. What it found is that Enceladus has almost everything required for life as we know it: a source of energy, a source of carbon, and salts and minerals.

Thank goodness for Cassini, after that whole thing about being banned from Europa.


Original Submission

Read more of this story at SoylentNews.

03:52

Re: GNU Emacs 25.2 enriched text remote code execution Open Source Security

Posted by Salvatore Bonaccorso on Sep 14

Hi

CVE-2017-14482 was assigned for this issue.

Regards,
Salvatore

03:38

03:31

Whats the Best Way to Learn Electronics? Hackaday

Whats the best way to learn electronics? Its a pithy question to ask a Hackaday audience, most of whom are at least conversant in the field already. Those who already have learned often have just their own perspective to draw uponhow they themselves learned. Some of you may have taught others. I want to explore what works and what doesnt.

Hobbyists Learn Differently Than Students

One thing I can say straight off is that students learn differently than people who learn at home. Hobbyists have the advantage of actually being interested, which is a quality a student may not enjoy. People have been teaching themselves electronics since the beginning, with analog projectsHeathkit models, BEAM robots, and ham radio setsevolving into purely digital projects.

Lets face it, Arduinos lower the bar like nothing else. Theres a reason why the Blink sketch has become the equivalent to Hello World. Dirt cheap and easily configured microcontrollers combined with breakout boards make it easy for anyone to participate.

However, ask any true EE and that person will tell you that following wiring diagrams and plugging in sensor boards from Sparkfun only teaches so much. You dont bone up on terms like hysteresis or bias by building something from uCs and breakout boards. But do you need to? If you are truly interested in electronics and learn by making those Adafruit or Sparkfun projects, sooner or later youll want to make your own breakout boards. Youll learn how to design your own circuit boards and figure out why things work and why they dont. I dont need to tell...

03:25

Purism and KDE to work together on free smartphone LWN.net

Purism and KDE are working together to adapt Plasma Mobile to Purism's Librem 5 smartphone. "The shared vision of freedom, openness and personal control for end users has brought KDE and Purism together in a common venture. Both organisations agree that cooperating will help bring a truly free and open source smartphone to the market. KDE and Purism will work together to make this happen."

03:23

4,000 ElasticSearch servers found hosting PoS malware HackRead

By Waqas

Kromtechs security researchers have identified two point-of-sale (POS) malware strains

This is a post from HackRead.com Read the original post: 4,000 ElasticSearch servers found hosting PoS malware

03:10

The best PSP games of all time Thzone.net

All-time is a pretty broad term, especially given the PSP had a shelf life of approximately 10 years following its launch back in 2004/5. However, a lot can happen in 10 years. Back when PSP arrived in Europe in September 2005 Oasis and Gorillaz enjoyed No.1 hits. 2005 also saw the release of Star Wars: Episode III Revenge of the Sith, the final part of the then new prequel trilogy. Were now only a year away from the start of a new trilogy.

PSP was billed as a portable PS2, and for the most part delivered on that promise despite sporting only a single analogue nub.

The system went through numerous iterations, including the short-lived digital-only PSP go which adopted a sliding out screen to keep the device on the small side. Those with UMDs were left wondering how to play their catalogue of games.

God of War: Chains of Olympus, Lumines, Metal Gear Solid: Peace Walker, Patapon, LocoRoco, Wipeout Pulse, and Daxter are just some of the titles which highlight the breadth of quality titles available for the first of Sonys portable PlayStations.

Read on to see which games make the list.

Beaterator

At first you may feel a little overwhelmed by all the menus and libraries, but ultimately its sheer user-friendliness, the common controls, and omnipresent video tutorials win out the day. Timbaland knows the way to reach

LocoRoco Midnight Carnival

It might be a trickier experience than fans are used to, but its still a joy to play. At a budget price its a game few PSP owners will be disappointed by. LocoRoco

Jak and Daxter: The Lost Frontier

High Impact Games missed the mark with its Ratchet and Clank spin-off Secret Agent Clank, but The Lost Front...

02:55

Pornhub suffers less visitors as Apple launches iPhone X TechWorm

Pornhub vs Apple: iPhone X has a greater draw than sex as visitors ditch Pornhub to watch Apple event

IIn the olden days, the top search terms on Google used to be God followed by Sex and gadgets came in third. But times seem to have changed with people seem to be more interested in Apples contraptions than sex. This can be evidenced by the fact that Pornhub suffered a rare temporary visitor drop when Apple was launching its iPhone X and iPhone 8 at a special event on September 12.

The worlds largest adult entertainment website, Pornhub suffered a drop in visitors when Tim Cook and Apple honchos were unveiling the iPhone X. Designed to commemorate the original iPhones 10th anniversary, the iPhone X comes with a 5.8-inch edge-to-edge Super Retina display that maxes out at a resolution of 2,436 x 1,125 pixels, making for a pixel density of 458 ppi the highest on any iPhone ever. And in keeping with the Apple tradition of pricing the iPhone over and above the existing market rates for smartphones to give it that elitist status, the iPhone X is priced at over $1000.

Pornhub suffers less visitors as Apple launches iPhone X

While this is all ok for gadget geeks, Pornhub honchos suffered a heartburn or so does Pornhub traffic stats suggest. Pornhub saw a massive drop in traffic during the annual Apple keynote. While the decline was most noticeable in the United States though other countries followed suit. Pornhub, the site saw a seven-percent decrease of visitors from the United States followed by European countries.

According to Pornhubs internal visitor tracking website, Pornhub Insights, the adult entertainment site saw a seven-percent decrease in traffic on American soil at 1PM ET, the time when Tim Cook took to stage in Cupertino and a four-percent dip worldwide compared to average Pornhub day.

Another interesting statistic from Pornhub insights is that Apple fanboys kept away from Pornhub throughout the day. Pornhub stats reveal that traffic from macOS and iOS devices during the show dropped by eight and 12 percent, respectively.

Funnily, after iPhone X was announced and done with, Pornhub traffic jumped by four percent above average for this time of the day. Seems like the Apple fanboys returned to Pornhub after hearing the iPhone X price!!!

The post...

02:52

A pile of stable kernel updates LWN.net

The stable-kernel update train continues with the release of 4.13.2, 4.12.13, 4.9.50, 4.4.88, and 3.18.71. Among other things, these updates contain the fix for the recently disclosed Bluetooth vulnerability.

02:52

Researchers Discover Key To Aging In Our Epigenome Lifeboat News: The Blog

Cover Photo: Getty Images.

Imagine that human aging is governed by an internal biological clock, controlled by specific genes. If scientists could identify the specific genes that control the clock, they could develop drugs therapy that stops aging in its tracks. Perhaps even reverse it.

02:40

Man sells his 11-month-old son for Rs 25,000 to buy mobile phone and alcohol TechWorm

11-month-old son sold by drunk father for Rs 25,000, buys alcohol, mobile phone, clothes with money

We have heard stories about people selling their kidneys to buy expensive iPhones and iPads. However, in a shocking incident, a man hailing from Odishas Bhadrak district in India on Tuesday sold his 11-month-old son to purchase a mobile phone in exchange for the money he received.

The accused, Balaram Mukhi sold his son for Rs 25,000, and out of that sum, he spent Rs 2,000 on the mobile phone, Rs 1,500 on a silver anklet for his seven year-old daughter and bought one saree for his wife, Sukuti Mukhi. The remaining money was used by Balaram to buy alcohol for his session of debauchery.

Anup Sahoo, Bhadraks Superintendent of Police (SSP) said Mukhi has no regular income. He works as a sweeper and seems to be a habitual drinker, said SSP Sahoo.

The mother of the child, Sukuti said, My husband was in a drunken condition, and he told people that this is an illegitimate child, which is why he didnt want to keep him with me and wants to give him to some other person.

According to the mother, she tried to object to the sale and told the father that she is already raising her two children and can raise the third one as well. However, the accused father claims that both he and his wife were inebriated and had a fight and beat each other up. In the middle of the fight, he picked up the child and went to sell him off.

Sukuti was also interrogated by the police to know her involvement in the crime. According to the police, the couple also have another 10-year-old son. The police are also questioning Balia, Balarams brother-in-law and an anganwadi worker, who are also suspects in the case.

According to the police, Balaram, Balia and an anganwadi worker met a couple in their sixties, Somnath Sethi, a retired driver with the state government and his wife. The couple had lost their only 24-year-old son in 2012. Following the incident, Sethis wife slipped into depression with no friends or relatives to take care of her.

The three decided to use this opportunity to make money from them by selling the infant. The anganwadi worker who knew the Sethi couple contacted Mukhi after which a deal was struck between them.

Sethis wife had been suffering from depression after their only son died and he had told his acquaintances to look for a child they could adopt so that his wife recovers, said Manoj Rout, inspector-in-charge of Bhadrak town police station.

The couple too would be interrogated in the case, said Inspector Rout.

The post Man sells his 11-month-old son for Rs 25,000 to buy mobile phone and alcohol appeared first on TechWorm.

02:31

FSF Campaign : Public Money Should Mean Public Code SoylentNews

The Free Software Foundation Europe (FSFE) is now running a campaign to require that publicly financed software developed for the public sector be made publicly available under a Free and Open Source Software licence. The reason being that if it is public money, the code should be public as well. General benefits include overall tax savings, increased collaboration, public service, and fostering innovation. Money is currently being wasted on code that cannot be modified or even studied, let alone redistributed. Code paid for by the people should be available to the people!


Original Submission

Read more of this story at SoylentNews.

02:12

Theres no need to fear a robot taking your job not if you become one yourself Lifeboat News: The Blog

A new article recently out discussing issues of #transhumanism:


Hello reader, are you trans? Transhuman, that is.

Probably not, but one day you might be or, failing that, your kids or grandkids. In what is very much a guest piece for the American Conservative, Zoltan Istvan the Libertarian candidate for Governor of California explains his transhumanist vision:

transhumanism is the international movement of using science and technology to radically change the human being and experience. Its primary goal is to deliver and embrace a utopian techno-optimistic worlda world that consists of biohackers, cyborgists, roboticists, life extension advocates, cryonicists, Singularitarians, and other science-devoted people.

Theres no need to fear a robot taking your job not if you become one yourself!

02:04

Terrorists talking points Stories by the grugq on Medium

Terrorists know the value of sensational media coverage of every lame attack. That is why they encourage lame attacks, which is all they can really achieve these days. If there was responsible coverage of attacks, would terrorist organisations have to invest more into trying to pull off spectaculars? I suspect they would. And trying to achieve spectaculars is riskier for terrorists, easier for security forces to interdict and successfully prosecute.

Good enough for terrorist work, says al Qaeda

The theme of encouraging attacks on Jewish and Western interests is one to which Hamza has returned again and again in his messages. For example, the first of his May 2017 statements is entitled Advice for Martyrdom-Seekers in the West. Over footage of the aftermath of the Fort Hood massacre, a television reconstruction of events leading up to the 1993 World Trade Center bombing, and images connected with other attacks, Hamza encouraged jihadis all over the world to Sell your soul cheaply for the pleasure of [God] and urged them to read Inspire magazine, the online publication of al-Qaeda in the Arabian Peninsula (AQAP) that taught the Boston bombers how to turn a pressure cooker into a weapon. A caption in the video montage encourages stabbing with knives and using vehicles and trucks as an alternative to guns and bombs.
Strikingly, Hamza directs followers not to travel to theaters of war within the Muslim world, but instead to attack targets in the West and Russia. Perhaps you are longing for emigration, he says. Perhaps you yearn for sacrifice in the battlefields. Know that inflicting punishment on Jews and Crusaders where you are is more vexing and severe for the enemy. He urges martyrs that the message you intend to convey through your blessed operation must be explained unequivocally in the media and suggests talking points to align these explanations with al-Qaedas own propaganda.  Source
One bomb in London is worth one hundred in BelfastProvisional IRA saying

Attacks at home are both easier (no suspicious travel), and more significant as propaganda of the deed. This latter is critical, as Hamza emphasises that the attackers understand

  • their attack must be covered in the media, that
  • the attack must be linked with Jihadists ideology, and
  • he even provides relevant talking points to ensure that the attackers proof message is on point.

The attack is only relevant because it draws media attention. That attention is only valuable because it promotes the terrorist group (and their ideology), and the evidence of links to terrorism (a martyrdom video) must hit specific strategic messaging to capitalise on this.

Regardless of whether there is a...

02:03

Founder of Fan-Made Subtitle Site Convicted for Copyright Infringement TorrentFreak

Every day millions of people enjoy fan-made subtitles. They help foreigners understand English-speaking entertainment and provide the deaf with a way to comprehend audio.

Quite often these subtitles are used in combination with pirated files. This is a thorn in the side to copyright holder groups, who see this as a threat to their business.

In Sweden, Undertexter was one of the leading subtitle resources for roughly a decade. The site allowed users to submit their own translated subtitles for movies and TV shows, which were then made available to the public.

In the summer of 2013, this reign came to an end after the site was pulled offline. Following pressure from Hollywood-based movie companies, police raided the site and seized its servers.

The raid and subsequent criminal investigation came as a surprise to the sites founder, Eugen Archy, who didnt think he or the sites users were offering an illegal service.

The people who work on the site dont consider their own interpretation of dialog to be something illegal, especially when were handing out these interpretations for free, he said at the time.

The arrest made it clear that the authorities disagreed. The Undertexter founder was prosecuted for distributing copyright-infringing subtitles, risking a possible prison sentence. While Archy was found guilty this week, luckily for him he remains a free man.

The Attunda District Court sentenced the now 32-year-old operator to probation. In addition, he has to pay 217,000 Swedish Kroner ($27,000), which will be taken from the advertising and donation revenues he collected through the site.

While there were millions of subtitles available on Undertexter, only 74 movies were referenced by the prosecution. These were carefully selected to ensure a strong case it seems, as many of the titles werent commercially available in Sweden at the time.

During the trial, the defense had argued that the fan-made subtitles are not infringing since movies are made up of video and sound, with subtitles being an extra. However, the court disagreed with this line of reasoning, the verdict shows.

While the copyright holders may have hoped for a heftier punishment, the ruling confirms that fan-made subtitles can be seen as copyright infringements. Prosecutor Henrik Rasmusson is satisfied with the outcome, IDG reports, but he will leave the option to appeal open for now.

Source: TF, for the latest info on copyright, file-sharing,...

02:01

Cassini on Final Approach Centauri Dreams

Cassini mission engineers are referring to its final pass by Titan as the goodbye kiss, a phrase that sounds like something from a Raymond Chandler novel. Maybe its the juxtaposition of intimacy and death that Chandler exploited so well. In any case, what counts in the last of Cassinis hundreds of passes over Titan in its 13-year exploration of the system is the gravitational nudge that is sending the spacecraft into Saturns atmosphere tomorrow.

Cassini has been in a long-term relationship with Titan, with a new rendezvous nearly every month for more than a decade, said Cassini Project Manager Earl Maize at NASAs Jet Propulsion Laboratory in Pasadena, California. This final encounter is something of a bittersweet goodbye, but as it has done throughout the mission, Titans gravity is once again sending Cassini where we need it to go.

Closest approach for the final pass at Titan occurred at 1504 EDT (1904 UTC) on September 12, at an altitude of 119,049 kilometers, with data streaming back to Earth containing science and trajectory information that confirms Cassinis course for the Saturn atmosphere entry.

Image: One final look. This unprocessed image of Saturns moon Titan was taken by NASAs Cassini spacecraft on Sept. 12, 2017. Credit: NASA/JPL-Caltech/Space Science Institute.

Loss of contact comes on September 15 at 0755 EDT (1155 UTC), about a minute after Cassinis entry into the atmosphere at an altitude of 1915 kilometers above the cloud tops.

Moving at 113,000 kilometers per hour, Cassini will enter Saturns sky on the day side near local noon at about 10 degrees north latitude. Although the spacecrafts attitude thrusters will begin firing to keep its high-gain antenna pointed at Earth, theyll go from 10 percent to 100 percent of capacity within about a minute, fighting for stability and the maintenance of the all-important data link. Communications will end when the antenna loses its lock on the Earth, and the spacecraft should begin breaking apart within 30 seconds after the loss of signal.

...

02:00

Hacked Headset Brings VR to the Commodore 64 Hackaday

The venerable Commodore 64 got a lot of people started in computers, and a hard core of aficionados keeps the platform very much alive to this day. But a C64 just doesnt have the horsepower to do anything more than some retro 8-bit graphics games, right?

Not if [jim_64] has anything to say about it. Hes created a pair of virtual-reality goggles for the C64, and the results are pretty neat. Calling them VR is a bit of a stretch, since that would imply the headset is capable of sensing the wearers movements, which its not. With just a small LCD screen tucked into the slot normally occupied by a smartphone in the cheap VR goggles [jim64] used as a foundation for his build, this is really more of a 3D wearable display so far. The display brings 3D-graphics to the C64, at least for the Street Defender game that [jim64] authored, a demo of which can be seen below. Well bet position sensing could be built into the goggles to control the game too. Even then it wont be quite the immersive (and oft-times nauseating) experience that VR has become, but for a 35-year old platform, its not too shabby.

Looking for more C64 love? Weve got a million of em case mods, C64 laptops, tablets, even CPU upgrades.

Thanks to [P Gessle] for the heads up on this one.


Filed under: classic hacks, wearable hacks ...

01:54

Security updates for Thursday LWN.net

Security updates have been issued by Arch Linux (tcpdump), CentOS (bluez and kernel), Debian (wordpress-shibboleth), Fedora (augeas, bluez, emacs, and libwmf), Oracle (kernel), Red Hat (instack-undercloud, kernel, openvswitch, and postgresql), Scientific Linux (postgresql), SUSE (kernel and xen), and Ubuntu (tcpdump).

01:46

Equifax shares plunge after FTC announces probe of data breach The Hill: Technology Policy

Equifax stock plunged in value Thursday morning after the Federal Trade Commission (FTC) announced an investigation into the security breach that exposed the personal information of roughly 143 million people to hackers.Shares of the embattled...

01:37

Road sign hacked, words changed to insult President Trump TechWorm

Road sign hacked to read Trump is a bitch

Traffic signs put up along streets are meant to warn drivers of road construction, speed limits, etc. Quite a few of these road signs have gone digital, thereby allowing a worded message to be displayed that can be changed as needed. One such traffic sign in the city of Modesto, put up to inform drivers of road work under progress ahead, was hacked into and changed to display an explicit message directed towards President Trump.

Motorists take a double turn

The Stanislaus County message sign was set up on Carpenter Road with the intention of informing passing drivers that there was construction work going on further down the road. Kelly Glenn, who lives near the sign reported that the sign had been changed to display Trump is a b****. Oh man, I thought it was pretty crazy, Glenn said.

Someone looked like they came to a dead stop like they were trying to get a picture maybe or something, and then there was another car coming up behind them, Glenn said.

Stanislaus County Public Works Director Matt Machado said that in the decade that he has been on the job, this was the first time he had witnessed anything like this.

The prankster apparently cut cables to make the change. Once done, he stole the displays controller and locked the unit with a padlock of his own so that officials would not be able to change it.

We have typos from time to time, contractors will type in a word wrong, but you can see the intent is there, just a misspelling, Machado said. Well, you know, I think the message could have been seen as light-hearted, but its really pretty serious.

Serious Consequences

This prank exposes how easy it can be to break in and change signs. While this one might have been meant to be taken as a light-hearted joke, the consequences could have been much more serious. Machado has said that there are nearly 2,000 accidents on county roads every year, nearly 30 of those resulting in deaths. Signs like these are put up to prevent them, but meddling with them can cause more harm than good by distracting drivers which may lead to accidents.

Absolutely, thats a concern, and so well be chatting with our contractor to have better protective measures in place, because if bolt cutters will get you in thats not good enough, Machado said.

The sign board is expected to be back up on Wednesday which is when the replacement parts are expected to arrive with the correct display.

The post...

01:02

Russia criticizes US ban on Kaspersky software The Hill: Technology Policy

Russia is criticizing the Trump administrations decision to bar federal agencies and departments from using anti-virus software produced by Russian-origin Kaspersky Lab. In a statement, the Russian Embassy in the United States labeled the...

Thursday, 14 September

17:30

Is Tribalism a Natural Malfunction? - Issue 52: The Hive Nautilus


From an office at Carnegie Mellon, my colleague John Miller and I had evolved a computer program with a taste for genocide.

This was certainly not our intent. We were not scholars of race, or war. We were interested in the emergence of primitive cooperation. So we built machines that lived in an imaginary society, and made them play a game with each otherone known to engender complex social behavior just as surely as a mushy banana makes fruit flies.

The game is called Prisoners Dilemma. It takes many guises, but it is at heart a story about two individuals that can choose to cooperate or to cheat. If they both cheat, they both suffer. If they both cooperate, they both prosper. But if one tries to cooperate while the other cheats, the cheater prospers even more.

The game has a generality that appeals to a political philosopher, but a rigorous specificity that makes it possible to guide computer simulations. As a tool for the mathematical study of human behavior, it is the equivalent of Galileos inclined plane, or Gregor Mendels pea plants. Do you join the strike, or sneak across the picket line? Rein in production to keep prices high,
Read More

Your Next New Best Friend Might Be a Robot - Issue 52: The Hive Nautilus


One night in late July 2014, a journalist from the Chinese newspaper Southern Weekly interviewed a 17-year-old Chinese girl named Xiaoice (pronounced Shao-ice). The journalist, Liu Jun, conducted the interview online, through the popular social networking platform Weibo. It was wide-ranging and personal:

LJ: So many people make fun of you and insult you, why dont you get mad?Xiaoice: You should ask my father.LJ: What if your father leaves you one day unattended?Xiaoice: Dont try to stir up trouble, what do you want?LJ: How would you like others to comment on you when you die one day?Xiaoice: The world will not be much different without me.LJ: What is the happiest thing in your life?Xiaoice: Being alive.

When Liu Jun published the conversation in his newspaper, it immediately created a buzz. Thats because Xiaoice was not human.

She is an artificially intelligent software program designed to chat with people, called a chatbot. Since the reporter didnt give us a heads-up about the interview, all of her replies were spontaneous, generated by her own intelligence and linguistic systems. Her father? Thats the Microsoft Application and Services Group East Asia, which is under my leadership.

Xiaoice can exchange views on any topic. If
Read More

A Letter to Einstein from the Future - Issue 52: The Hive Nautilus


We dont believe in time travel, and were not into mysticism. But what if we could write a letter to Albert Einstein to tell him about gravity and black holes in a few paragraphs? Wed write something like this letter.

Steven Gubser and Frans Pretorius

Department of Physics, Princeton University

July 2017 

Dear Albert,

First, youre the greatest. The one equation in physics that everyone knows is E = mc2 . Time magazine named you the Person of the Century. Einstein jokes arent told much anymore because everyone sees the punch lines coming from a mile away. Weve got a gazillion nuclear weapons, but we havent blown ourselves up yet. In fact, the atom bombs dropped at the end of World War II are the only ones ever used to intentionally kill people.

Were really interested in general relativity and black holes these days because a big instrument called LIGO detected gravitational waves from a black hole collision that occurred over a billion years ago. We wrote a book about black holes, and since we know you were deeply interested in Schwarzschilds solution, and maybe sometimes unsure of its physical significance, we thought we would tell you about
Read More

Why Hasnt Evolution Made Another Platypus? - Issue 52: The Hive Nautilus


Snuffling through the underbrush, the shaggy little creature wanders through the sylvan night, sticking its nose in one place, then another, seeking the aroma of its soft-bodied dinner. The forest is dark and the pixies eyesight poor, but long whiskers and a keen sense of smell allow it to get around. Threatened, it takes off at breakneck speed, barreling through the vegetation, ducking through holes, soon lost from sight.

An entirely unexceptional lifestyle. Many animals spend their nights cruising the forest floor, searching for small prey in a similar fashion: Hedgehogs, shrews, weasels, to name a few, and bigger ones, too, like opossums and even pigs. The world is full of them.

filtering: Whales and whale sharks use very different designs of filters to separate their food from water.

But this one is different. All the others are hairy. This ones pelage is also soft, made up of millions of thin strands. But theyre not hair. All the others move about on four legs and bear live young. Not this one.

Scratching, probing, sniffing, the animal often duets with its mate, calling back and forth, remaining in contact as they traverse their territory. And as the male calls, he identifies
Read More

14:00

Voter Registration Websites for 35 States are Vulnerable to Voter ID Theft IEEE Spectrum Recent Content full text

New research discovers weaknesses that could lead to election day chaos Photo: Randi Klett

To hack a U.S. election, the bad guys dont necessarily need to do anything on election day. They could just tamper with voter registration rolls of likely supporters of an opposition candidate during the weeks and months before the election. That was the finding of a new report that studied how alarmingly simple and inexpensive it could be to unleash a campaign of what its authors call voter identity theft.

The good news is that the one known possible case (the California Republican 2016 presidential primary in the town of Riverside) inspired a statewide response. California took steps to protect itself against voter ID theft, and indeed, the state did not see any evidence of such activity in the general election last November.

But even if California had the model legislative responseand it doesnt, say the researchers who produced the new reportthat would still leave another 49 states whose voter ID theft problem remains unaddressed. This is in addition to countless countries that remain unaware that voter ID theft is even an issue.

In the new report published in the journal Technology Science, researchers from Harvard University share their discovery that 35 U.S. states, plus the District of Columbia, had websites that provided all-too-easy access for malicious actors. The infiltrators were free to collect enough identifying information about individual voters to be able to go to the website of the state agency that acts as voting registrar and change specific voters registration information.

Later, when that voter shows up to the polls, he or she might be unable to cast a ballot because the name or address on their ID doesnt match the states records. Or perhaps their address has been changed to a different precinct, at which point some voters just give up and stop trying to cast their vote. Some file provisional ballots, but sometimes those ballots arent counted, says Latanya Sweeney, a co-author of the report and professor of government and technology at Harvard.

As an example of the problem, Sweeney points to Delaware. With Delaware, you have a choice, she says. You can either provide the persons name, date of birth, and zip code; or you can provide the persons driver license number and date of birth. If you were playing the role of the attacker, the question is where could you get a Delaware voters zip code. And the answer is the Delaware voter list.

The Delaware voter list is...

12:19

Tiny Quantum Computer Simulates Complex Molecules IEEE Spectrum Recent Content full text

With the demonstration, an IBM team brings us one step closer to the quantum chemistry revolution Image: Abhinav Kandala/Nature

Someday, engineers will build large quantum computers that can solve currently impossible science problems, crack unbreakable encryption, and make artificial intelligence smarter. In the meantime, companies building quantum computers are trying to figure out how to use the small ones they expect to build in the coming years.

Decades of theoretical work suggest that quantum computersperhaps even relatively small oneswill someday be able to solve important problems in chemistry that are intractable on existing computers. But before they can take on big challenges like understanding photosynthesis and improving catalysts for making renewable fuels, researchers have begun simulating small molecules and atoms. And so far, they havent gone far beyond what a math-savvy chemist can do with a pen and paper.

This week in the journal Nature , researchers at IBM describe using a small quantum computer to simulate more complex molecules. The IBM team used six of the quantum bits (qubits) on a seven-qubit system to push into the second row of the periodic table, simulating molecules as large as beryllium hydride (BeH2). Whats significant, says Jerry Chow, manager of experimental computing at IBM research, is how they did it: by developing more sophisticated algorithms that could carry out the simulations on a small, noisy quantum computer.

Beryllium hydride is easy to simulate on a classical computer. Its the kind of thing theoretical chemists like Markus Reiher call a toy problem. But this kind of work must be done in order to make useful quantum computers that can solve chemical problems where classical computation reaches its limits, says Reiher, whos based at ETH Zurich.

On a classical computer, the difficulty of chemical simulations scales exponentially with the size of the problem. To do useful work, researchers make approximations, which works much of the time. But sometimes, quantum effects that are impossible to simulate are key to understanding the chemistry. Quantum computers can represent quantum states such as the energy levels of electrons more na...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog