|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
The Necurs botnet has been slowly growing since late 2012 and still tops the list of largest spam botnets in the world. Since then, the botnet has occasionally stopped or temporarily minimized the sending out of spam but has returned in full force. How big is the Necurs botnet? Its difficult to say precisely, but the latest information provided by the Cisco Talos team can give a general idea. The researchers analyzed 32 distinct spam More
The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign that has targeted activists, journalists, lawyers, military personnel, and enterprises in more than 20 countries in North America, Europe, the Middle East, and Asia. They have dubbed the threat Dark Caracal, and have traced its activities to as far back as 2012. The malware used by Dark Caracal The attackers went after information stored on targets Android devices More
Researchers routinely discover a variety of malicious apps on Google Play, some of which have been downloaded and installed on millions of devices worldwide. Heres what infosec experts think about the security of Google Play, what they think Google should do better, and what users can do in order to protect themselves from malicious apps on the official Android app store. Chris Boyd, Lead Malware Intelligence Analyst, Malwarebytes Google Play continues to have issues where More
Continuous vulnerability management for ICS cybersecurity PAS Cyber Integrity 6.0 now includes continuous vulnerability management providing visibility into vulnerability risk within industrial process control networks. Cyber Integrity moves beyond traditional IT vulnerability management by also addressing the proprietary industrial control systems that comprise 80 percent of a facility environment. BlackBerry releases cloud-based static binary code scanning solution BlackBerry Jarvis is a cloud-based static binary code scanning solution that identifies vulnerabilities in software used in automobiles. More
The researcher and software developer Abraham Masri has discovered a new bug, dubbed chaiOS Text Bomb that could be exploited to crash recipients iMessage application in a continuous loop.
Effective Power is back, baby!
Text the link below, it will freeze the recipient's device, and possibly restart it. https://t.co/Ln93XN51Kq
Abraham Masri (@cheesecakeufo) January 16, 2018
The flaw exploited by the chaiOS Text Bomb affects both iOS and macOS, according to researchers at Yalu Jailbreak, the bug is currently compatible up till iOS 11.1.2 firmware, this means that it affects iMessage apps on macOS High Sierra, iOS 10 to 10.3.3, and iOS 11 to 11.2.1.
A proof-of-concept page has been put together by Masri and shared on Twitter yesterday, but the page has been removed from GitHub due to potential abuses, anyway, a new mirror has been already added.
chaiOS is a malicious iOS bug that can cause the target device to freeze, respring, drain the battery, and possibly kernel panic. It is developed by the eminent jailbreak developer, Abraham Masri.
Here are the known after-effects once someone opens the malicious link.
Total spending on IT infrastructure products (server, enterprise storage, and Ethernet switches) for deployment in cloud environments is expected to total $46.5 billion in 2017 with year-over-year growth of 20.9%, according to a new forecast from IDC. Public cloud datacenters will account for the majority of this spending, 65.3%, growing at the fastest annual rate of 26.2%. Off-premises private cloud environments will represent 13% of cloud IT infrastructure spending, growing at 12.7% year over year. More
For the Kernel Page Table Isolation (KPTI) support currently within the Linux kernel for addressing the Meltdown CPU vulnerability it's currently limited to 64-bit on the x86 side, but for the unfortunate souls still running x86 32-bit operating systems, SUSE is working on such support...
Pick a card, any card. [Andrew Quitmeyer] and [Madeline Schwartzman] make sure that any card you pick will match their NYC art installation. Replantment is an interactive art installation which invites guests to view full-size leaf molds from around the world.
A receipt file with leaf images is kept out of range in this art installation. When a viewer selects one, and carries it to the viewing area, an RFID reader tells an Arduino which tag has been detected. Solid-state relays control two recycled clothing conveyors draped with clear curtains. The simple units used to be back-and-forth control but through dead-reckoning, they can present any leaf mold front-and-center.
Clothing conveyors from the last century werent this smart before, and it begs the question about inventory automation in small businesses or businesses with limited space.
Posted by Ralph Dolmans on Jan 19Hi,
Posted by Nicholas Luedtke on Jan 19In my extremely humble opinion, a patched "semi-public" issue is better
There are updated AMDGPU microcode/firmware files now available for recent Radeon GPUs...
A new model can detect abnormalities in x-rays better than radiologistsin some parts of the body, anyway.
The results: Stanford researchers trained a convolutional neural network on a data set of 40,895 images from 14,982 studies. The paper documents how the algorithm detected abnormalities (like fractures, or bone degeneration) better than radiologists in finger and wrist radiographs. However, radiologists were still better at spotting issues in elbows, forearms, hands, upper arms, and shoulders.
The background: Radiologists keep getting put up against AI, and they usually dont fare even as well as this. Geoffrey Hinton, a prominent AI researcher, told the New Yorker that advances in AI mean that medical schools should stop training radiologists now.
Treating the diseases of ageing requires rethinking of our approach to treating disease. Rather than a whack-a-mole strategy going after individual conditions, a concerted medical effort against ageing as a whole is in order.
Aging is something that we all share, rich or poor; it is something that happens to us all, and we are taught from a young age that it is inevitable. However, some scientists believe that aging is amenable to medical intervention and that such interventions could be the solution to preventing or reversing age-related diseases.
Academics are currently debating whether aging is natural or a pathological disease that we can treat.
In fact, there is now pressure from many academics to classify aging itself as a disease; indeed, doing so could potentially improve funding for aging research and help to speed up progress in finding solutions to age-related diseases. The debate continues, but does it really matter if aging is classified as a disease, or is it largely a matter of semantics?
On January 8, the Health South East RHF, that is the healthcare organization that manages hospitals in Norways southeast region (countries of stfold, Akershus, Oslo, Hedmark, Oppland, Buskerud, Vestfold, Telemark, Aust-Agder and Vest-Agder), disclosed a security breach that may have exposed sensitive data belonging to more than half of the population.
The incident was announced by the national healthcare security centre HelseCERT that detected an abnormal activity against computer systems in the region. HelseCERT notified the incident to local authorities as well as NorCERT.
We are in a phase where we try to get an overview. Its far too early to say how big the attack is. We are working to acquire knowledge of all aspects, Kjetil Nilsen, director of NorCERT, the National Security Authority (NSM) told Norwegian media outlet VG.
Everything indicates that it is an advanced player who has the tools and ability to perform such an attack. It can be advanced criminals. There is a wide range of possibilities,
According to the HelseCert, the security breach is the result of an attack conducted by advanced and professional hackers.
Authorities announced important measures to limit the damage caused by the security breach.
A number of measures have been implemented to remove the threat, and further measures will be implemented in the future, announced Norways Ministry of Health and Care in a statement.
The hospitals in the region currently serve 2.9 million inhabitants, that correspond to 56 percent of the overall population composed of 5.2 million citizens.
Found this interesting, you may too.
A new research paper that may help unlock the mystery of why Americans can't seem to get a decent raise. Economists have struggled over that question for years now, as wage growth has stagnated and more of the nation's income has shifted from the pockets of workers into the bank accounts of business owners. Since 1979, inflation-adjusted hourly pay is up just 3.41 percent for the middle 20 percent of Americans while labor's overall share of national income has declined sharply since the early 2000s. There are lots of possible explanations for why this is, from long-term factors like the rise of automation and decline of organized labor, to short-term ones, such as the lingering weakness in the job market left over from the great recession. But a recent study by a group of labor economists introduces an interesting theory into the mix: Workers' pay may be lagging because the U.S. is suffering from a shortage of employers.
[...] argues that, across different cities and different fields, hiring is concentrated among a relatively small number of businesses, which may have given managers the ability to keep wages lower than if there were more companies vying for talent. This is not the same as saying there are simply too many job hunters chasing too few openingsthe paper, which is still in an early draft form, is designed to rule out that possibility. Instead, its authors argue that the labor market may be plagued by what economists call a monopsony problem, where a lack of competition among employers gives businesses outsize power over workers, including the ability to tamp down on pay. If the researchers are right, it could have important implications for how we think about antitrust, unions, and the minimum wage.
Read more of this story at SoylentNews.
Still looks kind of cartoony. But, i would really like to see a head like this put on the body of the ATLAS robot, just to see where we are at with the best android we could possibly make right now. Oh, and put clothes on it, have it walk down the street. The next Turing test will be can it dupe people into thinking it is a person, in person.
Who would have thought that you could light up pyrotechnics on USB power? This USB keystroke injector that blows up after its used proves the concept.
Fully aware that this is one of those just because you can doesnt mean you should projects, [MG] takes pains to point out that his danger dongle is just for dramatic effect, like a prop for a movie or the stage. In fact, he purposely withholds details on the pyrotechnics and concentrates on the keystroke injection aspect, potentially nasty enough by itself, as well as the dongles universal payload launching features. Were a little bummed, because the confetti explosion (spoiler!) was pretty neat.
The device is just an ATtiny85 and a few passives stuffed into an old USB drive shell, along with a MOSFET to trigger the payload. If you eschew the explosives, the payload could be anything that will fit in the case. [MG] suggests that if you want to prank someone, an obnoxious siren might be a better way to teach your mark a lesson about plugging in strange USB drives.
While this isnt the most dangerous thing you can do with a USB port, it could be right up there with that rash of USB killer dongles from a year or so ago. All of these devices are fun what ifs, but using them on anything but your own computers is not cool and possibly dangerous. Watching the smoke pour out of a USB socket definitely drives home the point that you shouldnt plug in that thumbdrive that you found in the bathroom at work, though.
[Yuu], thanks for the tip.
Via: Sacramento Bee: The states wealthiest 1 percent, for instance, pay 48 percent of its income tax, and the departure of just a few families could lead to a noticeable hit to state general fund revenue. It is a genuine concern and thats why the legislatures in high-tax states are swinging into action immediately, said 
Via: Al Jazeera: You might not have electricity, but you wont get killed by the police either. I think more will come when they begin to see it as a viable alternative. But its not easy and its not cheap. I cant say whats happening in America today is any worse than whats been 
OpenSUSE has continued rolling in the new year with several key package updates in January...
Harry Wentland of AMD has sent out the latest batch of patches for the AMDGPU DC display code stack. Fortunately it lightens up the DRM driver by about six thousand lines thanks to removing some unused code...
A global mobile espionage campaign collecting a trove of sensitive personal information from victims since at least 2012 has accidentally revealed itselfthanks to an exposed server on the open internet. It's one of the first known examples of a successful large-scale hacking operation of mobile phones rather than computers. The advanced persistent threat (APT) group, dubbed Dark Caracal,
Most pre-GCN AMD graphics cards are still limited to OpenGL 3.3 support at this time due to not supporting FP64. Only the HD 5800/6900 series on R600g currently have real double-precision floating-point support working right now so at present they are on OpenGL 4.3 rather than 3.3, but those other generations may be catching up soon thanks to the "soft" FP64 code...
Although VR is still in its infancy, "traditional" methods of capturing and transforming footage have emerged. Typically, to shoot 360-degree VR content, a cameraperson employs several cameras rigged in a spherical formation to capture the scene. According to Alicia Millane's blog entry on The Primacy, "Each camera is mounted at a specific angle so the camera's field of view will overlap portions of the surrounding cameras' field of view." With the overlap, editors should be able to get more seamless footage, without any gaps.
[...] Enter volumetric photogrammetry. A mouthful, for sure, but this method of creating virtual environments could possibly hold the key to the future of VR. Unlike the method mentioned above, there are no takes or shots in volumetric VR that are later edited in post-production. This allows for a much more fluid experience, as the consumer frames the scene and chooses his or her own perspective. Using the volumetric capture method, footage of a real person is recorded from various viewpoints, after which software analyzes, compresses and recreates all the viewpoints of a fully volumetric 3D human.
With volumetric VR explained, photogrammetry's defining characteristic is the principle of triangulation. As explained in a blog post on Viar360, triangulation involves taking photographs from at least two locations to form lines of sight. "These lines of sight are then mathematically intersected to produce the 3-dimensional coordinates of the points of interest."
[...] Immersive experiences utilizing volumetric photogrammetry may convey a much more authentic and realistic environment to the end user. Per VRt Ventures founder, Jacob Koo, "If virtual reality has the chance to reach its full potential, then consumers must feel like they are actually somewhere they cannot be physically. That perception takes VR technology out of the novelty category and makes it something actually useful."
Read more of this story at SoylentNews.
Posted by P J P on Jan 19Hello,
Mesa 17.3.3 is now available as the latest point release for the Mesa 17.3 stable series...
Cyber spies belonging to Lebanese General Directorate of General Security are behind a number of stealth hacking campaigns that in the last six years, aimed to steal text messages, call logs, and files from journalists, military staff, corporations, and other targets in 21 countries worldwide.
New nation-state actors continue to improve offensive cyber capabilities and almost any state-sponsored group is able to conduct widespread multi-platform cyber-espionage campaigns.
This discovery confirms that the barrier to entry in the
cyber-warfare arena has continued to
decrease and new players are becoming even more dangerous.
The news was reported in a detailed joint report published by security firm Lookout and digital civil rights group the Electronic Frontier Foundation.
The attack chain implemented by Dark Caracal relies primarily on social engineering, the hackers used messages sent to the victims via Facebook group and WhatsApp messages. At a high-level, the hackers have designed three different kinds of phishing messages to trick victims into visiting a compromised website, a typical watering hole attack.
Posted by Sebastien Delafond on Jan 19-------------------------------------------------------------------------
Linux Journals new parent, Private Internet Access, has established a $25k fund to jump-start the next generation of Linux journalismand to spend it here, where Linux journalism started in 1994.
This isnt a contest, and there are no rules other than the ones that worked for journalism before it starting drowning in a sea of content.
Britains National Health Service appears to have used a project set up to create a Linux alternative for its employees smartcards and later, hopefully, a desktop alternative to Windows to bargain with Microsoft and obtain an enterprise-wide desktop deal.
I have been following Slimbook for some time now. As you probably know, they ship a KDE laptop that is very cool, with KDE Neon pre-installed. They have attended to a couple of events I have attended to so I have been able to test their laptops, get feedback from buyers and ask them questions directly. The fact that they are a Spanish company was a beautiful surprise, We do not have that many hardware integrators and vendors in Spain.
But what definitely caught my attention was the fact that they pay a lot of attention to the software. They ship the laptops with Linux pre-installed. Ok, that is not new any more. But they do pre-install several different distros. Now, thats uncommon. But news do not...
That failure, and another one last year involving another type of Long March rocket, slowed Chinas space efforts. Officials had hoped to launch around 30 rockets of one type or another in 2017 but only managed 18 (there were 29 launches in America and another 20 of Russian onessee chart). But they promise to bounce back in 2018, with 40-or-so lift-offs planned this year. These will probably include a third outing for the Long March 5assuming its flaws can be fixed in timeand missions that will greatly expand the number of satellites serving BeiDou, Chinas home-grown satellite navigation system.
NATTY yellow carts whizz tourists around Wenchang space port, a sprawling launch site on the tropical island of Hainan. The brisk tour passes beneath an enormous poster of Xi Jinping, Chinas president, then disgorges passengers for photographs not far from a skeletal launch tower. Back at the visitor centre there is a small exhibition featuring space suits, a model moon-rover and the charred husk of a re-entry capsule that brought Chinese astronauts back from orbit. A gift shop at the exit sells plastic rockets, branded bottle openers and cuddly alien mascots.
The base in a township of Wenchang city is the newest of Chinas four space-launch facilities. It is also by far the easiest to visitthanks in part to the enthusiasm of officials in Hainan, a haven for tourists and rich retirees. Wenchangs local government has adopted a logo for the city reminiscent of Starfleet badges in Star Trek. It is building a space-themed tourist village near the launch site, with attractions that include a field of vegetables grown from seeds that have been carried in spaceships.
Upgrade your inbox.
How do I install Spotify app on Ubuntu Linux desktop to stream music? Spotify is a digital music stream service that provides you access to tons of songs. You can stream for free or buy a subscription. Creating a playlist is possible. A subscriber can listen music ad-free. You get better sound quality. This page Continue reading "How to install Spotify application on Linux"
Industrial designer [Eric Strebel] has access to big, walk-in spray booths, but bigger isnt always better. For small jobs, its overkill, and he wanted his own spray booth anyway. If youre ready to upgrade from that ratty old cardboard box in the garage, look no further than [Eric]s spray booth how-to after the break.
If you dont already know, [Eric] is something of a foam core legend. He has several videos about model building techniques that produce really slick results, so its no surprise to see these skills transfer to a larger build. The booth is built from a single 40 x 60 sheet of 1/2 foam core board, a furnace filter, and a vent fan modified to fit his shops system. The whole thing cost less than $200, most of which goes toward the fan.
[Eric] modified an existing spray booth plan to fit his needs and added some really nice touches along the way. All the edges are beveled and the unfinished faces are taped, so at first glance it looks like its made out of painted wood or melamine board. The furnace filter slides out one side for easy replacement and is braced with foam scraps so it wont fall forward. The best part of this booth is the LED stripsthey make for way better working conditions than the dim recesses of a cardboard box.
If youd rather build a walk-in spray booth, why not make your own sliding barn doors, too?
The Federal Trade Commission (FTC) is investigating whether chipmaker Broadcom Ltd engaged in anticompetitive tactics in negotiations with customers, the company said on Wednesday.
The investigation comes as Broadcom pursues a hostile takeover of Qualcomm in a $103 billion deal. Since the FTC would likely review any merger for anticompetitive practices, the current probe could make regulatory approval more challenging.
Broadcom was recently issued subpoenas that seek an extensive amount of information, according to The Wall Street Journal, which was the first to report the probe on Wednesday.
The focus of the concern has been that Broadcom has changed some contracts to require customers to buy a percentage of its production of items rather than a certain number, the paper reported.
"This FTC review is immaterial to our business, does not relate to wireless and has no impact on our proposal to acquire Qualcomm," Broadcom said in a statement.
Read more of this story at SoylentNews.
In recent years the MPAA has pursued legal action against several pirate sites and the streaming service Pubfilm is one of their latest targets.
Hollywoods industry group initially kept the lawsuit secret. This was done to prevent Pubfilms operator from moving to a new domain preemptively. While this strategy worked, Pubfilm didnt throw in the towel.
Soon after the pubfilm.com domain name was suspended, the site moved to pubfilm.ac. And that wasnt all. Pubfilm also started to actively advertise its new domain through Google Adsense to regain its lost traffic.
Today, close to a year has passed and Pubfilm is still around. The site moved from domain to domain and currently resides at Pubfilm.is and a few other domains that are advertised on the site.
All this time the company failed to responded in court, so the case saw little movement. This week, however, the MPAA made its demands clear and soon after the court issued a default against the site and its unknown operators.
Defendants are Internet pirates who own, operate, and promote a ring of interconnected websites under the name PubFilm and variants thereof whose purpose is to profit from the infringement of copyrighted works, the group wrote in its request.
Because of this continued infringement, the MPAA demanded the maximum amount of statutory copyright infringement damages. With 132 titles listed in the complaint, this totals nearly $20 million.
Given the egregious circumstances of this case, Plaintiffs should be awarded the full amount of statutory damages of $150,000 for each of the 132 Works identified in the Complaint, for a total of $19,800,000, the MPAA writes in its memorandum.
In addition, the Hollywood studios requested a permanent injunction that will require domain registries to put associated domain names on hold and sign them over to the MPAA.
Both requests were granted by the court on Thursday.
Previously, several domain names were aready seized through a preliminary injunction that resulted in Pubfilm moving from domain to domain in recent months. While these seizures can be effective, not all domain registries will comply with a US court order.
One of Pubfilms main domai...
Earth-i, a mapping service based in England, has launched a prototype of the worlds first full-colour, full-motion video satellite constellation.
British company Earth-i has successfully launched a prototype of its upcoming satellite constellation into orbit. The new network known as Vivid-i will be the first of its kind to provide full-colour motion video and the first European-owned constellation able to provide both video and still images.
am an early adopter of Detexian, a service which I increasingly rely on for security. My wife and I run a small media entity which attracts about 5 million hits a week. The sites are TuxMachines.org and TechRights.org. One of the sites is modest and non-confrontational, whereas the other one (the latter) is more controversial because it is critical of activities such as bribery, illegal surveillance, and all sorts of corruption. There are certainly people and organisations that are willing to spy on and undermine the site. Some of those who get criticised are large technology companies and institutions they work with.
We cannot keep up with logs because we are a small team and we cannot properly analyse these for security threats. It is just infeasible. For analysis of logs we also require a service which is isolated from surveillance-intensive hosts such as Amazon. We moreover operate on a very small budget as the sites are public services rather than for-profit.
We now rely on Detexian to inspect the traffic and generate concise reports. Detexian helps to avert disaster or alert about troubling patterns in activity before disaster strikes or flaws are found/exploited. TuxMachines.org and TechRights.org are not young sites. They have been around for nearly a decade and a half; over the years we have suffered more DDOS attacks than we can remember and there were also intrusion attempts (none were successful). Some attacks managed to cause damage, but it was always repairable. Recently, Detexian alerted us about SQL injection attempts and made recommendations.
We shall continue to rely on Detexian in the foreseeable future and are happy to pay for the service knowing that someone has got our back and is providing informed advice on how to guard the sites.
Its all about money and replacing examiners with machines
Summary: The worrisome growth of European Patents (EPs) a 40% jump in one year in spite of decline in the number of patent applications is a symptom of the poor judgment, induced largely by bad policies that impede examiners activities for the sake of so-called production; this weeks decision regarding CRISPR is another wake-up call and software patents too need to be abolished (as a whole), in lieu with the European Patent Convention (EPC)
THE EPO has
said absolutely nothing about the Board or about Broad.
Odd, isnt it? Not even a tweet. Sometimes they do link to
decisions of the Boards of Appeal, but not this time. Instead,
junk about a new Benot Battistelli photo op (warning:
epo.org link). We dont know if theyre intentionally
distracting from something, but we can only guess. Got to maintain
the perception of top-notch patent quality, right?
Battistelli took a flight on some plane and all he got was a lousy photo op (in which he is barely even visible).As usual, this EPO news is all about Benot Battistelli. Heck, the entire Web site of the EPO is a shrine to Battistelli. How many years will that take to undo?
The worlds news aggregators said nothing about the above meeting, which is pretty insignificant anyway. Battistelli took a flight on some plane and all he got was a lousy photo op (in which he is barely even visible). Blog post imminent? Either way, lets look at the real news.
The EPO went overboard, unhinged from the actual purpose and function of patent offices.Fallout of EPO granting (in error) patents on life is very much visible. Its prominent in the news. We already wrote 3 articles about it earlier this week (on Wednesday and Thursday [1, 2,...
There's a new bug floating around called "chaiOS" that appears to be a basic GitHub link. However, when you text it to a person via the iMessage app (whether on iOS or MacOS), it will crash the app and possibly cause the device to freeze and restart. In other words: Be aware that this exists, but don't send it to anyone.
It was Twitter user Abraham Masri who first uncovered the bug. The people over at 9to5Mac tested it out, and it certainly messed up their devices. They reported crashes and severe lags as a result of the bugs that persisted until the thread containing the link was deleted from the iMessage app. If you did send or receive it, and your device is a mess, there's also a fix in the replies to Masri's original tweet. We've reached out to Apple to confirm that their team is aware of the bug, and to see if there are any fixes in the works.
Read more of this story at SoylentNews.
Summary: As WesternGeco v ION Geophysical is the main if not sole major patent case that the US Supreme Court will deal with, it seems safe to say that nothing substantial will change for patent scope in the United States this year
THE patent microcosm has begun speaking more and more about WesternGeco v ION Geophysical a case which weve mentioned several times so far this week, usually in the context of Alice being safe from challenge [1, 2].
It has absolutely no impact on patent scope.To avoid misunderstandings, let is be stressed that the decision whichever way it may go wont have any profound effect on anything we cover. Its barely of any relevance to us. An article from Prof. Kumar (last revised days ago) is titled Patent Damages Without Borders [via] and the abstract is a concise summary of the case: The presumption against extraterritoriality is a deceptively straightforward principle: that U.S. law applies only inside the United States. But there is confusion regarding whether the presumption applies when a court calculates patent damages. In WesternGeco L.L.C. v. Ion Geophysical Corp., the Federal Circuit held that patent holders who show infringement under 271(f) of the Patent Act cannot recover foreign lost profits. The court maintained that allowing recovery of such damages would result in the Patent Act applying extraterritorially, which cannot be done without Congresss clear intent. This interpretation severely limits the ability of district courts to make patent infringement victims whole. This Article maintains that the Federal Circuits reliance on the presumption is misplaced. The presumption was established to prevent U.S. law from applying to extraterritorial c...
Were all too spoiled nowadays with our comfortable ways to erase and write data to persistent memory, whether its our microcontrollers internal flash or some external EEPROM. Admittedly, those memory technologies arent exactly new, but they stem from a time when their predecessors had to bathe under ultraviolet light in order to make space for something new. [Taylor Schweizer] recently came across some of these quartz-window decorated chips, and was curious to find out what is stored in them. Inspired by the BIOS reverse engineering scene in Halt and Catch Fire, he ended up building his own simple reader to display the EPROMs content.
The 2732 he uses is a standard EPROM with 32kbit memory. Two pins, Chip Enable and Output Enable, serve as main control interface, while 12 address pins select the data stored in the chips internal 4K x 8 arrangement, to output it on the 8 data output pins. You could of course hook up the EPROM to a microcontroller and send what you read via serial line, but [Taylor] opted for a more hands-on approach that lets him read out the data in a manual way. He simply uses a bank of DIP switches to set the address and control pins, and added a row of LEDs as display.
As you can see from the short demonstration in the video after the break, reading out the entire EPROM would be a rather tedious task this way. If you do have more serious intentions to read out the content, you could have a look at one of those microcontroller based solutions sending data via serial line after all.
Walmart is helping customers get rid of leftover opioids by giving them packets that turn the addictive painkillers into a useless gel. The retail giant announced Wednesday that it will provide the packets free with opioid prescriptions filled at its 4,700 U.S. pharmacies.
The small packets, made by DisposeRX, contain a powder that is poured into prescription bottles. When mixed with warm water, the powder turns the pills into a biodegradable gel that can be thrown in the trash. It works on other prescription drugs and for pills, tablets, capsules, liquids or patches, according to DisposeRx.
[...] Some drugstore chains like CVS and Walgreens also collect unused medications at many of their stores. People can also take leftovers to hospital pharmacies or police stations. Unused prescriptions also can be thrown in the trash. But the Food and Drug Administration recommends mixing them first with something unpalatable like kitty litter or used coffee grounds and sealing the mixture in a plastic bag.
Read more of this story at SoylentNews.
One day, they may yet turn against us, but for now, theyre still our allies: A drone rescued two teenage swimmers in distress off the coast of New South Wales in Australia, according to a new report. The drone spotted two teenagers in trouble around a half-a-mile out from shore, and then dropped a flotation device it carries for the purpose to give them something to hang on to (via Verge).
This drone was actually not supposed to be saving anyone just yet it was engaged in a pilot project to test its viability. But the Sydney Morning Herald reports that when a call came through about the swimmers in trouble, the drone happened to be in the Ari and nearby, positioned well to respond.
The drones pilot, a decorated veteran lifeguard for New South Wales, was able to Gert out to the swimmers position, and drop the pod in a minute or two, which is at least a few minutes less than it wouldve taken to respond directly with actual flesh and blood lifeguards.
Associated Press historical news archive articles dating back to 1985.
Although neuroscientists have a general idea of what parts of the brain do what, catching them in the act is a difficult proposition. But UC Berkeley researchers have managed to do it, visualizing based on direct measurement the path of a single thought (or at least thread) through the brain.
Normal scalp-based electroencephalography (EEG) is easy to do, but it really can only get a very blurry picture of brain activity near the surface, because it has to detect all that through your hair, skin, skull, etc.
What if you could take all that stuff out of the way and put the electrodes right on the brain? That'd be great, except who would volunteer for such an invasive procedure? Turns out, a handful of folks who were already getting open-brain surgery did.
[...] We are trying to look at that little window of time between when things happen in the environment and us behaving in response to it," explained lead author Avgusta Shestyuk in the Berkeley news release. "This is the first step in looking at how people think and how people come up with different decisions; how people basically behave."
Read more of this story at SoylentNews.
One of the reasons why the Arduino became so popular was the ability to program it with ease. It meant the end of big parallel programmers that would cost an arm and a leg. The latest installment of CircuitPython from [Lady Ada] and the team over at Adafruit is a library for programming AVR microcontrollers without a dedicated PC.
For the uninitiated, in-system programming or ISP for AVR controllers employ the SPI bus to write the compiled binary to the flash memory of the controller. The discount on the number of pins used itself is a benefit though getting the timings right was a bit tricky in the good old days. Most dedicated ISPs handle this nicely, though they are normally slaves to a host PC where an upload button initiates the process.
With CircuitPython (a derivative of MicroPython), programming microcontrollers does not require going through the code-compile-flash cycle. It can be run on a number of processors, however, AVRs are not among them so this neat little library offers the next best thing. Wire-up an Atmega328P or ATmega2560 to a board like the ESP8266 that does run CircuitPython, and you can write firmware on the fly.
There is a complete tutorial on the subject thanks to [Phillip Torrone] and [Lady Ada] which includes some demo files for testing out the functionality. This opens up a lot of possibilities where OTA firmware updates for an AVR co-processor. We expect to see some keychain AVR programmers in the near future taking a hint from the ESP8266 based Two-Factor Authentication featured previously.
Physics contains equations that describe everything from the stretching of space-time to the flitter of photons. Yet only one set of equations is considered so mathematically challenging that its been chosen as one of seven Millennium Prize Problems endowed by the Clay Mathematics Institute with a $1 million reward: the Navier-Stokes equations, which describe how fluids flow.
Last month I wrote a story about an important new result related to those equations. If anything, the new work suggests that progress on the Millennium Prize will be even harder than expected. Why are these equations, which describe familiar phenomena such as water flowing through a hose, so much harder to understand mathematically than, say, Einsteins field equations, which involve stupefying objects like black holes?
The answer, I discovered, is turbulence. Its something weve all experienced, whether flying through choppy air at 30,000 feet or watching a whirlpool gather in the bathtub drain. Yet familiarity hasnt bred knowledge: Turbulence is one of the least understood parts of the physical world.Lucy Reading-Ikkanda /
Apple today announced a new set of investments to build on its commitment to support the American economy and its workforce, concentrated in three areas where Apple has had the greatest impact on job creation: direct employment by Apple, spending and investment with Apples domestic suppliers and manufacturers, and fueling the fast-growing app economy which Apple created with iPhone and the App Store. Apple is already responsible for creating and supporting over 2 million jobs across the United States and expects to generate even more jobs as a result of the initiatives being announced today.
Combining new investments and Apples current pace of spending with domestic suppliers and manufacturers an estimated $55 billion for 2018 Apples direct contribution to the US economy will be more than $350 billion over the next five years, not including Apples ongoing tax payments, the tax revenues generated from employees wages and the sale of Apple products.
[...] "Apple, already the largest US taxpayer, anticipates repatriation tax payments of approximately $38 billion as required by recent changes to the tax law. A payment of that size would likely be the largest of its kind ever made."
Read more of this story at SoylentNews.
Samsung has announced the mass production of 16 Gb GDDR6 SDRAM chips with a higher-than-expected pin speed. The chips could see use in upcoming graphics cards that are not equipped with High Bandwidth Memory:
Samsung has beaten SK Hynix and Micron to be the first to mass produce GDDR6 memory chips. Samsung's 16Gb (2GB) chips are fabricated on a 10nm process and run at 1.35V. The new chips have a whopping 18Gb/s pin speed and will be able to reach a transfer rate of 72GB/s. Samsung's current 8Gb (1GB) GDDR5 memory chips, besides having half the density, work at 1.55V with up to 9Gb/s pin speeds. In a pre-CES 2018 press release, Samsung briefly mentioned the impending release of these chips. However, the speed on release is significantly faster than the earlier stated 16Gb/s pin speed and 64GB/s transfer rate.
18 Gbps exceeds what the JEDEC standard calls for.
Standard Finalized by JEDEC
DDR5 Standard to be Finalized by JEDEC in 2018
SK Hynix to Begin Shipping GDDR6 Memory in Early 2018
Samsung's Second Generation 10nm-Class DRAM in Production
Read more of this story at SoylentNews.
Overnight Tech: Senate extends NSA spy program | Apple to allow customers to disable phone slowdowns | Amazon down to 20 HQ2 finalists | Facebook gets first black board member The Hill: Technology Policy
SENATE VOTES TO EXTEND NSA SURVEILLANCE: The Senate on Thursday passed an extension of a government surveillance program, sending the bill to President Trump's desk.Senators voted 65-34 on the bill, which includes a six-year extension with...
Has AI made significant progress over the years towards artificial general intelligence?
This decades-old debate could end by the new project from the Stanford 100 Year Study on AI, called The AI Index. If their goal is achieved.
Off to a good start, the AI Indexs first report includes many useful visualisations of the data they are collecting, such as the following outline of AI breakthroughs since 1980.
We all built cardboard forts when we were kids. [Paintingcook] has taken it into adulthood with a hand built cardboard wall. He and his wife leased a loft apartment. Lofts are great one giant space to work with. Plans changed a bit when they found out they had a baby on the way. A single living, working, and sleeping space definitely wouldnt be good for a newborn, so the couple set about separating a section of the room with a wall.
Sheetrock and steel or wood lumber would be the normal path here. They instead decided to recycle their cardboard moving boxes into a wall. The boxes were formed into box beams, which created the framework of the wall. The two pillars were boxed in and incorporated into the wall itself. The skin of the wall is a random patchwork of cardboard pieces. Most of the construction is completed with 3/8 screws and masking tape. Tape wont last forever, but this is a temporary wall after all.
You might be wondering about fire hazards sure, cardboard burns more readily than gypsum board, but the apartment is outfitted with sprinklers, which should help on this front. A few commenters on [Paintingcooks] Reddit thread asked about formaldehyde and other gasses emitting from the cardboard. Turns out hes an inorganic chemist by trade. He says any outgassing happens shortly after the cardboard is manufactured. It should be safe for the baby.
In 2017 Obamacare was the subject of a great deal of political jockeying, and yet by the end of the year almost nothing changed. So what happened, and why? https://www.theguardian.com/us-news/2017/jun/26/koch-network-piggy-banks-closed-republicans-healthcare-tax-reform http://www.foxbusiness.com/politics/2017/06/26/gop-donors-close-checkbooks-frustrated-with-lack-progress-on-taxes-health-care.html http://fortune.com/2017/12/21/obamacare-enrollment-surge-despite-trump/ https://www.washingtonpost.com/blogs/plum-line/wp/2017/12/27/republicans-failure-on-health-care-is-even-greater-than-they-realize/ http://www.palain.com/?page_id=325
[A] consortium has devised an ambitious experiment to test the so-called quantum superposition principle (QSP) the law that allows microscopic systems to appear in two different, perfectly distinguishable, configurations at the same time. [...] Unproven theories advanced since the 1980s suggest the existence of a universal background 'noise' that destroys QSP of larger objects, such as particles that can be seen using an optical microscope.
The 'Project TEQ' consortium, led by the University of Trieste, in Italy, will test the existence of this noise thanks to a 4.4M (3.9M) award from the European Commission.
Its experiment will involve a tiny particle of glass, one-thousandth of the width of a human hair, being levitated by an electric field in a vacuum at a temperature close to absolute zero (-273C). A laser will be shot at the particle, and the scattering of the laser's light measured for signs of movement of the particle.
If there is no movement, it means that quantum mechanics still apply at this scale and there is no universal background noise. However, if movement is detected, it indicates the existence of a noise that prevents QSP applying at this scale. This would represent the first observed failure of quantum theory, setting a limit on the scale at which quantum mechanics apply and having implications for large-scale applications of any physical system based on quantum principles.
Read more of this story at SoylentNews.