IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Friday, 26 January

07:53

Reddit rolls out 2-factor authentication for users Help Net Security

The 234 million or so unique Reddit users are finally getting the option of setting up 2-factor authentication for their account(s). Why is that important? With over 540 million monthly visitors, social news aggregator Reddit is one of the top ten most popular websites in the world. You dont need to open an account to peruse its content, but if you want to participate in discussions on one of its countless subreddits, youll have to More

06:16

Alphabet enters enterprise cybersecurity market, launches Chronicle Help Net Security

Googles parent company Alphabet has announced its entry into the lucrative enterprise cybersecurity market through Chronicle, a company started in early 2016 as a project at X, Alphabets moonshot factory. Chronicle has now graduated to the status of an independent company within Alphabet, and is lead by Stephen Gillett, formerly an executive-in-residence at Google Ventures and Chief Operating Officer of Symantec. VirusTotal, a malware intelligence service acquired by Google in 2012, will be become a More

05:13

PCI Council sets security requirements for mobile point of sale solutions Help Net Security

The PCI Security Standards Council has announced a new PCI Security Standard for software-based PIN entry on commercial off-the-shelf (COTS) devices such as smartphones and tablets. What are we talking about here? Stores that offer customers the possibility to purchase things with their payment card usually have a hardware terminal and PIN entry device. But this can be too pricey an option for small merchants in markets that require EMV chip-and-PIN acceptance. A cheaper option More

04:05

New Purism Developer To Begin Work On Tackling Responsive GTK+ Apps Phoronix

GNOME developer Adrien Plazas has joined Purism as part of their effort of getting GTK+ applications on the Librem 5 smart-phone...

04:00

The Fastest Linux Distribution For Ryzen: A 10-Way Linux OS Comparison On Ryzen 7 & Threadripper Phoronix

While we frequently do Linux OS/distribution performance comparisons on the latest Intel desktop and server hardware, some requests came in recently about looking closer at the fastest Linux distribution(s) when running on AMD's Ryzen desktop processors. Here are benchmarks of ten popular Linux distributions tested out-of-the-box on Ryzen 7 1800X and Threadripper 1950X systems.

03:45

DIY Graphene Putty Makes Super Sensitive Sensor SoylentNews

Submitted via IRC for TheMightyBuzzard

It is sort of an electronics rule 34 that if something occurs, someone needs to sense it. [Bblorgggg], for reasons that aren't immediately obvious, needs to sense ants moving over trees. No kidding. How are you going to do that? His answer was to use graphene.

Silly Putty, which is just silicone putty, gives the graphene an unusually large dynamic range. That is, it can detect large pressures (say, a finger pressing) and still detect a very faint pressure (like your heart beating through the finger). Apparently, the graphene lines up to become pretty conductive in the putty and then any deformation causes the resistance to go up. However, when the pressure subsides, the graphene lines back up.

Source: https://hackaday.com/2018/01/23/diy-graphene-putty-makes-super-sensitive-sensor/


Original Submission

Read more of this story at SoylentNews.

03:30

Indexing Chuck Not Required Hackaday

Becoming accomplished with a lathe is a powerful skillset, but its only half of the journey. Being clever comes later, and its the second part of the course. Patience is in there somewhere too, but lets focus on being clever. [TimNummy] wants a knobbed bolt with critical parameters, so he makes his own. After the break, there is a sixty-second summary of the linked video.

Making stock hardware is a beginners tasks, so custom hardware requires ingenuity or expensive machinery. Adding finger notches to a bolthead is arbitrary with an indexing chuck, but one isnt available. Instead, hex stock becomes a jig, and the flat sides are utilized to hold the workpiece at six intermittent angles. We cant argue with the results which look like a part that would cost a pretty penny.

Using material found in the workshop is what being clever is all about. Hex brass stock comes with tight tolerances on the sides and angles so why not take advantage of that?

[TimNummy] can be seen on HaD for his Jeep dome light hack and an over-engineered mailbox flag. Did you miss [Quinn Dunki]s piece on bootstrapping precision machine tools? Go check that out!

03:22

TIGIT as a Biomarker for T Cell Senescence and Exhaustion Lifeboat News: The Blog

In a new study, researchers propose that TIGIT is a marker of T cell senescence and exhaustion in the immune system. However, not only is TIGIT just a biomarker, it is also a potential therapeutic target; as the researcher team discovered, lowering levels of TIGIT resulted in the restoration of some lost function in T cell populations that were experiencing high levels of senescence and exhaustion.


In a new study, researchers propose that TIGIT is a marker of T cell senescence and exhaustion in the immune system[1]. However, not only is TIGIT just a biomarker, it is also a potential therapeutic target; as the researcher team discovered, lowering levels of TIGIT resulted in the restoration of some lost function in T cell populations that were experiencing high levels of senescence and exhaustion.

Aging is associated with immune dysfunction, especially T-cell defects, which result in increased susceptibility to various diseases. Previous studies showed that T cells from aged mice express multiple inhibitory receptors, providing evidence of the relationship between T-cell exhaustion and T-cell senescence. In this study, we showed that T-cell immunoglobulin and immunoreceptor tyrosine-based inhibitory motif (ITIM) domain (TIGIT), a novel co-inhibitory receptor, was upregulated in CD8 + T cells of elderly adults. Aged TIGIT + CD8 + T cells expressed high levels of other inhibitory receptors including PD-1 and exhibited features of exhaustion such as downregulation of the key costimulatory receptor CD28, representative intrinsic transcriptional regulation, low production of cytokines, and high susceptibility to apoptosis. Importantly, their functional defects associated with aging were reversed by TIGIT knockdown.

03:14

How To Deploy Django App on Heroku TechWorm

Hey geeks and really interesting people out there, today we are doing a little resume on how you can deploy django app on heroku.

Yeah, even if you dont know anything about it, here you can learn how to do it, so keep reading to become a deployer master.

Is kinda obvious, but first, you need to have a Heroku account, is you already have it skip this step, however if you dont, you can create a Heroku account in like one minute or even less, you can choose the plan that is more suitable for the functionalities you need to have, this platform counts with 4 plans: Free that will cost you $0, and then the ones you need to pay to have, that are hobby, standard, and performance. This time we are working on the free plan.

I need to highlight something really important here, at the moment you create your account,  you choose the primary development language, please be sure you select Python. After you finish all the steps you will receive a confirmation email.

Having your account next is installing the CLI for Heroku, this is the main tool you need to interact properly with Heroku, to do this you need first open the console, enter your user-name and password, of the account you already have or just create.

Then start creating a Heroku app, and next you need to connect to PostgreSQL, is kind of easy for those who already have experience on the field.

After you start creating your app, you can start configuring the Django apps for your Heroku system, you can try at first writing a really easy Django application, however, if you are a lot more experienced you can try to do one a little bit more complicated.

You need to have the requirements.txt file, this file contains a list of all you need for app packages, you need to create this file in the root folder. After you have this configured, you need to have the profile, this describes all the commands you will need to execute the app. And last in this step but not least; you need to have the runtime.txt, which is the file that specifies the Python version.

Then we need to separate the Django settings, this is necessary for the app you are creating is this start to grow. After you have it, you need to set up static files. First, you need to modify settings.py ? wsgi.py; that will assure you a correct display of files. After this step, it came the data configuration and the local launch.

If you complete all these steps correctly, you will just need to go and deploy Django to Heroku, run migrations and thats it! For those who want to take a look at the code here, you have all the...

03:08

Systemd 237 Is Being Prepared For Release Phoronix

The first systemd update of 2018 should soon be here...

03:00

New Antennas Will Take CubeSats to Mars and Beyond IEEE Spectrum Recent Content full text

By packing big antennas into tiny satellites, JPL engineers are making space science cheap Illustration: John MacNeill

img
Illustration: John MacNeill

One morning in November 2014, Kamal Oudrhiri, a colleague of mine at the Jet Propulsion Laboratory (JPL), in Pasadena, Calif., burst into my office with an intriguing proposition. A first-of-its-kind satellite was headed for Mars. The satellite would fly alongside NASAs InSight Mars Lander, relaying data in real time back to Earth during the landers critical entry, descent, and landing. We have to achieve 8 kilobits per second, and were limited in terms of power. Our only hope is a large antenna, Oudrhiri explained. Oh, and the satellite itself will be only about the size of a briefcase.

Nothing as diminutive as the Mars satellitewhich belongs to a class called CubeSatshad ever gone farther than low Earth orbit. The antenna would be stowed during launch, occupying only about 830 cubic centimeters. Shortly thereafter, it would unfurl to a size three times as large as the satellite itself. It would have to survive the 160-million-kilometer flight to the Red Planet, including the intense vibration of launch and the radiation and extreme temperatures of deep space. How hard could that be?

Fortunately, my colleagues and I love a challenge, and we welcomed the chance to push CubeSat technology to its limits. These tiny spacecraft have become the go-to vessel for researchers and startups doing Earth imaging and monitoring. Compared with traditional satellites, they are relatively inexpensive and small, weighing just a few kilograms, and they can be ready to launch in a matter of months, rather than the years it typically takes to prepare a standard spacecraft. Over time, the onboard sensors and processing that CubeSats can carry have been the beneficiaries of Moores Law advancements in electronics, growing more powerful and sophisticated, lighter in weight, and energy efficient.

img
Photo: JPL/NASA RainCube's Umbre...

Test Tube Hard Drives Compute with Chemicals IEEE Spectrum Recent Content full text

Storing data as small molecules and getting them to compute by reacting could speed some computations Photo: Barry Rosenthal/Getty Images

A group of scientists and engineers at Brown University is planning to use chemicals in a droplet of fluid to store huge amounts of data and, eventually, get them to do complex calculations instantly. Theyve just received US $4.1 million from the Defense Advanced Research Projects Agency to get started, and plan to borrow robots and automation from the pharmaceutical industry to speed their progress.

Were hoping that at the end of this well have a hard drive in a test tube, says Jacob Rosenstein, assistant professor of electrical engineering, who is co-leading the project with theoretical chemist Brenda Rubenstein.

Theres been a big push recently to store data as molecules of DNA, but the Brown chemical computing project will do things differently, potentially ending up with greater data density and quicker readouts.

If it seems like theyll need a lot of different chemicals to make this scheme do anything important, youre right. But that may not be a big problem at all. The Brown team will rely on a class of chemistry called Ugi reactions. These are combinations of four chemicals reacted together all at once to produce a small organic molecule. The pharmaceutical industry uses automated systems that react different combinations to produce millions of chemicals for testing as drugs.

So how do they tell which of those millions is actually in a drop of liquid? Rubenstein, Rosenstein, and their colleagues will use a technology called mass spectrometry. Its essentially the same technology used to find evidence of doping drugs in athletes urine. Basically, it charges the molecules in a sam...

02:42

What happens when AI tries too hard to improve reality, in one photo Lifeboat News: The Blog

Technically speaking, Google Photos Assistant did a pretty good job.

02:42

Scientists building worlds most-powerful SUPER LASERS that can RIP holes in space Lifeboat News: The Blog

A NEW laser is being built that is powerful enough to rip apart empty space.

02:26

Will Americans ever know the truth about FBI and DOJ abuses? MassPrivateI


FISA memo worse than Watergate

Multiple Felonies by Top Government Officials Exposed

DEEP STATE, In PANIC, Tries To Drop Fusion GPS Dossier


02:20

Kristen Fortney, CEO at BioAge Labs, joins our Life Extension Board. Lifeboat News

Kristen Fortney, CEO at BioAge Labs, joins our Life Extension Board.

02:12

Simon Shelton, Teletubbies' Tinky Winky, Has Passed Away at Age 52 SoylentNews

Tributes have been paid to actor Simon Shelton, best known for playing purple Teletubby Tinky Winky, following his death at the age of 52.

[...] The original Teletubbies ran on the BBC from 1997 to 2001 and spawned a number one single, called Teletubbies say 'Eh-oh!', in December 1997.

Speaking in 2008, Shelton said he had little inkling Teletubbies would be the success it was when he was cast as Tinky Winky.

"I didn't know it would be as big as it was, but I did know as soon as I started working on it that it had something special," he said.

The original Teletubbies series was watched by around one billion children in more than 120 countries in 45 languages.

Shelton, a father of three, lived in Ampthill in Bedfordshire.

http://www.bbc.com/news/entertainment-arts-42788001


Original Submission

Read more of this story at SoylentNews.

02:01

Keep Accurate Time on Linux with NTP

Title: 
Keep Accurate Time on Linux with NTP

02:01

The Current State of the Black Market: You Cant Buy Vantablack Hackaday

Sometimes you need something to be utterly, totally, irredeemably black. Not just a little bit black, not just really really really dark blue, but as black as it is possible to get. It might be to trap light in a camera or a telescope, for artistic purposes, or even to make your warplane a more difficult target for enemy missiles. Either way, were here to help, not to judge. So what are your options?

Well, first of all, theres the much-lauded Vantablack. The name itself is a clue as to its origin  Vertically Aligned Nano Tube Arrays. It works by coating an object with a forest of carbon nanotubes in a complicated vacuum deposition process. When light hits the surface, some of it is absorbed by the nanotubes, and any that is reflected tends to be absorbed by neighbouring nanotubes rather than escaping the surface coating of the object.

Like a Void in the Universe

Two masks, one in bronze, the other coated in Vantablack. So much incoming light is absorbed that it becomes impossible to see the surface contours of the coated object.

Vantablack has the current crown for being the blackest black currently available, absorbing 99.965% of visible light. However, before you get too excited, it does have some drawbacks. In its original form, it has to...

02:01

Spritecoin ransomware masquerades as cryptocurrency wallet and also harvests victims data Security Affairs

Fortinet discovered a strain of ransomware dubbed Spritecoin ransomware that only allows victims Monero payments and pretends to be a cryptocurrency-related password store.

Researchers from Fortinet FortiGuard Labs has discovered a strain of ransomware that only allows victims Monero payments and pretends to be a cryptocurrency-related password store.

The ransomware poses itself as a spritecoin wallet, it asks users to create their desired password, but instead of downloading the block-chain it encrypts the victims data files.

The malware asks for a 0.3 Monero ransom ($105 USD at the time of writing) and drops on the target system a ransom note of Your files are encrypted.

SpriteCoin ransomware

The malware includes an embedded SQLite engine, a circumstance that leads experts to believe it also implements a credentials harvesting feature for Chrome and Firefox credential store. The malicious code appends the .encrypted file extension to encrypted files (i.e. resume.doc.encrypted).

While decrypting the files, the Spritecoin ransomware also deploys another piece of malware that is able to harvest certificates, parse images, and control the web camera.

In a cruel twist, if the victim decides to pay and obtain a decryption key they are then delivered a new malicious executable [80685e4eb850f8c5387d1682b618927105673fe3a2692b5c1ca9c66fb62b386b], detected as W32/Generic!tr. reads the report.

While have not yet fully analyzed this malicious payload, we can verify that it does have the capability to activate web cameras and parse certificates and keys that will likely leave the victim more compromised than before.

The experts speculate the ransomware is being spread via forum spam that targets users interested in cryptocurrency.

Ransomware is usually delivered via social engineering techniques, but can also be delivered without user interaction via exploits. These often arrive (but are not limited to) via email, exploit kits, malicious crafted Excel/Word/PDF macros, or JavaScript downloaders. states the...

01:53

Security flaw in Moto G5 Plus allows anyone to bypass lockscreen HackRead

By Waqas

A critical security flaw or bug in Motorola Moto G5 Plus

This is a post from HackRead.com Read the original post: Security flaw in Moto G5 Plus allows anyone to bypass lockscreen

01:45

How cybercriminals abuse the travel and hospitality industry Help Net Security

The travel and hospitality industry suffers billions of losses each year due to fraud. With the right combination of other underground services (compromised accounts, credit cards, etc.) it is possible to cover almost every aspect of the holidays, including food and restaurants, shopping, entertainment, guided tours and more way beyond flights and hotels, Vladimir Kropotov, Researcher at Trend Micro, told Help Net Security. Whats on offer? Kropotov and his colleagues have been rifling through More

01:39

Verdict in Copyright/Trademark Infringement Case: $710,001 Awarded to Grumpy Cat Limited SoylentNews

Grumpy Cat wins $710,000 payout in copyright lawsuit

A cat made famous online because of its permanent scowl has been awarded $710,000 (500,000) in a copyright case by a California federal court.

Grumpy Cat Limited sued the owners of US coffee company Grenade for exceeding an agreement over the cat's image. The company only had rights to use the cat to sell its "Grumppuccino" iced drink, but sold other Grumpy products.

The cat, real name Tardar Sauce, went viral in 2012 after photographs of her sour expression emerged online. Originally posted on the social website Reddit by the brother of the cat's owner, Tabatha Bundesen, the image of the cat quickly spread as a meme with funny text captions.

In 2013 Grenade Beverage, owned by father and son Nick and Paul Sandford, struck a $150,000 deal to market iced coffee beverages with the cat's scowl on its packaging.

[...] Grumpy Cat is thought to have earned millions in endorsement and advertising deals.

Also at Courthouse News.


Original Submission

Read more of this story at SoylentNews.

01:35

Great Gesture by Mohammed Siraj after 14 year kid hacked his account and got arrested Hacker News Bulletin | Find the Latest Hackers News

With the increase in cybercrimes nowadays, social media accounts are the ones which are the most vulnerable. The rate of them getting hacked is increasing day by day. One of the things we see now is not only professional hackers are into hacking social media accounts, but young students and teenagers are also now doing

The post Great Gesture by Mohammed Siraj after 14 year kid hacked his account and got arrested appeared first on Hacker News Bulletin | Find the Latest Hackers News.

01:26

Meeting du 3 fvrier 2018 HZV / Hackerzvoice / The Hackademy

Comme tous les premiers samedis du mois, c'est meeting HZV !

RDV  samedi 3 fvrier 2018 l'Electrolab 52, Rue Paul Lescop Nanterre  16H !

Nous vous rappelons que les meets sont ouverts tous !

Pas de talk programm pour le moment, si vous voulez en proposer un, crivez-nous sur meet [at] hackerzvoice [dot] net !

 

Piqre de rappel : le CFP de la #ndh16 est ouvert, vous avez jusqu'au 5 avril prochain pour faire vos propositions : https://submit.hackerzvoice.net/

01:24

Sam Gyimah Replaced Jo Johnson More Than a Fortnight Ago, But Team UPC Has Ignored It Until Now Techrights

Sam Gyimah

Summary: Another great example of Team UPC intentionally ignoring facts that dont suit the UPC agenda and more misinformation from Team UPC (which now suppresses comments expressing the wrong views)

IT IS not news. It was reported on early in the month. Team UPC could report it more than two weeks ago, but it did not. How convenient, as usual. It also reported absolutely nothing about the British government/Parliament totally removing the UPC from the agenda (after it had been put there).

Team UPC could report it more than two weeks ago, but it did not.Sam Gyimah, who is relatively young for a politician, replaces another young politician, whom we criticised for being inexperienced in his domain (still, Donald Trump even appoints officials who have only just graduated from college). This morning we wrote about Bristows mentioning it weeks late (while also distorting the facts or making stuff up) and this afternoon it was Michael Loney who belatedly covered it:

Sam Gyimah, member of UK parliament for East Surrey, has been confirmed as the UK IP minister

The above publisher is close to EPO management and has helped promote the UPC for years. Perhaps they realise that they cant go on ignoring the fact that Jo Johnson is history. His words, his infamous photo op with crooked Battistelli, all that lobbying et cetera? Perhaps all in vain. Is Gyimah already being showered with brown-nosing advice from Team UPC? Its not unthinkable. Bristows...

01:10

Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems The Hacker News

Are you using Linux or Mac OS? If you think your system is not prone to viruses, then you should read this. Wide-range of cybercriminals are now using a new piece of 'undetectable' spying malware that targets Windows, macOS, Solaris and Linux systems. Just last week we published a detailed article on the report from EFF/Lookout that revealed a new advanced persistent threat (APT) group,

00:36

The EPO is Already in Violation of ILO Rulings on Judge Corcoran Techrights

Under normal circumstances, executives or presidents can be arrested for refusing to obey court orders

Benot Battistelli

Summary: The incredible situation at the EPO, where court orders from several countries (and international tribunals) are simply being disregarded, staff is being bullied, and corrupt officials get away with punishing people who speak about the corruption (while they themselves enjoy immunity)

THIS MORNING we mentioned ILOATs latest decisions (dozens of EPO ones). We dont wish to comment on any of them without prior consultation, primarily because without context theres room for misinterpretation. We did look at a few decisions.

The ILO actually arranged an exceptional delivery of several Corcoran decisions, perhaps realising it would be essential to guard Corcorans job (his contract/term would have expired before the normal delivery). Last month we read that Patrick Corcoran would likely be mentioned (again) in some of this latest batch, possibly along with staff representatives. The ILO actually arranged an exceptional delivery of several Corcoran decisions, perhaps realising it would be essential to guard Corcorans job (his contract/term would have expired before the normal delivery).

Over the past month Corcorans life (and career) was chaotic in spite of ILOs intervention. He may have worked in 3 places and offices (Haar, Munich, and The Hague) in just about a month. We dont know if he is already at The Hague or not. Harassing him (even outside the courtroom) and making it impossible for him to adapt makes dismissal for incompetence easier, or simply gives him the incentive to walk away and give up. It is absolutely despicable and we keep trying to bring this to the attention of ILO (and Guy Ryder personally).

Its Mr. Battistelli who ought to be sent to The Hague, preferably in handcuffs (they have the ICC there).We have already heard from multiple sources [1,...

00:30

Data breaches at an all time high: How are businesses protecting themselves? Help Net Security

Digitally transformative technologies are shaping the way organisations do business and moving them to a data-driven world, with 94% of organisations using sensitive data in cloud, big data, IoT, container, blockchain and/or mobile environments, according to the 2018 Thales Data Threat Report. Digital transformation is driving efficiency and scale as well as making possible new business models that drive growth and profitability. Enterprises are embracing this opportunity by leveraging all that digital technology offers, with More

00:08

libcurl has had authentication leak bug dated back to before September 1999 Security Affairs

According to a security advisory, libcurl is affected by a couple of issues, one of them might cause the leakage of authentication data to third parties.

libcurl is a free and easy-to-use client-side URL transfer library, it builds and works identically on numerous platforms.

According to a security advisory, libcurl is affected by a couple of issues, one of them might cause the leakage of authentication data to third parties.

The problem is related to the way it handles custom headers in HTTP requests.

When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. states the advisory.

Sending the same set of headers to subsequest hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using clients request. We are not aware of any exploit of this flaw.

Applications that pass on custom authorization headers could leak credentials or information that could be abused by attackers to impersonate the libcurl-using clients request.

This vulnerability tracked as CVE-2018-1000007 has been present since before curl 6.0, back to before September 1999. Affected versions are libcurl 7.1 to and including 7.57.0, later versions (7.58.0) are not affected, the patch was published on GitHub.

this solution creates a slight change in behavior. Users who actually want to pass on the header to other hosts now need to give curl that specific permission. You do this with [location-trusted](https://curl.haxx.se/docs/manpage.html#location-trusted) with the curl command line tool.

libcurl is also affected by an HTTP/2 trailer out-of-bounds read vulnerability tracked as CVE-2018-1000005.

The issue is related to the code that creates HTTP/1-like headers from the HTTP/2 trailer data that appends a string like `:` to the target buffer (it was recently changed to `: `...

00:06

Camels Disqualified from Saudi Beauty Pageant Due to Botox Injections SoylentNews

A Dozen Camels Disqualified From Saudi Beauty Pageant Over Botox Injections

Some pageant contestants hit a hump in the road this week. That is, a camel beauty contest in Saudi Arabia disqualified a dozen camels for receiving Botox injections to make them more attractive.

Saudi media reported that a veterinarian was caught performing plastic surgery on the camels a few days before the pageant, according to UAE's The National. In addition to the injections, the clinic was surgically reducing the size of the animals' ears to make them appear more delicate.

"They use Botox for the lips, the nose, the upper lips, the lower lips and even the jaw," Ali Al Mazrouei, a regular at such festivals and the son of a prominent Emirati breeder, told the newspaper. "It makes the head more inflated so when the camel comes it's like, 'Oh look at how big that head is. It has big lips, a big nose.' "

Real money is at stake: About $57 million is awarded to winners of the contests and camel races, The National reports, with more than $31.8 million in prizes for just the pageants.

Also at The New York Times, Reuters, and Newsweek.

Check out the world's tallest camel


Original Submission

Read more of this story at SoylentNews.

00:03

Firefox 59 Might Ship With Working Wayland Support Phoronix

Besides Firefox 59 being the release doing away with GTK2 support, this next Mozilla web-browser release might be the one to achieve working native Wayland support...

00:02

Grumpy Cat Wins $710,000 From Copyright Infringing Coffee Maker TorrentFreak

grumpcatThere are dozens of celebrity cats on the Internet, but Grumpy Cat probably tops them all.

The cats owners have made millions thanks to their pets unique facial expression, which turned her into an overnight Internet star.

Part of this revenue comes from successful merchandise lines, including the Grumpy Cat Grumppuccino iced coffee beverage, sold by the California company Grenade Beverage.

The company licensed the copyright and trademarks to sell the iced coffee but is otherwise not affiliated with the cat and its owners. Initially, this partnership went well, but after the coffee maker started to sell other Grumpy Cat products, things turned bad.

The cats owners, incorporated as Grumpy Cat LLC, took the matter to court with demands for the coffee maker to stop infringing associated copyrights and trademarks.

Without authorization, Defendants [] have extensively and repeatedly exploited the Grumpy Cat Copyrights and the Grumpy Cat Trademarks, the complaint read.

Pirate coffee..
grumpycoffee

After two years the case went before a jury this week where, Courthouse News reports, the cat itself also made an appearance.

The eight-person jury in Santa Ana, California sided with the cats owner